loadpatents
name:-0.016108989715576
name:-0.093729019165039
name:-0.0026040077209473
Dotan; Yedidya Patent Filings

Dotan; Yedidya

Patent Applications and Registrations

Patent applications and USPTO patent grants for Dotan; Yedidya.The latest application filed is for "fraud detection".

Company Profile
3.130.17
  • Dotan; Yedidya - Newton MA
  • Dotan; Yedidya - Tel Aviv N/A IL
  • Dotan; Yedidya - Cambridge MA
  • - Tel Aviv IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
User interface for low-touch security policy provisioning
Grant 10,666,683 - Sward , et al.
2020-05-26
Providing network behavior visibility based on events logged by network security devices
Grant 10,623,371 - Vasant , et al.
2020-04-14
Security policy efficacy visualization
Grant 10,182,055 - Lawrence , et al. Ja
2019-01-15
Fraud Detection
App 20180365687 - Asher; Lior ;   et al.
2018-12-20
Security policy unification across different security products
Grant 10,116,702 - Knjazihhin , et al. October 30, 2
2018-10-30
Programmable format for securely configuring remote devices
Grant 10,075,439 - Mullens , et al. September 11, 2
2018-09-11
Techniques for sharing authentication data among authentication servers
Grant 10,063,549 - Dotan , et al. August 28, 2
2018-08-28
Determining similarity between security rules based on weighted comparisons of their rule parameters
Grant 10,038,697 - Dotan , et al. July 31, 2
2018-07-31
Security using velocity metrics identifying authentication performance for a set of devices
Grant 10,015,153 - Dotan , et al. July 3, 2
2018-07-03
User Interface For Low-touch Security Policy Provisioning
App 20180159899 - SWARD; David ;   et al.
2018-06-07
Policy block creation with context-sensitive policy line classification
Grant 9,992,232 - Hollingshead , et al. June 5, 2
2018-06-05
Object-relation user interface for viewing security configurations of network security devices
Grant 9,948,679 - Siswick , et al. April 17, 2
2018-04-17
Using steganography to protect cryptographic information on a mobile device
Grant 9,882,879 - Dotan , et al. January 30, 2
2018-01-30
Security Policy Efficacy Visualization
App 20170353459 - Lawrence; Joe ;   et al.
2017-12-07
Collaborative analytics for independently administered network domains
Grant 9,838,355 - Dotan , et al. December 5, 2
2017-12-05
Security Credential Protection With Cloud Services
App 20170317999 - Knjazihhin; Denis ;   et al.
2017-11-02
Integrated development environment (IDE) for network security configuration files
Grant 9,787,722 - Knjazihhin , et al. October 10, 2
2017-10-10
Managing policies
Grant 9,781,130 - Bailey , et al. October 3, 2
2017-10-03
Authenticating an entity
Grant 9,781,129 - Bailey , et al. October 3, 2
2017-10-03
Classification of security policies across multiple security products
Grant 9,769,210 - Dotan , et al. September 19, 2
2017-09-19
Security Policy Unification Across Different Security Products
App 20170230425 - Knjazihhin; Denis ;   et al.
2017-08-10
User authentication
Grant 9,721,087 - Duchin , et al. August 1, 2
2017-08-01
Policy Block Creation With Context-sensitive Policy Line Classification
App 20170208094 - Hollingshead; Daniel ;   et al.
2017-07-20
Enrolling a user in a new authentication procdure only if trusted
Grant 9,680,812 - Emaminouri , et al. June 13, 2
2017-06-13
Security policy unification across different security products
Grant 9,680,875 - Knjazihhin , et al. June 13, 2
2017-06-13
Providing Network Behavior Visibility Based On Events Logged By Network Security Devices
App 20170155562 - Vasant; Sachin ;   et al.
2017-06-01
Situationally aware authentication
Grant 9,667,611 - Friedman , et al. May 30, 2
2017-05-30
Authenticating an entity
Grant 9,641,538 - Bailey , et al. May 2, 2
2017-05-02
User interface driven translation, comparison, unification, and deployment of device neutral network security policies
Grant 9,641,540 - Dotan , et al. May 2, 2
2017-05-02
Access control by a mobile device using an image
Grant 9,613,201 - Dotan , et al. April 4, 2
2017-04-04
Methods and apparatus for multi-factor authentication risk detection using beacon images
Grant 9,594,911 - Khitrenovich , et al. March 14, 2
2017-03-14
Object-relation User Interface For Viewing Security Configurations Of Network Security Devices
App 20170054757 - Siswick; Zachary D. ;   et al.
