YG

Yevgeni Gehtman

DP Dell Products: 27 patents #222 of 6,820Top 4%
EC Emc Ip Holding Company: 21 patents #174 of 4,608Top 4%
📍 Lod, IL: #5 of 320 inventorsTop 2%
Overall (All Time): #57,269 of 4,157,543Top 2%
48
Patents All Time

Issued Patents All Time

Showing 1–25 of 48 patents

Patent #TitleCo-InventorsDate
12430457 Reversing symmetric encryptions using keys found in snapshots—per-file keys, random and transmitted outside Ofir Ezrielev, Yehiel Zohar, Tomer Shachar, Maxim Balin 2025-09-30
12423424 Analyzing file entropy to identify adverse conditions Tomer Shachar, Maxim Balin 2025-09-23
12393741 Bios-based device protection using detection and mitigation of modifications to a protected storage region Tomer Shachar, Ophir Buchman 2025-08-19
12386539 Data storage through offloading signature computations Tomer Shachar, Arieh Don 2025-08-12
12381912 Vault overwriting after PLC (protection lifecycle) designation disallowance by transmission to public vault Ofir Ezrielev, Yehiel Zohar, Tomer Shachar, Maxim Balin 2025-08-05
12366978 Mapping storage objects to storage controllers using digital twins Tomer Shachar, Ophir Buchman 2025-07-22
12367274 Verification and/or validation of unreversible information handling system commands Maxim Balin, Tomer Shachar 2025-07-22
12348374 Container based limit enforcement Tomer Shachar, Ophir Buchman 2025-07-01
12335295 System and method for management of system vulnerabilities Tomer Shachar, Maxim Balin 2025-06-17
12298919 Bit level sharding of sensitive data for increased security Thomas L. Watson, Tomer Shachar, Maxim Balin, Arieh Don 2025-05-13
12287875 Device protection against unauthorized encryption using population of available storage Tomer Shachar, Ophir Buchman 2025-04-29
12282551 Detection of anomalous backup files using known anomalous file fingerprints Tomer Shachar, Maxim Balin 2025-04-22
12265623 Firmware protection using multi-chip storage of firmware image Tomer Shachar, Maxim Balin, Or Herman Saffar 2025-04-01
12265611 System and method for monitoring and detecting of encryption based threats Tomer Shachar, Maxim Balin 2025-04-01
12250219 Preventing malicious processes by validating the command authority of commands between network equipment Tomer Shachar, Maxim Balin, Arieh Don 2025-03-11
12238225 Unauthorized communication detection in hybrid cloud Tomer Shachar, Maxim Balin 2025-02-25
12229326 Multi-cloud framework for data protection using threshold-based file reconstruction Tomer Shachar, Maxim Balin, Boris Giterman 2025-02-18
12229301 Access control of protected data using storage system-based multi-factor authentication Maxim Balin, Tomer Shachar 2025-02-18
12216805 Monitoring file sharing commands between network equipment to identify adverse conditions Maxim Balin, Tomer Shachar 2025-02-04
12212656 Remote replication with host encryption Arieh Don, Tomer Shachar, Maxim Balin 2025-01-28
12182277 Monitoring file sharing commands between network equipment to identify adverse conditions Tomer Shachar, Maxim Balin 2024-12-31
12174720 System and method for managing data structure locking based security threats Tomer Shachar, Maxim Balin 2024-12-24
12147524 Hardware system protection using verification of hardware digital identity values Maxim Balin, Tomer Shachar 2024-11-19
12147509 System protection using verification of software digital identity values Tomer Shachar, Maxim Balin 2024-11-19
12143894 Monitoring tool for detecting violations of user physical location constraints Tomer Shachar, Maxim Balin 2024-11-12