The present application is a U.S. national phase application under 35 U.S.C. § 371 of International Application No. PCT/GB2017/051997, filed on Jul. 6, 2017, which claims the benefit of priority to GB Application No. 1611932.3, filed on Jul. 8, 2016, the entire contents of each of which are incorporated by reference herein for all purposes.
This invention relates to identifying or authenticating a user.
Identification and/or authentication of a user is an essential step in accessing many secure services or devices, such as banking, stored personal details or other restricted data. This identification and/or authentication is usually achieved by the use of passwords or personal identification numbers (PINs), which are usually assumed to be known only by the authorised user or users of a service or device.
However, knowledge of a user's password or PIN is enough for an unauthorised third party to gain access to the service or device. Thus, improved security measures have been introduced to reduce the risk of passwords and PINs from being used by unauthorised third parties. Such measures include using biometric information about the user, for example, scanning a user's fingerprint or using a camera to perform facial recognition. These improved measures have made it more difficult for unauthorised third parties to gain access but they can still be circumvented and may not always be available to the user. For example, a fingerprint scanner on a smartphone may not be functioning correctly and so a user may be required to use another less secure measure such as entering a PIN. There is, therefore, a need to ensure that a user can be securely identified/authenticated whilst also considering the user experience during identification/authentication so that the procedure is not overly onerous.
According to a first aspect there is provided a method for identifying and/or authenticating a user on a device, the method comprising: requesting identification or authentication of the user for a first task; determining a first threshold in dependence on the first task; selecting a first authentication process from a plurality of authentication processes; determining a confidence score in dependence on a performance of the selected first authentication process, wherein the confidence score indicates a level of confidence in the user's identity; determining whether the confidence score is above or below the first threshold; and if the confidence score is below the first threshold, selecting a second authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the first task.
The second authentication process may be selected in dependence on a difference between the confidence score and the first threshold.
The first and/or second authentication process may be selected in dependence on the first task.
The method may further comprise updating the confidence score in dependence on a performance of the selected second authentication process.
The method may further comprise: requesting identification or authentication of the user for a second task; and determining a second threshold for the second task, wherein the second threshold is different to the first threshold.
The method may further comprise: determining whether the confidence score is above or below the second threshold; and if the confidence score is below the second threshold, selecting a third authentication process from the plurality of authentication processes, otherwise identifying or authenticating the user for the second task.
The first and/or second authentication process may be performed automatically by the device and/or a remote computing device.
The first threshold may be determined in dependence on the significance of the first task.
The plurality of authentication processes may comprise one or more biometric identification or authentication processes.
The method may further comprise: determining a lower threshold, wherein authentication of the user is rejected if the confidence score is determined to be below the lower threshold.
A system may be provided that is configured to perform the above method.
There may be provided computer program code for performing a method as claimed in any preceding claim. There may be provided non-transitory computer readable storage medium having stored thereon computer readable instructions that, when executed at a computer system, cause the computer system to perform the above method.
The above features may be combined as appropriate, as would be apparent to a skilled person, and may be combined with any of the aspects of the examples described herein.
The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:
The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.
The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
For the purposes of this disclosure, identification typically involves the collection of data and a determination of who a user is from a database or other predetermined population of users, while authentication typically involves the use of data to confirm a user is who they present themselves to be (i.e. to verify a user's identity).
The device 10 may comprise a camera 11, a display 12, a processor 13, a non-volatile memory or ROM 14, working memory or RAM 15, one or more sensors 16, a user input device 17 such a keypad or mouse and a communications interface 18 (which may a wired or wireless transceiver). In one example the display 12 may be a touchscreen, so it provides user input to the processor 13 in addition or alternatively to a separate user input device 17. The device may comprise a storage medium 19 such as flash memory. The ROM 14 may store program code that is executable by the processor 13. The program code may be stored in a non-transient form. The program code is executable by the processor 13 to perform some or all of the processes and functions described herein. Some of the processes and functions described herein may be performed at a computing device or system that is remote to device 10, such as one or more servers or cloud computing devices. The distribution of the processing burden may at least partly depend on the computational capabilities of the device 10 and remote computing device, and on the communication capabilities between the device 10 and remote computing device and/or the availability of communications networks between the devices. Preferably, device 10 collects information and sends that information to the remote computing device, where the majority of the processing is performed. However, the processes and functions described herein could be performed wholly or partly at either device.
The sensors 16 may be one or more sensors that are capable of gathering information about the user. For example, a GPS may be used to determine the location of the device and thus the user of the device. A motion sensor(s) (such as a gyroscope, accelerometer, pedometer, etc) may be used to derive biometric information about the user of the device (e.g. by using the sensors to determine typical movements and motions made by the user). The sensors 16 could be biometric sensors such as a fingerprint sensor, iris scanner, etc. Other ways of determining information about the user via other means are possible, for example, facial recognition via camera 11 and voice recognition via a microphone (not shown). The information gathered about the user may be used for certain authentication processes, as described below.
In operation, processor 13 may receive information from the user or information gathered about the user via the user input devices, the camera, sensors and/or the communications interface. That information may be processed to identify and/or authenticate the user, as described below. As mentioned above, some or all of the processing of this information may be performed at a remote computing device.
One way of providing increased security is to use multiple identification and/or authentication methods/processes and require that the user to pass all of the methods/processes before granting access. For example, a user may be required to position themselves in front camera for facial recognition as well as providing a passcode via a keypad. Although requiring a user to perform both of these methods increases security compared to performing just one of the methods, it also increases the time and effort required by the user to identify/authenticate themselves. Disclosed herein is an identification/authentication method that provides the improved security achieved from using multiple, different authentication processes but also allows the user to be identified/authenticated in a user-friendly manner.
A user may wish to be granted access for a particular task (e.g. accessing a smartphone, viewing bank account details, making a payment, etc). Each task may have different security requirements based on their significance or value. For example, it could be considered that accessing emails on a smartphone is more significant or valuable than taking a picture with that smartphone and so accessing emails may be considered to be a task requiring higher security than taking a picture. In another example, initiating a bank transfer may be considered to be more significant or valuable than viewing a bank statement and so initiating a bank transfer may be considered to be a task requiring higher security than viewing a bank statement. Thus, each task may be associated with certain level of security that is required to be met in order to allow a user to perform that task and each task may have a different level of security to other tasks. As will be discussed in more detail below, the present system may be configured such that in order for a user to be permitted to undertake an operation of greater significance or value that user must be identified or authenticated to a greater degree of confidence than in order for a user to be permitted to undertake an operation of lesser significance or value.
In the process described below, one or more processes for identifying and/or authenticating a user (also referred to herein as “authentication processes”) may be performed in order to determine if a user has met the security requirements for a particular task. These authentication processes could require the user to perform some sort of action and could be authentication processes such as entering a password/passcode, placing a finger on a fingerprint sensor, etc. The authentication processes could also be passive processes that could help identify or authenticate a user without requiring the user to perform a specific action or an action whose function is solely for identification or authentication purposes. For example, a passive authentication process could be determining a user location via GPS, monitoring user movement characteristics via an accelerometer, determining characteristics of a user's typing behaviour, etc.
