Issued Patents All Time
Showing 26–50 of 55 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9280871 | Gaming systems with authentication token support | Burton S. Kaliski, Jr., Ari Juels, Ronald L. Rivest | 2016-03-08 |
| 9239916 | Using spatial diversity with secrets | — | 2016-01-19 |
| 9235715 | Techniques for increasing mobile device security | Irina Furman | 2016-01-12 |
| 9230066 | Assessing risk for third-party data collectors | Lawrence N. Friedman, Yedidya Dotan | 2016-01-05 |
| 9147063 | Passcode generation utilizing selected permutation type applied to tokencode and personal identifier | Patricia Gomes Soares Florissi | 2015-09-29 |
| 9137012 | Wireless authentication methods and apparatus | John Brainard, Ari Juels, Burton S. Kaliski, Jr. | 2015-09-15 |
| 9118663 | Agile OTP generation | John Brainard, William M. Duane, Michael J. O'Malley, Robert S. Philpott | 2015-08-25 |
| 9064094 | Protected resource access control utilizing intermediate values of a hash chain | William M. Duane, Eric Young | 2015-06-23 |
| 8990905 | Protected resource access control utilizing intermediate values of a hash chain | William M. Duane, Eric Young | 2015-03-24 |
| 8984602 | Protected resource access control utilizing credentials based on message authentication codes and hash chain values | William M. Duane, Aaron Katz | 2015-03-17 |
| 8914895 | Managing verification of input data | Aaron Katz, Yavir Amar | 2014-12-16 |
| 8904496 | Authentication based on a current location of a communications device associated with an entity | Lawrence N. Friedman, Yedidya Dotan, Samuel J. Curry, Riaz Zolfonoon | 2014-12-02 |
| 8726405 | Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry | Robert W. Griffin | 2014-05-13 |
| 8656455 | Managing data loss prevention policies | John Philip Bell, II, Siddharth Navare, Vishnu C. Pedasingu, Rishi Pidva | 2014-02-18 |
| 8655787 | Automated detection of defined input values and transformation to tokens | Robert W. Griffin, Joshua A. Rosenthol | 2014-02-18 |
| 8620882 | Tokenization of multiple-field records | Robert W. Griffin, Joshua A. Rosenthol | 2013-12-31 |
| 8621237 | Protecting against cryptographic key exposure in source code | Aaron Katz, Craig Paradis, Robert D. Hopley | 2013-12-31 |
| 8618913 | Radio frequency identification enabled mobile device | John Brainard, Ari Juels, Kevin D. Bowers | 2013-12-31 |
| 8607045 | Tokencode exchanges for peripheral authentication | John Brainard, Burton S. Kaliski, Jr., Michael Szydlo | 2013-12-10 |
| 8601553 | Techniques of imposing access control policies | Robert W. Griffin, Joshua A. Rosenthol | 2013-12-03 |
| 8515070 | Access control for implanted medical devices | Ari Juels | 2013-08-20 |
| 8499157 | Device-based password management | Ari Juels | 2013-07-30 |
| 8495372 | Authentication methods and apparatus using pairing protocols and other techniques | John Brainard, Ari Juels, Burton S. Kaliski, Jr. | 2013-07-23 |
| 8458483 | Techniques for message-passing using shared memory of an RF tag | Marco Ciaffi, William M. Duane, Ari Juels, John P. O'Brien | 2013-06-04 |
| 8452965 | Self-identification of tokens | Robert W. Griffin, Joshua A. Rosenthol | 2013-05-28 |