IS

Ilya Sokolov

Broadcom: 64 patents #67 of 9,346Top 1%
NO Nortonlifelock: 26 patents #1 of 159Top 1%
CA Ca: 3 patents #240 of 1,424Top 20%
JL J. C. Bamford Excavators Limited: 1 patents #110 of 224Top 50%
📍 Boston, MA: #17 of 5,993 inventorsTop 1%
🗺 Massachusetts: #278 of 88,656 inventorsTop 1%
Overall (All Time): #15,808 of 4,157,543Top 1%
96
Patents All Time

Issued Patents All Time

Showing 51–75 of 96 patents

Patent #TitleCo-InventorsDate
10289865 Systems and methods for providing kinship-based accessibility to securely stored data Kevin Jiang 2019-05-14
10288432 Systems and methods for guiding users to network-enabled devices Keith Newstadt, Richard F. Andrews 2019-05-14
10284556 Systems and methods for verifying authentication requests using internet protocol addresses Kevin Jiang 2019-05-07
10262135 Systems and methods for detecting and addressing suspicious file restore activities Lei Gu, Haik Mesropian 2019-04-16
10257202 Systems and methods for logging users out of online accounts Kevin Jiang, Rickey Ray 2019-04-09
10248769 Systems and methods for authenticating users on touchscreen devices Kevin Jiang 2019-04-02
10237304 Systems and methods of administering computer activities based upon emotional intelligence Keith Newstadt 2019-03-19
10219157 Secure verified attribute exchange between parties in physical proximity Kevin Jiang 2019-02-26
10206110 Techniques for network security Michael Shavell, Lei Gu, Kevin Jiang 2019-02-12
10200359 Systems and methods for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services Kevin Jiang 2019-02-05
10193880 Systems and methods for registering user accounts with multi-factor authentication schemes used by online services Kevin Jiang 2019-01-29
10154136 Call block policy using validated identities and selected attribute sharing Keith Newstadt 2018-12-11
10148631 Systems and methods for preventing session hijacking Kevin Jiang 2018-12-04
10140440 Systems and methods for securing computing devices that are not in users' physical possessions Keith Newstadt 2018-11-27
10140187 Techniques for system backup Leo M. Chan 2018-11-27
10135868 Defeating wireless signal interference hacks by manipulating signal strength Keith Newstadt 2018-11-20
10116695 Systems and methods for verifying that operators are human based on operator gaze Keith Newstadt 2018-10-30
10115283 Systems and methods for providing assistance to users in emergency situations Keith Newstadt 2018-10-30
10116656 Systems and methods for enabling calls to bypass call-blocking functions Keith Newstadt 2018-10-30
10097560 Systems and methods for automatically adjusting user access permissions based on beacon proximity Michael Shavell, Kevin Jiang, Lei Gu 2018-10-09
10033732 Systems and methods for detecting cloning of security tokens Kevin Jiang 2018-07-24
9888377 Using personal computing device analytics as a knowledge based authentication source Bruce McCorkendale, Kevin Jiang 2018-02-06
9882889 Techniques for user authentication Lei Gu, Matt Boucher 2018-01-30
9843934 Systems and methods for detecting public networks Kevin Jiang 2017-12-12
9794744 Physical presence validation through use of time-restricted secure beacon devices Lei Gu 2017-10-17