$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for managing data traffic in wireless networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04M-001/64
출원번호 US-0259248 (2002-09-27)
발명자 / 주소
  • Juitt,David
  • Bates,Philip
  • Christoffel,Thomas
  • Crawshaw,Geoffrey
  • Crosbie,David
출원인 / 주소
  • Bluesocket, Inc.
대리인 / 주소
    Goodwin Procter, LLP
인용정보 피인용 횟수 : 329  인용 특허 : 51

초록

The present invention can be used to facilitate the integration of wireless capability provided by wireless access points into an enterprise computer network. A gateway server is interposed between wireless access points and protected networks to provide security and integration functions, for examp

대표청구항

What is claimed is: 1. A method for managing access control and security with a gateway server interposed between a wireless local area network and a protected network, the method comprising the steps of: (a) receiving, by a first gateway server from a user of a mobile device that is in communicati

이 특허에 인용된 특허 (51)

  1. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  2. Gernert, Alex; Vesuna, Sarosh; Goren, David, Apparatus for interfacing a wireless local network and a wired voice telecommunications system.
  3. Hitchings, Jr., Sinclair H., Automated access by mobile device to automated telephone information services.
  4. Chuah Mooi Choo, Bandwidth reservation and collision resolution method for multiple access communication networks where remote hosts send reservation requests to a base station for randomly chosen minislots.
  5. Ota Takeshi,JPX ; Yoshimura Kouichi,JPX ; Horikiri Kazunori,JPX, Cellular communication network and its communication method.
  6. Ramasubramani Seetharaman ; King Peter F., Centralized certificate management system for two-way interactive communication devices in data networks.
  7. Frid Lars,SEX ; Pehrsson Arne,SEX ; Backstrom Martin,SEX ; Andersson Dick,SEX ; Axelsson Ulf,SEX ; Olsson Ulf,SEX, Communicating packet data with a mobile station roaming within an incompatible mobile network.
  8. Weiman Lyle A., Computer network address mapping.
  9. Haartsen Jacobus Cornelis,NLX, Contemporaneous connectivity to multiple piconets.
  10. Kamm David A. (Tampa FL) Parker Stephen T. (Raleigh NC) Trimmer ; Jr. Merl A. (Cary NC) Trimmer Sherry L. (Cary NC), Data gateway for mobile data radio terminals in a data communication network.
  11. Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
  12. Aravind Sitaraman ; Joseph F. Mann ; Maria Alice Dos Santos ; Shuxian Lou ; Sampath Kumar Sthothra Bhasham, Dynamic IP addressing and quality of service assurance.
  13. Singhal, Sandeep Kishan; Gopal, Ajei Sarat; Gopal, Inder Sarat, Enabling seamless user mobility in a short-range wireless networking environment.
  14. Mahany Ronald L. (Cedar Rapids IA) West Guy J. (Lisbon IA) Bunte Alan G. (Cedar Rapids IA), Hierarchical communication system using premises, peripheral and vehicular local area networking.
  15. Mahany Ronald L. ; West Guy J. ; Bunte Alan G., Hierarchical communication system using premises, peripheral and vehicular local area networking.
  16. Nerlikar Virupax M. (Plano TX), Information management and security system.
  17. Otway Josanne,CAX, Information security subscriber trust authority transfer system with private key history transfer.
  18. Brown Daniel Peter (Elmhurst IL) Finkelstein Louis David (Wheeling IL), Method and apparatus for authentication in a communication system.
  19. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for exclusively pairing wireless devices.
  20. Cheung Roger Yiu Ming,CAX ; Baker Murray Charles,CAX ; Newton David,CAX, Method and apparatus for providing a 3-way connection between a mobile computing device, a stationary computing device.
  21. Rossmann Alain, Method and architecture for an interactive two-way data communication network.
  22. Laursen Andrew L. ; Jeffery Maurice A., Method and architecture for managing a fleet of mobile stations over wireless data networks.
  23. Nessett Danny M. ; Grabelsky David ; Borella Michael S. ; Sidhu Ikhlaq S., Method and system for locating network services with distributed network address translation.
