Beer Yaakov, Israel

Avraham Kama


Average Co-Inventor Count = 3.0

ph-index = 1


Company Filing History:


Years Active: 2022

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Avraham Kama: Innovator in Network Security

Introduction

Avraham Kama is a notable inventor based in Beer Yaakov, Israel. He has made significant contributions to the field of network security, particularly through his innovative patent related to authentication request verification.

Latest Patents

Kama holds a patent for a method titled "Network-based NT LAN manager (NTLM) relay attack detection and prevention." This invention provides a method for verifying an authentication request to a computer network. The process includes receiving a network packet and extracting an authentication request from it. The authentication request may be encrypted to store attribute-value pairs, and the method further involves decrypting the authentication request to access these pairs. Additionally, the method extracts a target name and a device name from the attribute-value pairs, determining whether the target name refers to the identified target device indicated by the device name. This patent showcases Kama's expertise in enhancing network security protocols.

Career Highlights

Avraham Kama is currently employed at CrowdStrike, Inc., a leading cybersecurity company. His work focuses on developing advanced security measures to protect networks from potential threats. With a patent portfolio that includes 1 patent, Kama has established himself as a key player in the field of network security.

Collaborations

Kama collaborates with talented professionals in his field, including Yaron Zinar and Marina Simakov. These partnerships enhance the innovative efforts at CrowdStrike, Inc., contributing to the development of cutting-edge security solutions.

Conclusion

Avraham Kama's contributions to network security through his patent and work at CrowdStrike, Inc. highlight his role as an influential inventor in the technology sector. His innovative methods for authentication request verification are vital in the ongoing battle against cyber threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…