$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Administration of protection of data accessible by a mobile device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-017/00
  • H04K-001/00
  • G06F-015/16
  • G06F-017/30
  • G06F-007/04
  • G06F-007/02
  • G06F-007/58
출원번호 US-0413443 (2003-04-11)
등록번호 US-7353533 (2008-04-01)
발명자 / 주소
  • Wright,Michael
  • Boucher,Peter
  • Nault,Gabe
  • Smith,Merrill
  • Jacobson,Sterling K
  • Wood,Jonathan
  • Mims,Robert
출원인 / 주소
  • Novell, Inc.
대리인 / 주소
    King & Schickli, PLLC
인용정보 피인용 횟수 : 414  인용 특허 : 15

초록

The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a locatio

대표청구항

The invention claimed is: 1. A computer-implemented method for administering protection of data accessible by a mobile computing device, comprising: pre-defining one or more security policies by a server computer system for the mobile computing device based upon a plurality of pre-configured locati

이 특허에 인용된 특허 (15)

  1. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with stored key encryption/decryption.
  2. Scott L. Wiegel, Graphical network security policy management.
  3. Glorikian, Harry A., Internet system for connecting client-travelers with geographically-associated data.
  4. Smith, Adrian David, Method and apparatus for automatically providing location-based information content on a wireless device.
  5. Bajikar, Sundeep M., Method and apparatus for controlling access to mobile devices.
  6. Chen,Shigang; Bhattacharya,Partha, Method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network.
  7. Parkinson David S. ; Williams Tim A., Method and apparatus for over the air programming a communication device.
  8. Fu,Tianying; Kadam,Sunil S.; Bacus,Michael P., Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment.
  9. Streit Roy L., Neural network for maximum likelihood classification with supervised and unsupervised training capability.
  10. Farros Royal P. ; Schuyler James A. ; Babcock Gaylon W. ; Finn Michael J. ; Sax Michael N. ; Johnson Alan D., Printing system with pre-defined user modifiable forms and local and remote printing.
  11. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  12. Bade, Steven A.; LeGrand, III, Robert H.; McLaughlin, Mark-David J., System and method for providing access to mobile devices based on positional data.
  13. Jenkins, Michael D.; Mancini, Phillip D., System and method of accessing and recording messages at coordinate way points.
  14. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  15. Herrmann, Conrad K.; Baharestan, Kaveh; Bentley, Joseph E.; Leroy, Jess A., System and methods providing anti-virus cooperative enforcement.

이 특허를 인용한 특허 (414)

  1. Boucher, Peter; Wright, Michael; Cranny, Tim; Nault, Gabe; Smith, Merrill, Access control to files based on source information.
  2. Kumar, Srinivas; Bettadapura, Vijayashree S.; Shah, Shadab Munam, Access, priority and bandwidth management based on application identity.
  3. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  4. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  5. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  6. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  7. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  8. Raleigh, Gregory G; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  9. Raleigh, Gregory G; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  10. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  11. Kashchenko, Nadezhda V.; Tikhomirov, Anton V.; Polyakov, Dmitry A., Adaptive security for information devices.
  12. Kashchenko, Nadezhda V.; Tikhomirov, Anton V.; Polyakov, Dmitry A., Adaptive security for portable information devices.
  13. Wright, Michael; Boucher, Peter; Nault, Gabe; Smith, Merrill; Jacobson, Sterling K.; Wood, Jonathan; Mims, Robert, Administration of protection of data accessible by a mobile device.
  14. Dabbiere, Alan, Advanced authentication techniques.
  15. Herrod, Allan, Analysis leading to automatic action.
  16. Phanse, Shruti; Kumar, Bhavesh Krishna, Anonymized application scanning for mobile devices.
  17. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  18. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  19. Brannon, Jonathan Blake, Attempted security breach remediation.
  20. Marshall, John; Sorensen, Christian Blake, Attendance tracking via device presence.
  21. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Attribution of mobile device data traffic to end-user application based on socket flows.
