YD

Yedidya Dotan

EM Emc: 60 patents #16 of 3,345Top 1%
EC Emc Ip Holding Company: 16 patents #246 of 4,608Top 6%
CI Cisco: 15 patents #854 of 13,007Top 7%
📍 Cambridge, MA: #37 of 8,183 inventorsTop 1%
🗺 Massachusetts: #318 of 88,656 inventorsTop 1%
Overall (All Time): #17,639 of 4,157,543Top 1%
91
Patents All Time

Issued Patents All Time

Showing 51–75 of 91 patents

Patent #TitleCo-InventorsDate
9177127 Confounder generation in knowledge-based authentication for an enterprise Shai Gabai 2015-11-03
9152578 Securing data replication, backup and mobility in cloud storage Yossi Saad, Assaf Natanzon 2015-10-06
9154304 Using a token code to control access to data and applications in a mobile platform William M. Duane 2015-10-06
9154556 Managing access to a limited number of computerized sessions Lawrence N. Friedman, Ayelet Biger, Asaf Shoval 2015-10-06
9130753 Authentication using security device with electronic interface Boris Kronrod 2015-09-08
9131374 Knowledge-based authentication for restricting access to mobile devices Ayelet Avni, Ayelet Levin, Bryan Knauss 2015-09-08
9119539 Performing an authentication operation during user access to a computerized resource Lawrence N. Friedman, William M. Duane 2015-09-01
9078129 Knowledge-based authentication for restricting access to mobile devices Ayelet Levin, Ayelet Avni, Boris Kronrod 2015-07-07
9038134 Managing predictions in data security systems Karl Ackerman, Lawrence N. Friedman 2015-05-19
9032490 Techniques for authenticating a user with heightened security Anton Khitrenovich, Oleg Freylafert 2015-05-12
9021271 Injecting code decrypted by a hardware decryption module into Java applications Gareth Richards, Lawrence N. Friedman, Alexander Volanis 2015-04-28
8959650 Validating association of client devices with sessions Gareth Richards, Riaz Zolfonoon, Gregory Dicovitsky 2015-02-17
8955076 Controlling access to a protected resource using multiple user devices Sorin Faibish, John A. Murray, Lawrence N. Friedman 2015-02-10
8955069 Event-based biometric authentication using mobile device Samuel Adams, Philip A. Darringer, Christopher Corde, Lawrence N. Friedman 2015-02-10
8949953 Brokering multiple authentications through a single proxy Anton Khitrenovich, Oleg Freylafert, Lawrence N. Friedman, Karl Ackerman 2015-02-03
8925058 Authentication involving authentication operations which cross reference authentication factors William M. Duane, John G. Linn, Roy Hodgman, Derek Lin 2014-12-30
8918844 Device presence validation Lawrence N. Friedman, Karl Ackerman, Kenneth D. Ray 2014-12-23
8904482 Techniques for securing a one-time passcode with an alteration code Marco Ciaffi, Lawrence N. Friedman, Igor Shmukler, John Brainard 2014-12-02
8904496 Authentication based on a current location of a communications device associated with an entity Daniel V. Bailey, Lawrence N. Friedman, Samuel J. Curry, Riaz Zolfonoon 2014-12-02
8902045 Controlling access to a computerized resource based on authentication using pulse data John G. Linn, William M. Duane, Roy Hodgman 2014-12-02
8875255 Preventing user enumeration by an authentication server John A. Murray 2014-10-28
8856954 Authenticating using organization based information Matthew Robert Hathaway, Richard Perkett, Bryan Knauss, Raanan Lidji 2014-10-07
8850537 Self-tuning knowledge-based authentication Yael Villa, Boris Kronrod 2014-09-30
8839449 Assessing risk of information leakage Yael Villa, Ann S. Johnson 2014-09-16
8825848 Ordering of event records in an electronic system for forensic analysis Assaf Natanzon, Lawrence N. Friedman 2014-09-02