{"id":172,"date":"2018-03-15T10:23:48","date_gmt":"2018-03-15T10:23:48","guid":{"rendered":"http:\/\/132.72.80.218\/wp\/?page_id=172"},"modified":"2025-01-26T14:26:13","modified_gmt":"2025-01-26T12:26:13","slug":"patents","status":"publish","type":"page","link":"https:\/\/cyber.bgu.ac.il\/yuval\/patents\/","title":{"rendered":"Patents"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"172\" class=\"elementor elementor-172\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f104e5e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f104e5e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-312060c7\" data-id=\"312060c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d4b3dc2 elementor-widget elementor-widget-heading\" data-id=\"3d4b3dc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">Patents<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb541e4 elementor-widget elementor-widget-text-editor\" data-id=\"eb541e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Title:<\/strong> US 7841503 B2 Endoscopic device comprising linear staplers and a video camera on its distal end.<\/li><\/ol><p><strong>Inventors:<\/strong> Elazar Sonnenschein, Amir Govrin, Yoav Avidor, <strong>Yuval Elovici<\/strong>, Minelu Sonnenschein<\/p><ol start=\"2\"><li><strong>Title:<\/strong> US 7941853 B2 Distributed system and method for the detection of eThreats.<\/li><\/ol><p><strong>Inventors:<\/strong> Boris Rozenberg, Ehud Gudes, <strong>Yuval Elovici<\/strong><\/p><ol start=\"3\"><li><strong>Title:<\/strong> US 7941851 B2 Architecture for identifying electronic threat patterns.<\/li><\/ol><p><strong>Inventors:<\/strong> Yuval Shahar, Asaf Shabtai, Gil Tahan, <strong>Yuval Elovici<\/strong><\/p><ol start=\"4\"><li><strong>Title:<\/strong> US 8171554 B2 System that provides early detection, alert, and response to electronic threats.<\/li><\/ol><p><strong>Inventors: Yuval Elovici<\/strong>, Gil Tachan, Asaf Shabtai<\/p><ol start=\"5\"><li><strong>Title:<\/strong> US 8244652 B2 Stacking Schema for Classification Tasks.<\/li><\/ol><p><strong>Inventors: <\/strong>Eitan Menahem, Lior Rokach,<strong> Yuval Elovici<\/strong><\/p><ol start=\"6\"><li><strong>Title:<\/strong> EP1959367 B1 Automatic extraction of signatures for Malware.<\/li><\/ol><p><strong>Inventors: Yuval Elovici<\/strong>, Asaf Shabtai, Gil Tahan<\/p><ol start=\"7\"><li><strong>Title:<\/strong> US 8332944 System and method for detecting new malicious executable, based on discovering and monitoring characteristic system call sequences.<\/li><\/ol><p><strong>Inventors: <\/strong>Boris Rozenberg, Ehud Gudes,<strong> Yuval Elovici<\/strong><\/p><ol start=\"8\"><li><strong>Title:<\/strong> US 8353040 B2 Automatic extraction of signatures for malware.<\/li><\/ol><p><strong>Inventors: <\/strong>Gil Tahan<strong>, <\/strong>Asaf Shabtai, <strong>Yuval Elovici<\/strong><\/p><ol start=\"9\"><li><strong>Title:<\/strong> EP 1887754 B1 A System that provides early detection, alert, and response to electronic threats.<\/li><\/ol><p><strong>Inventors: Yuval Elovici<\/strong>, Gil Tahan, Asaf Shabtai<\/p><ol start=\"10\"><li><strong>Title:<\/strong> US 8490194 B2 Method and system for detecting malicious behavioral patterns in a computer, using machine learning.<\/li><\/ol><p><strong>Inventors: <\/strong>Robert Moskovitch, Dima Stopel, Zvi Boger, Yuval Shahar, <strong>Yuval Elovici<\/strong><\/p><ol start=\"11\"><li><strong>Title:<\/strong> US 8463404 B2 Electrode assemblies, tools, and methods for gastric wall implantation.