СПИСОК патентов США - подгруппа МПК16 H04W12/02
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9609577 | Mobile device security | |||
2 | 9609571 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
3 | 9609509 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon | |||
4 | 9609498 | Security control method and device in a mobile communication system supporting emergency calls, and a system therefor | |||
5 | 9609467 | System and method for pairing a plurality of wireless devices | |||
6 | 9609459 | Network tools for analysis, design, testing, and production of services | |||
7 | 9609380 | Method and system for detecting and presenting a new event in a video feed | |||
8 | 9609113 | Terminal, information leak prevention method, and computer-readable recording medium | |||
9 | 9608815 | Systems, methods, and apparatuses for ciphering error detection and recovery | |||
10 | 9608803 | Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption | |||
11 | 9607157 | Method and device for providing a private page | |||
12 | 9603019 | Secure and anonymized authentication | |||
13 | 9603011 | Selective regulation of information transmission from mobile applications to third-party privacy compliant target systems | |||
14 | 9603010 | Automatic security action invocation for mobile communications device | |||
15 | 9602277 | User interface systems and methods for secure message oriented communications | |||
16 | 9600726 | Receiving link approval from remote server to provision remote electronic device associated with user account | |||
17 | 9596618 | Method of anonymously reporting minimization of drive test measurements | |||
18 | 9596598 | Reducing detectability of an encryption key | |||
19 | 9596592 | Controller and method of controlling multiple identities of a mobile device | |||
20 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
21 | 9591031 | Lawful interception for local selected IP traffic offload and local IP access performed at a non-core gateway | |||
22 | 9590955 | Methods and systems for providing information relating to an event | |||
23 | 9589480 | Health monitoring systems and methods | |||
24 | 9585061 | Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications | |||
25 | 9585014 | Fast recovery from ciphering key mismatch | |||
26 | 9585011 | Anonymizing location information of a mobile device | |||
27 | 9585010 | Vehicle, controlling method thereof and multimedia apparatus included therein | |||
28 | 9585009 | Enhancing privacy in cellular paging system using physical layer identification | |||
29 | 9584492 | Cryptographic proxy service | |||
30 | 9584491 | Intelligent security analysis and enforcement for data transfer | |||
31 | 9584464 | Systems and methods for establishing communications between mobile device users | |||
32 | 9584451 | System, method and apparatus for optimizing wireless communications of secure e-mail messages with attachments | |||
33 | 9582681 | Method and apparatus for privacy protection in images | |||
34 | 9578617 | Anonymous device position measuring system and method | |||
35 | 9578563 | Method and apparatus for effectively controlling cell reselection priority of user equipment in CSG cell | |||
36 | 9578556 | Long term evolution (LTE) communications over trusted hardware | |||
37 | 9578543 | Reduced overhead for wireless communication | |||
38 | 9572158 | Residential local break out in a communication system | |||
39 | 9572026 | Location services for a wireless device | |||
40 | 9572025 | Method, server, computer program and computer program product for communicating with secure element | |||
41 | 9572023 | Method and system for providing services to mobile communication subscribers | |||
42 | 9571965 | Verified check-in | |||
43 | 9571958 | Anonymous location service for wireless networks | |||
44 | 9569632 | Information processing apparatus having wireless communication function and method of controlling the apparatus | |||
45 | 9565706 | Method and wireless terminal device for rapidly establishing dual-stack wireless connection | |||
46 | 9565559 | Method and system for preserving privacy during data aggregation in a wireless sensor network | |||
47 | 9565557 | Intelligently transferring privacy settings between devices based on proximity | |||
48 | 9565556 | User managed number privacy and call accessibility | |||
49 | 9565522 | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |||
50 | 9565176 | Multiscreen secure content access | |||
51 | 9564983 | Enablement of a private phone conversation | |||
52 | 9560521 | Service in WLAN inter-working, address management system, and method | |||
53 | 9560474 | Device for transfering data between an unconscious capture device and another device | |||
54 | 9560196 | Computer-implemented system and method for determining call connection status | |||
55 | 9560162 | Quality of service support for machine-to-machine applications including e-health | |||
56 | 9560138 | Methods and systems for secure communication between wireless electronic devices and vehicles | |||
57 | 9560111 | System and method to transport HTTP over XMPP | |||
58 | 9559761 | Proximity-based services discovery privacy | |||
59 | 9554417 | Optimized header for efficient processing of data packets | |||
60 | 9554269 | Privacy centric feature analysis for mobile devices | |||
61 | 9554249 | Systems and methods for enhancing privacy in connection with location-based services | |||
62 | 9553897 | Method and computer device for monitoring wireless network | |||
63 | 9553893 | Enhanced message security | |||
64 | 9553643 | User equipment and methods for codebook subsampling for enhanced 4TX codebooks | |||
65 | 9552062 | Gaze-based security | |||
66 | 9549364 | Method and apparatus for providing optimized privacy in cognitive radio information sharing | |||
67 | 9549347 | Method, system and computer program product for inter-working between different wireless technologies | |||
68 | 9549346 | Inter-eNode B handover procedure | |||
69 | 9549313 | Method and apparatus for profile download of group devices | |||
70 | 9548969 | Encryption/decryption method, system and device | |||
71 | 9546871 | Performance monitoring systems and methods | |||
72 | 9544930 | Communication interception method, base station, and terminal | |||
73 | 9544765 | Anonymous customer reference services enabler | |||
74 | 9544764 | Controlling unregulated aggregation of mobile app usage | |||
75 | 9544763 | Disclosing and controlling collection of information from electronic devices | |||
76 | 9544636 | Method and system for editing event categories | |||
77 | 9544277 | KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages | |||
78 | 9544222 | Router | |||
79 | 9544075 | Platform for wireless identity transmitter and system using short range wireless broadcast | |||
80 | 9543712 | Intrinsically safe wireless dongle for a field device | |||
81 | 9542572 | Method of managing map information, navigation system, information terminal, and navigation device | |||
