Issued Patents 2025
Showing 26–50 of 62 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12346340 | Search engine using self-supervised learning and predictive models for searches based on partial information | Amihai Savir, Oshry Ben Harush | 2025-07-01 |
| 12346789 | System and method for execution of inference models across multiple data processing systems | Avitan Gefen, Nadav Azaria | 2025-07-01 |
| 12339811 | Compressing multiple dimension files using sequence alignment | Ilan Buyum, Jehuda Shemer | 2025-06-24 |
| 12339949 | System and method for selecting security questions for device authentication based on security scores of data | Jehuda Shemer, Ronen Rabani | 2025-06-24 |
| 12332750 | Cyber recovery forensics kit—efficient event searching over pits | Jehuda Shemer, Amihai Savir | 2025-06-17 |
| 12333037 | On-demand operational airgap policy—value threshold | Jehuda Shemer, Amihai Savir | 2025-06-17 |
| 12326790 | Recovery by multi-cloud handoff | Jehuda Shemer, Amihai Savir | 2025-06-10 |
| 12326855 | Ensuring data consistency across multiple monitoring services | Ganesh Ghodake | 2025-06-10 |
| 12328336 | System and method for security management in distributed systems | Yehiel Zohar, Lee Serfaty | 2025-06-10 |
| 12323439 | System and method for device authentication in a distributed environment using a twin inference model | Jehuda Shemer, Ronen Rabani | 2025-06-03 |
| 12321498 | System and method for managing AI models using anomaly detection | Amihai Savir, Tomer Kushnir | 2025-06-03 |
| 12321488 | System and method for data access management using auxiliary devices | Naor Radami, Amos Zamir | 2025-06-03 |
| 12316684 | System and method for managing communication paths responsive to compromise events | Yehiel Zohar, Lee Serfaty | 2025-05-27 |
| 12306935 | System and method for detecting malicious attacks targeting artificial intelligence models | Amihai Savir, Tomer Kushnir | 2025-05-20 |
| 12306936 | System and method for management of inference models based on training data impact on model reversion | Tomer Kushnir, Amihai Savir | 2025-05-20 |
| 12301584 | System and method for security management in distributed systems | Yehiel Zohar, Lee Serfaty | 2025-05-13 |
| 12298895 | System and method for managing a data pipeline using a digital twin | Hanna Yehuda, Inga Sogaard | 2025-05-13 |
| 12299122 | System and method for memory-less anomaly detection using anomaly levels | Nadav Azaria, Avitan Gefen | 2025-05-13 |
| 12294591 | System and method for device authentication in a distributed environment without user intervention | Jehuda Shemer, Ronen Rabani | 2025-05-06 |
| 12288331 | System and method for procedural reconstruction of synthesized images | Amihai Savir, Avitan Gefen, Nicole Reineke | 2025-04-29 |
| 12282577 | Operating a data pipeline based on data privacy regulations | Hanna Yehuda, Inga Sogaard | 2025-04-22 |
| 12271274 | Application-centric cyber recovery | Jehuda Shemer, Amihai Savir | 2025-04-08 |
| 12254109 | System and method for data access management using encryption based on data sensitivity levels | Naor Radami, Amos Zamir | 2025-03-18 |
| 12253905 | System and method for remediating misalignment of a data pipeline using error messages | Hanna Yehuda, Kristen Jeanne Walsh | 2025-03-18 |
| 12248374 | Last resort access to backups stored in vaults | Yehiel Zohar, Lee Serfaty | 2025-03-11 |