• Home
  • Len Leonid Mizrah
Len Leonid Mizrah

Len Leonid Mizrah
Authernative, Inc., USA · Information Security

PhD of Physics
Research in Cybersecurity, Electronics, & Physics. (17 US Pat.) Google Scholar: Citations 1349; h-index 18; i10-index 20

About

54
Publications
670,284
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
16
Citations
Citations since 2016
1 Research Item
2 Citations
20162017201820192020202120220.00.20.40.60.81.0
20162017201820192020202120220.00.20.40.60.81.0
20162017201820192020202120220.00.20.40.60.81.0
20162017201820192020202120220.00.20.40.60.81.0
Introduction
Dr. Len L. Mizrah is currently a CEO of Authernative, Inc. in the "Silicon Valley" of the United States. Len leads the company's research in various fundamental and application aspects of cyber security: credentials security; multi-factor, mutual, and multi-channel authentication protocols; encryption key management; financial transactions security; crypto-security at the front-end, back-end, and on the 'wire'. Dr. Len L. Mizrah is a Senior Life Member of IEEE, Member of APS, Member of ISACA.
Additional affiliations
October 2001 - October 2015
Independent Researcher
Independent Researcher
Position
  • President and CEO
October 2001 - October 2015
Independent Researcher
Independent Researcher
Position
  • President and CEO

