Validity Report
Full Report
US7224678B2 — Wireless local or metropolitan area network with intrusion detection features and related methods
Priority Date: 2002-08-12, Publication Date: 2007-05-29, Current Assignee: Stingray Ip Solutions LLCReport Generated: 2021-06-30

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP1530867A12.274WIRELESS LOCAL OR METROPOLITAN AREA NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-05-182002-08-1231495177GreatHarris CorpHarris Corp
EP1529363A12.173MOBILE AD-HOC NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-05-112002-08-1231495155GreatHarris CorpHarris Corp
EP1535158A21.908MOBILE AD-HOC NETWORK WITH INTRUSION DETECTION FEATURES AND RELATED METHODSGRANT2005-06-012002-08-1231495142GreatHarris CorpHarris Corp
US7054329B21.481Collision avoidance in IEEE 802.11 contention free period (CFP) with overlapping basic service sets (BSSs)GRANT2006-05-302000-07-0726911661GreatKoninklijke Philips NVKoninklijke Philips NV
US7305004B21.357Interference suppression methods for 802.11GRANT2007-12-042001-01-1627488954GreatAT&T CorpAT&T Intellectual Property II LP
US7046690B21.355Interference suppression methods for 802.11GRANT2006-05-162001-01-1627488967GreatAT&T CorpKyocera Corp
EP1382135A11.310INTERFERENCE SUPPRESSION METHODS FOR 802.11GRANT2004-01-212001-03-0227534887GreatAT&T CorpAT&T Corp
US7180905B21.249Access method for periodic contention-free sessionsGRANT2007-02-202001-11-0228046925GreatAT&T CorpAT&T Intellectual Property II LP
US7248600B21.240‘Shield’: protecting high priority channel access attempts in overlapped wireless cellsGRANT2007-07-242001-11-0227739461GreatAT&T CorpAT&T Intellectual Property II LP
US7164671B21.235Overlapping network allocation vector (ONAV) for avoiding collision in the IEEE 802.11 WLAN operating under HCFGRANT2007-01-162001-12-2721851088GreatKoninklijke Philips NVUniloc 2017 LLC
EP1396111A21.216OVERLAPPING NETWORK ALLOCATION VECTOR (ONAV) FOR AVOIDING COLLISION IN THE IEEE 802.00 WLAN OPERATING UNDER HCFGRANT2004-03-102001-05-1526705382GreatKoninklijke Philips NVKoninklijke Philips NV
EP1466445A21.214COEXISTENCE OF MODULATION SCHEMES IN A WLANGRANT2004-10-132002-01-0926763149GreatKoninklijke Philips NVKoninklijke Philips NV, NXP BV
EP1486035A11.203COEXISTENCE OF STATIONS CAPABLE OF DIFFERENT MODULATION SCHEMES IN A WIRELESS LOCAL AREA NETWORKGRANT2004-12-152002-03-0727791447GreatKoninklijke Philips NVKoninklijke Philips NV
EP1466446A11.187CO-EXISTENCE OF OFDM AND DSSS/CCK STATIONS IN A WLANGRANT2004-10-132002-01-0926767916GreatKoninklijke Philips NVKoninklijke Philips NV
US7277415B21.163Staggered startup for cyclic prioritized multiple access (CPMA) contention-free sessionsGRANT2007-10-022001-11-0228046924GreatAT&T CorpAT&T Intellectual Property II LP
US6791996B11.160Wireless network system and communication method employing both contention mode and contention-free modeGRANT2004-09-141999-09-2226548400GreatPanasonic CorpWi-Fi One LLC
US7280517B21.160Wireless LANs and neighborhood captureGRANT2007-10-092001-11-0228046923GreatAT&T CorpAT&T Intellectual Property II LP
US7245605B21.148Preemptive packet for maintaining contiguity in cyclic prioritized multiple access (CPMA) contention-free sessionsGRANT2007-07-172001-11-0228046922GreatAT&T CorpAT&T Intellectual Property II LP
US7245604B21.139Fixed deterministic post-backoff for cyclic prioritized multiple access (CPMA) contention-free sessionsGRANT2007-07-172001-11-0232303818GreatAT&T CorpAT&T Intellectual Property II LP
US7277413B21.116Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigationGRANT2007-10-022001-07-0527497702GreatAT&T CorpAT&T Intellectual Property II LP
US7136361B21.108Hybrid coordination function (HCF) access through tiered contention and overlapped wireless cell mitigationGRANT2006-11-142001-07-0527497703GreatAT&T CorpAT&T Intellectual Property II LP
US7031274B21.092Method for enabling interoperability between data transmission systems conforming to IEEE 802.11 and HIPERLAN standardsGRANT2006-04-182001-01-1627759876GreatAT&T CorpAT&T Intellectual Property II LP
US7251232B11.078Point-controlled contention arbitration in multiple access wireless LANsGRANT2007-07-312000-11-2234107243GreatCisco Technology IncCisco Technology Inc
WO2003039054A21.067WIRELESS LANS AND NEIGHBORHOOD CAPTUREAPPLICATION2003-05-082001-11-0227583788Great
WO2003005653A11.062HYBRID COORDINATION FUNCTION (HCF) ACCESS THROUGH TIERED CONTENTION AND OVERLAPPED WIRELESS CELL MITIGATIONAPPLICATION2003-01-162001-07-0527539172Great
EP0818905A21.058Network communicationGRANT1998-01-141996-07-0924717514GreatInternational Business Machines CorpInternational Business Machines Corp
EP1164750A11.057RADIO STATION AND DATA PACKET TRANSMITTING/RECEIVING METHODGRANT2001-12-192000-01-1918541622GreatSony CorpSony Corp
EP1233574A21.054Unified Channel Access for Supporting Quality of Service (QoS) in a Local Area NetworkGRANT2002-08-212000-11-0127399818GreatTexas Instruments IncTexas Instruments Inc
US7710929B21.045Method of controlling access to a communications mediumGRANT2010-05-042002-07-1926247094GreatSynad Technologies LtdST Ericsson SA
US20040013135A11.044System and method for scheduling traffic in wireless networksAPPLICATION2004-01-222002-07-1730442878GreatAlvarion LtdAlvarion Ltd
EP1237334A21.035Quality of service in wireless LANGRANT2002-09-042001-02-2825165777GreatSharp CorpSharp Corp
US7272119B21.034Methods and systems for quality of service in networks comprising wireless devicesGRANT2007-09-182000-11-0227500188GreatSharp Laboratories of America IncSharp Corp
EP1407578A21.012A SYSTEM AND METHOD FOR SHARING BANDWIDTH BETWEEN CO-LOCATED 802.11 A/E AND HIPERLAN/2 SYSTEMSGRANT2004-04-142001-07-0926696756GreatKoninklijke Philips NVKoninklijke Philips NV
US8539580B21.008Method  system and program product for detecting intrusion of a wireless networkGRANT2013-09-172002-06-1929734416GreatInternational Business Machines CorpInternational Business Machines Corp
EP1271850A21.003Method for carrying out communications among plural stationsGRANT2003-01-022001-06-2219028187GreatPanasonic CorpPanasonic Corp
EP1115229B10.999CONSTRUCTION METHOD OF RADIO NETWORK SYSTEM AND RADIO TRANSMISSION DEVICEGRANT2006-03-291999-05-3126481271GreatSony CorpSony Corp
EP1097546A10.981DATA LINK LAYER EXTENSIONS TO A HIGH LATENCY WIRELESS MAC PROTOCOLGRANT2001-05-091998-07-144162661GreatIBM United Kingdom Ltd, International Business Machines CorpIBM United Kingdom Ltd, International Business Machines Corp
US6611521B10.978Data link layer extensions to a high latency wireless MAC protocolGRANT2003-08-261998-07-1422361387GreatInternational Business Machines CorpGoogle LLC
US6118788A0.975Balanced media access methods for wireless networksGRANT2000-09-121997-10-1525490821GreatInternational Business Machines CorpInternational Business Machines Corp
US20030086437A10.975Overcoming neighborhood capture in wireless LANsAPPLICATION2003-05-082001-11-0727403952Great
EP1493286A10.973DETERMINING THE STATE OF A STATION IN A LOCAL AREAGRANT2005-01-052002-04-0829250615GreatAirmagnet IncAirmagnet Inc
EP1286506B10.956Wireless communication system and wireless stationGRANT2005-10-192001-08-0719069982GreatToshiba CorpToshiba Corp
EP0872979B10.951System and method for monitoring performance of wireless lan and dynamically adjusting its operating parametersGRANT2007-09-051997-04-1725280746GreatAdvanced Micro Devices IncAdvanced Micro Devices Inc
EP1524799A10.946RADIO INFORMATION TRANSMITTING SYSTEM  RADIO COMMUNICATION METHOD  RADIO STATION  AND RADIO TERMINAL DEVICEGRANT2005-04-202002-07-1931492055GreatSony CorpSony Corp
EP1350368A20.946Wireless system containing a first network and a second networkGRANT2003-10-082000-11-178170407GreatPhilips Intellectual Property and Standards GmbH, Koninklijke Philips NVPhilips Intellectual Property and Standards GmbH, Koninklijke Philips NV
EP1386419B10.937INSTANTANEOUS JOINT TRANSMIT POWER CONTROL AND LINK ADAPTATION FOR RTS/CTS BASED CHANNEL ACCESSGRANT2006-08-022001-04-0926814949GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
EP1202527B10.936Wireless communication system and method of conducting wireless communication to avoid an unnecessary IP packet deliveryGRANT2006-04-122000-10-2718805639GreatNEC CorpNEC Corp
EP0877512B10.929A method for scheduling packet data transmissionGRANT2011-01-261997-05-0525310607GoodNokia OyjNokia Oyj
EP1263168B10.927Wireless communication apparatusGRANT2006-06-282001-05-2919004279GoodToshiba CorpToshiba Corp
US7444511B20.925LAN that allows non-authenticated external terminal station to access a predetermined device in LANGRANT2008-10-282000-10-0518787112GoodNEC CorpNEC Corp
EP1491003B10.920WIRELESS LAN WITH DYNAMIC CHANNEL ACCESS MANAGEMENTGRANT2006-05-312002-03-2828453159GoodIntel CorpIntel Corp
US6693888B20.919Method and apparatus for filtering that specifies the types of frames to be captured and to be displayed for an IEEE802.11 wireless LANGRANT2004-02-172001-06-0625365981GoodNetworks Associates Technology IncMcAfee LLC
