Issued Patents All Time
Showing 1–25 of 38 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12333451 | Interpretable supervised anomaly detection for determining reasons for unsupervised anomaly decision | Sashka T. Davis | 2025-06-17 |
| 12019784 | Privacy preserving evaluation of sensitive user features for anomaly detection | Salah Machani | 2024-06-25 |
| 11625626 | Performance improvement recommendations for machine learning models | Arkady Koganov, Anatoly Gendelev | 2023-04-11 |
| 11486709 | Ground distance determination using zone-based location data | Guoying Luo, Salah Machani | 2022-11-01 |
| 11283841 | Community-based anomaly detection policy sharing among organizations | Salah Machani | 2022-03-22 |
| 11233796 | Data-driven attribute selection for user application entitlement analysis | Zhou Li, Kevin D. Bowers | 2022-01-25 |
| 11222101 | User behavior analytics using keystroke analysis of pseudo-random character strings | Salah Machani | 2022-01-11 |
| 11151232 | User authentication by endpoint device using local policy engine and endpoint data | Salah Machani | 2021-10-19 |
| 11122438 | Map-based techniques for visualizing user access data and for configuring and enforcing location-based access policies | Naveen Sunkavally, Leandro E. Diato, Victor Malchikov | 2021-09-14 |
| 11113650 | Automated generation of adaptive policies from organizational data for detection of risk-related events | Arkady Koganov, Anatoly Gendelev | 2021-09-07 |
| 11042880 | Authenticating users in the presence of small transaction volumes | Alon Hazan, Anatoly Gendelev, Marcelo Blatt, Alon Kaufman | 2021-06-22 |
| 10965696 | Evaluation of anomaly detection algorithms using impersonation data derived from user data | Shay Amram | 2021-03-30 |
| 10902428 | Maintaining a risk model using feedback directed to other risk models | Shay Amram, Alma Zohar, Anatoly Gendelev, Christina Tkachenko | 2021-01-26 |
| 10721236 | Method, apparatus and computer program product for providing security via user clustering | Boris Kronrod, Zohar Duchin | 2020-07-21 |
| 10515366 | Network neighborhood topology as a predictor for fraud and anomaly detection | Boris Gorelik, Anatoly Gendelev, Liron Liptz, Marcelo Blatt | 2019-12-24 |
| 10505963 | Anomaly score generation based on adaptive clustering of user location | Liron Liptz, Shay Amram, Kevin D. Bowers | 2019-12-10 |
| 10454939 | Method, apparatus and computer program product for identifying excessive access rights granted to users | Shay Amram, Carmit Sahar | 2019-10-22 |
| 10454967 | Clustering computer security attacks by threat actor based on attack features | Oren Karmi, Uri Fleyder, Lior Ben-Porat, Marcelo Blatt | 2019-10-22 |
| 10147065 | Dynamic generation of risk score thresholds for optimized configuration of policy rules in an adaptive authentication service | Peleg Yiftachel, Marcelo Blatt, Alon Kaufman | 2018-12-04 |
| 10148673 | Automatic selection of malicious activity detection rules using crowd-sourcing techniques | Zohar Duchin, Alon Kaufman, Oleg Freylafert, Lior Asher | 2018-12-04 |
| 10142308 | User authentication | Zohar Duchin, Ika Bar-Menachem, Shachar Israeli | 2018-11-27 |
| 10115108 | Rendering transaction data to identify fraud detection rule strength | Anatoly Gendelev, Kineret Raviv, Eyal Kolman, Alma Zohar | 2018-10-30 |
| 10013694 | Open data collection for threat intelligence posture assessment | Shachar Israeli, Ereli Eran, Marcelo Blatt | 2018-07-03 |
| 10013539 | Rapid device identification among multiple users | Alon Hazan, Marcelo Blatt, Zohar Duchin, Shay Amram | 2018-07-03 |
| 9690937 | Recommending a set of malicious activity detection rules in an automated, data-driven manner | Zohar Duchin, Alon Kaufman, Martin Rosa, Luan Nguyen | 2017-06-27 |