Issued Patents All Time
Showing 1–25 of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11373189 | Self-learning online multi-layer method for unsupervised risk assessment | Boris Gorelik, Marcelo Blatt, Liron Liptz, Yael Villa | 2022-06-28 |
| 11334878 | Combining explicit and implicit feedback in self-learning fraud detection systems | Marcelo Blatt, Yael Villa | 2022-05-17 |
| 11042880 | Authenticating users in the presence of small transaction volumes | Alon Hazan, Anatoly Gendelev, Marcelo Blatt, Alex Zaslavsky | 2021-06-22 |
| 10921167 | Methods and apparatus for validating event scenarios using reference readings from sensors associated with predefined event scenarios | Carmit Sahar, Marcelo Blatt, Roni Frumkes | 2021-02-16 |
| 10592978 | Methods and apparatus for risk-based authentication between two servers on behalf of a user | Alex Vaystikh, Yael Villa | 2020-03-17 |
| 10587596 | Framework for authenticating new users | Carmit Sahar, Eyal Kolman | 2020-03-10 |
| 10467403 | Methods and apparatus for evaluating classification performance of risk engine models | Marcelo Blatt, Yael Villa | 2019-11-05 |
| 10367835 | Methods and apparatus for detecting suspicious network activity by new devices | Kineret Raviv, Dan Karpati, Eyal Kolman, Ofri Mann | 2019-07-30 |
| 10148673 | Automatic selection of malicious activity detection rules using crowd-sourcing techniques | Zohar Duchin, Oleg Freylafert, Lior Asher, Alex Zaslavsky | 2018-12-04 |
| 10147065 | Dynamic generation of risk score thresholds for optimized configuration of policy rules in an adaptive authentication service | Peleg Yiftachel, Alex Zaslavsky, Marcelo Blatt | 2018-12-04 |
| 10129276 | Methods and apparatus for identifying suspicious domains using common user clustering | Kineret Raviv, Carmit Sahar, Eyal Kolman, Shay Amram | 2018-11-13 |
| 10038700 | Establishing trustworthiness of devices in the internet of things (IoT) to control inter-device communication | Zohar Duchin, Alex Zaslaysky, Mikael Peres, Marcelo Blatt | 2018-07-31 |
| 9917820 | Secure information sharing | Eyal Kolman | 2018-03-13 |
| 9906511 | Secure impersonation detection | Eyal Kolman, Yehuda Lindell, Binyamin Pinkas | 2018-02-27 |
| 9830599 | Human interaction detection | Amnon Khen, Roy Hodgman | 2017-11-28 |
| 9729525 | Secure data analytics | Eyal Kolman | 2017-08-08 |
| 9721087 | User authentication | Zohar Duchin, Marcelo Blatt, Yedidya Dotan | 2017-08-01 |
| 9722996 | Partial password-based authentication using per-request risk scores | Eyal Kolman, Ereli Eran, Eyal Gruss | 2017-08-01 |
| 9699196 | Providing security to an enterprise via user clustering | Eyal Kolman, Carmit Sahar, Marcelo Blatt | 2017-07-04 |
| 9699660 | Big data analytics for telecom fraud detection | Marcelo Blatt | 2017-07-04 |
| 9690937 | Recommending a set of malicious activity detection rules in an automated, data-driven manner | Zohar Duchin, Alex Zaslavsky, Martin Rosa, Luan Nguyen | 2017-06-27 |
| 9641489 | Fraud detection | Philip Derbeko, Yan Belinky | 2017-05-02 |
| 9601000 | Data-driven alert prioritization | Eyal Gruss, Alex Vaystikh, Eyal Kolman, Yael Villa, Ereli Eran | 2017-03-21 |
| 9560027 | User authentication | Eyal Kolman, Yael Villa, Alex Vaystikh, Ereli Eran, Liron Liptz | 2017-01-31 |
| 9558346 | Information processing systems with security-related feedback | Eyal Kolman, Yael Villa, Alex Vaystikh, Ereli Eran | 2017-01-31 |