Patent application number | Description | Published |
20080313734 | DISTRIBUTED SYSTEM AND METHOD FOR THE DETECTION OF eTHREATS - The invention relates to a distributed system for detecting eThreats that propagate in a network, which comprises: (a) graphs database storing at least one propagation graph, each graph describing the typical propagation over time of one eThreat class or a legitimate executable class within the network; (b) plurality of agents that are distributed in corresponding plurality of hosts within the network, each of said agents continuously monitoring the corresponding host and reporting to a Central Decision Maker (CDM) the identity of any new suspected executable, and the time in which said suspected executable has been first detected by said agent; (c) a CDM for: (c.1) receiving all said reports from said plurality of agents; (c.2) creating from said reports for each suspected executable a corresponding propagation graph which reflects the propagation characteristics over time of said suspected executable within the network, and (c.3) comparing each of said created graphs with said stored at least one propagation graph; (c.4) upon finding a similarity above a predefined threshold between a created graph and one of the stored graphs, concluding respectively that said executable belongs to the class as defined by said stored graph; and (c.5) conveying said conclusion to said agents, for optionally taking an appropriate action. | 12-18-2008 |
20090300765 | UNKNOWN MALCODE DETECTION USING CLASSIFIERS WITH OPTIMAL TRAINING SETS - The present invention is directed to a method for detecting unknown malicious code, such as a virus, a worm, a Trojan Horse or any combination thereof. Accordingly, a Data Set is created, which is a collection of files that includes a first subset with malicious code and a second subset with benign code files and malicious and benign files are identified by an antivirus program. All files are parsed using n-gram moving windows of several lengths and the TF representation is computed for each n-gram in each file. An initial set of top features (e.g., up to 5500) of all n-grams IS selected, based on the DF measure and the number of the top features is reduced to comply with the computation resources required for classifier training, by using features selection methods. The optimal number of features is then determined based on the evaluation of the detection accuracy of several sets of reduced top features and different data sets with different distributions of benign and malicious files are prepared, based on the optimal number, which will be used as training and test sets. For each classifier, the detection accuracy is iteratively evaluated for all combinations of training and test sets distributions, while in each iteration, training a classifier using a specific distribution and testing the trained classifier on all distributions. The optimal distribution that results with the highest detection accuracy is selected for that classifier. | 12-03-2009 |
20100031358 | SYSTEM THAT PROVIDES EARLY DETECTION, ALERT, AND RESPONSE TO ELECTRONIC THREATS - The invention is a computer system that provides early detection alert and response to electronic threats (eThreats) in large wide area networks, e.g. the network of an Internet Services Provider or a Network Services Provider. The system of the invention accomplishes this by harnessing the processing power of dedicated hardware, software residing in specialized servers, distributed personal computers connected to the network, and the human brain to provide multi-layered early detection, alarm and response. The layers comprise: a Protection Layer, which detects and eliminates from the network data stream eThreats known to the system; a Detection Layer, which detects and creates signatures for new eThreats that are unknown to the system; an Expert Analysis Layer, which comprises a group of human experts who receive information from various components of the system and analyze the information to confirm the identity of new eThreats; and a Collaborative Detection & Protection Layer, which detects potential new eThreats by processing information received from various system agents and users. A Dynamic Sandbox Protection Layer associated with the distributed personal computers connected to the network. can optionally be part of the system of the invention. | 02-04-2010 |
20100168768 | Devices and Methods for Treating Morbid Obesity - A surgical method of treating morbid obesity via bariatric procedures, carried out endoluminally and transluminally using endoscopic devices that are introduced through natural body openings without the necessity of creating any incisions in the abdominal wall. | 07-01-2010 |
20100229239 | SYSTEM AND METHOD FOR DETECTING NEW MALICIOUS EXECUTABLES, BASED ON DISCOVERING AND MONITORING CHARACTERISTIC SYSTEM CALL SEQUENCES - The invention relates to a method for detecting malicious executables, which comprises: (a) in an offline training phase, finding a collection of system call sequences that are characteristic only to malicious files, when such malicious files are executed, and storing said sequences in a database; and, in runtime, for each running executable, continuously monitoring its issued run-time system calls and comparing with the stored sequences of system calls within the database to determine whether there exists a match between a portion of the sequence of the run-time system calls and one or more of the database sequences, and when such a match is found, declaring said executable as malicious. | 09-09-2010 |
