СПИСОК патентов США - подгруппа МПК16 H04W12/12



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19609518Methods and system for changing mobile station settings upon hand-off to low-cost internet base station
29609517Cooperative security in wireless sensor networks
39609513System and method for device authentication in a dynamic network using wireless communication devices
49609512Wireless authentication system and wireless authentication method
59609460Cloud based mobile device security and policy enforcement
69609142Application processing method and mobile terminal
79609020Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines
89608999Smart beacon data security
99608807Hearing device with communication protection and related method
109608803Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
119603023System and method for identity protection using mobile device signaling network derived location pattern recognition
129603022Managing undesired service requests in a network
139603021Rogue access point detection
149603013Bluetooth beacon protocol
159603010Automatic security action invocation for mobile communications device
169602531Endpoint-based man in the middle attack detection
179602526User login monitoring device and method
189596706Delivery system, delivery method and delivery device
199596257Detection and prevention of installation of malicious mobile applications
209591484Secure environment for subscriber device
219591003Dynamic application security verification
229585009Enhancing privacy in cellular paging system using physical layer identification
239584542Relay attack countermeasure system
249584476Safety protection method, firewall, terminal device and computer-readable storage medium
259578513Identifying untrusted network access points
269578508Method and apparatus for wireless device countermeasures against malicious infrastructure
279578458Identification of rogue access points
289578057Techniques for detecting an intranet spoofing attack
299578023Identity assertion based on biometric information
309578020Module for controlling usability of a device
319578010Mobile handset extension to a device
329576157Method for mitigating the unauthorized use of a device
339576131Malware detection system and method for mobile platforms
349572037Method and system for defending a mobile network from a fraud
359572036Detection and blocking of cloned mobile devices
369572035Method and apparatus for unlocking a mobile telephone type wireless communication terminal
379572011Value added module in predictive intelligence
389571965Verified check-in
399569643Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer
409569642Always-available embedded theft reaction subsystem
419569618Server and method for attesting application in smart device using random executable code
429565519Framework and method for tracking lost or stolen electronic device
439560527Version protection method and apparatus for mobile terminal
449560184Bypassing bluetooth discovery for devices in a special list
459560073Reconfigurable antenna based solutions for device authentication and intrusion detection in wireless networks
469558378Always-available embedded theft reaction subsystem
479558339Method, device, and system of protecting a log-in process of a computerized service
489558338Method and apparatus for performing security control by using captured image
499552500Always-available embedded theft reaction subsystem
509544929Communication apparatus and communication parameter configuration method thereof
519544798Profiling rogue access points
529544775Security mechanism for mobile users
539544773System and method for enforcing communication policies
549544396Remote application installation and control for a mobile device
559544360Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
569544320Detection of intrusion in a wireless network
579542555Malware detection system and method for compressed data on mobile platforms
589538385Method and apparatus for the detection of unlicensed user equipment
599538384Method and apparatus for a device management application
609538373Method and device for negotiating security capability when terminal moves
619538335Inferring device theft based on historical location data

2016

629532227System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network
639532217Method and system for conference call security override
649532216Method of authenticating user, server and mobile terminal performing the same
659532214Apparatus and method for generating key hierarchy in wireless network
669532209Customer care mobile application
679526021Intelligent network access controller and method
689525994Systems and methods for protocol-based identification of rogue base stations
699525689Detection of an unauthorized wireless communication device
709521552Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely
719521548Secure registration of a mobile device for use with a session
729521546Secure RF communication method, terminal and system
739521525Method and apparatus for detecting a left-behind phone
749520048Always-available embedded theft reaction subsystem
759520047Terminal and a method of controlling the same based on a state of the terminal
769519808Method and apparatus for protecting data in a portable electronic device
779519775Pre-identifying probable malicious behavior based on configuration pathways
789516499Protection for a means of transportation against unauthorised usage or theft
799515837Policy implementation during charging server interruption
809510216Node device and communication control method
819510204Apparatus and method of determining fraudulent use of a mobile device based on behavioral abnormality
829510198Mobile terminal and user identity recognition method
839510189Method and device for managing a subscriber device
849507966Information processing device and operation control method
859507965Always-available embedded theft reaction subsystem
869507918Always-available embedded theft reaction subsystem
879507329Apparatus and methods for controlled switching of electronic access clients without requiring network access
889503903Server and method for remotely controlling working of communications terminal, and communications terminal
899497625Method for negotiating security capability when terminal moves
909497169Method and system for selective protection of data exchanged between user equipment and network
919495520System and method for preventing observation of password entry using face detection
929491627Recovering data in a storage medium of an electronic device that has been tampered with
939491626Enhanced data interface for contactless communications
949491199Security, fraud detection, and fraud mitigation in device-assisted services systems
959491193System and method for antivirus protection
969491179Systems, methods and programs for detecting unauthorized use of text based communications services
979489505Method for displaying information on a display device of a terminal
989488731Authentication based on random bits in satellite navigation messages
999485660Systems and methods to detect and characterize fake cell towers
1009485659Method and apparatus for monitoring network device
1019485243Securing a wireless mesh network via a chain of trust
1029485051Facilitation of security employing a femto cell access point
1039480039System and method for virtual replication of a mobile phone
1049479935Configurator forced client network rejoining
1059473510System and method for location verification
1069473485Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
1079467863Detection of spoof attacks on location broadcasting beacons
1089467862Wireless tracking of power tools and related devices
1099467804Emission control for wireless location management
1109467463System and method for assessing vulnerability of a mobile device
1119467391Controlling a packet flow from a user equipment
1129467295HNB or HeNB security access method and system, and core network element
1139462465Apparatus and methods for separated security implementations in wireless communications
1149462449Method and device for fingerprinting of wireless communication devices
1159462121Systems and methods to confirm initiation of a callback
1169460288Secure app update server and secure application programming interface ("API") server
1179455998Systems, methods and apparatuses for prevention of relay attacks
1189454678Always-available embedded theft reaction subsystem
1199452733Vehicle-mounted control system and vehicle-mounted control device
1209450973Method and apparatus for machine to machine network security monitoring in a communications network
1219450953Blacklisting of frequently used gesture passwords
1229450759Apparatus and methods for controlling distribution of electronic access clients
1239445274Method for preventing fraud or misuse when using a specific service of a public land mobile network by a user equipment, subscriber identity module and application program
1249444837Process and devices for selective collision detection
1259444816Continuous voice authentication for a mobile device
1269444574Integration of cellular phone detection and reporting into a prison telephone system
1279439131Detecting and disabling rogue access points in a network
1289439077Method for malicious activity detection in a mobile station
1299439070User authentication system
1309438711Portable electronic apparatus
1319438631Off-device anti-malware protection for mobile devices
1329438576Apparatus and method for validation and authorization of device and user by global positioning and non-prompted exchange of information
1339432966Method, apparatus, and computer program product for secure distance bounding based on direction measurement
1349432848Band steering for multi-band wireless clients
1359432845System and method for automated analysis comparing a wireless device location with another geographic location
1369432377Enhanced communication platform and related communication method using the platform
1379426661Secure lock for mobile device
1389426655Legal authentication message confirmation system and method
1399426161Device-based authentication for secure online access
1409426043Method for registering and providing notice of a trap event, and terminal using same
1419420469Apparatus and method for identifying rogue device
1429420455Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol
1439420448System and method for automated analysis comparing a wireless device location with another geographic location
1449419988System and method for non-disruptive mitigation of messaging fraud
1459419970Electronic access client distribution apparatus and methods
1469411962System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security
1479408072Optimizing handling of found items through a mobile lost and found application
1489407444Method for validating messages
1499402163In-building location security and privacy
1509398459Prevention of eavesdropping type of attack in hybrid communication system
1519398448Enhanced wireless communication security
1529398046Image-based man-in-the-middle protection in numeric comparison association models
1539398039Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network
1549398035Attack mitigation using learning machines
1559396644Systems and methods for managing lost devices
1569392463System and method for detecting anomaly in a handheld device
1579392401Portable computing device with data encryption and destruction
1589390277Method and device for data confidentiality protection based on embedded universal integrated circuit card
1599386613Wireless network system and connecting method thereof
1609386509Method and apparatus for controlling communication between communication devices
1619384479Mobile phone takeover protection system and method
1629384369Information processing method and electronic device
1639384075Coordinated and device-distributed detection of abnormal network device operation
