| 9521167 |
Generalized security policy user interface |
Robin Martherus, Guy Telner, Denis Knjazihhin |
2016-12-13 |
| 9516059 |
Using mock tokens to protect against malicious activity |
Lawrence N. Friedman, Amit Monovich, Alexander Volanis |
2016-12-06 |
| 9514407 |
Question generation in knowledge-based authentication from activity logs |
Ayelet Levin, Ayelet Avni, Ayelet Eliezer |
2016-12-06 |
| 9507947 |
Similarity-based data loss prevention |
— |
2016-11-29 |
| 9467343 |
Collaborative analytics for independently administered network domains |
Brian Girardi, Marcelo Blatt, Oleg Freylafert, Kevin D. Bowers, Michael S. Shreve |
2016-10-11 |
| 9455972 |
Provisioning a mobile device with a security application on the fly |
Lawrence N. Friedman, Gareth Richards |
2016-09-27 |
| 9430634 |
Authentication using gesture passwords |
Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards |
2016-08-30 |
| 9407441 |
Adding entropy to key generation on a mobile device |
Lawrence N. Friedman, Daniel V. Bailey, John Brainard, William M. Duane |
2016-08-02 |
| 9405897 |
Authenticating an entity |
Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry |
2016-08-02 |
| 9401933 |
Classification of security policies across multiple security products |
Sanjay Agarwal, Robin Martherus |
2016-07-26 |
| 9397992 |
Authentication using color-shape pairings |
Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards |
2016-07-19 |
| 9356968 |
Managing authentication using common authentication framework circuitry |
Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke, Lawrence N. Friedman |
2016-05-31 |
| 9332434 |
Policy based location collection for authentication |
Lawrence N. Friedman, Shane Rice |
2016-05-03 |
| 9332433 |
Distributing access and identification tokens in a mobile environment |
Lawrence N. Friedman, Riaz Zolfonoon, Gareth Richards, Guoying Luo |
2016-05-03 |
| 9305151 |
Risk-based authentication using lockout states |
Lakshmi Suresh, John Watts, Marcelo Blatt |
2016-04-05 |
| 9282114 |
Generation of alerts in an event management system based upon risk |
Lawrence N. Friedman, Manoj Nair, Riaz Zolfonoon |
2016-03-08 |
| 9240986 |
Managing security and wireless signal detection |
Karl Ackerman, William Duane |
2016-01-19 |
| 9237143 |
User authentication avoiding exposure of information about enumerable system resources |
Lakshmi Suresh, John Watts, Paul A. Dennis |
2016-01-12 |
| 9230066 |
Assessing risk for third-party data collectors |
Daniel V. Bailey, Lawrence N. Friedman |
2016-01-05 |