EP1397877A10.917CHANNEL ACCESS METHOD FOR POWERLINE CARRIER BASED MEDIA ACCESS CONTROL PROTOCOLGRANT2004-03-172001-06-1825382910GoodItran Communications LtdYitran Communications Ltd
EP1298848A20.914BASE STATION APPARATUS AND TERMINAL APPARATUSGRANT2003-04-022001-09-2819124586GoodToshiba CorpToshiba Corp
US5991881A0.912Network surveillance systemGRANT1999-11-231996-11-0824994205GoodHarris CorpRPX Corp
US7093290B20.911Security system for networks and the method thereofGRANT2006-08-152001-09-0527722566GoodElectronics and Telecommunications Research Institute ETRIUniloc 2017 LLC
EP0658023B10.910Dynamic user registration method in a mobile communications networkGRANT2000-09-271993-12-088214848GoodInternational Business Machines CorpInternational Business Machines Corp
US6990116B10.910Method and system for improving throughput over wireless local area networks with mode switchingGRANT2006-01-242001-01-1235614094Good3Com CorpValtrus Innovations Ltd
EP1349321B10.908Wireless LAN-system  host apparatus and wireless LAN base stationGRANT2016-05-252002-03-2927800585GoodNEC CorpNEC Corp
EP1179919B10.907Media access control protocol with priority and contention-free intervalsGRANT2010-07-282000-08-0424534973GoodIntellon CorpQualcomm Atheros Inc
US6687259B20.903ARQ MAC for ad-hoc communication networks and a method for using the sameGRANT2004-02-032002-06-0529715228GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
EP1292046B10.898Method  wireless network system and base station thereof for controlling power and interferenceGRANT2006-04-192001-07-2619058998GoodNEC CorpNEC Corp
EP0584981B10.896Wireless local area network transmission systemGRANT2000-03-221992-08-1410720413GoodNokia of America CorpNokia of America Corp
EP1361702B10.896A hierarchical wireless network and an associated method for delivering IP packets to mobile stationsGRANT2008-07-232002-04-3029249513GoodAlcatel Lucent SASAlcatel Lucent SAS
EP1315335A10.893Adaptive MAC packets fragmentation and rate selection for 802.11 wireless networksGRANT2003-05-282001-11-1926968784GoodAT&T CorpAT&T Corp
EP0597640A10.893Wireless local area network systemGRANT1994-05-181992-11-1310725082GoodNCR International IncNCR International Inc
EP1483922A10.889DETECTING A HIDDEN NODE IN A WIRELESS LOCAL AREA NETWORKGRANT2004-12-082002-03-1428039539GoodAirmagnet IncAirmagnet Inc
EP1430619B10.886A system and method employing algorithms and protocols for optimizing carrier sense multiple access (CSMA) protocols in wireless networksGRANT2007-05-022001-09-2523262878GoodMeshNetworks IncMeshNetworks Inc
EP1493240B10.886MONITORING A LOCAL AREA NETWORKGRANT2009-02-252002-04-0829250634GoodAirmagnet IncAirmagnet Inc
EP1312186B10.885SELF-CONFIGURING SOURCE-AWARE BRIDGING FOR NOISY MEDIAGRANT2009-11-042000-08-0424532529GoodIntellon CorpAtheros Powerline LLC
US7948951B20.885Automatic peer discoveryGRANT2011-05-242002-06-1244510112GoodXocyst Transfer AG LLCIntellectual Ventures I LLC
EP1466443B10.885ADDRESSING IN WIRELESS LOCAL AREA NETWORKSGRANT2008-11-192002-01-1826161262GoodNokia OyjNokia Oyj
EP1470691A20.883INTEGRATED NETWORK INTRUSION DETECTIONGRANT2004-10-272002-02-0127658645GoodIntel CorpIntel Corp
EP1379029B10.879Method of guaranteeing users' anonymity and wireless local area network (LAN) system thereforGRANT2006-08-302002-07-0629720343GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP1522020B10.878SYSTEM FOR MANAGING WIRELESS NETWORK ACTIVITYGRANT2015-12-022002-05-2029588005GoodAirDefense IncAirDefense Inc
US8027637B10.878Single frequency wireless communication systemGRANT2011-09-272002-01-1144652550GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
EP1347600B10.877Wireless lan base station capable of carrying out automatic matching for radio channelsGRANT2007-01-172002-03-2227785367GoodNEC Platforms LtdNEC Platforms Ltd
EP1490785A10.876DETECTING AN UNAUTHORIZED STATION IN A WIRELESS LOCAL AREA NETWORKGRANT2004-12-292002-04-0428789841GoodAirmagnet IncAirmagnet Inc
US7236470B10.870Tracking multiple interface connections by mobile stationsGRANT2007-06-262002-01-1121930080GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
EP0917316B10.867Method for bandwidth sharing in a multiple access system for communications networksGRANT2007-11-281997-10-1427370126GoodNokia of America CorpNokia of America Corp
US7016948B10.862Method and apparatus for detailed protocol analysis of frames captured in an IEEE 802.11 (b) wireless LANGRANT2006-03-212001-12-2136045712GoodMcAfee LLCMcAfee LLC
EP0910176B10.859Method for establishment of the power level for uplink data transmission in a multiple access system for communications networksGRANT2003-04-091997-10-1427370131GoodNokia of America CorpNokia of America Corp
US7493659B10.858Network intrusion detection and analysis system and methodGRANT2009-02-172002-03-0540349437GoodMcAfee LLCMcAfee LLC
US7330472B20.854System and method for hybrid coordination in a wireless LANGRANT2008-02-122001-10-2626955647GoodSharp Laboratories of America IncSharp Corp
US7689210B10.851Plug-n-playable wireless communication systemGRANT2010-03-302002-01-1142044642GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US20030200455A10.846Method applicable to wireless lan for security control and attack detectionAPPLICATION2003-10-232002-04-1829214922GoodNational Datacomm CorpNational Datacomm Corp
EP0915592B10.837Method for admitting new connections based on usage priorities in a multiple access system for communications networksGRANT2009-02-251997-10-1427370130GoodNokia of America CorpNokia of America Corp
EP0746921B10.837VIRTUAL NETWORK USING ASYNCHRONOUS TRANSFER MODEGRANT2002-08-141992-09-1425481867GoodNetwork Equipment Technologies IncNetwork Equipment Technologies Inc
US7042852B20.837System and method for wireless LAN dynamic channel change with honeypot trapGRANT2006-05-092002-05-2029552760GoodAirDefense IncExtreme Networks Inc
US5768531A0.835Apparatus and method for using multiple communication paths in a wireless LANGRANT1998-06-161995-03-2723628016GoodToshiba America Information Systems IncToshiba America Information Systems Inc
US6674738B10.829Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LANGRANT2004-01-062001-09-1725495360GoodNetworks Associates Technology IncMcAfee LLC
US7376091B10.820Wireless bridge for interfacing an 802.11 network with a cellular networkGRANT2008-05-202002-07-2239387647GoodSprint Spectrum LPSprint Spectrum LP
US7058796B20.817Method and system for actively defending a wireless LAN against attacksGRANT2006-06-062002-05-2029731938GoodAirDefense IncExtreme Networks Inc
US7292562B20.817Measuring the throughput of transmissions over wireless local area networksGRANT2007-11-062002-02-2827753883GoodAirmagnet IncAirmagnet Inc
US6775657B10.810Multilayered intrusion detection system and methodGRANT2004-08-101999-12-2232825491GoodCisco Technology IncCisco Technology Inc
US7113498B20.807Virtual switchGRANT2006-09-262002-06-0529710227GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US7366148B20.806Intrusion detection system for wireless networksGRANT2008-04-292002-04-1129250759GoodJohns Hopkins UniversityJohns Hopkins University
US7322044B20.805Systems and methods for automated network policy exception detection and correctionGRANT2008-01-222002-06-0332303897GoodAirDefense IncExtreme Networks Inc
US7086089B20.803Systems and methods for network securityGRANT2006-08-012002-05-2029731930GoodAirDefense IncExtreme Networks Inc
US6345043B10.799Access scheme for a wireless LAN station to connect an access pointGRANT2002-02-051998-07-0622335167GoodNational Datacomm CorpNational Datacomm Corp
US7383577B20.798Method and system for encrypted network management and intrusion detectionGRANT2008-06-032002-05-2029423094GoodAirDefense IncExtreme Networks Inc
US6556582B10.797Systems and methods for collision avoidance in mobile multi-hop packet radio networksGRANT2003-04-292000-05-1524281391GoodBBNT Solutions LLCRaytheon BBN Technologies Corp
US7277404B20.795System and method for sensing wireless LAN activityGRANT2007-10-022002-05-2030119493GoodAirDefense IncExtreme Networks Inc
US7532895B20.795Systems and methods for adaptive location trackingGRANT2009-05-122002-05-2032830767GoodAirDefense IncExtreme Networks Inc
US5805801A0.791System and method for detecting and preventing securityGRANT1998-09-081997-01-0925120749GoodInternational Business Machines CorpTrend Micro Inc
US20020060995A10.790Dynamic channel selection scheme for IEEE 802.11 WLANsAPPLICATION2002-05-232000-07-0726926686GoodKoninklijke Philips NVKoninklijke Philips NV
US20020163933A10.787Tiered contention multiple access (TCMA): a method for priority-based shared channel accessAPPLICATION2002-11-072000-11-0327559333GoodAT&T CorpAT&T Intellectual Property II LP
