loadpatents
Patent applications and USPTO patent grants for Kolman; Eyal.The latest application filed is for "fast speaker hunting in lawful interception systems".
Patent | Date |
---|---|
Method, apparatus and non-transitory processor-readable storage medium for providing security in a computer network Grant 11,223,623 - Kolman , et al. January 11, 2 | 2022-01-11 |
Automated setting of risk score aggregation weights for detection of access anomalies in a computer network Grant 11,082,442 - Kolman , et al. August 3, 2 | 2021-08-03 |
Fraud detection Grant 10,693,855 - Kolman , et al. | 2020-06-23 |
Framework for authenticating new users Grant 10,587,596 - Sahar , et al. | 2020-03-10 |
Methods and apparatus for detecting suspicious network activity Grant 10,425,432 - Raviv , et al. Sept | 2019-09-24 |
Methods and apparatus for detecting suspicious network activity by new devices Grant 10,367,835 - Raviv , et al. July 30, 2 | 2019-07-30 |
Location feature generation for user authentication Grant 10,354,252 - Sahar , et al. July 16, 2 | 2019-07-16 |
Methods and apparatus for identifying suspicious domains using common user clustering Grant 10,129,276 - Raviv , et al. November 13, 2 | 2018-11-13 |
Rendering transaction data to identify fraud detection rule strength Grant 10,115,108 - Gendelev , et al. October 30, 2 | 2018-10-30 |
Virtual private network sessions generation Grant 10,038,672 - Raviv , et al. July 31, 2 | 2018-07-31 |
Risk score aggregation for automated detection of access anomalies in a computer network Grant 10,015,185 - Kolman , et al. July 3, 2 | 2018-07-03 |
Automated detection of session-based access anomalies in a computer network through processing of session data Grant 10,003,607 - Kolman , et al. June 19, 2 | 2018-06-19 |
Entropy-based beaconing detection Grant 9,985,980 - Kolman , et al. May 29, 2 | 2018-05-29 |
Efficient detection of network anomalies Grant 9,967,275 - Kolman , et al. May 8, 2 | 2018-05-08 |
Secure information sharing Grant 9,917,820 - Kolman , et al. March 13, 2 | 2018-03-13 |
Secure impersonation detection Grant 9,906,511 - Kolman , et al. February 27, 2 | 2018-02-27 |
Secure data analytics Grant 9,729,525 - Kolman , et al. August 8, 2 | 2017-08-08 |
Providing security to an enterprise via user clustering Grant 9,699,196 - Kolman , et al. July 4, 2 | 2017-07-04 |
Dynamic privacy management for communications of clients in privacy-preserving groups Grant 9,660,813 - van Dijk , et al. May 23, 2 | 2017-05-23 |
Data-driven alert prioritization Grant 9,601,000 - Gruss , et al. March 21, 2 | 2017-03-21 |
Information processing systems with security-related feedback Grant 9,558,346 - Kolman , et al. January 31, 2 | 2017-01-31 |
User authentication Grant 9,560,027 - Kolman , et al. January 31, 2 | 2017-01-31 |
Detecting risky domains Grant 9,462,009 - Kolman , et al. October 4, 2 | 2016-10-04 |
Fast-flux detection utilizing domain name system information Grant 9,426,168 - Gruss , et al. August 23, 2 | 2016-08-23 |
Data-driven detection of servers and clients Grant 9,331,916 - Kolman , et al. May 3, 2 | 2016-05-03 |
Unsupervised aggregation of security rules Grant 9,325,733 - Kolman , et al. April 26, 2 | 2016-04-26 |
Detecting risky network communications based on evaluation using normal and abnormal behavior profiles Grant 9,154,516 - Vaystikh , et al. October 6, 2 | 2015-10-06 |
Data driven device detection Grant 9,130,985 - Kolman , et al. September 8, 2 | 2015-09-08 |
User authentication Grant 9,122,866 - Kolman , et al. September 1, 2 | 2015-09-01 |
Distributed anonymized communications Grant 9,015,231 - Hodgman , et al. April 21, 2 | 2015-04-21 |
Active learning-based fraud detection in adaptive authentication systems Grant 8,875,267 - Kolman , et al. October 28, 2 | 2014-10-28 |
Similarity-based fraud detection in adaptive authentication systems Grant 8,856,923 - Kolman , et al. October 7, 2 | 2014-10-07 |
Managing user access with mobile device posture Grant 8,819,769 - van Dijk , et al. August 26, 2 | 2014-08-26 |
Fast Speaker Hunting In Lawful Interception Systems App 20120155663 - WEINBERG; Adam ;   et al. | 2012-06-21 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.