<\/li><\/ol><p><strong>Inventors: <\/strong>Tamir Levi, Paul Spehr, Offer Glasberg, Tami Harel, Lena Milman, Benny Rousso, Elazar Sonnenschein, <strong>Yuval Elovici<\/strong>, Minelu Sonnenschein, Amir Govrin<\/p><ol start=\"12\"><li><strong>Title:<\/strong> EP 2228743 B1 Method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences.<\/li><\/ol><p><strong>Inventors: <\/strong>Boris Rozenberg, Ehud Gudes,<strong> Yuval Elovici<\/strong><\/p><ol start=\"13\"><li><strong>Title:<\/strong> EP 1887744 B1 Method for finding the most prominent group of vertices in complex data communication networks.<\/li><\/ol><p><strong>Inventors: <\/strong>Rami Puzis, <strong>Yuval Elovici<\/strong>, Shlomi Dolev<\/p><ol start=\"14\"><li><strong>Title:<\/strong> US 8516584 B2 Method and system for detecting malicious behavioral patterns in a computer, using machine learning.<\/li><\/ol><p><strong>Inventors: <\/strong>Robert Moskovitch, Dima Stopel, Zvi Boger, Yuval Shahar, <strong>Yuval Elovici<\/strong><\/p><ol start=\"15\"><li><strong>Title:<\/strong> US 8776231 B2 Unknown malcode detection using classifiers with optimal training sets.<\/li><\/ol><p><strong>Inventors: <\/strong>Robert Moskovitch, <strong>Yuval Elovici<\/strong><\/p><ol start=\"16\"><li><strong>Title:<\/strong> EP 1755437 B1 Multipurpose endoscopy suite.<\/li><\/ol><p><strong>Inventors: <\/strong>Elazar Sonnenschein, <strong>Yuval Elovici<\/strong>, Minelu Sonnenschein<\/p><ol start=\"17\"><li><strong>Title:<\/strong> US 8678994 B2 Devices and methods for treating morbid obesity.<\/li><\/ol><p><strong>Inventors: <\/strong>Elazar Sonnenschein, Amir Govrin, Yoav Avidor<strong>, Yuval Elovici<\/strong>, Minelu Sonnenschein<\/p><ol start=\"18\"><li><strong>Title:<\/strong> US 8639947 B2 Structure preserving database encryption method and system.<\/li><\/ol><p><strong>Inventors: Yuval Elovici<\/strong>, Ronen Waisenberg, Erez Shmueli<\/p><ol start=\"19\"><li><strong>Title:<\/strong> EP 1995929 B1 Syst\u00e8me distribu\u00e9 pour la d\u00e9tection de menaces \u00e9lectroniques.<\/li><\/ol><p><strong>Inventors: <\/strong>Boris Rozenberg, Ehud Gudes, <strong>Yuval Elovici<\/strong><\/p><ol start=\"20\"><li><strong>Title<\/strong>: US 9369476 B2 System for detection of mobile applications network behavior- netwise<\/li><\/ol><p><strong>Inventors:<\/strong> Lena Chekina, Bracha Shapira, Dudu Mimran, <strong>Yuval Elovici<\/strong>, Christoph Peylo<\/p><ol start=\"21\"><li><strong>Title<\/strong>: EP 1990973 B1 Deployment of distributed network intrusion detection systems in social networks\u00a0<\/li><\/ol><p><strong>Inventors<\/strong>: Meital Tubi, Rami Puzis, <strong>Yuval Elovici<\/strong><\/p><ol start=\"22\"><li><strong>Title<\/strong>: EP 1814055 B1 Improved method system for detecting malicious behavioral patterns in a computer using machine learning.<\/li><\/ol><p><strong>Inventors<\/strong>: Robert Moskovitch, Dima Stopel, Zvi Boger, Yuval Shahar, <strong>Yuval Elovici<\/strong><\/p><ol start=\"23\"><li><strong>Title<\/strong>: EP 2833604 B1 System for analyzing mobile telephone users locations and classifications, while maintaining users privacy constraints\u00a0<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici<\/strong>, Dudu Mimran, Barak Chizi, Pavel Ackerman, Moshe Bixenspaner<\/p><ol start=\"24\"><li><strong>Title:<\/strong> EP 2871869 B1 An accurate mechanism for estimating a mobile communication service provider&#8217;s market share<\/li><\/ol><p><strong>Investors:<\/strong> Barak Chizi, <strong>Yuval Elovici<\/strong>, David Mimran, Lior Rokach<\/p><ol start=\"25\"><li><strong>Title<\/strong>: US 9509716 B2 Social network