US20030149887A10.779Application-specific network intrusion detectionAPPLICATION2003-08-072002-02-0127658637GoodIntel CorpIntel Corp
US7359398B20.773Wireless communication system  wireless communication device and method  and computer programGRANT2008-04-152002-07-0131701813GoodSony CorpSony Corp
EP1506637B10.771Method  system and computer program product for wireless intrusion detectionGRANT2010-10-272002-05-1729418991GoodNetwork Security Technologies IncMCI Communications Services Inc
US5982762A0.770Wireless LAN system  base station device and wireless terminal device therefor  and method for relaying information frameGRANT1999-11-091995-03-2013134482GoodHitachi Ltd, Hitachi Computer Engineering Co LtdHitachi Ltd, Hitachi Computer Engineering Co Ltd
US7184774B20.770Coordination among mobile stations servicing terminal equipmentGRANT2007-02-272001-10-3021757312GoodMotorola Solutions IncMotorola Solutions Inc
US5231634A0.768MEDIUM ACCESS PROTOCOL FOR WIRELESS LANSGRANT1993-07-271991-12-1825200130GoodProxim Wireless CorpQuarterhill Inc
US20040203764A10.767Methods and systems for identifying nodes and mapping their locationsAPPLICATION2004-10-142002-06-0333129760GoodAirDefense IncAirDefense Inc
US6578147B10.762Parallel intrusion detection sensors with load balancing for high speed networksGRANT2003-06-101999-01-1522872500GoodCisco Technology IncCisco Technology Inc
US5850515A0.752Intrusion control in repeater based networksGRANT1998-12-151995-03-1727019196GoodAdvanced Micro Devices IncGlobalFoundries Inc
US7236460B20.751Detecting a counterfeit access point in a wireless local area networkGRANT2007-06-262002-03-2928453323GoodAirmagnet IncAirmagnet Inc
US6208635B10.748Network for transferring data packets and method for operating the networkGRANT2001-03-271996-12-127814493GoodAltvater Air Data Systems GmbH and Co KGGROUP BUSINESS SOFTWARE AG
EP1520375B10.746System and method for detecting unauthorized wireless access pointsGRANT2009-12-232002-06-2829779443GoodWavelink CorpWavelink Corp
US6463285B10.738Arrangement for data exchange in a wireless communication systemGRANT2002-10-082000-02-0923993488GoodNokia of America CorpNokia of America Corp
US7039027B20.723Automatic and seamless vertical roaming between wireless local area network (WLAN) and wireless wide area network (WWAN) while maintaining an active voice or streaming data connection: systems  methods and program productsGRANT2006-05-022000-12-2827360105GoodSymbol Technologies LLCSymbol Technologies LLC
US7190672B10.718System and method for using destination-directed spreading codes in a multi-channel metropolitan area wireless communications networkGRANT2007-03-132001-12-1937833432GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7180875B10.716System and method for performing macro-diversity selection and distribution of routes for routing data packets in Ad-Hoc networksGRANT2007-02-202001-12-2037745032GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
US6947726B20.715Network security architecture for a mobile network platformGRANT2005-09-202001-08-0326977044GoodBoeing CoBoeing Co
US20040103307A10.714Mechanism for detecting intrusion and jamming attempts in a shared media based communications networkAPPLICATION2004-05-272001-08-2025463323GoodItran Communications LtdYitran Communications Ltd
US6477651B10.712Intrusion detection system and method having dynamically loaded signaturesGRANT2002-11-051999-01-0822855284GoodCisco Technology IncCisco Technology Inc
US6279113B10.705Dynamic signature inspection-based network intrusion detectionGRANT2001-08-211998-03-1627373258GoodInternet Tools IncCAI Software LLC
EP1419663A20.705SYSTEM AND METHOD FOR COLLISION&minus|FREE TRANSMISSION SCHEDULING USING NEIGHBORHOOD INFORMATION AND ADVERTISED TRANSMISSION TIMESGRANT2004-05-192001-08-2523221805GoodNokia OyjNokia Oyj, Nokia Technologies Oy
US6487666B10.704Intrusion detection signature analysis using regular expressions and logical operatorsGRANT2002-11-261999-01-1522872886GoodCisco Technology IncCisco Technology Inc
US6895432B20.703IP network system having unauthorized intrusion safeguard functionGRANT2005-05-172000-12-1518850394GoodFujitsu LtdFujitsu Ltd
US6629151B10.703Method and system for querying the dynamic aspects of wireless connectionGRANT2003-09-301999-03-1826823179GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7093292B10.699System  method and computer program product for monitoring hacker activitiesGRANT2006-08-152002-02-0836781944GoodMcAfee LLCMcAfee LLC
US20030149891A10.698Method and device for providing network security by causing collisionsAPPLICATION2003-08-072002-02-0127658404Good3Com Corp3Com Corp
US5539824A0.691Method and system for key distribution and authentication in a data communication networkGRANT1996-07-231993-12-088214847GoodInternational Business Machines CorpInternational Business Machines Corp
US7058821B10.690System and method for detection of intrusion attacks on packets transmitted on a networkGRANT2006-06-062001-01-1736569088GoodiPolicy Networks IncTech Mahindra Ltd
US7346015B20.689Method and apparatus for routing data with support for changing mobility requirementsGRANT2008-03-182001-06-298182061GoodBritish Telecommunications PLCBritish Telecommunications PLC
EP1508222B10.685SECURE WIRELESS LOCAL OR METROPOLITAN AREA NETWORK AND RELATED METHODSGRANT2016-01-202002-05-1029400044GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US5905870A0.685Arrangement for initiating and maintaining flow control in shared-medium  full-duplex  and switched networksGRANT1999-05-181996-09-1124851699GoodAdvanced Micro Devices IncGlobalFoundries Inc
US6591306B10.683IP network access for portable devicesGRANT2003-07-081999-04-0126825802GoodNEC CorpNEC Corp
US6842460B10.681Ad hoc network discovery menuGRANT2005-01-112001-06-2725398097GoodNokia OyjNokia Technologies Oy
US20120147808A10.681Network ProtocolAPPLICATION2012-06-142001-11-2823304689GoodMillennial Net IncIII Holdings 3 LLC
US4792946A0.680Wireless local area network for use in neighborhoodsGRANT1988-12-201987-04-0721882737GoodSpectrum Electronics IncSpectrum Electronics Inc
US20020061031A10.679Systems and methods for interference mitigation among multiple WLAN protocolsAPPLICATION2002-05-232000-10-0622899193GoodARYYA COMMUNICATIONS IncCisco Technology Inc
EP0998079A20.679Method for providing a wireless network and a base station for such a networkGRANT2000-05-031998-10-307886222GoodDosch and Amand GmbH and Co KGMitel Deutschland GmbH
US7194004B10.670Method for managing network accessGRANT2007-03-202002-01-2837863891Good3Com CorpValtrus Innovations Ltd, HP Inc, Hewlett Packard Enterprise Development LP
US6711409B10.668Node belonging to multiple clusters in an ad hoc wireless networkGRANT2004-03-231999-12-1526866402GoodBBNT Solutions LLCInnobrilliance LLC
US5844900A0.666Method and apparatus for optimizing a medium access control protocolGRANT1998-12-011996-09-2324879245GoodProxim Wireless CorpGoogle LLC
US7020472B20.654Cellular channel bonding for improved data transmissionGRANT2006-03-282001-06-2225392115GoodGallitzin Allegheny LLCFleet Connect Solutions LLC
US20030084319A10.653Node  method and computer readable medium for inserting an intrusion prevention system into a network stackAPPLICATION2003-05-012001-10-3121696042GoodHewlett Packard CoHewlett Packard Development Co LP
US5325419A0.651Wireless digital personal communications system having voice/data/image two-way calling and intercell hand-offGRANT1994-06-281993-01-0421691209GoodAmeritech CorpAT&T Intellectual Property I LP, Ameritech Properties Inc
US6697337B10.650Method and apparatus for capture  analysis and display of packet information sent in an IEEE 802.11 wireless networkGRANT2004-02-242001-09-1731496329GoodNetworks Associates Technology IncMcAfee LLC
US6768730B10.649System and method for efficiently performing two-way ranging to determine the location of a wireless node in a communications networkGRANT2004-07-272001-10-1125521239GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5953652A0.647Detection of fraudulently registered mobile phonesGRANT1999-09-141997-01-2425143605GoodAT&T Wireless Services IncAT&T Mobility II LLC, AT&T Wireless Services Inc
US7134141B20.644System and method for host and network based intrusion detection and responseGRANT2006-11-072000-06-1226905651GoodHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1271855A10.639Method and apparatus for routing dataGRANT2003-01-022001-06-298182064GoodBritish Telecommunications PLCBritish Telecommunications PLC
US7007301B20.636Computer architecture for an intrusion detection systemGRANT2006-02-282000-06-1226905652GoodHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US5065398A0.634TDMA satellite communication method and systemGRANT1991-11-121988-05-1614703661GoodHitachi LtdHitachi Ltd
US20030188190A10.634System and method of intrusion detection employing broad-scope monitoringAPPLICATION2003-10-022002-03-2628452650GoodBellSouth Intellectual Property CorpAT&T Delaware Intellectual Property Inc