  22. Van, David, Auditing communications.
  23. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  24. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  25. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  26. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  27. Raleigh, Gregory G., Automated device provisioning and activation.
  28. Raleigh, Gregory G., Automated device provisioning and activation.
  29. Raleigh, Gregory G., Automated device provisioning and activation.
  30. Raleigh, Gregory G., Automated device provisioning and activation.
  31. Raleigh, Gregory G., Automated device provisioning and activation.
  32. Raleigh, Gregory G., Automated device provisioning and activation.
  33. Raleigh, Gregory G., Automated device provisioning and activation.
  34. Raleigh, Gregory G., Automated device provisioning and activation.
  35. Raleigh, Gregory G., Automated device provisioning and activation.
  36. Raleigh, Gregory G., Automated device provisioning and activation.
  37. Raleigh, Gregory G., Automated device provisioning and activation.
  38. Raleigh, Gregory G., Automated device provisioning and activation.
  39. Raleigh, Gregory G., Automated device provisioning and activation.
  40. Raleigh, Gregory G., Automated device provisioning and activation.
  41. Raleigh, Gregory G., Automated device provisioning and activation.
  42. Raleigh, Gregory G., Automated device provisioning and activation.
  43. Raleigh, Gregory G., Automated device provisioning and activation.
  44. Raleigh, Gregory G., Automated device provisioning and activation.
  45. Raleigh, Gregory G., Automated device provisioning and activation.
  46. Van, David, Automatic intervention.
  47. Dabbiere, David, Autonomous device interaction.
  48. Chowdhary, Yousuf; Brunet, Jeffrey; Collins, Ian, Centralized rules repository for smart phone customer care.
  49. Dabbiere, Alan; Stuntebeck, Erich, Certificate based profile confirmation.
  50. Dilley, John A.; Laghate, Prasanna; Summers, John; Devanneaux, Thomas, Cloud based firewall system and service.
  51. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Sabin, Michael J., Communications device with secure data path processing agents.
  52. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  53. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  54. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  55. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  56. Chen, Yi-Fen; Liu, Shuosen Robert, Computer security threat data collection and aggregation with user privacy protection.
  57. Chen, Yi-Fen; Liu, Shuosen Robert, Computer security threat data collection and aggregation with user privacy protection.
  58. Hassan, Ahmed E.; Chiu, Denny; Wilson, John Ferguson, Computing device with environment aware features.
  59. Marshall, John; Stuntebeck, Erich, Controlling access to resources on a network.
  60. Stuntebeck, Erich, Controlling access to resources on a network.
  61. Marshall, John; Rykowski, Adam; Stuntebeck, Erich; Halebeed, Jyothiprakash, Controlling distribution of resources in a network.
  62. Marshall, John; Stuntebeck, Erich; Jayaprakash, Gopinath; Manton, John Joseph; Brannon, Jonathan Blake, Controlling distribution of resources on a network.
  63. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Controlling mobile device communications on a roaming network based on device state.
  64. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a network environment.
  65. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  66. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  67. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  68. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  69. Hammer, Douglas David, Conveying value of implementing an integrated data management and protection system.
  70. Stuntebeck, Erich, Data access sharing.
  71. Stuntebeck, Erich, Data access sharing.
  72. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  73. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  74. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Data usage monitoring for media data services used by applications.
  75. Manton, John Joseph, Delegating authorization to applications on a client device in a networked environment.
  76. Manton, John Joseph; Kommireddy, Sridhara Babu; Rykowski, Adam Stephen, Delegating authorization to applications on a client device in a networked environment.
