| 11486709 |
Ground distance determination using zone-based location data |
Alex Zaslavsky, Salah Machani |
2022-11-01 |
| 10735403 |
Chaff password generation based on distribution-based modifications of base passwords |
Nikolaos Triandopoulos, Kevin D. Bowers, Ari Juels, Ronald L. Rivest |
2020-08-04 |
| 9843574 |
Methods and apparatus for generating chaff passwords for use in a password-hardening system |
Nikolaos Triandopoulos, Kevin D. Bowers, Ari Juels, Ronald L. Rivest |
2017-12-12 |
| 9571164 |
Remote authentication using near field communication tag |
Ari Juels |
2017-02-14 |
| 9379894 |
Authentication using cryptographic value derived from a shared secret of a near field communication tag |
Ari Juels, Yong Qiao |
2016-06-28 |
| 9332433 |
Distributing access and identification tokens in a mobile environment |
Yedidya Dotan, Lawrence N. Friedman, Riaz Zolfonoon, Gareth Richards |
2016-05-03 |
| 9323909 |
Sharing a cryptographic device by partitioning challenge-response space |
Ari Juels, Kevin D. Bowers |
2016-04-26 |
| 9154481 |
Decryption of a protected resource on a cryptographic device using wireless communication |
Ari Juels |
2015-10-06 |
| 9043890 |
Distributed authentication against stored user identifiers and user templates via pseudonym association |
Ari Juels |
2015-05-26 |
| 9037858 |
Distributed cryptography using distinct value sets each comprising at least one obscured secret value |
Ari Juels, Sandra Carielli, Kevin D. Bowers |
2015-05-19 |
| 9015476 |
Cryptographic device operable in a challenge-response mode |
Ari Juels, Kevin D. Bowers |
2015-04-21 |