| 11374930 |
Techniques for extending communications chain of trust to client applications |
Jesse Walker |
2022-06-28 |
| 11019084 |
Controller, a context broadcaster and an alert processing device |
Oleg Pogorelik, Glen J. Anderson, Michael Kara-Ivanov |
2021-05-25 |
| 10764635 |
Aggregated stress monitoring to guide user interaction |
Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Giuseppe Raffa, Oleg Pogorelik +2 more |
2020-09-01 |
| 10621977 |
Trusted speech transcription |
Oleg Pogorelik, Alex Nayshtut, Igor Muttik |
2020-04-14 |
| 10187385 |
Techniques for extending communications chain of trust to client applications |
Jesse Walker |
2019-01-22 |
| 10158914 |
Aggregated stress monitoring to guide user interaction |
Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Giuseppe Raffa, Oleg Pogorelik +2 more |
2018-12-18 |
| 9798895 |
Platform identity architecture with a temporary pseudonymous identity |
Alex Nayshtur, Ned M. Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel +3 more |
2017-10-24 |
| 9564773 |
Methods and systems for optimizing location-based wireless charging |
Oleg Pogorelik, Justin Lipman, Shahar Porat |
2017-02-07 |
| 9479998 |
Systems and methods for authenticating devices by complying with wireless guidelines based on device location |
David Birnbaum, Guy Halperin, Eran Friedlander |
2016-10-25 |
| 9467430 |
Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware |
Ned M. Smith, David Johnston, George W. Cox |
2016-10-11 |
| 9319835 |
Securely managed location-and-tracking service access |
Ned M. Smith |
2016-04-19 |
| 8954735 |
Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware |
Ned M. Smith, David Johnston, George W. Cox |
2015-02-10 |
| 8862882 |
Systems and methods for authenticating devices by adding secure features to Wi-Fi tags |
David Birnbaum |
2014-10-14 |
| 8832783 |
System and method for performing secure communications |
Omer Ben-Shalom, Alex Nayshtut, Edward V. Jimison, Avigdor Eldar |
2014-09-09 |
| 8339971 |
Network protection via embedded controls |
Omer Ben-Shalom |
2012-12-25 |
| 7710887 |
Network protection via embedded controls |
Omer Ben-Shalom |
2010-05-04 |