| 9516059 |
Using mock tokens to protect against malicious activity |
Yedidya Dotan, Amit Monovich, Alexander Volanis |
2016-12-06 |
| 9455972 |
Provisioning a mobile device with a security application on the fly |
Yedidya Dotan, Gareth Richards |
2016-09-27 |
| 9455968 |
Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share |
Salah Machani, Nikolaos Triandopoulos |
2016-09-27 |
| 9430634 |
Authentication using gesture passwords |
Yedidya Dotan, Daniel V. Bailey, Gareth Richards |
2016-08-30 |
| 9405897 |
Authenticating an entity |
Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry |
2016-08-02 |
| 9407441 |
Adding entropy to key generation on a mobile device |
Yedidya Dotan, Daniel V. Bailey, John Brainard, William M. Duane |
2016-08-02 |
| 9397992 |
Authentication using color-shape pairings |
Yedidya Dotan, Daniel V. Bailey, Gareth Richards |
2016-07-19 |
| 9356968 |
Managing authentication using common authentication framework circuitry |
Yedidya Dotan, Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke |
2016-05-31 |
| 9332434 |
Policy based location collection for authentication |
Yedidya Dotan, Shane Rice |
2016-05-03 |
| 9332433 |
Distributing access and identification tokens in a mobile environment |
Yedidya Dotan, Riaz Zolfonoon, Gareth Richards, Guoying Luo |
2016-05-03 |
| 9305153 |
User authentication |
Karl Ackerman |
2016-04-05 |
| 9282114 |
Generation of alerts in an event management system based upon risk |
Yedidya Dotan, Manoj Nair, Riaz Zolfonoon |
2016-03-08 |
| 9230066 |
Assessing risk for third-party data collectors |
Daniel V. Bailey, Yedidya Dotan |
2016-01-05 |