  24. Jawanda Jastinder, Method and system for seamless roaming between wireless communication networks with a mobile terminal.
  25. Reisman, Richard R., Method and system for selecting a personalized set of information channels.
  26. Mooi Choo Chuah, Method for admitting new connections based on measured quantities in a multiple access system for communications networks.
  27. Siira Mikko,JPX, Method for selecting a signal, and a cellular radio system.
  28. Leung Kent K., Mobile IP mobility agent standby protocol.
  29. Watanuki Tatsuya,JPX ; Oura Tetsuo,JPX ; Sawada Sunao,JPX, Mobile node, mobile agent and network system.
  30. Maki Takeshi,JPX ; Suzuki Toshiro,JPX ; Fukai Yuji,JPX ; Aoyama Kenichi,JPX, Mobile radio communications system.
  31. Pinard Deborah (Kanata CAX), Mobile wireless communications system.
  32. Ahmed Walid ; Doshi Bharat Tarachand ; Dravida Subrahmanyam ; Jiang Hong ; Rege Kiran M., Mobility management for a multimedia mobile network.
  33. Xu Yingchun ; Cardwell Bennett S., Network access methods, including direct wireless to internet access.
  34. Nickles Alfred E., Network security and integration method and system.
  35. Harvey John Paul, Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level.
  36. Dahm Cynthia N. ; Laursen Andrew L., Online churn reduction and loyalty system.
  37. Bodin Stig R. (Spanga SEX) Kallin Harald (Sollentuna SEX) Voigt Lotta (Stockholm SEX), Prioritization between handoff and new call requests in a cellular communications system.
  38. Meier Robert C. (Cedar Rapids IA), Redundant radio frequency network having a roaming terminal communication protocol.
  39. Engwer Darwin A. ; Clements Ken ; Zweig Jonathan M. ; Perrin Daniel S., Seamless roaming for wireless local area networks.
  40. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  41. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  42. Orenshteyn Alexander S., Secured system for accessing application services from a remote station.
  43. Frank V. Paxhia ; Kurt A. Streifert, System and method for an administration server.
  44. Dulman Scott, System and method for changing advanced intelligent network services from customer premises equipment.
  45. Kennedy ; III William C. ; Kennedy ; Jr. William C. ; Saunders William C., System and method for communicating a message using a cellular telephone network.
  46. Broadhurst Christopher John Creighton,GBX ; Byrne Barry Anthony,GBX ; White Clive John,GBX ; Press James,GBX ; McMahon Piers,GBX, System and method for web server user authentication.
  47. Morgan David E. (Lisle IL) Major John (Barrington Hills IL) Crane Eric K. (Wheaton IL) Hyziak Janusz (Des Plaines IL) Rosenthal Robert S. (Kildeer IL) Wellenstein Neil N. (Phoenix AZ), System for selectively routing and merging independent annotations to a document at remote locations.
  48. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  49. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan ; Spooner Courtney Joseph, User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system.
  50. Thomas Michael, Variable rate optional security measures method and apparatus for wireless communications network.
  51. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based, biometric authetication system and method.

이 특허를 인용한 특허 (329)

  1. Maes, Stephane H., Abstract application dispatcher.
  2. Maes, Stèphane H.; Strand, Terje; Tonev, Christo, Achieving low latencies on network events in a non-real time platform.
  3. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  4. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  5. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  6. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  7. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  8. Raleigh, Gregory G; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  9. Raleigh, Gregory G; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  10. Maes, Stéphane H., Application requesting management function based on metadata for managing enabler or dependency.
  11. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  12. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  13. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Attribution of mobile device data traffic to end-user application based on socket flows.
  14. Patil, Abhishek; Jing, Xiangpeng; Liu, Aixin; Nguyen, Djung N., Authentication for a multi-tier wireless home mesh network.
  15. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  16. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  17. Raleigh, Gregory G., Automated device provisioning and activation.