The results of each authentication process may be checked against known data about an authorised user to determine a likelihood that the user being authenticated is the authorised user. The determined likelihood from each process may be used to determine a confidence score that indicates how likely the user is an authorised user. The confidence score may be generated based on the results from the authentication processes individually or a collective score from the results from multiple authentication processes.
At step 201, an acceptance threshold for the task is determined. The acceptance threshold may be determined in dependence on the nature of the task. The acceptance threshold may be derived from the significance or level of security required for the task. For example, accessing a bank account may require a higher level of security than accessing an email account and so the acceptance threshold for accessing the bank account will be higher than the acceptance threshold for accessing the email account. The acceptance threshold may be a minimum confidence score that is required to be met in order to identify/authenticate the user for the particular task. The acceptance threshold for each task may be predetermined by the entity requesting the authentication (e.g. by a bank requesting authentication of a user attempting to access a bank account).
At step 202, an initial authentication process is determined. The initial authentication process for a particular task may be predetermined or may be selectable from a number of different authentication processes. In a first example, an initial authentication process for accessing a smartphone may be selected or predetermined to be a behavioural biometric associated with a user's activity with the smartphone, such as the user's location. In a second example, an initial authentication method for accessing a bank account may be selected or predetermined to be inputting a bank account number by a user.
At step 203, the initial authentication process is performed. For a passive authentication process (as described above) the process is performed automatically without requesting or requiring an input from the user. E.g., in the first example above, to perform the behavioural biometric authentication process, a processor at the smartphone may access a GPS sensor to determine the user's location. The initial authentication process may require a user to perform an action for the process. E.g., in the second example above, a user may be prompted to enter their bank account number.
At step 204, an initial confidence score is determined based on the performance of the initial authentication process. The confidence score determined may indicate the likelihood of the user being an authorised user based on the performance of the authentication process. Data generated about the performance of the authentication process may be compared to known data/attributes about an authorised user and the confidence score may be determined based on how closely the generated data correlates with the known data/attributes. The comparison may be performed by the user device 10 or at a remote computing device. E.g., in the first example above, the GPS data may indicate that the user of the smartphone is at the home address of the authorised user and so it is likely that the smartphone user is an authorised user. Whereas, if the GPS data indicated that the smartphone user was at a location that an authorised user had never visited before, then it is less likely that the smartphone user is an authorised user. The likelihood (which may be a probability value) of the user being an authorised user may be used to determine the confidence score. In the second example, a user may enter a correct or an incorrect bank account number and a confidence score is determined based on the entry. If incorrect numbers are entered, a confidence score may be determined based on how closely the inputted numbers match the correct bank account number. For example, if only a single digit was incorrect, a higher confidence score may be determined than if multiple numbers were incorrect.
Each authentication process may be weighted according to how secure or risky it is, or the level of confidence that it can provide in the identity of a user. For example, fingerprint scanning may be considered to be more secure (and less risky) at identifying a user than entering a pin number and so the result (whether positive or negative) of the fingerprint scanning process may be provided with a greater weighting than the result of the pin number process. The confidence score may be determined in dependence on the weighting attributed to each authentication process.
At step 205, it is determined if the confidence score is greater than or equal to the acceptance threshold. If so, then the process moves on to step 206, where the user is authorised and accepted for the task. If not, then the process moves on to step 207.
A lower rejection threshold may be provided. A user may be rejected from being identified/authorised for a task if the confidence score is below the rejection threshold. The rejection threshold may be adjustable and dependent on which authentication process is used. For example, a negative result from a facial recognition process is more reliable than a negative result from a behavioural biometric associated with the way a device is held (e.g. because an injured arm may cause a false-negative result). Thus, the rejection threshold for the facial recognition authentication process may be higher than the rejection threshold for the behavioural biometric associated with the way a device is held. The rejection threshold may be based on a measure of the cumulative reliability of multiple authentication processes. Alternatively, the rejection threshold may be a fixed, predetermined threshold.
At step 207, it is determined if the confidence score is less than the rejection threshold. If the confidence score is less than the rejection threshold, then the process moves on to step 208 where the user is not authorised and rejected (and the process ends for the task). If the confidence score is greater than the rejection threshold, then the process moves on to step 209. As mentioned above, the confidence score and rejection threshold used at this step may a confidence score and rejection threshold determined from a single authentication process. Alternatively, the confidence score may be a cumulative confidence score determined from the performance of multiple authentication processes and compared with a predetermined rejection threshold or a threshold based on the multiple authentication processes used.
At step 209, the confidence score has not yet met the acceptance threshold and so another authentication process is selected. The next authentication process may be selected from a set of authentication process available to the device performing the identification/authentication. The set of authentication processes may depend on the type of device and it capabilities. For example, a smartphone may have a camera, microphone, motion sensors and so numerous types of authentication process can be carried out at the smartphone. An ATM machine, however, may only be equipped with a keypad and touchscreen and so only a limited number of authentication process are available to the ATM machine.
If a cumulative confidence score is being used, the next authentication process may be selected based on a difference between the confidence score and the acceptance threshold. For example, if there is a large difference between the confidence score and the acceptance threshold, a more secure and reliable authentication process may be selected. If there is a small difference between the confidence score and the acceptance threshold, then a less secure and less reliable authentication process may be selected but may provide a confidence score sufficient to meet the threshold. E.g., in the first example above, there may be a large difference in the confidence score and the acceptance threshold (e.g. because the smartphone was in an unfamiliar location for the location test) and so a secure and reliable authentication process may be selected such as a fingerprint scan. Alternatively, if in the first example, there was a small difference in the confidence score, then an authentication process that may be considered to be less secure and reliable may be selected, such as a behavioural biometric associated with the way the user is holding the smartphone (e.g. in a portrait or landscape orientation). This authentication process is convenient for the user as it does not require any additional action from the user and can be determined automatically from accelerometer information indicating the smartphone's orientation.
At step 210, the selected authentication process is performed. Depending on the authentication process selected, performance of the process may require a user input or the authentication process may be performed by a processor and without user input, as described above.
At step 211, a confidence score is determined based on the performance of the selected authentication process. The confidence score for the selected authentication process may be determined as described above.
The process then returns to step 205, where the new confidence score is tested against the threshold. The new confidence score tested at step 205 may be the last determined confidence score based on a single authentication process being performed or a combined score of some or all of the confidence scores that that been determined (e.g. from step 204 and from the loops around steps 205-211). If the confidence score is now above the acceptance threshold, the process moves on to step 206. If the confidence score remains below the acceptance threshold, then the process continues again from step 207.
If a combined confidence score is accumulated from the performance of some of all of the authentication processes, then a confidence score may be maintained in memory and updated each time the process loops from step 211 to step 205. Each update may increase or decrease the maintained confidence score depending on the result of the authentication process. For example, a positive result may increase the confidence score and a negative result may decrease the score. The amount of increase or decrease may be dependent on the likelihood that the user is an authorised user from each authentication process performed.
