Issued Patents All Time
Showing 26–50 of 66 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10116580 | Seamless location aware network connectivity | Ehud Mordechai Itshaki, Eugene John Neystadt, Noam Ben-Yochanan | 2018-10-30 |
| 9898773 | Multilingual content based recommendation system | Noam Koenigstein, Shay BEN-ELAZAR, Shahar Keren, Ulrich Paquet, Yehuda Finkelstein | 2018-02-20 |
| 9832642 | Simplified login for mobile devices | Meir Mendelovich, John Neystadt, Ken Aoyama, Shay Yehuda Gurman | 2017-11-28 |
| 9819677 | Supplementing biometric identification with device identification | Eyal Krupka | 2017-11-14 |
| 9454580 | Recommendation system with metric transformation | Noam Koenigstein, Ulrich Paquet, Ran Gilad-Bachrach, Liran Katzir | 2016-09-27 |
| 9443084 | Authentication in a network using client health enforcement framework | Anat Eyal, Chandrasekhar Nukala, Sreenivas Addagatla, Eugene (John) Neystadt | 2016-09-13 |
| 9436816 | Supplementing biometric identification with device identification | Eyal Krupka | 2016-09-06 |
| 9348898 | Recommendation system with dual collaborative filter usage matrix | Noam Koenigstein, Ulrich Paquet, Shahar Keren | 2016-05-24 |
| 9336546 | Recommendation system with multi-dimensional discovery experience | Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton, Amit Perelstein | 2016-05-10 |
| 9256693 | Recommendation system with metric transformation | Noam Koenigstein, Ulrich Paquet, Ran Gilad-Bachrach, Liran Katzir | 2016-02-09 |
| 9231964 | Vulnerability detection based on aggregated primitives | David B. Cross | 2016-01-05 |
| 9208155 | Adaptive recommendation system | Dror Kremer, Daniel Sitton, Michael Feldman, Shimon Shlevich, Ori Folger | 2015-12-08 |
| 9154505 | Simplified login for mobile devices | Meir Mendelovich, John Neystadt, Ken Aoyama, Shay Yehuda Gurman | 2015-10-06 |
| 9055107 | Authentication delegation based on re-verification of cryptographic evidence | Gennady Medvinsky, Tomer Shiran, Alexander Teplitsky, Paul J. Leach, John Neystadt | 2015-06-09 |
| 8983888 | Efficient modeling system for user recommendation using matrix factorization | Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton, Dror Kremer +1 more | 2015-03-17 |
| 8983859 | User centric real-time advertisement bidding | Uri Barash, Ying Li, Michael Goldbach, William H. Gates, III | 2015-03-17 |
| 8959596 | One-time password validation in a multi-entity environment | Ron Mondri, Tomer Shiran, Boaz Ein-Gil | 2015-02-17 |
| 8954897 | Protecting a virtual guest machine from attacks by an infected host | John Neystadt, Noam Ben-Yochanan | 2015-02-10 |
| 8935742 | Authentication in a globally distributed infrastructure for secure content management | Oleg Ananiev, John Wohlfert, Amit Finkelstein, Alik Teplitsky | 2015-01-13 |
| 8910268 | Enterprise security assessment sharing for consumers using globally distributed infrastructure | Efim Hudis, Yigal Edery, Oleg Ananiev, John Wohlfert | 2014-12-09 |
| 8910255 | Authentication for distributed secure content management system | Oleg Ananiev, John Wohlfert, Amit Finkelstein, Alexander Teplitsky | 2014-12-09 |
| 8910270 | Remote access to private network resources from outside the network | Amit Finkelstein, Dror Kremer, Noam Ben-Yochanan, Shyam Seshadri | 2014-12-09 |
| 8881223 | Enterprise security assessment sharing for off-premise users using globally distributed infrastructure | Efim Hudis, Yigal Edery, Oleg Ananiev, John Wohlfert | 2014-11-04 |
| 8874693 | Service access using a service address | Jeromy S. Statia, Samer J. Karim | 2014-10-28 |
| 8849897 | Delegating application invocation back to client | Amos Ortal, Ashwin Palekar, Craig A. Nelson, Paresh Ramchandra Haridas | 2014-09-30 |
