YG

Yevgeni Gehtman

DP Dell Products: 27 patents #222 of 6,820Top 4%
EC Emc Ip Holding Company: 21 patents #174 of 4,608Top 4%
📍 Lod, IL: #5 of 320 inventorsTop 2%
Overall (All Time): #57,269 of 4,157,543Top 2%
48
Patents All Time

Issued Patents All Time

Showing 26–48 of 48 patents

Patent #TitleCo-InventorsDate
12124595 Detecting unauthorized encryptions in data storage systems Tomer Shachar, Maxim Balin 2024-10-22
12124722 Dynamic over-provisioning of storage devices Tomer Shachar, Ophir Buchman 2024-10-22
12074905 Systems and methods for detecting ransomware attacks on file sharing systems Tomer Shachar, Maxim Balin 2024-08-27
12039072 Data protection using encryption and inserted execution code Tomer Shachar, Maxim Balin 2024-07-16
12026374 Migration of data to maintain data resiliency Tomer Shachar, Arieh Don, Maxim Balin 2024-07-02
11977656 Multi-tenant data protection using tenant-based token validation and data encryption Tomer Shachar, Maxim Balin 2024-05-07
11909735 Multi-cloud framework for authentication of data requests Tomer Shachar, Maxim Balin 2024-02-20
11892870 Detection and mitigation of electromagnetic signal attacks Tomer Shachar, Maxim Balin 2024-02-06
11853417 Hardware device integrity validation using platform configuration values Maxim Balin, Tomer Shachar 2023-12-26
11836251 Malware detection using a machine learning model Or Herman-Saffar, Amihai Savir 2023-12-05
11822656 Detection of unauthorized encryption using deduplication efficiency metric Maxim Balin, Tomer Shachar 2023-11-21
11782611 Logical storage device access using device-specific keys in an encrypted storage environment Tomer Shachar, Arieh Don, Maxim Balin 2023-10-10
11693934 Device protection using configuration lockdown mode Tomer Shachar, Maxim Balin 2023-07-04
11681801 Malicious code purification in graphics files Maxim Futerman 2023-06-20
11496284 Detection of unauthorized encryption using key length evaluation Maxim Balin, Tomer Shachar 2022-11-08
11487862 Basic input/output system protection using multi-factor authentication based on digital identity values Tomer Shachar, Maxim Balin, Or Herman Saffar 2022-11-01
11461467 Detecting and mitigating malicious software code embedded in image files using machine learning techniques Or Herman Saffar, Amihai Savir 2022-10-04
11397810 Malicious code purification in the body of graphics files Maxim Futerman 2022-07-26
11397822 System and method of utilizing document security Tomer Shachar, Maxim Balin 2022-07-26
11361077 Kernel-based proactive engine for malware detection Or Herman Saffar 2022-06-14
11200316 System and method for malicious code purification of portable network graphics files Maxim Futerman 2021-12-14
10951651 Container life cycle management with retention rate adjustment based on detected anomalies Oron Golan, Raul Shnier, Amos Zamir, Aviram Fireberger 2021-03-16
10791144 Container life cycle management with honeypot service Oron Golan, Raul Shnier, Aviram Fireberger, Amos Zamir 2020-09-29