The process can loop between steps 205 and 211 until all of the available authentication process have been exhausted. If, after all of the available authentication process have been used and the confidence score is still below the acceptance threshold (and above the rejection threshold) then the user may be rejected. This is indicated in
The confidence score determined by the end of the process of
As mentioned above, the acceptance threshold may vary depending on the task for which the user is being identified/authenticated for. Providing a variable threshold in this way allows a device to select an appropriate authentication process for each task. For example, an appropriate high-security or low-security authentication process can be selected depending on the confidence score required to meet the acceptance threshold. E.g., as mentioned above, if the difference between the confidence score and the acceptance threshold is low, a low-security authentication process may be selected instead of a high-security process, which may be more onerous than a low-security process. In some cases, the low-security authentication process selected may not require any effort by the user and the device can automatically perform the low-security process without involving the user. This can lead to an overall reduction in the amount of actions required to be performed by the user without compromising on the increased security afforded by the use of multiple authentication processes.
If a user has been identified and/or authenticated to a first level of confidence by a first process and it is desired to select a second process for identify and/or authenticate the user to an increased level of confidence, the method for selecting the second process may take account of the degree of independence between the two processes. The second process may be selected as being one with a relatively high independence of the first process. For example, if in a first process the user has been identified based on their location, a second process that is dependent on the wireless networks currently available to the device might be considered to have a low level of independence. This allows the second process to provide a greater degree of additional confidence than would otherwise be the case.
The device of
Generally, any of the functions, methods, techniques or components described above can be implemented in software, firmware, hardware (e.g., fixed logic circuitry), or any combination thereof. The terms “module,” “functionality,” “component”, “element”, “unit”, “block” and “logic” may be used herein to generally represent software, firmware, hardware, or any combination thereof. In the case of a software implementation, the module, functionality, component, element, unit, block or logic represents program code that performs the specified tasks when executed on a processor. The algorithms and methods described herein could be performed by one or more processors executing code that causes the processor(s) to perform the algorithms/methods. Examples of a computer-readable storage medium include a random-access memory (RAM), read-only memory (ROM), an optical disc, flash memory, hard disk memory, and other memory devices that may use magnetic, optical, and other techniques to store instructions or other data and that can be accessed by a machine.
A processor, computer, or computer system may be any kind of device, machine or dedicated circuit, or collection or portion thereof, with processing capability such that it can execute instructions. A processor may be any kind of general purpose or dedicated processor, such as a CPU, GPU, System-on-chip, state machine, media processor, an application-specific integrated circuit (ASIC), a programmable logic array, a field-programmable gate array (FPGA), or the like. A computer or computer system may comprise one or more processors.
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
1611932 | Jul 2016 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/GB2017/051997 | 7/6/2017 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2018/007823 | 1/11/2018 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
3618019 | Nemirovsky | Nov 1971 | A |
3699517 | Dyche | Oct 1972 | A |
3983535 | Herbst | Sep 1976 | A |
4128829 | Herbst | Dec 1978 | A |
4621334 | Garcia | Nov 1986 | A |
4760386 | Heath | Jul 1988 | A |
4805222 | Young | Feb 1989 | A |
5305238 | Starr | Apr 1994 | A |
5442342 | Kung | Aug 1995 | A |
5485171 | Copper | Jan 1996 | A |
5557686 | Brown | Sep 1996 | A |
5565657 | Merz | Oct 1996 | A |
5581261 | Hickman | Dec 1996 | A |
5838306 | O'Connor | Nov 1998 | A |
5874941 | Yamada | Feb 1999 | A |
5999162 | Takahashi | Dec 1999 | A |
6202023 | Hancock | Mar 2001 | B1 |
6337686 | Wong | Jan 2002 | B2 |
6337919 | Dunton | Jan 2002 | B1 |
6442692 | Zilberman | Aug 2002 | B1 |
6572014 | Lambert | Jun 2003 | B1 |
6743022 | Sarel | Jun 2004 | B1 |
6819219 | Bolle | Nov 2004 | B1 |
6836554 | Bolle | Dec 2004 | B1 |
6895514 | Kermani | May 2005 | B1 |
6931131 | Becker | Aug 2005 | B1 |
6938061 | Rumynin | Aug 2005 | B1 |
6938159 | O'Connor | Aug 2005 | B1 |
6957185 | Labaton | Oct 2005 | B1 |
6957186 | Guheen | Oct 2005 | B1 |
6983061 | Ikegami | Jan 2006 | B2 |
7092926 | Cerrato | Aug 2006 | B2 |
7130452 | Bolle | Oct 2006 | B2 |
7133792 | Murakami | Nov 2006 | B2 |
7139916 | Billingsley | Nov 2006 | B2 |
7158118 | Liberty | Jan 2007 | B2 |
7236156 | Liberty | Jun 2007 | B2 |
7245218 | Ikehara | Jul 2007 | B2 |
7366919 | Sobel | Apr 2008 | B1 |
7395436 | Nemovicher | Jul 2008 | B1 |
