Patent | Date |
---|
User interface for low-touch security policy provisioning Grant 10,666,683 - Sward , et al. | 2020-05-26 |
Providing network behavior visibility based on events logged by network security devices Grant 10,623,371 - Vasant , et al. | 2020-04-14 |
Security policy efficacy visualization Grant 10,182,055 - Lawrence , et al. Ja | 2019-01-15 |
Fraud Detection App 20180365687 - Asher; Lior ;   et al. | 2018-12-20 |
Security policy unification across different security products Grant 10,116,702 - Knjazihhin , et al. October 30, 2 | 2018-10-30 |
Programmable format for securely configuring remote devices Grant 10,075,439 - Mullens , et al. September 11, 2 | 2018-09-11 |
Techniques for sharing authentication data among authentication servers Grant 10,063,549 - Dotan , et al. August 28, 2 | 2018-08-28 |
Determining similarity between security rules based on weighted comparisons of their rule parameters Grant 10,038,697 - Dotan , et al. July 31, 2 | 2018-07-31 |
Security using velocity metrics identifying authentication performance for a set of devices Grant 10,015,153 - Dotan , et al. July 3, 2 | 2018-07-03 |
User Interface For Low-touch Security Policy Provisioning App 20180159899 - SWARD; David ;   et al. | 2018-06-07 |
Policy block creation with context-sensitive policy line classification Grant 9,992,232 - Hollingshead , et al. June 5, 2 | 2018-06-05 |
Object-relation user interface for viewing security configurations of network security devices Grant 9,948,679 - Siswick , et al. April 17, 2 | 2018-04-17 |
Using steganography to protect cryptographic information on a mobile device Grant 9,882,879 - Dotan , et al. January 30, 2 | 2018-01-30 |
Security Policy Efficacy Visualization App 20170353459 - Lawrence; Joe ;   et al. | 2017-12-07 |
Collaborative analytics for independently administered network domains Grant 9,838,355 - Dotan , et al. December 5, 2 | 2017-12-05 |
Security Credential Protection With Cloud Services App 20170317999 - Knjazihhin; Denis ;   et al. | 2017-11-02 |
Integrated development environment (IDE) for network security configuration files Grant 9,787,722 - Knjazihhin , et al. October 10, 2 | 2017-10-10 |
Managing policies Grant 9,781,130 - Bailey , et al. October 3, 2 | 2017-10-03 |
Authenticating an entity Grant 9,781,129 - Bailey , et al. October 3, 2 | 2017-10-03 |
Classification of security policies across multiple security products Grant 9,769,210 - Dotan , et al. September 19, 2 | 2017-09-19 |
Security Policy Unification Across Different Security Products App 20170230425 - Knjazihhin; Denis ;   et al. | 2017-08-10 |
User authentication Grant 9,721,087 - Duchin , et al. August 1, 2 | 2017-08-01 |
Policy Block Creation With Context-sensitive Policy Line Classification App 20170208094 - Hollingshead; Daniel ;   et al. | 2017-07-20 |
Enrolling a user in a new authentication procdure only if trusted Grant 9,680,812 - Emaminouri , et al. June 13, 2 | 2017-06-13 |
Security policy unification across different security products Grant 9,680,875 - Knjazihhin , et al. June 13, 2 | 2017-06-13 |
Providing Network Behavior Visibility Based On Events Logged By Network Security Devices App 20170155562 - Vasant; Sachin ;   et al. | 2017-06-01 |
Situationally aware authentication Grant 9,667,611 - Friedman , et al. May 30, 2 | 2017-05-30 |
Authenticating an entity Grant 9,641,538 - Bailey , et al. May 2, 2 | 2017-05-02 |
User interface driven translation, comparison, unification, and deployment of device neutral network security policies Grant 9,641,540 - Dotan , et al. May 2, 2 | 2017-05-02 |
Access control by a mobile device using an image Grant 9,613,201 - Dotan , et al. April 4, 2 | 2017-04-04 |
Methods and apparatus for multi-factor authentication risk detection using beacon images Grant 9,594,911 - Khitrenovich , et al. March 14, 2 | 2017-03-14 |
Object-relation User Interface For Viewing Security Configurations Of Network Security Devices App 20170054757 - Siswick; Zachary D. ;   et al. | 2017-02-23 |
Creation of security policy templates and security policies based on the templates Grant 9,571,524 - Dotan , et al. February 14, 2 | 2017-02-14 |
Modifying queries and rules for profile fetching and risk calculation Grant 9,535,955 - Dotan , et al. January 3, 2 | 2017-01-03 |
Generalized security policy user interface Grant 9,521,167 - Martherus , et al. December 13, 2 | 2016-12-13 |
Question generation in knowledge-based authentication from activity logs Grant 9,514,407 - Dotan , et al. December 6, 2 | 2016-12-06 |
