| 7773753 |
Efficient remotely-keyed symmetric cryptography for digital rights management |
Michael Zunke, Dani Margalit |
2010-08-10 |
| 7636943 |
Method and system for detecting blocking and removing spyware |
Shimon Gruper, Dany Margalit |
2009-12-22 |
| 7603614 |
Method and system for indicating an executable as trojan horse |
Oded Cohen, Dany Margalit |
2009-10-13 |
| 7386884 |
Method for preventing activation of malicious objects |
Oded Cohen, Dany Margalit |
2008-06-10 |
| D561184 |
Security and flash memory apparatus |
Ron Kozenitzky |
2008-02-05 |
| 7249266 |
User-computer interaction method for use by a population of flexible connectable computer systems |
Dany Margalit |
2007-07-24 |
| 7065650 |
Method for indicating the integrity of a collection of digital objects |
Michael Collins, Edna Cahanovitc, Dany Margalit |
2006-06-20 |
| 7013483 |
Method for emulating an executable code in order to detect maliciousness |
Oded Cohen, Inbal Meir, Dany Margalit |
2006-03-14 |
| 6898555 |
Method for indicating the integrity of use-information of a computer program |
Asaf Levi, Ron Darziv, Dany Margalit |
2005-05-24 |
| 6763399 |
USB key apparatus for interacting with a USB host via a USB port |
Dany Margalit, Rami Kastershtien |
2004-07-13 |
| 6748541 |
User-computer interaction method for use by a population of flexibly connectable computer systems |
Dany Margalit |
2004-06-08 |
| 6554621 |
Cable apparatus |
Dany Margalit |
2003-04-29 |
| 5359495 |
Printed circuit board having a cutout |
Danny MARGALIT |
1994-10-25 |