82 | 9538462 | Method for minimization of drive tests, method for collecting terminal information, terminal, and network element | |||
83 | 9538372 | Establishing communication between devices | |||
84 | 9538371 | Method of handling data transmission and reception in device to device communication in wireless communication systems | |||
85 | 9538370 | Data transmission method for terminal performing near field communication and terminal thereof | |||
86 | 9538320 | System and method for managing location services in wireless networks | |||
87 | 9537806 | System for delegating the prioritization of incoming communications to trusted users | |||
88 | 9537804 | System for delegating the prioritization of incoming communications to trusted users | |||
2016 | |||||
89 | 9532293 | Localized forwarding | |||
90 | 9532258 | Method of anonymously reporting minimization of drive test measurements | |||
91 | 9532214 | Apparatus and method for generating key hierarchy in wireless network | |||
92 | 9532213 | Lawful interception for device-to-device (D2D) communication | |||
93 | 9532212 | Method and apparatus for processing data and message | |||
94 | 9532161 | Wireless device with application data flow tagging and network stack-implemented network access policy | |||
95 | 9531593 | Takeover processes in security network integrated with premise security system | |||
96 | 9525689 | Detection of an unauthorized wireless communication device | |||
97 | 9525548 | Provisioning techniques | |||
98 | 9524154 | Method and system for identifying and replacing system calls | |||
99 | 9521705 | Mobile telephone gateway apparatus, communication system, and gateway operating system | |||
100 | 9521574 | Method of anonymously reporting minimization of drive test measurements | |||
101 | 9521573 | Method of anonymously reporting minimization of drive test measurements | |||
102 | 9521546 | Secure RF communication method, terminal and system | |||
103 | 9521145 | Methods and apparatuses to provide secure communication between an untrusted wireless access network and a trusted controlled network | |||
104 | 9521123 | Method for file encryption | |||
105 | 9521122 | Intelligent security analysis and enforcement for data transfer | |||
106 | 9520996 | Ciphering data for transmission in a network | |||
107 | 9516537 | Method of anonymously reporting minimization of drive test measurements | |||
108 | 9516500 | ID-based control unit-key fob pairing | |||
109 | 9516498 | Method and apparatus for initializing an RFID tag via an optical display | |||
110 | 9516497 | Systems and methods for detecting call provenance from call audio | |||
111 | 9516449 | System and method for controlling advanced triggering operations in a telecommunication network | |||
112 | 9516006 | Re-programmable secure cryptographic device | |||
113 | 9515986 | Methods providing public reachability and related systems and devices | |||
114 | 9515829 | Information distribution method, information distribution system and in-vehicle terminal | |||
115 | 9514321 | Electro device for protecting user's privacy and method for controlling thereof | |||
116 | 9510195 | Secured transactions in internet of things embedded systems networks | |||
117 | 9510191 | Authorization of network address tracking | |||
118 | 9510190 | Wireless access point security for multi-hop networks | |||
119 | 9509834 | Mobile device and method for controlling the same | |||
120 | 9509606 | Distributed virtual private network | |||
121 | 9509394 | Advance mobile communications gateway with satcom backhaul access and a modularized data security system and method for data and secure key distribution to aircraft | |||
122 | 9507958 | Information disclosure system, information disclosure server, communication terminal, information disclosing method, and non-transitory computer-readable medium | |||
123 | 9503900 | Method and system of protecting files | |||
124 | 9503890 | Method and apparatus for delivering keying information | |||
125 | 9503884 | System, method and apparatus for pairing SIM or UICC cards with authorized wireless devices | |||
126 | 9503876 | Personal security system | |||
127 | 9503844 | System and method for collocation detection | |||
128 | 9503529 | System and method to transport HTTP over XMPP | |||
129 | 9501771 | Method and system for exchanging information updates between mobile devices | |||
130 | 9501652 | Validating sensitive data from an application processor to modem processor | |||
131 | 9497169 | Method and system for selective protection of data exchanged between user equipment and network | |||
132 | 9491625 | Access point apparatus for configuring multiple security tunnel, and system having the same and method thereof | |||
133 | 9491616 | Device location history anonymization based on stop detection | |||
134 | 9490977 | Method and apparatus for enabling physical layer secret key generation | |||
135 | 9489863 | Performance monitoring systems and methods | |||
136 | 9485792 | Systems and methods for facilitating intra-cell-peer-to-peer communication | |||
137 | 9485651 | OAM apparatus for radio base station | |||
138 | 9485624 | Transmission of location and directional information associated with mobile communication devices | |||
139 | 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
140 | 9485005 | Mobile station and radio base station | |||
141 | 9483651 | Methods and apparatus for transfer of content to a self contained wireless media device | |||
142 | 9483649 | Image processing device, image processing system, image processing method, and program | |||
143 | 9483646 | Data exfiltration prevention from mobile platforms | |||
144 | 9479929 | Selective regulation of information transmission from mobile applications to third-party privacy compliant target systems | |||
145 | 9479928 | Cross-component message encryption | |||
146 | 9479914 | Intuitive computing methods and systems | |||
147 | 9479502 | Rule sets for client-applied encryption in communications networks | |||
148 | 9479375 | Joint physical layer security and PAPR mitigation in OFDM systems | |||
149 | 9479333 | Method of managing sensitive data in mobile terminal and escrow server for performing same | |||
150 | 9478149 | Performance monitoring systems and methods | |||
151 | 9478148 | Performance monitoring systems and methods | |||
152 | 9476965 | Differentiated station location | |||
153 | 9474018 | Smart radio area network for wireless distributed cloud computing | |||
154 | 9473534 | System and method for switching between messaging security policies | |||
155 | 9473454 | Security gateway communication | |||
156 | 9473351 | System and method for automated provisioning of a wireless device | |||
157 | 9473298 | Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration | |||
158 | 9473295 | Virtual transportation point of sale | |||
159 | 9467861 | Device for protecting against non-authorized use of an electronic system including an antenna | |||
160 | 9467848 | Mobile terminal | |||
