Issued Patents All Time
Showing 1–25 of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11588860 | Flexible selection of security features in mobile networks | — | 2023-02-21 |
| 11212321 | Group communication service enabler security | Anja Jerichow, Thomas Belling | 2021-12-28 |
| 11202192 | Registering user equipment with a visited public land mobile network | Anja Jerichow | 2021-12-14 |
| 10893075 | Flexible selection of security features in mobile networks | — | 2021-01-12 |
| 10512005 | Security in intersystem mobility | Nagendra S. Bykampadi, Suresh P. Nair | 2019-12-17 |
| 10411884 | Secure bootstrapping architecture method based on password-based digest authentication | Marc Blommaert | 2019-09-10 |
| 10362040 | Multi-security levels/traffic management across multiple network function instantiations | John M. Harris, Umamaheswar Kakinada | 2019-07-23 |
| 10218514 | Remote verification of attributes in a communication network | Wolf-Dietrich Moeller | 2019-02-26 |
| 9817720 | Methods, apparatuses and computer program products enabling to improve handover security in mobile communication networks | Hinrich Eilts | 2017-11-14 |
| 9794259 | Security for access to the IP multimedia subsystem (IMS) with web real time communication (WebRTC) | Alexander Milinski | 2017-10-17 |
| 9526003 | Secure bootstrapping architecture method based on password-based digest authentication | Marc Blommaert | 2016-12-20 |
| 9392447 | Security handling for multi frequency band | Woonhee Hwang, Eric J. Drury | 2016-07-12 |
| 9344411 | Key handling in communication systems | Dan Forsberg, Ulrike Meyer | 2016-05-17 |
| 9215220 | Remote verification of attributes in a communication network | Wolf-Dietrich Moeller | 2015-12-15 |
| 9154510 | Methods, apparatuses, and related computer program product for network security | Peter Schneider | 2015-10-06 |
| 8990925 | Security for a non-3GPP access to an evolved packet system | — | 2015-03-24 |
| 8924722 | Apparatus, method, system and program for secure communication | Peter Schneider | 2014-12-30 |
| 8607309 | Trustworthiness decision making for access authentication | Robert Ropolyi | 2013-12-10 |
| 8565429 | Method and system for veryfying the authenticity of a first communication participants in a communications network | Jorge Cuellar | 2013-10-22 |
| 7627122 | Method for authentication of a radio communications network with a mobile station, and radio communications network and a mobile station | Bart Vinck | 2009-12-01 |
| RE40791 | Method and system for verifying the authenticity of a first communication participants in a communications network | Jorge Cuellar | 2009-06-23 |
| 7526273 | Method and apparatus to counter the rogue shell threat by means of local key derivation | — | 2009-04-28 |
| 7139550 | Method and system for verifying the authenticity of a first communication participants in a communications network | Jorge Cuellar | 2006-11-21 |
| 6980796 | Method and system for verifying the authenticity of a first communication participants in a communications network | Jorge Cuellar | 2005-12-27 |
| 6952475 | Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit | Volker Kessler, Klaus Mueller | 2005-10-04 |