Issued Patents All Time
Showing 25 most recent of 32 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12406539 | Diagnostic protocol search with improved efficiency | Charles Lee Murphy | 2025-09-02 |
| 12379507 | Identifying and partitioning legitimate GNSS satellite signals from illegitimate GNSS satellite signals using a contrario method | — | 2025-08-05 |
| 12379729 | Machine-learning-driven supply chain out-of-stock inventory resolution and contract negotiation | Charles Howard Cella, Andrew John Cardno, Jenna Parenti, Andrew S. Locke, Brad Kell +8 more | 2025-08-05 |
| 12314060 | Value chain network planning using machine learning and digital twin simulation | Charles Howard Cella, Andrew John Cardno, Jenna Parenti, Andrew S. Locke, Brad Kell +8 more | 2025-05-27 |
| 12271870 | Rapid online clustering | Avishay Meron, Xing Wang, Adam Cohen, Chunmao Ran | 2025-04-08 |
| 12256011 | Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information | Ryan Vilim, John Wittrock | 2025-03-18 |
| 12069053 | Secure methods, systems, and media for generating and verifying user credentials | John Wittrock | 2024-08-20 |
| 11979497 | Identity systems, methods, and media for auditing and notifying users concerning verifiable claims | John Wittrock | 2024-05-07 |
| 11811742 | Methods, systems, and media for recovering identity information in verifiable claims-based systems | John Wittrock | 2023-11-07 |
| 11782166 | Identifying and partitioning legitimate GNSS satellite signals from illegitimate GNSS satellite signals using a contrario method | — | 2023-10-10 |
| 11711215 | Methods, systems, and media for secure authentication of users based on a biometric identifier and knowledge-based secondary information | Ryan Vilim, John Wittrock | 2023-07-25 |
| 11652819 | Secure methods, systems, and media for generating and verifying user credentials | John Wittrock | 2023-05-16 |
| 11507631 | Rapid online clustering | Avishay Meron, Xing Wang, Adam Cohen, Chunmao Ran | 2022-11-22 |
| 11231504 | Identifying and partitioning legitimate GNSS satellite signals from illegitimate GNSS satellite signals using a contrario method | — | 2022-01-25 |
| 11115207 | Identity systems, methods, and media for auditing and notifying users concerning verifiable claims | John Wittrock | 2021-09-07 |
| 11108760 | Methods, systems, and media for recovering identity information in verifiable claims-based systems | John Wittrock | 2021-08-31 |
| 11038903 | System security configurations based on assets associated with activities | Adam Cohen, Itzik Levi | 2021-06-15 |
| 10866995 | Rapid online clustering | Avishay Meron, Xing Wang, Adam Cohen, Chunmao Ran | 2020-12-15 |
| 10754041 | Identifying and partitioning legitimate GNSS satellite signals from illegitimate GNSS satellite signals using a contrario method | — | 2020-08-25 |
| 10659491 | Dynamic detection of geo-location obfuscation in of internet devices | Avihay Nathan, Uri Arad, Oded Argon, Lev Faivishevsky, Roi Lupo | 2020-05-19 |
| 10650361 | Method and system for analyzing copyright information in a mixed long-format audio file | — | 2020-05-12 |
| 10586235 | Database optimization concepts in fast response environments | Xing Wang, Adam Cohen, Chunmao Ran, Itzik Levi, Doron Hai-Reuven | 2020-03-10 |
| 10412099 | System security configurations based on assets associated with activities | Adam Cohen, Itzik Levi | 2019-09-10 |
| 10115151 | Computerized method and system for dynamcially creating and updating a user interface | Nicholas Rosenthal, Robert Arbittier, Nir Golan | 2018-10-30 |
| 10102743 | Stability control sharing | — | 2018-10-16 |