2017-02-23
Creation of security policy templates and security policies based on the templates
Grant 9,571,524 - Dotan , et al. February 14, 2
2017-02-14
Modifying queries and rules for profile fetching and risk calculation
Grant 9,535,955 - Dotan , et al. January 3, 2
2017-01-03
Generalized security policy user interface
Grant 9,521,167 - Martherus , et al. December 13, 2
2016-12-13
Question generation in knowledge-based authentication from activity logs
Grant 9,514,407 - Dotan , et al. December 6, 2
2016-12-06
Using mock tokens to protect against malicious activity
Grant 9,516,059 - Dotan , et al. December 6, 2
2016-12-06
Similarity-based data loss prevention
Grant 9,507,947 - Dotan November 29, 2
2016-11-29
Determining Similarity Between Security Rules Based On Weighted Comparisons Of Their Rule Parameters
App 20160344738 - Dotan; Yedidya ;   et al.
2016-11-24
User Interface Driven Translation, Comparison, Unification, and Deployment of Device Neutral Network Security Policies
App 20160344743 - Dotan; Yedidya ;   et al.
2016-11-24
Integrated Development Environment (IDE) for Network Security Configuration Files
App 20160344773 - Knjazihhin; Denis ;   et al.
2016-11-24
Classification Of Security Policies Across Multiple Security Products
App 20160301717 - Dotan; Yedidya ;   et al.
2016-10-13
Collaborative analytics for independently administered network domains
Grant 9,467,343 - Dotan , et al. October 11, 2
2016-10-11
Provisioning a mobile device with a security application on the fly
Grant 9,455,972 - Dotan , et al. September 27, 2
2016-09-27
Authentication using gesture passwords
Grant 9,430,634 - Dotan , et al. August 30, 2
2016-08-30
Authenticating an entity
Grant 9,405,897 - Bailey , et al. August 2, 2
2016-08-02
Adding entropy to key generation on a mobile device
Grant 9,407,441 - Dotan , et al. August 2, 2
2016-08-02
Classification of security policies across multiple security products
Grant 9,401,933 - Dotan , et al. July 26, 2
2016-07-26
Creation Of Security Policy Templates And Security Policies Based On The Templates
App 20160212168 - Dotan; Yedidya ;   et al.
2016-07-21
Classification Of Security Policies Across Multiple Security Products
App 20160212167 - Dotan; Yedidya ;   et al.
2016-07-21
Generalized Security Policy User Interface
App 20160212170 - Martherus; Robin ;   et al.
2016-07-21
Security Policy Unification Across Different Security Products
App 20160212169 - Knjazihhin; Denis ;   et al.
2016-07-21
Authentication using color-shape pairings
Grant 9,397,992 - Dotan , et al. July 19, 2
2016-07-19
Managing authentication using common authentication framework circuitry
Grant 9,356,968 - Dotan , et al. May 31, 2
2016-05-31
Policy based location collection for authentication
Grant 9,332,434 - Dotan , et al. May 3, 2
2016-05-03
Distributing access and identification tokens in a mobile environment
Grant 9,332,433 - Dotan , et al. May 3, 2
2016-05-03
Risk-based authentication using lockout states
Grant 9,305,151 - Dotan , et al. April 5, 2
2016-04-05
Generation of alerts in an event management system based upon risk
Grant 9,282,114 - Dotan , et al. March 8, 2
2016-03-08
Managing security and wireless signal detection
Grant 9,240,986 - Ackerman , et al. January 19, 2
2016-01-19
User authentication avoiding exposure of information about enumerable system resources
Grant 9,237,143 - Dotan , et al. January 12, 2
2016-01-12
Assessing risk for third-party data collectors
Grant 9,230,066 - Bailey , et al. January 5, 2
2016-01-05
Proximity-based authentication
Grant 9,225,700 - Dotan , et al. December 29, 2
2015-12-29
Using link analysis in adversarial knowledge-based authentication model
Grant 9,202,173 - Dotan , et al. December 1, 2
2015-12-01
User authentication based on biometric handwriting aspects of a handwritten code
Grant 9,202,035 - Manusov , et al. December 1, 2
2015-12-01
Using link strength in knowledge-based authentication
Grant 9,183,595 - Avni , et al. November 10, 2
2015-11-10
Confounder generation in knowledge-based authentication for an enterprise
Grant 9,177,127 - Dotan , et al. November 3, 2
2015-11-03
Gateway mediated mobile device authentication
Grant 9,178,880 - Dotan , et al. November 3, 2
2015-11-03
Managing access to a limited number of computerized sessions
Grant 9,154,556 - Dotan , et al. October 6, 2
2015-10-06
Securing data replication, backup and mobility in cloud storage
Grant 9,152,578 - Saad , et al. October 6, 2
2015-10-06
Using a token code to control access to data and applications in a mobile platform
Grant 9,154,304 - Dotan , et al. October 6, 2
2015-10-06
Knowledge-based authentication for restricting access to mobile devices