Using mock tokens to protect against malicious activity Grant 9,516,059 - Dotan , et al. December 6, 2 | 2016-12-06 |
Similarity-based data loss prevention Grant 9,507,947 - Dotan November 29, 2 | 2016-11-29 |
Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters App 20160344738 - Dotan; Yedidya ;   et al. | 2016-11-24 |
User Interface Driven Translation, Comparison, Unification, and Deployment of Device Neutral Network Security Policies App 20160344743 - Dotan; Yedidya ;   et al. | 2016-11-24 |
Integrated Development Environment (IDE) for Network Security Configuration Files App 20160344773 - Knjazihhin; Denis ;   et al. | 2016-11-24 |
Classification Of Security Policies Across Multiple Security Products App 20160301717 - Dotan; Yedidya ;   et al. | 2016-10-13 |
Collaborative analytics for independently administered network domains Grant 9,467,343 - Dotan , et al. October 11, 2 | 2016-10-11 |
Provisioning a mobile device with a security application on the fly Grant 9,455,972 - Dotan , et al. September 27, 2 | 2016-09-27 |
Authentication using gesture passwords Grant 9,430,634 - Dotan , et al. August 30, 2 | 2016-08-30 |
Authenticating an entity Grant 9,405,897 - Bailey , et al. August 2, 2 | 2016-08-02 |
Adding entropy to key generation on a mobile device Grant 9,407,441 - Dotan , et al. August 2, 2 | 2016-08-02 |
Classification of security policies across multiple security products Grant 9,401,933 - Dotan , et al. July 26, 2 | 2016-07-26 |
Creation Of Security Policy Templates And Security Policies Based On The Templates App 20160212168 - Dotan; Yedidya ;   et al. | 2016-07-21 |
Classification Of Security Policies Across Multiple Security Products App 20160212167 - Dotan; Yedidya ;   et al. | 2016-07-21 |
Generalized Security Policy User Interface App 20160212170 - Martherus; Robin ;   et al. | 2016-07-21 |
Security Policy Unification Across Different Security Products App 20160212169 - Knjazihhin; Denis ;   et al. | 2016-07-21 |
Authentication using color-shape pairings Grant 9,397,992 - Dotan , et al. July 19, 2 | 2016-07-19 |
Managing authentication using common authentication framework circuitry Grant 9,356,968 - Dotan , et al. May 31, 2 | 2016-05-31 |
Policy based location collection for authentication Grant 9,332,434 - Dotan , et al. May 3, 2 | 2016-05-03 |
Distributing access and identification tokens in a mobile environment Grant 9,332,433 - Dotan , et al. May 3, 2 | 2016-05-03 |
Risk-based authentication using lockout states Grant 9,305,151 - Dotan , et al. April 5, 2 | 2016-04-05 |
Generation of alerts in an event management system based upon risk Grant 9,282,114 - Dotan , et al. March 8, 2 | 2016-03-08 |
Managing security and wireless signal detection Grant 9,240,986 - Ackerman , et al. January 19, 2 | 2016-01-19 |
User authentication avoiding exposure of information about enumerable system resources Grant 9,237,143 - Dotan , et al. January 12, 2 | 2016-01-12 |
Assessing risk for third-party data collectors Grant 9,230,066 - Bailey , et al. January 5, 2 | 2016-01-05 |
Proximity-based authentication Grant 9,225,700 - Dotan , et al. December 29, 2 | 2015-12-29 |
Using link analysis in adversarial knowledge-based authentication model Grant 9,202,173 - Dotan , et al. December 1, 2 | 2015-12-01 |
User authentication based on biometric handwriting aspects of a handwritten code Grant 9,202,035 - Manusov , et al. December 1, 2 | 2015-12-01 |
Using link strength in knowledge-based authentication Grant 9,183,595 - Avni , et al. November 10, 2 | 2015-11-10 |
Confounder generation in knowledge-based authentication for an enterprise Grant 9,177,127 - Dotan , et al. November 3, 2 | 2015-11-03 |
Gateway mediated mobile device authentication Grant 9,178,880 - Dotan , et al. November 3, 2 | 2015-11-03 |
Managing access to a limited number of computerized sessions Grant 9,154,556 - Dotan , et al. October 6, 2 | 2015-10-06 |
Securing data replication, backup and mobility in cloud storage Grant 9,152,578 - Saad , et al. October 6, 2 | 2015-10-06 |
Using a token code to control access to data and applications in a mobile platform Grant 9,154,304 - Dotan , et al. October 6, 2 | 2015-10-06 |
Knowledge-based authentication for restricting access to mobile devices Grant 9,131,374 - Avni , et al. September 8, 2 | 2015-09-08 |
Authentication using security device with electronic interface Grant 9,130,753 - Kronrod , et al. September 8, 2 | 2015-09-08 |