  77. Raleigh, Gregory G., Device agent for remote user configuration of wireless network access.
  78. Raleigh, Gregory, Device assisted CDR creation aggregation, mediation and billing.
  79. Raleigh, Gregory G., Device assisted CDR creation, aggregation, mediation and billing.
  80. Raleigh, Gregory G., Device assisted CDR creation, aggregation, mediation and billing.
  81. Raleigh, Gregory G, Device assisted ambient services.
  82. Raleigh, Gregory G, Device assisted ambient services.
  83. Raleigh, Gregory G., Device assisted ambient services.
  84. Raleigh, Gregory G., Device assisted services install.
  85. Raleigh, Gregory G., Device assisted services install.
  86. Raleigh, Gregory G., Device assisted services install.
  87. Raleigh, Gregory, Device group partitions and settlement platform.
  88. Raleigh, Gregory G., Device group partitions and settlement platform.
  89. Raleigh, Gregory G., Device group partitions and settlement platform.
  90. Raleigh, Gregory G., Device group partitions and settlement platform.
  91. Kapadekar, Vivek; Rao, Bindu Rama, Device management in a network.
  92. Dabbiere, Alan, Device management macros.
  93. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  94. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  95. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  96. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  97. Rao, Bindu Rama, Diagnostic agent in device that retrieves key performance indicators.
  98. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey, Distributing content and service launch objects to mobile devices.
  99. Dabbiere, Alan; Stuntebeck, Erich, Distribution of variably secure resources in a networked environment.
  100. Parla, Vincent E.; Gladstone, Philip John Steuart; McCowan, David J.; Zawadowskiy, Andrew; Fitzgerald, Christopher A., Dynamic content-based routing.
  101. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, End user device that secures an association of application to service policy with an application certificate check.
  102. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
  103. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  104. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  105. Beachem, Brent R.; McLain, Steven S.; Rollins, Richard B.; Shaw, Neil R., Enforcing secure internet connections for a mobile endpoint computing device.
  106. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  107. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  108. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian; Walker, Keith Raymond, Enhanced personal firewall for dynamic computing environments.
  109. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian; Walker, Keith Raymond, Enhanced personal firewall for dynamic computing environments.
  110. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  111. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  112. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  113. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  114. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  115. Marshall, John, Enterprise-specific functionality watermarking and management.
  116. Marshall, John, Enterprise-specific functionality watermarking and management.
  117. Marshall, John, Enterprise-specific functionality watermarking and management.
  118. Stuntebeck, Erich, Facial capture managing access to resources by a device.
  119. Danoyan, Alexander Y.; Isaacson, Scott A., Fine grained access control for linux services.
  120. Zhang, Junbiao; Mathur, Saurabh, Flexible WLAN access point architecture capable of accommodating different user devices.
  121. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Phuong, Flow tagging for service policy implementation.
  122. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  123. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  124. Marshall, John, Functionality watermarking and management.
  125. Marshall, John, Functionality watermarking and management.
  126. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  127. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  128. Raleigh, Gregory G., Hierarchical service policies for creating service usage data records for a wireless end-user device.
  129. DiRico, John; Stuntebeck, Erich, Individual-specific content management.
  130. Rao, Bindu R.; Kapadekar, Vivek, Ingestion interface for transferring update package containers into a distribution network.
  131. Chen, Shao-Chun; O'Neill, Patrick; Sotos, Peter L.; Lim, Jeong M.; Jacobi, Sidney Andrew, Initialization and update of software and/or firmware in electronic devices.
  132. Phanse, Shruti; Kumar, Bhavesh Krishna, Integrated application scanning and mobile enterprise computing management system.
  133. Raleigh, Gregory G.; Nguyen, Vien-Phuong; Stark, Lisa; Tellado, Jose, Intermediate networking devices.
  134. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  135. Carter, Stephen R.; McClain, Carolyn B., Key distribution.
  136. Carter, Stephen R.; McClain, Carolyn B., Key distribution.
  137. Carter, Stephen R.; McClain, Carolyn B., Key distribution.
  138. Carter, Stephen R.; McClain, Carolyn B., Key distribution.
  139. Isaacson, Scott A., Light-weight multi-user browser.
  140. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Location-based configuration policy toggling.
  141. Parr, Francis Nicholas; Schofield, Andrew John; Todd, Stephen James, Management of persistence in a data processing system.
  142. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Managing cross perimeter access.
