| 12063398 |
High throughput network encryption using CCAP |
Niem Dang, Tom Gonder, Peter J. Arnts, Kirk Erichsen, Brian H. Floyd |
2024-08-13 |
| 10462797 |
Methods and apparatus for using bandwidth subject to cellular interference |
Louis D. Williamson |
2019-10-29 |
| 10219016 |
Excluding specific application traffic from customer consumption data |
Tushar Nakhre, Shan Huang, Andrew Danforth, Howard Pfeffer |
2019-02-26 |
| 10091795 |
Methods and apparatus for using bandwidth subject to cellular interference |
Louis D. Williamson |
2018-10-02 |
| 9924213 |
Excluding specific application traffic from customer consumption data |
Tushar Nakhre, Shan Huang, Andrew Danforth, Howard Pfeffer |
2018-03-20 |
| 9888270 |
High throughput network encryptionusing CCAP |
Niem Dang, Tom Gonder, Peter J. Arnts, Kirk Erichsen, Brian H. Floyd |
2018-02-06 |
| 9838304 |
Signaling for service flows |
Shan Huang, Ronald da Silva, Tushar Nakhre |
2017-12-05 |
| 9503766 |
Excluding specific application traffic from customer consumption data |
Tushar Nakhre, Shan Huang, Andrew Danforth, Howard Pfeffer |
2016-11-22 |
| 9479452 |
Methods and apparatus for using bandwidth subject to cellular interference |
Louis D. Williamson |
2016-10-25 |
| 9172998 |
Excluding specific application traffic from customer consumption data |
Tushar Nakhre, Shan Huang, Andrew Danforth, Howard Pfeffer |
2015-10-27 |
| 9124928 |
Multicast video advertisement insertion using routing protocols |
Kevin A. Noll, Howard Pfeffer |
2015-09-01 |
| 8931073 |
Firewall access control with border gateway protocol attributes |
Shan Huang, Ron da Silva |
2015-01-06 |
| 8910198 |
Multicast video advertisement insertion using routing protocols |
Kevin A. Noll, Howard Pfeffer |
2014-12-09 |
| 8885667 |
Destination based methodology for managing network resources |
Ron da Silva, Shan Huang |
2014-11-11 |
| 8793714 |
Excluding specific application traffic from customer consumption data |
Tushar Nakhre, Shan Huang, Andrew Danforth, Howard Pfeffer |
2014-07-29 |
| 8276203 |
System and method for mitigating a denial of service attack in a subscriber network |
Tushar Nakhre, Shan Huang |
2012-09-25 |