Len Leonid MizrahAuthernative, Inc., USA · Information Security
Len Leonid Mizrah
PhD of Physics
Research in Cybersecurity, Electronics, & Physics. (17 US Pat.) Google Scholar: Citations 1412; h-index 19; i10-index 20
About
54
Publications
709,024
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
16
Citations
Introduction
Dr. Len L. Mizrah is currently a CEO of Authernative, Inc. in the "Silicon Valley" of the United States. Len leads the company's research in various fundamental and application aspects of cyber security: credentials security; multi-factor, mutual, and multi-channel authentication protocols; encryption key management; financial transactions security; crypto-security at the front-end, back-end, and on the 'wire'.
Dr. Len L. Mizrah is a Senior Life Member of IEEE, Member of APS, Member of ISACA.
Additional affiliations
October 2001 - October 2015
Independent Researcher
Position
- President and CEO
Publications
Publications (54)
Statistical approach to test various group of phenotypes for a professional fitness by measuring various genotype reflexes like a latent time after action while being under the influence of various interferences, enabled with a specially designed electronic reflectometer.
A party can authenticate itself by interacting with multiple servers without revealing the shared secret to any of the involved parties. The stored shared secret is strengthened and broken into shares and saved on the servers. The shared secret is safe against offline brute force attack unless all servers where the shares are stored are compromised...
An interactive method for authentication is based on two shared secrets, both shared secrets in the form of an ordered path on the frame of reference. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. The first step of authentication that a user performs requires the user t...
An interactive method for authentication is based on two shared secrets, both shared secrets in the form of an ordered path on the frame of reference. An instance of the frame of reference comprises a set of characters which is arranged in a random or other irregular pattern. The first step of authentication that a user performs requires the user t...
An interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference. An instance of the frame of reference comprises an array of characters in which the characters are arranged in a random or other irregular pattern on a grid of content fields. An authentication challe...
An interactive method for authentication is based on a shared secret which is in the form of an enumerated pattern of fields on a frame of reference. An instance of the frame of reference comprises an array of characters in which the characters are arranged in a random or other irregular pattern on a grid of content fields. An authentication challe...
Abstract
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. The two parties use a shared secret to produ...
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. The two parties use a shared secret to produce a commo...
Abstract
A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An authentication session is initiated upon receiving a client identifier at the server-side...
A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An authentication session is initiated upon receiving a client identifier at the server-side resources...
Abstract
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. A common matrix M, shared in advance, is mul...
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. A common matrix M, shared in advance, is multiplied by...
Abstract
Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical client-side data processing machines. After a first security tier, a first communication channel is opened to a first data processing machine on the client side. The session proceeds...
The present invention includes devices and methods for enabling private and secure data collection by profile servers relating to users that are associated with a profiling user in a social networking system. Particular aspects of the present invention are described in the claims, specification and drawings.
A server executes a protocol that automates transactions involving a customer and a merchant agreeing to trade money in the customer’s account for goods or services available from the merchant. The protocol protects personal identifying information of the customer from disclosure to the merchant, and protects all parties from repudiation of the spe...
Abstract
An interactive method for authentication is based on two shared secrets, including a first shared secret in the form of an ordered path on the frame of reference, and a second shared secret in the form of locations on the frame of reference at which characters identifying a subset of the ordered path are to be displayed. An instance of th...
Financial institution back office computerized transaction-processing system with embedded privacy and security layer (EPSL) enables strong transaction authentication prior to a merchant or vendor contact, based on a user account number, transaction conditions like anticipated transaction time and money, user two-factor authentication with a static...
An interactive client-server authentication system and method are based on Random Partial Pattern Recognition algorithm (RPPR). In RPPR, an ordered set of data fields is stored for a client to be authenticated in secure memory. An authentication server presents a clue to the client via a communication medium, such positions in the ordered set of a...
Abstract
An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol. The server provides ephemeral encryption keys in response to a request during a Session Random Key (SRK) initiation interval. SRK...
Abstract
A system for authentication of a client includes logic supporting a "what user knows" algorithm for authentication of a client, such as a random partial pattern recognition algorithm, based upon client credentials including an account user name and an account authentication code. Logic supporting client account administration is operable...
Abstract
A system for authentication of a client includes logic supporting a "what user knows" algorithm for authentication of a client, such as a random partial pattern recognition algorithm, based upon client credentials including an account user name and an account authentication code. Logic supporting client account administration is operable...
Abstract
An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol, so that key management becomes an essential part of the authentication protocol itself. The system provides a secure distribution...
Abstract
A clocked authentication, authorization and accounting (CAAA) system and method offers private and secure credit/debit card online and offline financial transactions (FT) including an embedded privacy and security layer (EPSL) architecture. EPSL includes an authentication stage prior to the authorization stage that is automated and enable...
Abstract
An interactive mutual authentication protocol, which does not allow shared secrets to pass through untrusted communication media, integrates an encryption key management system into the authentication protocol. The server encrypts a particular data random key by first veiling the particular data random key using a first conversion array s...