20110113491 | COLLABORATIVE SYSTEM FOR PROTECTING AGAINST THE PROPAGATION OF MALWARES IN A NETWORK - The present invention is a system for using a collective computing power of a plurality of network stations in a communication network in order to overcome threats generated by malicious applications. Collaboratively, a large group of simple network stations implement a vaccination mechanism, proliferating information concerning malicious applications (malwares) throughout the network in an efficient manner. | 05-12-2011 |
20120246727 | System that provides early detection, alert, and response to electronic threats - The invention is a computer system that provides early detection alert and response to electronic threats (eThreats) in large wide area networks. The system harnesses the processing power of dedicated hardware, software residing in specialized servers, distributed personal computers connected to the network, and the human brain to provide multi-layered early detection, alarm and response. The layers comprise a Protection Layer, a Detection Layer, an Expert Analysis Layer, and a Collaborative Detection & Protection Layer. A Dynamic Sandbox Protection Layer associated with the distributed personal computers connected to the network can optionally be part of the system of the invention. | 09-27-2012 |
20140113588 | SYSTEM FOR DETECTION OF MOBILE APPLICATIONS NETWORK BEHAVIOR- NETWISE - The invention is a system for protecting mobile devices in cellular networks from unauthorized harmful applications and for protecting cellular network infrastructure from targeted or benign overloads. The system comprises mobile cellular devices and a cellular network infrastructure. Some of the mobile devices comprise an application manager, which is adapted to manage the aggregation and learning processes, and a detection manager, which is adapted to analyze network behavior and detect deviations. The application manager and the detection manager are adapted to monitor the applications running on a device, learn the patterns of mobile applications network behavior and detect meaningful deviations from the application's observed normal behavior. The cellular network infrastructure comprises a services module, a logic module, and a database access unit adapted for aggregation and analysis of an application's network traffic patterns for numerous users. | 04-24-2014 |
20140150109 | METHOD FOR PROTECTING USER PRIVACY IN SOCIAL NETWORKS - A method for protecting user privacy in an online social network, comprising the steps of defining, for a given primary user of an online social network who is authorized to post multimedia information in an account of the social network, a personal profile type that characterizes a level of desired privacy and that is selected from a group of predetermined profile types; defining a personal profile type selected from the group for each of a plurality of secondary users who are interested in accessing posted multimedia information of the primary user while functioning as a friend thereof; and denying a request for friendship initiated by one of the plurality of secondary users when the profile type of the primary user and of the one of the plurality of secondary users are incompatible as defined by predetermined rules, that may be stored in the privacy setting module. | 05-29-2014 |
20150082448 | Method for Detecting Spammers and Fake Profiles in Social Networks - A method for protecting user privacy in an online social network, according to which negative examples of fake profiles and positive examples of legitimate profiles are chosen from the database of existing users of the social network. Then, a predetermined set of features is extracted for each chosen fake and legitimate profile, by dividing the friends or followers of the chosen examples to communities and analyzing the relationships of each node inside and between the communities. Classifiers that can detect other existing fake profiles according to their features are constructed and trained by using supervised learning. | 03-19-2015 |
Patent application number | Description | Published |
20080201779 | AUTOMATIC EXTRACTION OF SIGNATURES FOR MALWARE - Method for the automatic generation of malware signatures from computer files. A common function library (CFL) created, wherein the CFL contains any functions identified as a part of the standard computer language used to write computer files which are known as not containing malware. The functions of a computer file which does contain a malware are extracted and the CFL is updated with any new common functions if necessary, such that the remaining functions are all considered as candidates for generating the malware signature. The remaining functions are divided into clusters according to their location in the file and the optimal cluster for generating the malware signature is determined. One or more of the functions in the optimal cluster is selected randomly, as the malware signature. | 08-21-2008 |