7494061 | Reinhold | Feb 2009 | B2 |
7523191 | Thomas | Apr 2009 | B1 |
7535456 | Liberty | May 2009 | B2 |
7606915 | Calinov | Oct 2009 | B1 |
7796013 | Murakami | Sep 2010 | B2 |
7815106 | McConnell | Oct 2010 | B1 |
7818290 | Davis | Oct 2010 | B2 |
7860870 | Sadagopan | Dec 2010 | B2 |
8031175 | Rigazio | Oct 2011 | B2 |
8065624 | Morin | Nov 2011 | B2 |
8125312 | Orr | Feb 2012 | B2 |
8156324 | Shnowske | Apr 2012 | B1 |
8170953 | Tullis | May 2012 | B1 |
8171085 | Tevanian, Jr. | May 2012 | B1 |
8201222 | Inoue | Jun 2012 | B2 |
8244211 | Clark | Aug 2012 | B2 |
8285658 | Kellas-Dicks | Oct 2012 | B1 |
8417960 | Takahashi | Apr 2013 | B2 |
8433785 | Awadallah | Apr 2013 | B2 |
8449393 | Sobel | May 2013 | B2 |
8499245 | Froment | Jul 2013 | B1 |
8510113 | Conkie | Aug 2013 | B1 |
8548208 | Schultz | Oct 2013 | B2 |
8549629 | Mccreesh | Oct 2013 | B1 |
8555077 | Davis | Oct 2013 | B2 |
8621209 | Johansson | Dec 2013 | B1 |
8745729 | Poluri | Jun 2014 | B2 |
8788838 | Fadell | Jul 2014 | B1 |
8803797 | Scott | Aug 2014 | B2 |
8819812 | Weber | Aug 2014 | B1 |
8832823 | Boss | Sep 2014 | B2 |
8838060 | Walley | Sep 2014 | B2 |
8880441 | Chen | Nov 2014 | B1 |
8898787 | Thompson | Nov 2014 | B2 |
8904479 | Johansson | Dec 2014 | B1 |
8938787 | Turgeman | Jan 2015 | B2 |
8941466 | Bayram | Jan 2015 | B2 |
8990959 | Zhu | Mar 2015 | B2 |
9069942 | Turgeman | Jun 2015 | B2 |
9071969 | Turgeman | Jun 2015 | B2 |
9154534 | Gayles | Oct 2015 | B1 |
9174123 | Nasiri | Nov 2015 | B2 |
9195351 | Rosenberg | Nov 2015 | B1 |
9203860 | Casillas | Dec 2015 | B1 |
9275337 | Turgeman | Mar 2016 | B2 |
9282112 | Filatov | Mar 2016 | B2 |
9301140 | Costigan | Mar 2016 | B1 |
9304915 | Adams | Apr 2016 | B2 |
9355231 | Disraeli | May 2016 | B2 |
9355234 | Magi Shaashua | May 2016 | B1 |
9418221 | Turgeman | Aug 2016 | B2 |
9430629 | Ziraknejad | Aug 2016 | B1 |
9450971 | Turgeman | Sep 2016 | B2 |
9477826 | Turgeman | Oct 2016 | B2 |
9483292 | Turgeman | Nov 2016 | B2 |
9526006 | Turgeman | Dec 2016 | B2 |
9529987 | Deutschmann | Dec 2016 | B2 |
9531701 | Turgeman | Dec 2016 | B2 |
9531733 | Turgeman | Dec 2016 | B2 |
9536071 | Turgeman | Jan 2017 | B2 |
9541995 | Turgeman | Jan 2017 | B2 |
9547766 | Turgeman | Jan 2017 | B2 |
9552470 | Turgeman | Jan 2017 | B2 |
9558339 | Turgeman | Jan 2017 | B2 |
9589120 | Samuel | Mar 2017 | B2 |
9621567 | Turgeman | Apr 2017 | B2 |
9626677 | Turgeman | Apr 2017 | B2 |
9654485 | Neumann | May 2017 | B1 |
9665703 | Turgeman | May 2017 | B2 |
9674218 | Turgeman | Jun 2017 | B2 |
9690915 | Turgeman | Jun 2017 | B2 |
9703953 | Turgeman | Jul 2017 | B2 |
9710316 | Chheda | Jul 2017 | B1 |
9712558 | Turgeman | Jul 2017 | B2 |
9747436 | Turgeman | Aug 2017 | B2 |
9779423 | Turgeman | Oct 2017 | B2 |
9832192 | Alonso Cebrian | Nov 2017 | B2 |
9838373 | Turgeman | Dec 2017 | B2 |
9848009 | Turgeman | Dec 2017 | B2 |
9927883 | Lin | Mar 2018 | B1 |
10032010 | Turgeman | Jul 2018 | B2 |
10037421 | Turgeman | Jul 2018 | B2 |
10049209 | Turgeman | Aug 2018 | B2 |
10055560 | Turgeman | Aug 2018 | B2 |
10069837 | Turgeman | Sep 2018 | B2 |
10069852 | Turgeman | Sep 2018 | B2 |
10079853 | Turgeman | Sep 2018 | B2 |
10083439 | Turgeman | Sep 2018 | B2 |
10164985 | Turgeman | Dec 2018 | B2 |
10198122 | Turgeman | Feb 2019 | B2 |
10262324 | Turgeman | Apr 2019 | B2 |
10298614 | Turgeman | May 2019 | B2 |
10395018 | Turgeman | Aug 2019 | B2 |
10397262 | Karabchevsky | Aug 2019 | B2 |
10404729 | Turgeman | Sep 2019 | B2 |
10474815 | Turgeman | Nov 2019 | B2 |
10476873 | Turgeman | Nov 2019 | B2 |
10523680 | Turgeman | Dec 2019 | B2 |
10579784 | Turgeman | Mar 2020 | B2 |
10586036 | Turgeman | Mar 2020 | B2 |
10621585 | Turgeman | Apr 2020 | B2 |
10685355 | Novick | Jun 2020 | B2 |
10719765 | Novik | Jul 2020 | B2 |
10728761 | Kedem | Jul 2020 | B2 |
10747305 | Turgeman | Aug 2020 | B2 |
10776476 | Turgeman | Sep 2020 | B2 |
10834090 | Turgeman | Nov 2020 | B2 |
10834590 | Turgeman | Nov 2020 | B2 |
10897482 | Rivner | Jan 2021 | B2 |
10917431 | Turgeman | Feb 2021 | B2 |
10949514 | Turgeman | Mar 2021 | B2 |
10949757 | Turgeman | Mar 2021 | B2 |
20010004733 | Eldering | Jun 2001 | A1 |
20020023229 | Hangai | Feb 2002 | A1 |
20020089412 | Heger | Jul 2002 | A1 |
20030033526 | French | Feb 2003 | A1 |
20030074201 | Grashey | Apr 2003 | A1 |
20030137494 | Tulbert | Jul 2003 | A1 |
20030149803 | Wilson | Aug 2003 | A1 |
20030212811 | Thornton | Nov 2003 | A1 |
20040015714 | Abraham | Jan 2004 | A1 |
20040017355 | Shim | Jan 2004 | A1 |
20040021643 | Hoshino | Feb 2004 | A1 |
20040034784 | Fedronic | Feb 2004 | A1 |
20040062423 | Doi | Apr 2004 | A1 |
20040111523 | Hall | Jun 2004 | A1 |
20040123156 | Hammond | Jun 2004 | A1 |
20040128240 | Yusin | Jul 2004 | A1 |
20040143737 | Teicher | Jul 2004 | A1 |
20040186882 | Ting | Sep 2004 | A1 |
20040187037 | Checco | Sep 2004 | A1 |
20040221171 | Ahmed | Nov 2004 | A1 |
20050008148 | Jacobson | Jan 2005 | A1 |
20050060138 | Wang | Mar 2005 | A1 |
20050179657 | Russo | Aug 2005 | A1 |
20050289264 | Illowsky | Dec 2005 | A1 |
20060006803 | Huang | Jan 2006 | A1 |
20060080263 | Willis | Apr 2006 | A1 |
20060090073 | Steinberg | Apr 2006 | A1 |
20060123101 | Buccella | Jun 2006 | A1 |
20060143454 | Walmsley | Jun 2006 | A1 |
20060195328 | Abraham | Aug 2006 | A1 |
20060215886 | Black | Sep 2006 | A1 |
20060224898 | Ahmed | Oct 2006 | A1 |
20060238490 | Stanley | Oct 2006 | A1 |
20060239430 | Gue | Oct 2006 | A1 |
20060280339 | Cho | Dec 2006 | A1 |
20060282660 | Varghese | Dec 2006 | A1 |
20060284969 | Kim | Dec 2006 | A1 |