Abstract
A graphical user interface supports an interactive client-server authentication based on Random Partial Pattern Recognition algorithm (RPPR). In RPPR, an ordered set of data fields is stored for a client to be authenticated in secure memory on the server side. A graphical user interface presents a clue generated at the server to the clien...
Abstract
An authentication server provides a clue to a client indicating a random partial subset of a full pattern that characterizes a full digitized path on a frame of reference, and the client enters a data to fulfill an authentication factor suggested by the clue. The full pattern consists of an ordered set of data fields, which store paramete...
A system for authentication of a client includes logic supporting combinations of more than one a ”what user knows” authentication factors for strong authentication of a client, such as a static password, random partial pattern recognition factor and a random partial digitized path recognition factor. An interactive method for authentication of a c...
A technique for predicting the yield distribution of CMOS circuits based on electrical parameter distributions is presented. This technique uses the mean and standard deviation of the measured threshold voltage and mobility of NMOS and PMOS transistors to project the yield of the circuit in a specified design window. The method of prediction is bas...
The change in the concentration of charge carriers during 60Co γ-quanta irradiation (irradiation temperature 195,273,330K) of silicon zonal crystals with equilibrium electron concentration n0=(1.3-80)x1012 and holes p0=(5-30)x1011cm-3 has been investigated. It is shown that in high-resistance crystals of n-type with n0<1x1013cm-3 in contrast to p-t...
An investigation was made of the dependence of the efficiency of defect formation in n-type Si on the electron flux density. It was established that the efficiency of formation of recombination and compensating defects increased on increase of the dose rate. An earlier model of the Coulomb interaction between oppositely charged vacancies and inters...
Experimentally found that the lines of InfraRed (IR) absorption of Phosphorous and Boron impurity atoms in Silicon with the isovalent admixture of Germany are heterogeneous at width and thus do not observe the displacement of their center of gravity observed effects due to the presence of crystals' internal deformation fields due to the difference...
Irreversible structural changes in cadmium sulfide crystals, caused by laser radiation with quantum energy insufficient to excite electron transitions of the band-band or band-impurity type, were studied. From an investigation of the low-temperature luminescence spectra, it was established that continuous infrared illumination (10. 6 mu ) causes ac...
1. In the field of laser radiation in semiconductors, the drift of electrons and atomic impurities occurs, which affects the optical characteristics and the nature of the interaction of laser radiation with semiconductors.
2. LID of electrons in the field of nanosecond and picosecond laser pulses causes a record high magnitude of the refractive ind...
The mechanism is suggested for large distance migration of high-energy-particle-produced interstitial atoms. It is shown that within the limits of a weak bond with a crystal lattice interstitial migration may be described by the Schrödinger time equation with cubical nonlinearity. Its solution corresponds to a soliton state of the interstitial atom...
The principal physical mechanisms producing changes in the refraction index of Si crystals irradiated by high-power ultrashort light pulses are analyzed, with attention given to single- and two-photon absorption, saturation of a single-photon band-to-band transition, recombination processes, and heating. The kinetics of diffraction efficiency is de...
A model is proposed for the process of formation of defects in semiconductors in which the components of Frenkel pairs are mobile during irradiation. The model is based on the screening of these components by equilibrium or nonequilibrium carriers. A study is made of the possibility of deriving the distribution function of the internal distances in...
An electron-induced effect of simulation of defect annealing rate in semiconductors has been studied by irreversible thermodynamics method. It is established that the effect is stipulated by an interaction between excited charge carriers and the crystal lattice. It is determined that the value and sign of the annealing temperature shift depend on t...
Kinetics of radiation defects accumulation in n-Ge at room temperature have been studied with respect to gamma and electron irradiation intensity. The range of irradiation flow intensity (for each type of irradiation) was always satisfying a criterion of ‘low intensity’ irradiation (the equilibrium concentration of electrons was always several orde...
An investigation was made of the kinetics of transient processes in n-type Si subjected to a high rate of excitation with electron pulses. The dominant process, governing the decay of the nonequilibrium carrier density, was recombination. Variation of the dose and intensity of electron irradiation made it possible to determine independently such pa...
Theoretical estimates are made which show new possibilities for investigating self-induced transparency (SIT) using a low-intensity probe beam. An analysis is made of a three-level nonlinear medium for which SIT is achieved due to one transition while another transition is used for probing. An important characteristic of the proposed probing system...
In this paper, the exciton spectroscopic method is used to investigate the first order transition in the layered semiconductor PbI2 (2H-->4H polytype transition) occurring due to isothermal annealing , and also the kinetics of relaxation to the thermodynamic equilibrium state of the crystal structures of supercooled samples.
To sum up, the exciton...
The paper derives theoretical estimates of the self-diffraction
characteristics of coherent beams due to self-induced transparency in
dynamic holography. It is noted that self-diffraction can be used to
study the self-induced transparency itself, since it would be possible
to investigate regions of the incident beam ranging from a maximum near
the...
By analyzing the spectra of the free and localized excitons in PbI2, we were able to trace the entire process of conversion of the 2H polytype into the 4H polytype: from the formation of the 4H-polytype nucleation centers of angstrom size to the total conversion of the 2H polytype into the 4H polytype.
Questions
Questions (13)