  18. Raleigh, Gregory G., Automated device provisioning and activation.
  19. Raleigh, Gregory G., Automated device provisioning and activation.
  20. Raleigh, Gregory G., Automated device provisioning and activation.
  21. Raleigh, Gregory G., Automated device provisioning and activation.
  22. Raleigh, Gregory G., Automated device provisioning and activation.
  23. Raleigh, Gregory G., Automated device provisioning and activation.
  24. Raleigh, Gregory G., Automated device provisioning and activation.
  25. Raleigh, Gregory G., Automated device provisioning and activation.
  26. Raleigh, Gregory G., Automated device provisioning and activation.
  27. Raleigh, Gregory G., Automated device provisioning and activation.
  28. Raleigh, Gregory G., Automated device provisioning and activation.
  29. Raleigh, Gregory G., Automated device provisioning and activation.
  30. Raleigh, Gregory G., Automated device provisioning and activation.
  31. Raleigh, Gregory G., Automated device provisioning and activation.
  32. Raleigh, Gregory G., Automated device provisioning and activation.
  33. Raleigh, Gregory G., Automated device provisioning and activation.
  34. Raleigh, Gregory G., Automated device provisioning and activation.
  35. Raleigh, Gregory G., Automated device provisioning and activation.
  36. Bassett, Charles D.; Yariv, Eran; Carbaugh, Ian M.; Koppolu, Lokesh Srinivas; Noy, Maksim; Wahlert, Sarah A.; Bahl, Pradeep, Automatically generating rules for connection security.
  37. Bassett, Charles D.; Yariv, Eran; Carbaugh, Ian M.; Koppolu, Lokesh Srinivas; Noy, Maksim; Wahlert, Sarah A.; Bahl, Pradeep, Automatically generating rules for connection security.
  38. Klein,John, Backup cell controller.
  39. Torarp, Carl-Johan Yngve; Svensson, Lars Olof Hugo, Broadband wireless network.
  40. Maes, Stéphane H., Call control enabler abstracted from underlying network technologies.
  41. Noda,Takuro; Sato,Makoto, Communication device and method.
  42. Mikoda, Tsuyoshi; Kubota, Hitoshi; Inoue, Toshihiro; Abe, Mitsunobu, Communication system and automatic metering system.
  43. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Sabin, Michael J., Communications device with secure data path processing agents.
  44. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  45. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  46. Meenan,Patrick; Chiles,David Clyde, Configuring wireless access points.
  47. Meenan, Patrick A.; Chiles, David Clyde, Configuring wireless devices.
  48. Meenan, Patrick; Chiles, David Clyde, Configuring wireless devices.
  49. Meenan,Patrick; Chiles,David Clyde, Configuring wireless devices.
  50. Bardsley, Jeffrey Scott; Kim, Nathaniel Wook; Lingafelt, Charles Steven; Roginsky, Allen Leonid; Strole, Norman Clark, Control of port based authentication protocols and process to support transfer of connection information.
  51. Brown, Michael W.; McIntyre, Joseph H.; Paolini, Michael A.; Weaver, James M.; Winters, Scott L., Controlling hold queue position adjustment.
  52. Brown, Michael Wayne; McIntyre, Joseph Herbert; Paolini, Michael A.; Weaver, James Mark; Winters, Scott Lee, Controlling hold queue position adjustment.
  53. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Controlling mobile device communications on a roaming network based on device state.
  54. Chandra,Madhavi Wunnava; Kulkarni,Milind M.; Leung,Kent K.; Patel,Alpesh, DHCP based home address management of mobile IP clients.
  55. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Data usage monitoring for media data services used by applications.
  56. Raleigh, Gregory G., Device agent for remote user configuration of wireless network access.
  57. Raleigh, Gregory, Device assisted CDR creation aggregation, mediation and billing.
  58. Raleigh, Gregory G., Device assisted CDR creation, aggregation, mediation and billing.
  59. Raleigh, Gregory G., Device assisted CDR creation, aggregation, mediation and billing.
  60. Raleigh, Gregory G, Device assisted ambient services.
  61. Raleigh, Gregory G, Device assisted ambient services.
  62. Raleigh, Gregory G., Device assisted ambient services.
  63. Raleigh, Gregory G., Device assisted services install.
  64. Raleigh, Gregory G., Device assisted services install.
  65. Raleigh, Gregory G., Device assisted services install.
  66. Raleigh, Gregory, Device group partitions and settlement platform.
  67. Raleigh, Gregory G., Device group partitions and settlement platform.
  68. Raleigh, Gregory G., Device group partitions and settlement platform.
  69. Raleigh, Gregory G., Device group partitions and settlement platform.
  70. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  71. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  72. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  73. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  74. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey, Distributing content and service launch objects to mobile devices.