Performing an authentication operation during user access to a computerized resource Grant 9,119,539 - Dotan , et al. September 1, 2 | 2015-09-01 |
Knowledge-based authentication for restricting access to mobile devices Grant 9,078,129 - Dotan , et al. July 7, 2 | 2015-07-07 |
Managing predictions in data security systems Grant 9,038,134 - Ackerman , et al. May 19, 2 | 2015-05-19 |
Techniques for authenticating a user with heightened security Grant 9,032,490 - Khitrenovich , et al. May 12, 2 | 2015-05-12 |
Injecting code decrypted by a hardware decryption module into Java applications Grant 9,021,271 - Richards , et al. April 28, 2 | 2015-04-28 |
Validating association of client devices with sessions Grant 8,959,650 - Richards , et al. February 17, 2 | 2015-02-17 |
Controlling access to a protected resource using multiple user devices Grant 8,955,076 - Faibish , et al. February 10, 2 | 2015-02-10 |
Event-based biometric authentication using mobile device Grant 8,955,069 - Dotan , et al. February 10, 2 | 2015-02-10 |
Brokering multiple authentications through a single proxy Grant 8,949,953 - Khitrenovich , et al. February 3, 2 | 2015-02-03 |
Authentication involving authentication operations which cross reference authentication factors Grant 08925058 - | 2014-12-30 |
Authentication involving authentication operations which cross reference authentication factors Grant 8,925,058 - Dotan , et al. December 30, 2 | 2014-12-30 |
Device presence validation Grant 8,918,844 - Friedman , et al. December 23, 2 | 2014-12-23 |
Authentication based on a current location of a communications device associated with an entity Grant 8,904,496 - Bailey , et al. December 2, 2 | 2014-12-02 |
Techniques for securing a one-time passcode with an alteration code Grant 8,904,482 - Dotan , et al. December 2, 2 | 2014-12-02 |
Controlling access to a computerized resource based on authentication using pulse data Grant 8,902,045 - Linn , et al. December 2, 2 | 2014-12-02 |
Preventing user enumeration by an authentication server Grant 8,875,255 - Dotan , et al. October 28, 2 | 2014-10-28 |
Authenticating using organization based information Grant 8,856,954 - Hathaway , et al. October 7, 2 | 2014-10-07 |
Self-tuning knowledge-based authentication Grant 8,850,537 - Dotan , et al. September 30, 2 | 2014-09-30 |
Ordering of event records in an electronic system for forensic analysis Grant 8,825,848 - Dotan , et al. September 2, 2 | 2014-09-02 |
Validating association of client devices with authenticated clients Grant 8,819,803 - Richards , et al. August 26, 2 | 2014-08-26 |
Mobile offline authentication using one-time passcodes Grant 8,799,655 - Dotan , et al. August 5, 2 | 2014-08-05 |
Uploading and downloading unsecured files via a virtual machine environment Grant 8,782,174 - Dotan , et al. July 15, 2 | 2014-07-15 |
Common data format in knowledge-based authentication Grant 8,776,195 - Avni , et al. July 8, 2 | 2014-07-08 |
Processing email messages based on authenticity analysis Grant 8,752,172 - Dotan , et al. June 10, 2 | 2014-06-10 |
Targeted biometric challenges Grant 8,752,144 - Kaufman , et al. June 10, 2 | 2014-06-10 |
Biometric authentication with smart mobile device Grant 8,752,145 - Dotan , et al. June 10, 2 | 2014-06-10 |
Establishing a trusted session from a non-web client using adaptive authentication Grant 8,701,199 - Dotan , et al. April 15, 2 | 2014-04-15 |
Controlling access to a protected resource using a virtual desktop and ongoing authentication Grant 8,701,174 - Dotan April 15, 2 | 2014-04-15 |
Virtualization platform for secured communications between a user device and an application server Grant 8,694,993 - Dotan , et al. April 8, 2 | 2014-04-08 |
Associating network and storage activities for forensic analysis Grant 8,683,592 - Dotan , et al. March 25, 2 | 2014-03-25 |
Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server Grant 8,677,472 - Dotan , et al. March 18, 2 | 2014-03-18 |
Authentication using dynamic, client information based PIN Grant 8,650,405 - Dotan , et al. February 11, 2 | 2014-02-11 |
Using baseline profiles in adaptive authentication Grant 8,621,586 - Peer , et al. December 31, 2 | 2013-12-31 |
Disposable browser for commercial banking Grant 8,370,899 - Shoval , et al. February 5, 2 | 2013-02-05 |
Techniques for authenticating users of massive multiplayer online role playing games using adaptive authentication Grant 8,370,389 - Dotan February 5, 2 | 2013-02-05 |
Disposable Browser For Commercial Banking App 20120042365 - Shoval; Asaf ;   et al. | 2012-02-16 |