161 | 9467838 | Method to provide ad hoc and password protected digital and voice networks | |||
162 | 9467807 | Estimating demographics associated with a selected geographic area | |||
163 | 9467804 | Emission control for wireless location management | |||
164 | 9467428 | Information security attachment device for voice communication and information security method for voice communication using the same | |||
165 | 9467283 | Securing method for lawful interception | |||
166 | 9465953 | Secure virtual file management system | |||
167 | 9462476 | Identifying unsubscribed tethering in a wireless network | |||
168 | 9462462 | Providing location-based information to a user of a mobile communication device | |||
169 | 9462461 | Correlating mobile device locations | |||
170 | 9462070 | Protecting privacy in group communications | |||
171 | 9461970 | Method and apparatus for providing privacy adaptation based on receiver context | |||
172 | 9456374 | Method of anonymously reporting minimization of drive test measurements | |||
173 | 9456051 | Device, system and method for recording personal encounter history | |||
174 | 9451494 | Method of anonymously reporting minimization of drive test measurements | |||
175 | 9451465 | Electronically binding to a lost mobile device | |||
176 | 9451457 | Method to enhance high availability in a secure telecommunications network, and telecommunications network comprising a plurality of remote nodes | |||
177 | 9451406 | Beacon methods and arrangements | |||
178 | 9450991 | Method of controlling sharing of participant identity in a group communication session | |||
179 | 9450984 | Automatic approach for the personalized privacy recommendation related to the location | |||
180 | 9450919 | Algorithm-based anonymous customer references | |||
181 | 9450424 | Power providing equipment, mobile device, operating method of mobile device | |||
182 | 9445297 | Method of anonymously reporting minimization of drive test measurements | |||
183 | 9445272 | Authentication in heterogeneous IP networks | |||
184 | 9445265 | Method and device for processing SRVCC switching, and terminal | |||
185 | 9445263 | Method for ensuring security and privacy in a wireless cognitive network | |||
186 | 9445262 | Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal | |||
187 | 9445261 | Method and apparatus for reporting measurement result | |||
188 | 9445251 | Method to provide ad hoc and password protected digital and voice networks | |||
189 | 9445220 | Systems and methods for enabling additional devices to check in to bluetooth low energy (BLE) beacons | |||
190 | 9444851 | Intercepting device-to-device communication | |||
191 | 9439066 | Methods, computer program products and apparatuses enabling to conceal lawful interception from network operators | |||
192 | 9439033 | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |||
193 | 9438602 | Evolving rule based contact exchange | |||
194 | 9438600 | Apparatus and methods for distributing and storing electronic access clients | |||
195 | 9438594 | Method and apparatus for establishing tunnel data security channel | |||
196 | 9438422 | Chaotic-based synchronization for secure network communications | |||
197 | 9432844 | Traffic encryption key management for machine to machine multicast group | |||
198 | 9432843 | Techniques for location information control using user profiles | |||
199 | 9432798 | NFC communication with an information handling system supplemented by a management controller | |||
200 | 9432344 | Secure storage and sharing of user objects | |||
201 | 9426647 | Method and device for protecting privacy data of mobile terminal user | |||
202 | 9426127 | Small form-factor cryptographic expansion device | |||
203 | 9425962 | Low energy Bluetooth system with authentication during connectionless advertising and broadcasting | |||
204 | 9420468 | Method and apparatus to implement security in a long term evolution wireless device | |||
205 | 9420458 | Method for the use of a mobile appliance using a motor vehicle | |||
206 | 9420455 | Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol | |||
207 | 9420454 | Method for ensuring security and privacy in a wireless cognitive network | |||
208 | 9420453 | Correlating and mapping mobile device locations on a mobile device | |||
209 | 9420331 | Method and system for categorizing detected motion events | |||
210 | 9420000 | NAT traversal for local IP access | |||
211 | 9419983 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
212 | 9419792 | Instruction for accelerating SNOW 3G wireless security algorithm | |||
213 | 9414224 | Antenna port identification | |||
214 | 9414223 | Security solution for integrating a WiFi radio interface in LTE access network | |||
215 | 9414194 | Privacy control of location information | |||
216 | 9414182 | Mobile station, base station, communication system, display control method, communication control method, and program | |||
217 | 9413784 | World-driven access control | |||
218 | 9413582 | Method and apparatus for transmitting and receiving | |||
219 | 9410814 | Passive crowd-sourced map updates and alternate route recommendations | |||
220 | 9408080 | Non-access stratum architecture and protocol enhancements for long term evolution mobile units | |||
221 | 9408078 | IP mobility security control | |||
222 | 9408055 | Method to provide ad hoc and password protected digital and voice networks | |||
223 | 9407672 | Systems and methods for reducing signalling in an internet protocol telephony system | |||
224 | 9407641 | Service access control | |||
225 | 9407634 | Cryptographic protocol for portable devices | |||
226 | 9402272 | Electronic device having a cellular communication mode and a radio communication mode | |||
227 | 9401850 | Cognitive radio system and cognitive radio carrier device | |||
228 | 9401098 | Performance monitoring systems and methods | |||
229 | 9400878 | Context analysis at an information handling system to manage authentication cycles | |||
230 | 9400714 | Wirelessly communicating a data file | |||
231 | 9400668 | Computer program product containing instructions for providing a processor the capability of executing an application derived from a compiled form | |||
232 | 9398450 | Mobile survey tools with added security | |||
233 | 9398449 | Secure location session manager | |||
234 | 9398448 | Enhanced wireless communication security | |||
235 | 9398426 | Method and apparatus for transmitting secure cell broadcast messages in a cellular communication network | |||
236 | 9398397 | Secure manipulation of embedded modem connection settings through short messaging service communication | |||
237 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
238 | 9392510 | Handover method and apparatus in wireless communication system | |||
239 | 9392459 | Access network assisted bootstrapping | |||
240 | 9392444 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon | |||
241 | 9392443 | Shared secret for wireless devices | |||
