СПИСОК патентов США - подгруппа МПК16 H04W12/12
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9609518 | Methods and system for changing mobile station settings upon hand-off to low-cost internet base station | |||
2 | 9609517 | Cooperative security in wireless sensor networks | |||
3 | 9609513 | System and method for device authentication in a dynamic network using wireless communication devices | |||
4 | 9609512 | Wireless authentication system and wireless authentication method | |||
5 | 9609460 | Cloud based mobile device security and policy enforcement | |||
6 | 9609142 | Application processing method and mobile terminal | |||
7 | 9609020 | Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines | |||
8 | 9608999 | Smart beacon data security | |||
9 | 9608807 | Hearing device with communication protection and related method | |||
10 | 9608803 | Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption | |||
11 | 9603023 | System and method for identity protection using mobile device signaling network derived location pattern recognition | |||
12 | 9603022 | Managing undesired service requests in a network | |||
13 | 9603021 | Rogue access point detection | |||
14 | 9603013 | Bluetooth beacon protocol | |||
15 | 9603010 | Automatic security action invocation for mobile communications device | |||
16 | 9602531 | Endpoint-based man in the middle attack detection | |||
17 | 9602526 | User login monitoring device and method | |||
18 | 9596706 | Delivery system, delivery method and delivery device | |||
19 | 9596257 | Detection and prevention of installation of malicious mobile applications | |||
20 | 9591484 | Secure environment for subscriber device | |||
21 | 9591003 | Dynamic application security verification | |||
22 | 9585009 | Enhancing privacy in cellular paging system using physical layer identification | |||
23 | 9584542 | Relay attack countermeasure system | |||
24 | 9584476 | Safety protection method, firewall, terminal device and computer-readable storage medium | |||
25 | 9578513 | Identifying untrusted network access points | |||
26 | 9578508 | Method and apparatus for wireless device countermeasures against malicious infrastructure | |||
27 | 9578458 | Identification of rogue access points | |||
28 | 9578057 | Techniques for detecting an intranet spoofing attack | |||
29 | 9578023 | Identity assertion based on biometric information | |||
30 | 9578020 | Module for controlling usability of a device | |||
31 | 9578010 | Mobile handset extension to a device | |||
32 | 9576157 | Method for mitigating the unauthorized use of a device | |||
33 | 9576131 | Malware detection system and method for mobile platforms | |||
34 | 9572037 | Method and system for defending a mobile network from a fraud | |||
35 | 9572036 | Detection and blocking of cloned mobile devices | |||
36 | 9572035 | Method and apparatus for unlocking a mobile telephone type wireless communication terminal | |||
37 | 9572011 | Value added module in predictive intelligence | |||
38 | 9571965 | Verified check-in | |||
39 | 9569643 | Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer | |||
40 | 9569642 | Always-available embedded theft reaction subsystem | |||
41 | 9569618 | Server and method for attesting application in smart device using random executable code | |||
42 | 9565519 | Framework and method for tracking lost or stolen electronic device | |||
43 | 9560527 | Version protection method and apparatus for mobile terminal | |||
44 | 9560184 | Bypassing bluetooth discovery for devices in a special list | |||
45 | 9560073 | Reconfigurable antenna based solutions for device authentication and intrusion detection in wireless networks | |||
46 | 9558378 | Always-available embedded theft reaction subsystem | |||
47 | 9558339 | Method, device, and system of protecting a log-in process of a computerized service | |||
48 | 9558338 | Method and apparatus for performing security control by using captured image | |||
49 | 9552500 | Always-available embedded theft reaction subsystem | |||
50 | 9544929 | Communication apparatus and communication parameter configuration method thereof | |||
51 | 9544798 | Profiling rogue access points | |||
52 | 9544775 | Security mechanism for mobile users | |||
53 | 9544773 | System and method for enforcing communication policies | |||
54 | 9544396 | Remote application installation and control for a mobile device | |||
