Issued Patents All Time
Showing 26–50 of 141 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9843574 | Methods and apparatus for generating chaff passwords for use in a password-hardening system | Nikolaos Triandopoulos, Kevin D. Bowers, Ronald L. Rivest, Guoying Luo | 2017-12-12 |
| 9740844 | Wireless wearable authenticators using attachment to confirm user possession | Kevin D. Bowers, Ronald L. Rivest | 2017-08-22 |
| 9674210 | Determining risk of malware infection in enterprise hosts | Alina Oprea, Ting-Fang Yen, Viktor Heorhiadi, Michael Kendrick Reiter | 2017-06-06 |
| 9659177 | Authentication token with controlled release of authentication information based on client attestation | Kevin D. Bowers | 2017-05-23 |
| 9654467 | Time synchronization solutions for forward-secure one-time authentication tokens | Nikolaos Triandopoulos, Marten Van Dijk, John Brainard, Ronald L. Rivest | 2017-05-16 |
| 9571164 | Remote authentication using near field communication tag | Guoying Luo | 2017-02-14 |
| 9537845 | Determining authenticity based on indicators derived from information relating to historical events | Ronald L. Rivest | 2017-01-03 |
| 9525551 | Randomly skewing secret values as a countermeasure to compromise | Karl Ackerman, Marten Van Dijk, Emily H. Shen | 2016-12-20 |
| 9516039 | Behavioral detection of suspicious host activities in an enterprise | Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William Gordon Robertson +1 more | 2016-12-06 |
| 9515989 | Methods and apparatus for silent alarm channels using one-time passcode authentication tokens | Nikolaos Triandopoulos, Marten Van Dijk, Ronald L. Rivest | 2016-12-06 |
| 9515996 | Distributed password-based authentication in a public key cryptography authentication system | Gareth Richards | 2016-12-06 |
| 9495668 | Computing solutions to a problem involving inversion of a one-way function | — | 2016-11-15 |
| 9496897 | Methods and apparatus for generating authenticated error correcting codes | Nikolaos Triandopoulos, Roberto Tamassia, James A. Kelley | 2016-11-15 |
| 9471777 | Scheduling of defensive security actions in information processing systems | Marten Van Dijk, Alina Oprea, Ronald L. Rivest | 2016-10-18 |
| 9467293 | Generating authentication codes associated with devices | John Brainard | 2016-10-11 |
| 9454654 | Multi-server one-time passcode verification on respective high order and low order passcode portions | Nikolaos Triandopoulos, Ronald L. Rivest, John Brainard | 2016-09-27 |
| 9430501 | Time sanitization of network logs from a geographically distributed computer system | Ting-Fang Yen, Kaan Onarlioglu, Alina Oprea | 2016-08-30 |
| 9407631 | Multi-server passcode verification for one-time authentication tokens with auxiliary channel compatibility | Nikolaos Triandopoulos, John Brainard | 2016-08-02 |
| 9379894 | Authentication using cryptographic value derived from a shared secret of a near field communication tag | Guoying Luo, Yong Qiao | 2016-06-28 |
| 9378361 | Anomaly sensor framework for detecting advanced persistent threat attacks | Ting-Fang Yen, Aditya Kuppa, Kaan Onarlioglu, Alina Oprea | 2016-06-28 |
| 9374221 | Distributed protection of credential stores utilizing multiple keys derived from a master key | Samuel J. Curry | 2016-06-21 |
| 9361447 | Authentication based on user-selected image overlay effects | Kevin D. Bowers, Vihang Dudhalkar, Ronald L. Rivest, Samir Dilipkumar Saklikar, Nikolaos Triandopoulos | 2016-06-07 |
| 9330727 | Binding a data object to a rotational hard drive | — | 2016-05-03 |
| 9325499 | Message encryption and decryption utilizing low-entropy keys | Kevin D. Bowers | 2016-04-26 |
| 9323909 | Sharing a cryptographic device by partitioning challenge-response space | Guoying Luo, Kevin D. Bowers | 2016-04-26 |