242 | 9392442 | Secured application communications | |||
243 | 9392433 | Method of device discovery in wireless communication systems | |||
244 | 9392401 | Portable computing device with data encryption and destruction | |||
245 | 9391997 | Message processing apparatus, wireless device and method of storing a message in a wireless device | |||
246 | 9390293 | Device, method, and system for secure mobile data storage | |||
247 | 9390279 | Systems and methods for providing conditional access to transmitted information | |||
248 | 9386627 | Customized call setup procedure based on predicted call quality | |||
249 | 9386507 | Mobile device security | |||
250 | 9386454 | Mechanism usable for validating a communication device for allowing usage of television radio bands/channels | |||
251 | 9386135 | Ergonomic tubular anechoic chambers for use with a communication device and related methods | |||
252 | 9385865 | Correcting deciphering mis-synchronization in a mobile communication terminal | |||
253 | 9384356 | Obscuring internet tendencies | |||
254 | 9383983 | Method and system to impose enterprise security mechanisms throughout a mobile application lifecycle | |||
255 | 9380461 | Apparatus for discreet communication for a mobile communication device | |||
256 | 9380458 | Method for detecting eavesdroppers in a wireless communication system | |||
257 | 9380457 | Method and system of secured direct link set-up (DLS) for wireless networks | |||
258 | 9380416 | Portable computing device with data encryption and destruction | |||
259 | 9380415 | Portable computing device with data encryption and destruction | |||
260 | 9380149 | Portable terminal device, information presentation method, and program | |||
261 | 9374708 | Method and system for encrypting terminal using subscriber identity module card | |||
262 | 9374706 | Wireless sensor network and central node device thereof | |||
263 | 9374428 | Distance-dependent or user-dependent data exchange between wireless communication devices | |||
264 | 9374280 | Device-to-device based content delivery for time-constrained communications | |||
265 | 9369865 | Method, apparatus, and computer readable medium for providing wireless device protection service | |||
266 | 9369836 | Portable computing device with data encryption and destruction | |||
267 | 9369834 | Portable computing device with data encryption and destruction | |||
268 | 9369292 | Information transmission method, packet data gateway, and policy and charging rules function | |||
269 | 9369283 | Method for entering password and portable electronic device and unlocking method and data authenticating method | |||
270 | 9363670 | Systems and methods for restricting access to network resources via in-location access point protocol | |||
271 | 9363667 | System and method for user-privacy-aware communication monitoring and analysis | |||
272 | 9363381 | Method and system for transferring a call between devices of a single user | |||
273 | 9357581 | Providing information to a core network relating to a cache in an access network | |||
274 | 9357394 | System and method for selecting means for intercepting network transmissions | |||
275 | 9357389 | Security identity discovery and communication method | |||
276 | 9357387 | Methods and devices for handling encrypted communication | |||
277 | 9357382 | Computer-implemented system and method for validating call connections | |||
278 | 9357381 | Security management in M2M area network | |||
279 | 9357358 | Role based system for command, control and communication between team members | |||
280 | 9357350 | System for creating anonymous social gatherings | |||
281 | 9357059 | System and method for anonymizing a telephone number | |||
282 | 9357051 | Telephone messaging privacy | |||
283 | 9355573 | Performance monitoring, apparatuses, systems, and methods | |||
284 | 9354782 | Social exposure management system and method | |||
285 | 9351272 | Protecting location information | |||
286 | 9351157 | Methods, systems, and devices to reduce audio truncation during transcoding | |||
287 | 9351156 | Physical layer encryption for MIMO communication networks | |||
288 | 9351116 | System and method for providing proximity information | |||
289 | 9350809 | Method and apparatus for automatically determining communities of interest, for use over an ad-hoc mesh network, based on context information | |||
290 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
291 | 9344895 | Method and system for securely accessing portable hotspot for intelligent mobile phones | |||
292 | 9344882 | Apparatus and methods for preventing information disclosure | |||
293 | 9344881 | Identifiers in a communication system | |||
294 | 9344867 | Methods, systems, and products for processing communications | |||
295 | 9344839 | System and method for pushing information from a host system to a mobile communication device | |||
296 | 9342977 | Method and apparatus for mobile device security | |||
297 | 9342331 | Secure virtualized mobile cellular device | |||
298 | 9338824 | Mediation of information carried via a common public radio interface | |||
299 | 9338646 | Method for transmitting and receiving fake communication data and terminal performing the same | |||
300 | 9338645 | Method and system for message service in multi-device environment and apparatus therefor | |||
301 | 9338584 | Electronic data sharing device and method of use | |||
302 | 9338138 | Method for hiding source of wireless sensor network and node | |||
303 | 9338130 | Apparatus and method to register Wi-Fi clients on a Wi-Fi network | |||
304 | 9332422 | Method of file transmission based upon distributed storage in wireless communication system | |||
305 | 9331996 | Systems and methods for identifying devices by a trusted service manager | |||
306 | 9331995 | Secure configuration of mobile application | |||
307 | 9331986 | Encryption communication method, apparatus and system | |||
308 | 9326145 | System and method for application usage controls through policy enforcement | |||
309 | 9326135 | Method and apparatus for secure communication in a digital two way radio protocol | |||
310 | 9326129 | Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices | |||
311 | 9325674 | Privacy system | |||
312 | 9325647 | Message-handling server and method for handling secure message attachments for a mobile device | |||
313 | 9325495 | Encrypted server-less communication between devices | |||
314 | 9319923 | Node, communication method, and communication system | |||
315 | 9319876 | Anonymizing location information of a mobile device | |||
316 | 9319875 | Authentication for deciphering ciphertext and displaying deciphered information | |||
317 | 9319874 | Automatic channel pass-through | |||
318 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
319 | 9317689 | Method and apparatus for secure application execution | |||
320 | 9313721 | Information providing apparatus and information providing method, wireless communication apparatus and wireless communication method, computer program, and wireless communication system | |||