Publications

Publications (54)
Method
Full-text available
Statistical approach to test various group of phenotypes for a professional fitness by measuring various genotype reflexes like a latent time after action while being under the influence of various interferences, enabled with a specially designed electronic reflectometer.
Patent
Full-text available
A party can authenticate itself by interacting with multiple servers without revealing the shared secret to any of the involved parties. The stored shared secret is strengthened and broken into shares and saved on the servers. The shared secret is safe against offline brute force attack unless all servers where the shares are stored are compromised...
Patent
Full-text available
An interactive method for authentication is based on two shared secrets, both shared secrets in the form of an ordered path on the frame of reference. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. The first step of authentication that a user performs requires the user t...
Patent
Full-text available
An interactive method for authentication is based on two shared secrets, both shared secrets in the form of an ordered path on the frame of reference. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. The first step of authentication that a user performs requires the user t...
Patent
Full-text available
An interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference. An instance of the frame of reference comprises an array of characters in which the characters are arranged in a random or other irregular pattern on a grid of content fields. An authentication challe...
Patent
Full-text available
An interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference. An instance of the frame of reference comprises an array of characters in which the characters are arranged in a random or other irregular pattern on a grid of content fields. An authentication challe...
Patent
Full-text available
Abstract Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. The two parties use a shared secret to produ...
Patent
Full-text available
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. The two parties use a shared secret to produce a commo...
Patent
Full-text available
Abstract A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An authentication session is initiated upon receiving a client identifier at the server-side...
Patent
Full-text available
A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An authentication session is initiated upon receiving a client identifier at the server-side resources...
Patent
Full-text available
Abstract Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. A common matrix M, shared in advance, is mul...
Patent
Full-text available
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. A common matrix M, shared in advance, is multiplied by...
Patent
Full-text available
Abstract Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical client-side data processing machines. After a first security tier, a first communication channel is opened to a first data processing machine on the client side. The session proceeds...
Method
Full-text available
The present invention includes devices and methods for enabling private and secure data collection by profile servers relating to users that are associated with a profiling user in a social networking system. Particular aspects of the present invention are described in the claims, specification and drawings.
Method
Full-text available
A server executes a protocol that automates transactions involving a customer and a merchant agreeing to trade money in the customer’s account for goods or services available from the merchant. The protocol protects personal identifying information of the customer from disclosure to the merchant, and protects all parties from repudiation of the spe...
Patent
Full-text available
Abstract An interactive method for authentication is based on two shared secrets, including a first shared secret in the form of an ordered path on the frame of reference, and a second shared secret in the form of locations on the frame of reference at which characters identifying a subset of the ordered path are to be displayed. An instance of th...
Patent
Full-text available
Financial institution back office computerized transaction-processing system with embedded privacy and security layer (EPSL) enables strong transaction authentication prior to a merchant or vendor contact, based on a user account number, transaction conditions like anticipated transaction time and money, user two-factor authentication with a static...
Patent
Full-text available
An interactive client-server authentication system and method are based on Random Partial Pattern Recognition algorithm (RPPR). In RPPR, an ordered set of data fields is stored for a client to be authenticated in secure memory. An authentication server presents a clue to the client via a communication medium, such positions in the ordered set of a...
Patent
Full-text available
Abstract An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol. The server provides ephemeral encryption keys in response to a request during a Session Random Key (SRK) initiation interval. SRK...
Patent
Full-text available
Abstract A system for authentication of a client includes logic supporting a "what user knows" algorithm for authentication of a client, such as a random partial pattern recognition algorithm, based upon client credentials including an account user name and an account authentication code. Logic supporting client account administration is operable...
Patent
Full-text available
Abstract A system for authentication of a client includes logic supporting a "what user knows" algorithm for authentication of a client, such as a random partial pattern recognition algorithm, based upon client credentials including an account user name and an account authentication code. Logic supporting client account administration is operable...
Patent
Full-text available
Abstract An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol, so that key management becomes an essential part of the authentication protocol itself. The system provides a secure distribution...
Patent
Full-text available
Abstract A clocked authentication, authorization and accounting (CAAA) system and method offers private and secure credit/debit card online and offline financial transactions (FT) including an embedded privacy and security layer (EPSL) architecture. EPSL includes an authentication stage prior to the authorization stage that is automated and enable...
Patent
Full-text available
Abstract An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol. The server encrypts a particular data random key by first veiling the particular data random key using a first conversion array s...
Patent
Full-text available
Abstract A graphical user interface supports an interactive client-server authentication based on Random Partial Pattern Recognition algorithm (RPPR). In RPPR, an ordered set of data fields is stored for a client to be authenticated in secure memory on the server side. A graphical user interface presents a clue generated at the server to the clien...
Patent
Full-text available
