Issued Patents All Time
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10349274 | Simplified login for a computing system | Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman | 2019-07-09 |
| 9832642 | Simplified login for mobile devices | Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman | 2017-11-28 |
| 9154505 | Simplified login for mobile devices | Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman | 2015-10-06 |
| 9055107 | Authentication delegation based on re-verification of cryptographic evidence | Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, Paul J. Leach | 2015-06-09 |
| 9049262 | Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol | Alex MASSOVER, Gustavo Garcia | 2015-06-02 |
| 8955108 | Security virtual machine for advanced auditing | R. Eric Fitzgerald, Leonid Verny | 2015-02-10 |
| 8954897 | Protecting a virtual guest machine from attacks by an infected host | Noam Ben-Yochanan, Nir Nice | 2015-02-10 |
| 8881247 | Federated mobile authentication using a network operator infrastructure | Meir Mendelovich, Khaja E. Ahmed | 2014-11-04 |
| 8799985 | Automated security classification and propagation of virtualized and physical virtual machines | Anders Vinberg, Yair Tor, Oleg Ananiev | 2014-08-05 |
| 8726334 | Model based systems management in virtualized and non-virtualized environments | Yigal Edery, Yan Belinky, Anders Vinberg, Dennis Batchelder, Shimon Yannay | 2014-05-13 |
| 8719582 | Access control using identifiers in links | Nir Nice | 2014-05-06 |
| 8677479 | Detection of adversaries through collection and correlation of assessments | Efim Hudis | 2014-03-18 |
| 8631237 | Simplified login for mobile devices | Meir Mendelovich, Ken Aoyama, Nir Nice, Shay Yehuda Gurman | 2014-01-14 |
| 8607305 | Collecting anonymous and traceable telemetry | Arie Friedman, Gregory Aaron Kohanim, Adam Shostack | 2013-12-10 |
| 8424094 | Automated collection of forensic evidence associated with a network security incident | Efim Hudis, Yair Helman, Alexandra Faynburd | 2013-04-16 |
| 8341720 | Information protection applied by an intermediary device | Noam Ben-Yochanan, Nir Nice, Max Uritsky, Rushmi U. Malaviarachchi | 2012-12-25 |
| 8286133 | Fuzzing encoded data | Nissim Natanov | 2012-10-09 |
| 8136095 | Relations in fuzzing data | Nissim Natanov | 2012-03-13 |
| 7953969 | Reduction of false positive reputations through collection of overrides from customer deployments | Efim Hudis | 2011-05-31 |
| 7926114 | Testing software applications with schema-based fuzzing | Nissim Natanov | 2011-04-12 |
| 7882542 | Detecting compromised computers by correlating reputation data with web access logs | Efim Hudis, Yair Helman, Alexandra Faynburd | 2011-02-01 |