LF

Lawrence N. Friedman

EM Emc: 36 patents #53 of 3,345Top 2%
EC Emc Ip Holding Company: 13 patents #346 of 4,608Top 8%
Overall (All Time): #56,640 of 4,157,543Top 2%
49
Patents All Time

Issued Patents All Time

Showing 25 most recent of 49 patents

Patent #TitleCo-InventorsDate
10146931 Organization-level password management employing user-device password vault Boris Kronrod 2018-12-04
10091230 Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines Salah Machani, Kayvan Alikhani, Christopher Clifton McLaren, Marcelo Blatt 2018-10-02
10063549 Techniques for sharing authentication data among authentication servers Yedidya Dotan, Sean Doyle 2018-08-28
9954680 Secure management of a master encryption key in a split-key based distributed computing environment Salah Machani 2018-04-24
9942042 Key containers for securely asserting user authentication Kayvan Alikhani 2018-04-10
9882879 Using steganography to protect cryptographic information on a mobile device Yedidya Dotan, William M. Duane, John Brainard 2018-01-30
9781130 Managing policies Daniel V. Bailey, Riaz Zolfonoon, Yedidya Dotan 2017-10-03
9781129 Authenticating an entity Daniel V. Bailey, Samuel J. Curry, Yedidya Dotan 2017-10-03
9667611 Situationally aware authentication Yedidya Dotan, Gareth Richards, Daniel V. Bailey, William M. Duane, John Brainard 2017-05-30
9667416 Protecting master encryption keys in a distributed computing environment Salah Machani 2017-05-30
9641538 Authenticating an entity Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry 2017-05-02
9613201 Access control by a mobile device using an image Yedidya Dotan, Gareth Richards, Daniel V. Bailey 2017-04-04
9516059 Using mock tokens to protect against malicious activity Yedidya Dotan, Amit Monovich, Alexander Volanis 2016-12-06
9455972 Provisioning a mobile device with a security application on the fly Yedidya Dotan, Gareth Richards 2016-09-27
9455968 Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share Salah Machani, Nikolaos Triandopoulos 2016-09-27
9430634 Authentication using gesture passwords Yedidya Dotan, Daniel V. Bailey, Gareth Richards 2016-08-30
9407441 Adding entropy to key generation on a mobile device Yedidya Dotan, Daniel V. Bailey, John Brainard, William M. Duane 2016-08-02
9405897 Authenticating an entity Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry 2016-08-02
9397992 Authentication using color-shape pairings Yedidya Dotan, Daniel V. Bailey, Gareth Richards 2016-07-19
9356968 Managing authentication using common authentication framework circuitry Yedidya Dotan, Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke 2016-05-31
9332434 Policy based location collection for authentication Yedidya Dotan, Shane Rice 2016-05-03
9332433 Distributing access and identification tokens in a mobile environment Yedidya Dotan, Riaz Zolfonoon, Gareth Richards, Guoying Luo 2016-05-03
9305153 User authentication Karl Ackerman 2016-04-05
9282114 Generation of alerts in an event management system based upon risk Yedidya Dotan, Manoj Nair, Riaz Zolfonoon 2016-03-08
9230066 Assessing risk for third-party data collectors Daniel V. Bailey, Yedidya Dotan 2016-01-05