321 | 9313660 | Apparatus and method for secure provisioning of a communication device | |||
322 | 9313656 | Privacy centric feature analysis for mobile devices | |||
323 | 9313655 | Location privacy in communication networks | |||
324 | 9313654 | WI-FI direct-based message communication methods and apparatus | |||
325 | 9313176 | System and method for establishing a secure wireless communication path | |||
326 | 9312992 | Method and apparatus for data security and automatic repeat request implementation in a wireless communication system | |||
327 | 9312923 | Personal point of sale | |||
328 | 9307534 | Radio communication system, radio communication apparatus, and ciphering method | |||
329 | 9307403 | System and method for NFC peer-to-peer authentication and secure data transfer | |||
330 | 9307402 | Method of protecting an identity of a mobile station in a communications network | |||
331 | 9307401 | Method to detect calls on an AMR-WB capable network | |||
332 | 9306933 | Ensuring network connection security between a wrapped app and a remote server | |||
333 | 9306926 | User authentication using unique hidden identifiers | |||
334 | 9305282 | Contact-less tag with signature, and applications thereof | |||
335 | 9301276 | Systems, apparatus, and methods for association in multi-hop networks | |||
336 | 9301193 | Service data flow detection in a conforming 3GPP access network having a packet modification function | |||
337 | 9301147 | Method, apparatus, and system for data protection on interface in communications system | |||
338 | 9300782 | Communication maximization structure and system | |||
339 | 9300634 | Mobile IP over VPN communication protocol | |||
340 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
341 | 9294923 | Detection of potentially fraudulent activity by users of mobile communications networks | |||
342 | 9294913 | Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks | |||
343 | 9294912 | Selective regulation of information transmission from mobile applications to third-party privacy complaint target systems | |||
344 | 9294447 | Access control | |||
345 | 9294365 | Cognitive radio system and cognitive radio carrier device | |||
346 | 9294278 | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same | |||
347 | 9292605 | Method of using a mobile terminal to implement cloud searching | |||
348 | 9288741 | System and method for provisioning a wireless device to only be able to access network services within a specific location | |||
349 | 9288706 | Method of anonymously reporting minimization of drive test measurements | |||
350 | 9288677 | Communication system, communication apparatus and method for setting communication parameters of the apparatus | |||
351 | 9288654 | Keeping conversations confidential | |||
352 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
353 | 9287935 | Method and apparatus for anti-eavesdropping in vunerable NFC applications | |||
354 | 9286602 | Secure financial transactions | |||
355 | 9286599 | Redacting content in online meetings | |||
356 | 9282454 | Managing opt-in and opt-out for private data access | |||
357 | 9277409 | Security chip of a communication device | |||
358 | 9277389 | Personal security system | |||
359 | 9277364 | Methods and apparatus for reporting location privacy | |||
360 | 9276964 | Method and user terminal for supporting provision of capabilities | |||
361 | 9276915 | Privacy system | |||
362 | 9276909 | Integrity protection and/or ciphering for UE registration with a wireless network | |||
363 | 9276806 | Failover recovery methods with an edge component | |||
364 | 9276748 | Data-encrypting method and decrypting method for a mobile phone | |||
365 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
366 | 9271314 | Bluetooth communication method and system | |||
367 | 9271216 | Sending user plane traffic in a mobile communications network | |||
368 | 9271146 | Mobile privacy information proxy | |||
369 | 9271145 | System and method for controlling, monitoring and recording of wireless communications in penal institutions | |||
370 | 9271112 | Geolocation of a mobile device in the course of a law enforcement operation | |||
371 | 9270700 | Security protocols for mobile operator networks | |||
372 | 9270457 | Optimizing security bits in a media access control (MAC) header | |||
373 | 9270452 | Encryption using real-world objects | |||
374 | 9265043 | Dynamic real-time tiered client access | |||
375 | 9264949 | Method and system for managing security in mobile communication system | |||
376 | 9264893 | Method for selecting access point with reliability | |||
377 | 9264892 | Method and apparatus for attack resistant mesh networks | |||
378 | 9264881 | Methods and apparatus for enhanced system access control for peer-to-peer wireless communication networks | |||
379 | 9262650 | Communication control device, data security system, communication control method, and computer product | |||
380 | 9262645 | Method and apparatus for privacy policy management | |||
381 | 9262620 | Secure communications kit and client device for securely communicating using the same | |||
382 | 9262601 | Method of blocking transmission of screen information of mobile communication terminal while performing remote control using registration of alert message in status bar | |||
383 | 9258705 | Apparatus, method and system for creating and maintaining multicast data encryption key in machine to machine communication system | |||
384 | 9258700 | Systems and methods for utilizing IMS data security mechanisms in a circuit switched network | |||
385 | 9258692 | Relay assisted peer discovery | |||
386 | 9253817 | Modular personal network systems and methods | |||
387 | 9253701 | System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks | |||
388 | 9253644 | Pushing secure notifications to mobile computing devices | |||
389 | 9253632 | Portable bridge device | |||
390 | 9253631 | Location based functionality | |||
391 | 9253273 | User data automatic lookup in lawful interception | |||
392 | 9253167 | Device and system for facilitating communication and networking within a secure mobile environment | |||
393 | 9251719 | Performance monitoring systems and methods | |||
394 | 9247432 | Systems and methods for controlling network access | |||
395 | 9247423 | System and method for protecting private information by using NFC tags | |||
396 | 9247422 | Content communication over a wireless communication link | |||
397 | 9247016 | Unified tracking data management | |||
398 | 9241321 | Privacy-hardened geolocation system | |||
399 | 9241262 | Apparatus and method for securing beacons | |||
400 | 9241259 | Method and apparatus for managing the transfer of sensitive information to mobile devices | |||
401 | 9241238 | Wireless communication system and wireless communication method | |||
402 | 9240837 | Systems and methods using optical communication for commissioning of network nodes | |||
