| 9241013 |
Caller name authentication to prevent caller identity spoofing |
Stanley Chow, Vinod Kumar Choyi |
2016-01-19 |
| 9032432 |
Managing undesirable content in IP video broadcast traffic |
Rob MacIntosh |
2015-05-12 |
| 8856890 |
System and method of network access security policy management by user and device |
Vinod Kumar Choyi |
2014-10-07 |
| 8856920 |
System and method of securely processing lawfully intercepted network traffic |
Faud Khan, Vinod Kumar Choyi |
2014-10-07 |
| 8438582 |
Soft denial of application actions over the network communications |
Faud Khan |
2013-05-07 |
| 8280020 |
Transparent caller name authentication for authorized third party callers |
Stanley Chow, Vinod Kumar Choyi |
2012-10-02 |
| 8191106 |
System and method of network access security policy management for multimodal device |
Vinod Kumar Choyi |
2012-05-29 |
| 7965707 |
Adaptable communication profiles in telephone networks |
Emanuele Jones, Robert W. MacIntosh |
2011-06-21 |
| 7647623 |
Application layer ingress filtering |
Jean-Marc Robert |
2010-01-12 |
| 7526803 |
Detection of denial of service attacks against SIP (session initiation protocol) elements |
Scott D'Souza |
2009-04-28 |
| 7307997 |
Detection and mitigation of unwanted bulk calls (spam) in VoIP networks |
Robert W. MacIntosh |
2007-12-11 |