  75. Ramachandran, Venkatesh; Manoharan, Rajalakshmi; Rathinasamy, Mahesh Kumar, Dynamic download and enforcement of network access role based on network login context.
  76. Cardamore, Daniel; May, Darrell Reginald; Nagarajan, Sivakumar; Cherry, Carl Lloyd, Dynamically generating perimeters.
  77. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, End user device that secures an association of application to service policy with an application certificate check.
  78. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
  79. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  80. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  81. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  82. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  83. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  84. Halasz,David E.; Andrade,Merwyn B.; Shuen,Pauline, Enhanced trust relationship in an IEEE 802.1x network.
  85. Halasz, David E.; Andrade, Merwyn B.; Shuen, Pauline, Enhanced trust relationship in an IEEE 802.1×network.
  86. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  87. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  88. Maes, Stephane H., Factoring out dialog control and call control.
  89. Maes, Stephane H., Factorization of concerns to build a SDP (service delivery platform).
  90. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Phuong, Flow tagging for service policy implementation.
  91. Gotou, Jun, Gateway server, file management system, and file management method and program.
  92. Boudreaux, Paul; Kolski, Stephen; Maxwell, Stewart, Geographic redundancy for call servers in a cellular system based on a bearer-independent core network.
  93. Maes, Stéphane H., Global presence.
  94. Raleigh, Gregory G., Hierarchical service policies for creating service usage data records for a wireless end-user device.
  95. Kelley, Steve; Wilson, Jeremy; Erwin, Jeff, Home network optimizing system.
  96. Im,Hyung Taik; Kim,Chang Ho, Home network system and method for operating the same.
  97. Fletcher,Richard; Cavallo,David; Pentland,Alex; Hasson,Amir, Hybrid wireless network for data collection and distribution.
  98. Tan, Pek Yew; Cheng, Hong; Ue, Toyoki, Identification information protection method in WLAN inter-working.
  99. Tasker, Michael Edric; Narendra, Hosahalli Nanjappa; Kumarasamy, Parameswaran; Kohli, Sandeep Singh; Parameswaran, Kavithadevi, Identify a secure end-to-end voice call.
  100. Maes, Stéphane H., In-vehicle multimedia real-time communications.
  101. Maes, Stephane H., Integrating operational and business support systems with a service delivery platform.
  102. Maes, Stephane, Intelligent message processing.
  103. Maes, Stephane H., Inter-working with a walled garden floor-controlled system.
  104. Brown, Michael Wayne; McIntyre, Joseph Herbert; Paolini, Michael A.; Weaver, James Mark; Winters, Scott Lee, Intermediary device based callee identification.
  105. Raleigh, Gregory G.; Nguyen, Vien-Phuong; Stark, Lisa; Tellado, Jose, Intermediate networking devices.
  106. Brown, Michael W.; McIntyre, Joseph H.; Paolini, Michael A.; Weaver, James M.; Winters, Scott L., Logging calls according to call context.
  107. Ruan,Jiandong; Ayyagari,Arun; Abhishek,Abhishek, Making roaming decisions based on association qualities between wireless devices and wireless access points.
  108. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  109. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  110. Schieman, Adam Richard; Major, Daniel Jonas; Goodman, Kevin; Nagarajan, Sivakumar, Managing permission settings applied to applications.
  111. Raleigh, Gregory G.; Green, Jeffrey; Tellado, Jose, Managing service user discovery and service launch object placement on a device.
  112. Ryerson, Christopher Maybee; Bender, Christopher Lyle; Winkler, Michael Thomas; Bukurak, David; Altman, Benjamin, Managing use of network resources.
