| 11645396 |
Cybersecurity vulnerability management based on application rank and network location |
Bryan S. Inagaki, Martin Dawson, Andrew J. Graham, Ramiro Rodney Murgueytio, David Robinson +1 more |
2023-05-09 |
| 11120139 |
Cybersecurity vulnerability management based on application rank and network location |
Bryan S. Inagaki, Martin Dawson, Andrew J. Graham, Ramiro Rodney Murgueytio, David Robinson +1 more |
2021-09-14 |
| 10372915 |
Cybersecurity vulnerability management systems and method |
Bryan S. Inagaki, Martin Dawson, Andrew J. Graham, Ramiro Rodney Murgueytio, David Robinson +1 more |
2019-08-06 |
| 8682324 |
Cell reselection method and apparatus |
Jon Van Orden |
2014-03-25 |
| 8649782 |
Method and apparatus for redirecting mobile communications |
— |
2014-02-11 |
| 8594693 |
Method for controlling access to a mobile communications network |
— |
2013-11-26 |
| 8538415 |
Trigger of inter-frequency measurments within mobile radio communications device |
Michael Roberts |
2013-09-17 |
| 8208426 |
Mobile telecommunications and random access preamble content |
Iskren Ianev, Stuart Findlay |
2012-06-26 |