403 | 9239935 | Cloaking with footprints to provide location privacy protection in location-based services | |||
404 | 9237441 | Method and apparatus for configuring signaling radio bearer in a wireless communications system | |||
405 | 9237133 | Detecting matched cloud infrastructure connections for secure off-channel secret generation | |||
406 | 9237016 | System and method for wiping encrypted data on a device having file-level content protection | |||
407 | 9235839 | Method, apparatus, and system for processing payments using a proxy credential | |||
408 | 9232412 | Method for minimization of drive tests, method for collecting terminal information, terminal, and network element | |||
409 | 9232404 | Method, apparatus, and system for data transmission | |||
410 | 9232403 | Mobile device with common secure wireless message service serving multiple applications | |||
411 | 9232394 | Authentication of phone caller identity | |||
412 | 9232392 | Method and apparatus for setting profile | |||
413 | 9232389 | Mixed mode security for mesh networks | |||
414 | 9232024 | Communicating an identity to a server | |||
415 | 9230286 | Methods and systems for associating users through network societies | |||
2015 | |||||
416 | 9226261 | Apparatus and method for controlling whether to provide location information in broadband wireless access system | |||
417 | 9226142 | Mobile communication system, communication control method, and radio base station | |||
418 | 9226141 | Identifying unsubscribed tethering in a wireless network | |||
419 | 9226140 | Security feature negotiation between network and user terminal | |||
420 | 9226139 | Methods and apparatus for extending mobile IP | |||
421 | 9224292 | Method for controlling a computing device over existing broadcast media acoustic channels | |||
422 | 9224182 | Medical and personal data retrieval system | |||
423 | 9223003 | Differentiated station location | |||
424 | 9220009 | NAS algorithm transmission method and device | |||
425 | 9220008 | Methods and apparatus to associate a mobile device with a panelist profile | |||
426 | 9220007 | Wireless access point MAC address privacy | |||
427 | 9220000 | Temporary device numbers for text messaging | |||
428 | 9219717 | Methods and systems for registering a packet-based address for a mobile device using a fully-qualified domain name (FQDN) for the device in a mobile communication network | |||
429 | 9218503 | Collection and analysis of customer data from application programming interface usage | |||
430 | 9218497 | Incentive-based app execution | |||
431 | 9215683 | Controller and method of controlling multiple identities of a mobile device | |||
432 | 9215593 | Systems and methods for providing security to different functions | |||
433 | 9215591 | Security for network load broadcasts over cellular networks | |||
434 | 9215586 | Method of obtaining data of home appliance | |||
435 | 9215585 | Acquiring identity parameters by emulating base stations | |||
436 | 9215557 | Wireless communication device, wireless communication method, information processing device, information processing method, and program | |||
437 | 9215548 | Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms | |||
438 | 9215221 | Method for implementing local routing of traffic, base station and system | |||
439 | 9215075 | System and method for secure relayed communications from an implantable medical device | |||
440 | 9213969 | Transmitter, receiver, transmitting method, receiving method, communication system, communication method, program, and computer-readable storage medium | |||
441 | 9213858 | Secure virtual file management system | |||
442 | 9210570 | Systems and methods for implementing bluetooth low energy communications | |||
443 | 9210559 | System and method for mobile communications blocking based on crowd sourced information | |||
444 | 9210250 | Telephone messaging privacy | |||
445 | 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
446 | 9210130 | Methods and apparatus to collect distributed user information for media impressions and search terms | |||
447 | 9208483 | Sharing or reselling NFC applications among mobile communications devices | |||
448 | 9204374 | Multicarrier over-the-air cellular network activation server | |||
449 | 9204294 | Location privacy selector | |||
450 | 9204293 | Apparatuses, methods, and computer program products for data retention and lawful intercept for law enforcement agencies | |||
451 | 9204277 | Emergency text messaging | |||
452 | 9203260 | Secure wireless charging | |||
453 | 9202221 | Content recommendations based on browsing information | |||
454 | 9198214 | Detecting a communication tap via signal monitoring | |||
455 | 9198117 | Network system with common secure wireless message service serving multiple applications on multiple wireless devices | |||
456 | 9198035 | Simple pairing to generate private keys for different protocol communications | |||
457 | 9198021 | Extended local IP access for a converged gateway in a hybrid network | |||
458 | 9197501 | Zero-step auto-customization of mobile applications | |||
459 | 9197415 | Method and apparatus of cipher communication for management frame using quality of service mechanism in wireless local area network system | |||
460 | 9197414 | Cryptographic protocol for portable devices | |||
461 | 9191978 | Systems and methods for facilitating intra-cell-peer-to-peer communication | |||
462 | 9191395 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
463 | 9191352 | On demand location sharing | |||
464 | 9191200 | System and method for changing the security level of a communications terminal during operation | |||
465 | 9185552 | Method and apparatus to establish trust and secure connection via a mutually trusted intermediary | |||
466 | 9185085 | Systems for provisioning universal integrated circuit cards | |||
467 | 9179316 | Mobile device with user controls and policy agent to control application access to device location data | |||
468 | 9179315 | Mobile device with data service monitoring, categorization, and display for different applications and networks | |||
469 | 9179308 | Network tools for analysis, design, testing, and production of services | |||
470 | 9179307 | Protection of a security element coupled to an NFC circuit | |||
471 | 9179304 | Device location history anonymization based on stop detection | |||
472 | 9179303 | Methods and apparatus for transmitting and receiving secure and non-secure data | |||
473 | 9179302 | System and method for communication terminal surveillance based on speaker recognition | |||
474 | 9178893 | Secure AD HOC communication systems and methods across heterogeneous systems | |||
475 | 9173100 | On board vehicle network security | |||
476 | 9173092 | Base station data embedded for transmission within information provided to a user device | |||
477 | 9173091 | Lawful interception of unauthorized subscribers and equipments | |||
478 | 9173076 | Authentication method, authentication system and authentication program | |||
479 | 9172680 | Systems and methods for enabling secure messaging, command, and control of remote devices, communicated via a short message service or other message oriented communications mediums | |||
480 | 9172540 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
481 | 9167456 | Subscriber terminal identification | |||
482 | 9167433 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
483 | 9166959 | Secure communication using physical proximity | |||
484 | 9166956 | Priority-based ordering of cryptographic processing in wireless communication apparatus | |||
485 | 9161214 | Wireless communication method and system for transmission authentication at the physical layer | |||
486 | 9161164 | Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided | |||
487 | 9160693 | Method, apparatus and system for accessing applications and content across a plurality of computers | |||
488 | 9158625 | Acquiring a trusted set of encoded data slices | |||
489 | 9154957 | System, method and apparatus for pairing SIM or UICC cards with authorized wireless devices | |||
490 | 9154945 | Methods and apparatus for privacy protection in ad hoc networks | |||
491 | 9154941 | Provisioning user attributes for use with mobile computing device | |||
492 | 9154900 | System and method for transport, network, translation, and adaptive coding in a vehicular network environment | |||
493 | 9154564 | Interacting with a subscriber to a social networking service based on passive behavior of the subscriber | |||
494 | 9154505 | Simplified login for mobile devices | |||
495 | 9154501 | Machine-to-machine communications privacy protection method and system, machine-to-machine communications service management entity, and related device | |||
496 | 9154477 | Systems and methods for encrypting mobile device communications | |||
497 | 9154464 | Obscuring temporary user equipment identities | |||
498 | 9148783 | Method of managing sensitive data in an electronic token | |||
499 | 9148782 | Method for determining location of UE by using AGPS information | |||
500 | 9148781 | Wireless transmission of data packets based on client associations | |||
501 | 9148757 | Method for tracking a mobile device onto a remote displaying unit | |||
502 | 9148420 | Single sign-on process | |||
503 | 9143934 | System and method for remote control of a mobile device | |||
504 | 9143933 | Communication device that receives external device information from an external device using near field communication | |||
505 | 9143932 | Privacy centric feature analysis for mobile devices | |||
506 | 9143931 | Privacy control for wireless devices | |||
507 | 9143483 | Method for anonymous communication, method for registration, method and system for transmitting and receiving information | |||
508 | 9143321 | Communication protocol for secure communications systems | |||
509 | 9142122 | Communication device for performing wireless communication with an external server based on information received via near field communication | |||
510 | 9137836 | Inter-device communication authorization and data sniffing in wireless communication systems | |||
511 | 9137808 | Method and apparatus for provisioning a communication device | |||
512 | 9137631 | Location-based service provider method and system having a user controlled location privacy mechanism | |||
513 | 9137267 | Secure transmission of media during a communication session | |||
514 | 9137243 | Authentication system and authentication method | |||
515 | 9135493 | Graphic data alteration to enhance online privacy | |||
516 | 9131463 | Method for positioning target terminal while protecting privacy of user thereof | |||
517 | 9131412 | Signaling radio bearer security handling for single radio voice call continuity operation | |||
518 | 9131369 | Protection of private information in a client/server automatic speech recognition system | |||
519 | 9131331 | Device discovery with privacy support | |||
520 | 9131069 | System and method for provisioning temporary telephone numbers | |||
521 | 9130992 | Method and apparatus having null-encryption for signaling and media packets between a mobile station and a secure gateway | |||
522 | 9130754 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
523 | 9125048 | Method and/or apparatus for location privacy via uniform resource identifier (URI) provisioning | |||
524 | 9125012 | Methods and apparatus for accessing localized applications | |||
525 | 9124632 | Method and apparatus for providing privacy management in machine-to-machine communications | |||
526 | 9124559 | System and method for temporary obfuscation during collaborative communications | |||
527 | 9124558 | Method and apparatus of handling data decryption for a packet data convergence protocol layer in a wireless communication system | |||
528 | 9124425 | Systems, methods, and apparatuses for ciphering error detection and recovery | |||
529 | 9119225 | Centralized access control system and methods for distributed broadband access points | |||
530 | 9119108 | Method of anonymously reporting minimization of drive test measurements | |||
531 | 9119063 | Unauthorized location detection and countermeasures | |||
532 | 9119062 | Methods and apparatus for providing additional security for communication of sensitive information | |||
533 | 9119053 | Methods and apparatus for use in switching user account data and operations between two different mobile communication devices | |||
534 | 9118671 | Voice over IP based voice biometric authentication | |||
535 | 9118588 | Virtual console-port management | |||
536 | 9118498 | Method and apparatus for executing an application automatically according to the approach of wireless device | |||
537 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
538 | 9117092 | Approaches for a location aware client | |||
539 | 9113499 | Multiple domain smartphone | |||
540 | 9113408 | Method and system for improved communication network setup utilizing extended terminals | |||
541 | 9113337 | Radio communication apparatus | |||
542 | 9113327 | Personal location cone | |||
543 | 9113324 | Mobile privacy protection system using proxy, proxy device and mobile privacy protection method | |||
544 | 9113042 | Multi-wireless device channel communications | |||
545 | 9111401 | Interactive reader commander | |||
546 | 9111087 | Method and system for facilitating replacement of system calls | |||
547 | 9107113 | Method and apparatus for handoff between source and target access systems | |||
548 | 9107074 | Wireless personal area network having authentication and associated methods | |||
549 | 9107067 | Secured communication | |||
550 | 9107066 | Encryption in a wireless telecommunications | |||
551 | 9107065 | Secure information transfer via bar codes | |||
552 | 9106670 | Selectively wiping a remote device | |||
553 | 9106633 | Systems and methods for authenticating mobile device communications | |||
554 | 9106632 | Provisioning by delivered items | |||
555 | 9106623 | Method and apparatus for transmitting bulk emergency data while preserving user privacy | |||
556 | 9106429 | Method and system for pre-accessing conference telephone and network side device | |||
557 | 9100863 | Cellular backhaul load distribution | |||
558 | 9100821 | Anti-eavesdropping communication system and method | |||
559 | 9100373 | System and method for temporary obfuscation during collaborative communications | |||
560 | 9095290 | Method and apparatus for providing rolling data in communication systems | |||
561 | 9094873 | Classified relation networking optimization platform in open wireless architecture (OWA) mobile cloud terminal device | |||
562 | 9094820 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
563 | 9094819 | Methods, systems, and computer readable media for obscuring diameter node information in a communication network | |||
564 | 9094818 | Method for cryptographically transmitting data between network nodes using a nonce value | |||
565 | 9094471 | Method of lawful interception for UMTS | |||
566 | 9094403 | Electronic media distribution system and mobile device | |||
567 | 9094223 | Predictive caching and tunneling for time-sensitive data delivery to roaming client devices | |||
568 | 9088933 | Apparatus and methods for anonymous paired device discovery in wireless communications systems | |||
569 | 9088890 | Method and apparatus for encrypting short data in a wireless communication system | |||
570 | 9088889 | System and method for privacy-enabled mobile locator services with dynamic encounter horizon | |||
571 | 9088888 | Secure wireless communication using rate-adaptive codes | |||
572 | 9088576 | Electronic media creation and distribution | |||
573 | 9087346 | Systems and methods for using spatial and temporal analysis to associate data sources with mobile devices | |||
574 | 9087191 | Method and system for facilitating isolated workspace for applications | |||
575 | 9084116 | Detector logic and radio identification device and method for enhancing terminal operations | |||
576 | 9083699 | System and method of accessing keys for secure messaging | |||
577 | 9083486 | Personal point of sale | |||
578 | 9083475 | System and method for controlling broadcast multimedia using plural wireless network connections | |||
579 | 9082077 | Mobile private assisted location tracking | |||
580 | 9078281 | Wireless station and wireless LAN system | |||
581 | 9078127 | Secure Communication Method | |||
582 | 9078125 | Vehicle communications system and method | |||
583 | 9075978 | Secure configuration of mobile applications | |||
584 | 9075900 | Systems, methods and computer program products for providing compliant delivery of content, applications and/or solutions | |||
585 | 9071962 | Evolved packet system non access stratum deciphering using real-time LTE monitoring | |||
586 | 9071643 | Personal security system | |||
587 | 9071580 | Method and system for securing data of a mobile communications device | |||
588 | 9071438 | System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment | |||
589 | 9071416 | Galois/counter mode encryption in a wireless network | |||
590 | 9071297 | User equipment and methods for codebook subsampling for enhanced 4TX codebooks | |||
591 | 9069974 | Deleting confidential information used to secure a communication link | |||
592 | 9066225 | Network selection scheme | |||
593 | 9066217 | Messaging session enhancement with user data | |||
594 | 9065908 | Method and system for ensuring user and/or device anonymity for location based services (LBS) | |||
595 | 9065807 | Ad-Hoc radio communications system | |||
596 | 9065633 | Wireless communication apparatus for setting frequency band for wireless communications using encryption key information to predetermined frequency band | |||
597 | 9064035 | Medical and personal data retrieval system | |||
598 | 9060350 | Connection set-up between two terminals | |||
599 | 9060344 | Systems, apparatus, and methods for association in multi-hop networks | |||
600 | 9060266 | Apparatus and method of providing medical data based on a handover of a medical sensor | |||
601 | 9060265 | Wireless sensor network and central node device thereof | |||
602 | 9060264 | Secure communication method and system in network environment which includes transmitter, receiver, and wiretapper | |||
603 | 9059980 | Systems and methods for authenticating mobile devices | |||
604 | 9059971 | Systems and methods for secure voice communications | |||
605 | 9059866 | Digital microwave radio system and method with encryption | |||
606 | 9059841 | Auto-discovery of a non-advertised public network address | |||
607 | 9058498 | Runtime environment management of secure communications on card computing devices | |||
608 | 9058477 | Process for the gradual exchange of personal information in non-trusted peer-to-peer environments | |||
609 | 9058323 | System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data | |||
610 | 9055563 | Service in WLAN inter-working, address management system, and method | |||
611 | 9055441 | Communication method, apparatus, and system | |||
612 | 9055438 | Exchanging data based upon device proximity and credentials | |||
613 | 9055433 | Distance-dependent or user-dependent data exchange between wireless communication devices | |||
614 | 9055428 | Communication apparatus, control method for communication apparatus, and program | |||
615 | 9055418 | Method and system for delivering SMS (short message service) messages in a mobile communication system | |||
616 | 9055024 | Communication system | |||
617 | 9053169 | Profile construction using location-based aggregate profile information | |||
618 | 9042388 | Lawful interception for 2G/3G equipment interworking with evolved packet system | |||
619 | 9020468 | Masking phone numbers | |||
620 | 9003542 | Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same | |||
621 | 9001683 | Selective routing of communications in locomotive consist | |||
622 | 8958561 | Systems and methods for multi layer delivery of information | |||
2014 | |||||
623 | 8904172 | Communicating a device descriptor between two devices when registering onto a network | |||
624 | 8885831 | Managing user access in a communications network | |||
625 | 8805327 | Communication method and infrastructure supporting device security and tracking of mobile and portable multimedia devices | |||
626 | 8787575 | Method and apparatus for propagating encryption keys between wireless communication devices | |||
627 | 8738903 | Method for identifying mobile station | |||
628 | 8687591 | Relay node user plane support | |||
2013 | |||||
629 | 8559927 | Dummy information for location privacy in location based services | |||
630 | 8477944 | Communication system, base station apparatus and terminal apparatus | |||
2012 | |||||
631 | 8140845 | Scheme for authentication and dynamic key exchange | |||
632 | 8116749 | Protocol for anonymous wireless communication | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |