| 7636943 |
Method and system for detecting blocking and removing spyware |
Shimon Gruper, Yanki Margalit |
2009-12-22 |
| 7603614 |
Method and system for indicating an executable as trojan horse |
Oded Cohen, Yanki Margalit |
2009-10-13 |
| 7386884 |
Method for preventing activation of malicious objects |
Oded Cohen, Yanki Margalit |
2008-06-10 |
| 7249266 |
User-computer interaction method for use by a population of flexible connectable computer systems |
Yanki Margalit |
2007-07-24 |
| 7065650 |
Method for indicating the integrity of a collection of digital objects |
Michael Collins, Edna Cahanovitc, Yanki Margalit |
2006-06-20 |
| 7013483 |
Method for emulating an executable code in order to detect maliciousness |
Oded Cohen, Inbal Meir, Yanki Margalit |
2006-03-14 |
| 6898555 |
Method for indicating the integrity of use-information of a computer program |
Asaf Levi, Ron Darziv, Yanki Margalit |
2005-05-24 |
| 6763399 |
USB key apparatus for interacting with a USB host via a USB port |
Yanki Margalit, Rami Kastershtien |
2004-07-13 |
| 6748541 |
User-computer interaction method for use by a population of flexibly connectable computer systems |
Yanki Margalit |
2004-06-08 |
| 6554621 |
Cable apparatus |
Yanki Margalit |
2003-04-29 |