55 | 9544360 | Server-based system, method, and computer program product for scanning data on a client using only a subset of the data | |||
56 | 9544320 | Detection of intrusion in a wireless network | |||
57 | 9542555 | Malware detection system and method for compressed data on mobile platforms | |||
58 | 9538385 | Method and apparatus for the detection of unlicensed user equipment | |||
59 | 9538384 | Method and apparatus for a device management application | |||
60 | 9538373 | Method and device for negotiating security capability when terminal moves | |||
61 | 9538335 | Inferring device theft based on historical location data | |||
2016 | |||||
62 | 9532227 | System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network | |||
63 | 9532217 | Method and system for conference call security override | |||
64 | 9532216 | Method of authenticating user, server and mobile terminal performing the same | |||
65 | 9532214 | Apparatus and method for generating key hierarchy in wireless network | |||
66 | 9532209 | Customer care mobile application | |||
67 | 9526021 | Intelligent network access controller and method | |||
68 | 9525994 | Systems and methods for protocol-based identification of rogue base stations | |||
69 | 9525689 | Detection of an unauthorized wireless communication device | |||
70 | 9521552 | Method and apparatus to use smart phones to securely and conveniently monitor intel pcs remotely | |||
71 | 9521548 | Secure registration of a mobile device for use with a session | |||
72 | 9521546 | Secure RF communication method, terminal and system | |||
73 | 9521525 | Method and apparatus for detecting a left-behind phone | |||
74 | 9520048 | Always-available embedded theft reaction subsystem | |||
75 | 9520047 | Terminal and a method of controlling the same based on a state of the terminal | |||
76 | 9519808 | Method and apparatus for protecting data in a portable electronic device | |||
77 | 9519775 | Pre-identifying probable malicious behavior based on configuration pathways | |||
78 | 9516499 | Protection for a means of transportation against unauthorised usage or theft | |||
79 | 9515837 | Policy implementation during charging server interruption | |||
80 | 9510216 | Node device and communication control method | |||
81 | 9510204 | Apparatus and method of determining fraudulent use of a mobile device based on behavioral abnormality | |||
82 | 9510198 | Mobile terminal and user identity recognition method | |||
83 | 9510189 | Method and device for managing a subscriber device | |||
84 | 9507966 | Information processing device and operation control method | |||
85 | 9507965 | Always-available embedded theft reaction subsystem | |||
86 | 9507918 | Always-available embedded theft reaction subsystem | |||
87 | 9507329 | Apparatus and methods for controlled switching of electronic access clients without requiring network access | |||
88 | 9503903 | Server and method for remotely controlling working of communications terminal, and communications terminal | |||
89 | 9497625 | Method for negotiating security capability when terminal moves | |||
90 | 9497169 | Method and system for selective protection of data exchanged between user equipment and network | |||
91 | 9495520 | System and method for preventing observation of password entry using face detection | |||
92 | 9491627 | Recovering data in a storage medium of an electronic device that has been tampered with | |||
93 | 9491626 | Enhanced data interface for contactless communications | |||
94 | 9491199 | Security, fraud detection, and fraud mitigation in device-assisted services systems | |||
95 | 9491193 | System and method for antivirus protection | |||
96 | 9491179 | Systems, methods and programs for detecting unauthorized use of text based communications services | |||
97 | 9489505 | Method for displaying information on a display device of a terminal | |||
98 | 9488731 | Authentication based on random bits in satellite navigation messages | |||
99 | 9485660 | Systems and methods to detect and characterize fake cell towers | |||
100 | 9485659 | Method and apparatus for monitoring network device | |||
101 | 9485243 | Securing a wireless mesh network via a chain of trust | |||
102 | 9485051 | Facilitation of security employing a femto cell access point | |||
103 | 9480039 | System and method for virtual replication of a mobile phone | |||
104 | 9479935 | Configurator forced client network rejoining | |||
105 | 9473510 | System and method for location verification | |||
