Resources Contact Us Home
Choyi; Vinod Kumar
Ottawa, CA
No. of patents:

Patent Number Title Of Patent Date Issued
8280020 Transparent caller name authentication for authorized third party callers October 2, 2012
Transparent caller name authentication is provided to authorized third parties by creating an Public Key Infrastructure (PKI) certificate chain. An owner of a registered caller name can authorize third parties to use the caller name by issuing a PKI sub-certificate to each authorized thi
8191106 System and method of network access security policy management for multimodal device May 29, 2012
A system and method are provided for management of access security for access by a multimodal device to a converged fixed/mobile network. An inter-technology change-off monitoring entity (ICME) is provided to monitor an inter-technology change-off of the multimodal device and to noti
8102838 Mechanism for authentication of caller and callee using otoacoustic emissions January 24, 2012
A method and apparatus are provided for authenticating a user attempting to establish a service which uses SIP. The user registers with the SIP server by providing the digital otoacoustic signature of the user. Thereafter, when the user attempts to initiate a session through the SIP
7974234 Method of authenticating a mobile network node in establishing a peer-to-peer secure context bet July 5, 2011
Methods for authenticating peer mobile network nodes for establishing a secure peer-to-peer communications context in an ad-hoc network are presented. The methods include accessing wireless infrastructure network entities at low bandwidth and for a short time duration to obtain crypt
7783756 Protection for wireless devices against false access-point attacks August 24, 2010
Mechanisms and methods for providing a mobile/wireless device with protection against false access-point/base-station attacks using MAC address protection are presented. The mobile/wireless device known as mobile client (MC) gains access to wireless network by discovering and selecti
7613920 Mechanism to avoid expensive double-encryption in mobile networks November 3, 2009
A method for enabling a mobile node to transmit encrypted data over a path including a wireless link and an untrusted link, while avoiding double encryption on any link. The data on the end-to-end path is encrypted using an application specific security mechanism, or an L2 mechanism is
7409715 Mechanism for detection of attacks based on impersonation in a wireless network August 5, 2008
An impersonation detection system for a wireless node of a wireless communication network is described. The system comprises an intrusion detection module for correlating the original data frames transmitted by the wireless node with incoming data frames received over the air interfa

  Recently Added Patents
Adaptive input interface
Image forming apparatus, information processing method, and storage medium for generating screen information
Apparatus and sensor for adjusting vertical sensor-alignment
Systems and methods for adaptive error thresholds or adaptive modulation schemes based on atmospheric conditions
Digital signal processing apparatus, liquid crystal display apparatus, digital signal processing method and computer program
SONOS stack with split nitride memory layer
Method for forming ventilation holes in an electrode plate
  Randomly Featured Patents
Methods for manufacturing miniature circuitry and inductive components
Methods and apparatus for partial interference reduction within wireless networks
Surface pattern applied to a rectangular sponge
Transcoder unit
Microwave selective devices using localized modes in weakly asymmetric resonant cavities
Golf ball
Impact-reinforced piezocomposite transducer array
Dunnage rack
Flow control valve
Hair dryer