US6937602B20.629System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networksGRANT2005-08-302001-10-2327500483GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
US6178512B10.627Wireless networkGRANT2001-01-231997-08-2310817915GoodUS Philips CorpUniloc 2017 LLC
US6408391B10.627Dynamic system defense for information warfareGRANT2002-06-181998-05-0622114955GoodPRC IncNorthrop Grumman Systems Corp, PRC Inc
US6363489B10.626Method for automatic intrusion detection and deflection in a networkGRANT2002-03-261999-11-2923784510GoodForescout Technologies IncForescout Technologies Inc
US6982982B10.625System and method for providing a congestion optimized address resolution protocol for wireless ad-hoc networksGRANT2006-01-032001-10-2335509103GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6266350B10.625Off-line broadband network interfaceGRANT2001-07-241998-03-0921893912GoodBroadcom Homenetworking IncQualcomm Inc
US5710764A0.625Method of signal transmission in a mobile communication systemGRANT1998-01-201995-05-2614983932GoodNEC CorpNEC Corp
US6804532B10.623System and method for re-routing communications based on wireless communication link qualityGRANT2004-10-122000-12-2233098550GoodCisco Technology IncCisco Technology Inc
US5159592A0.622NETWORK ADDRESS MANAGEMENT FOR A WIRED NETWORK SUPPORTING WIRELESS COMMUNICATION TO A PLURALITY OF MOBILE USERSGRANT1992-10-271990-10-2924424340GoodInternational Business Machines CorpInternational Business Machines Corp
US6973053B10.618Using direct cluster member to cluster member links to improve performance in mobile communication systemsGRANT2005-12-062000-09-1235430516GoodBBNT Solutions LLCRaytheon BBN Technologies Corp
US20030027550A10.612Airborne security managerAPPLICATION2003-02-062001-08-0326977066GoodBoeing CoBoeing Co
US20030063592A10.611Wireless LAN access pointAPPLICATION2003-04-032001-09-2819124474GoodToshiba CorpToshiba Corp
US6195547B10.607System and method for a previously activated mobile station to challenge network mobile station knowledge during over the air activationGRANT2001-02-271998-09-2422576599GoodTelefonaktiebolaget LM Ericsson ABOptis Wireless Technology LLC
US6744766B20.603Hybrid ARQ for a wireless Ad-Hoc network and a method for using the sameGRANT2004-06-012002-06-0529739386GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
US20030135762A10.603Wireless networks security systemAPPLICATION2003-07-172002-01-0923358754GoodPeel Wireless IncPeel Wireless Inc
US20010027107A10.603Location managing method for managing location of mobile station in mobile wireless packet communication system and mobile wireless packet communication systemAPPLICATION2001-10-041999-12-2818506084GoodNTT Docomo IncNTT Docomo Inc
US6230002B10.600Method  and associated apparatus  for selectively permitting access by a mobile terminal to a packet data networkGRANT2001-05-081997-11-1925521634GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6771666B20.599System and method for trans-medium address resolution on an ad-hoc network with at least one highly disconnected medium having multiple access points to other mediaGRANT2004-08-032002-03-1528044611GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
US20030227934A10.599System and method for multicast media access using broadcast transmissions with multiple acknowledgements in an Ad-Hoc communications networkAPPLICATION2003-12-112002-06-1129736315GoodMeshNetworks IncMeshNetworks Inc
US7185368B20.598Flow-based detection of network intrusionsGRANT2007-02-272000-11-3026940735GoodLancope LLCCisco Technology Inc
US6704789B10.597SIM based authentication mechanism for DHCPv4/v6 messagesGRANT2004-03-091999-05-0323172017GoodNokia OyjNokia Technologies Oy
US20030204632A10.596Network security system integrationAPPLICATION2003-10-302002-04-3029249691GoodTippingPoint Technologies IncTrend Micro Inc, HP Inc
US5487065A0.594Method and apparatus for supporting mobile communications in asynchronous transfer mode based networksGRANT1996-01-231993-05-2626748188GoodColumbia University of New YorkColumbia University of New York
US7697470B20.592Utilization of the internet protocol to facilitate communication involving mobile devicesGRANT2010-04-131999-07-0634549096GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US7116640B20.591Architecture and mechanism for forwarding layer interfacing for networksGRANT2006-10-032000-12-2225010215GoodGenuity Inc, BBN Technologies CorpRaytheon BBN Technologies Corp, Genuity Inc, Level 3 Communications LLC
US7240368B10.587Intrusion and misuse deterrence system employing a virtual networkGRANT2007-07-031999-04-1426827423GoodVerizon Corporate Services Group Inc, Level 3 Communications LLC, BBN Technologies CorpVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US5886989A0.586System for the delivery of wireless broadband integrated services digital network (ISDN) using asynchronous transfer mode (ATM)GRANT1999-03-231995-12-0524271950GoodStanford Telecommunications IncAlcatel USA Sourcing LP
US6359880B10.586Public wireless/cordless internet gatewayGRANT2002-03-191997-03-1125217374GoodBell Atlantic Network Services IncVerizon Services Corp, Verizon Patent and Licensing Inc
US6067297A0.585Embedded access point supporting communication with mobile unit operating in power-saving modeGRANT2000-05-231996-06-2824699159GoodSymbol Technologies LLCSymbol Technologies LLC
US20020181417A10.585Wireless LAN with dynamic channel selectionAPPLICATION2002-12-052001-05-088181951GoodNokia of America CorpNokia of America Corp
US7017186B20.583Intrusion detection system using self-organizing clustersGRANT2006-03-212002-07-3031186832GoodSteelCloud IncLonghorn Hd LLC
US6829227B10.583Dual polling media access control protocol for packet data in fixed wireless communication systemsGRANT2004-12-072000-10-2733477253GoodNokia of America CorpNokia of America Corp
US7221686B10.582System and method for computing the signal propagation time and the clock correction for mobile stations in a wireless networkGRANT2007-05-222001-11-3038049607GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5812531A0.582Method and apparatus for bridging wireless LAN to a wired LANGRANT1998-09-221994-07-294154096GoodInternational Business Machines CorpNetgear Inc
US6292508B10.581Method and apparatus for managing power in a frequency hopping medium access control protocolGRANT2001-09-181994-03-0326900162GoodProxim Wireless CorpGoogle LLC
US7140040B20.581Protecting wireless local area networks from intrusion by eavesdropping on the eavesdroppers and dynamically reconfiguring encryption upon detection of intrusionGRANT2006-11-212002-04-2529248694GoodInternational Business Machines CorpTrend Micro Inc
US5175867A0.580NEIGHBOR-ASSISTED HANDOFF IN A CELLULAR COMMUNICATIONS SYSTEMGRANT1992-12-291991-03-1524689567GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6189042B10.580LAN internet connection having effective mechanism to classify LAN traffic and resolve address resolution protocol requestsGRANT2001-02-131997-04-0925645394GoodAlcatel SAAlcatel SA
US7149197B20.578Movable access points and repeaters for minimizing coverage and capacity constraints in a wireless communications network and a method for using the sameGRANT2006-12-122001-08-1525457207GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7796570B10.576Method for sparse table accounting and dissemination from a mobile subscriber device in a wireless mobile ad-hoc networkGRANT2010-09-142002-07-1242710995GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5919258A0.575Security system and method for computers connected to networkGRANT1999-07-061996-02-0812092194GoodHitachi LtdHitachi Ltd
US7349380B20.574System and method for providing an addressing and proxy scheme for facilitating mobility of wireless nodes between wired access points on a core network of a communications networkGRANT2008-03-252001-08-1525457211GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
EP0772322A20.574System and methods of routing packets through a network with changing topologyGRANT1997-05-071995-08-3124079881GoodMotorola Solutions IncMotorola Solutions Inc
US6957348B10.573Interoperability of vulnerability and intrusion detection systemsGRANT2005-10-182000-01-1035066308GoodNcircle Network Security IncTripwire Inc
US7031321B20.572Dynamic network and routing method for a dynamic networkGRANT2006-04-182001-06-117687652GoodKoninklijke Philips NVKoninklijke Philips NV
US5719859A0.572Time division multiple access radio communication systemGRANT1998-02-171995-09-1924113785GoodPanasonic CorpPanasonic Corp
US5745483A0.572Wireless computer network communication system and method having at least two groups of wireless terminalsGRANT1998-04-281994-09-2916974066GoodRicoh Co LtdRicoh Co Ltd
US5251203A0.568Hub privacy filter for active star CSMA/CD networkGRANT1993-10-051991-12-2325209088GoodXerox CorpXerox Corp