20060287079 | Nonaka | Dec 2006 | A1 |
20070118804 | Raciborski | May 2007 | A1 |
20070156443 | Gurvey | Jul 2007 | A1 |
20070174082 | Singh | Jul 2007 | A1 |
20070183633 | Hoffmann | Aug 2007 | A1 |
20070198286 | Tomita | Aug 2007 | A1 |
20070214426 | Ruelle | Sep 2007 | A1 |
20070226797 | Thompson | Sep 2007 | A1 |
20070236330 | Cho | Oct 2007 | A1 |
20070240230 | O'Connell | Oct 2007 | A1 |
20070241861 | Venkatanna | Oct 2007 | A1 |
20070250920 | Lindsay | Oct 2007 | A1 |
20070255821 | Ge | Nov 2007 | A1 |
20070266305 | Cong | Nov 2007 | A1 |
20070271466 | Mak | Nov 2007 | A1 |
20070283416 | Renaud | Dec 2007 | A1 |
20080046982 | Parkinson | Feb 2008 | A1 |
20080059474 | Lim | Mar 2008 | A1 |
20080066167 | Andri | Mar 2008 | A1 |
20080068343 | Hoshino | Mar 2008 | A1 |
20080084972 | Burke | Apr 2008 | A1 |
20080091453 | Meehan | Apr 2008 | A1 |
20080091639 | Davis | Apr 2008 | A1 |
20080092209 | Davis | Apr 2008 | A1 |
20080092245 | Alward | Apr 2008 | A1 |
20080097851 | Bemmel | Apr 2008 | A1 |
20080098456 | Alward | Apr 2008 | A1 |
20080120717 | Shakkarwar | May 2008 | A1 |
20080136790 | Hio | Jun 2008 | A1 |
20080162449 | Chao-Yu | Jul 2008 | A1 |
20080183745 | Cancel | Jul 2008 | A1 |
20080192005 | Elgoyhen | Aug 2008 | A1 |
20080200310 | Tagliabue | Aug 2008 | A1 |
20080211766 | Westerman | Sep 2008 | A1 |
20080215576 | Zhao | Sep 2008 | A1 |
20080263636 | Gusler | Oct 2008 | A1 |
20080298588 | Shakkarwar | Dec 2008 | A1 |
20080301808 | Calo | Dec 2008 | A1 |
20080306897 | Liu | Dec 2008 | A1 |
20080307236 | Lu | Dec 2008 | A1 |
20080309616 | Massengill | Dec 2008 | A1 |
20080319841 | Oliver | Dec 2008 | A1 |
20090037983 | Chiruvolu | Feb 2009 | A1 |
20090038010 | Ma | Feb 2009 | A1 |
20090049555 | Cho | Feb 2009 | A1 |
20090083850 | Fadell | Mar 2009 | A1 |
20090089879 | Wang | Apr 2009 | A1 |
20090094311 | Awadallah | Apr 2009 | A1 |
20090132395 | Lam | May 2009 | A1 |
20090133106 | Bentley | May 2009 | A1 |
20090134972 | Wu, Jr. | May 2009 | A1 |
20090157792 | Fiatal | Jun 2009 | A1 |
20090172551 | Kane | Jul 2009 | A1 |
20090177562 | Peace | Jul 2009 | A1 |
20090189736 | Hayashi | Jul 2009 | A1 |
20090199296 | Xie | Aug 2009 | A1 |
20090203355 | Clark | Aug 2009 | A1 |
20090227232 | Matas | Sep 2009 | A1 |
20090241188 | Komura | Sep 2009 | A1 |
20090254336 | Dumais | Oct 2009 | A1 |
20090281979 | Tysowski | Nov 2009 | A1 |
20090293119 | Jonsson | Nov 2009 | A1 |
20090299967 | Li | Dec 2009 | A1 |
20090300589 | Watters | Dec 2009 | A1 |
20090303204 | Nasiri | Dec 2009 | A1 |
20090320123 | Yu | Dec 2009 | A1 |
20100007632 | Yamazaki | Jan 2010 | A1 |
20100040293 | Hermann | Feb 2010 | A1 |
20100042387 | Gibbon | Feb 2010 | A1 |
20100042403 | Chandrasekar | Feb 2010 | A1 |
20100046806 | Baughman | Feb 2010 | A1 |
20100070405 | Joa | Mar 2010 | A1 |
20100077470 | Kozat | Mar 2010 | A1 |
20100082747 | Yue | Apr 2010 | A1 |
20100082998 | Kohavi | Apr 2010 | A1 |
20100097324 | Anson | Apr 2010 | A1 |
20100115610 | Tredoux | May 2010 | A1 |
20100122082 | Deng | May 2010 | A1 |
20100125816 | Bezos | May 2010 | A1 |
20100138370 | Wu | Jun 2010 | A1 |
20100164897 | Morin | Jul 2010 | A1 |
20100171753 | Kwon | Jul 2010 | A1 |
20100197352 | Runstedler | Aug 2010 | A1 |
20100203876 | Krishnaswamy | Aug 2010 | A1 |
20100225443 | Bayram | Sep 2010 | A1 |
20100245553 | Schuler | Sep 2010 | A1 |
20100269165 | Chen | Oct 2010 | A1 |
20100281539 | Burns | Nov 2010 | A1 |
20100284532 | Burnett | Nov 2010 | A1 |
20100287229 | Hauser | Nov 2010 | A1 |
20100321304 | Rofougaran | Dec 2010 | A1 |
20100328074 | Johnson | Dec 2010 | A1 |
20110010209 | McNally | Jan 2011 | A1 |
20110012829 | Yao | Jan 2011 | A1 |
20110016320 | Bergsten | Jan 2011 | A1 |
20110016534 | Jakobsson | Jan 2011 | A1 |
20110018828 | Wu | Jan 2011 | A1 |
20110023115 | Wright | Jan 2011 | A1 |
20110029902 | Bailey | Feb 2011 | A1 |
20110039529 | Kim | Feb 2011 | A1 |
20110039602 | McNamara | Feb 2011 | A1 |
20110043475 | Rigazio | Feb 2011 | A1 |
20110050394 | Zhang | Mar 2011 | A1 |
20110055077 | French | Mar 2011 | A1 |
20110063211 | Hoerl | Mar 2011 | A1 |
20110065504 | Dugan | Mar 2011 | A1 |
20110066682 | Aldunate | Mar 2011 | A1 |
20110082768 | Eisen | Apr 2011 | A1 |
20110102570 | Wilf | May 2011 | A1 |
20110105103 | Ullrich | May 2011 | A1 |
20110105859 | Popovic | May 2011 | A1 |
20110113388 | Eisen | May 2011 | A1 |
20110119370 | Huang | May 2011 | A1 |
20110134240 | Anderson | Jun 2011 | A1 |
20110154273 | Aburada | Jun 2011 | A1 |
20110154497 | Bailey | Jun 2011 | A1 |
20110159650 | Shiraishi | Jun 2011 | A1 |
20110159850 | Faith | Jun 2011 | A1 |
20110162076 | Song | Jun 2011 | A1 |
20110191820 | Ivey | Aug 2011 | A1 |
20110193737 | Chiueh | Aug 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110202453 | Issa | Aug 2011 | A1 |
20110221684 | Rydenhag | Sep 2011 | A1 |
20110223888 | Esaki | Sep 2011 | A1 |
20110225644 | Pullikottil | Sep 2011 | A1 |
20110246902 | Tsai | Oct 2011 | A1 |
20110248941 | Abdo | Oct 2011 | A1 |
20110251823 | Davis | Oct 2011 | A1 |
20110271342 | Chung | Nov 2011 | A1 |
20110276414 | Subbarao | Nov 2011 | A1 |
20110286730 | Gallagher | Nov 2011 | A1 |
20110300831 | Chin | Dec 2011 | A1 |
20110304531 | Brooks | Dec 2011 | A1 |
20110320822 | Lind | Dec 2011 | A1 |
20120005483 | Patvarczki | Jan 2012 | A1 |
20120005719 | McDougal | Jan 2012 | A1 |
20120007821 | Zaliva | Jan 2012 | A1 |
20120054834 | King | Mar 2012 | A1 |
20120072982 | Ranganathan | Mar 2012 | A1 |
20120096555 | Mahaffey | Apr 2012 | A1 |
20120101930 | Li | Apr 2012 | A1 |
20120102551 | Bidare | Apr 2012 | A1 |
