| 9503442 |
Credential-based application programming interface keys |
Robert W. Griffin |
2016-11-22 |
| 9455977 |
Remote management interface using credentials associated with respective access control intervals |
Bradley Berg |
2016-09-27 |
| 9430634 |
Authentication using gesture passwords |
Yedidya Dotan, Lawrence N. Friedman, Gareth Richards |
2016-08-30 |
| 9407441 |
Adding entropy to key generation on a mobile device |
Yedidya Dotan, Lawrence N. Friedman, John Brainard, William M. Duane |
2016-08-02 |
| 9405897 |
Authenticating an entity |
Lawrence N. Friedman, Yedidya Dotan, Samuel J. Curry |
2016-08-02 |
| 9401905 |
Transferring soft token authentication capabilities to a new device |
Karl G. Kowalski, Millie Ng, Michael J. O'Malley |
2016-07-26 |
| 9397992 |
Authentication using color-shape pairings |
Yedidya Dotan, Lawrence N. Friedman, Gareth Richards |
2016-07-19 |
| 9306942 |
Agile OTP generation |
John Brainard, William M. Duane, Michael J. O'Malley, Robert S. Philpott |
2016-04-05 |
| 9306943 |
Access point—authentication server combination |
William M. Duane |
2016-04-05 |
| 9281943 |
Defending against factoring by collision |
— |
2016-03-08 |
| 9280871 |
Gaming systems with authentication token support |
Burton S. Kaliski, Jr., Ari Juels, Ronald L. Rivest |
2016-03-08 |
| 9239916 |
Using spatial diversity with secrets |
— |
2016-01-19 |
| 9235715 |
Techniques for increasing mobile device security |
Irina Furman |
2016-01-12 |
| 9230066 |
Assessing risk for third-party data collectors |
Lawrence N. Friedman, Yedidya Dotan |
2016-01-05 |