Issued Patents All Time
Showing 26–50 of 93 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11062056 | Trusted indicators to secure visual outputs | Oleg Pogorelik, Ned M. Smith, Igor Muttik | 2021-07-13 |
| 11004168 | Optical feedback for visual recognition authentication | Igor Muttik, Oleg Pogorelik, Adam Marek | 2021-05-11 |
| 10984096 | Systems, methods, and apparatus for detecting control flow attacks | Koichi Yamada, Sevin F. Varoglu, Ajay Harikumar | 2021-04-20 |
| 10929535 | Controlled introduction of uncertainty in system operating parameters | Vadim Sukhomlinov, Kshitij A. Doshi, Francesc Guim | 2021-02-23 |
| 10826877 | Secure service matching | Oleg Pogorelik, Omer Ben-Shalom, Igor Muttik | 2020-11-03 |
| 10819780 | Protected data collection in a multi-node network | Oleg Pogorelik, Ned M. Smith, Igor Muttik, Michael Raziel | 2020-10-27 |
| 10790978 | Technologies for collective authorization with hierarchical group keys | Ned M. Smith, Omer Ben-Shalom | 2020-09-29 |
| 10778667 | Methods and apparatus to enhance security of authentication | Igor Muttik, Adam Marek | 2020-09-15 |
| 10764635 | Aggregated stress monitoring to guide user interaction | Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa +2 more | 2020-09-01 |
| 10737784 | Drones and methods to deliver payloads to private locations | Oleg Pogorelik, Glen J. Anderson, Carl S. Marshall | 2020-08-11 |
| 10693866 | System, apparatus and method for first hop security | Omer Ben-Shalom, Ned M. Smith | 2020-06-23 |
| 10635823 | Compiling techniques for hardening software programs against branching programming exploits | Daniel Fernando Gutson, Vadim Sukhomlinov, Dmitry Y. Babokin | 2020-04-28 |
| 10621977 | Trusted speech transcription | Oleg Pogorelik, Igor Muttik, Adi Shaliv | 2020-04-14 |
| 10621399 | QR image based device management | Oleg Pogorelik, Hong Li, Justin Lipman | 2020-04-14 |
| 10601898 | Measurements exchange network, such as for internet-of-things (IoT) devices | Oleg Pogorelik, Igor Tatourian, Omer Ben-Shalom | 2020-03-24 |
| 10581617 | Method and apparatus for hardware based file/document expiry timer enforcement | Hormuzd M. Khosravi, Igor Muttik | 2020-03-03 |
| 10540524 | Memory access protection using processor transactional memory support | Roman Dementiev, Igor Muttik | 2020-01-21 |
| 10516657 | Methods and apparatus to enhance security of authentication | Igor Muttik, Adam Marek | 2019-12-24 |
| 10498715 | Protecting user identity by sharing a secret between personal IoT devices | Oleg Pogorelik, Igor Muttik, Justin Lipman | 2019-12-03 |
| 10469524 | Techniques for integrated endpoint and network detection and eradication of attacks | Omer Ben-Shalom, Igor Muttik, Yaniv Avidan | 2019-11-05 |
| 10469253 | Methods and apparatus for migrating keys | Ned M. Smith | 2019-11-05 |
| 10440046 | Technologies for anonymous context attestation and threat analytics | Abhilasha Bhargav-Spantzel, Hormuzd M. Khosravi | 2019-10-08 |
| 10437998 | Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection | Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Vadim Sukhomlinov, Igor Muttik, Oleksandr Bazhaniuk +6 more | 2019-10-08 |
| 10404692 | Trust establishment between a trusted execution environment and peripheral devices | Avishay Sharaga, Oleg Pogorelik, Igor Muttik, Ned M. Smith | 2019-09-03 |
| 10402571 | Community-based de-duplication for encrypted data | Omer Ben-Shalom, Terry H. Yoshii | 2019-09-03 |