106 | 9473485 | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |||
107 | 9467863 | Detection of spoof attacks on location broadcasting beacons | |||
108 | 9467862 | Wireless tracking of power tools and related devices | |||
109 | 9467804 | Emission control for wireless location management | |||
110 | 9467463 | System and method for assessing vulnerability of a mobile device | |||
111 | 9467391 | Controlling a packet flow from a user equipment | |||
112 | 9467295 | HNB or HeNB security access method and system, and core network element | |||
113 | 9462465 | Apparatus and methods for separated security implementations in wireless communications | |||
114 | 9462449 | Method and device for fingerprinting of wireless communication devices | |||
115 | 9462121 | Systems and methods to confirm initiation of a callback | |||
116 | 9460288 | Secure app update server and secure application programming interface ("API") server | |||
117 | 9455998 | Systems, methods and apparatuses for prevention of relay attacks | |||
118 | 9454678 | Always-available embedded theft reaction subsystem | |||
119 | 9452733 | Vehicle-mounted control system and vehicle-mounted control device | |||
120 | 9450973 | Method and apparatus for machine to machine network security monitoring in a communications network | |||
121 | 9450953 | Blacklisting of frequently used gesture passwords | |||
122 | 9450759 | Apparatus and methods for controlling distribution of electronic access clients | |||
123 | 9445274 | Method for preventing fraud or misuse when using a specific service of a public land mobile network by a user equipment, subscriber identity module and application program | |||
124 | 9444837 | Process and devices for selective collision detection | |||
125 | 9444816 | Continuous voice authentication for a mobile device | |||
126 | 9444574 | Integration of cellular phone detection and reporting into a prison telephone system | |||
127 | 9439131 | Detecting and disabling rogue access points in a network | |||
128 | 9439077 | Method for malicious activity detection in a mobile station | |||
129 | 9439070 | User authentication system | |||
130 | 9438711 | Portable electronic apparatus | |||
131 | 9438631 | Off-device anti-malware protection for mobile devices | |||
132 | 9438576 | Apparatus and method for validation and authorization of device and user by global positioning and non-prompted exchange of information | |||
133 | 9432966 | Method, apparatus, and computer program product for secure distance bounding based on direction measurement | |||
134 | 9432848 | Band steering for multi-band wireless clients | |||
135 | 9432845 | System and method for automated analysis comparing a wireless device location with another geographic location | |||
136 | 9432377 | Enhanced communication platform and related communication method using the platform | |||
137 | 9426661 | Secure lock for mobile device | |||
138 | 9426655 | Legal authentication message confirmation system and method | |||
139 | 9426161 | Device-based authentication for secure online access | |||
140 | 9426043 | Method for registering and providing notice of a trap event, and terminal using same | |||
141 | 9420469 | Apparatus and method for identifying rogue device | |||
142 | 9420455 | Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol | |||
143 | 9420448 | System and method for automated analysis comparing a wireless device location with another geographic location | |||
144 | 9419988 | System and method for non-disruptive mitigation of messaging fraud | |||
145 | 9419970 | Electronic access client distribution apparatus and methods | |||
146 | 9411962 | System and methods for secure utilization of attestation in policy-based decision making for mobile device management and security | |||
147 | 9408072 | Optimizing handling of found items through a mobile lost and found application | |||
148 | 9407444 | Method for validating messages | |||
149 | 9402163 | In-building location security and privacy | |||
150 | 9398459 | Prevention of eavesdropping type of attack in hybrid communication system | |||
151 | 9398448 | Enhanced wireless communication security | |||
152 | 9398046 | Image-based man-in-the-middle protection in numeric comparison association models | |||
153 | 9398039 | Apparatus, system and method for suppressing erroneous reporting of attacks on a wireless network | |||
154 | 9398035 | Attack mitigation using learning machines | |||