Abstract An authentication server provides a clue to a client indicating a random partial subset of a full pattern that characterizes a full digitized path on a frame of reference, and the client enters a data to fulfill an authentication factor suggested by the clue. The full pattern consists of an ordered set of data fields, which store paramete...
Method
Full-text available
A system for authentication of a client includes logic supporting combinations of more than one a ”what user knows” authentication factors for strong authentication of a client, such as a static password, random partial pattern recognition factor and a random partial digitized path recognition factor. An interactive method for authentication of a c...
Article
Full-text available
A technique for predicting the yield distribution of CMOS circuits based on electrical parameter distributions is presented. This technique uses the mean and standard deviation of the measured threshold voltage and mobility of NMOS and PMOS transistors to project the yield of the circuit in a specified design window. The method of prediction is bas...
Article
Full-text available
The change in the concentration of charge carriers during 60Co γ-quanta irradiation (irradiation temperature 195,273,330K) of silicon zonal crystals with equilibrium electron concentration n0=(1.3-80)x1012 and holes p0=(5-30)x1011cm-3 has been investigated. It is shown that in high-resistance crystals of n-type with n0<1x1013cm-3 in contrast to p-t...
Article
Full-text available
An investigation was made of the dependence of the efficiency of defect formation in n-type Si on the electron flux density. It was established that the efficiency of formation of recombination and compensating defects increased on increase of the dose rate. An earlier model of the Coulomb interaction between oppositely charged vacancies and inters...
Article
Full-text available
Experimentally found that the lines of InfraRed (IR) absorption of Phosphorous and Boron impurity atoms in Silicon with the isovalent admixture of Germany are heterogeneous at width and thus do not observe the displacement of their center of gravity observed effects due to the presence of crystals' internal deformation fields due to the difference...
Article
Full-text available
Irreversible structural changes in cadmium sulfide crystals, caused by laser radiation with quantum energy insufficient to excite electron transitions of the band-band or band-impurity type, were studied. From an investigation of the low-temperature luminescence spectra, it was established that continuous infrared illumination (10. 6 mu ) causes ac...
Article
Full-text available
1. In the field of laser radiation in semiconductors, the drift of electrons and atomic impurities occurs, which affects the optical characteristics and the nature of the interaction of laser radiation with semiconductors. 2. LID of electrons in the field of nanosecond and picosecond laser pulses causes a record high magnitude of the refractive ind...
Article
Full-text available
The mechanism is suggested for large distance migration of high-energy-particle-produced interstitial atoms. It is shown that within the limits of a weak bond with a crystal lattice interstitial migration may be described by the Schrödinger time equation with cubical nonlinearity. Its solution corresponds to a soliton state of the interstitial atom...
Article
Full-text available
The principal physical mechanisms producing changes in the refraction index of Si crystals irradiated by high-power ultrashort light pulses are analyzed, with attention given to single- and two-photon absorption, saturation of a single-photon band-to-band transition, recombination processes, and heating. The kinetics of diffraction efficiency is de...
Article
Full-text available
A model is proposed for the process of formation of defects in semiconductors in which the components of Frenkel pairs are mobile during irradiation. The model is based on the screening of these components by equilibrium or nonequilibrium carriers. A study is made of the possibility of deriving the distribution function of the internal distances in...
Article
Full-text available
An electron-induced effect of simulation of defect annealing rate in semiconductors has been studied by irreversible thermodynamics method. It is established that the effect is stipulated by an interaction between excited charge carriers and the crystal lattice. It is determined that the value and sign of the annealing temperature shift depend on t...
Article
Full-text available
Kinetics of radiation defects accumulation in n-Ge at room temperature have been studied with respect to gamma and electron irradiation intensity. The range of irradiation flow intensity (for each type of irradiation) was always satisfying a criterion of ‘low intensity’ irradiation (the equilibrium concentration of electrons was always several orde...
Article
Full-text available
An investigation was made of the kinetics of transient processes in n-type Si subjected to a high rate of excitation with electron pulses. The dominant process, governing the decay of the nonequilibrium carrier density, was recombination. Variation of the dose and intensity of electron irradiation made it possible to determine independently such pa...
Article
Full-text available
Theoretical estimates are made which show new possibilities for investigating self-induced transparency (SIT) using a low-intensity probe beam. An analysis is made of a three-level nonlinear medium for which SIT is achieved due to one transition while another transition is used for probing. An important characteristic of the proposed probing system...
Article
In this paper, the exciton spectroscopic method is used to investigate the first order transition in the layered semiconductor PbI2 (2H-->4H polytype transition) occurring due to isothermal annealing , and also the kinetics of relaxation to the thermodynamic equilibrium state of the crystal structures of supercooled samples. To sum up, the exciton...
Article
Full-text available
The paper derives theoretical estimates of the self-diffraction characteristics of coherent beams due to self-induced transparency in dynamic holography. It is noted that self-diffraction can be used to study the self-induced transparency itself, since it would be possible to investigate regions of the incident beam ranging from a maximum near the...
Article
Full-text available
By analyzing the spectra of the free and localized excitons in PbI2, we were able to trace the entire process of conversion of the 2H polytype into the 4H polytype: from the formation of the 4H-polytype nucleation centers of angstrom size to the total conversion of the 2H polytype into the 4H polytype.

Questions

Questions (10)

Network

Cited By

Projects

Projects (13)
Project
This project shares researches and thoughts on contemporary social issues.
Project
Provides Window to all RG members for unlimited excange of knowledge, information, and technologies in the area of medicinal and aromatic plants. All members are appreciated to recommend, read, share and add their findings to this project.
Project
Certificates of achievements and accomplishments & Recent awards and achievements.