  143. Raleigh, Gregory G.; Green, Jeffrey; Tellado, Jose, Managing service user discovery and service launch object placement on a device.
  144. Raleigh, Gregory G., Message link server with plural message delivery triggers.
  145. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  146. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  147. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  148. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  149. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  150. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  151. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  152. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  153. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  154. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  155. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  156. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  157. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  158. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  159. Kumar, Srinivas; Bettadapura, Vijayashree S., Method and system for policy simulation.
  160. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  161. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  162. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  163. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from an endpoint to a gateway.
  164. Rao, Goutham; Rodriguez, Robert; Brueggemann, Eric, Method and systems for routing packets from an endpoint to a gateway.
  165. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  166. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  167. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
  168. Rao, Goutham P.; Brueggemann, Eric R.; Rodriguez, Robert A., Method for maintaining transaction integrity across multiple remote access servers.
  169. Raleigh, Gregory G., Method for operating a wireless end-user device mobile payment agent.
  170. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Method for providing an adaptive wireless ambient service to a mobile device.
  171. Oerton, Kevin John, Method of limiting use of a mobile wireless access point near a wireless local area network.
  172. Oerton, Kevin John, Method of limiting use of a mobile wireless access point near a wireless local area network.
  173. Oerton, Kevin John, Method of limiting use of a mobile wireless access point near a wireless local area network.
  174. Bansal, Ravi Prakash; Hamilton, II, Rick Allen; O'Connell, Brian Marshall; Walker, Keith Raymond, Method to apply network encryption to firewall decisions.
  175. Goldstein, Leonid, Method, a system, and an apparatus for content security in computer networks.
  176. Guichard, James N.; Wainner, W. Scott; Weis, Brian E.; Khalid, Mohamed, Methods and apparatus for providing multiple policies for a virtual private network.
  177. Herrod, Allan, Methods and apparatus for rating device security and automatically assessing security compliance.
  178. Herrod, Allan, Methods and apparatus for rating device security and automatically assessing security compliance.
  179. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  180. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  181. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  182. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  183. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices.
  184. Hardy, Michael; Aslaken, Eric; Voyentzie, Richard, Methods, devices, and computer program products for controlling wireless connection access.
  185. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Mobile device and method attributing media services network usage to requesting application.
  186. Raleigh, Gregory G., Mobile device and method with secure network messaging for authorized components.
  187. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  188. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  189. Raleigh, Gregory G., Mobile device with common secure wireless message service serving multiple applications.
  190. Raleigh, Gregory G., Mobile device with data service monitoring, categorization, and display for different applications and networks.
  191. Raleigh, Gregory G., Mobile device with device agents to detect a disallowed access to a requested mobile data service and guide a multi-carrier selection and activation sequence.
  192. Raleigh, Gregory G., Mobile device with user controls and policy agent to control application access to device location data.
  193. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy.
  194. Manickam, Vetha S.; Sasidharan, Shan K.; Prakash, Vikram C.; Adari, Venkata Krishna Adinarayana; Bhatta, Sambasiva R.; Singh, Sanjay; Vyas, Viral V.; Mutharaju, Sireesh; Bajpai, Pranay, Mobile enterprise server and client device interaction.
  195. Molen, Brett Thomas; Norr, George B.; Welch, John Thomas; Ehlers, Richard L.; Midani, Wael R., Monitoring and reporting policy compliance of home networks.
  196. DeWeese, William; Brannon, Jonathan Blake; Stuntebeck, Erich, Multi-persona devices and management.
  197. Raleigh, Gregory G., Multicarrier over-the-air cellular network activation server.
  198. Raleigh, Gregory G, Network based ambient services.
  199. Raleigh, Gregory G., Network based ambient services.
  200. Raleigh, Gregory G., Network based ambient services.
  201. Raleigh, Gregory G., Network based service policy implementation with network neutrality and user privacy.
  202. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  203. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  204. Chia, Teck; Dinh, John D. V.; Gustafson, James P., Network for updating electronic devices.
  205. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  206. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  207. Raleigh, Gregory G., Network system with common secure wireless message service serving multiple applications on multiple wireless devices.
  208. Saito, Kazuo, Network system, internal server, terminal device, storage medium and packet relay method.
  209. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  210. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  211. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  212. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  213. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  214. Raleigh, Gregory G, Open development system for access service providers.
  215. Raleigh, Gregory G, Open development system for access service providers.
  216. Raleigh, Gregory G., Open development system for access service providers.
  217. Raleigh, Gregory G., Open transaction central billing system.
  218. Raleigh, Gregory G., Open transaction central billing system.
  219. Raleigh, Gregory G., Open transaction central billing system.
  220. Chen, Shao-Chun; O'Neill, Patrick; Rao, Bindu Rama; Lilley, Patrick, Pattern detection preprocessor in an electronic device update generation system.
  221. Dabbiere, David, Peripheral device management.
  222. Dabbiere, David, Peripheral device management.
  223. Van, David, Point to multi-point connections.
  224. Kaneko, Takashi; Tanaka, Tadaaki; Nagasaka, Masaaki; Kobayashi, Keita, Portable wireless terminal and its security system.
  225. Beachem, Brent R.; Smith, Merrill K., Pre-boot securing of operating system (OS) for endpoint evaluation.
  226. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  227. Marcjan, Cezary; Cheng, Lili, Privacy model that grants access rights and provides security to shared content.
  228. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy server for providing an adaptive wireless ambient service to a mobile device.
  229. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy system and method for adaptive ambient services.
  230. Raleigh, Gregory G., Quality of service for device assisted services.
  231. Raleigh, Gregory G., Quality of service for device assisted services.
  232. Raleigh, Gregory G., Quality of service for device assisted services.
  233. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Remotely configurable device agent for packet routing.
  234. Marshall, John; DeWeese, William, Resource watermarking and management.
  235. Raleigh, Gregory G., Restricting end-user device communications over a wireless access network associated with a cost.
  236. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  237. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  238. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  239. Raleigh, Gregory G., Roaming services network and overlay networks.
  240. Cowan, S. Crispin; Arnold, Seth R.; Beattie, Steven M.; Johansen, John R.; Michael, Jesse D.; Jones, Anthony N., Role based access controls.
  241. DeWeese, William; Stuntebeck, Erich, Secondary device as key for authorizing access to resources.
  242. Marshall, John; Stuntebeck, Erich; Sorensen, Blake, Secure application leveraging of web filter proxy services.
  243. Beachem, Brent R., Securing a network connection by way of an endpoint computing device.
  244. Freund, Gregor Paul, Security system with methodology providing verified secured individual end points.
  245. Raleigh, Gregory G., Security techniques for device assisted services.
  246. Raleigh, Gregory G., Security techniques for device assisted services.
  247. Raleigh, Gregory G., Security techniques for device assisted services.
  248. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  249. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  250. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  251. Kashchenko, Nadezhda V.; Tikhomirov, Anton V.; Polyakov, Dmitry A., Self-delegating security arrangement for portable information devices.
  252. Raleigh, Gregory G., Service activation tracking system.
  253. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  254. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  255. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  256. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  257. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  258. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  259. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; James, Justin; Nguyen, Laurent An Minh; Carter, III, Russell Bertrand, Service plan design, user interfaces, application programming interfaces, and device management.
  260. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow.
  261. Raleigh, Gregory G., Service profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices.
  262. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set published to device agent with on-device service selection.
  263. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set publishing to device agent with on-device service selection.
  264. Marshall, John; DeWeese, William, Shared resource watermarking and management.
  265. Raleigh, Gregory G., Simplified service network architecture.
  266. Sorensen, Christian Blake, Social media and data sharing controls for data security purposes.
  267. Harvey, Elaine; Walnock, Matthew, Spoofing detection.
  268. Becker, Moritz, State-updating authorization.
  269. Danoyan, Alexander Y.; Isaacson, Scott A., Synthesized root privileges.
  270. Wipfel, Robert A., System and method for creating a customized installation on demand.
  271. Isaacson, Scott A., System and method for creating a pattern installation by cloning software installed another computer.
  272. Roundtree, Brian; Russell, Jake A., System and method for detecting mutually supported capabilities between mobile devices.
  273. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  274. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  275. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  276. Beachem, Brent; Boucher, Peter; Nault, Gabe; Rollins, Richard; Wood, Jonathan Brett; Wright, Michael, System and method for filtering access points presented to a user and locking onto an access point.
  277. Touboul, Shlomo, System and method for implementing content and network security inside a chip.
  278. Kumar, Srinivas; Weber, Dean A., System and method for inferring access policies from access event records.
  279. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  280. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K R, Bharath; Kumar, Anil, System and method for performing entity tag and cache control of a dynamically generated object not identified as cacheable in a network.
  281. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  282. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  283. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  284. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  285. Ngair, Teow Hin, System and method for prevention of malware attacks on data.
  286. Freericks, Helmuth; Kouznetsov, Oleg; Sharp, John C., System and method for protecting data accessed through a network connection.
  287. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  288. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  289. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  290. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  291. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  292. Touboul, Shlomo, System and method for providing network and computer firewall protection with dynamic address isolation to a device.
  293. Touboul, Shlomo, System and method for providing network security to mobile devices.
  294. Touboul, Shlomo, System and method for providing network security to mobile devices.
  295. Touboul, Shlomo, System and method for providing network security to mobile devices.
  296. Touboul, Shlomo, System and method for providing network security to mobile devices.
  297. Touboul, Shlomo, System and method for providing network security to mobile devices.
  298. Touboul, Shlomo, System and method for providing network security to mobile devices.
  299. Teo, Wee Tuck, System and method for providing transactional security for an end-user device.
  300. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  301. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  302. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James; Green, Jeffrey, System and method for providing user notifications.
  303. Hanzlik, Robert Otto; Lowe, Geoffrey A.; Markham, Thomas R.; Meredith, Lynn Marquette, System and method for secure group communications.
  304. Teo, Wee Tuck; Toh, Teck Kang; Chung, Hyung Hwan, System and method for securing a network session.
  305. Kumar, Srinivas; Bettadapura, Vijayashree S., System and method for using variable security tag location in network communications.
  306. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  307. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  308. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  309. Kumar, Srinivas; Weber, Dean A.; Roth, Virginia L.; Shah, Shadab Munam, System and method using globally unique identities.
  310. Isaacson, Scott A.; Anderson, Eric W. B.; Wipfel, Robert, System for creating a customized software distribution based on user requirements.
  311. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, System for providing an adaptive wireless ambient service to a mobile device.
  312. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  313. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for adjusting the maximum transmission unit by an intermediary device.
  314. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for adjusting the maximum transmission unit for encrypted communications.
  315. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception SSI/VPN traffic.
  316. Mullick, Amarnath; Nanjundaswamy, Shashi; Venkatraman, Charu; He, Junxiao; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  317. Mullick, Amarnath; Venkatraman, Charu; He, Junxiao; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application based interception of SSL/VPN traffic.
  318. Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Harris, James; Soni, Ajay, Systems and methods for application-based interception of SSL/VPN traffic.
  319. Mazzaferri, Richard James; Ryman, Paul, Systems and methods for attributing an amount of power consumption to a workload.
  320. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  321. Chadda, Sanjay; Samuels, Allen R.; Decasper, Dan S.; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  322. Chadda, Sanjay; Samuels, Allen; DeCasper, Dan; Dittia, Zubin; Ankam, Shiva, Systems and methods for bridging a WAN accelerator with a security gateway.
  323. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  324. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  325. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  326. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  327. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  328. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  329. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  330. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  331. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  332. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  333. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  334. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  335. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  336. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  337. Stuntebeck, Erich, Systems and methods for controlling email access.
  338. Stuntebeck, Erich, Systems and methods for controlling email access.
  339. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  340. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  341. Stuntebeck, Erich; Burnett, Michelle, Systems and methods for controlling network access.