  113. Wang, Ray, Mesh network remote control device.
  114. Maes, Stephane H., Message forwarding.
  115. Raleigh, Gregory G., Message link server with plural message delivery triggers.
  116. Jing, Xiangpeng; Patil, Abhishek; Bhatnagar, Anuj; Liu, Aixin; Nguyen, Djung N., Method and apparatus for a wireless home mesh network with network topology visualizer.
  117. Achtari, Guyves; Plante, Denis; Bernier, Eric, Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment.
  118. Ni, Hui, Method and apparatus for selecting network access provider.
  119. Maes, Stephane H., Method and apparatus for supporting service enablers via service request composition.
  120. Yang, Yi; Retana, Alvaro E.; Roy, Abhay; Lindem, III, Alfred C.; Mirtorabi, Sina, Method and apparatus to elect ABRs dynamically and intelligently.
  121. Mohri, Alexander; Vater, Helge; Knuth, Michael; Molzahn, Matthias; Henkels, Christoph, Method and arrangement for externally controlling and managing at least one WLAN subscriber who is assigned to a local radio network.
  122. Rockwood, Troy; Ryu, Bong Kyu, Method and hybrid system for authenticating communications.
  123. Chan, Wesley T.; Shen, Shioupyn, Method and system for access point customization.
  124. Orr, Douglas B.; Ptacek, Thomas Henry; Song, Douglas Joon, Method and system for authentication event security policy generation.
  125. Orr, Douglas B.; Ptacek, Thomas Henry; Song, Douglas Joon, Method and system for authentication event security policy generation.
  126. Wang, James; Rawlins, Rudy, Method and system for conserving battery power in wireless devices operating in a wireless local area network.
  127. Wang, Ray, Method and system for dynamic information exchange on a mesh network in a vehicle.
  128. Wang, Ray, Method and system for dynamic information exchange on location aware mesh network devices.
  129. Wang, Ray, Method and system for dynamic information exchange on location aware mesh network devices.
  130. Wang, Ray, Method and system for dynamic information exchange on mesh network devices.
  131. Wang, Ray, Method and system for mesh network embedded devices.
  132. Wang, Ray, Method and system for spatial data input, manipulation and distribution via an adaptive wireless transceiver.
  133. FitzGerald, Cary W.; Jennings, Cullen F., Method and system indicating a level of security for VoIP calls through presence.
  134. Jennings, Cullen F.; FitzGerald, Cary W., Method and system using presence information to manage network access.
  135. Jennings, Cullen F.; FitzGerald, Cary W., Method and system using quality of service information for influencing a user's presence state.
  136. Jennings, Cullen F.; FitzGerald, Cary W., Method and system using shared configuration information to manage network access for network users.
  137. McGregor, Jr., John Patrick; White, Matthew N., Method for accelerating security and management operations on data segments.
  138. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
  139. Braskich, Anthony J.; Barker, Jr., Charles R.; Emeott, Stephen P.; Strutt, Guenael T., Method for establishing secure associations within a communication network.
  140. Raleigh, Gregory G., Method for operating a wireless end-user device mobile payment agent.
  141. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Method for providing an adaptive wireless ambient service to a mobile device.
  142. Leung,Kent K.; Kulkarni,Milind M.; Patel,Alpesh, Methods and apparatus for anchoring of mobile nodes using DNS.
  143. Jin, Hui; Richardson, Tom; Novichkov, Vladimir, Methods and apparatus for interleaving in a block-coherent communication system.
  144. Bhatt, Yogesh; Annaluru, Sashidhar; Garg, Mukesh, Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network.
  145. Jindal, Tamanna; Annaluru, Sashidhar; Garg, Mukesh, Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network.
  146. Maes, Stephane H., Methods and systems for exposing access network capabilities using an enabler proxy.
  147. Maes, Stephane H., Methods and systems for generating metadata describing dependencies for composable elements.
  148. Maes, Stephane H., Methods and systems for implementing service level consolidated user information management.
  149. Sinha, Amit; Darrow, Nicholas John, Methods and systems for wired equivalent privacy and Wi-Fi protected access protection.
