Issued Patents All Time
Showing 25 most recent of 49 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10146931 | Organization-level password management employing user-device password vault | Boris Kronrod | 2018-12-04 |
| 10091230 | Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines | Salah Machani, Kayvan Alikhani, Christopher Clifton McLaren, Marcelo Blatt | 2018-10-02 |
| 10063549 | Techniques for sharing authentication data among authentication servers | Yedidya Dotan, Sean Doyle | 2018-08-28 |
| 9954680 | Secure management of a master encryption key in a split-key based distributed computing environment | Salah Machani | 2018-04-24 |
| 9942042 | Key containers for securely asserting user authentication | Kayvan Alikhani | 2018-04-10 |
| 9882879 | Using steganography to protect cryptographic information on a mobile device | Yedidya Dotan, William M. Duane, John Brainard | 2018-01-30 |
| 9781130 | Managing policies | Daniel V. Bailey, Riaz Zolfonoon, Yedidya Dotan | 2017-10-03 |
| 9781129 | Authenticating an entity | Daniel V. Bailey, Samuel J. Curry, Yedidya Dotan | 2017-10-03 |
| 9667611 | Situationally aware authentication | Yedidya Dotan, Gareth Richards, Daniel V. Bailey, William M. Duane, John Brainard | 2017-05-30 |
| 9667416 | Protecting master encryption keys in a distributed computing environment | Salah Machani | 2017-05-30 |
| 9641538 | Authenticating an entity | Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry | 2017-05-02 |
| 9613201 | Access control by a mobile device using an image | Yedidya Dotan, Gareth Richards, Daniel V. Bailey | 2017-04-04 |
| 9516059 | Using mock tokens to protect against malicious activity | Yedidya Dotan, Amit Monovich, Alexander Volanis | 2016-12-06 |
| 9455972 | Provisioning a mobile device with a security application on the fly | Yedidya Dotan, Gareth Richards | 2016-09-27 |
| 9455968 | Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share | Salah Machani, Nikolaos Triandopoulos | 2016-09-27 |
| 9430634 | Authentication using gesture passwords | Yedidya Dotan, Daniel V. Bailey, Gareth Richards | 2016-08-30 |
| 9407441 | Adding entropy to key generation on a mobile device | Yedidya Dotan, Daniel V. Bailey, John Brainard, William M. Duane | 2016-08-02 |
| 9405897 | Authenticating an entity | Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry | 2016-08-02 |
| 9397992 | Authentication using color-shape pairings | Yedidya Dotan, Daniel V. Bailey, Gareth Richards | 2016-07-19 |
| 9356968 | Managing authentication using common authentication framework circuitry | Yedidya Dotan, Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke | 2016-05-31 |
| 9332434 | Policy based location collection for authentication | Yedidya Dotan, Shane Rice | 2016-05-03 |
| 9332433 | Distributing access and identification tokens in a mobile environment | Yedidya Dotan, Riaz Zolfonoon, Gareth Richards, Guoying Luo | 2016-05-03 |
| 9305153 | User authentication | Karl Ackerman | 2016-04-05 |
| 9282114 | Generation of alerts in an event management system based upon risk | Yedidya Dotan, Manoj Nair, Riaz Zolfonoon | 2016-03-08 |
| 9230066 | Assessing risk for third-party data collectors | Daniel V. Bailey, Yedidya Dotan | 2016-01-05 |