US20030233578A10.568Secure fault tolerant grouping wireless networks and network embedded systemsAPPLICATION2003-12-182002-05-3129739019GoodSRI International IncSRI International Inc, Cisco Systems Inc
US6754488B10.566System and method for detecting and locating access points in a wireless networkGRANT2004-06-222002-03-0132467300GoodNetworks Associates Technology IncMcAfee LLC
US6272129B10.566Dynamic allocation of wireless mobile nodes over an internet protocol (IP) networkGRANT2001-08-071999-01-1922877001Good3Com CorpUTStarcom Inc
US6765882B20.565Method and system for data packet collision avoidance in a wireless communication systemGRANT2004-07-202001-07-0225407193GoodMotorola Solutions IncGoogle Technology Holdings LLC
US7072323B20.564System and method for performing soft handoff in a wireless data networkGRANT2006-07-042001-08-1525457209GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6640253B20.561Dynamic logical control of network units in ad-hoc communications networksGRANT2003-10-282001-06-2725399887GoodSymbol Technologies LLCSymbol Technologies LLC
US7173922B20.561Multiple wireless local area networks occupying overlapping physical spacesGRANT2007-02-062000-03-1724106775GoodSymbol Technologies LLCSymbol Technologies LLC
US6359873B10.561Wireless LAN system and a transmitter-receiver in a wireless LAN systemGRANT2002-03-191997-08-1216704779GoodFujitsu LtdFujitsu Ltd
US7173923B20.560Security in multiple wireless local area networksGRANT2007-02-062000-03-1746280144GoodSymbol Technologies LLCSymbol Technologies LLC
US7283844B20.559Multi-beam antenna wireless network systemGRANT2007-10-162000-04-0426890042GoodAnntron IncAnntron Inc
US6895436B10.557Method and system for evaluating network securityGRANT2005-05-171999-07-0134560288GoodInternational Business Machines CorpInternational Business Machines Corp
US7902996B20.555Communication nodes for use with an ad-hoc networkGRANT2011-03-082002-01-1527617919GoodOlsonet Communications CorpIntel Corp
US6466608B10.555Frequency hopping medium access control protocol for a communication system having distributed synchronizationGRANT2002-10-151994-03-0322761039GoodProxim Wireless CorpGoogle LLC
US6609205B10.554Network intrusion detection signature analysis using decision graphsGRANT2003-08-191999-03-1827734147GoodCisco Technology IncCisco Technology Inc
US6728232B20.554System and method for auto-configuration and discovery of IP to MAC address mapping and gateway presence in wireless peer-to-peer ad-hoc routing networksGRANT2004-04-272002-03-1528041859GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5796942A0.553Method and apparatus for automated network-wide surveillance and security breach interventionGRANT1998-08-181996-11-2125013375GoodCA IncCAI Software LLC
EP1474935A20.550SELF-ORGANIZING HIERARCHICAL WIRELESS NETWORK FOR SURVEILLANCE AND CONTROLGRANT2004-11-102002-01-1026972342GoodRobert Bosch GmbHRobert Bosch GmbH
US8675647B10.549Non-broadcast multiple access inverse next hop resolution protocol (INNHRP)GRANT2014-03-181998-08-2622266320GoodRockstar Consortium US LPRPX Clearinghouse LLC
US6894985B20.549Monitoring link quality in a mobile ad hoc networkGRANT2005-05-172002-08-0531187751GoodHarris CorpStingray Ip Solutions LLC
US6519248B10.548Packet data network having distributed databaseGRANT2003-02-111998-07-2422399942GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US7068600B20.548Traffic policing in a mobile ad hoc networkGRANT2006-06-272002-04-2929249278GoodHarris CorpStingray Ip Solutions LLC
US7181765B20.547Method and apparatus for providing node security in a router of a packet networkGRANT2007-02-202001-10-1225524171GoodMotorola Solutions IncGoogle Technology Holdings LLC
US4947452A0.547Mobile communication systemGRANT1990-08-071988-01-1411641605GoodTokyo Electric Power Co Inc, Sumitomo Electric Industries LtdTokyo Electric Power Co Inc, Sumitomo Electric Industries Ltd
EP1344386A10.547AD HOC PEER-TO-PEER MOBILE RADIO ACCESS SYSTEM INTERFACED TO THE PSTN AND CELLULAR NETWORKSGRANT2003-09-172000-11-1326939166GoodMeshNetworks IncMeshNetworks Inc
US20070058599A10.546Method to sustain TCP connectionAPPLICATION2007-03-151997-04-2225284950GoodTelxon CorpSymbol Technologies LLC
US5748619A0.545Communication network providing wireless and hard-wired dynamic routingGRANT1998-05-051991-10-0127585017GoodIntermec Technologies CorpAvago Technologies International Sales Pte Ltd
US5697066A0.544Media access protocol for packet access within a radio cellGRANT1997-12-091996-03-0724452637GoodColumbia University of New YorkColumbia University of New York
US7907577B20.544Communication network providing wireless and hard-wired dynamic routingGRANT2011-03-151991-10-0127568147GoodBroadcom CorpAvago Technologies General IP Singapore Pte Ltd
US20020176437A10.543Wireless LAN with channel swapping between DFS access pointsAPPLICATION2002-11-282001-05-088181957GoodAgere Systems LLCAvago Technologies International Sales Pte Ltd
US6400752B10.541Wireless computer network communication system and method which determines an available spreading codeGRANT2002-06-041994-09-2929272159GoodRicoh Co LtdRicoh Co Ltd
US7016306B20.538System and method for performing multiple network routing and provisioning in overlapping wireless deploymentsGRANT2006-03-212002-05-1629418727GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7616961B20.538Allocating channels in a mobile ad hoc networkGRANT2009-11-102002-04-2929399207GoodHarris CorpStingray Ip Solutions LLC
US7035240B10.535Method for low-energy adaptive clustering hierarchyGRANT2006-04-252000-12-2736191088GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US7515568B20.535Neighborhood wireless protocol with switchable ad hoc and wide area network coverageGRANT2009-04-072001-12-1121766977GoodMotorola Solutions IncGoogle Technology Holdings LLC
US6362778B20.531Personal location detection systemGRANT2002-03-262000-03-2624136726Good
US6853628B20.529System for facilitating personal communications with multiple wireless transmit/receive unitsGRANT2005-02-082002-06-2829254308GoodInterDigital Technology CorpInterDigital Technology Corp
US6141544A0.528System and method for over the air activation in a wireless telecommunications networkGRANT2000-10-311998-11-3022746225GoodTelefonaktiebolaget LM Ericsson ABOptis Wireless Technology LLC
US8019836B20.528Wireless communication enabled meter and networkGRANT2011-09-132002-01-0239476401GoodMesh Comm LLCENDEAVOR MESHTECH Inc, F2vs Technologies LLC
US20020072329A10.527Scalable wireless network topology systems and methodsAPPLICATION2002-06-132000-09-0826924944GoodQuarterhill IncQuarterhill Inc
US20020035699A10.526Method and system for enabling seamless roaming in a wireless networkAPPLICATION2002-03-212000-07-2422823347GoodBluesocket IncBluesocket Inc
US7302704B10.525Excising compromised routers from an ad-hoc networkGRANT2007-11-272000-06-1638722092GoodBBN Technologies CorpRPX Corp, Tri County Excelsior Foundation
US6122759A0.525Method and apparatus for restoration of an ATM networkGRANT2000-09-191995-10-1024161867GoodNokia of America CorpNokia of America Corp
US7353018B20.525Enhanced wireless handset  including direct handset-to-handset communication modeGRANT2008-04-011998-06-1522246094GoodBertrum Technologies LLCBlue Sky Networks LLC
US7181768B10.524Computer intrusion detection system and method based on application monitoringGRANT2007-02-201999-10-2837745155GoodCigitalSynopsys Inc
US7379981B20.524Wireless communication enabled meter and networkGRANT2008-05-272000-01-3127391058GoodF2vs Technologies LLCENDEAVOR MESHTECH Inc
US7017185B10.523Method and system for maintaining network activity data for intrusion detectionGRANT2006-03-212000-12-2136045751GoodCisco Technology IncCisco Technology Inc
US8578015B20.521Tracking traffic in a mobile ad hoc networkGRANT2013-11-052002-04-2929249338GoodHarris CorpStingray Ip Solutions LLC
US20020032871A10.520Method and system for detecting  tracking and blocking denial of service attacks over a computer networkAPPLICATION2002-03-142000-09-0827499608GoodUniversity of MichiganUniversity of Michigan
US20030084323A10.519Network intrusion detection system and methodAPPLICATION2003-05-012001-10-3121700683GoodHewlett Packard CoHewlett Packard Development Co LP
US7171476B20.518Protocol and structure for self-organizing networkGRANT2007-01-302001-04-2023093038GoodMotorola Solutions IncArris Enterprises LLC
US6744740B20.517Network protocol for wireless devices utilizing location informationGRANT2004-06-012001-12-2121889230GoodMotorola Solutions IncGoogle Technology Holdings LLC
US20040157549A10.517Method for routing data in a mobile communication network and communications network device for carrying out such a methodAPPLICATION2004-08-122001-04-117681289GoodSiemens AGSiemens AG
