| 10616196 |
User authentication with multiple authentication sources and non-binary authentication decisions |
Anton Khitrenovich |
2020-04-07 |
| 10148673 |
Automatic selection of malicious activity detection rules using crowd-sourcing techniques |
Zohar Duchin, Alon Kaufman, Lior Asher, Alex Zaslavsky |
2018-12-04 |
| 9967265 |
Detecting malicious online activities using event stream processing over a graph database |
Oded Peer, Anton Khitrenovich, Yana Vaisman |
2018-05-08 |
| 9838355 |
Collaborative analytics for independently administered network domains |
Yedidya Dotan, Brian Girardi, Marcelo Blatt, Kevin D. Bowers, Michael S. Shreve |
2017-12-05 |
| 9779220 |
Obscuring data using on-the-fly retokenizable tokens |
Boris Kronrod, Shadi Ibrahim |
2017-10-03 |
| 9594911 |
Methods and apparatus for multi-factor authentication risk detection using beacon images |
Anton Khitrenovich, Yedidya Dotan, Maor Franco |
2017-03-14 |
| 9535955 |
Modifying queries and rules for profile fetching and risk calculation |
Yedidya Dotan, Oded Peer, Asaf Shoval, Eyal Lewinsohn |
2017-01-03 |
| 9467343 |
Collaborative analytics for independently administered network domains |
Yedidya Dotan, Brian Girardi, Marcelo Blatt, Kevin D. Bowers, Michael S. Shreve |
2016-10-11 |
| 9202035 |
User authentication based on biometric handwriting aspects of a handwritten code |
Yuri Manusov, Yedidya Dotan, Anton Khitrenovich |
2015-12-01 |
| 9032490 |
Techniques for authenticating a user with heightened security |
Anton Khitrenovich, Yedidya Dotan |
2015-05-12 |
| 8949953 |
Brokering multiple authentications through a single proxy |
Anton Khitrenovich, Yedidya Dotan, Lawrence N. Friedman, Karl Ackerman |
2015-02-03 |
| 8875244 |
Method and apparatus for authenticating a user using dynamic client-side storage values |
Alex Vaystikh |
2014-10-28 |
| 8683568 |
Using packet interception to integrate risk-based user authentication into online services |
Anton Khitrenovich, Oded Peer |
2014-03-25 |
| 8650405 |
Authentication using dynamic, client information based PIN |
Yedidya Dotan, Lawrence N. Friedman, Robert S. Philpott, Daniel Salvatore Schiappa |
2014-02-11 |