| 9985968 |
Techniques to authenticate a client to a proxy through a domain name server intermediary |
Dekel Shmuel Naar, Gahl Saraf, Guy Yonish, Roi Tiger |
2018-05-29 |
| 9961574 |
Techniques to identify applications based on network traffic |
Nimrod Priell, Israel Nir, Dekel Shmuel Naar |
2018-05-01 |
| 9960977 |
Techniques to identify application foreground / background state based on network traffic |
Nimrod Priell, Israel Nir |
2018-05-01 |
| 9769323 |
Techniques for zero rating through redirection |
Dekel Schmuel Naar, Roi Tiger, Guy Rosen, Joshua Ryan Lauer, Xiaoliang Wei |
2017-09-19 |
| 9692909 |
Techniques for zero rating through web reconstruction |
Dekel Schmuel Naar, Roi Tiger, Guy Rosen, Joshua Ryan Lauer, Xiaoliang Wei |
2017-06-27 |
| 9674149 |
System and method for establishing a virtual private network of a mobile device through a preferred network |
Roi Tiger, Gadi Elishayov, Eran FRIEDMAN |
2017-06-06 |
| 9602468 |
Techniques to authenticate a client to a proxy through a domain name server intermediary |
Dekel Shmuel Naar, Gahl Saraf, Guy Yonish, Roi Tiger |
2017-03-21 |
| 9491223 |
Techniques for determining a mobile application download attribution |
Roi Tiger, Nimrod Priell, Eran FRIDMAN, Gadi Eliashiv |
2016-11-08 |