20120113061 | Ikeda | May 2012 | A1 |
20120123932 | LeCuyer | May 2012 | A1 |
20120124662 | Baca | May 2012 | A1 |
20120133055 | Machida | May 2012 | A1 |
20120151044 | Luna | Jun 2012 | A1 |
20120151559 | Koudys | Jun 2012 | A1 |
20120154173 | Chang | Jun 2012 | A1 |
20120154273 | McDade | Jun 2012 | A1 |
20120154823 | Sakamoto | Jun 2012 | A1 |
20120158503 | Mardikar | Jun 2012 | A1 |
20120159599 | Szoke | Jun 2012 | A1 |
20120164978 | Conti | Jun 2012 | A1 |
20120167170 | Shi | Jun 2012 | A1 |
20120167204 | Akka | Jun 2012 | A1 |
20120174213 | Geiger | Jul 2012 | A1 |
20120188198 | Jeong | Jul 2012 | A1 |
20120204257 | O'Connell | Aug 2012 | A1 |
20120218193 | Weber | Aug 2012 | A1 |
20120239557 | Weinflash | Sep 2012 | A1 |
20120246737 | Paxton | Sep 2012 | A1 |
20120252410 | Williams | Oct 2012 | A1 |
20120278804 | Narayanasamy | Nov 2012 | A1 |
20120278886 | Luna | Nov 2012 | A1 |
20120284380 | Anderson | Nov 2012 | A1 |
20120297476 | Zeljkovic | Nov 2012 | A1 |
20130018796 | Kolhatkar | Jan 2013 | A1 |
20130024239 | Baker | Jan 2013 | A1 |
20130036416 | Raju | Feb 2013 | A1 |
20130061169 | Pearcy | Mar 2013 | A1 |
20130076650 | Vik | Mar 2013 | A1 |
20130088434 | Masuda | Apr 2013 | A1 |
20130097682 | Zeljkovic | Apr 2013 | A1 |
20130097706 | Titonis | Apr 2013 | A1 |
20130109944 | Sparacino | May 2013 | A1 |
20130111586 | Jackson | May 2013 | A1 |
20130132091 | Skerpac | May 2013 | A1 |
20130133055 | Ali | May 2013 | A1 |
20130135218 | Jain | May 2013 | A1 |
20130139248 | Rhee | May 2013 | A1 |
20130154999 | Guard | Jun 2013 | A1 |
20130162603 | Peng | Jun 2013 | A1 |
20130167212 | Azar | Jun 2013 | A1 |
20130173737 | Liu | Jul 2013 | A1 |
20130198832 | Draluk | Aug 2013 | A1 |
20130212674 | Boger | Aug 2013 | A1 |
20130226992 | Bapst | Aug 2013 | A1 |
20130237272 | Prasad | Sep 2013 | A1 |
20130239195 | Turgeman | Sep 2013 | A1 |
20130239206 | Draluk | Sep 2013 | A1 |
20130243208 | Fawer | Sep 2013 | A1 |
20130254642 | Seo | Sep 2013 | A1 |
20130282637 | Costigan | Oct 2013 | A1 |
20130288647 | Turgeman | Oct 2013 | A1 |
20130305357 | Ayyagari | Nov 2013 | A1 |
20130312097 | Turnbull | Nov 2013 | A1 |
20130335349 | Ferren | Dec 2013 | A1 |
20130346309 | Giori | Dec 2013 | A1 |
20130346311 | Boding | Dec 2013 | A1 |
20140033317 | Barber | Jan 2014 | A1 |
20140041020 | Zhao | Feb 2014 | A1 |
20140078061 | Simons | Mar 2014 | A1 |
20140078193 | Barnhoefer | Mar 2014 | A1 |
20140082369 | Waclawsky | Mar 2014 | A1 |
20140111451 | Park | Apr 2014 | A1 |
20140114843 | Klein | Apr 2014 | A1 |
20140118520 | Slaby | May 2014 | A1 |
20140123275 | Azar | May 2014 | A1 |
20140143304 | Hegarty | May 2014 | A1 |
20140168093 | Lawrence | Jun 2014 | A1 |
20140196119 | Hill | Jul 2014 | A1 |
20140200953 | Mun | Jul 2014 | A1 |
20140223531 | Outwater | Aug 2014 | A1 |
20140244499 | Gruner | Aug 2014 | A1 |
20140250538 | Rapaport | Sep 2014 | A1 |
20140259130 | Li | Sep 2014 | A1 |
20140270571 | Dwan | Sep 2014 | A1 |
20140283059 | Sambamurthy | Sep 2014 | A1 |
20140283068 | Call | Sep 2014 | A1 |
20140289833 | Briceno | Sep 2014 | A1 |
20140310764 | Tippett | Oct 2014 | A1 |
20140317028 | Turgeman | Oct 2014 | A1 |
20140317726 | Turgeman | Oct 2014 | A1 |
20140317734 | Valencia | Oct 2014 | A1 |
20140317744 | Turgeman | Oct 2014 | A1 |
20140325223 | Turgeman | Oct 2014 | A1 |
20140325645 | Turgeman | Oct 2014 | A1 |
20140325646 | Turgeman | Oct 2014 | A1 |
20140325682 | Turgeman | Oct 2014 | A1 |
20140337786 | Luo | Nov 2014 | A1 |
20140344927 | Turgeman | Nov 2014 | A1 |
20150002479 | Kawamura | Jan 2015 | A1 |
20150012920 | De Santis | Jan 2015 | A1 |
20150062078 | Christman | Mar 2015 | A1 |
20150081549 | Kimberg | Mar 2015 | A1 |
20150091858 | Rosenberg | Apr 2015 | A1 |
20150094030 | Turgeman | Apr 2015 | A1 |
20150101031 | Harjanto | Apr 2015 | A1 |
20150128252 | Konami | May 2015 | A1 |
20150146945 | Han | May 2015 | A1 |
20150205944 | Turgeman | Jul 2015 | A1 |
20150205955 | Turgeman | Jul 2015 | A1 |
20150205957 | Turgeman | Jul 2015 | A1 |
20150205958 | Turgeman | Jul 2015 | A1 |
20150212843 | Turgeman | Jul 2015 | A1 |
20150213244 | Lymberopoulos | Jul 2015 | A1 |
20150213245 | Tartz | Jul 2015 | A1 |
20150213246 | Turgeman | Jul 2015 | A1 |
20150213251 | Turgeman | Jul 2015 | A1 |
20150242601 | Griffiths | Aug 2015 | A1 |
20150256528 | Turgeman | Sep 2015 | A1 |
20150256556 | Kaminsky | Sep 2015 | A1 |
20150264572 | Turgeman | Sep 2015 | A1 |
20150268768 | Woodhull | Sep 2015 | A1 |
20150279155 | Chun | Oct 2015 | A1 |
20150310196 | Turgeman | Oct 2015 | A1 |
20150348038 | Femrite | Dec 2015 | A1 |
20150358317 | Deutschmann | Dec 2015 | A1 |
20160006800 | Summers | Jan 2016 | A1 |
20160012465 | Sharp | Jan 2016 | A1 |
20160019546 | Eisen | Jan 2016 | A1 |
20160034673 | Chandra | Feb 2016 | A1 |
20160042164 | Goldsmith | Feb 2016 | A1 |
20160048937 | Mathura | Feb 2016 | A1 |
20160055324 | Agarwal | Feb 2016 | A1 |
20160057623 | Dutt | Feb 2016 | A1 |
20160077620 | Choi | Mar 2016 | A1 |
20160087952 | Tartz | Mar 2016 | A1 |
20160109969 | Keating | Apr 2016 | A1 |
20160132105 | Turgeman | May 2016 | A1 |
20160155126 | D'Uva | Jun 2016 | A1 |
20160164905 | Pinney Wood | Jun 2016 | A1 |
20160164906 | Pinney Wood | Jun 2016 | A1 |
20160174044 | Jones | Jun 2016 | A1 |
20160179245 | Johansson | Jun 2016 | A1 |
20160182503 | Cheng | Jun 2016 | A1 |
20160191237 | Roth | Jun 2016 | A1 |
20160196414 | Stuntebeck | Jul 2016 | A1 |
20160197918 | Turgeman | Jul 2016 | A1 |
20160209948 | Tulbert | Jul 2016 | A1 |
20160226865 | Chen | Aug 2016 | A1 |
20160241555 | Vo | Aug 2016 | A1 |
