Issued Patents All Time
Showing 26–50 of 91 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9535955 | Modifying queries and rules for profile fetching and risk calculation | Oded Peer, Oleg Freylafert, Asaf Shoval, Eyal Lewinsohn | 2017-01-03 |
| 9521167 | Generalized security policy user interface | Robin Martherus, Guy Telner, Denis Knjazihhin | 2016-12-13 |
| 9516059 | Using mock tokens to protect against malicious activity | Lawrence N. Friedman, Amit Monovich, Alexander Volanis | 2016-12-06 |
| 9514407 | Question generation in knowledge-based authentication from activity logs | Ayelet Levin, Ayelet Avni, Ayelet Eliezer | 2016-12-06 |
| 9507947 | Similarity-based data loss prevention | — | 2016-11-29 |
| 9467343 | Collaborative analytics for independently administered network domains | Brian Girardi, Marcelo Blatt, Oleg Freylafert, Kevin D. Bowers, Michael S. Shreve | 2016-10-11 |
| 9455972 | Provisioning a mobile device with a security application on the fly | Lawrence N. Friedman, Gareth Richards | 2016-09-27 |
| 9430634 | Authentication using gesture passwords | Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards | 2016-08-30 |
| 9407441 | Adding entropy to key generation on a mobile device | Lawrence N. Friedman, Daniel V. Bailey, John Brainard, William M. Duane | 2016-08-02 |
| 9405897 | Authenticating an entity | Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry | 2016-08-02 |
| 9401933 | Classification of security policies across multiple security products | Sanjay Agarwal, Robin Martherus | 2016-07-26 |
| 9397992 | Authentication using color-shape pairings | Daniel V. Bailey, Lawrence N. Friedman, Gareth Richards | 2016-07-19 |
| 9356968 | Managing authentication using common authentication framework circuitry | Kayvan Alikhani, Mohsen Emami-Nouri, Vadim Bruk, Andrew Luke, Lawrence N. Friedman | 2016-05-31 |
| 9332434 | Policy based location collection for authentication | Lawrence N. Friedman, Shane Rice | 2016-05-03 |
| 9332433 | Distributing access and identification tokens in a mobile environment | Lawrence N. Friedman, Riaz Zolfonoon, Gareth Richards, Guoying Luo | 2016-05-03 |
| 9305151 | Risk-based authentication using lockout states | Lakshmi Suresh, John Watts, Marcelo Blatt | 2016-04-05 |
| 9282114 | Generation of alerts in an event management system based upon risk | Lawrence N. Friedman, Manoj Nair, Riaz Zolfonoon | 2016-03-08 |
| 9240986 | Managing security and wireless signal detection | Karl Ackerman, William Duane | 2016-01-19 |
| 9237143 | User authentication avoiding exposure of information about enumerable system resources | Lakshmi Suresh, John Watts, Paul A. Dennis | 2016-01-12 |
| 9230066 | Assessing risk for third-party data collectors | Daniel V. Bailey, Lawrence N. Friedman | 2016-01-05 |
| 9225700 | Proximity-based authentication | Lawrence N. Friedman, Karl G. Kowalski, Piers Bowness | 2015-12-29 |
| 9202173 | Using link analysis in adversarial knowledge-based authentication model | Ayelet Eliezer, Lawrence N. Friedman | 2015-12-01 |
| 9202035 | User authentication based on biometric handwriting aspects of a handwritten code | Yuri Manusov, Oleg Freylafert, Anton Khitrenovich | 2015-12-01 |
| 9183595 | Using link strength in knowledge-based authentication | Ayelet Avni, Ayelet Eliezer | 2015-11-10 |
| 9178880 | Gateway mediated mobile device authentication | John G. Linn, Christopher Corde, Philip A. Darringer, Robert S. Philpott | 2015-11-03 |