Issued Patents All Time
Showing 25 most recent of 55 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12323450 | Systems and methods for detection and mitigation of malicious encryption | — | 2025-06-03 |
| 12019742 | Automated threat modeling using application relationships | Raghuveer Ketireddy, Trevor Tonn, Naga Venkata Sunil Alamuri | 2024-06-25 |
| 11973862 | Authentication methods and apparatus for generating digital signatures | John Brainard, Ari Juels, Burton S. Kaliski, Jr. | 2024-04-30 |
| 11943247 | Systems and methods for detection and mitigation of malicious encryption | — | 2024-03-26 |
| 11516236 | Systems and methods for detection and mitigation of malicious encryption | — | 2022-11-29 |
| 10958632 | Authentication methods and apparatus using key-encapsulating ciphertexts and other techniques | John Brainard, Ari Juels, Burton S. Kaliski, Jr. | 2021-03-23 |
| 10637879 | Systems and methods for detection and mitigation of malicious encryption | — | 2020-04-28 |
| 10101787 | Energy-aware virtual infrastructure | Qiyan Chen, Robert B. Masson, Tianqing Wang, Yun Zhang | 2018-10-16 |
| 10089463 | Managing security of source code | Aaron Katz, Yavir Amar | 2018-10-02 |
| 9923718 | Authentication methods and apparatus using base points on an elliptic curve and other techniques | John Brainard, Ari Juels, Burton S. Kaliski, Jr. | 2018-03-20 |
| 9781129 | Authenticating an entity | Lawrence N. Friedman, Samuel J. Curry, Yedidya Dotan | 2017-10-03 |
| 9781130 | Managing policies | Lawrence N. Friedman, Riaz Zolfonoon, Yedidya Dotan | 2017-10-03 |
| 9667611 | Situationally aware authentication | Lawrence N. Friedman, Yedidya Dotan, Gareth Richards, William M. Duane, John Brainard | 2017-05-30 |
| 9641538 | Authenticating an entity | Lawrence N. Friedman, Yedidya Dotan, Samuel J. Curry | 2017-05-02 |
| 9613201 | Access control by a mobile device using an image | Yedidya Dotan, Lawrence N. Friedman, Gareth Richards | 2017-04-04 |
| 9503442 | Credential-based application programming interface keys | Robert W. Griffin | 2016-11-22 |
| 9455977 | Remote management interface using credentials associated with respective access control intervals | Bradley Berg | 2016-09-27 |
| 9430634 | Authentication using gesture passwords | Yedidya Dotan, Lawrence N. Friedman, Gareth Richards | 2016-08-30 |
| 9405897 | Authenticating an entity | Lawrence N. Friedman, Yedidya Dotan, Samuel J. Curry | 2016-08-02 |
| 9407441 | Adding entropy to key generation on a mobile device | Yedidya Dotan, Lawrence N. Friedman, John Brainard, William M. Duane | 2016-08-02 |
| 9401905 | Transferring soft token authentication capabilities to a new device | Karl G. Kowalski, Millie Ng, Michael J. O'Malley | 2016-07-26 |
| 9397992 | Authentication using color-shape pairings | Yedidya Dotan, Lawrence N. Friedman, Gareth Richards | 2016-07-19 |
| 9306943 | Access point—authentication server combination | William M. Duane | 2016-04-05 |
| 9306942 | Agile OTP generation | John Brainard, William M. Duane, Michael J. O'Malley, Robert S. Philpott | 2016-04-05 |
| 9281943 | Defending against factoring by collision | — | 2016-03-08 |