Issued Patents All Time
Showing 26–50 of 68 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10021637 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2018-07-10 |
| 10004015 | Communications system | — | 2018-06-19 |
| 9894567 | Handover handling | — | 2018-02-13 |
| 9888464 | Communications system | Robert Arnott | 2018-02-06 |
| 9854476 | Facilitating method for handover of a mobile communication device | — | 2017-12-26 |
| 9843976 | Communication system | — | 2017-12-12 |
| 9788243 | Resource allocation in target cell after handover | — | 2017-10-10 |
| 9750045 | Downlink multiplexing | Yassin Aden AWAD | 2017-08-29 |
| 9713052 | Communications system | — | 2017-07-18 |
| 9706389 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2017-07-11 |
| 9661498 | System and method for selection of security algorithms | Robert Arnott, Francesca Serravalle | 2017-05-23 |
| 9642046 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2017-05-02 |
| 9635593 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2017-04-25 |
| 9504013 | Communication system | Kenji Kawaguchi, Neeraj Gupta, Hideki Kozuka | 2016-11-22 |
| 9479975 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2016-10-25 |
| 9363722 | Facilitating method for handover of a mobile communication device | — | 2016-06-07 |
| 9363719 | Communications system | — | 2016-06-07 |
| 9351296 | Downlink multiplexing | Yassin Aden AWAD | 2016-05-24 |
| 9326123 | Communication system | Suresh Ganapathy, Neeraj Gupta, Kenji Kawaguchi | 2016-04-26 |
| 9282493 | Resource allocation in target cell after handover | — | 2016-03-08 |
| 9020503 | Connection establishment system and method | Neeraj Gupta, Francesca Serravalle | 2015-04-28 |
| 9002365 | Communications system | Francesca Serravalle | 2015-04-07 |
| 9001781 | Handover handling | — | 2015-04-07 |
| 8995387 | Downlink multiplexing | Yassin Aden AWAD | 2015-03-31 |
| 8949927 | System and method for selection of security algorithms | Robert Arnott, Francesca Serravalle | 2015-02-03 |