| 10592978 |
Methods and apparatus for risk-based authentication between two servers on behalf of a user |
Alon Kaufman, Yael Villa |
2020-03-17 |
| 9601000 |
Data-driven alert prioritization |
Eyal Gruss, Eyal Kolman, Alon Kaufman, Yael Villa, Ereli Eran |
2017-03-21 |
| 9560027 |
User authentication |
Eyal Kolman, Alon Kaufman, Yael Villa, Ereli Eran, Liron Liptz |
2017-01-31 |
| 9558346 |
Information processing systems with security-related feedback |
Eyal Kolman, Alon Kaufman, Yael Villa, Ereli Eran |
2017-01-31 |
| 9462009 |
Detecting risky domains |
Eyal Kolman, Alon Kaufman, Ereli Eran, Eyal Gruss |
2016-10-04 |
| 9426168 |
Fast-flux detection utilizing domain name system information |
Eyal Gruss, Ereli Eran, Eyal Kolman, Alon Kaufman |
2016-08-23 |
| 9331916 |
Data-driven detection of servers and clients |
Eyal Kolman, Oshry Ben-Harush |
2016-05-03 |
| 9160726 |
Authentication system with selective authentication method based on risk reasoning |
Alon Kaufman, Marcelo Blatt, Triinu Magi Shaashua, Yael Villa |
2015-10-13 |
| 9154516 |
Detecting risky network communications based on evaluation using normal and abnormal behavior profiles |
Ereli Eran, Eyal Kolman |
2015-10-06 |
| 9130985 |
Data driven device detection |
Eyal Kolman, Alon Kaufman, Yael Villa, Ereli Eran, Eyal Gruss |
2015-09-08 |
| 9092782 |
Methods and apparatus for risk evaluation of compromised credentials |
Alex Zaslavsky, Alon Kaufman, Yael Villa, Marcelo Blatt |
2015-07-28 |
| 8902043 |
Mitigating conformational bias in authentication systems |
Karl Ackerman, Kenneth D. Ray, Lawrence N. Friedman, Roy Dagan, Roy Hodgman |
2014-12-02 |
| 8875244 |
Method and apparatus for authenticating a user using dynamic client-side storage values |
Oleg Freylafert |
2014-10-28 |
| 8683452 |
Dynamically obfuscated javascript |
Roy Hodgman, Ofer Mizrach, Ofri Mann |
2014-03-25 |
| 8479276 |
Malware detection using risk analysis based on file system and network activity |
Robert Polansky, Samir Dilipkumar Saklikar, Liron Liptz |
2013-07-02 |