Issued Patents All Time
Showing 51–75 of 85 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10798779 | Enhanced CoAP group communications with selective responses | Chonggang Wang, Rocco Di Girolamo, Shamim Akbar Rahman, Xu Li, Zhuo Chen +2 more | 2020-10-06 |
| 10708885 | Methods and nodes for enabling context-awareness in CoAP | Rocco Di Girolamo, Quang Ly, Xu Li, Chonggang Wang, Shamim Akbar Rahman +2 more | 2020-07-07 |
| 10637836 | Content security at service layer | Yogendra C. Shah, Dale N. Seed, Michael F. Starsinic, Shamim Akbar Rahman, Quang Ly +2 more | 2020-04-28 |
| 10601594 | End-to-end service layer authentication | Dale N. Seed, Catalina Mihaela Mladin, Chonggang Wang | 2020-03-24 |
| 10555151 | Method for supporting negotiation service at a service layer | Chonggang Wang, Lijun Dong, Dale N. Seed, William Robert Flynn, IV, Guang Lu +4 more | 2020-02-04 |
| 10129031 | End-to-end service layer authentication | Dale N. Seed, Catalina Mihaela Mladin, Chonggang Wang | 2018-11-13 |
| 10110595 | End-to-end authentication at the service layer using public keying mechanisms | Dale N. Seed, Yogendra C. Shah, Quang Ly, William Robert Flynn, IV, Michael F. Starsinic +3 more | 2018-10-23 |
| 10038692 | Characteristics of security associations | Yogendra C. Shah, Michael V. Meyerstein, Louis J. Guccione | 2018-07-31 |
| 9980213 | Methods, apparatus and systems for wireless network selection | Kenneth F. Lynch, Scott C. Hergenhan, Angelo Cuffaro, Alexander Reznik, Yousif Targali +1 more | 2018-05-22 |
| 9774581 | Identity management with local functionality | Andreas Leicher, Yogendra C. Shah | 2017-09-26 |
| 9743280 | Enhancements to enable fast security setup | Yogendra C. Shah, Dolores F. Howry, Alpaslan Demir, Amith V. Chincholi, Sanjay Goyal +1 more | 2017-08-22 |
| 9503438 | Characteristics of security associations | Yogendra C. Shah, Michael V. Meyerstein, Louis J. Guccione | 2016-11-22 |
| 9467429 | Identity management with generic bootstrapping architecture | Andreas Leicher | 2016-10-11 |
| 9241013 | Caller name authentication to prevent caller identity spoofing | Stanley Chow, Dmitri Vinokurov | 2016-01-19 |
| 9237448 | Enhancements to enable fast security setup | Yogendra C. Shah, Dolores F. Howry, Alpaslan Demir, Amith V. Chincholi, Sanjay Goyal +1 more | 2016-01-12 |
| 8856890 | System and method of network access security policy management by user and device | Dmitri Vinokurov | 2014-10-07 |
| 8856920 | System and method of securely processing lawfully intercepted network traffic | Faud Khan, Dmitri Vinokurov | 2014-10-07 |
| 8769682 | Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services | Pierrick Guingo, Faud Khan | 2014-07-01 |
| 8713597 | Authenticating and off-loading IPTV operations from mobile devices to fixed rendering viewing devices | Yong Sun | 2014-04-29 |
| 8650630 | System and method for exposing malicious sources using mobile IP messages | Bassem Abdel-Aziz | 2014-02-11 |
| 8542581 | System and method for exposing malicious clients in wireless access networks | Shu-Lin Chen, Bassem Abdel-Aziz | 2013-09-24 |
| 8280020 | Transparent caller name authentication for authorized third party callers | Dmitri Vinokurov, Stanley Chow | 2012-10-02 |
| 8191106 | System and method of network access security policy management for multimodal device | Dmitri Vinokurov | 2012-05-29 |
| 8180874 | Facilitating defense against MAC table overflow attacks | Yong Sun | 2012-05-15 |
| 8102838 | Mechanism for authentication of caller and callee using otoacoustic emissions | Bertrand Marquet | 2012-01-24 |