1649380462Detecting unauthorized tethering
1659380458Method for detecting eavesdroppers in a wireless communication system
1669380416Portable computing device with data encryption and destruction
1679380415Portable computing device with data encryption and destruction
1689380071Method for detection of persistent malware on a network node
1699374711Monitoring unauthorized access point
1709374709Methods and systems for base station detection
1719374382Apparatus and method for attack source traceback
1729370022Method for indicating channel access type in wireless communication system, and apparatus therefor
1739369938Subscriber identity module (SIM) for mobile stations
1749369836Portable computing device with data encryption and destruction
1759369834Portable computing device with data encryption and destruction
1769369476System for detection of mobile applications network behavior-netwise
1779363836Secure management of radio transmissions in an endpoint device of a network
1789363676Smart card with domain-trust evaluation and domain policy management functions
1799363675Distributed wireless security system
1809357397Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device
1819357392Method and apparatus for unlocking a mobile telephone type wireless communication terminal
1829357338Communication device and detection method
1839356953System and method to prevent spoofed communication through out-of-band verification
1849356761Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments
1859351167SMS botnet detection on mobile devices
1869351166Blocking communication between rogue devices on wireless local access networks (WLANS)
1879351164Secure NFC routing
1889350644Secure and lightweight traffic forwarding systems and methods to cloud based network security systems
1899349126Method and apparatus for using sensors on a portable electronic device to verify transactions
1909349001Methods and systems for minimizing latency of behavioral analysis
1919344992Systems and methods for detecting and controlling transmission devices
1929344896Method and system for delivering a command to a mobile device
1939344894Methods and systems for handling malicious attacks in a wireless communication system
1949344882Apparatus and methods for preventing information disclosure
1959344552System and method for managing a mobile device
1969342977Method and apparatus for mobile device security
1979338658Telecommunication service provider customer account portal for strategic partners
1989338657System and method for correlating security events with subscriber information in a mobile network environment
1999338618Home routing system and method for mobile networks
2009338179Message flooding prevention in messaging networks
2019331980Secure in-band signaling method for mobility management crossing firewalls
2029330256Location based process-monitoring
2039326173Methods and apparatus for machine-to-machine based communication service classes
2049325890Method and system to control a camera of a wireless device
2059324074Mobile communication device monitoring systems and methods
2069323910Method, client and server of password verification, and password terminal system
2079319923Node, communication method, and communication system
2089319897Secure behavior analysis over trusted execution environment
2099319879Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment
2109318010Recognizable local alert for stolen or lost mobile devices
2119313662Method of protecting a mobile-telephone-type telecommunication terminal
2129313221Determination of spoofing of a unique machine identifier
2139307412Method and system for evaluating security for an interactive service operation by a mobile device
2149307374Transferring information on a first mobile computing device to a peer mobile computing device
2159301328Communication apparatus and communication parameter configuration method thereof
2169301102Systems and methods for detecting and controlling transmission facilities
2179295071Intelligent network access controller and method
2189294924Monitoring suspicious events in a cellular network
2199294923Detection of potentially fraudulent activity by users of mobile communications networks
2209294496Apparatus and method for analyzing vulnerability of zigbee network
2219294488Control loop control using broadcast channel to communicate with a node under attack
2229292694Privacy protection for mobile devices
2239292685Techniques for autonomic reverting to behavioral checkpoints
2249292680Mobile terminal detection method and mobile terminal
2259290136Apparatus and method for preventing leakage of vehicle information
2269288674Convenient WiFi network access using unique identifier value
2279288641Short message service (SMS) data transfer
2289288608Providing web service for new user account after installation of application on mobile device
2299287935Method and apparatus for anti-eavesdropping in vunerable NFC applications
2309286473Quarantine-based mitigation of effects of a local DoS attack
2319282110Cloud-assisted threat defense for connected vehicles
2329282095Security and privacy enhancements for security devices
2339280663Apparatus and method for analyzing malware in data analysis system
2349277408Method and device for authorizing user equipment in a wireless communication system
2359277378Short message service validation engine
2369276936Tethering enforcement device controller and methods thereof
2379276748Data-encrypting method and decrypting method for a mobile phone
2389271129Mobile messaging hub enabling enterprise office telephone numbers
2399270833Method and system for preventing illicit use of a telephony platform
2409270692Method and apparatus for setting secure connection in wireless communications system
2419270668Method and apparatus for verifying anti-counterfeiting information
2429270642Process installation network intrusion detection and prevention
2439264895Network infrastructure validation of network management frames
2449264893Method for selecting access point with reliability
2459264892Method and apparatus for attack resistant mesh networks
2469264447Simultaneous determination of a mobile device and its user identification
2479258715Proactive security for mobile devices
2489258326API for auxiliary interface
2499258287Secure active networks
2509256881Authenticating and managing item ownership and authenticity
2519256738Systems and methods for pre-installation detection of malware on mobile devices
2529253701System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks
2539253205Invocation of system services through auxiliary interface
2549252871AIS-Schiffstransceiver
2559247430Method of processing a data packet on transmission, a method of processing a data packet on reception, and associated devices and nodes
2569247394Using neighboring access points to provide client device location data
2579241261Method, system and device for negotiating security capability when terminal moves
2589241259Method and apparatus for managing the transfer of sensitive information to mobile devices
2599241058Mobile communication apparatus having anti-theft and auto-notification functions
2609239920Generation of working security key based on security parameters
2619239800Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
2629237424System and method for correlation of mobile communication terminals and individuals at control checkpoints
2639237133Detecting matched cloud infrastructure connections for secure off-channel secret generation
2649232491Mobile device geolocation
2659232404Method, apparatus, and system for data transmission
2669232024Communicating an identity to a server