US7068999B20.515System and method for detection of a rogue wireless access point in a wireless communication networkGRANT2006-06-272002-08-0231187737GoodSymbol Technologies LLCExtreme Networks Inc
US8156246B20.514Systems and methods for providing content and services on a network systemGRANT2012-04-101998-12-0842235157GoodNomadix IncGate Worldwide Holdings LLC
EP1185037A20.514Radio network  relay node  core node  relay transmission method used in the same and program thereofGRANT2002-03-062000-08-3027481566GoodNEC CorpNEC Corp
US6970444B20.512System and method for self propagating information in ad-hoc peer-to-peer networksGRANT2005-11-292002-05-1329548242GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6252883B10.512Home and personal data services overlay communications systemGRANT2001-06-261997-02-2727359013GoodALOHA Networks IncSUMMIT WIRELESS LLC, ALOHA Networks Inc
US20030179707A10.512MAC address learning and propagation in load balancing switch protocolsAPPLICATION2003-09-251999-01-1122859085GoodHewlett Packard Enterprise Development LPHewlett Packard Enterprise Development LP
US6104712A0.510Wireless communication network including plural migratory access nodesGRANT2000-08-151999-02-2222961317Good
US6954435B20.509Determining quality of service (QoS) routing for mobile ad hoc networksGRANT2005-10-112002-04-2929249279GoodHarris CorpStingray Ip Solutions LLC
US5978364A0.508Method for routing data packets within a wireless  packet-hopping network and a wireless network for implementing the sameGRANT1999-11-021996-02-2924438594GoodPhilips North America LLCPhilips North America LLC
US6304973B10.508Multi-level security network systemGRANT2001-10-161998-08-0622442031GoodCryptek Secure Communications LLCAPI Cryptek Inc
US7007102B20.508Admission control in a mobile ad hoc networkGRANT2006-02-282002-04-2929249157GoodHarris CorpStingray Ip Solutions LLC
US7089592B20.506Systems and methods for dynamic detection and prevention of electronic fraudGRANT2006-08-082001-03-1525203565GoodBrighterion IncBrighterion Inc
US7215638B10.505System and method to provide 911 access in voice over internet protocol systems without compromising network securityGRANT2007-05-082002-06-1938001053GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6981146B10.505Method of communications and communication network intrusion protection methods and intrusion attempt detection systemGRANT2005-12-271999-05-1734810886GoodInvicta Networks IncInvicta Networks Inc
US5027383A0.501Supervised  interactive alarm reporting systemGRANT1991-06-251987-06-1223212478GoodVersus Technology IncVersus Technology Inc
US6282546B10.501System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessmentGRANT2001-08-281998-06-3022318491GoodCisco Technology IncCisco Technology Inc
US6404772B10.500Voice and data wireless communications network and methodGRANT2002-06-112000-07-2724513158GoodSymbol Technologies LLCExtreme Networks Inc
US7042867B20.498System and method for determining physical location of a node in a wireless network during an authentication check of the nodeGRANT2006-05-092002-07-2931190761GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5825817A0.497Radio wave measuring apparatus for digital communication systemGRANT1998-10-201994-07-2226493739GoodAnritsu CorpAnritsu Corp
US7574208B20.497Method and apparatus for providing mobile and other intermittent connectivity in a computing environmentGRANT2009-08-111998-10-0937743856GoodNetMotion Wireless IncNetMotion Software Inc
US7921290B20.495Method and system for securely authenticating network access credentials for usersGRANT2011-04-052001-04-1826815732GoodiPass InciPass Inc
US7689716B20.494Systems and methods for providing dynamic network authorization  authentication and accountingGRANT2010-03-301998-12-0837863956GoodNomadix IncGate Worldwide Holdings LLC
US7346167B20.493Secure mobile ad-hoc network and related methodsGRANT2008-03-182002-05-1029400041GoodHarris CorpHuawei Technologies Co Ltd
US20030117985A10.492NETWORK SECURITY SYSTEM  COMPUTER  ACCESS POINT RECOGNIZING METHOD  ACCESS POINT CHECKING METHOD  PROGRAM  STORAGE MEDIUM  AND WIRELESS LAN DEVICEAPPLICATION2003-06-262001-12-2619188960GoodInternational Business Machines CorpLenovo PC International Ltd
US7293107B10.490Method and apparatus for providing mobile and other intermittent connectivity in a computing environmentGRANT2007-11-061998-10-0938653519GoodNetMotion Wireless IncNetMotion Software Inc
US20040028003A10.489System and method for management of a shared frequency bandAPPLICATION2004-02-122002-04-2246299191GoodCognio LLCCisco Technology Inc
US6580981B10.489System and method for providing wireless telematics store and forward messaging for peer-to-peer and peer-to-peer-to-infrastructure a communication networkGRANT2003-06-172002-04-1622402332GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7469341B20.488Method and system for associating a plurality of transaction data records generated in a service access systemGRANT2008-12-232001-04-1826816282GoodiPass InciPass Inc
US20040018839A10.486Protocol and structure for mobile nodes in a self-organizing communication networkAPPLICATION2004-01-292002-06-0629736171GoodMotorola Solutions IncMotorola Solutions Inc
US7882247B20.486Method and apparatus for providing secure connectivity in mobile and other intermittent computing environmentsGRANT2011-02-011999-06-1128044890GoodNetMotion Wireless IncNetMotion Software Inc
WO2001043467A10.486FLEXIBLE WIRELESS LAN ARCHITECTURE BASED ON A COMMUNICATION SERVERAPPLICATION2001-06-141999-12-0823817481Good
US7088727B10.485System and method for establishing network connection with unknown network and/or user deviceGRANT2006-08-081997-03-1225219872GoodNomadix IncGate Worldwide Holdings LLC
US7958226B20.485Identifying a computer deviceGRANT2011-06-072002-07-2936757997GoodOracle International CorpOracle International Corp
US6453345B20.485Network security and surveillance systemGRANT2002-09-171996-11-0626706050GoodDatadirect Networks IncComerica Bank California
US5345595A0.484Apparatus and method for detecting fraudulent telecommunication activityGRANT1994-09-061992-11-1225523108GoodCoral Systems IncAuthorize Net LLC
US20030117986A10.483Wireless local area network channel resource managementAPPLICATION2003-06-262001-12-2126955220GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US6081601A0.483Method of implementing connection security in a wireless networkGRANT2000-06-271998-01-088550306GoodNokia Networks OyNokia Technologies Oy
US20060203804A10.483Method and apparatus for routing data over multiple wireless networksAPPLICATION2006-09-142000-08-3124615147GoodPadcom IncNetMotion Wireless Holdings Inc
WO2004015906A20.483EFFICIENT MEMORY ALLOCATION IN A WIRELESS TRANSMIT/RECEIVER UNITAPPLICATION2004-02-192002-08-0931715902Good
US20050249185A10.482Routing in wireless networksAPPLICATION2005-11-102002-06-0732871635GoodEmber CorpEmber Corp
US5530909A0.481Method for Radio transmitting information using aircrafts as open transmission relaysGRANT1996-06-251993-04-029445832GoodThales Avionics SASThales Avionics SAS
US7433691B10.481System and method for enabling an access point in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access points to identify the location of subscriber deviceGRANT2008-10-072002-03-2539797353GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US20020112047A10.478System and method for wireless data terminal management using general packet radio service networkAPPLICATION2002-08-152000-12-0529248262GoodMformation Technologies IncMformation Software Technologies LLC
US5912882A0.477Method and apparatus for providing a private communication system in a public switched telephone networkGRANT1999-06-151996-02-0124383760GoodQualcomm IncQualcomm Inc
US6499107B10.477Method and system for adaptive network security using intelligent packet analysisGRANT2002-12-241998-12-2922834897GoodCisco Technology IncCisco Technology Inc
US7602782B20.477Apparatus and method for intelligent routing of data between a remote device and a host systemGRANT2009-10-131997-09-1725462463GoodPadcom Holdings IncNetMotion Wireless Holdings Inc
US6894991B20.476Integrated method for performing scheduling  routing and access control in a computer networkGRANT2005-05-172000-11-3024924669GoodGenuity Inc, Verizon Laboratories IncUniversity of Maryland at Baltimore, Genuity Inc, Verizon Patent and Licensing Inc
US7650425B20.475System and method for controlling communication between a host computer and communication devices associated with remote devices in an automated monitoring systemGRANT2010-01-191999-03-1827539869GoodSipco LLCLandis and Gyr Technologies LLC, Sipco LLC