honeypot<\/li><\/ol><p><strong>Inventors<\/strong>: Asaf Shabtai, Rami Puzis, <strong>Yuval Elovici<\/strong><\/p><ol start=\"26\"><li><strong>Title: <\/strong>US 9420427 B2 Method and system for tracking the whereabouts of people in urban settings<\/li><\/ol><p><strong>Inventors: <\/strong>\u00a0Barak Chizi, Dudu Mimran, <strong>Yuval Elovici<\/strong>, Alex Binon<\/p><ol start=\"27\"><li><strong>Title<\/strong>: EP 2447808 B1 Apparatus for operating a computer using thoughts or facial impressions<\/li><\/ol><p><strong>Inventors<\/strong>: Rami Puzis, Ory Ossmy, Ofir Tam, Ariel Rozen, <strong>Yuval Elovici<\/strong><\/p><ol start=\"28\"><li><strong>Title<\/strong>: CA 2568435 C Multipurpose endoscopy suite<\/li><\/ol><p><strong>Inventors<\/strong>: Elazar Sonnenschein, <strong>Yuval Elovici<\/strong>, Minelu Sonneschein<\/p><ol start=\"29\"><li><strong>Title<\/strong>: US 8332944 B2 System and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences.<\/li><\/ol><p><strong>Inventors<\/strong>: Boris Rozenberg, Ehud Gudes, <strong>Yuval Elovici<\/strong><\/p><ol start=\"30\"><li><strong>Title<\/strong>: US 9659185 B2 Method for detecting spammers and fake profiles in social networks<\/li><\/ol><p><strong>Inventors: <\/strong>Gilad Katz, Micael Fire, <strong>Yuval Elovici<\/strong><\/p><ol start=\"31\"><li><strong>Title<\/strong>: US 9646245 B2 System and method for identifying contacts of a target user in a social network<\/li><\/ol><p><strong>Inventors: <\/strong>Rami Puzis, Roni Stern, Lior Rokach, Tal Beja, Ariel Felner, Zahy Bnaya, Liron Samama, <strong>Yuval Elovici<\/strong><\/p><ol start=\"32\"><li><strong>Title<\/strong>: US 9703954 B2 Method and system for protecting computerized systems from malicious code<\/li><\/ol><p><strong>Inventors<\/strong>: Mordechai Guri, Gabi Kedma, <strong>Yuval Elovici<\/strong><\/p><ol start=\"33\"><li><strong>Title<\/strong>: EP 2477136B1 Method for continuously verifying user identity via keystroke dynamics<\/li><\/ol><p><strong>Inventors<\/strong>: Tomer Shimshon, Robert Moskovitch, Lior Rokach, <strong>Yuval Elovici<\/strong><\/p><ol start=\"34\"><li><strong>Title<\/strong>: US 9934337 B2 Flexible and scalable simulations of mass participants in real time<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici<\/strong>, Dudu Mimran, Barak Chizi, Moshe Bixenspaner, Tomer Zrihen<\/p><ol start=\"35\"><li><strong>Title<\/strong>: EP 2942919 A1 Social network honeypot<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici<\/strong>, Rami Puzis, Asaf Shabtai<\/p><ol start=\"36\"><li><strong>Title<\/strong>: EP 2571225 B1 A method for detecting data misuse in an organization&#8217;s network<\/li><\/ol><p><strong>Inventors<\/strong>: Asaf Shabtai<strong>, <\/strong>Ma&#8217;ayan Gafny, Lior Rokach, <strong>Yuval Elovici<\/strong><\/p><ol start=\"37\"><li><strong>Title<\/strong>:\u00a0 EP 2570959 B1 A method of estimating the potential damage of data leakage incident by assigning misuseability weight<\/li><\/ol><p><strong>Inventors<\/strong>: Amir Harel, Asaf Shabtai, Lior Rokach, <strong>Yuval Elovici<\/strong><\/p><ol start=\"38\"><li><strong>Title<\/strong>: EP 2946330 B1 Method and system for protecting comtuterizad systems from malicious code<\/li><\/ol><p><strong>Inventors<\/strong>: Mordehai Guri, <strong>Yuval Elovici, <\/strong>Gabi Kedma<\/p><ol start=\"39\"><li><strong>Title<\/strong>: US 9609483 B2 System for characterizing geographical locations based on multi sensors anonymous data sources<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici, <\/strong><a