155 | 9396644 | Systems and methods for managing lost devices | |||
156 | 9392463 | System and method for detecting anomaly in a handheld device | |||
157 | 9392401 | Portable computing device with data encryption and destruction | |||
158 | 9390277 | Method and device for data confidentiality protection based on embedded universal integrated circuit card | |||
159 | 9386613 | Wireless network system and connecting method thereof | |||
160 | 9386509 | Method and apparatus for controlling communication between communication devices | |||
161 | 9384479 | Mobile phone takeover protection system and method | |||
162 | 9384369 | Information processing method and electronic device | |||
163 | 9384075 | Coordinated and device-distributed detection of abnormal network device operation | |||
164 | 9380462 | Detecting unauthorized tethering | |||
165 | 9380458 | Method for detecting eavesdroppers in a wireless communication system | |||
166 | 9380416 | Portable computing device with data encryption and destruction | |||
167 | 9380415 | Portable computing device with data encryption and destruction | |||
168 | 9380071 | Method for detection of persistent malware on a network node | |||
169 | 9374711 | Monitoring unauthorized access point | |||
170 | 9374709 | Methods and systems for base station detection | |||
171 | 9374382 | Apparatus and method for attack source traceback | |||
172 | 9370022 | Method for indicating channel access type in wireless communication system, and apparatus therefor | |||
173 | 9369938 | Subscriber identity module (SIM) for mobile stations | |||
174 | 9369836 | Portable computing device with data encryption and destruction | |||
175 | 9369834 | Portable computing device with data encryption and destruction | |||
176 | 9369476 | System for detection of mobile applications network behavior-netwise | |||
177 | 9363836 | Secure management of radio transmissions in an endpoint device of a network | |||
178 | 9363676 | Smart card with domain-trust evaluation and domain policy management functions | |||
179 | 9363675 | Distributed wireless security system | |||
180 | 9357397 | Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device | |||
181 | 9357392 | Method and apparatus for unlocking a mobile telephone type wireless communication terminal | |||
182 | 9357338 | Communication device and detection method | |||
183 | 9356953 | System and method to prevent spoofed communication through out-of-band verification | |||
184 | 9356761 | Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments | |||
185 | 9351167 | SMS botnet detection on mobile devices | |||
186 | 9351166 | Blocking communication between rogue devices on wireless local access networks (WLANS) | |||
187 | 9351164 | Secure NFC routing | |||
188 | 9350644 | Secure and lightweight traffic forwarding systems and methods to cloud based network security systems | |||
189 | 9349126 | Method and apparatus for using sensors on a portable electronic device to verify transactions | |||
190 | 9349001 | Methods and systems for minimizing latency of behavioral analysis | |||
191 | 9344992 | Systems and methods for detecting and controlling transmission devices | |||
192 | 9344896 | Method and system for delivering a command to a mobile device | |||
193 | 9344894 | Methods and systems for handling malicious attacks in a wireless communication system | |||
194 | 9344882 | Apparatus and methods for preventing information disclosure | |||
195 | 9344552 | System and method for managing a mobile device | |||
196 | 9342977 | Method and apparatus for mobile device security | |||
197 | 9338658 | Telecommunication service provider customer account portal for strategic partners | |||
198 | 9338657 | System and method for correlating security events with subscriber information in a mobile network environment | |||
199 | 9338618 | Home routing system and method for mobile networks | |||
200 | 9338179 | Message flooding prevention in messaging networks | |||
201 | 9331980 | Secure in-band signaling method for mobility management crossing firewalls | |||
202 | 9330256 | Location based process-monitoring | |||
203 | 9326173 | Methods and apparatus for machine-to-machine based communication service classes | |||
204 | 9325890 | Method and system to control a camera of a wireless device | |||
205 | 9324074 | Mobile communication device monitoring systems and methods | |||
