Issued Patents All Time
Showing 26–50 of 58 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10402571 | Community-based de-duplication for encrypted data | Alex Nayshtut, Terry H. Yoshii | 2019-09-03 |
| 10382454 | Data mining algorithms adopted for trusted execution environment | Yaniv Avidan, Alex Nayshtut, Igor Muttik | 2019-08-13 |
| 10375080 | Supervised online identity | Alex Nayshtut, Hong Li | 2019-08-06 |
| 10318746 | Provable traceability | Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik | 2019-06-11 |
| 10157273 | Eye movement based knowledge demonstration | Eran Birk, Shai Kavas, Michal Jacob | 2018-12-18 |
| 10148624 | Secure service matching | Alex Nayshtut, Oleg Pogorelik, Igor Muttik | 2018-12-04 |
| 10027717 | Peer-to-peer group vigilance | Alex Nayshtut, Oleg Pogorelik, Igor Muttik | 2018-07-17 |
| 9979749 | Network security elements using endpoint resources | Uri Blumenthal | 2018-05-22 |
| 9912645 | Methods and apparatus to securely share data | Ned M. Smith, Alex Nayshtut | 2018-03-06 |
| 9848035 | Measurements exchange network, such as for internet-of-things (IoT) devices | Oleg Pogorelik, Alex Nayshtut, Alan Tatourian | 2017-12-19 |
| 9705916 | Integrating wireless input functionality into secure elements | Alex Nayshtut, Moshe Maor | 2017-07-11 |
| 9680849 | Rootkit detection by using hardware resources to detect inconsistencies in network traffic | Alex Nayshtut, Igor Muttik | 2017-06-13 |
| 9614857 | Supervised online identity | Alex Nayshtut, Hong Li | 2017-04-04 |
| 9602500 | Secure import and export of keying material | Alex Nayshtut, Hormuzd M. Khosravi, Barry R. Pivitt, Ned M. Smith | 2017-03-21 |
| 9594958 | Detection of spoofing attacks for video-based authentication | Oren Duenias, Shachaf Levi, Ayelet Naor | 2017-03-14 |
| 9578037 | Allowing varied device access based on different levels of unlocking mechanisms | Keith L. Shippy, Tobias M. Kohlenberg, Mubashir A. Mian, Ned M. Smith, Tarun Viswanathan +4 more | 2017-02-21 |
| 9565684 | Systems and methods for avoiding interference for a peer-to-peer network connection | Omri Barkay | 2017-02-07 |
| 9530294 | Methods and apparatus for pairing items for security | Eran Birk, Yosi Govezensky, Yoram Hassidim | 2016-12-27 |
| 9519768 | Eye movement based knowledge demonstration | Eran Birk, Shai Kavas, Michal Jacob | 2016-12-13 |
| 9503433 | Method and apparatus for cloud-assisted cryptography | Alex Nayshtut, Ned M. Smith, Edward V. Jimison, Hormuzd M. Khosravi | 2016-11-22 |
| 9411975 | Methods and apparatus to securely share data | Ned M. Smith, Alex Nayshtut | 2016-08-09 |
| 9386272 | Technologies for audiovisual communication using interestingness algorithms | Sigal Louchheim | 2016-07-05 |
| 9246678 | Secure cloud storage and encryption management system | Alex Nayshtut, Edward V. Jimison, Michael Raziel | 2016-01-26 |
| 9223952 | Allowing varied device access based on different levels of unlocking mechanisms | Keith L. Shippy, Tobias M. Kohlenberg, Mubashir A. Mian, Ned M. Smith, Tarun Viswanathan +4 more | 2015-12-29 |
| 9207945 | Multi-persona computing based on real time user recognition | Shachaf Levi | 2015-12-08 |