| 9479985 |
Handing over a user device from one technology to another |
Patricia R. Chang, Arda Aksu, Jay J. Lee, Lalit R. Kotecha, Thomas H. Tan +4 more |
2016-10-25 |
| 9456290 |
Installation of a voice client for roaming devices in a wireless network |
Arda Aksu, Steven R. Rados, Lalit R. Kotecha, Patricia R. Chang, Sagiv Draznin +3 more |
2016-09-27 |
| 9455921 |
End to end network management based on quality of service adjustments |
Deepak Kakadia, Lalit R. Kotecha, Arda Aksu |
2016-09-27 |
| 9372963 |
User device selection |
Mingxing S. Li, Jeffrey Evans |
2016-06-21 |
| 9370037 |
Intelligent policy and charging rule function (PCRF) restoration |
Niranjan B. Avula, Imtiyaz Shaikh, Ho Yin Cheuk, Robert M. Ephraim |
2016-06-14 |
| 9338148 |
Secure distributed information and password management |
Donna L. Polehn, Lalit R. Kotecha, Patricia R. Chang, Deepak Kakadia, John F. Macias +1 more |
2016-05-10 |
| 9338305 |
Calling back a device that made a call |
Mingxing S. Li, Ce Xu, Xuming Chen |
2016-05-10 |
| 9325856 |
Voice quality data piggybacking on SIP signaling messages |
Loc Ba Vo |
2016-04-26 |
| 9301280 |
Optimizing paging based on services |
Niranjan B. Avula, Imtiyaz Shaikh, Maria G. Lam |
2016-03-29 |
| 9271116 |
Location-based telephone calls over a wireless local area network (WLAN) |
Mingxing S. Li, Ce Xu, Xuming Chen |
2016-02-23 |
| 9270453 |
Local security key generation |
William C. King, Kwai Yeung Lee |
2016-02-23 |
| 9247418 |
Communication-session termination when subscriber server is unavailable |
— |
2016-01-26 |
| 9237463 |
Performance pattern correlation |
Donna L. Polehn, Lalit R. Kotecha, Patricia R. Chang, Deepak Kakadia, John F. Macias +2 more |
2016-01-12 |