20160294837 | Turgeman | Oct 2016 | A1 |
20160300049 | Guedalia | Oct 2016 | A1 |
20160300054 | Turgeman | Oct 2016 | A1 |
20160306974 | Turgeman | Oct 2016 | A1 |
20160307191 | Turgeman | Oct 2016 | A1 |
20160307201 | Turgeman | Oct 2016 | A1 |
20160321445 | Turgeman | Nov 2016 | A1 |
20160321689 | Turgeman | Nov 2016 | A1 |
20160328572 | Valacich | Nov 2016 | A1 |
20160342826 | Apostolos | Nov 2016 | A1 |
20160344783 | Kushimoto | Nov 2016 | A1 |
20160364138 | Luo | Dec 2016 | A1 |
20160366177 | Turgeman | Dec 2016 | A1 |
20160371476 | Turgeman | Dec 2016 | A1 |
20170011217 | Turgeman | Jan 2017 | A1 |
20170012988 | Turgeman | Jan 2017 | A1 |
20170017781 | Turgeman | Jan 2017 | A1 |
20170032114 | Turgeman | Feb 2017 | A1 |
20170034210 | Talmor | Feb 2017 | A1 |
20170048272 | Yamamura | Feb 2017 | A1 |
20170054702 | Turgeman | Feb 2017 | A1 |
20170063858 | Bandi | Mar 2017 | A1 |
20170076089 | Turgeman | Mar 2017 | A1 |
20170085587 | Turgeman | Mar 2017 | A1 |
20170090418 | Tsang | Mar 2017 | A1 |
20170091450 | Turgeman | Mar 2017 | A1 |
20170126735 | Turgeman | May 2017 | A1 |
20170127197 | Mulder | May 2017 | A1 |
20170140279 | Turgeman | May 2017 | A1 |
20170149958 | Xian | May 2017 | A1 |
20170154366 | Turgeman | Jun 2017 | A1 |
20170177999 | Novik | Jun 2017 | A1 |
20170193526 | Turgeman | Jul 2017 | A1 |
20170195354 | Kesin | Jul 2017 | A1 |
20170195356 | Turgeman | Jul 2017 | A1 |
20170221064 | Turgeman | Aug 2017 | A1 |
20170302340 | Berlin | Oct 2017 | A1 |
20170364674 | Grubbs | Dec 2017 | A1 |
20170364919 | Ranganath | Dec 2017 | A1 |
20180012003 | Asulin | Jan 2018 | A1 |
20180012227 | Tunnell | Jan 2018 | A1 |
20180034850 | Turgeman | Feb 2018 | A1 |
20180046792 | Toqan | Feb 2018 | A1 |
20180095596 | Turgeman | Apr 2018 | A1 |
20180097841 | Stolarz | Apr 2018 | A1 |
20180103047 | Turgeman | Apr 2018 | A1 |
20180107836 | Boger | Apr 2018 | A1 |
20180115899 | Kedem | Apr 2018 | A1 |
20180121640 | Turgeman | May 2018 | A1 |
20180160309 | Turgeman | Jun 2018 | A1 |
20180302425 | Esman, Sr. | Oct 2018 | A1 |
20180314816 | Turgeman | Nov 2018 | A1 |
20180349583 | Turgeman | Dec 2018 | A1 |
20180350144 | Rathod | Dec 2018 | A1 |
20180351959 | Turgeman | Dec 2018 | A1 |
20180373780 | Pascarella | Dec 2018 | A1 |
20190028497 | Karabchevsky | Jan 2019 | A1 |
20190057200 | Sabag | Feb 2019 | A1 |
20190121956 | Turgeman | Apr 2019 | A1 |
20190124068 | Anders | Apr 2019 | A1 |
20190156034 | Kedem | May 2019 | A1 |
20190158535 | Kedem | May 2019 | A1 |
20190220863 | Novick | Jul 2019 | A1 |
20190236391 | Novik | Aug 2019 | A1 |
20190272025 | Turgeman | Sep 2019 | A1 |
20190342328 | Rivner | Nov 2019 | A1 |
20190342329 | Turgeman | Nov 2019 | A1 |
20200012770 | Turgeman | Jan 2020 | A1 |
20200045044 | Turgeman | Feb 2020 | A1 |
20200076816 | Turgeman | Mar 2020 | A1 |
20200234306 | Turgeman | Jul 2020 | A1 |
20200273040 | Novick | Aug 2020 | A1 |
20200327212 | Kedem | Oct 2020 | A1 |
20200327422 | Novik | Oct 2020 | A1 |
20210004451 | Novik | Jan 2021 | A1 |
20210014236 | Turgeman | Jan 2021 | A1 |
20210021997 | Turgeman | Jan 2021 | A1 |
20210051172 | Turgeman | Feb 2021 | A1 |
Number | Date | Country |
---|---|---|
2410450 | Jan 2012 | EP |
2477136 | Jul 2012 | EP |
2541452 | Jan 2013 | EP |
2610776 | Jul 2013 | EP |
2646904 | Aug 2018 | EP |
3019991 | Feb 2019 | EP |
2338092 | May 2010 | ES |
2005099166 | Oct 2005 | WO |
2007146437 | Dec 2007 | WO |
2012001697 | Jan 2012 | WO |
2012073233 | Jun 2012 | WO |
2013161077 | Oct 2013 | WO |
2015127253 | Aug 2015 | WO |
2016080995 | May 2016 | WO |
2018007821 | Jan 2018 | WO |
2018007823 | Jan 2018 | WO |
2018055406 | Mar 2018 | WO |
Entry |
---|
International Search Report and Written Opinion for PCT/GB2017/051997 dated Jan. 9, 2017, 12 pages. |
Search Report for GB 1611932.3 dated Jan. 5, 2017, 4 pages. |
Riva et al.; “Progressive authentication: deciding when to authenticate on mobile phones,” Jan. 2012, 16 pages. |
Faisal Alkhateeb et al., “Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies”, International Journal of Security and its Applications 6(4):53-66, Oct. 2012. |
Sungzoon Cho et al., “Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication”, International Conference on Biometrics (ICB)—Advances in Biometrics, pp. 626-632, year 2006. |
International Search Report for PCT/IB2017/055995, dated Feb. 15, 2018. |
Written Opinion of the International Search Authority for PCT/IB2017/055995, dated Feb. 15, 2018. |
Supplementary European Search Report for application 11844440 dated Nov. 17, 2017. |
International Search Report for application PCT/IB2016/054064 dated Nov. 21, 2016. |
International Search Report for application PCT/IB2014/062941 dated Dec. 17, 2014. |
International Search Report for application PCT/IB2014/062293 dated Oct. 1, 2014. |
International Search Report for application PCT/IL2011/000907 dated Apr. 19, 2012. |
Nakkabi et al., “Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors with Separate Features”, Nov. 2010, IEEE Transactions on System, Man, and Cybernetics; vol. 40, No. 6. |
Nance et al., “Virtual Machine Introspection”, IEEE Security & Privacy, 2008. |
Garfinkel and Rosenblum, “A virtual Machine Introspection-Based Architecture for Intrusion Detection.”, 2003, Proc. Network and Distributed Systems Security Symp., The Internet Society, pp. 191-206. |
Spafford et al., “Software Forensics: Can We Track Code to its Authors?”, Feb. 1992, Computer Science Technical Report, Purdue e-Pubs, Report No. CSD-TR-92-010. |
