| 10349274 |
Simplified login for a computing system |
Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman |
2019-07-09 |
| 9832642 |
Simplified login for mobile devices |
Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman |
2017-11-28 |
| 9154505 |
Simplified login for mobile devices |
Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman |
2015-10-06 |
| 9055107 |
Authentication delegation based on re-verification of cryptographic evidence |
Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, Paul J. Leach |
2015-06-09 |
| 9049262 |
Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol |
Alex MASSOVER, Gustavo Garcia |
2015-06-02 |
| 8955108 |
Security virtual machine for advanced auditing |
R. Eric Fitzgerald, Leonid Verny |
2015-02-10 |
| 8954897 |
Protecting a virtual guest machine from attacks by an infected host |
Noam Ben-Yochanan, Nir Nice |
2015-02-10 |
| 8881247 |
Federated mobile authentication using a network operator infrastructure |
Meir Mendelovich, Khaja E. Ahmed |
2014-11-04 |
| 8799985 |
Automated security classification and propagation of virtualized and physical virtual machines |
Anders Vinberg, Yair Tor, Oleg Ananiev |
2014-08-05 |
| 8726334 |
Model based systems management in virtualized and non-virtualized environments |
Yigal Edery, Yan Belinky, Anders Vinberg, Dennis Batchelder, Shimon Yannay |
2014-05-13 |
| 8719582 |
Access control using identifiers in links |
Nir Nice |
2014-05-06 |
| 8677479 |
Detection of adversaries through collection and correlation of assessments |
Efim Hudis |
2014-03-18 |
| 8631237 |
Simplified login for mobile devices |
Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman |
2014-01-14 |
| 8607305 |
Collecting anonymous and traceable telemetry |
Arie Friedman, Gregory Aaron Kohanim, Adam Shostack |
2013-12-10 |
| 8424094 |
Automated collection of forensic evidence associated with a network security incident |
Efim Hudis, Yair Helman, Alexandra Faynburd |
2013-04-16 |
| 8341720 |
Information protection applied by an intermediary device |
Noam Ben-Yochanan, Nir Nice, Max Uritsky, Rushmi U. Malaviarachchi |
2012-12-25 |
| 8286133 |
Fuzzing encoded data |
Nissim Natanov |
2012-10-09 |
| 8136095 |
Relations in fuzzing data |
Nissim Natanov |
2012-03-13 |
| 7953969 |
Reduction of false positive reputations through collection of overrides from customer deployments |
Efim Hudis |
2011-05-31 |
| 7926114 |
Testing software applications with schema-based fuzzing |
Nissim Natanov |
2011-04-12 |
| 7882542 |
Detecting compromised computers by correlating reputation data with web access logs |
Efim Hudis, Yair Helman, Alexandra Faynburd |
2011-02-01 |