Haifa, Israel

Orit Edelstein


Average Co-Inventor Count = 4.7

ph-index = 2

Forward Citations = 50(Granted Patents)


Company Filing History:


Years Active: 1998-2022

where 'Filed Patents' based on already Granted Patents

4 patents (USPTO):

Title: Orit Edelstein: Innovator in Cybersecurity and Transaction Authentication

Introduction

Orit Edelstein is a prominent inventor based in Haifa, Israel. She has made significant contributions to the fields of cybersecurity and transaction authentication. With a total of 4 patents, her work focuses on enhancing security measures in technology.

Latest Patents

Edelstein's latest patents include groundbreaking innovations such as "Automatic malware signature generation for threat detection systems." This patent describes a method for deriving malware signatures by training a binary decision tree using known malware and benign software samples. Each tree node represents a different software feature set, allowing for the identification of malware through a sophisticated analysis of software characteristics. Another notable patent is "Transaction authentication based on metadata." This invention outlines a system for authenticating transactions by utilizing metadata from a user's mobile device, including call history and transaction information from a remote server. The system generates an authentication score to authorize transactions based on this data.

Career Highlights

Orit Edelstein is currently employed at International Business Machines Corporation (IBM), where she continues to innovate in her field. Her work has been instrumental in developing advanced security solutions that address contemporary challenges in technology.

Collaborations

Edelstein has collaborated with notable colleagues, including Roy N Bar-Haim and Edward Curtis Prosser, contributing to a dynamic and innovative work environment.

Conclusion

Orit Edelstein's contributions to cybersecurity and transaction authentication exemplify her commitment to innovation and excellence. Her patents reflect a deep understanding of technology and its implications for security in the digital age.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…