Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Choyi; Vinod Kumar
Address:
Ottawa, CA
No. of patents:
7
Patents:












Patent Number Title Of Patent Date Issued
8280020 Transparent caller name authentication for authorized third party callers October 2, 2012
Transparent caller name authentication is provided to authorized third parties by creating an Public Key Infrastructure (PKI) certificate chain. An owner of a registered caller name can authorize third parties to use the caller name by issuing a PKI sub-certificate to each authorized thi
8191106 System and method of network access security policy management for multimodal device May 29, 2012
A system and method are provided for management of access security for access by a multimodal device to a converged fixed/mobile network. An inter-technology change-off monitoring entity (ICME) is provided to monitor an inter-technology change-off of the multimodal device and to noti
8102838 Mechanism for authentication of caller and callee using otoacoustic emissions January 24, 2012
A method and apparatus are provided for authenticating a user attempting to establish a service which uses SIP. The user registers with the SIP server by providing the digital otoacoustic signature of the user. Thereafter, when the user attempts to initiate a session through the SIP
7974234 Method of authenticating a mobile network node in establishing a peer-to-peer secure context bet July 5, 2011
Methods for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network are presented. The methods include accessing wireless infrastructure network entities at low bandwidth and for a short time duration to obtain crypt
7783756 Protection for wireless devices against false access-point attacks August 24, 2010
Mechanisms and methods for providing a mobile/wireless device with protection against false access-point/base-station attacks using MAC address protection are presented. The mobile/wireless device known as mobile client (MC) gains access to wireless network by discovering and selecti
7613920 Mechanism to avoid expensive double-encryption in mobile networks November 3, 2009
A method for enabling a mobile node to transmit encrypted data over a path including a wireless link and an untrusted link, while avoiding double encryption on any link. The data on the end-to-end path is encrypted using an application specific security mechanism, or an L2 mechanism is
7409715 Mechanism for detection of attacks based on impersonation in a wireless network August 5, 2008
An impersonation detection system for a wireless node of a wireless communication network is described. The system comprises an intrusion detection module for correlating the original data frames transmitted by the wireless node with incoming data frames received over the air interfa










 
 
  Recently Added Patents
Semiconductor device including a clock generating circuit for generating an internal signal having a coarse delay line, a fine delay line and a selector circuit
Printer
Methods, systems, and physical computer storage media for processing a plurality of input/output request jobs
Method to calibrate RF paths of an FHOP adaptive base station
Communicating channel state information using predictive vector quantization
Measuring current and resistance using combined diodes/resistor structure to monitor integrated circuit manufacturing process variations
Power device and method of packaging same
  Randomly Featured Patents
In-cylinder injection type spark-ignition internal combustion engine and control method thereof
Scalpel, in particular for ophthalmologic applications
Vehicle seat apparatus
Method of producing light weight cement for use of cementation of oil and gas wells
Crack susceptibility test utilizing an airport restraint specimen
Knee pad
Enhancement of the efficacy of nifedipine by deuteration
Method of producing a wheel speed sensor and the corresponding sensor
Operator console for imaging diagnostic apparatus
SQL injection prevention