2015

2679226259Systems and methods for detecting and controlling transmission devices
2689226159Telephone call challenge to block spam
2699226140Security feature negotiation between network and user terminal
2709225687Access control mechanism for a secure element coupled to an NFC circuit
2719223970Evaluating application integrity
2729220011Electronic device theft self-detection and locking
2739220010System and method for developing applications in wireless and wireline environments
2749219745Assessing the resistance of a security module against attacks by communication pipe diversion
2759219744Mobile botnet mitigation
2769218497Incentive-based app execution
2779215244Context aware network security monitoring for threat detection
2789213831Malware detection and prevention by monitoring and modifying a hardware pipeline
2799210575Address spoofing prevention
2809210574Method and apparatus for verifying the authenticity of mobile device information
2819210156Systems and methods for multi-stage identity authentication
2829208359Always-available embedded theft reaction subsystem
2839204281Hybrid network based metering server and tracking client for wireless services
2849203858Method and system for generating an advisory message for an endpoint device
2859203856Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network
2869202051Auditing a device
2879202047System, apparatus, and method for adaptive observation of mobile device behavior
2889198152Method for a secure detach procedure in a radio telecommunication network
2899198118Rogue wireless access point detection
2909197651Security module having a secondary agent in coordination with a host agent
2919197634Server and/or client device authentication
2929191880Wireless communication device management
2939191823Mobile device and method to monitor a baseband processor in relation to the actions on an applicaton processor
2949191822Device-initiated security policy
2959191814Communications device authentication
2969189624Adaptive observation of behavioral features on a heterogeneous platform
2979185123System and method for mobile identity protection for online user authentication
2989182792Portable electronic apparatus
2999179434Systems and methods for locking and disabling a device in response to a request
3009179318Delegation based mobility management
3019179317Method for preventing the malicious use of a SIM card inserted in an M2M device and M2M device
3029179259Recognizing unknown actors based on wireless behavior
3039178896Rogue AP detection
3049178879Device-based authentication for secure online access
3059173105Method of preventing fraudulent use of a security module
3069173100On board vehicle network security
3079172538Secure lock for mobile device
3089172480Radio-frequency communication controlled by a microcircuit
3099167550Systems and methods for applying a security policy to a device based on location
3109166732Facilitation of security employing a femto cell access point
3119164711Network printing system and network printing program adapted to execute printing from a mobile terminal to a printer by using wireless communication
3129161229Relating to communications
3139161221Method, apparatus and computer program for operating a user equipment
3149160830Mobile communication apparatus having anti-theft and auto-notification functions
3159160546Authenticating users based upon an identity footprint
3169154959Systems and methods for securing near field communications
3179154958Security system for cloud computing
3189154464Obscuring temporary user equipment identities
3199152787Adaptive observation of behavioral features on a heterogeneous platform
3209148841Methods and apparatus for correcting error events associated with identity provisioning
3219148780Method and apparatus for secure data transmission
3229148700Remotely defining security data for authorization of local application activity
3239146704Document fingerprinting for mobile phones
3249143956System and method for monitoring and enforcing policy within a wireless network
3259143934System and method for remote control of a mobile device
3269143933Communication device that receives external device information from an external device using near field communication
3279143923System and method for remote control of a mobile device
3289143910Method and system for remote wipe through voice mail
3299143528Method and device for countering fingerprint forgery attacks in a communication system
3309143521Detection of intrusion in a wireless network
3319143438Mobile service routing in a network environment
3329137785Method and arrangement for resource allocation in radio communication
3339137670Method for detecting rogue devices operating in wireless and wired computer network environments
3349134413Method of measuring distance bound using radio frequency identification (RFID) and system thereof
3359130993Wireless connection system and wireless connection method
3369125057Mobile device management
3379125013Methods and systems for modifying a preferred roaming list (PRL) of a wireless communication device
3389124624Detecting vulnerabilities in web applications
3399121923Interference detection, characterization and location in a wireless communications or broadcast system
3409119167Generic broadcast of location assistance data
