Device, method, and system of generating fraud-alerts for cyber-attacks
A Turgeman - US Patent 10,404,729, 2019 - Google Patents
Devices, systems, and methods of detecting user identity, differentiating between users of a
computerized service, and detecting a cyber-attacker. An end-user device (a desktop …
computerized service, and detecting a cyber-attacker. An end-user device (a desktop …
Method, device, and system of differentiating between a cyber-attacker and a legitimate user
A Turgeman, O Kedem, U Rivner - US Patent 10,834,590, 2020 - Google Patents
Devices, systems, and methods of detecting user identity, differentiating between users of a
computerized service, and detecting a cyber-attacker. A user utilizes a desktop computer, a …
computerized service, and detecting a cyber-attacker. A user utilizes a desktop computer, a …
Device, system, and method of liveness detection utilizing voice biometrics
A Aley-Raz, NM Krause, MI Salmon… - US Patent 8,442,824, 2013 - Google Patents
Device, system, and method of liveness detection using voice biometrics. For example, a
method comprises: generating a first matching score based on a comparison between:(a) a …
method comprises: generating a first matching score based on a comparison between:(a) a …
Methods and systems for authenticating users
CR White, M Peirce, JS Cramer, CB Steiner… - US Patent …, 2013 - Google Patents
US8443202B2 - Methods and systems for authenticating users - Google Patents US8443202B2
- Methods and systems for authenticating users - Google Patents Methods and systems for …
- Methods and systems for authenticating users - Google Patents Methods and systems for …
Biometrics identification module and personal wearable electronics network based authentication and transaction processing
E Kursun, G Fernandez, A Berson… - US Patent …, 2018 - Google Patents
Biometrics identification module and personal wearable electronics network based
authentication and transaction processing are disclosed. According to one embodiment, a …
authentication and transaction processing are disclosed. According to one embodiment, a …
System and method for reassociating an account number to another transaction account
F Bishop, T Neemann, D Armes - US Patent App. 12/023,834, 2012 - Google Patents
(57) ABSTRACT A method and system for converting a first transaction account device to a
second transaction account device wherein a card number associated with, or defined as, a …
second transaction account device wherein a card number associated with, or defined as, a …
Detection of computerized bots and automated cyber-attack modules
A Turgeman, I Novick - US Patent 10,069,852, 2018 - Google Patents
Devices, systems, and methods of detecting whether an electronic device or computerized
device or computer, is being controlled by a legitimate human user, or by an automated …
device or computer, is being controlled by a legitimate human user, or by an automated …
System and method for user authentication and dynamic usability of touch-screen devices
HL Alward, TE Meehan, JJ Straub III, N Carr… - US Patent …, 2013 - Google Patents
(60) Provisional application No. 60/844,917,? led on Sep.(57) ABSTRACT 15, 2006,
provisional application No, 60/846,690, A system and related method are provided for user …
provisional application No, 60/846,690, A system and related method are provided for user …
Biometric registration for facilitating an RF transaction
BW Beenau, DS Bonalle, SW Fields, WJ Gray… - US Patent …, 2013 - Google Patents
(57) ABSTRACT A method for registering biometric information for use in a transponder-
reader system is disclosed. The method includes steps of detecting, verifying and storing a …
reader system is disclosed. The method includes steps of detecting, verifying and storing a …
System, method, and device of detecting identity of a user and authenticating a user
A Turgeman - US Patent 10,395,018, 2019 - Google Patents
Abstract System, method, and device of detecting identity of a user and authenticating a
user; as well as detecting a possible attacker or impostor, and differentiating among users of …
user; as well as detecting a possible attacker or impostor, and differentiating among users of …