  150. Shenoy, Nirmala; Al-Mousa, Yamin S.; Fischer, John, Methods for providing an ad hoc mobile communication network and systems thereof.
  151. Lawson, Kent, Methods, systems, and media for secure connection management and automatic compression over metered data connections.
  152. Meenan, Patrick A.; Semaan, Fady William, Migrating configuration information based on user identity information.
  153. Meenan, Patrick; Semaan, Fady William, Migrating configuration information based on user identity information.
  154. Meenan, Patrick; Semaan, Fady William, Migrating configuration information based on user identity information.
  155. Okada,Masaaki, Mobile communication system and load distribution method of multiple frequencies in the same.
  156. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Mobile device and method attributing media services network usage to requesting application.
  157. Raleigh, Gregory G., Mobile device and method with secure network messaging for authorized components.
  158. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  159. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  160. Raleigh, Gregory G., Mobile device with common secure wireless message service serving multiple applications.
  161. Raleigh, Gregory G., Mobile device with data service monitoring, categorization, and display for different applications and networks.
  162. Raleigh, Gregory G., Mobile device with device agents to detect a disallowed access to a requested mobile data service and guide a multi-carrier selection and activation sequence.
  163. Raleigh, Gregory G., Mobile device with user controls and policy agent to control application access to device location data.
  164. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy.
  165. Jing, Xiangpeng; Patil, Abhishek P.; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  166. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  167. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  168. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  169. Raleigh, Gregory G., Multicarrier over-the-air cellular network activation server.
  170. Savage, James A.; Bucher, Tim, Network access firewall.
  171. Marl, Brett; Averbuch, Aaron; O'leary, Myk; Lang, Joshua, Network administration tool.
  172. Maes, Stephane H., Network agnostic media server control enabler.
  173. Raleigh, Gregory G, Network based ambient services.
  174. Raleigh, Gregory G., Network based ambient services.
  175. Raleigh, Gregory G., Network based ambient services.
  176. Raleigh, Gregory G., Network based service policy implementation with network neutrality and user privacy.
  177. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  178. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  179. Tebbs, Matthew; Marl, Brett, Network configuration device.
  180. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  181. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  182. Bush, Steven M.; Butcher, Thomas C.; Tebbs, Matthew; Ferrari, Justin; Marl, Brett; Gery, Ron; Acker, Kristin; Hinds, Joshua, Network management.
  183. Bush, Steve; Mooney, Steve; Liu, Xin; Mevissen, John; Hinds, Josh J; Gery, Ron; Marl, Brett; Tebbs, Matthew, Network management providing network health information and lockdown security.
  184. Ahlers, Tim; Mooney, Steve; Owens, John-Anthony; Vandenberg, Greg; O'Leary, Myk; Averbuch, Aaron; Wilson, Jeremy; Younger, Lauren, Network metric reporting system.
  185. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  186. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  187. Raleigh, Gregory G., Network system with common secure wireless message service serving multiple applications on multiple wireless devices.
  188. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  189. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  190. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  191. Raleigh, Gregory G, Open development system for access service providers.
  192. Raleigh, Gregory G, Open development system for access service providers.
  193. Raleigh, Gregory G., Open development system for access service providers.
  194. Raleigh, Gregory G., Open transaction central billing system.
  195. Raleigh, Gregory G., Open transaction central billing system.
  196. Raleigh, Gregory G., Open transaction central billing system.
  197. Tebbs, Matthew; Marl, Brett; Kelley, Steve, Optimal-channel selection in a wireless network.
  198. Maes, Stephane H., Policies as workflows.
  199. Maes, Stephane H., Policy interface description framework.
  200. Krym, Marvin; Babiarz, Jozef; Verberk, Lambertus; Liu, Xiao-Gao; Shingne, Tarak, Practical measurement-based session admission control for Wi-Fi LAN systems.
  201. Maes, Stéphane H.; Kodukula, Induprakas; Hallett, Richard Guy, Pragmatic approaches to IMS.
  202. Maes, Stephane H.; Sun, Wenchao, Presence-based event driven architecture.
  203. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  204. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  205. Krym, Marvin; Babiarz, Jozef; Verberk, Lambertus; Xu, Kenan; Wu, Ping, Proactive load distribution for 802.111-based wireless LANs.
