A Turgeman, O Kedem, U Rivner - US Patent 10,834,590, 2020 - Google Patents
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a cyber-attacker. A user utilizes a desktop computer, a …
I Novick, A Turgeman - US Patent 10,685,355, 2020 - Google Patents
Method, device, and system of detecting a mule bank account, or a bank account used for terror funding or money laundering. A method includes: monitoring interactions of a user …
A Turgeman - US Patent 10,917,431, 2021 - Google Patents
System, method, and device of detecting identity of a user and authenticating a user; as well as detecting a possible attacker or impostor, and differentiating among users of an electronic …
A Turgeman - US Patent 10,949,757, 2021 - Google Patents
Device, system, and method of detecting identity of a user based on motor-control loop model. A method includes: during a first session of a user who utilizes a pointing device for …
A Turgeman - US Patent 10,298,614, 2019 - Google Patents
Devices, systems, and methods of generating and managing behavioral biometric cookies. The system monitors user-interactions of a user, that are performed via an input unit of an …
A Turgeman - US Patent 10,586,036, 2020 - Google Patents
Devices, systems, and methods of password recovery and password reset, as well as resetting or recovering other types of user-authentication factor. A system monitors and …
A Turgeman - US Patent 10,474,815, 2019 - Google Patents
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods include monitoring of …
A Turgeman, O Kedem - US Patent 10,621,585, 2020 - Google Patents
Devices, systems, and methods of contextual mapping of web-page elements and other User Interface elements, for the purpose of differentiating between fraudulent transac tions …
A Turgeman, U Rivner - US Patent 10,776,476, 2020 - Google Patents
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. A log-in process or a user …