The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 12, 2022

Filed:

Apr. 23, 2019
Applicant:

Illusive Networks Ltd., Tel Aviv, IL;

Inventors:

Tom Sela, Tel Aviv, IL;

Tom Kahana, Gan Yavne, IL;

Dolev Ben-Shushan, Netanya, IL;

Hadar Yudovich, Givataim, IL;

Gabi Katz, Rishon Letzion, IL;

Tomer Shamul, Jerusalem, IL;

Gil Shulman, Ramat Gan, IL;

Matan Kubovsky, Tel Aviv, IL;

Lee Abe Teichner, Tel Aviv, IL;

Assignee:

ILLUSIVE NETWORKS LTD, Tel Aviv, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 12/24 (2006.01); H04L 41/12 (2022.01);
U.S. Cl.
CPC ...
H04L 63/145 (2013.01); H04L 41/12 (2013.01); H04L 63/0263 (2013.01); H04L 63/102 (2013.01); H04L 63/1416 (2013.01); H04L 63/20 (2013.01);
Abstract

A system for sanitizing an organization's network against attacker breach, including a data collector, gathering information about network hosts, an analyzer constructing the organization's network topology, a machine learning engine categorizing the hosts into organizational units and identifying key assets of the organization, a security rules engine mapping real-time data, and inferring security rules that prescribe on which specific hosts which specific credentials are permitted to be stored, and a user interface including an analyst dashboard enabling an analyst to visualize in real-time activities within the organizations' network, to automatically infer security rules for the network, to activate the security rules in the network, and to eliminate potential attack vectors for which the activated security rules are violated, and an attacker view visualizing the organization's network, identifying security rule violations across the organization's network, and enabling removal of credential-based security rule violations by use of actions.


Find Patent Forward Citations

Loading…