| 10742642 |
User authentication based on predictive applications |
Fady Copty, Ayman Jarrous, Sharon Keidar-Barner, Shiri Lemel |
2020-08-11 |
| 9667613 |
Detecting mobile device emulation |
Tamar Wisemon, Ika Bar-Menachem, Maya Herskovic, Theodor Mihalache, Aviv Avital |
2017-05-30 |
| 9514407 |
Question generation in knowledge-based authentication from activity logs |
Yedidya Dotan, Ayelet Levin, Ayelet Eliezer |
2016-12-06 |
| 9183595 |
Using link strength in knowledge-based authentication |
Ayelet Eliezer, Yedidya Dotan |
2015-11-10 |
| 9152775 |
Question generation in knowledge-based authentication for an enterprise |
Boris Kronrod, Lior Nudelman, Oren Menes |
2015-10-06 |
| 9131374 |
Knowledge-based authentication for restricting access to mobile devices |
Ayelet Levin, Bryan Knauss, Yedidya Dotan |
2015-09-08 |
| 9092599 |
Managing knowledge-based authentication systems |
Boris Kronrod, Lior Nudelman, Oren Menes |
2015-07-28 |
| 9078129 |
Knowledge-based authentication for restricting access to mobile devices |
Yedidya Dotan, Ayelet Levin, Boris Kronrod |
2015-07-07 |
| 8776195 |
Common data format in knowledge-based authentication |
Bryan Knauss, Yedidya Dotan, Erez Yakoel |
2014-07-08 |