loadpatents
name:-0.0013549327850342
name:-0.036379098892212
name:-0.0047910213470459
Kolman; Eyal Patent Filings

Kolman; Eyal

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kolman; Eyal.The latest application filed is for "fast speaker hunting in lawful interception systems".

Company Profile
4.40.1
  • Kolman; Eyal - Raanana IL
  • Kolman; Eyal - Tel Aviv IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method, apparatus and non-transitory processor-readable storage medium for providing security in a computer network
Grant 11,223,623 - Kolman , et al. January 11, 2
2022-01-11
Automated setting of risk score aggregation weights for detection of access anomalies in a computer network
Grant 11,082,442 - Kolman , et al. August 3, 2
2021-08-03
Fraud detection
Grant 10,693,855 - Kolman , et al.
2020-06-23
Framework for authenticating new users
Grant 10,587,596 - Sahar , et al.
2020-03-10
Methods and apparatus for detecting suspicious network activity
Grant 10,425,432 - Raviv , et al. Sept
2019-09-24
Methods and apparatus for detecting suspicious network activity by new devices
Grant 10,367,835 - Raviv , et al. July 30, 2
2019-07-30
Location feature generation for user authentication
Grant 10,354,252 - Sahar , et al. July 16, 2
2019-07-16
Methods and apparatus for identifying suspicious domains using common user clustering
Grant 10,129,276 - Raviv , et al. November 13, 2
2018-11-13
Rendering transaction data to identify fraud detection rule strength
Grant 10,115,108 - Gendelev , et al. October 30, 2
2018-10-30
Virtual private network sessions generation
Grant 10,038,672 - Raviv , et al. July 31, 2
2018-07-31
Risk score aggregation for automated detection of access anomalies in a computer network
Grant 10,015,185 - Kolman , et al. July 3, 2
2018-07-03
Automated detection of session-based access anomalies in a computer network through processing of session data
Grant 10,003,607 - Kolman , et al. June 19, 2
2018-06-19
Entropy-based beaconing detection
Grant 9,985,980 - Kolman , et al. May 29, 2
2018-05-29
Efficient detection of network anomalies
Grant 9,967,275 - Kolman , et al. May 8, 2
2018-05-08
Secure information sharing
Grant 9,917,820 - Kolman , et al. March 13, 2
2018-03-13
Secure impersonation detection
Grant 9,906,511 - Kolman , et al. February 27, 2
2018-02-27
Secure data analytics
Grant 9,729,525 - Kolman , et al. August 8, 2
2017-08-08
Providing security to an enterprise via user clustering
Grant 9,699,196 - Kolman , et al. July 4, 2
2017-07-04
Dynamic privacy management for communications of clients in privacy-preserving groups
Grant 9,660,813 - van Dijk , et al. May 23, 2
2017-05-23
Data-driven alert prioritization
Grant 9,601,000 - Gruss , et al. March 21, 2
2017-03-21
Information processing systems with security-related feedback
Grant 9,558,346 - Kolman , et al. January 31, 2
2017-01-31
User authentication
Grant 9,560,027 - Kolman , et al. January 31, 2
2017-01-31
Detecting risky domains
Grant 9,462,009 - Kolman , et al. October 4, 2
2016-10-04
Fast-flux detection utilizing domain name system information
Grant 9,426,168 - Gruss , et al. August 23, 2
2016-08-23
Data-driven detection of servers and clients
Grant 9,331,916 - Kolman , et al. May 3, 2
2016-05-03
Unsupervised aggregation of security rules
Grant 9,325,733 - Kolman , et al. April 26, 2
2016-04-26
Detecting risky network communications based on evaluation using normal and abnormal behavior profiles
Grant 9,154,516 - Vaystikh , et al. October 6, 2
2015-10-06
Data driven device detection
Grant 9,130,985 - Kolman , et al. September 8, 2
2015-09-08
User authentication
Grant 9,122,866 - Kolman , et al. September 1, 2
2015-09-01
Distributed anonymized communications
Grant 9,015,231 - Hodgman , et al. April 21, 2
2015-04-21
Active learning-based fraud detection in adaptive authentication systems
Grant 8,875,267 - Kolman , et al. October 28, 2
2014-10-28
Similarity-based fraud detection in adaptive authentication systems
Grant 8,856,923 - Kolman , et al. October 7, 2
2014-10-07
Managing user access with mobile device posture
Grant 8,819,769 - van Dijk , et al. August 26, 2
2014-08-26
Fast Speaker Hunting In Lawful Interception Systems
App 20120155663 - WEINBERG; Adam ;   et al.
2012-06-21

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed