$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for secure relayed communications from an implantable medical device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04W-012/02
  • H04L-029/06
출원번호 US-0214077 (2014-03-14)
등록번호 US-9215075 (2015-12-15)
발명자 / 주소
  • Poltorak, Alexander
출원인 / 주소
  • Poltorak Technologies LLC
대리인 / 주소
    Hoffberg, Esq., Steven M.
인용정보 피인용 횟수 : 29  인용 특허 : 443

초록

The present invention provides systems and methods for supporting encrypted communications with a medical device, such as an implantable device, through a relay device to a remote server, and may employ cloud computing technologies. An implantable medical device is generally constrained to employ a

대표청구항

1. An implantable medical device, comprising: a wireless radio frequency digital communication radio transceiver;a physiological interface adapted to at least one of receive a physiological signal, produce a physiological stimulation, produce a motion or displacement, infuse a drug, and acquire a bi

이 특허에 인용된 특허 (443)

  1. Olin, Håkan; Althoff, Fredrik; Hendelberg, Roger; Carlsson, Niclas, Access point for mobile devices in a packet based network and a method and a system for billing in such a network.
  2. Olin, Håkan; Althoff, Fredrik; Hendelberg, Roger; Carlsson, Niclas, Access point for mobile devices in a packet based network and a method and system for billing in such a network.
  3. Borghei, Hooman, Ad hoc formation and tracking of location-sharing groups.
  4. Noguchi,Tetsuya; Shimotono,Susumu, Ad-hoc radio communication verification system.
  5. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Addressing message gates in a distributed computing environment.
  6. Lagassey,Paul J., Advanced automobile accident detection, data recordation and reporting system.
  7. Traversat, Bernard A.; Gong, Li; Pabla, Kuldipsingh; Yeager, William J.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean Christophe; Joy, William N.; Clary, Michael J., Advertisements for peer-to-peer computing resources.
  8. Breed, David S., Airbag deployment control based on contact with occupant.
  9. Steele,Dale Everett; Silva,Kenneth Alan, Anonymous transaction system.
  10. Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul S.; Swinehart,Daniel C., Apparatus and methods for providing secured communication.
  11. Balfanz,Dirk; Smetters,Diana; Stewart,Paul; Swinehart,Daniel C., Apparatus and methods for providing secured communication.
  12. Tanaka, Yu; Ukita, Masakazu; Kawamoto, Yohei; Matsuda, Seiichi; Asano, Tomoyuki; Katagi, Masanobu; Moriai, Shiho; Yoshida, Asami, Appliance authentication system, and method of controlling power supply.
  13. Walmsley, Simon Robert, Authenticated communication between multiple entities.
  14. Ando, Eriko; Ishida, Shuichi; Fukuzawa, Yasuko; Matsui, Susumu; Manchu, Tetsuo, Authentication method of ad hoc network and wireless communication terminal thereof.
  15. Juels, Ari, Authentication methods and apparatus utilizing hash chains.
  16. Raleigh, Gregory G., Automated device provisioning and activation.
  17. Raleigh, Gregory G., Automated device provisioning and activation.
  18. Bhagwat, Pravin; Gogate, Shantanu; King, David C., Automated method and system for monitoring local area computer networks for unauthorized wireless access.
  19. King, Nigel, Automated security manager.
  20. Bhagwat,Pravin; Gogate,Shantanu; King,David C., Automated sniffer apparatus and method for monitoring computer systems for unauthorized access.
  21. Bhagwat,Pravin; Gogate,Shantanu; King,David C., Automated sniffer apparatus and method for wireless local area network security.
  22. Heinonen,Tomi; Kallio,Janne J., Automatic determination of access point content and services for short-range wireless terminals.
  23. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric; Duigou,Michael J., Automatic lease renewal with message gates in a distributed computing environment.
  24. Petite, Thomas David; Huff, Richard M, Automotive diagnostic data monitoring systems and methods.
  25. Risher, Mark E.; Delany, Mark; Kundu, Anirban; Libbey, IV, Miles A.; Taketomi, Masumi, Blocking of spoofed E-mail.
  26. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M.; Duigou,Michael J., Bridging between a data representation language message-based distributed computing environment and other computing environments using proxy service.
  27. Walmsley,Simon Robert, Cache updating method and apparatus.
  28. Nguyen, Linda K., Cancelling a purchasing request.
  29. French, John; Witham, Philip, Cart return credit system.
  30. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Duigou, Michael J., Client-specified display services in a distributed computing environment.
  31. Shipton,Gary; Walmsley,Simon Robert, Clock trim mechanism for onboard system clock.
  32. Yeager,William J.; Chen,Rita Y.; Soto,Juan C., Collaborative content coherence using mobile agents in peer-to-peer networks.
  33. Patton,Charles, Combining multi-hop and multicast wireless networking in classroom-like settings.
  34. Miyabayashi, Naoki; Yoneda, Yoshihiro; Soma, Isao; Kuroda, Seiji; Ishikawa, Yasuharu; Takada, Kazuo; Sueyoshi, Masahiro, Communication device and communication method.
  35. Yamazaki,Shinichi; Myojo,Toshihiko, Communication system and management apparatus and method for restricting functions in communication system.
  36. Rekimoto, Junichi, Communication system, information processing apparatus, method and computer program.
  37. Moore, Keith E.; Shenoy, Rajesh K., Communications methods and appliances.
  38. Walmsley,Simon Robert; Plunkett,Richard Thomas, Compensation for uneven printhead module lengths in a multi-module printhead.
  39. Walmsley,Simon Robert; Plunkett,Richard Thomas, Compensation for vertical skew between adjacent rows of nozzles on a printhead module.
  40. Bryce, Stuart; Kinder, Richard D., Configuring and connecting to a media wireless network.
  41. O'Shea, Gregory Francis; Zahn, Thomas Christian; Rowstron, Antony, Content discovery and transfer between mobile communications nodes.
  42. Hirvela, George; Frerking, Melvin; Keathley, Thomas, Content management for wireless digital media frames.
  43. Feinberg, Eugene; Koren, Yuval; Ozceri, Berend; Gillat, Ziv, Content-aware digital media storage device and methods of using the same.
  44. Feinberg, Eugene; Koren, Yuval; Ozceri, Berend; Gillat, Ziv, Content-aware digital media storage device and methods of using the same.
  45. Kawakami, Takashi, Contents reproducing device, contents processing device, contents distribution server, contents reproducing method, contents processing method, and program.
  46. Parupudi, Gopal; Evans, Stephen S.; Holtgrewe, Burdette J.; Reus, Edward F., Context aware systems and methods utilizing hierarchical tree structures.
  47. Walmsley, Simon Robert; Plunkett, Richard Thomas, Controller for printhead having arbitrarily joined nozzle rows.
  48. Maes,Stephane H., Conversational portal for providing conversational browsing and multimedia broadcast on demand.
  49. Nguyen, Linda K.; Lin, Jasper S., Coordinating multiple devices in a product purchasing system.
  50. Rotondo, Scott A.; Dik, Casper H.; Vesseur, Joep J., Core initialization code validation.
  51. Walmsley, Simon Robert, Creation and usage of mutually exclusive messages.
  52. Roskind, James A.; Emigh, Aaron T., Cross-device playback with synchronization of consumption state.
  53. Mason, Jr.,Robert T.; Hodges,Eugene W.; Smith,Kathryn J.; Borleske,Andrew J., Data collector for an automated meter reading system.
  54. Plunkett,Richard Thomas, Data rate equalisation to account for relatively different printhead widths.
  55. Plunkett,Richard Thomas, Data rate supply proportional to the ratio of different printhead lengths.
  56. Kasaura, Tsuyoshi; Inoue, Sadayuki; Matsumoto, Soichiro; Shida, Tetsuro; Sato, Toshimitsu; Tsujishita, Masahiro, Data sending/receiving device and digital certificate issuing method.
  57. Walmsley,Simon Robert; Plunkett,Richard Thomas, Dead nozzle compensation.
  58. Abdelaziz,Mohamed M.; Traversat,Bernard A.; Duigou,Michael J.; Hugly,Jean Christophe; Botros,Sherif, Decentralized peer-to-peer advertisement.
  59. Raleigh, Gregory G., Device assisted ambient services.
  60. Willey, William D., Device authentication in a PKI.
  61. Willey, William Daniel, Device authentication in a PKI.
  62. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Device interoperability format rule set and method for assembling interoperability application package.
  63. Hohl, Fritz; Kovacs, Ernoe, Device registration in a wireless multi-hop ad-hoc network.
  64. Hapamas,Ziv; Shachak,Amit, Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address.
  65. Haller, Amit; Fornell, Peter; Itzchak, Avraham; Haparnas, Ziv; Glick, Amir, Device, system, method and computer readable medium for pairing of devices in a short distance wireless network.
  66. Washington, Darnell; Cummings, Phillip A., Device-to-device and client server based video monitoring and video teleconferencing/server networking technology for remote monitoring.
  67. Savoor, Raghvendra, Devices and methods for secure internet transactions.
  68. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Digital personal assistance via a broadband access gateway.
  69. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Digital personal assistance via a broadband access gateway.
  70. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  71. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  72. Droz, Patrick; Haas, Robert, Discovering stolen or lost network-attachable computer systems.
  73. Faybishenko,Yaroslav; Beatty,John D.; Waterhouse,Steve, Distributed identities.
  74. Pabla,Kuldipsingh A.; Arora,Akhil K., Distributed indexing of identity information in a peer-to-peer network.
  75. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Distributed storage and aggregation of multimedia information via a broadband access gateway.
  76. Karaoguz,Jeyhan; Abrams,Marc; Seshadri,Nambirajan, Distributed storage and aggregation of multimedia information via a broadband access gateway.
  77. Yeager,William J.; Chen,Rita Y., Distributed trust mechanism for decentralized networks.
  78. Messerges, Thomas; Dabbish, Ezzat A.; Puhl, Larry; Vogler, Dean, Domain-based digital-rights management system with easy and secure device enrollment.
  79. Brodfuehrer, Richard J.; Bryant, Corey C.; Granados, Saheem; Yan, Stanley, Dynamic augmentation, reduction, and/or replacement of security information by evaluating logical expressions.
  80. Bonner, Thomas W., Dynamic dual-mode service access control, location-based billing, and E911 mechanisms.
  81. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Efficient construction of message endpoints.
  82. Nix, John A., Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays.
  83. Nix, John A., Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays.
  84. Walmsley, Simon Robert, Embedding data and information related to function with which data is associated into a payload.
  85. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Enhanced caller ID information based on access device information via a broadband access gateway.
  86. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Enhanced caller ID information based on access device information via a broadband access gateway.
  87. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Environment-interactive context-aware devices and methods.
  88. Aboba,Bernard D.; Nixon,Toby L., Establishing secure peer networking in trust webs on open networks using shared secret device key.
  89. Aboba,Bernard D.; Nixon,Toby L., Establishing secure peer networking in trust webs on open networks using shared secret device key.
  90. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Event message endpoints in a distributed computing environment.
  91. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Extended call handling functionality using multi-network simulcasting.
  92. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Extended call handling functionality using multi-network simulcasting.
  93. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Extended call handling functionality using multi-network simulcasting.
  94. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Extended call handling functionality using multi-network simulcasting.
  95. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Extraction of information from e-mails and delivery to mobile phones, system and method.
  96. Forslow, Jan, Extranet workgroup formation across multiple mobile virtual private networks.
  97. Forsl?w,Jan, Extranet workgroup formation across multiple mobile virtual private networks.
  98. Walmsley,Simon Robert; Plunkett,Richard Thomas, Fixative compensation.
  99. Brunet de Courssou, Thierry, Game talk service bus.
  100. Hoffberg, Steven M., Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference.
  101. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Generating results gates in a distributed computing environment.
  102. Olds Keith Andrew ; Kane John Richard ; Kapoor Vijay, Global telecommunications system with distributed virtual networks and method of operation therefor.
  103. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Handling of multimedia call sessions and attachments using multi-network simulcasting.
  104. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Handling of multimedia call sessions and attachments using multi-network simulcasting.
  105. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Handoff of a multimedia call session using background network scanning.
  106. Pabla, Kuldipsingh A.; Arora, Akhil K.; Haywood, Arvin C., Infrastructure for accessing a peer-to-peer network environment.
  107. Arora, Akhil K.; Pabla, Kuldipsingh A., Instant messaging using distributed indexes.
  108. Shipton,Gary; Walmsley,Simon Robert, Integrated circuit having clock trim circuitry.
  109. Shipton,Gary, Integrated circuit which disables writing circuitry to memory when the power drops below a power threshold predetermined and controlled by the processor.
  110. Shipton,Gary; Walmsley,Simon Robert, Integrated circuit which disables writing circuitry to memory when the power drops below a power threshold predetermined and controlled by the processor.
  111. Le Saint, Eric F.; Fedronic, Dominique Louis Joseph, Intelligent remote device.
  112. Le Saint, Eric F.; Fedronic, Dominique Louis Joseph, Intelligent remote device.
  113. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  114. Walmsley, Simon Robert, Labelling of secret information.
  115. Heinonen, Tomi; Laitinen, Timo M.; Lempiö, Jarkko, Local service handover.
  116. Kinnunen, Jari; Krishnamurthy, Guruprasad; Huhtanen, Karri; Jussila, Pekka; Ratschunas, Kalevi, Location dependent services.
  117. Gilkes, Alan M.; Panasik, Carl M., Location estimation in narrow bandwidth wireless communication systems.
  118. Herz, Scott, Location specific content.
  119. Karaoguz,Jeyhan; Abrams,Marc; Seshadri,Nambirajan, Location-aware application based quality of service (QOS) via a broadband access gateway.
  120. Whelan, Robert; Van Wagenen, Lamar; Morris, Roy, Managed roaming for WLANS.
  121. Lindeman, Jesse Wagner; Wagner, Thomas Edward, Management of mobile applications.
  122. Yeager,William J.; Chen,Rita Y., Managing distribution of content using mobile agents in peer-topeer networks.
  123. Korus, Michael F.; Shatil, Ohad; Zeng, Surong, Managing establishment and removal of security associations in a wireless mesh network.
  124. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Mechanism and apparatus for URI-addressable repositories of service advertisements and other content in a distributed computing environment.
  125. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for accessing and addressing services in a distributed computing environment.
  126. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for returning results of services in a distributed computing environment.
  127. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for security of newly spawned repository spaces in a distributed computing environment.
  128. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J., Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment.
  129. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for web-based searching of URI-addressable repositories in a distributed computing environment.
  130. LaLonde, John R.; Mass, William; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joe; Gryzwa, Mark, Medical data transport over wireless life critical network.
  131. LaLonde, John; Mass, William; Hoyme, Kenneth; Johnson, David C.; Bange, Joe; Gryzwa, Mark, Medical data transport over wireless life critical network.
  132. Traversat, Bernard A.; Saulpaugh, Thomas E.; Duigou, Michael J.; Slaughter, Gregory L., Message authentication using message gates in a distributed computing environment.
  133. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Pouyoul, Eric, Message conductors in a distributed computing environment.
  134. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Message gates in a distributed computing environment.
  135. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Message gates using a shared transport in a distributed computing environment.
  136. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Duigou, Michael J., Message-based leasing of resources in a distributed computing environment.
  137. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Messaging system using pairs of message gates in a distributed computing environment.
  138. Paatero,Lauri; Kiiveri,Antti, Method and a system for performing testing in a device, and a device.
  139. Reisman, Richard, Method and apparatus for browsing using alternative linkbases.
  140. Reisman, Richard, Method and apparatus for browsing using multiple coordinated device sets.
  141. Reisman, Richard, Method and apparatus for browsing using multiple coordinated device sets.
  142. Lamming,Michael G.; MacLean,Allan; Frayling,Anthony F., Method and apparatus for controlling document service requests using a mobile computing device.
  143. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for efficiently initializing mobile wireless devices.
  144. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for efficiently initializing secure communications among wireless devices.
  145. Overy, Michael Robert; Sullivan, Michael James, Method and apparatus for enhancing security in a wireless network using distance measurement techniques.
  146. Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul Joseph; Durfee,Glenn E.; Grinter,Rebecca E.; Wong,Hao Chi, Method and apparatus for establishing and using a secure credential infrastructure.
  147. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for exclusively pairing wireless devices.
  148. Porras, Phillip Andrew; Corr, Michael G.; Dawson, Steven Mark; Watt, David; Manseau, David; Marcotullio, John Peter, Method and apparatus for identifying wireless transmitters.
  149. Nordman,Ian; Alam��ki,Tero; V��nsk��,Marko; Tarkiainen,Mikko; Gyorb��r��,Norbert; Gripenberg,Casper, Method and apparatus for managing and enforcing user privacy.
  150. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Method and apparatus for obtaining space advertisements.
  151. Lamming, Michael G.; MacLean, Allan; Frayling, Anthony F., Method and apparatus for processing document service requests originating from a mobile computing device.
  152. Duigou,Michael J.; Abdelaziz,Mohamed M.; Traversat,Bernard A.; Saulpaugh,Thomas E.; Slaughter,Gregory L., Method and apparatus for proximity discovery of services.
  153. Stewart, Paul J.; Smetters, Diana K.; Grinter, Rebecca E.; Balfanz, Dirk; Durfee, Glenn E.; Wong, Hao-Chi, Method and apparatus for using a secure credential infrastructure to access vehicle components.
  154. Calderone,Theodore; Foster,Mark J.; Printz,Harry William; Kistler,James Jay, Method and apparatus for voice control of a television control device.
  155. Porras, Phillip Andrew; Corr, Michael G.; Dawson, Steven Mark; Watt, David; Manseau, David; Marcotullio, John Peter, Method and apparatus for wireless network security.
  156. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to discover services and negotiate capabilities.
  157. Saulpaugh, Thomas E.; Slaughter, Gregory L., Method and apparatus to discover services using flexible search criteria.
  158. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain.
  159. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain.
  160. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Abdelaziz,Mohamed M.; Traversat,Bernard A., Method and apparatus to obtain negotiated service advertisement.
  161. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to obtain service capability credentials.
  162. K?ns?l?,Ilkka; Lukkaroinen,Mikko, Method and arrangement for controlling access.
  163. Gehrmann, Christian, Method and arrangement in a communication network.
  164. Gehrmann,Christian; Blom,Rolf, Method and arrangement in a communication network.
  165. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method and device for interoperability in heterogeneous device environment.
  166. Singer, Howard; Popkin, Laird; Sadan, Yariv, Method and device for the wireless exchange of media content between mobile devices based on content preferences.
  167. Singer, Howard; Popkin, Laird; Sadan, Yariv, Method and device for the wireless exchange of media content between mobile devices based on user information.
  168. Leone, Manuel; Caprella, Ettore Elio, Method and system for a secure connection in communication networks.
  169. Derocher,Michael D; Kline,David R; Boyle,Craig D; Mitev,Mitko G, Method and system for ad hoc networking of computer users.
  170. Bent, Bruce; Bent, II, Bruce; Bent, Rebecca Gareis; Gareis, David Edgar, Method and system for allocating deposits over a plurality of depository institutions.
  171. Bent, Bruce; Bent, II, Bruce; Bent, Rebecca Gareis; Gareis, David Edgar, Method and system for allocating funds over a plurality of time deposit instruments in depository institutions.
  172. Krislov, Clinton A., Method and system for automated document registration.
  173. Rathod, Yogesh Chunilal, Method and system for communication, publishing, searching, sharing and dynamically providing a journal feed.
  174. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method and system for configuring and using virtual pointers to access one or more independent address spaces.
  175. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method and system for customized programmatic dynamic creation of interoperability content.
  176. Sperti, Luigi; Mollo, Maria José; Frosali, Federico; Freguglia, Giorgio, Method and system for detecting attacks in wireless data communications networks.
  177. Bent, II, Bruce; Gareis, David, Method and system for determining fees for deposits allocated over a plurality of deposit institutions.
  178. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Ramond; Tiberi, Richard; Wenocur, Michael, Method and system for device recruitment interoperability and assembling unified interoperating device constellation.
  179. Orlassino, Mark, Method and system for distributing data within a group of mobile units.
  180. Jei,Dae Gunn, Method and system for distributing electronic content to multi-party users in mobile communication network.
  181. Wang, Ray, Method and system for dynamic information exchange on a mesh network in a vehicle.
  182. Wang, Ray, Method and system for dynamic information exchange on location aware mesh network devices.
  183. Wang, Ray, Method and system for dynamic information exchange on mesh network devices.
  184. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  185. Gehrmann,Christian, Method and system for establishing a wireless communication link.
  186. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Method and system for extended network access notification via a broadband access gateway.
  187. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Method and system for extended network access notification via a broadband access gateway.
  188. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Method and system for extended network access notification via a broadband access gateway.
  189. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Method and system for extended network access services advertising via a broadband access gateway.
  190. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method and system for linear tasking among a plurality of processing units.
  191. Juitt,David; Bates,Philip; Christoffel,Thomas; Crawshaw,Geoffrey; Crosbie,David, Method and system for managing data traffic in wireless networks.
  192. Patwardhan, Aniruddha, Method and system for monitoring of wireless devices in local area computer networks.
  193. Hamberg, Max, Method and system for multimedia tags.
  194. Hamberg, Max, Method and system for multimedia tags.
  195. Borras, Jaime Andres; Merchant, Zaffer S.; Fernandez, Jose M., Method and system for power management for a handheld mobile electronic device executing-in-place an application kernel from execute-in-place non-volatile memory (XIP NVM).
  196. Leone, Manuel; Caprella, Ettore Elio, Method and system for protecting data, related communication network and computer program product.
  197. Palnitkar, Samir; Bhagwat, Vivek, Method and system for providing wireless vulnerability management for local area computer networks.
  198. Milstein, David; Criddle, Linda, Method and system for shadowing information between computing devices.
  199. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method and system for specifying device interoperability source specifying renditions data and code for interoperable device team.
  200. Zilliacus, Martin; Sandrini, Marco; Kotola, Sakari; Vartia, Jorma; Vesikivi, Petri, Method and system for tactile confirmation of service bookmarks.
  201. Korp, Peter A., Method and system for using temporary information on personal devices.
  202. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method and system to issue trust score certificates for networked devices using a trust scoring service.
  203. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  204. Ritter,Rudolph, Method for checking the authorization of users.
  205. Buskey, Ronald F.; Frosik, Barbara B.; Kuhlman, Douglas A., Method for elliptic curve public key cryptographic validation.
  206. Thomsen, Brant D.; Beachem, Brent R.; Wheeler, Thomas M., Method for establishing a secure Ad Hoc wireless LAN.
  207. Belcea, John M.; Alapuranen, Pertti O., Method for measuring the time of arrival of radio signals.
  208. Mueller Johannes (Berlin DEX), Method for monitoring a patient for rejection reactions to an implanted heart.
  209. Nyberg, Kaisa, Method for securing a communication.
  210. Gustave, Christophe; Choyi, Vinod Kumar; Gariador, Frederic, Method of authenticating a mobile network node in establishing a peer-to-peer secure context between a pair of communicating mobile network nodes.
  211. Sovio, Sampo; Ginzboorg, Philip; Ekberg, Jan Erik, Method of initializing and using a security association for middleware based on physical proximity.
  212. Lapstun, Paul; Silverbrook, Kia; Hollins, Michael; Dehghani, Zhamak; Newman, Andrew Timothy Robert, Method of interacting with substrate in cursor and hyperlinking modes.
  213. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, Method system and data structure for content renditioning adaptation and interoperability segmentation model.
  214. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method to verify the integrity of components on a trusted platform using integrity database services.
  215. Balfanz, Dirk; Smetters, Diana K.; Stewart, Paul Joseph; Durfee, Glenn E.; Grinter, Rebecca E.; Wong, Hao Chi, Method, apparatus, and program product for automatically provisioning secure network elements.
  216. Smetters, Diana K.; Balfanz, Dirk; Durfee, Glenn E.; Grinter, Rebecca E.; Stewart, Paul J.; Wong, Hao-Chi, Method, apparatus, and program product for provisioning secure wireless sensors.
  217. Smetters,Diana K.; Balfanz,Dirk; Durfee,Glenn E.; Grinter,Rebecca E.; Stewart,Paul J.; Wong,Hao Chi, Method, apparatus, and program product for securely presenting situation information.
  218. Cumming,Daniel A.; Forth,J. Bradford; Wynans,Arthur B.; Haight,Eric K.; Ransom,Douglas S.; Hancock,Martin A., Methods and apparatus for retrieving energy readings from an energy monitoring device.
  219. Ji, Lusheng; Agre, Jonathan; Mishra, Arunesh; Thakkar, Sohil, Methods and apparatus for secure, portable, wireless and multi-hop data networking.
  220. Ji, Lusheng; Agre, Jonathan; Mishra, Arunesh; Thakkar, Sohil, Methods and apparatus for secure, portable, wireless and multi-hop data networking.
  221. Morikuni, James J.; Jano, Bashar, Methods and systems for identity management in wireless devices.
  222. Moshir, Sean; Shafiezadeh, Houman; Moshir, Kevin K., Methods of authorizing actions.
  223. Moshir, Kevin K; Moshir, Sean; Shafiezadeh, Houman, Methods to authenticate access and alarm as to proximity to location.
  224. Newman, Mark W.; Edwards, W. Keith; Sedivy, Jana Z., Methods, apparatus, and program products for analyzing context in a networked computing environment.
  225. Newman,Mark W.; Edwards,W. Keith; Hong,Jason; Izadi,Shahram; Marcelo,Karen J.; Sedivy,Jana Z.; Smith,Trevor F., Methods, apparatus, and program products for configuring components in networked computing environments.
  226. Newman, Mark W.; Edwards, W. Keith; Sedivy, Jana Z., Methods, apparatus, and program products for utilizing contextual property metadata in networked computing environments.
  227. Hind,John R.; Peters,Marcia L., Methods, systems, and computer program products for securely transforming an audio stream to encoded text.
  228. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Migrating processes using data representation language representations of the processes in a distributed computing environment.
  229. Yeager, William J.; Chen, Rita Y., Mobile agents in peer-to-peer networks.
  230. Chang, William Ho; Liu, Christina Ying, Mobile and pervasive output server.
  231. Willey, William Daniel; Blake-Wilson, Simon, Mobile certificate distribution in a PKI.
  232. Willey, William Daniel; Blake-Wilson, Simon, Mobile certificate distribution in a PKI.
  233. Willey, William Daniel; Blake-Wilson, Simon, Mobile certificate distribution in a PKI.
  234. Willey,William Daniel; Blake Wilson,Simon, Mobile certificate distribution in a PKI.
  235. Eskin,Eleazar, Mobile computing and communication.
  236. Davis, Martin; Duke, Michael Thomas, Mobile device credit account.
  237. Nguyen, Binh T.; Underdahl, Brian, Mobile gaming devices for use in a gaming network having gaming and non-gaming zones.
  238. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Mobile handoff through multi-network simulcasting.
  239. Naghian, Siam?k; Lindstrom, Tapio; K?rkk?inen, Tero; M?kinen, Jarmo T.; L?hetkangas, Keijo; Mustonen, Kai, Mobile mesh Ad-Hoc networking.
  240. Naghian, Siamak; Lindstrom, Tapio; Karkkainen, Tero; Makinen, Jarmo; Lahetkangas, Keijo; Mustonen, Kai, Mobile mesh Ad-Hoc networking.
  241. Fung, Casey K.; Uczekaj, Stephen A.; Kearns, William M.; Hung, Patrick C., Mobile network dynamic workflow exception handling system.
  242. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Modular entertainment and gaming system configured for network boot, network application load and selective network computation farming.
  243. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Modular entertainment and gaming system configured for processing raw biometric data and multimedia response by a remote server.
  244. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Modular entertainment and gaming systems.
  245. Gatto,Jean Marie; Brunet De Courssou,Thierry; Beney,Pierre Jean, Modular entertainment and gaming systems configured to consume and provide network services.
  246. Lagassey, Paul J., Modular intelligent transportation system.
  247. Petite, Thomas D., Multi-function general purpose transceivers and devices.
  248. Vawter, Jamison, Multi-function transaction device.
  249. Walmsley, Simon Robert, Multi-level boot hierarchy for software development on an integrated circuit.
  250. Nyman,Kai; Olkkonen,Mikko; Murto,Juhani; Oinonen,Kari, Naming distribution method for ad hoc networks.
  251. Butler, Stephen F.; Budman, Simon H.; Katz, Nathaniel Paul; Villapiano, Albert J., National addictions vigilance, intervention and prevention program.
  252. Raleigh, Gregory G., Network based ambient services.
  253. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  254. Twitchell, Jr., Robert W., Network communications of application running on device utilizing virtual network connection and routing protocol based on application connection criteria.
  255. Twitchell, Jr., Robert W., Network communications of applications running on device utilizing different virtual network connections with different routing protocols.
  256. Bush, Steve; Mooney, Steve; Liu, Xin; Mevissen, John; Hinds, Josh J; Gery, Ron; Marl, Brett; Tebbs, Matthew, Network management providing network health information and lockdown security.
  257. Twitchell, Jr., Robert W.; Smith, Delia J., Network watermark.
  258. Goland,Yaron, Networked device branding for secure interaction in trust webs on open networks.
  259. Kirovski, Darko; Jain, Kamal, Off-line economies for digital media.
  260. Walmsley, Simon Robert; Plunkett, Richard Thomas, On-chip storage of secret information as inverse pair.
  261. Raleigh, Gregory G., Open development system for access service providers.
  262. Raleigh, Gregory G., Open transaction central billing system.
  263. Chang, William Ho; Liu, Christina Ying, Output controller for mobile and pervasive digital content output.
  264. Chang, William Ho; Liu, Christina Ying, Output service over a network.
  265. Vawter, Jamison, Party identification in a wireless network.
  266. Yeager,William J.; Chen,Rita Y., Peer trust evaluation using mobile agents in peer-to-peer networks.
  267. Bartram,Linda Ruth; Chesser,Mark Miller; Sawadsky,Nicholas; Schumacher,Steven Joseph; Blackstock,Michael, Peer-to-peer authentication for real-time collaboration.
  268. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean-Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Peer-to-peer communication pipes.
  269. Traversat,Bernard A.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Gong,Li; Yeager,William J.; Joy,William N.; Clary,Michael J., Peer-to-peer communication pipes.
  270. Traversat,Bernard A.; Slaughter,Gregory L.; Saulpaugh,Thomas E.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Gong,Li; Yeager,William J.; Pabla,Kuldipsingh; Joy,William N.; Clary,Michael J., Peer-to-peer computing architecture.
  271. Pabla, Kuldipsingh A.; Waterhouse, Steven, Peer-to-peer content sharing/distribution networks.
  272. Abdel-Aziz, Mohamed M.; Traversat, Bernard A.; Reid, Matthew; VanDenHoogen, Ingrid; Joy, William N.; Clary, Michael J., Peer-to-peer email messaging.
  273. Traversat,Bernard A.; Gong,Li; Yeager,William J.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Joy,William N.; Clary,Michael J., Peer-to-peer resource resolution.
  274. Berstis, Viktors, Performing horological functions in commercial transactions using time cells.
  275. Balfanz, Dirk; Smetters, Diana K.; Durfee, Glenn E.; Smith, Trevor F., Personal domain controller.
  276. Heinonen,Tomi; Laitinen,Timo; Bouet,Stephan; Zakharia,Sany, Personal profile sharing and management for short-range wireless terminals.
  277. Brown, Michael K.; Adams, Neil P.; Little, Herbert A., Policy proxy.
  278. Slettengren, Sven Konrad; Raith, Alex Krister, Politeness zones for wireless communication devices.
  279. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Duigou, Michael J., Pre-generated message endpoints.
  280. Kerschner, Michael B.; Gardner, Donald L., Precious metal bullion arbitrage retail kiosk and associated methods of use and manufacture.
  281. Arora, Akhil K.; Botros, Sherif M., Presence detection using distributed indexes in peer-to-peer networks.
  282. Yeager, William J.; Chen, Rita Y., Presence detection using mobile agents in peer-to-peer networks.
  283. Ahmed, Mohsin, Privacy preserving name verification.
  284. Meiss, Thomas Michael; Mikan, Jeffrey, Promotion operable recognition system.
  285. Yeager,William J.; Chen,Rita Y., Propagating and updating trust relationships in distributed peer-to-peer networks.
  286. Bappu, Benjamin; Tay, Hui Min J; See, Wei C, Propagation of messages.
  287. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Providing access dependent services via a broadband access gateway.
  288. Traversat,Bernard A.; Gong,Li; Yeager,William J.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Joy,William N.; Clary,Michael J., Providing peer groups in a peer-to-peer environment.
  289. Larsson, Bo Håkan; Stavenow, Bengt Gunnar; Ritzau, Jan Robert Tobias; Bengtsson, Henrik Sven; Östsjö, Anders Wilhelm; Minör, Sten Håkan, Providing services to a guest device in a personal network.
  290. Abel, Miller T.; Guday, Shai; Nick, Benjamin E., Provisioning of wireless connectivity for devices using NFC.
  291. Abel, Miller T.; Guday, Shai; Nick, Benjamin E., Provisioning of wireless connectivity for devices using NFC.
  292. Whitcomb, Michael J., Proxy authentication network.
  293. Finn, David, RFID reader with multiple interfaces.
  294. Finn, David; Ryan, Dennis, RFID token with multiple interface controller.
  295. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Registering access device multimedia content via a broadband access gateway.
  296. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Registering access device multimedia content via a broadband access gateway.
  297. Walmsley, Simon Robert, Relatively unique ID in integrated circuit.
  298. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Relay peers for extending peer availability in a peer-to-peer networking environment.
  299. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean-Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Reliable peer-to-peer connections.
  300. Karaoguz, Jeyhan; Abrams, Marc; Seshadri, Nambirajan, Remote configuration and control of local devices via a broadband access gateway.
  301. Cassett, Tia Manning; Fok, Kenny, Remote diagnosis of unauthorized hardware change.
  302. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Remote function invocation with messaging in a distributed computing environment.
  303. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J., Remote method invocation with secure messaging in a distributed computing environment.
  304. Traversat,Bernard A.; Gong,Li; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Joy,William N.; Clary,Michael J., Rendezvous for locating peer-to-peer resources.
  305. Risher, Mark E.; Delany, Mark; Kundu, Anirban; Libbey, IV, Miles A.; Taketomi, Masumi, Reporting on spoofed e-mail.
  306. Yeager,William J.; Chen,Rita Y., Representing trust in distributed peer-to-peer networks.
  307. Traversat,Bernard A.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Gong,Li; Joy,William N.; Clary,Michael J., Resource identifiers for a peer-to-peer environment.
  308. Gulcu, Ceki; Droz, Patrick; Haas, Robert, Scheme for blocking the use of lost or stolen network-connectable computer systems.
  309. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Secure access of objects generated from data representation language representations of the objects in a distributed computing environment.
  310. Beck, Justin M.; Swensen, Chad L., Secure authentication and network management system for wireless LAN applications.
  311. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  312. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  313. Doyle, Ronald P.; Hind, John R.; Peters, Marcia L., Secure integrated device with secure, dynamically-selectable capabilities.
  314. Billhartz,Thomas Jay; Fleming,Frank Joseph, Secure mobile ad-hoc network and related methods.
  315. Moshir, Sean; Moshir, Kevin K.; Shafiezadeh, Houman, Secure mobile information management system and method.
  316. Vawter, Jamison, Secure near field transaction.
  317. Ilechko, Paul, Secure physical distribution of a security token through a mobile telephony provider's infrastructure.
  318. Rhodes, Bradley J.; Savitzky, Stephen R; Piersol, Kurt, Secure pre-caching through local superdistribution and key exchange.
  319. Berger, Thomas R.; Denny, Joseph E.; Robins, David S.; Koop, LaMonte Peter; Payne, Edward Allen; Twitchell, Jr., Robert W., Securing, monitoring and tracking shipping containers.
  320. Freund, Gregor Paul, Security system with methodology providing verified secured individual end points.
  321. Moore, James F.; Labovitch, Bela A., Security systems and methods for use with structured and unstructured data.
  322. Krishnaswamy, Dilip, Selection and utilization of shared wireless wide area network modems.
  323. Raleigh, Gregory G., Service activation tracking system.
  324. Camp, Jr., William O.; Homiller, Daniel P., Shared key encryption using long keypads.
  325. Hamberg,Max, Short-range wireless system and method for multimedia tags.
  326. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Simulcasting or multicasting of multimedia call sessions in a LAN/WLAN/PAN via a broadband access gateway.
  327. Karaoguz, Jeyhan; Bennett, James D.; Seshadri, Nambirajan, Simulcasting or multicasting of multimedia call sessions in a LAN/WLAN/PAN via a broadband access gateway.
  328. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Spawning new repository spaces using information provided in advertisement schema messages.
  329. Mennes, Frederik; Hoornaert, Frank, Strong authentication token generating one-time passwords and signatures upon server credential verification.
  330. Dunn, Melissa W.; Fisher, Oliver G.; Park, Vivien; Erickson, Paul; Perlow, Jon, Synchronization view.
  331. Dunn,Melissa W.; Fisher,Oliver G.; Park,Vivien; Erickson,Paul; Perlow,Jon, Synchronization view.
  332. Newman, Mark W.; Edwards, W. Keith; Sedivy, Jana Z., System and method for accumulating a historical context of interactions between components.
  333. Iannacci,Gregory Fx, System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling.
  334. Illowsky,Daniel; Bernstein,Bruce; Mirabella,Richard; Pieb,Wolfgang; Sidney,Raymond; Tiberi,Richard; Wenocur,Michael, System and method for application driven power management among intermittently coupled interoperable electronic devices.
  335. Ransom, Douglas S.; Haight, Eric K.; Blackett, Andrew W.; Chivers, David A.; Howe, Anthony J.; Huber, Benedikt T.; Nakagawa, Brian T.; Van Gorp, John C., System and method for assigning an identity to an intelligent electronic device.
  336. Thompson, James; McClelland, Kathleen E.; Stewart, Brett B., System and method for concurrently utilizing multiple system identifiers.
  337. Thompson, James; McClelland, Kathleen E.; Stewart, Brett B., System and method for concurrently utilizing multiple system identifiers.
  338. Thompson, James; McClelland, Kathleen E.; Stewart, Brett B., System and method for concurrently utilizing multiple system identifiers.
  339. Hugly,Jean Christophe; Abdelaziz,Mohamed M.; Pouyoul,Eric; Traversat,Bernard A.; Duigou,Michael J., System and method for describing and identifying abstract software modules in peer-to-peer network environments.
  340. Donner, Irah H., System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, and other event admittance mean.
  341. Donner, Irah H., System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, and other event admittance means, goods and/or services.
  342. Donner,Irah H., System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, other event admittance means, goods and/or services.
  343. Donner,Irah H., System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, other event admittance means, goods and/or services.
  344. Pouyoul,Eric; Abdelaziz,Mohamed M.; Hugly,Jean Christophe; Duigou,Michael J.; Traversat,Bernard A., System and method for dynamic, transparent migration of services.
  345. Chunilal, Rathod Yogesh, System and method for dynamically generating a survey result(s) and utilizing survey data for customization, personalization and configuration of human operating system (HOS).
  346. Borleske,Andrew J.; Scoggins,Sean M.; Uy,David, System and method for efficient configuration in a fixed network automated meter reading system.
  347. Conley, Kenneth W.; Balfanz, Dirk; Pendleton, Bryan A.; Smetters, Diana K.; Durfee, Glenn E., System and method for establishing secondary channels.
  348. Conley,Kenneth W.; Balfanz,Dirk; Pendleton,Bryan A.; Smetters,Diana K.; Durfee,Glenn E., System and method for establishing secondary channels.
  349. Rappaport,Theodore S.; Skidmore,Roger R., System and method for indicating the presence or physical location of persons or devices in a site specific representation of a physical environment.
  350. Donner, Irah, System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services.
  351. Donner, Irah H., System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services.
  352. Donner,Irah H., System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services.
  353. Donner,Irah H., System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services.
  354. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, System and method for interoperability application driven error management and recovery among intermittently coupled interoperable electronic devices.
  355. Saint Clair, Gordon; Johnson, Frederick M.; Badore, Amy M.; Rotter, Charles; Shah, Kamal, System and method for managing, routing, and controlling devices and inter-device connections.
  356. Petite, Thomas D.; Huff, Richard; Aldoretta, David P.; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  357. Petite, Thomas David; Huff, Richard M; Aldoretta, David P; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  358. Hugly, Jean Christophe; Abdelaziz, Mohamed M.; Pouyoul, Eric; Traversat, Bernard A.; Duigou, Michael J., System and method for multiplatform implementation of abstract software modules in peer-to-peer network environments.
  359. Newman, Mark Webster; Edwards, Warren Keith; Sedivy, Jana Zdislava, System and method for prioritizing components.
  360. Carr, Jeffrey Douglas, System and method for processing and protecting content.
  361. Carr, Jeffrey Douglas, System and method for processing and protecting content.
  362. Lin, Gloria; Mikhak, Amir Mahmood; Nakajima, Taido Lantz; Mayo, Sean Anthony; Rosenblatt, Michael; Hodge, Andrew, System and method for processing media gifts.
  363. Bednarek, Michael D., System and method for promoting commerce, including sales agent assisted commerce, in a networked economy.
  364. Bednarek, Michael David, System and method for promoting commerce, including sales agent assisted commerce, in a networked economy.
  365. Ribaudo, Charles S.; Young, Jr., James F., System and method for providing communication services to mobile device users incorporating proximity determination.
  366. Sorvari, Antti; Kähäri, Markus; Toivonen, Hannu; Mannila, Heikki; Salmenkaita, Jukka Pekka, System and method for providing context sensitive recommendations to digital services.
  367. Hugly,Jean Christophe; Abdelaziz,Mohamed M.; Pouyoul,Eric; Traversat,Bernard A.; Duigou,Michael J., System and method for providing multiple embodiments of abstract software modules in peer-to-peer network environments.
  368. Donner,Irah H., System and method for reallocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services.
  369. Donner,Irah H.; Donner,Zachary J.; Donner,Jason J., System and method for reallocating and/or upgrading and/or selling tickets, other even admittance means, goods and/or services.
  370. Donner, Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  371. Donner, Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  372. Donner,Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  373. Donner,Irah H., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  374. Donner,Irah H.; Donner,Zachary J.; Donner,Jason J., System and method for reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  375. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., System and method for secure message-based leasing of resources in a distributed computing environment.
  376. Etchegoyen, Craig Stephen, System and method for secured mobile communication.
  377. Verbeke,Jerome M.; Nadgir,Neelakanth M.; Ruetsch,Gregory R.; Sharapov,Ilya A.; Vernik,Michael J.; Trang,Vu, System and method for submitting and performing computational tasks in a distributed heterogeneous networked environment.
  378. Roskind, James A.; Emigh, Aaron T., System and method for synchronization based on preferences.
  379. Mocek,Darryl, System and method for testing telematics software.
  380. Petite, Thomas David, System and method for transmitting pollution information over an integrated wireless network.
  381. Nadgir, Neelakanth M.; Verbeke, Jerome M.; Sharapov, Ilya A.; Ruetsch, Gregory R.; Trang, Vu; Vernik, Michael J., System and method for unique naming of resources in networked environments.
  382. Abdelaziz,Mohamed M.; Pouyoul,Eric; Hugly,Jean Christophe; Traversat,Bernard A.; Duigou,Michael J., System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection.
  383. Freund,Gregor, System and methodology for providing community-based security policies.
  384. Illowsky,Daniel; Bernstein,Bruce; Mirabella,Richard; Pieb,Wolfgang; Sidney,Raymond; Tiberi,Richard; Wenocur,Michael, System device and method for configuring and operating interoperable device having player and engine.
  385. Anttila, Akseli; Makipaa, Mikko; Rautila, Heikki; Saarinen, Petteri, System for location specific, automatic mobile station behavior control.
  386. Chang,William Ho; Liu,Christina Ying, System for mobile and pervasive output.
  387. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, System method and model for maintaining device integrity and security among intermittently connected interoperating devices.
  388. Illowsky, Daniel; Bernstein, Bruce; Mirabella, Richard; Pieb, Wolfgang; Sidney, Raymond; Tiberi, Richard; Wenocur, Michael, System method and model for social security interoperability among intermittently connected interoperating devices.
  389. Donner, Irah H.; Donner, Zachary J.; Donner, Jason J., System method reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  390. Donner, Irah H.; Donner, Zachary J.; Donner, Jason J., System method reallocating and/or upgrading and/or selling tickets, other event admittance means, goods and/or services.
  391. Traversat,Bernard A.; Gong,Li; Yeager,William J.; Abdelaziz,Mohamed M.; Duigou,Michael J.; Pouyoul,Eric; Hugly,Jean Christophe; Joy,William N.; Clary,Michael J., System using peer discovery and peer membership protocols for accessing peer-to-peer platform resources on a network.
  392. Hirsch,Frederick, System, apparatus, and method for using reduced Web service messages.
  393. Defoss?,Erin M.; Canter,James M.; Godwin,Bryan W., System, method and apparatus for vending machine wireless audit and cashless transaction transport.
  394. Asokan, Nadarajah; Nyberg, Kaisa, System, method and computer program product for authenticating a data agreement between network entities.
  395. Rappaport, Theodore S.; Skidmore, Roger R.; Anantha, Veeraraghavan; Reifsnider, Eric, System, method, and apparatus for determining and using the position of wireless devices or infrastructure for wireless network enhancements.
  396. Balfanz, Dirk; Lopes, Cristina; Smetters, Diana; Stewart, Paul; Wong, Hao-Chi, Systems and methods for authenticating communications in a network medium.
  397. McDonald, Ian; Gisby, Douglas Michael; McColgan, Brian Edward Anthony; Labrador, Christopher; Alfano, Nicholas, Systems and methods for facilitating transferring of conference calls using mobile communication devices.
  398. Lawrence, Dale Graham, Systems and methods for managing certificates.
  399. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring and controlling remote devices.
  400. Petite, Thomas David, Systems and methods for monitoring conditions.
  401. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring vehicle parking.
  402. Bui, Thomas T., Systems and methods for providing collaboration between systems.
  403. Petite, Thomas David; Huff, Richard M, Systems and methods for remote irrigation control.
  404. Moore, James F.; Labovitch, Bela A., Systems and methods for use of structured and unstructured distributed data.
  405. Brown, Michael S.; Little, Herbert A., Systems, devices, and methods for securely transmitting a security parameter to a computing device.
  406. Brown, Michael S.; Little, Herbert A., Systems, devices, and methods for securely transmitting a security parameter to a computing device.
  407. Toulis,Tadeo T.; Caine,Michael E.; Chang,Angela; Park,Joonwoo; Tagliabue,Roberto; Yong,Lisa Y.; Kumpf,Adam A., Tag for facilitating interaction with a wireless communication device.
  408. Walmsley,Simon Robert, Tamper resistant shadow memory.
  409. Labrou, Yannis; Masuouka, Ryusuke; Huynh, Duy; Song, Zhexuan, Task computing.
  410. Hind,John R.; Peters,Marcia L., Technique for digitally notarizing a collection of data streams.
  411. Hind, John R.; Peters, Marcia L., Technique for establishing provable chain of evidence.
  412. Plunkett, Richard Thomas, Timeslot arbitration scheme.
  413. Vawter, Jamison, Transaction information mining.
  414. Hascalovici, Ady; Hofstetter, Brian E., Transcoding content for maximizing playback abilities in a switch enabled device.
  415. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J.; Abdelaziz,Mohamed M., Transformation of objects between a computer programming language and a data representation language.
  416. Kovacs,Ern철; Schramm,Oliver, Transmission of carry-on objects using a wireless ad-hoc networking environment.
  417. Twitchell, Jr., Robert W., Transmitting packets from device in network communications with other device utilizing multiple virtual network connections.
  418. Yeager,William J.; Chen,Rita Y., Trust mechanisms for a peer-to-peer network computing platform.
  419. Yeager,William J.; Chen,Rita Y., Trust spectrum for certificate distribution in distributed peer-to-peer networks.
  420. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Pouyoul, Eric, Trusted construction of message endpoints in a distributed computing environment.
  421. Braskich, Anthony J.; Emeott, Stephen P., Tunneling security association messages through a mesh network.
  422. Buer, Mark; Frank, Ed; Seshadri, Nambi, User authentication system.
  423. Adya, Atul; Bahl, Paramvir; Chandra, Ranveer, Using a connected wireless computer as a conduit for a disconnected wireless computer.
  424. Tengler,Steve; Heft,Ronald, Vehicle on-board unit.
  425. Raleigh, Gregory G., Verifiable device assisted service policy implementation.
  426. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  427. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  428. Raleigh, Gregory G., Verifiable service billing for intermediate networking devices.
  429. Nguyen, Linda K.; Lin, Jasper S., Verifying that a purchasing request is legitimate.
  430. Vawter, Jamison, Virtual wallet.
  431. Nakayama, Fumiharu, Wireless LAN setting system in an image forming apparatus, and a wireless LAN setting method.
  432. Sugikawa,Akihiko, Wireless communication device, portable terminal, communication control program and communication system.
  433. Tanaka,Atau; Valadon,Guillaume; Violette,Laurent, Wireless communication system and method for facilitating wireless communication.
  434. Bienas, Maik; Choi, Hyung-Nam; Schmidt, Andreas, Wireless femtocell setup methods and apparatus.
  435. Howarter, Jamie Christopher; Lesher, Charles Michael; Sweeney, Jeffrey; Morill, Robert J.; Hull, Heather, Wireless handset airplane safety interlock.
  436. Howarter, Jamie Christopher; Lesher, Charles Michael; Sweeney, Jeffrey; Morrill, Robert J.; Hull, Heather, Wireless handset airplane safety interlock.
  437. Howarter, Jamie Christopher; Lesher, Charles Michael; Sweeney, Jeffrey; Morrill, Robert J.; Hull, Heather, Wireless handset vehicle safety interlock.
  438. Howarter, Jamie Christopher; Lesher, Charles Michael; Sweeney, Jeffrey; Morrill, Robert J.; Hull, Heather, Wireless handset vehicle safety interlock.
  439. He, Xiaojie; Racino, Gregory, Wireless mass storage flash memory.
  440. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  441. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  442. Gaskill, Robert; Gryzwa, Mark; LaLonde, John; Hoyme, Kenneth; Mass, William; Johnson, David C.; Barton, Mike, Wireless patient communicator employing security information management.
  443. Hansen, Thomas J., Wireless point of sale transaction.

이 특허를 인용한 특허 (29)

  1. Skaaksrud, Ole-Petter, Autonomous transport navigation to a shipping location using elements of a wireless node network.
  2. Skaaksrud, Ole-Petter; Hollahan, Terence; Benton, Steven, Context management of a wireless node network.
  3. Skaaksrud, Ole-Petter, Detecting a plurality of package types within a node-enabled logistics receptacle.
  4. Skaaksrud, Ole-Petter, Determining node location based on context data in a wireless node network.
  5. Skaaksrud, Ole-Petter; Hollahan, Terence; Benton, Steven, Determining node location using a lower level node association in a wireless node network.
  6. Skaaksrud, Ole-Petter; Hollahan, Terence; Benton, Steven, Determining node location using a master node association in a wireless node network.
  7. Skaaksrud, Ole-Petter, Determining node location using chaining triangulation in a wireless node network.
  8. Seed, Dale N.; Dong, Lijun; Lu, Guang; Starsinic, Michael F., End-to-end M2M service layer sessions.
  9. Skaaksrud, Ole-Petter, Hierarchical sensor network for a grouped set of packages being shipped using elements of a wireless node network.
  10. Skaaksrud, Ole-Petter, Methods and apparatus for adjusting a broadcast setting of a node in a wireless node network.
  11. Skaaksrud, Ole-Petter, Methods and apparatus for assessing a current location of a node-enabled logistics receptacle.
  12. Skaaksrud, Ole-Petter, Methods and apparatus for proactively reporting a content status of a node-enabled logistics receptacle.
  13. Skaaksrud, Ole-Petter, Methods and apparatus for pseudo master node mode operations within a hierarchical wireless network.
  14. Skaaksrud, Ole-Petter, Methods and systems for active shipment management using a container node within a wireless network enabled vehicle.
  15. Skaaksrud, Ole-Petter, Methods and systems for automating a logistics transaction using an autonomous vehicle and elements of a wireless node network.
  16. Skaaksrud, Ole-Petter, Methods and systems for motion-enhanced package placement tracking using a container node associated with a logistic container.
  17. Skaaksrud, Ole-Petter, Methods, apparatus, and systems for enhanced multi-radio container node elements used in a wireless node network.
  18. Skaaksrud, Ole-Petter, Node-enabled monitoring of a piece of equipment using a hierarchical node network.
  19. Skaaksrud, Ole-Petter, Proximity based adaptive adjustment of node power level in a wireless node network.
  20. Skaaksrud, Ole-Petter; Hollahan, Terence; Benton, Steven, Proximity node location using a wireless node network.
  21. Govari, Assaf; Ephrath, Yaron; Altmann, Andres Claudio, Remote control and interaction with implanted devices.
  22. Petersen, Steve; Mallela, Kesava, Secured vital sign data group streams.
  23. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  24. Singh, Harbhajan Mohan; Mani, Jayasekar; Ponnan, Sureshbabu; Vadivel, Padmanaban, Systems and methods of authenticating and controlling access over customer data.
  25. Skaaksrud, Ole-Petter; Hollahan, Terence, Systems, apparatus, and methods of checkpoint summary based monitoring for an event candidate related to an ID node within a wireless node network.
  26. Skaaksrud, Ole-Petter; Hollahan, Terence, Systems, apparatus, and methods of enhanced checkpoint summary based monitoring for an event candidate related to an ID node within a wireless node network.
  27. Skaaksrud, Ole-Petter; Hollahan, Terence, Systems, apparatus, and methods of enhanced monitoring for an event candidate associated with cycling power of an ID node within a wireless node network.
  28. Skaaksrud, Ole-Petter; Hollahan, Terence, Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events.
  29. Banerjee, Anirban, Techniques for facilitating secure, credential-free user access to resources.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로