Givatayim, Israel

Ayelet Eliezer


Average Co-Inventor Count = 3.8

ph-index = 4

Forward Citations = 61(Granted Patents)


Location History:

  • Givatyim, IL (2015 - 2016)
  • Givatayim, IL (2013 - 2017)

Company Filing History:


Years Active: 2013-2017

Loading Chart...
5 patents (USPTO):Explore Patents

Title: Ayelet Eliezer: Innovator in Authentication Technologies

Introduction

Ayelet Eliezer is a prominent inventor based in Givatayim, Israel. She has made significant contributions to the field of authentication technologies, holding a total of 5 patents. Her work focuses on improving security measures through innovative techniques.

Latest Patents

One of her latest patents is titled "Managing Policy." This technique involves storing information related to previous authentication requests, which can be utilized in future authentication operations. The process includes receiving a policy request to modify an existing policy and generating alterations based on the stored information. Another notable patent is "Question Generation in Knowledge-Based Authentication from Activity Logs." This improved technique generates Knowledge-Based Authentication (KBA) questions derived from facts in an activity log, such as a user's web browsing history. The KBA system analyzes each entry in the activity log to create relevant questions for enhanced security.

Career Highlights

Ayelet has worked with notable companies, including EMC Corporation and EMC IP Holding Company LLC. Her experience in these organizations has allowed her to develop and refine her innovative ideas in the field of authentication.

Collaborations

Throughout her career, Ayelet has collaborated with talented individuals such as Yedidya Dotan and Ayelet Avni. These partnerships have contributed to her success and the advancement of her inventions.

Conclusion

Ayelet Eliezer is a trailblazer in the realm of authentication technologies, with a strong portfolio of patents that reflect her innovative spirit. Her contributions continue to shape the future of security in digital environments.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…