Issued Patents All Time
Showing 51–75 of 85 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8457597 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | Todd C. Morgan, Robin Jeffrey Thompson | 2013-06-04 |
| 8447968 | Air-interface application layer security for wireless networks | Ganapathy Subramanian Sundaram, Ajay Rajkumar | 2013-05-21 |
| 8428554 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | Todd C. Morgan, Robin Jeffrey Thompson | 2013-04-23 |
| 8379854 | Secure wireless communication | — | 2013-02-19 |
| 8265593 | Method and system of communication using extended sequence number | Zhibi Wang | 2012-09-11 |
| 8249553 | System and method for securing a base station using SIM cards | Peter Bosch, Alistair Urie | 2012-08-21 |
| 8249554 | Methods for provisioning mobile stations and wireless communications with mobile stations located within femtocells | Karl-Heinz Mack, Donna Michaels Sand, Hong Xie, Robin Jeffrey Thompson | 2012-08-21 |
| 8230035 | Method for authenticating mobile units attached to a femtocell that operates according to code division multiple access | Todd C. Morgan, Robin Jeffrey Thompson | 2012-07-24 |
| 8224921 | Method for authenticating mobile units attached to a femtocell that operates according to code division multiple access | Todd C. Morgan, Robin Jeffrey Thompson | 2012-07-17 |
| 8204216 | Processing method for message integrity with tolerance for non-sequential arrival of message data | — | 2012-06-19 |
| 8179860 | Systems and method for performing handovers, or key management while performing handovers in a wireless communication system | Alec Brusilovsky, Tania Godard | 2012-05-15 |
| 8122247 | Processing method for message integrity with tolerance for non-sequential arrival of message data | — | 2012-02-21 |
| 7957533 | Method of establishing authentication keys and secure wireless communication | — | 2011-06-07 |
| 7697413 | Method for generating a code mask for coding transmission over a traffic channel | — | 2010-04-13 |
| 7596381 | Generating a code mask based on geographical coordinate values | — | 2009-09-29 |
| 7593717 | Authenticating access to a wireless local area network based on security value(s) associated with a cellular system | Michael Marcovici, Semyon B. Mizikovsky, Uri Blumenthal | 2009-09-22 |
| 7577086 | Method of generating a public long code mask | Steven Meier, Lily Zhu | 2009-08-18 |
| 7565135 | Performing authentication in a communications system | — | 2009-07-21 |
| 7558957 | Providing fresh session keys | — | 2009-07-07 |
| 7221756 | Constructions of variable input length cryptographic primitives for high efficiency and high security | Zulfikar Ramzan, Ganapathy Subramanian Sundaram | 2007-05-22 |
| 7181196 | Performing authentication in a communications system | — | 2007-02-20 |
| 7174013 | Efficient universal hashing method | Zulfikar Ramzan | 2007-02-06 |
| 7047408 | Secure mutual network authentication and key exchange protocol | Victor Boyko, Eric Grosse, Philip Mackenzie | 2006-05-16 |
| 6918035 | Method for two-party authentication and key agreement | — | 2005-07-12 |
| 6857075 | Key conversion system and method | — | 2005-02-15 |