206 | 9323910 | Method, client and server of password verification, and password terminal system | |||
207 | 9319923 | Node, communication method, and communication system | |||
208 | 9319897 | Secure behavior analysis over trusted execution environment | |||
209 | 9319879 | Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment | |||
210 | 9318010 | Recognizable local alert for stolen or lost mobile devices | |||
211 | 9313662 | Method of protecting a mobile-telephone-type telecommunication terminal | |||
212 | 9313221 | Determination of spoofing of a unique machine identifier | |||
213 | 9307412 | Method and system for evaluating security for an interactive service operation by a mobile device | |||
214 | 9307374 | Transferring information on a first mobile computing device to a peer mobile computing device | |||
215 | 9301328 | Communication apparatus and communication parameter configuration method thereof | |||
216 | 9301102 | Systems and methods for detecting and controlling transmission facilities | |||
217 | 9295071 | Intelligent network access controller and method | |||
218 | 9294924 | Monitoring suspicious events in a cellular network | |||
219 | 9294923 | Detection of potentially fraudulent activity by users of mobile communications networks | |||
220 | 9294496 | Apparatus and method for analyzing vulnerability of zigbee network | |||
221 | 9294488 | Control loop control using broadcast channel to communicate with a node under attack | |||
222 | 9292694 | Privacy protection for mobile devices | |||
223 | 9292685 | Techniques for autonomic reverting to behavioral checkpoints | |||
224 | 9292680 | Mobile terminal detection method and mobile terminal | |||
225 | 9290136 | Apparatus and method for preventing leakage of vehicle information | |||
226 | 9288674 | Convenient WiFi network access using unique identifier value | |||
227 | 9288641 | Short message service (SMS) data transfer | |||
228 | 9288608 | Providing web service for new user account after installation of application on mobile device | |||
229 | 9287935 | Method and apparatus for anti-eavesdropping in vunerable NFC applications | |||
230 | 9286473 | Quarantine-based mitigation of effects of a local DoS attack | |||
231 | 9282110 | Cloud-assisted threat defense for connected vehicles | |||
232 | 9282095 | Security and privacy enhancements for security devices | |||
233 | 9280663 | Apparatus and method for analyzing malware in data analysis system | |||
234 | 9277408 | Method and device for authorizing user equipment in a wireless communication system | |||
235 | 9277378 | Short message service validation engine | |||
236 | 9276936 | Tethering enforcement device controller and methods thereof | |||
237 | 9276748 | Data-encrypting method and decrypting method for a mobile phone | |||
238 | 9271129 | Mobile messaging hub enabling enterprise office telephone numbers | |||
239 | 9270833 | Method and system for preventing illicit use of a telephony platform | |||
240 | 9270692 | Method and apparatus for setting secure connection in wireless communications system | |||
241 | 9270668 | Method and apparatus for verifying anti-counterfeiting information | |||
242 | 9270642 | Process installation network intrusion detection and prevention | |||
243 | 9264895 | Network infrastructure validation of network management frames | |||
244 | 9264893 | Method for selecting access point with reliability | |||
245 | 9264892 | Method and apparatus for attack resistant mesh networks | |||
246 | 9264447 | Simultaneous determination of a mobile device and its user identification | |||
247 | 9258715 | Proactive security for mobile devices | |||
248 | 9258326 | API for auxiliary interface | |||
249 | 9258287 | Secure active networks | |||
250 | 9256881 | Authenticating and managing item ownership and authenticity | |||
251 | 9256738 | Systems and methods for pre-installation detection of malware on mobile devices | |||
252 | 9253701 | System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks | |||
253 | 9253205 | Invocation of system services through auxiliary interface | |||
254 | 9252871 | AIS-Schiffstransceiver | |||
255 | 9247430 | Method of processing a data packet on transmission, a method of processing a data packet on reception, and associated devices and nodes | |||
256 | 9247394 | Using neighboring access points to provide client device location data | |||
257 | 9241261 | Method, system and device for negotiating security capability when terminal moves | |||
258 | 9241259 | Method and apparatus for managing the transfer of sensitive information to mobile devices | |||
259 | 9241058 | Mobile communication apparatus having anti-theft and auto-notification functions | |||
260 | 9239920 | Generation of working security key based on security parameters | |||
261 | 9239800 | Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network | |||
262 | 9237424 | System and method for correlation of mobile communication terminals and individuals at control checkpoints | |||
263 | 9237133 | Detecting matched cloud infrastructure connections for secure off-channel secret generation | |||
264 | 9232491 | Mobile device geolocation | |||
265 | 9232404 | Method, apparatus, and system for data transmission | |||
266 | 9232024 | Communicating an identity to a server | |||
2015 | |||||
267 | 9226259 | Systems and methods for detecting and controlling transmission devices | |||
268 | 9226159 | Telephone call challenge to block spam | |||
269 | 9226140 | Security feature negotiation between network and user terminal | |||
270 | 9225687 | Access control mechanism for a secure element coupled to an NFC circuit | |||
271 | 9223970 | Evaluating application integrity | |||
272 | 9220011 | Electronic device theft self-detection and locking | |||
273 | 9220010 | System and method for developing applications in wireless and wireline environments | |||
274 | 9219745 | Assessing the resistance of a security module against attacks by communication pipe diversion | |||
275 | 9219744 | Mobile botnet mitigation | |||
276 | 9218497 | Incentive-based app execution | |||
277 | 9215244 | Context aware network security monitoring for threat detection | |||
278 | 9213831 | Malware detection and prevention by monitoring and modifying a hardware pipeline | |||
279 | 9210575 | Address spoofing prevention | |||
280 | 9210574 | Method and apparatus for verifying the authenticity of mobile device information | |||
281 | 9210156 | Systems and methods for multi-stage identity authentication | |||
282 | 9208359 | Always-available embedded theft reaction subsystem | |||
283 | 9204281 | Hybrid network based metering server and tracking client for wireless services | |||
284 | 9203858 | Method and system for generating an advisory message for an endpoint device | |||
285 | 9203856 | Methods, systems, and computer program products for detecting communication anomalies in a network based on overlap between sets of users communicating with entities in the network | |||
286 | 9202051 | Auditing a device | |||
287 | 9202047 | System, apparatus, and method for adaptive observation of mobile device behavior | |||
288 | 9198152 | Method for a secure detach procedure in a radio telecommunication network | |||
289 | 9198118 | Rogue wireless access point detection | |||
290 | 9197651 | Security module having a secondary agent in coordination with a host agent | |||
291 | 9197634 | Server and/or client device authentication | |||
292 | 9191880 | Wireless communication device management | |||
293 | 9191823 | Mobile device and method to monitor a baseband processor in relation to the actions on an applicaton processor | |||
294 | 9191822 | Device-initiated security policy | |||
295 | 9191814 | Communications device authentication | |||
296 | 9189624 | Adaptive observation of behavioral features on a heterogeneous platform | |||
297 | 9185123 | System and method for mobile identity protection for online user authentication | |||
298 | 9182792 | Portable electronic apparatus | |||
299 | 9179434 | Systems and methods for locking and disabling a device in response to a request | |||
300 | 9179318 | Delegation based mobility management | |||
301 | 9179317 | Method for preventing the malicious use of a SIM card inserted in an M2M device and M2M device | |||
302 | 9179259 | Recognizing unknown actors based on wireless behavior | |||
303 | 9178896 | Rogue AP detection | |||
304 | 9178879 | Device-based authentication for secure online access | |||
305 | 9173105 | Method of preventing fraudulent use of a security module | |||
306 | 9173100 | On board vehicle network security | |||
307 | 9172538 | Secure lock for mobile device | |||
308 | 9172480 | Radio-frequency communication controlled by a microcircuit | |||
309 | 9167550 | Systems and methods for applying a security policy to a device based on location | |||
310 | 9166732 | Facilitation of security employing a femto cell access point | |||
311 | 9164711 | Network printing system and network printing program adapted to execute printing from a mobile terminal to a printer by using wireless communication | |||
312 | 9161229 | Relating to communications | |||
313 | 9161221 | Method, apparatus and computer program for operating a user equipment | |||
314 | 9160830 | Mobile communication apparatus having anti-theft and auto-notification functions | |||
315 | 9160546 | Authenticating users based upon an identity footprint | |||
316 | 9154959 | Systems and methods for securing near field communications | |||
317 | 9154958 | Security system for cloud computing | |||
318 | 9154464 | Obscuring temporary user equipment identities | |||
319 | 9152787 | Adaptive observation of behavioral features on a heterogeneous platform | |||
320 | 9148841 | Methods and apparatus for correcting error events associated with identity provisioning | |||
321 | 9148780 | Method and apparatus for secure data transmission | |||
322 | 9148700 | Remotely defining security data for authorization of local application activity | |||
323 | 9146704 | Document fingerprinting for mobile phones | |||
324 | 9143956 | System and method for monitoring and enforcing policy within a wireless network | |||
325 | 9143934 | System and method for remote control of a mobile device | |||
326 | 9143933 | Communication device that receives external device information from an external device using near field communication | |||
327 | 9143923 | System and method for remote control of a mobile device | |||
328 | 9143910 | Method and system for remote wipe through voice mail | |||
329 | 9143528 | Method and device for countering fingerprint forgery attacks in a communication system | |||
330 | 9143521 | Detection of intrusion in a wireless network | |||
331 | 9143438 | Mobile service routing in a network environment | |||
332 | 9137785 | Method and arrangement for resource allocation in radio communication | |||
333 | 9137670 | Method for detecting rogue devices operating in wireless and wired computer network environments | |||
334 | 9134413 | Method of measuring distance bound using radio frequency identification (RFID) and system thereof | |||
335 | 9130993 | Wireless connection system and wireless connection method | |||
336 | 9125057 | Mobile device management | |||
337 | 9125013 | Methods and systems for modifying a preferred roaming list (PRL) of a wireless communication device | |||
338 | 9124624 | Detecting vulnerabilities in web applications | |||
339 | 9121923 | Interference detection, characterization and location in a wireless communications or broadcast system | |||
340 | 9119167 | Generic broadcast of location assistance data | |||
341 | 9119078 | Mobile terminal apparatus | |||
342 | 9119077 | Wireless network security | |||
343 | 9119076 | System and method for authentication using a mobile communication device | |||
344 | 9119075 | Communication system, base station, and countermeasure method against cyber attack | |||
345 | 9119073 | Mobile handset extension to a device | |||
346 | 9119070 | Method and system for detecting unauthorized wireless devices | |||
347 | 9119063 | Unauthorized location detection and countermeasures | |||
348 | 9113338 | Method of controlling applications installed on a security module associated with a mobile terminal, and an associated security module, mobile terminal, and server | |||
349 | 9112962 | Method and apparatus for acquiring an IMEI associated to an IMSI | |||
350 | 9112896 | Mobile risk assessment | |||
351 | 9111401 | Interactive reader commander | |||
352 | 9107076 | Data fraud detection via device type identification | |||
353 | 9107065 | Secure information transfer via bar codes | |||
354 | 9106740 | Transferable device with alterable usage functionality | |||
355 | 9104896 | System and method for remotely initiating lost mode on a computing device | |||
356 | 9104871 | Malware detection system and method for mobile platforms | |||
357 | 9100925 | Systems and methods for displaying location information of a device | |||
358 | 9100833 | Base station apparatus for operation as part of an access network of a telecommunications network | |||
359 | 9100831 | Disabling mobile devices that originate message service spam | |||
360 | 9100821 | Anti-eavesdropping communication system and method | |||
361 | 9100805 | Portable electronic device, communication system, announcement controlling method, and storage medium storing program | |||
362 | 9100777 | Method and apparatus for controlling device | |||
363 | 9100429 | Apparatus for analyzing vulnerability of wireless local area network | |||
364 | 9098958 | Convergent communications platform and method for mobile and electronic commerce in a heterogeneous network environment | |||
365 | 9098850 | System and method for transaction security responsive to a signed authentication | |||
366 | 9098696 | Applique providing a secure deployment environment (SDE) for a wireless communications device | |||
367 | 9094823 | Data processing for securing local resources in a mobile device | |||
368 | 9094818 | Method for cryptographically transmitting data between network nodes using a nonce value | |||
369 | 9088608 | Throttling and limiting the scope of neighbor solicitation (NS) traffic | |||
370 | 9088420 | System and method for improved geothentication based on a hash function | |||
371 | 9087183 | Method and system of securing accounts | |||
372 | 9083738 | Airborne wireless device security | |||
373 | 9083671 | Image forming apparatus, method for controlling the same, and storage medium | |||
374 | 9083624 | Mobile device or computer theft recovery system and method | |||
375 | 9081969 | Apparatus and method for remotely deleting critical information | |||
376 | 9078133 | Method, system and mobile terminal for configuring and applying locking strategy of mobile terminal | |||
377 | 9077543 | Methods and apparatus for digital attestation | |||
378 | 9077485 | Automatic security action invocation for mobile communications device | |||
379 | 9075953 | Method and apparatus for providing notification of detected error conditions in a network | |||
380 | 9072014 | Identification of a manipulated or defect base station during handover | |||
381 | 9071974 | Mobile telephone firewall and compliance enforcement system and method | |||
382 | 9071924 | Systems and methods for digital forensic triage | |||
383 | 9071636 | Predictive scoring management system for application behavior | |||
384 | 9071518 | Rules based actions for mobile device management | |||
385 | 9071438 | System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment | |||
386 | 9066194 | System and method for detecting and controlling transmission devices | |||
387 | 9065753 | Lightweight packet-drop detection for ad hoc networks | |||
388 | 9064125 | Image analysis and management | |||
389 | 9064115 | Malware detection system and method for limited access mobile platforms | |||
390 | 9064112 | Malware detection for SMS/MMS based attacks | |||
391 | 9055443 | Mobile device-type locking | |||
392 | 9055101 | Near field communication security | |||
393 | 9055099 | Method of preventing TCP-based denial-of-service attacks on mobile devices | |||
394 | 9053328 | Method of analyzing the behavior of a secure electronic token | |||
395 | 9052387 | Tamper resistant transponder with satellite link for airplane and ship safety | |||
396 | 9036540 | Method and system for correlating IP layer traffic and wireless layer elements in a UMTS/GSM network | |||
397 | 9020567 | Authentication using fingerprint sensor in gesture path | |||
398 | 9002320 | Advanced predictive intelligence for termination bypass detection and prevention | |||
399 | 8973119 | Secure method to exchange digital content between a scanning appliance and SMS-enabled device | |||
400 | 8965335 | Detector of uplink frequencies with feedback | |||
401 | 8958399 | Method and apparatus for providing connectivity control | |||
402 | 8938234 | Mobile communication system | |||
403 | 8929864 | Secure remote control of notification operations of communication devices | |||
404 | 8929860 | Mobile communication terminal and incoming call management method | |||
2014 | |||||
405 | 8918081 | Secure remote control of notification operations of communication devices | |||
406 | 8874078 | Method of unlocking in stages in mobile terminal and mobile terminal for the same | |||
407 | 8868037 | Secure remote control of notification operations of communication devices | |||
408 | 8862098 | Secure remote control of notification operations of communication devices | |||
409 | 8750827 | LAN-based UMA network controller with aggregated transport | |||
410 | 8626121 | Tracking mobile communication devices | |||
2013 | |||||
411 | 8611856 | Identifying spurious requests for information | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |