Issued Patents All Time
Showing 1–25 of 48 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12430457 | Reversing symmetric encryptions using keys found in snapshots—per-file keys, random and transmitted outside | Ofir Ezrielev, Yehiel Zohar, Tomer Shachar, Maxim Balin | 2025-09-30 |
| 12423424 | Analyzing file entropy to identify adverse conditions | Tomer Shachar, Maxim Balin | 2025-09-23 |
| 12393741 | Bios-based device protection using detection and mitigation of modifications to a protected storage region | Tomer Shachar, Ophir Buchman | 2025-08-19 |
| 12386539 | Data storage through offloading signature computations | Tomer Shachar, Arieh Don | 2025-08-12 |
| 12381912 | Vault overwriting after PLC (protection lifecycle) designation disallowance by transmission to public vault | Ofir Ezrielev, Yehiel Zohar, Tomer Shachar, Maxim Balin | 2025-08-05 |
| 12366978 | Mapping storage objects to storage controllers using digital twins | Tomer Shachar, Ophir Buchman | 2025-07-22 |
| 12367274 | Verification and/or validation of unreversible information handling system commands | Maxim Balin, Tomer Shachar | 2025-07-22 |
| 12348374 | Container based limit enforcement | Tomer Shachar, Ophir Buchman | 2025-07-01 |
| 12335295 | System and method for management of system vulnerabilities | Tomer Shachar, Maxim Balin | 2025-06-17 |
| 12298919 | Bit level sharding of sensitive data for increased security | Thomas L. Watson, Tomer Shachar, Maxim Balin, Arieh Don | 2025-05-13 |
| 12287875 | Device protection against unauthorized encryption using population of available storage | Tomer Shachar, Ophir Buchman | 2025-04-29 |
| 12282551 | Detection of anomalous backup files using known anomalous file fingerprints | Tomer Shachar, Maxim Balin | 2025-04-22 |
| 12265623 | Firmware protection using multi-chip storage of firmware image | Tomer Shachar, Maxim Balin, Or Herman Saffar | 2025-04-01 |
| 12265611 | System and method for monitoring and detecting of encryption based threats | Tomer Shachar, Maxim Balin | 2025-04-01 |
| 12250219 | Preventing malicious processes by validating the command authority of commands between network equipment | Tomer Shachar, Maxim Balin, Arieh Don | 2025-03-11 |
| 12238225 | Unauthorized communication detection in hybrid cloud | Tomer Shachar, Maxim Balin | 2025-02-25 |
| 12229326 | Multi-cloud framework for data protection using threshold-based file reconstruction | Tomer Shachar, Maxim Balin, Boris Giterman | 2025-02-18 |
| 12229301 | Access control of protected data using storage system-based multi-factor authentication | Maxim Balin, Tomer Shachar | 2025-02-18 |
| 12216805 | Monitoring file sharing commands between network equipment to identify adverse conditions | Maxim Balin, Tomer Shachar | 2025-02-04 |
| 12212656 | Remote replication with host encryption | Arieh Don, Tomer Shachar, Maxim Balin | 2025-01-28 |
| 12182277 | Monitoring file sharing commands between network equipment to identify adverse conditions | Tomer Shachar, Maxim Balin | 2024-12-31 |
| 12174720 | System and method for managing data structure locking based security threats | Tomer Shachar, Maxim Balin | 2024-12-24 |
| 12147524 | Hardware system protection using verification of hardware digital identity values | Maxim Balin, Tomer Shachar | 2024-11-19 |
| 12147509 | System protection using verification of software digital identity values | Tomer Shachar, Maxim Balin | 2024-11-19 |
| 12143894 | Monitoring tool for detecting violations of user physical location constraints | Tomer Shachar, Maxim Balin | 2024-11-12 |