US6807165B20.474Time division protocol for an ad-hoc  peer-to-peer radio network having coordinating channel access to shared parallel data channels with separate reservation channelGRANT2004-10-192000-11-0826938255GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6754188B10.474System and method for enabling a node in an ad-hoc packet-switched wireless communications network to route packets based on packet contentGRANT2004-06-222001-09-2825508860GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US20020059434A10.474Multi-mode controllerAPPLICATION2002-05-162000-06-2826909191GoodBroadcom CorpAvago Technologies International Sales Pte Ltd
US20050249186A10.474Routing in an asymmetrical link wireless networkAPPLICATION2005-11-102002-06-0735239369GoodEmber CorpEmber Corp
US6006090A0.474Providing roaming capability for mobile computers in a standard networkGRANT1999-12-211993-04-2821982514GoodProxim Wireless CorpGoogle LLC
US7433943B10.472Volume-based network management schemeGRANT2008-10-072001-12-2039797372GoodPacketeer IncCAI Software LLC
US6857009B10.470System and method for network access without reconfigurationGRANT2005-02-151999-10-2234118189GoodNomadix IncGate Worldwide Holdings LLC
US20030145228A10.469System and method of providing virus protection at a gatewayAPPLICATION2003-07-312002-01-3127609762GoodNokia OyjPiece Future Pte Ltd
US20060023676A10.469Port routingAPPLICATION2006-02-021995-06-0127787457GoodPadcom IncNetMotion Wireless Holdings Inc
US7606242B20.467Managed roaming for WLANSGRANT2009-10-202002-08-0231494304GoodWavelink CorpWAVELINK SOFTWARE LLC, Ivanti Inc
US7058018B10.466System and method for using per-packet receive signal strength indication and transmit power levels to compute path loss for a link for use in layer II routing in a wireless communication networkGRANT2006-06-062002-03-0627804088GoodMeshNetworks IncMeshNetworks Inc, Google Technology Holdings LLC
US6307843B10.466Ad hoc network of mobile hosts using link table for identifying wireless links and destination addressesGRANT2001-10-231997-07-1816580151GoodNEC CorpNEC Corp
US7106707B10.466System and method for performing code and frequency channel selection for combined CDMA/FDMA spread spectrum communication systemsGRANT2006-09-122001-12-2036951860GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7483403B20.466Protocol for reliable  self-organizing  low-power wireless network for security and building automation systemsGRANT2009-01-272002-01-1026972397GoodRobert Bosch GmbHRobert Bosch GmbH
US6987795B10.466System and method for selecting spreading codes based on multipath delay profile estimation for wireless transceivers in a communication networkGRANT2006-01-172002-04-0829248198GoodMeshNetworks IncMeshNetworks Inc
US6317831B10.465Method and apparatus for establishing a secure connection over a one-way data pathGRANT2001-11-131998-09-2122567565GoodOpenwave Systems IncUnwired Planet LLC
US6973580B10.463System and method for alerting computer users of digital security intrusionsGRANT2005-12-062000-07-1324466744GoodInternational Business Machines CorpInternational Business Machines Corp
US7181214B10.462System and method for determining the measure of mobility of a subscriber device in an ad-hoc wireless network with fixed wireless routers and wide area network (WAN) access pointsGRANT2007-02-202001-11-1325533046GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6590928B10.461Frequency hopping piconets in an uncoordinated wireless multi-user systemGRANT2003-07-081997-09-1725463144GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8000314B20.460Wireless network system and method for providing sameGRANT2011-08-161996-12-0632033783GoodIPCO LLCIPCO LLC
US5666662A0.459Method for detecting the location of a mobile terminalGRANT1997-09-091993-07-2316451579GoodNEC CorpNEC Corp
US7340772B20.458Systems and methods for continuing an operation interrupted from a reconnection between a client and serverGRANT2008-03-042001-06-1334437417GoodCitrix Systems IncCitrix Systems Inc
US7002949B20.458Bandwidth efficient source tracing (BEST) routing protocol for wireless networksGRANT2006-02-212000-06-1622790998GoodUniversity of CaliforniaUniversity of California
US7246232B20.458Methods and apparatus for scalable distributed management of wireless virtual private networksGRANT2007-07-172002-05-3129586358GoodSRI International IncCisco Systems Inc
US7697492B20.457Systems and methods for monitoring and controlling remote devicesGRANT2010-04-131998-06-2234714741GoodSipco LLCLandis and Gyr Technologies LLC, Sipco LLC
US6633835B10.457Prioritized data capture  classification and filtering in a network monitoring environmentGRANT2003-10-142002-01-1028789649GoodNetworks Associates Technology IncNetwork General Technology Corp
US6301668B10.456Method and system for adaptive network security using network vulnerability assessmentGRANT2001-10-091998-12-2922832087GoodCisco Technology IncCisco Technology Inc
US6487600B10.455System and method for supporting multimedia communications upon a dynamically configured member networkGRANT2002-11-261998-09-1226796774GoodXylon LLCXylon LLC
US8812654B20.455Method for internetworked hybrid wireless integrated network sensors (WINS)GRANT2014-08-191999-10-0627496316GoodBorgia Cummins LLCBenhov GmbH LLC
US5787154A0.455Universal authentication device for use over telephone linesGRANT1998-07-281996-07-1224724801GoodAT&T CorpAT&T Corp
US7581095B20.454Mobile-ad-hoc network including node authentication features and related methodsGRANT2009-08-252002-07-1730442907GoodHarris CorpStingray Ip Solutions LLC
US7412722B10.454Detection of softswitch attacksGRANT2008-08-122002-08-0839678852GoodVerizon Laboratories IncPalo Alto Networks Inc
US6046978A0.454Method for configuring and routing data within a wireless multihop network and a wireless network for implementing the sameGRANT2000-04-041996-10-1624955099GoodPhilips North America LLCPhilips North America LLC
US5648970A0.454Method and system for ordering out-of-sequence packetsGRANT1997-07-151996-03-0424428123GoodMotorola Solutions IncGoogle Technology Holdings LLC
US5412654A0.453Highly dynamic destination-sequenced destination vector routing for mobile computersGRANT1995-05-021994-01-1022656425GoodInternational Business Machines CorpInternational Business Machines Corp
US6871284B20.452Credential/condition assertion verification optimizationGRANT2005-03-222000-01-0726906794GoodSecurify IncMcAfee LLC
US6130892A0.452Nomadic translator or routerGRANT2000-10-101997-03-1221917021GoodNomadix IncNomadix Inc
US6363477B10.452Method for analyzing network application flows in an encrypted environmentGRANT2002-03-261998-08-2822503346Good3Com CorpHP Inc, Hewlett Packard Development Co LP
US5875179A0.449Method and apparatus for synchronized communication over wireless backbone architectureGRANT1999-02-231996-10-2924971353GoodProxim Wireless CorpProxim Wireless Corp, Google LLC
US6910135B10.448Method and apparatus for an intruder detection reporting and response systemGRANT2005-06-211999-07-0734652188GoodVerizon Corporate Services Group Inc, Genuity Inc, BBNT Solutions LLCVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US8000724B10.446Method and system for subnet-based transmission of mobile station locationGRANT2011-08-162001-11-1444358612GoodSprint Spectrum LPSprint Spectrum LP
US7277414B20.446Energy aware network managementGRANT2007-10-022001-08-0326903383GoodHoneywell International IncHoneywell International Inc
US7610027B20.444Method and apparatus to maintain specification absorption rate at a wireless nodeGRANT2009-10-272002-06-0529714984GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6961321B10.444Mobile terminal and method of controlling the sameGRANT2005-11-011997-08-0516598592GoodNEC CorpNEC Corp
US6977937B10.442Radio network routing apparatusGRANT2005-12-202000-04-1024178656GoodBBNT Solutions LLCRaytheon BBN Technologies Corp
US5745479A0.442Error detection in a wireless LAN environmentGRANT1998-04-281995-02-2423558718Good3Com CorpHP Inc, Hewlett Packard Development Co LP
US7023818B10.441Sending messages to radio-silent nodes in ad-hoc wireless networksGRANT2006-04-042000-07-2736102040GoodBBNT Solutions LLCRaytheon Co
US20020129138A10.441Wireless network site survey toolAPPLICATION2002-09-122001-03-0826956746GoodIntersil CorpIntellectual Ventures I LLC
US7242933B10.441Relocation in a communication systemGRANT2007-07-101999-09-1410860889GoodNokia OyjNokia Technologies Oy, Vringo Infrastructure Inc
US7613458B20.439System and method for enabling a radio node to selectably function as a router in a wireless communications networkGRANT2009-11-032001-08-2825473480GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US8209756B10.437Compound attack detection in a computer networkGRANT2012-06-262002-02-0846273023GoodJuniper Networks IncJuniper Networks Inc
US6529954B10.437Knowledge based expert analysis systemGRANT2003-03-041999-06-2923341812GoodWandel and Goltermann Techologies IncWandel and Goltermann Techologies Inc
US7522906B20.436Mobile unit configuration management for WLANsGRANT2009-04-212002-08-0933096479GoodWavelink CorpWAVELINK SOFTWARE LLC, Ivanti Inc
