Issued Patents All Time
Showing 51–75 of 75 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10601846 | Neutralizing malicious locators | Aditya Kuppa, Suchin Gururangan, Andrew Reece | 2020-03-24 |
| 10594655 | Classifying locator generation kits | Aditya Kuppa, Suchin Gururangan, Andrew Reece | 2020-03-17 |
| 10462162 | Detecting malicious processes based on process location | Oliver Keyes, Wah-Kwan Lin, Michael Scutt, Timothy Stiller | 2019-10-29 |
| 10447734 | Monitoring scan attempts in a network | Jeffrey D. Myers | 2019-10-15 |
| 10205704 | Classifying locator generation kits | Aditya Kuppa, Suchin Gururangan, Andrew Reece | 2019-02-12 |
| 10200383 | Neutralizing malicious locators | Aditya Kuppa, Suchin Gururangan, Andrew Reece | 2019-02-05 |
| 10033757 | Identifying malicious identifiers | Aditya Kuppa, Suchin Gururangan, Andrew Reece | 2018-07-24 |
| 9830599 | Human interaction detection | Amnon Khen, Alon Kaufman | 2017-11-28 |
| 9660813 | Dynamic privacy management for communications of clients in privacy-preserving groups | Marten Van Dijk, Eyal Kolman | 2017-05-23 |
| 9594968 | Biometric profile creation | Christopher Corde, Joshua Ungar, John G. Linn, Todd A. Morneau | 2017-03-14 |
| 9405891 | User authentication | Christopher Corde, Joshua Ungar, John G. Linn, Todd A. Morneau | 2016-08-02 |
| 9264444 | Systems and methods for determining an objective security assessment for a network of assets | HD Moore, Dana Elizabeth Wolf, Matthew Robert Hathaway | 2016-02-16 |
| 9122857 | Authenticating a user in an authentication system | Daniel Hassan, Shai Granot | 2015-09-01 |
| 9021255 | Techniques for multiple independent verifications for digital certificates | Idan Aharoni, Ingo Schubert | 2015-04-28 |
| 9015231 | Distributed anonymized communications | Marten Van Dijk, Eyal Kolman | 2015-04-21 |
| 8924726 | Robust message encryption | Daniel Hassan | 2014-12-30 |
| 8925058 | Authentication involving authentication operations which cross reference authentication factors | Yedidya Dotan, William M. Duane, John G. Linn, Derek Lin | 2014-12-30 |
| 8910281 | Identifying malware sources using phishing kit templates | Idan Aharoni | 2014-12-09 |
| 8904524 | Detection of fast flux networks | — | 2014-12-02 |
| 8904525 | Techniques for detecting malware on a mobile device | Samir Dilipkumar Saklikar, Kevin D. Bowers | 2014-12-02 |
| 8902045 | Controlling access to a computerized resource based on authentication using pulse data | John G. Linn, William M. Duane, Yedidya Dotan | 2014-12-02 |
| 8902043 | Mitigating conformational bias in authentication systems | Karl Ackerman, Kenneth D. Ray, Lawrence N. Friedman, Roy Dagan, Alex Vaystikh | 2014-12-02 |
| 8855312 | Mobile trust broker | Samir Dilipkumar Saklikar | 2014-10-07 |
| 8683452 | Dynamically obfuscated javascript | Ofer Mizrach, Ofri Mann, Alex Vaystikh | 2014-03-25 |
| 8528049 | Techniques of providing authentication from computer pointer interactions | Amnon Khen, Alon Kaufman | 2013-09-03 |