Grant 9,131,374 - Avni , et al. September 8, 2
2015-09-08
Authentication using security device with electronic interface
Grant 9,130,753 - Kronrod , et al. September 8, 2
2015-09-08
Performing an authentication operation during user access to a computerized resource
Grant 9,119,539 - Dotan , et al. September 1, 2
2015-09-01
Knowledge-based authentication for restricting access to mobile devices
Grant 9,078,129 - Dotan , et al. July 7, 2
2015-07-07
Managing predictions in data security systems
Grant 9,038,134 - Ackerman , et al. May 19, 2
2015-05-19
Techniques for authenticating a user with heightened security
Grant 9,032,490 - Khitrenovich , et al. May 12, 2
2015-05-12
Injecting code decrypted by a hardware decryption module into Java applications
Grant 9,021,271 - Richards , et al. April 28, 2
2015-04-28
Validating association of client devices with sessions
Grant 8,959,650 - Richards , et al. February 17, 2
2015-02-17
Controlling access to a protected resource using multiple user devices
Grant 8,955,076 - Faibish , et al. February 10, 2
2015-02-10
Event-based biometric authentication using mobile device
Grant 8,955,069 - Dotan , et al. February 10, 2
2015-02-10
Brokering multiple authentications through a single proxy
Grant 8,949,953 - Khitrenovich , et al. February 3, 2
2015-02-03
Authentication involving authentication operations which cross reference authentication factors
Grant 08925058 -
2014-12-30
Authentication involving authentication operations which cross reference authentication factors
Grant 8,925,058 - Dotan , et al. December 30, 2
2014-12-30
Device presence validation
Grant 8,918,844 - Friedman , et al. December 23, 2
2014-12-23
Authentication based on a current location of a communications device associated with an entity
Grant 8,904,496 - Bailey , et al. December 2, 2
2014-12-02
Techniques for securing a one-time passcode with an alteration code
Grant 8,904,482 - Dotan , et al. December 2, 2
2014-12-02
Controlling access to a computerized resource based on authentication using pulse data
Grant 8,902,045 - Linn , et al. December 2, 2
2014-12-02
Preventing user enumeration by an authentication server
Grant 8,875,255 - Dotan , et al. October 28, 2
2014-10-28
Authenticating using organization based information
Grant 8,856,954 - Hathaway , et al. October 7, 2
2014-10-07
Self-tuning knowledge-based authentication
Grant 8,850,537 - Dotan , et al. September 30, 2
2014-09-30
Ordering of event records in an electronic system for forensic analysis
Grant 8,825,848 - Dotan , et al. September 2, 2
2014-09-02
Validating association of client devices with authenticated clients
Grant 8,819,803 - Richards , et al. August 26, 2
2014-08-26
Mobile offline authentication using one-time passcodes
Grant 8,799,655 - Dotan , et al. August 5, 2
2014-08-05
Uploading and downloading unsecured files via a virtual machine environment
Grant 8,782,174 - Dotan , et al. July 15, 2
2014-07-15
Common data format in knowledge-based authentication
Grant 8,776,195 - Avni , et al. July 8, 2
2014-07-08
Processing email messages based on authenticity analysis
Grant 8,752,172 - Dotan , et al. June 10, 2
2014-06-10
Targeted biometric challenges
Grant 8,752,144 - Kaufman , et al. June 10, 2
2014-06-10
Biometric authentication with smart mobile device
Grant 8,752,145 - Dotan , et al. June 10, 2
2014-06-10
Establishing a trusted session from a non-web client using adaptive authentication
Grant 8,701,199 - Dotan , et al. April 15, 2
2014-04-15
Controlling access to a protected resource using a virtual desktop and ongoing authentication
Grant 8,701,174 - Dotan April 15, 2
2014-04-15
Virtualization platform for secured communications between a user device and an application server
Grant 8,694,993 - Dotan , et al. April 8, 2
2014-04-08
Associating network and storage activities for forensic analysis
Grant 8,683,592 - Dotan , et al. March 25, 2
2014-03-25
Multi-point collection of behavioral data relating to a virtualized browsing session with a secure server
Grant 8,677,472 - Dotan , et al. March 18, 2
2014-03-18
Authentication using dynamic, client information based PIN
Grant 8,650,405 - Dotan , et al. February 11, 2
2014-02-11
Using baseline profiles in adaptive authentication
Grant 8,621,586 - Peer , et al. December 31, 2
2013-12-31
Disposable browser for commercial banking
Grant 8,370,899 - Shoval , et al. February 5, 2
2013-02-05
Techniques for authenticating users of massive multiplayer online role playing games using adaptive authentication
Grant 8,370,389 - Dotan February 5, 2
2013-02-05
Disposable Browser For Commercial Banking
App 20120042365 - Shoval; Asaf ;   et al.
2012-02-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed