Issued Patents All Time
Showing 26–50 of 73 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9143937 | Wireless communication using concurrent re-authentication and connection setup | George Cherian, Jouni Kalevi Malinen, Santosh Paul Abraham, Anand Palanigounder, Maarten Menzo Wentink | 2015-09-22 |
| 9119065 | Authentication in secure user plane location (SUPL) systems | Andreas Klaus Wachter, Adrian Edward Escott, Stephen William Edge | 2015-08-25 |
| 9100388 | Secure mechanism for obtaining authorization for a discovered location server | Andreas Klaus Wachter, Kirk Allan Burroughs, Stephen William Edge | 2015-08-04 |
| 9076339 | Facilitating vehicle merging utilizing road markers | Gregory G. Rose | 2015-07-07 |
| 9055040 | Method and apparatus for content protection in wireless communications | Jun Wang, Charles Nung Lo, Lakshminath Reddy Dondeti | 2015-06-09 |
| 8983065 | Method and apparatus for security in a data processing system | Nikolai Konrad Leung, Gregory G. Rose | 2015-03-17 |
| 8949600 | Composed message authentication code | Michael Paddon, Adrian Edward Escott, Gregory G. Rose | 2015-02-03 |
| 8886157 | Mobile device having an emergency mode | Miriam Wiggers De Vries, Craig M. Brown, Alexander Gantman, Jessica M. Purser, Cameron A. McDonald +2 more | 2014-11-11 |
| 8861737 | Trust establishment from forward link only to non-forward link only devices | Panagiotis Thomas, Can Acar, Bijan Ansari | 2014-10-14 |
| 8837741 | Systems and methods for encoding exchanges with a set of shared ephemeral key data | George Cherian | 2014-09-16 |
| 8831568 | Automatic configuration of a wireless device | George Cherian, Mahesh Iyer, Santosh Paul Abraham | 2014-09-09 |
| 8799664 | Small public-key based digital signatures for authentication | Alexander Gantman, Gregory G. Rose, John Noerenberg | 2014-08-05 |
| 8793497 | Puzzle-based authentication between a token and verifiers | Gregory G. Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon | 2014-07-29 |
| 8750285 | Efficient classification of network packets | Michael Paddon, Gregory G. Rose | 2014-06-10 |
| 8738027 | Methods and apparatus for identifying and authorizing location servers and location services | Stephen William Edge, Andreas Klaus Wachter | 2014-05-27 |
| 8726019 | Context limited shared secret | Michael Paddon, Gregory G. Rose, James Semple | 2014-05-13 |
| 8704676 | Dynamic road markers to provide visual feedback as to vehicle speed | Craig M. Brown | 2014-04-22 |
| 8675017 | Real world gaming framework | Gregory G. Rose, Miriam Wiggers De Vries, Michael Paddon | 2014-03-18 |
| 8625793 | Resynchronization for push message security using secret keys | Andreas Klaus Wachter, Michael Paddon | 2014-01-07 |
| 8627422 | Authentication in secure user plane location (SUPL) systems | Andreas Klaus Wachter, Adrian Edward Escott, Stephen William Edge | 2014-01-07 |
| 8611536 | Bootstrapping authentication using distinguished random challenges | James Semple, Gregory G. Rose, Michael Paddon | 2013-12-17 |
| 8595501 | Network helper for authentication between a token and verifiers | Gregory G. Rose, Alexander Gantman, Miriam Wiggers De Vries, Michael Paddon | 2013-11-26 |
| 8577809 | Method and apparatus for determining and utilizing value of digital assets | Alexander Gantman, Cameron A. McDonald, Miriam Wiggers De Vries, Craig W. Northway, Craig M. Brown | 2013-11-05 |
| 8505081 | Method and apparatus for identity reuse for communications devices | Anand Palanigounder | 2013-08-06 |
| 8437473 | Small public-key based digital signatures for authentication | Alexander Gantman, Gregory G. Rose, John Noerenberg | 2013-05-07 |