64 patents
Page 3 of 4
Utility
Dynamic Aggregation of Information Based on Web Application Layer Requests
4 Mar 21
A method by a web application layer proxy for dynamically creating counters during runtime based on actual web application layer requests received by the web application layer proxy.
David LEVY NAHUM
Filed: 28 Aug 19
Utility
Mechanism for Providing Obfuscated Code to Web Application Clients
4 Feb 21
A method by one or more network devices for providing obfuscated code to web application clients.
Itsik MANTIN
Filed: 1 Aug 19
Utility
Continuous Database Security and Compliance
14 Jan 21
A method by a security system for selectively triggering different ones of a plurality of database assessment scans for a database and detecting when non-compliant database configurations of the database are being used.
Avidan REICH, Amichai SHULMAN, Michael CHERNY
Filed: 30 Sep 20
Utility
Accelerating Dynamic Content Delivery In a Content Delivery Network
30 Dec 20
A technique for accelerating dynamic content delivery in a content delivery network.
David LEVY NAHUM
Filed: 26 Jun 19
Utility
Detecting Attacks on Databases Based on Transaction Characteristics Determined from Analyzing Database Logs
30 Dec 20
A method by a security system implemented by one or more electronic for detecting attacks on one or more databases.
Shiri MARGEL, Itsik MANTIN, Guy SHTAR, Yury GEILER
Filed: 9 Sep 20
Utility
Community-based Data Security
4 Nov 20
A method by one or more electronic devices implementing a system for providing community-based data security, where the system is communicatively coupled to a plurality of database security analyzers, where each of the plurality of database security analyzers is configured to analyze data accesses to one or more databases associated with that database security analyzer.
Doron TZUR, Shiri MARGEL, Itsik MANTIN
Filed: 29 Apr 19
Utility
Identifying and Classifying Community Attacks
12 Aug 20
A method by one or more electronic devices for identifying and classifying community attacks.
Shiri MARGEL, Amit LEIBOVITZ
Filed: 29 Dec 19
Utility
Method for Generating a Human Likeness Score
12 Aug 20
One embodiment of the invention is a method utilizing a CAPTCHA to generate a human likeness score including blocks: a) receiving a user solution to the CAPTCHA; b) receiving a user interaction pattern descriptive of an interaction undertaken by the user, through a graphical interface of the CAPTCHA, to achieve the user solution; c) determining the accuracy of the user solution; d) comparing the user interaction pattern against an interaction model generated from interaction patterns of previous users; e) calculating the human likeness score based upon the determination of block c) and the comparison of block d), wherein the human likeness score lies within a continuum of human likeness scores.
Tyler James PAXTON, Reid Michael TATORIS, Benjamin TRENDA, Elvis JAKUPOVIC, Steven P. BURKETT, Adam Michael JANOWER
Filed: 5 Feb 20
Utility
Chunk-scanning of Web Application Layer Requests to Reduce Delays
22 Jul 20
A method by a web application layer attack detector communicatively coupled between web application clients and web application servers.
Boris ZINGERMAN, Uri SHAPEN
Filed: 17 Jan 19
Utility
Infrastructure Distributed Denial of Service Protection
22 Jul 20
A method of providing infrastructure protection for a server of a network organization, the method including announcing an internet protocol (IP) address range associated with the network organization using a border gateway protocol (BGP) on an edge server of a distributed network of edge servers.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 2 Apr 20
Utility
Infrastructure Distributed Denial of Service Protection
22 Jul 20
A method of providing infrastructure protection for a server of a network organization, the method including announcing an IP address range associated with the network organization using a border gateway protocol on an edge router of a scrubbing center associated with the network organization.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 2 Apr 20
Utility
Using Access Logs for Network Entities Type Classification
1 Jul 20
A method by a security system implemented by one or more electronic devices for detecting attacks on one or more databases hosted by one or more database servers.
Shiri MARGEL, Yury GEILER
Filed: 25 Dec 18
Utility
Monitoring and Preventing Use of Weak Cryptographic Logic
1 Jul 20
A runtime application self protection (RASP) plug-in monitors for, and prevents, invocation of unacceptably weak cryptographic processing requested by an application.
Kunal Anand
Filed: 16 Oct 19
Utility
Monitoring and Preventing Outbound Network Connections In Runtime Applications
1 Jul 20
A runtime application self protection (RASP) plug-in logic monitors for, and prevents, outbound network connections that are initiated by server application logic and that are not intended by the application logic.
Kunal Anand, Richard Meester, II, Joseph Rozner, Martin Ryan
Filed: 16 Oct 19
Utility
Generating Collection Rules Based on Security Rules
1 Jul 20
A computing device is described that is coupled to a set of web application layer attack detectors (ADs), which are coupled between clients and web application servers.
Nadav Avital ARBEL, Luda LAZAR, Gilad YEHUDAI
Filed: 27 Dec 18
Utility
Selective Database Logging with Smart Sampling
17 Jun 20
A method by a security analysis server to generate a traffic monitoring rule.
Ehud ESHET, Ophir BLEIBERG
Filed: 12 Dec 18
Utility
Infrastructure Distributed Denial of Service Protection
20 May 20
A method of providing infrastructure protection for a network that includes IP addresses as low as a single IP address.
Dvir Shapira, Ehud Cohen, Tomer Bronshtein, Eyal Leshem, Alon Ludmer
Filed: 21 Jan 20
Utility
Techniques for Securely Detecting Compromises of Enterprise End Stations Utilizing Tunnel Tokens
29 Apr 20
A method in a cloud network to detect compromises within an enterprise network based on tokens tunneled outside of the enterprise network to the cloud network.
Amichai SHULMAN, Sagie DULCE, Daniella GOIHMAN-SHUSTER, Shahar BEN-HADOR
Filed: 29 Dec 19
Utility
Data Based Web Application Firewall
25 Mar 20
A method for protecting information from databases includes a web application firewall and a database activity monitor.
Shiri MARGEL, Itsik MANTIN, Amichai SHULMAN, Daniella GOIHMAN-SHUSTER
Filed: 16 Apr 19
Utility
Continuous Database Security and Compliance
26 Feb 20
A method implemented by a security system for selectively triggering different ones of a plurality of database assessment scans for a database The method includes monitoring for occurrences of a first class of database operations that have been determined to require only rerunning subsets of the plurality of database assessment scans to determine whether results of the plurality of database assessment scan shave changed, responsive to detecting an occurrence of one or more database operations of the first class, selecting one or more of the subsets to be rerun based on which of the database operations of the first class occurred, and triggering performance of only the selected one or more of the subsets to determine whether the results of the plurality of database assessment scans have changed.
Avidan REICH, Amichai SHULMAN, Michael CHERNY
Filed: 21 Aug 18