  206. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy server for providing an adaptive wireless ambient service to a mobile device.
  207. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy system and method for adaptive ambient services.
  208. Raleigh, Gregory G., Quality of service for device assisted services.
  209. Raleigh, Gregory G., Quality of service for device assisted services.
  210. Raleigh, Gregory G., Quality of service for device assisted services.
  211. Meandzija,Branislav; Dogan,Mithat C.; Goldburg,Marc, Reducing certificate revocation lists at access points in a wireless access network.
  212. Trossen, Dirk; Chaskar, Hemant M., Relocation of content sources during IP-level handoffs.
  213. Matsuda,Tetsuo; Yamada,Masayuki; Azuma,Kazuhiko; Maruyama,Toshikazu, Remote access server wherein the number of logical link resources is set higher than the number of physical link resources.
  214. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Remotely configurable device agent for packet routing.
  215. Maes, Stéphane H., Resource abstraction via enabler and metadata.
  216. Raleigh, Gregory G., Restricting end-user device communications over a wireless access network associated with a cost.
  217. Raleigh, Gregory G., Roaming services network and overlay networks.
  218. Randle, William M.; Orkis, Randall E., Secure service network and user gateway.
  219. Bahr,Casey, Security management for wireless clients.
  220. Raleigh, Gregory G., Security techniques for device assisted services.
  221. Raleigh, Gregory G., Security techniques for device assisted services.
  222. Raleigh, Gregory G., Security techniques for device assisted services.
  223. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  224. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  225. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  226. Raleigh, Gregory G., Service activation tracking system.
  227. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  228. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  229. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  230. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  231. Maes, Stéphane H., Service level network quality of service policy enforcement.
  232. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  233. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  234. Maes, Stephane H., Service oriented architecture-based SCIM platform.
  235. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; James, Justin; Nguyen, Laurent An Minh; Carter, III, Russell Bertrand, Service plan design, user interfaces, application programming interfaces, and device management.
  236. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow.
  237. Raleigh, Gregory G., Service profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices.
  238. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set published to device agent with on-device service selection.
  239. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set publishing to device agent with on-device service selection.
  240. Maes, Stephane H., Service-oriented architecture (SOA) management of data repository.
  241. Maes, Stephane, Session initiation protocol-based internet protocol television.
  242. Maes, Stéphane H., Session initiation protocol-based internet protocol television.
  243. Raleigh, Gregory G., Simplified service network architecture.
  244. Prakash, Rajat; Jain, Nikhil, System and method for distributing wireless network access parameters.
  245. Adams, Neil Patrick; Little, Herbert Anthony; Kirkup, Michael Grant, System and method for handling data transfers.
  246. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant, System and method for handling data transfers.
  247. Adams, Neil Patrick; Little, Herbert Anthony, System and method for privilege management and revocation.
  248. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  249. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  250. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James; Green, Jeffrey, System and method for providing user notifications.
  251. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  252. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  253. Ahlers, Timothy F.; Averbuch, Aaron H.; Marl, Coyle B.; Owens, John-Anthony; Furlan, John L. W.; Kaplan, Jonathan; Braunstein, Ariel, System and method for simplifying secure network setup.
  254. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  255. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  256. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  257. Kirkup, Michael G.; Little, Herbert A.; Yach, David P., System and method of connection control for wireless mobile communication devices.
  258. Kirkup,Michael G.; Little,Herbert A.; Yach,David P., System and method of connection control for wireless mobile communication devices.
  259. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, System for providing an adaptive wireless ambient service to a mobile device.
  260. Hrastar, Scott E., Systems and methods for adaptive location tracking.
  261. Hrastar,Scott E., Systems and methods for adaptively scanning for wireless communications.
  262. Adhya, Saibal; Choudhary, Akshat; Verzunov, Sergey; Mullick, Amarnath; Nanjundaswamy, Shashi; Kumar, Arkesh, Systems and methods for authorizing a client in an SSL VPN session failover environment.
