About
Technology Executive with 20+ years of experience in product management, software design…
Articles by Leon
Activity
-
https://lnkd.in/gDKYn5j5
https://lnkd.in/gDKYn5j5
Shared by Leon Kuperman
-
https://lnkd.in/gjiDSAku
https://lnkd.in/gjiDSAku
Shared by Leon Kuperman
-
Great to see CAST AI featured alongside CoreWeave, Operant AI, Prosimo.io, Pulumi, Spectro Cloud, Tackle.io, Upbound, and Wiz. The future is bright…
Great to see CAST AI featured alongside CoreWeave, Operant AI, Prosimo.io, Pulumi, Spectro Cloud, Tackle.io, Upbound, and Wiz. The future is bright…
Liked by Leon Kuperman
Experience
Education
Licenses & Certifications
Publications
-
The Art of Cyber War – Sun Tzu's Wisdom Still Applies 2,500 Years Later
Benzinga
A look into the "Art of War" by Sun Tzu and how many of the concepts apply to modern Cyber-Security.
-
From the streets to The Street
TechCrunch
This is an article that talks about terrorist organizations such as ISIS and their ability and willingness to launch cyber attacks.
Patents
-
Detecting human activity to mitigate attacks on a host
Issued US 10735382
A system detects human activity through browser canvas events to mitigate the effects of an attack on a host, such as an application layer (layer 7) DDoS attack. A proxy, such as a HTTP/HTTPS “HTTP(S)” proxy server, configured to handle network traffic between a host and clients challenges clients engaging the host. The proxy challenges the clients by injecting code having a beacon and a shared encryption key into the content received from the host prior to transmission of the client. The code,…
A system detects human activity through browser canvas events to mitigate the effects of an attack on a host, such as an application layer (layer 7) DDoS attack. A proxy, such as a HTTP/HTTPS “HTTP(S)” proxy server, configured to handle network traffic between a host and clients challenges clients engaging the host. The proxy challenges the clients by injecting code having a beacon and a shared encryption key into the content received from the host prior to transmission of the client. The code, when executed by the client, is configured to monitor user interactions (or lack thereof) with the content at the client in order to determine whether there is human activity at the client. The proxy receives and analyzes the information about interactions (or lack thereof) to determine whether a client is malicious (e.g., non-human activity) or non-malicious (e.g., human activity).
Other inventorsSee patent -
Analyzing web application behavior to detect malicious requests
Issued US 10652254
A system is configured for protecting web applications at a host by analyzing web application behavior to detect malicious client requests. Example embodiments described herein include a proxy configured to handle network traffic between a host and clients. The proxy includes two request classification mechanisms, first a list of known clients, malicious and non-malicious, for identifying known malicious and known non-malicious requests and second a web application firewall for determining a…
A system is configured for protecting web applications at a host by analyzing web application behavior to detect malicious client requests. Example embodiments described herein include a proxy configured to handle network traffic between a host and clients. The proxy includes two request classification mechanisms, first a list of known clients, malicious and non-malicious, for identifying known malicious and known non-malicious requests and second a web application firewall for determining a classification for unknown requests (e.g., not originating from a known client). The classification itself may be distributed. The proxy determines whether a request is known non-malicious, known malicious, or unknown. The proxy collects request attributes for the known malicious and known non-malicious requests for the generation of a model based on the attributes of the known requests. The proxy passes the unknown requests to the WAF for determining a classification based on their attributes using the model.
-
Qualifying client behavior to mitigate attacks on a host
Issued US 10623376
A system (and method, and computer readable storage medium storing computer program instructions) is configured to determine a fingerprint of a client and qualify client behavior. For example, a proxy positioned between a host and the client may determine the fingerprint of the client and qualify the behavior of clients engaging the host. The client fingerprint provides a relatively stable representation of the client such that the client may be distinguished from the other clients engaging the…
A system (and method, and computer readable storage medium storing computer program instructions) is configured to determine a fingerprint of a client and qualify client behavior. For example, a proxy positioned between a host and the client may determine the fingerprint of the client and qualify the behavior of clients engaging the host. The client fingerprint provides a relatively stable representation of the client such that the client may be distinguished from the other clients engaging the host and the behavior of the client tracked. Clients engaging the host in a positive manner are prequalified to access the host based on the positive behavior they exhibit. During an attack on the host, such as a DDoS attack, prequalified clients retain access to features and functionality provided by the host to maintain legitimate user experience and better enable the proxy to handle malicious clients.