href=\"https:\/\/patents.google.com\/?inventor=Dudu+MIMRAN&amp;sort=old\">Dudu Mimran<\/a>, <a href=\"https:\/\/patents.google.com\/patent\/US9609483B2\/en?inventor=elovici&amp;status=GRANT&amp;type=PATENT&amp;sort=old&amp;page=2\">Bark Chizi<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=Alexander+BINUN&amp;sort=old\">Alexander Binun<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=Moshe+BIXENSPANER&amp;sort=old\">Moshe\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bixenspaner<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=Pavel+ACKERMAN&amp;sort=old\">Pavel Ackerman<\/a><\/p><ol start=\"40\"><li><strong>Title: <\/strong>EP 2892206 B1 System and method for push framework security<\/li><\/ol><p><strong>Inventors: <\/strong>Ran Yahalom, <a href=\"https:\/\/patents.google.com\/?inventor=Yuri+Poliak&amp;sort=old\">Yuri Poliak<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=David+Mimran&amp;sort=old\">David Mimran<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=Bracha+Shapira&amp;sort=old\">Bracha Shapira<\/a>, <a href=\"https:\/\/patents.google.com\/?inventor=Yuval+Elovici&amp;sort=old\"><strong>Yuval Elovici<\/strong><\/a>, Christoph Peylo.<\/p><ol start=\"41\"><li><strong>Title<\/strong>: US 9934388 B2 Method and system for database encryption<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici<\/strong>, Ronen Vaisenberg, Erez Shmueli.<\/p><ol start=\"42\"><li><strong>Title<\/strong>: EP 2919448 B1 A method for creating a collection of sound signatures for identifying objects<\/li><\/ol><p><strong>Inventors<\/strong>: <strong>Yuval Elovici<\/strong>, Bracha Shapira, Barak Chizi, Dudu Mimran<\/p><ol start=\"43\"><li><strong>Title<\/strong>: US 10192057 B2 Misuseability analysis for it infrastructure<\/li><\/ol><p><strong>Inventors<\/strong>: Asaf Shabtai, <strong>Yuval Elovici<\/strong><\/p><ol start=\"44\"><li><strong>Title<\/strong>: US 10192057 B2 Misuseability analysis for it infrastructure<\/li><\/ol><p><strong>Inventors<\/strong>: Asaf Shabtai, <strong>Yuval Elovici<\/strong><\/p><ol start=\"45\"><li><strong>Title<\/strong>: US 10091220 B2 Platform for protecting small and medium enterprises from cyber security threats<\/li><\/ol><p><strong>Inventors<\/strong>: Asaf Shabtai, <strong>Yuval Elovici<\/strong>, Christoph Peylo, Barak Chizi, Barak Zacharish, David Mimran, Tobias Glemser<\/p><ol start=\"46\"><li><strong>Title<\/strong>: EP3543887 B1 Incentivized delivery network of iot software updates based on trustless proof of distribution<\/li><\/ol><p><strong>Inventors<\/strong>: Oded Leiba, Ron Bitton Asaf Shabtai, <strong>Yuval Elovici<\/strong>, Oleg Brodt, David Mimran, Asaf Nadler, Yechiav Yzhak<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Patents Title: US 7841503 B2 Endoscopic device comprising linear staplers and a video camera on its distal end. Inventors: Elazar Sonnenschein, Amir Govrin, Yoav Avidor, Yuval Elovici, Minelu Sonnenschein Title: US 7941853 B2 Distributed system and method for the detection of eThreats. Inventors: Boris Rozenberg, Ehud Gudes, Yuval Elovici Title: US 7941851 B2 Architecture for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-172","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/comments?post=172"}],"version-history":[{"count":26,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/172\/revisions"}],"predecessor-version":[{"id":621,"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/pages\/172\/revisions\/621"}],"wp:attachment":[{"href":"https:\/\/cyber.bgu.ac.il\/yuval\/wp-json\/wp\/v2\/media?parent=172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}