  342. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for facilitating a peer to peer route via a gateway.
  343. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for network disruption shielding techniques.
  344. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  345. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  346. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  347. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  348. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  349. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  350. Harris, James; He, Max; Kumar, Arkesh; Soni, Ajay; Venkatraman, Charu; Najundaswamy, Shashi; Mullick, Amarnath, Systems and methods for providing levels of access and action control via an SSL VPN appliance.
  351. Ely, Omar Nathaniel, Systems and methods for providing network security using a secure digital device.
  352. Ely, Omar Nathaniel, Systems and methods for providing network security using a secure digital device.
  353. Touboul, Shlomo; Ferdman, Sela; Yusim, Yonathan, Systems and methods for providing real time access monitoring of a removable media device.
  354. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  355. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  356. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  357. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  358. Oz, Ami; Touboul, Shlomo, Systems and methods for providing security services during power management mode.
  359. Harris, James; Venkatraman, Charu; He, Junxiao; Mullick, Amarnath; Nanjundaswamy, Shashi; Soni, Ajay, Systems and methods of fine grained interception of network communications on a virtual private network.
  360. Sobko, Andrey V.; Tikhomirov, Anton V.; Kashchenko, Nadezhda V.; Polyakov, Dmitry A.; Kalkuhl, Magnus, Team security for portable information devices.
  361. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of device data traffic to initiating end-user application.
  362. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of mobile device data traffic to initiating end-user application.
  363. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration policy toggling.
  364. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration profile toggling.
  365. Touboul, Shlomo, Transaction security systems and methods.
  366. Touboul, Shlomo, Transaction security systems and methods.
  367. Freericks, Helmuth; Kouznetsov, Oleg; Sharp, John C., Trusted secure desktop.
  368. Cassapakis, Chris; Rao, Bindu Rama, Updating an electronic device with update agent code.
  369. Motta, Giovanni; Marolia, Sunil; O'Neill, Brian; Slyz, Marko, User experience and dependency management in a mobile device.
  370. Motta, Giovanni; Marolia, Sunil; O'Neill, Brian; Slyz, Marko, User experience and dependency management in a mobile device.
  371. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  372. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  373. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  374. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  375. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  376. Raleigh, Gregory G., Verifiable device assisted service policy implementation.
  377. Raleigh, Gregory G., Verifiable device assisted service policy implementation.
  378. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  379. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  380. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  381. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  382. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  383. Raleigh, Gregory G., Verifiable service billing for intermediate networking devices.
  384. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  385. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  386. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  387. Raleigh, Gregory G.; Lavine, James, Virtualized policy and charging system.
  388. Dabbiere, Alan; Stuntebeck, Erich, Watermarking detection and management.
  389. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless device applying different background data traffic policies to different device applications.
  390. Raleigh, Gregory G., Wireless device with application data flow tagging and network stack-implemented network access policy.
  391. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with application program interface to allow applications to access application-specific aspects of a wireless network access policy.
  392. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to roaming wireless data service.
  393. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to wireless data service.
  394. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  395. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  396. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list having limited user control.
  397. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access and access status for background and foreground device applications.
  398. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access for background and foreground device applications.
  399. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access selectively applied to different applications.
  400. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access status for different device applications.
  401. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, Wireless end-user device with divided user space/kernel space traffic policy system.
  402. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
  403. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with per-application data limit and traffic control policy list limiting background application traffic.
  404. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based aggregation of network activity requested by applications.
  405. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications.
  406. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with power-control-state-based wireless network access policy for background applications.
  407. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with secure network-provided differential traffic control policy list.
  408. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Wireless end-user device with wireless data attribution to multiple personas.
  409. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
  410. Conway, Adam Michael; Klarich, Lee; Mo, Ning, Wireless network having multiple security interfaces.
  411. Conway, Adam Michael; Klarich, Lee; Mo, Ning, Wireless network having multiple security interfaces.
  412. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless network service interfaces.
  413. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
  414. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로