-
Caching dynamic web pages
Issued US 6185608
Abstract: Web pages for commercial applications, such as electronic retail, are built “on-the-fly” in Hypertext Markup Language (HTML) from product data stored in the merchant's database. To reduce costs in time and computing resources and to improve customer access to data from the merchant's web site, pages created in HTML are cached on the merchant server. On a customer request for a page, the merchant server checks the cache first for the page, and if it isn't found there, generates a new…
Abstract: Web pages for commercial applications, such as electronic retail, are built “on-the-fly” in Hypertext Markup Language (HTML) from product data stored in the merchant's database. To reduce costs in time and computing resources and to improve customer access to data from the merchant's web site, pages created in HTML are cached on the merchant server. On a customer request for a page, the merchant server checks the cache first for the page, and if it isn't found there, generates a new page from the database. To maintain the validity of the content of the cached pages, the database tables include triggers that cause identifying information for any changes made on the stored data to be forwarded to a cache log. A synchronization daemon walks the cache log from time to time to locate pages that should be purged from the cache because their content is no longer synchronous with the data stored in the database.
Other inventorsSee patent -
System And Method For PCI-Compliant Transactions
Filed US 20120005038
A hosted PCI system for isolating a merchant ecommerce system from credit card data within the scope of PCI standards comprises a server responsive to communication from a purchaser's browser, redirected by the merchant system, for providing the purchaser's browser with a check-out page obtained from the merchant system that solicits the purchaser's actual credit card number. The hosted PCI system receives the purchaser's actual credit card number without exposing it to the merchant system…
A hosted PCI system for isolating a merchant ecommerce system from credit card data within the scope of PCI standards comprises a server responsive to communication from a purchaser's browser, redirected by the merchant system, for providing the purchaser's browser with a check-out page obtained from the merchant system that solicits the purchaser's actual credit card number. The hosted PCI system receives the purchaser's actual credit card number without exposing it to the merchant system, converts it to a mapped credit card which the merchant system can store without PCI compliance.
When the hosted PCI system thereafter receives payment amount information with the mapped credit card number, it derives the actual credit card number from the mapped credit card number, sends the actual credit card number and payment amount information to a payment gateway on behalf of the merchant, and communicates the payment gateway's response to the merchant system.Other inventorsSee patent -
Dynamic Content Caching System
US 14/975,505
Abstract
A proxy server routes a request for online content from a user device to an origin server, which returns the requested online content to the proxy server. The proxy server passes the online content to the user device. In order to service subsequent user device requests with cached content, the proxy server, having received the initially requested online content from the origin server, parses out dynamic content specific to the user from static content common to many users within the…Abstract
A proxy server routes a request for online content from a user device to an origin server, which returns the requested online content to the proxy server. The proxy server passes the online content to the user device. In order to service subsequent user device requests with cached content, the proxy server, having received the initially requested online content from the origin server, parses out dynamic content specific to the user from static content common to many users within the web page content according to tags identifying the dynamic content. The proxy server stores the dynamic content within a personalized cache and also stores an association between the user/user device for the dynamic content stored. In this way, a subsequent request from the user device for the same online content may be serviced from cache, and include dynamic content specific to that user/user device by way of the personalized cache.
Honors & Awards
-
IBM Stock Option Grant
-
-
High Demand Skill Award
-
-
IBM Global Customer Excellence Award
-
-
Net.Commerce Deployment at L.L. Bean Recognition Award
-
-
Patent Awarded: Caching Dynamic Web Pages
IBM
Languages
-
English
Native or bilingual proficiency
-
Russian
Native or bilingual proficiency
Organizations
-
HostedPCI Inc.
Principal, Board Member
-
Recommendations received
12 people have recommended Leon
Join now to viewMore activity by Leon
-
📸 CAST AI spotted at #KubeCon SLC 🇺🇸 2 more days... join us and learn how we help enterprises run their application better, faster and cheaper…
📸 CAST AI spotted at #KubeCon SLC 🇺🇸 2 more days... join us and learn how we help enterprises run their application better, faster and cheaper…
Liked by Leon Kuperman
-
👀 ☁️ CAST AI at #Kubecon Salt Lake City 🇺🇸 We look forward to seeing you there and sharing how we help our users and partners run their…
👀 ☁️ CAST AI at #Kubecon Salt Lake City 🇺🇸 We look forward to seeing you there and sharing how we help our users and partners run their…
Liked by Leon Kuperman
-
I am very excited to share an important new feature we introduced today at #KubeCon: Container Live Migration. Organizations running…
I am very excited to share an important new feature we introduced today at #KubeCon: Container Live Migration. Organizations running…
Shared by Leon Kuperman
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Leon Kuperman
-
Leon Kuperman
-
Leon Kuperman
Freelancer
-
Leon Kuperman
Project Manager/Planner at Bozzuto's
-
Leon Kuperman
nobody
4 others named Leon Kuperman are on LinkedIn
See others named Leon Kuperman