Issued Patents All Time
Showing 26–50 of 61 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9838407 | Detection of malicious web activity in enterprise computer networks | Alina Oprea, Zhou Li, Robin Norris | 2017-12-05 |
| 9817957 | Access management based on active environment comprising dynamically reconfigurable sets of smart objects | Andres D. Molina-Markham, Nikolaos Triandopoulos | 2017-11-14 |
| 9740844 | Wireless wearable authenticators using attachment to confirm user possession | Ari Juels, Ronald L. Rivest | 2017-08-22 |
| 9659177 | Authentication token with controlled release of authentication information based on client attestation | Ari Juels | 2017-05-23 |
| 9621576 | Detecting malicious websites | Alina Oprea, Sumayah Alrwais, Todd Leetham, Zhou Li, Ronald L. Rivest | 2017-04-11 |
| 9614829 | Deauthentication in multi-device user environments | Andres D. Molina-Markham | 2017-04-04 |
| 9467343 | Collaborative analytics for independently administered network domains | Yedidya Dotan, Brian Girardi, Marcelo Blatt, Oleg Freylafert, Michael S. Shreve | 2016-10-11 |
| 9461821 | System and method for key material protection on devices using a secret sharing scheme | Salah Machani, Nikolaos Triandopoulos, Todd A. Morneau | 2016-10-04 |
| 9430673 | Subject notification and consent for captured images | Andres D. Molina-Markham, Nikolaos Triandopoulos | 2016-08-30 |
| 9361447 | Authentication based on user-selected image overlay effects | Vihang Dudhalkar, Ari Juels, Ronald L. Rivest, Samir Dilipkumar Saklikar, Nikolaos Triandopoulos | 2016-06-07 |
| 9325499 | Message encryption and decryption utilizing low-entropy keys | Ari Juels | 2016-04-26 |
| 9323909 | Sharing a cryptographic device by partitioning challenge-response space | Guoying Luo, Ari Juels | 2016-04-26 |
| 9294473 | Server methods and apparatus for processing passcodes generated by configurable one-time authentication tokens | Ari Juels, Nikolaos Triandopoulos, Marten Van Dijk, John Brainard, Ronald L. Rivest | 2016-03-22 |
| 9270655 | Configurable one-time authentication tokens with improved resilience to attacks | Ari Juels, Nikolaos Triandopoulos, Marten Van Dijk, John Brainard, Ronald L. Rivest | 2016-02-23 |
| 9256725 | Credential recovery with the assistance of trusted entities | Alina Oprea, Nikolaos Triandopoulos, Ting-Fang Yen, Ari Juels | 2016-02-09 |
| 9160539 | Methods and apparatus for secure, stealthy and reliable transmission of alert messages from a security alerting system | Ari Juels, Nikolaos Triandopoulos, Catherine V. Hart | 2015-10-13 |
| 9128739 | Determining instances to maintain on at least one cloud responsive to an evaluation of performance characteristics | Ari Juels, Benjamin Tillman Farley, Venkatanathan Varadarajan, Thomas Ristenpart, Michael M. Swift | 2015-09-08 |
| 9037858 | Distributed cryptography using distinct value sets each comprising at least one obscured secret value | Ari Juels, Sandra Carielli, Guoying Luo | 2015-05-19 |
| 9015476 | Cryptographic device operable in a challenge-response mode | Ari Juels, Guoying Luo | 2015-04-21 |
| 9008303 | Method and apparatus for generating forward secure pseudorandom numbers | Ari Juels, Nikolaos Triandopoulos | 2015-04-14 |
| 8984384 | Distributed storage system with efficient handling of file updates | Ari Juels, Alina Oprea | 2015-03-17 |
| 8984363 | Proof of retrievability for archived files | Ari Juels, Burton S. Kaliski, Jr., Alina Oprea | 2015-03-17 |
| 8904525 | Techniques for detecting malware on a mobile device | Roy Hodgman, Samir Dilipkumar Saklikar | 2014-12-02 |
| 8874904 | View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device | Ari Juels | 2014-10-28 |
| 8875263 | Controlling a soft token running within an electronic apparatus | Marten Van Dijk, John Brainard, Samuel J. Curry, Sean Doyle, Michael J. O'Malley +1 more | 2014-10-28 |