Patent | Date |
---|
Method and system for a mobile communication device to access services Grant 10,362,617 - Serna , et al. | 2019-07-23 |
Simplified login for a computing system Grant 10,349,274 - Mendelovich , et al. July 9, 2 | 2019-07-09 |
Method And System For A Mobile Communication Device To Access Through A Second Mobile Telecommunication Network To Services Offered By A First Mobile Telecommunication Network App 20180110081 - SERNA; JORGE ;   et al. | 2018-04-19 |
Simplified Login For A Computing System App 20180084422 - Mendelovich; Meir ;   et al. | 2018-03-22 |
Simplified login for mobile devices Grant 9,832,642 - Mendelovich , et al. November 28, 2 | 2017-11-28 |
Simplified Login For Mobile Devices App 20160037343 - Mendelovich; Meir ;   et al. | 2016-02-04 |
Simplified login for mobile devices Grant 9,154,505 - Mendelovich , et al. October 6, 2 | 2015-10-06 |
User-profiling Method For Providing Advertisement Data And/or Online Content To A User And A Computer Program App 20150269627 - Urdiales Delgado; Diego ;   et al. | 2015-09-24 |
Method And Farm Load Balancing Device For Establishing A Bi-directional Server To Server Communication And Computer Program Thereof App 20150189004 - MASSOVER; Alex ;   et al. | 2015-07-02 |
Authentication delegation based on re-verification of cryptographic evidence Grant 9,055,107 - Medvinsky , et al. June 9, 2 | 2015-06-09 |
Method and system for combined peer-to-peer (P2P) and central relay server-based telecommunication conferencing using a telephony and conferencing protocol Grant 9,049,262 - Massover , et al. June 2, 2 | 2015-06-02 |
Security virtual machine for advanced auditing Grant 8,955,108 - Neystadt , et al. February 10, 2 | 2015-02-10 |
Protecting a virtual guest machine from attacks by an infected host Grant 8,954,897 - Neystadt , et al. February 10, 2 | 2015-02-10 |
Federated mobile authentication using a network operator infrastructure Grant 8,881,247 - Mendelovich , et al. November 4, 2 | 2014-11-04 |
Method And System For Combined Peer-two-peer (p2p) And Central Relay Server-based Telecommunication Conferencing Using A Telephony And Conferencing Protocol App 20140241215 - MASSOVER; Alex ;   et al. | 2014-08-28 |
Automated security classification and propagation of virtualized and physical virtual machines Grant 8,799,985 - Vinberg , et al. August 5, 2 | 2014-08-05 |
Model based systems management in virtualized and non-virtualized environments Grant 8,726,334 - Neystadt , et al. May 13, 2 | 2014-05-13 |
Simplified Login for Mobile Devices App 20140129826 - Mendelovich; Meir ;   et al. | 2014-05-08 |
Access control using identifiers in links Grant 8,719,582 - Neystadt , et al. May 6, 2 | 2014-05-06 |
Detection of adversaries through collection and correlation of assessments Grant 8,677,479 - Neystadt , et al. March 18, 2 | 2014-03-18 |
Simplified login for mobile devices Grant 8,631,237 - Mendelovich , et al. January 14, 2 | 2014-01-14 |
Collecting anonymous and traceable telemetry Grant 8,607,305 - Neystadt , et al. December 10, 2 | 2013-12-10 |
Automated collection of forensic evidence associated with a network security incident Grant 8,424,094 - Neystadt , et al. April 16, 2 | 2013-04-16 |
Information protection applied by an intermediary device Grant 8,341,720 - Ben-Yochanan , et al. December 25, 2 | 2012-12-25 |
Fuzzing encoded data Grant 8,286,133 - Natanov , et al. October 9, 2 | 2012-10-09 |
Social Marketing Manager App 20120158476 - NEYSTADT; John ;   et al. | 2012-06-21 |
Federated Mobile Authentication Using A Network Operator Infrastructure App 20120079569 - Mendelovich; Meir ;   et al. | 2012-03-29 |
Relations in fuzzing data Grant 8,136,095 - Natanov , et al. March 13, 2 | 2012-03-13 |
Automated Security Classification And Propagation Of Virtualized And Physical Virtual Machines App 20110138442 - Vinberg; Anders B. ;   et al. | 2011-06-09 |
Model Based Systems Management In Virtualized And Non-virtualized Environments App 20110138441 - Neystadt; John ;   et al. | 2011-06-09 |
Reduction of false positive reputations through collection of overrides from customer deployments Grant 7,953,969 - Neystadt , et al. May 31, 2 | 2011-05-31 |
Testing software applications with schema-based fuzzing Grant 7,926,114 - Neystadt , et al. April 12, 2 | 2011-04-12 |
Detecting compromised computers by correlating reputation data with web access logs Grant 7,882,542 - Neystadt , et al. February 1, 2 | 2011-02-01 |
Security Virtual Machine For Advanced Auditing App 20100325727 - Neystadt; John ;   et al. | 2010-12-23 |
Access Control Using Identifiers In Links App 20100228989 - Neystadt; John ;   et al. | 2010-09-09 |
Information Protection Applied By An Intermediary Device App 20100180332 - Ben-Yochanan; Noam ;   et al. | 2010-07-15 |
Protecting A Virtual Guest Machine From Attacks By An Infected Host App 20100058432 - Neystadt; John ;   et al. | 2010-03-04 |
Collecting Anonymous And Traceable Telemetry App 20100058454 - Neystadt; John ;   et al. | 2010-03-04 |
Chain Of Events Tracking With Data Tainting For Automated Security Feedback App 20090328210 - Khachaturov; Vassilii ;   et al. | 2009-12-31 |
Simplified Login For Mobile Devices App 20090271621 - Mendelovich; Meir ;   et al. | 2009-10-29 |
Relations In Fuzzing Data App 20090164478 - Natanov; Nissim ;   et al. | 2009-06-25 |
Fuzzing Encoded Data App 20090164975 - Natanov; Nissim ;   et al. | 2009-06-25 |
Testing Software Applications with Schema-based Fuzzing App 20080301813 - Neystadt; John ;   et al. | 2008-12-04 |
Reduction of false positive reputations through collection of overrides from customer deployments App 20080256622 - Neystadt; John ;   et al. | 2008-10-16 |
Detection of adversaries through collection and correlation of assessments App 20080256619 - Neystadt; John ;   et al. | 2008-10-16 |
Detecting compromised computers by correlating reputation data with web access logs App 20080244748 - Neystadt; John ;   et al. | 2008-10-02 |
Automated collection of forensic evidence associated with a network security incident App 20080244694 - Neystadt; John ;   et al. | 2008-10-02 |
Detecting adversaries by correlating detected malware with web access logs App 20080244742 - Neystadt; John ;   et al. | 2008-10-02 |
Automated identification of firewall malware scanner deficiencies App 20080229419 - Holostov; Vladimir ;   et al. | 2008-09-18 |
Authentication delegation based on re-verification of cryptographic evidence App 20080134311 - Medvinsky; Gennady ;   et al. | 2008-06-05 |