Tavis Ormandy, “An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments”, retrieved from the Internet on May 3, 2017, from: http://taviso.decsystem.org/virtsec.pdf. |
Zheng et al., “An Efficient User Verification System via Mouse Movements”, Oct. 17-21, 2011, CCS' 11, Chicago, Illinois. |
Liston et al., “On the Cutting Edge: Thwarting Virtual Machine Detection”; retrieved from the Internet on May 3, 2017, from: http://docplayer.net/9791309-On-the-cutting-edge-thwarting-virtual-machine-detection.html. |
Georgia Frantzeskou et al., “Identifying Authorship by Byte-Level N-Grams: The source Code Author Profile (SCAP) Method”, Spring 2007, International Journal of Digital Evidence, vol. 6, issue 1. |
Franklin et al., “Remote Detection of Virtual Machine Monitors with Fuzzy benchmarking”, ACM SIGOPS Operating Systems Review, V42, Issue 3, Apr. 2008. |
Emmanouil Vasilomanolakis, “A honeypot-driven cyber incident monitor: Lessons learned and steps ahead”; Sep. 2015; SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks; Publisher: ACM; pp. 1-7. |
Ahmed et al., “A New Biometric Technology Based on Mouse Dynamics”, Jul.-Sep. 2007, IEEE Transactions on Dependable and Secure Computing, vol. 4, No. 3, pp. 165-179. |
Bailey, Kyle O., “Computer Based Behavioral Biometric Authentication Via Multi-Modal Fusion”, Thesis, 2013, Air Force Insitute of Technology. |
Elizabeth Stinson and John C. Mitchell, “Characterizing the Remote Control Behavior of Bots”, Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, p. 89-108. Dec. 31, 2007. |
Todorov, “Optimality Principles in Sensorimotor Control (Review)”, Sep. 2004, Nature Neuroscience 7, pp. 907-915. |
Cleeff et al., “Security Implications of Virtualization: A Literature Study”, Science and Engineering, 2009. |
Hibbeln et al., “Detecting Deception in Online Environments: Measuring Fraud Through Mouse Cursor Movements”, Jun. 7, 2014, Gmunden Retreat on NeuroIS 2014 Gmunden Austria, p. 38. |
Ferrie Peter, “Attack on Virtual Machine Emulators”, Symantec Technology Exchange, 2007. |
Yampolskiy et al., “Behavioural Biometrics: a survey and classification”, 2008, International Journal of Biometrics, vol. 1, No. 1, pp. 81-113. |
Provos et al., 2007, “The Ghost in the Browser: Analysis of Web-based Malware”. |
Huang Yao-Wen et al., “Web application security assessment by fault injection and behavior monitoring”, 2003, Proceedings of the 12th international conference on World Wide Web, ACM. |
Ben Hansen, “The Blur Busters Mouse Guide”, dated Feb. 1, 2014; printed from the Internet on Aug. 5, 2019 from: https://www.blurbusters.com/faq/mouse-guide/. |
Chris Cain, “Analyzing Man-in-the-Browser (MITB) Attacks”, dated Dec. 2014; downloaded from the Internet on Aug. 5, 2019 from: https://www.sans.org/reading-room/whitepapers/forensics/analyzing-man-in-the-browser-mitb-attacks-35687. |
communication from the European Patent Office (EPO) in EP 14814408, dated Oct. 15, 2019. |
Bassam Sayed, “A Static Authentication Framework Based on Mouse Gesture Dynamics”, Helwan University, 2003. |
communication from the European Patent Office (EPO) in EP 17739666, dated Jun. 17, 2020. |
Communication from the European Patent Office (EPO) in EP 17777357, dated Jul. 23, 2020. |
International Search Report (ISR) in PCT/IL2020/050724, dated Sep. 7, 2020. |
Written Opinion of the International Searching Authority in PCT/IL2020/050724, dated Sep. 7, 2020. |
J. D. Crawford et al., “Spatial Transformations for Eye—Hand Coordination”, Journal of Neurophysiology, vol. 92, Issue 1, pp. 10-19, Jul. 2004. |
Communication from the European Patent Office (EPO) in patent application No. EP 17739667, dated Oct. 20, 2020. |
Machine Translation of patent application No. EP 2338092 A1, Obtained on Jan. 14, 2021 from: https://patents.google.com/patent/EP2338092A1/en. |
Asaf Shabtai et al., “Andromaly”: a behavioral malware detection framework for android devices, Journal of Intelligent Information Systems, Jan. 6, 2011. |
International Search Report for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019. |
Written Opinion of the International Searching Authority for PCT international application PCT/IL2018/051246, dated Mar. 11, 2019. |
Written Opinion of the International Searching Authority for PCT international application PCT/IL2011/000907, dated Apr. 19, 2012. |
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062293, dated Oct. 1, 2014. |
Written Opinion of the International Searching Authority for PCT international application PCT/IB2014/062941, dated Dec. 17, 2014. |
Written Opinion of the International Searching Authority for PCT international application PCT/IB2016/054064, dated Jul. 9, 2015. |
Syed Ahsan Abbas et al., “What is the difference between a rooted and unrooted Android?” Quora.com, dated Jul. 22, 2016, printed on Aug. 12, 2019 from: www.Quora.com/What-is-the-difference-between-a-rooted-and-unrooted-Android. |
Sebastian Lindstrom, “Getting to know asynchronous JavaScript: Callbacks, Promises and Async / Await”, Medium.com, dated Jul. 2, 2017, printed on Aug. 12, 2019 from: Medium.com/codebuddies/getting-to-know-asynchronous-javascript-callbacks-promises-and-async-await-17e0673281ee. |
Machine translation of WO 2013/161077 A1, “Biometric authentication device, biometric authentication program, and biometric authentication method”, Obtained on Jan. 24, 2020 from: https://patents.google.com/patent/WO2013161077A1/en?oq=JP2006277341A. |
Oriana Riva et al., “Progressive authentication: Deciding when to authenticate on mobile phones”, USENIX Security Symposium 2012. |
Number | Date | Country | |
---|---|---|---|
20210004451 A1 | Jan 2021 | US |