3419119078Mobile terminal apparatus
3429119077Wireless network security
3439119076System and method for authentication using a mobile communication device
3449119075Communication system, base station, and countermeasure method against cyber attack
3459119073Mobile handset extension to a device
3469119070Method and system for detecting unauthorized wireless devices
3479119063Unauthorized location detection and countermeasures
3489113338Method of controlling applications installed on a security module associated with a mobile terminal, and an associated security module, mobile terminal, and server
3499112962Method and apparatus for acquiring an IMEI associated to an IMSI
3509112896Mobile risk assessment
3519111401Interactive reader commander
3529107076Data fraud detection via device type identification
3539107065Secure information transfer via bar codes
3549106740Transferable device with alterable usage functionality
3559104896System and method for remotely initiating lost mode on a computing device
3569104871Malware detection system and method for mobile platforms
3579100925Systems and methods for displaying location information of a device
3589100833Base station apparatus for operation as part of an access network of a telecommunications network
3599100831Disabling mobile devices that originate message service spam
3609100821Anti-eavesdropping communication system and method
3619100805Portable electronic device, communication system, announcement controlling method, and storage medium storing program
3629100777Method and apparatus for controlling device
3639100429Apparatus for analyzing vulnerability of wireless local area network
3649098958Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment
3659098850System and method for transaction security responsive to a signed authentication
3669098696Applique providing a secure deployment environment (SDE) for a wireless communications device
3679094823Data processing for securing local resources in a mobile device
3689094818Method for cryptographically transmitting data between network nodes using a nonce value
3699088608Throttling and limiting the scope of neighbor solicitation (NS) traffic
3709088420System and method for improved geothentication based on a hash function
3719087183Method and system of securing accounts
3729083738Airborne wireless device security
3739083671Image forming apparatus, method for controlling the same, and storage medium
3749083624Mobile device or computer theft recovery system and method
3759081969Apparatus and method for remotely deleting critical information
3769078133Method, system and mobile terminal for configuring and applying locking strategy of mobile terminal
3779077543Methods and apparatus for digital attestation
3789077485Automatic security action invocation for mobile communications device
3799075953Method and apparatus for providing notification of detected error conditions in a network
3809072014Identification of a manipulated or defect base station during handover
3819071974Mobile telephone firewall and compliance enforcement system and method
3829071924Systems and methods for digital forensic triage
3839071636Predictive scoring management system for application behavior
3849071518Rules based actions for mobile device management
3859071438System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment
3869066194System and method for detecting and controlling transmission devices
3879065753Lightweight packet-drop detection for ad hoc networks
3889064125Image analysis and management
3899064115Malware detection system and method for limited access mobile platforms
3909064112Malware detection for SMS/MMS based attacks
3919055443Mobile device-type locking
3929055101Near field communication security
3939055099Method of preventing TCP-based denial-of-service attacks on mobile devices
3949053328Method of analyzing the behavior of a secure electronic token
3959052387Tamper resistant transponder with satellite link for airplane and ship safety
3969036540Method and system for correlating IP layer traffic and wireless layer elements in a UMTS/GSM network
3979020567Authentication using fingerprint sensor in gesture path
3989002320Advanced predictive intelligence for termination bypass detection and prevention
3998973119Secure method to exchange digital content between a scanning appliance and SMS-enabled device
4008965335Detector of uplink frequencies with feedback
4018958399Method and apparatus for providing connectivity control
4028938234Mobile communication system
4038929864Secure remote control of notification operations of communication devices
4048929860Mobile communication terminal and incoming call management method

2014

4058918081Secure remote control of notification operations of communication devices
4068874078Method of unlocking in stages in mobile terminal and mobile terminal for the same
4078868037Secure remote control of notification operations of communication devices
4088862098Secure remote control of notification operations of communication devices
4098750827LAN-based UMA network controller with aggregated transport
4108626121Tracking mobile communication devices

2013

4118611856Identifying spurious requests for information
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017