| 11637696 |
End-to-end communication security |
Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai |
2023-04-25 |
| 11271727 |
End-to-end communication security |
Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai |
2022-03-08 |
| 10972441 |
In-place authentication scheme for securing intra-vehicle communication |
Amir Herzberg, Assaf Harel, Tal Efraim Ben David, Amiram Dotan, David Barzilai +1 more |
2021-04-06 |
| 10955562 |
GPS computation cycling |
Dori Waldman, Ran Snir |
2021-03-23 |
| 10903986 |
Cryptographic key management for end-to-end communication security |
Amir Herzberg, Assaf Harel, Tai Efraim Ben David, Amiram Dotan, David Barzilai +1 more |
2021-01-26 |
| 10860448 |
Determining a functional state of a system under test |
Inbar Shani, Jonathan Taragin, Iris Sasson |
2020-12-08 |
| 10824789 |
Managing a presentation |
Adi Kidron, Adam Lahav, Amit Erental |
2020-11-03 |
| 10599506 |
Methods and systems for identifying action for responding to anomaly in cloud computing system |
Ira Cohen, Ohad Assulin, Refael Dakar |
2020-03-24 |
| 10419408 |
In-place authentication scheme for securing intra-vehicle communication |
Amir Herzberg, Assaf Harel, Tal Efraim Ben David, Amiram Dotan, David Barzilai +1 more |
2019-09-17 |
| 10243732 |
Cryptographic key management for end-to-end communication security |
Amir Herzerg, Assaf Harel, Tal Efraim Ben David, Amiram Dotan, David Barzilai +1 more |
2019-03-26 |
| 10009325 |
End-to-end communication security |
Tal Efraim Ben David, Assaf Harel, Amiram Dotan, David Barzilai |
2018-06-26 |
| 9934002 |
Technology recommendation for software environment |
Tomer Priel, Karen Cohen |
2018-04-03 |
| 9836530 |
Determining preferred communication explanations using record-relevancy tiers |
Tomer Priel, Ira Cohen |
2017-12-05 |
| 9811447 |
Generating a fingerprint representing a response of an application to a simulation of a fault of an external service |
Yair Horovitz, Ira Cohen |
2017-11-07 |
| 9703687 |
Monitor usable with continuous deployment |
Inbar Shani, Amichai Nitsan |
2017-07-11 |
| 9575823 |
Recording unstructured events in context |
Erez Yaary, Kobi Eisenberg, Adi Kidron |
2017-02-21 |
| 9411803 |
Responding to natural language queries |
Ohad Assulin, Ira Cohen, Boaz Shor, Alon Sade |
2016-08-09 |
| 9002830 |
Determining reliability of electronic documents associated with events |
Ira Cohen, Gilad Barash, Carl Staelin |
2015-04-07 |
| 8763005 |
Virtual-machine-based application-service provision of front-end versions of back-end applications |
Carl Staelin, Mani Fischer, Oren Ariel, Chen Finkelstein, Nimrod Rod |
2014-06-24 |
| 8504585 |
Matching a user to a conversation |
Ira Cohen, Michal Aharon |
2013-08-06 |
| 8352875 |
System and method for integrating a plurality of software applications |
Christopher Peltz, Inbal Marhaim, Claudio Bantolini, Ruth Bergman, Oren Ariel |
2013-01-08 |
| 8214892 |
Password authentication system and methods |
Ira Cohen |
2012-07-03 |
| 8209567 |
Message clustering of system event logs |
Ira Cohen, Michal Aharon, Gilad Barash |
2012-06-26 |