20090109240 | Method and System for Providing and Reconstructing a Photorealistic Three-Dimensional Environment - The present invention relates to a method and system for providing and reconstructing a photorealistic environment, by integrating a virtual item into it, comprising: (a) a dedicated marker, placed in a predefined location within an environment, in which a virtual item has to be integrated, for enabling determining the desired location of said virtual item within said environment; (b) a conventional camera for taking a picture or shooting a video clip of said environment, in which said marker was placed, and then providing a corresponding images of said environment; and (c) one or more servers for receiving said corresponding image of said environment from said camera, processing it, and outputting a photorealistic image that contains said virtual item integrated within it, comprising: (c.1.) a composer for composing a photorealistic image from said corresponding image of said environment; (c.2.) an image processing unit for processing said corresponding image and for determining the location of said marker within said environment; (c.3.) a configuration database for storing configurations and other data; and (c.4.) an image rendering unit for reconstructing the photorealistic image by integrating said virtual item into said predefined location of the photographed environment, wherein said marker is located. | 04-30-2009 |
20150025867 | FLEXIBLE AND SCALABLE SIMULATIONS OF MASS PARTICIPANTS IN REAL TIME - The invention is a highly efficient simulator that is not necessarily dependent on the number of participants—it can scale out to a mass number of participants and still run on a single very low-end computer. The simulator populates itself with individuals and, in accordance with a model of the system that comprises rules that govern the behavior of the individual participants, generates and records signals related to the activities that each participant carries out in real time to create a simulation of how the actual system performs. The recorded signals are stored in a data base, which can be mined for decision making. | 01-22-2015 |
20150134409 | ACCURATE MECHANISM FOR ESTIMATING A MOBILE COMMUNICATION SERVICE PROVIDER'S MARKET SHARE - A method of enabling a specific mobile communication service provider (Dt) to estimate his market share on a street level in real time during a specific period of time over a particular point of interest (POI) is disclosed. | 05-14-2015 |
20150150035 | METHOD AND SYSTEM FOR MONITORING EXPOSURE TO PHYSICAL ADVERTISMENTS - In a system and method for monitoring exposure of people to physical advertisements, a computing device receives positional data records associated with each of a plurality of mobile devices within a given geographical region, from a base station, sets a mobility descriptor for each corresponding user, determines whether each user is predicted to be within a predetermined viewing range of one or more advertisements, in response to the set mobility descriptor, instantaneous speed and direction, and a predetermined viewing range, and counts the number of users who are predicted to be within the predetermined viewing range. | 05-28-2015 |
20150163638 | METHOD AND SYSTEM FOR TRACKING THE WHEREABOUTS OF PEOPLE IN URBAN SETTINGS - A method for tracking the whereabouts of people, particularly in urban settings, according to which a cell grid is established within a given geographical region and positional data records associated with each of a plurality of mobile devices within the region, are received from a base station. An Estimated Location Indicator (ELI) associated with a data object in each of every cell of the grid traversed by the corresponding user within a given period of time is generated, from the received positional data records and for each corresponding user of the plurality of mobile devices. A shortest predicted path is generated between each of the generated An Estimated Location Indicators. | 06-11-2015 |
20150178506 | METHOD AND SYSTEM FOR DATABASE ENCRYPTION - A method for encrypting a database, according to which a dedicated encryption module is placed inside a Database Management Software above a database cache. Each value of the database is encrypted together with the coordinates of said value using a dedicated encryption method, which assumes the existence of an internal cell identifier that can be queried but not tampered. | 06-25-2015 |
20150186902 | USING FINANCIAL VISUALIZATION ANALYSIS FOR GAINING INSIGHTS FROM CELLULAR SIGNALING AND DEVICE HOLDERS DATA - The invention is a system for analyzing and displaying results of the analyses of the large amounts of data related to the locations of the users of mobile communication devices available from the devices in a way that can be immediately useful as a decision making tool to a business by yielding actionable insights from the data. | 07-02-2015 |
20150326608 | SOCIAL NETWORK HONEYPOT - The invention is a method and system for detecting attackers that are interested in attacking an organization's infrastructure during the reconnaissance phase of an Advanced Persistent Threat (APT). APTs are very sophisticated attacks and incorporate advanced methods for evading current security mechanisms. Therefore, the present invention uses an innovative social network honeypot. | 11-12-2015 |
20150338232 | SYSTEM AND METHOD FOR PROVIDING GEOGRAPHICALLY BASED SOUND CUES TO A USER OF A MOBILE DEVICE - A method for providing geographically based sound cues to a user of a mobile device, each sound cue informs the user on a nearby point of interest. The method is an eight step process that has as its eighth step: sounding said sound cue at the right and left earphones of the device at respective levels that are based on said calculated right-left balance. | 11-26-2015 |