Dulkin
Alexander Dulkin, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20110233050 | MAGNETIC LENSING TO IMPROVE DEPOSITION UNIFORMITY IN A PHYSICAL VAPOR DEPOSITION (PVD) PROCESS - A physical vapor deposition (PVD) system includes a chamber and a plurality of electromagnetic coils arranged around the chamber. First and second annular bands of permanent magnets are arranged around the chamber with poles oriented perpendicular to a magnetic field imposed by the electromagnetic coils. Each of the permanent magnets in the first annular band is arranged with poles having a first polarity closest to a central axis of the chamber. Each of the permanent magnets in the second annular band is arranged anti-parallel with respect to the permanent magnets in the first annular band. | 09-29-2011 |
Andrey Dulkin, Herzelia IL
Patent application number | Description | Published |
---|---|---|
20140013390 | SYSTEM AND METHOD FOR OUT-OF-BAND APPLICATION AUTHENTICATION - Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of a request from a client to a server. Authentication information is associated with a component of the system such as the request or the client application, while being collected independent of interaction with the client application initiating the request. Implementations provide improved security over existing solutions using in-band or other means of collecting authentication information. | 01-09-2014 |
Andrey Dulkin, Herzlia IL
Patent application number | Description | Published |
---|---|---|
20150113600 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO AND USE OF NETWORK RESOURCES - Methods and systems are disclosed for detecting unauthorized actions associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of a client action associated with the network resource against credential retrieval data including records of authorized actions and/or procedures for performing an action associated with the network resource. | 04-23-2015 |