Issued Patents All Time
Showing 26–49 of 49 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9225700 | Proximity-based authentication | Yedidya Dotan, Karl G. Kowalski, Piers Bowness | 2015-12-29 |
| 9202173 | Using link analysis in adversarial knowledge-based authentication model | Yedidya Dotan, Ayelet Eliezer | 2015-12-01 |
| 9154556 | Managing access to a limited number of computerized sessions | Yedidya Dotan, Ayelet Biger, Asaf Shoval | 2015-10-06 |
| 9119539 | Performing an authentication operation during user access to a computerized resource | Yedidya Dotan, William M. Duane | 2015-09-01 |
| 9038134 | Managing predictions in data security systems | Karl Ackerman, Yedidya Dotan | 2015-05-19 |
| 9021271 | Injecting code decrypted by a hardware decryption module into Java applications | Gareth Richards, Alexander Volanis, Yedidya Dotan | 2015-04-28 |
| 8955069 | Event-based biometric authentication using mobile device | Yedidya Dotan, Samuel Adams, Philip A. Darringer, Christopher Corde | 2015-02-10 |
| 8955066 | Knowledge based authentication using recent user internet activity | Karl Ackerman | 2015-02-10 |
| 8955076 | Controlling access to a protected resource using multiple user devices | Sorin Faibish, Yedidya Dotan, John A. Murray | 2015-02-10 |
| 8949953 | Brokering multiple authentications through a single proxy | Anton Khitrenovich, Oleg Freylafert, Yedidya Dotan, Karl Ackerman | 2015-02-03 |
| 8918844 | Device presence validation | Karl Ackerman, Kenneth D. Ray, Yedidya Dotan | 2014-12-23 |
| 8902043 | Mitigating conformational bias in authentication systems | Karl Ackerman, Kenneth D. Ray, Roy Dagan, Alex Vaystikh, Roy Hodgman | 2014-12-02 |
| 8904496 | Authentication based on a current location of a communications device associated with an entity | Daniel V. Bailey, Yedidya Dotan, Samuel J. Curry, Riaz Zolfonoon | 2014-12-02 |
| 8904482 | Techniques for securing a one-time passcode with an alteration code | Yedidya Dotan, Marco Ciaffi, Igor Shmukler, John Brainard | 2014-12-02 |
| 8825848 | Ordering of event records in an electronic system for forensic analysis | Yedidya Dotan, Assaf Natanzon | 2014-09-02 |
| 8819803 | Validating association of client devices with authenticated clients | Gareth Richards, Yedidya Dotan | 2014-08-26 |
| 8752172 | Processing email messages based on authenticity analysis | Yedidya Dotan | 2014-06-10 |
| 8701199 | Establishing a trusted session from a non-web client using adaptive authentication | Yedidya Dotan, James Christopher Wiese | 2014-04-15 |
| 8694993 | Virtualization platform for secured communications between a user device and an application server | Yedidya Dotan, Boris Kronrod, Orit Yaron, Assaf Shoval | 2014-04-08 |
| 8677472 | Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server | Yedidya Dotan, Yael Villa, Ayelet Levin, Boris Kronrod | 2014-03-18 |
| 8650405 | Authentication using dynamic, client information based PIN | Yedidya Dotan, Oleg Freylafert, Robert S. Philpott, Daniel Salvatore Schiappa | 2014-02-11 |
| 8631486 | Adaptive identity classification | Riaz Zolfonoon, William M. Duane | 2014-01-14 |
| 8327422 | Authenticating a server device using dynamically generated representations | Paul A. Dennis | 2012-12-04 |
| 7810147 | Detecting and preventing replay in authentication systems | William M. Duane, Alexander Volanis | 2010-10-05 |