Issued Patents All Time
Showing 51–75 of 91 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9177127 | Confounder generation in knowledge-based authentication for an enterprise | Shai Gabai | 2015-11-03 |
| 9152578 | Securing data replication, backup and mobility in cloud storage | Yossi Saad, Assaf Natanzon | 2015-10-06 |
| 9154304 | Using a token code to control access to data and applications in a mobile platform | William M. Duane | 2015-10-06 |
| 9154556 | Managing access to a limited number of computerized sessions | Lawrence N. Friedman, Ayelet Biger, Asaf Shoval | 2015-10-06 |
| 9130753 | Authentication using security device with electronic interface | Boris Kronrod | 2015-09-08 |
| 9131374 | Knowledge-based authentication for restricting access to mobile devices | Ayelet Avni, Ayelet Levin, Bryan Knauss | 2015-09-08 |
| 9119539 | Performing an authentication operation during user access to a computerized resource | Lawrence N. Friedman, William M. Duane | 2015-09-01 |
| 9078129 | Knowledge-based authentication for restricting access to mobile devices | Ayelet Levin, Ayelet Avni, Boris Kronrod | 2015-07-07 |
| 9038134 | Managing predictions in data security systems | Karl Ackerman, Lawrence N. Friedman | 2015-05-19 |
| 9032490 | Techniques for authenticating a user with heightened security | Anton Khitrenovich, Oleg Freylafert | 2015-05-12 |
| 9021271 | Injecting code decrypted by a hardware decryption module into Java applications | Gareth Richards, Lawrence N. Friedman, Alexander Volanis | 2015-04-28 |
| 8959650 | Validating association of client devices with sessions | Gareth Richards, Riaz Zolfonoon, Gregory Dicovitsky | 2015-02-17 |
| 8955076 | Controlling access to a protected resource using multiple user devices | Sorin Faibish, John A. Murray, Lawrence N. Friedman | 2015-02-10 |
| 8955069 | Event-based biometric authentication using mobile device | Samuel Adams, Philip A. Darringer, Christopher Corde, Lawrence N. Friedman | 2015-02-10 |
| 8949953 | Brokering multiple authentications through a single proxy | Anton Khitrenovich, Oleg Freylafert, Lawrence N. Friedman, Karl Ackerman | 2015-02-03 |
| 8925058 | Authentication involving authentication operations which cross reference authentication factors | William M. Duane, John G. Linn, Roy Hodgman, Derek Lin | 2014-12-30 |
| 8918844 | Device presence validation | Lawrence N. Friedman, Karl Ackerman, Kenneth D. Ray | 2014-12-23 |
| 8904482 | Techniques for securing a one-time passcode with an alteration code | Marco Ciaffi, Lawrence N. Friedman, Igor Shmukler, John Brainard | 2014-12-02 |
| 8904496 | Authentication based on a current location of a communications device associated with an entity | Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry, Riaz Zolfonoon | 2014-12-02 |
| 8902045 | Controlling access to a computerized resource based on authentication using pulse data | John G. Linn, William M. Duane, Roy Hodgman | 2014-12-02 |
| 8875255 | Preventing user enumeration by an authentication server | John A. Murray | 2014-10-28 |
| 8856954 | Authenticating using organization based information | Matthew Robert Hathaway, Richard Perkett, Bryan Knauss, Raanan Lidji | 2014-10-07 |
| 8850537 | Self-tuning knowledge-based authentication | Yael Villa, Boris Kronrod | 2014-09-30 |
| 8839449 | Assessing risk of information leakage | Yael Villa, Ann S. Johnson | 2014-09-16 |
| 8825848 | Ordering of event records in an electronic system for forensic analysis | Assaf Natanzon, Lawrence N. Friedman | 2014-09-02 |