  263. Svensson,Lars Olof Hugo; Torarp,Karl Johan Yngve, Systems and methods for automated network operating center system for broadband wireless network.
  264. Svensson,Lars Olof Hugo; Torarp,Karl Johan Yngve, Systems and methods for centralized control and management of a broadband wireless network with data processing, and enforcement distributed to the network edge.
  265. Kumar, Arkesh; Harris, James; Soni, Ajay, Systems and methods for managing a plurality of user sessions in a virtual private network environment.
  266. Kumar, Arkesh; Harris, James; Soni, Ajay, Systems and methods for managing a plurality of user sessions in a virtual private network environment.
  267. Niedzielski, David M.; Trost, Christopher S.; Pena, Roger; Lavelle, Tommy B.; Clemons, Jr., Donald E., Systems and methods for online brand continuity.
  268. Niedzielski, David M.; Trost, Christopher S.; Pena, Roger; Lavelle, Tommy; Clemons, Donald E., Systems and methods for online brand continuity.
  269. Hrastar, Scott E., Systems and methods for wireless network site survey.
  270. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  271. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  272. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  273. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  274. Lum, Stacey C.; Lee, Yuhshiow Alice, Systems and methods of controlling network access.
  275. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of device data traffic to initiating end-user application.
  276. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of mobile device data traffic to initiating end-user application.
  277. Booth, III, Earl Hardin; Townsley, William Mark; Weber, Greg; Luo, Wei, Techniques for customer self-provisioning of edge nodes for a virtual private network.
  278. Townsley, William Mark; Booth, III, Earl Hardin, Techniques for oversubscribing edge nodes for virtual private networks.
  279. Kalbag, Rohit, Techniques for providing enhanced network security.
  280. Booth, III, Earl Hardin; Townsley, William Mark; Luo, Wei; Wilkie, George, Techniques for using first sign of life at edge nodes for a virtual private network.
  281. Maes, Stéphane H., Telephony application services.
  282. Bims, Harry, Token-based receiver diversity.
  283. Maes, Stephane H., True convergence with end to end identity management.
  284. Maes, Stephane H., Using location as a presence attribute.
  285. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  286. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  287. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  288. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  289. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  290. Raleigh, Gregory G., Verifiable device assisted service policy implementation.
  291. Raleigh, Gregory G., Verifiable device assisted service policy implementation.
  292. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  293. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  294. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  295. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  296. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  297. Raleigh, Gregory G., Verifiable service billing for intermediate networking devices.
  298. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  299. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  300. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  301. Raleigh, Gregory G.; Lavine, James, Virtualized policy and charging system.
  302. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless device applying different background data traffic policies to different device applications.
  303. Raleigh, Gregory G., Wireless device with application data flow tagging and network stack-implemented network access policy.
  304. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with application program interface to allow applications to access application-specific aspects of a wireless network access policy.
  305. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to roaming wireless data service.
  306. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to wireless data service.
  307. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  308. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  309. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list having limited user control.
  310. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access and access status for background and foreground device applications.
  311. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access for background and foreground device applications.
  312. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access selectively applied to different applications.
  313. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access status for different device applications.
  314. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, Wireless end-user device with divided user space/kernel space traffic policy system.
  315. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
  316. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with per-application data limit and traffic control policy list limiting background application traffic.
  317. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based aggregation of network activity requested by applications.
  318. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications.
  319. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with power-control-state-based wireless network access policy for background applications.
  320. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with secure network-provided differential traffic control policy list.
  321. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Wireless end-user device with wireless data attribution to multiple personas.
  322. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
  323. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Wireless home mesh network bridging adaptor.
  324. Ding, Ji, Wireless local area network authentication method and mobile terminal.
  325. Harris, Scott C., Wireless network having multiple communication allowances.
  326. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless network service interfaces.
  327. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
  328. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
  329. Kirkup, Michael G.; Brown, Michael K.; Little, Herbert A.; Robertson, Ian; Brown, Michael S., Wireless/wired mobile communication device with option to automatically block wireless communication when connected for wired communication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로