Issued Patents All Time
Showing 76–100 of 118 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8832821 | Method and apparatuses for end-to-edge media protection in an IMS system | Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Karl Norrman | 2014-09-09 |
| 8819765 | Security policy distribution to communication terminals | Michael Liljenstam, Karl Norrman, Bengt Sahlin | 2014-08-26 |
| 8811987 | Method and arrangement for creation of association between user equipment and an access point | Göran Selander, Jari Vikberg, Karl Norrman, Rolf Blom | 2014-08-19 |
| 8797940 | Setup and configuration of relay nodes | András Rácz, Göran Selander, Luis Barriga, Magnus Lindström, Gunnar Mildh +1 more | 2014-08-05 |
| 8788705 | Methods and apparatus for secure routing of data packets | Karl Norrman, Jukka Ylitalo, Pekka Nikander | 2014-07-22 |
| 8776183 | Networks | Pubudu Chandrasiri, Bulent Ozgur Gurleyen, Annika Jonsson, Christian Gehrmann | 2014-07-08 |
| 8738910 | Method and arrangement for enabling play-out of media | Göran Selander, Yi Cheng, Mattias Eld, Frank Hartung, Michael Liljenstam | 2014-05-27 |
| 8665874 | Method and apparatus for forwarding data packets using aggregating router keys | Andras Czaszar, Lars Magnusson, Lars Westberg | 2014-03-04 |
| 8650397 | Key distribution to a set of routers | Wassim Haddad | 2014-02-11 |
| 8649378 | Method and apparatus for controlling the routing of data packets | Lars Westberg, András Császár | 2014-02-11 |
| 8646085 | Apparatus for reconfiguration of a technical system based on security analysis and a corresponding technical decision support system and computer program product | Karl Norrman, Jonathan Cederberg | 2014-02-04 |
| 8645680 | Sending media data via an intermediate node | Rolf Blom, Yi Cheng, John Mattsson, Karl Norrman | 2014-02-04 |
| 8630415 | Method and apparatus for authentication service application processes during service reallocation in high availability clusters | Makan Pourzandi, Frederic Rossi | 2014-01-14 |
| 8621570 | Access through non-3GPP access networks | Jari Arkko, Rolf Blom, Vesa Lehtovirta, Karl Norrman, Stefan Rommer +1 more | 2013-12-31 |
| 8576845 | Method and apparatus for avoiding unwanted data packets | András Császár, Lars Westberg, Lars Magnusson | 2013-11-05 |
| 8578506 | Digital rights management in user-controlled environment | Tereza Cristina Melo de Brito Carvalho, Diego Sanchez Gallo, Makan Pourzandi, Marcos Antonio Simplicio Junior, Yeda Regina Venturini | 2013-11-05 |
| 8555337 | Method and arrangement for user friendly device authentication | Rolf Blom, Per-Olof Nerbrant | 2013-10-08 |
| 8549615 | Method and apparatuses for end-to-edge media protection in an IMS system | Luis Barriga, Rolf Blom, Yi Cheng, Fredrik Lindholm, Karl Norrman | 2013-10-01 |
| 8539564 | IP multimedia security | Rolf Blom, Yi Cheng, Fredrik Lindholm, Karl Norrman | 2013-09-17 |
| 8515064 | Method and an apparatus for key management in a communication network | Tereza Cristina Carvalho, Vlad Constantin Coroama, Makan Pourzandi, Marcos A. Simplicio, Jr., Yeda Regina Venturini | 2013-08-20 |
| 8462947 | Managing user access in a communications network | Jari Arkko | 2013-06-11 |
| 8452957 | Method and nodes for providing secure access to cloud computing for mobile users | Makan Pourzandi | 2013-05-28 |
| 8340288 | Cryptographic key generation | Karl Norrman | 2012-12-25 |
| 8332912 | Method and apparatus for determining an authentication procedure | John Michael Walker | 2012-12-11 |
| 8295487 | Method and apparatus for establishing a cryptographic relationship in a mobile communications network | Wassim Haddad | 2012-10-23 |