Issued Patents All Time
Showing 25 most recent of 75 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12348556 | Techniques for protecting against excessive utilization of cloud services | Ehud Doron, Nir Ilani, Yotam Ben Ezra, Amit Bismut | 2025-07-01 |
| 12289341 | Techniques for generating signatures characterizing advanced application layer flood attack tools | Ehud Doron, Koral Haham | 2025-04-29 |
| 12199984 | Blockchain-based admission processes for protected entities | Alon Lelcuk | 2025-01-14 |
| 12184690 | Characterization of HTTP flood DDoS attacks | Ehud Doron, Koral Haham | 2024-12-31 |
| 12185044 | Sampler for an intelligent cable or cable adapter | Bobby Elijah Aviv, Mark Schaffel, Guy Zohar | 2024-12-31 |
| 12030645 | Programmable automated linear sitting using an intelligent portable body-seat cushion | Bobby Elijah Aviv, Mark Schaffel, Rena Aviv | 2024-07-09 |
| 12003531 | Quantile regression analysis method for detecting cyber attacks | Lev Medvedovsky | 2024-06-04 |
| 11997206 | Techniques for protecting web-access | Alon TAMIR, Amir MARMOR | 2024-05-28 |
| 11991205 | Detection and mitigation of slow application layer DDoS attacks | Ehud Doron, Nir Ilani, Yotam Ben Ezra, Amit Bismut, Yuriy Arbitman | 2024-05-21 |
| 11985116 | Method and system for blockchain based cyber protection of network entities | Alon Lelcuk | 2024-05-14 |
| 11979407 | Method and system for blockchain-based anti-bot protection | Alon Lelcuk | 2024-05-07 |
| 11943224 | Blockchain-based admission processes for protected entities | Alon Lelcuk | 2024-03-26 |
| 11916956 | Techniques for generating signatures characterizing advanced application layer flood attack tools | Ehud Doron, Koral Haham | 2024-02-27 |
| 11888893 | Characterization of HTTP flood DDoS attacks | Ehud Doron, Koral Haham | 2024-01-30 |
| 11758311 | External controller for an intelligent cable or cable adapter | Bobby Elijah Aviv, Mark Schaffel, Guy Zohar | 2023-09-12 |
| 11750632 | Method and system for detecting and mitigating HTTPS flood attacks | Ehud Doron, Lev Medvedovsky, Eyal Rundstein, Ronit Lubitch Greenberg, Avishay Balderman | 2023-09-05 |
| 11677753 | Method and system for anti-bot protection | Alon Lelcuk | 2023-06-13 |
| 11652843 | Quantile regression analysis method for detecting cyber attacks | Lev Medvedovsky | 2023-05-16 |
| 11632391 | System and method for out of path DDoS attack detection | Ehud Doron, Yotam Ben Ezra | 2023-04-18 |
| 11606387 | Techniques for reducing the time to mitigate of DDoS attacks | Ehud Doron, Yotam Ben Ezra | 2023-03-14 |
| 11582259 | Characterization of HTTP flood DDoS attacks | Ehud Doron, Koral Haham | 2023-02-14 |
| 11563772 | Detection and mitigation DDoS attacks performed over QUIC communication protocol | Ehud Doron, Eyal Rundstein, Lev Medvedovsky | 2023-01-24 |
| 11552989 | Techniques for generating signatures characterizing advanced application layer flood attack tools | Ehud Doron, Koral Haham | 2023-01-10 |
| 11539739 | Detection and mitigation of flood type DDoS attacks against cloud-hosted applications | Ehud Doron, Nir Ilani, Yotam Ben Ezra, Amit Bismut, Yuriy Arbitman | 2022-12-27 |
| 11530045 | Programmable automated linear sitting using an intelligent portable body-seat cushion | Bobby Elijah Aviv, Mark Schaffel, Rena Aviv | 2022-12-20 |