Resources Contact Us Home
Choyi; Vinod Kumar
Ottawa, CA
No. of patents:

Patent Number Title Of Patent Date Issued
8280020 Transparent caller name authentication for authorized third party callers October 2, 2012
Transparent caller name authentication is provided to authorized third parties by creating an Public Key Infrastructure (PKI) certificate chain. An owner of a registered caller name can authorize third parties to use the caller name by issuing a PKI sub-certificate to each authorized thi
8191106 System and method of network access security policy management for multimodal device May 29, 2012
A system and method are provided for management of access security for access by a multimodal device to a converged fixed/mobile network. An inter-technology change-off monitoring entity (ICME) is provided to monitor an inter-technology change-off of the multimodal device and to noti
8102838 Mechanism for authentication of caller and callee using otoacoustic emissions January 24, 2012
A method and apparatus are provided for authenticating a user attempting to establish a service which uses SIP. The user registers with the SIP server by providing the digital otoacoustic signature of the user. Thereafter, when the user attempts to initiate a session through the SIP
7974234 Method of authenticating a mobile network node in establishing a peer-to-peer secure context bet July 5, 2011
Methods for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network are presented. The methods include accessing wireless infrastructure network entities at low bandwidth and for a short time duration to obtain crypt
7783756 Protection for wireless devices against false access-point attacks August 24, 2010
Mechanisms and methods for providing a mobile/wireless device with protection against false access-point/base-station attacks using MAC address protection are presented. The mobile/wireless device known as mobile client (MC) gains access to wireless network by discovering and selecti
7613920 Mechanism to avoid expensive double-encryption in mobile networks November 3, 2009
A method for enabling a mobile node to transmit encrypted data over a path including a wireless link and an untrusted link, while avoiding double encryption on any link. The data on the end-to-end path is encrypted using an application specific security mechanism, or an L2 mechanism is
7409715 Mechanism for detection of attacks based on impersonation in a wireless network August 5, 2008
An impersonation detection system for a wireless node of a wireless communication network is described. The system comprises an intrusion detection module for correlating the original data frames transmitted by the wireless node with incoming data frames received over the air interfa

  Recently Added Patents
Single-wavelength correction method for luminescent homogeneous biological assay
Integrated control system for stability control of yaw, roll and lateral motion of a driving vehicle using an integrated sensing system to determine longitudinal velocity
Data scrambling in memory devices
Format for providing traffic information and a method and apparatus for using the format
Representations of compressed video
Mask and method for forming the mask
Process for producing .beta.-sialon fluorescent material
  Randomly Featured Patents
Solid body instrument transducer
Magnetic recording disk file servo control system including an actuator model for generating a simulated head position error signal
Method for preserving charges on a cap at the output of a regulator
Reaction injection molding machine
Fluid applicator
Compounds, compositions and methods of use
Multiple button interactive electronic card with display
Probe and method of manufacturing a probe
Skin friction gage for time-resolved measurements
Taste masked medicated pharmaceutical