US8606314B20.436Portable communications device and methodGRANT2013-12-102002-05-2329548767GoodWounder GmbH LLCGula Consulting LLC
US6873839B20.436Prioritized-routing for an ad-hoc  peer-to-peer  mobile radio access systemGRANT2005-03-292000-11-1326939165GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7120456B10.436Wireless terminals with multiple transceiversGRANT2006-10-102001-11-0737072497GoodBBN Technologies CorpRaytheon BBN Technologies Corp
US7697420B10.434System and method for leveraging network topology for enhanced securityGRANT2010-04-132002-04-1542078223GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5987011A0.433Routing method for Ad-Hoc mobile networksGRANT1999-11-161996-08-3024835076GoodKING'S COLLEGETOH CHAI-KEONG, KING'S COLLEGE
US7653033B20.432Infrastructure for wireless LANsGRANT2010-01-261998-01-1622100484GoodSymbol Technologies LLCExtreme Networks Inc
US7243148B20.432System and method for network vulnerability detection and reportingGRANT2007-07-102002-01-1546299043GoodMcAfee LLCMcAfee LLC
US20020129264A10.432Computer security and management systemAPPLICATION2002-09-122001-01-1022992142GoodPsionic Software IncCisco Technology Inc
US6320948B10.431Telephony security systemGRANT2001-11-201998-12-1122782551GoodSecureLogix CorpSecureLogix Corp
US6795852B10.431Automatic network connectionGRANT2004-09-211995-09-1132993246GoodNomadix IncGate Worldwide Holdings LLC
US7151769B20.429Prioritized-routing for an ad-hoc  peer-to-peer  mobile radio access system based on battery-power levels and type of serviceGRANT2006-12-192001-03-2225217054GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7984157B20.427Persistent and reliable session securely traversing network components using an encapsulating protocolGRANT2011-07-192002-02-2634437418GoodCitrix Systems IncCitrix Systems Inc
US20030148767A10.427Radio communication system  control station  communication apparatus  communication control method  radio communciation method  and communication control programAPPLICATION2003-08-072001-05-0819018580GoodSony CorpSony Corp
US6157647A0.427Direct addressing between VLAN subnetsGRANT2000-12-051996-11-0624994478Good3Com CorpHP Inc, Hewlett Packard Enterprise Development LP
US5737318A0.427Method for initializing a wireless  packet-hopping networkGRANT1998-04-071995-12-2724317779GoodPhilips North America LLCPHLLIPS ELECTRONICS NORTH AMERICA Corp, Philips North America LLC
US6028933A0.425Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication networkGRANT2000-02-221997-04-1725274406GoodNokia of America CorpNokia of America Corp
US6049710A0.424Wireless prepaid telephone system with dispensable instrumentsGRANT2000-04-111997-06-1925373001GoodDot 23 Technologies LLCDot 23 Technologies LLC
US6791949B10.424Network protocol for wireless ad hoc networksGRANT2004-09-142000-04-2832927801GoodRaytheon CoRaytheon Co
US7200149B10.424System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks for the purpose of avoiding such potentially problem nodes in route selectionGRANT2007-04-032002-04-1229254266GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7284268B20.424System and method for a routing device to securely share network data with a host utilizing a hardware firewallGRANT2007-10-162002-05-1629552928GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7027426B20.423Multi-channel mobile ad hoc networkGRANT2006-04-112002-08-0531187801GoodHarris CorpStingray Ip Solutions LLC
US6804783B10.423Firewall providing enhanced network security and user transparencyGRANT2004-10-121996-10-1724947298GoodNetwork Engr SoftwareNETWORK ENGINEERING SOFTWARE Inc, Network Engr Software
US5241533A0.423Packet switching network with alternate trunking functionGRANT1993-08-311988-07-2127472136GoodHitachi Software Engineering Co Ltd, Hitachi LtdHitachi Software Engineering Co Ltd, Hitachi Ltd
EP1500231A20.421A SYSTEM AND METHOD FOR USING AN AD-HOC ROUTING ALGORITHM BASED ON ACTIVITY DETECTION IN AN AD-HOC NETWORKGRANT2005-01-262002-05-0129548223GoodMeshNetworks IncMeshNetworks Inc
US7505426B20.420Multi-channel mesh networkGRANT2009-03-172000-12-2935451569GoodTropos Networks IncABB Power Grids Switzerland AG
US6411608B20.420Method and apparatus for variable power control in wireless communications systemsGRANT2002-06-252000-07-1227396435GoodSymbol Technologies LLCExtreme Networks Inc
US6775258B10.419Apparatus  and associated method  for routing packet data in an ad hoc  wireless communication systemGRANT2004-08-102000-03-1724102914GoodNokia OyjCommworks Solutions LLC
US6996843B10.419System and method for detecting computer intrusionsGRANT2006-02-071999-08-3035734399GoodSymantec CorpNortonLifeLock Inc
US7739741B20.419Method and apparatus for network securityGRANT2010-06-152002-03-2828676401GoodBritish Telecommunications PLCBritish Telecommunications PLC
US7327697B10.418Method and system for dynamically assigning channels across multiple radios in a wireless LANGRANT2008-02-052002-06-2538988847GoodAirespace IncCisco Technology Inc
US8489063B20.418Systems and methods for providing emergency messages to a mobile deviceGRANT2013-07-162001-10-2444505548GoodSipco LLCSipco LLC
US6298250B10.417Wireless prepaid telephone system with extended capabilityGRANT2001-10-021997-06-1927128512GoodKUYPER REENA (ONE-EIGHTH INTEREST)Dot 23 Technologies LLC, BETTINA JEAN THOMPSON
US7152105B20.416System and method for network vulnerability detection and reportingGRANT2006-12-192002-01-1528791862GoodMcAfee LLCMcAfee LLC
US7065657B10.416Extensible intrusion detection systemGRANT2006-06-201999-08-3036586551GoodSymantec CorpNortonLifeLock Inc
US6009247A0.415Portable computer networkGRANT1999-12-281996-10-2924971457GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US6826697B10.415System and method for detecting buffer overflow attacksGRANT2004-11-301999-08-3033455892GoodSymantec CorpCAI Software LLC
US7664049B10.415Multilayer telecommunications networkGRANT2010-02-161999-09-2910861834GoodNokia OyjNokia Technologies Oy
US7171493B20.415Camouflage of network traffic to resist attackGRANT2007-01-302001-12-1921823594GoodCharles Stark Draper Laboratory IncCharles Stark Draper Laboratory Inc
US7032114B10.415System and method for using signatures to detect computer intrusionsGRANT2006-04-182000-08-3036147576GoodSymantec CorpNortonLifeLock Inc
US8666357B20.414System and method for transmitting an emergency message over an integrated wireless networkGRANT2014-03-042001-10-2421691681GoodSipco LLCSipco LLC
US7203962B10.414System and method for using timestamps to detect attacksGRANT2007-04-101999-08-3037904356GoodSymantec CorpNortonLifeLock Inc
US5854985A0.413Adaptive omni-modal radio apparatus and methodsGRANT1998-12-291993-12-1522605549GoodSpectrum Information Technologies IncANTON INNOVATIONS INC., MLR (A OF VIRGINIA) LLC LLC, SPECTRUM INFORMATION TECHNOLOGIES, Spectrum Information Technologies Inc
US6370648B10.413Computer network intrusion detectionGRANT2002-04-091998-12-0822775286GoodVisa International Service AssociationVisa International Service Association
US7061913B10.411Method and apparatus for delayed frame detection in third generation radio link protocolGRANT2006-06-132000-08-2524601615GoodQualcomm IncQualcomm Inc
US7107498B10.411System and method for identifying and maintaining reliable infrastructure links using bit error rate data in an ad-hoc communication networkGRANT2006-09-122002-04-1629248320GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7177295B10.410Wireless routing protocol for ad-hoc networksGRANT2007-02-132002-03-0837719722GoodScientific Res CorpSCIENTIFIC RESEARCH Corp, Scientific Res Corp
US6876643B10.410Clustering in wireless ad hoc networksGRANT2005-04-052000-08-0834375718GoodInternational Business Machines CorpInternational Business Machines Corp
US6728545B10.410System and method for computing the location of a mobile terminal in a wireless communications networkGRANT2004-04-272001-11-1625533767GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US8013732B20.410Systems and methods for monitoring and controlling remote devicesGRANT2011-09-061998-06-2223743117GoodSipco LLCSipco LLC
US7653030B20.408Generation broadband wireless internet  and associated method  thereforGRANT2010-01-262000-04-1226892080GoodNokia OyjNokia Oyj
US20020087882A10.407Mehtod and system for dynamic network intrusion monitoring detection and responseAPPLICATION2002-07-042000-03-1626885991GoodCounterpane Internet Security IncBT Americas Inc
US6289462B10.406Trusted compartmentalized computer operating systemGRANT2001-09-111998-09-2822287685GoodArgus Systems Group IncGeneral Dynamics Mission Systems Inc, Innovative Security Systems Inc
US6904021B20.405System and method for providing adaptive control of transmit power and data rate in an ad-hoc communication networkGRANT2005-06-072002-03-1528038784GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5787077A0.405Dynamic connection mapping in wireless ATM systemsGRANT1998-07-281996-06-0424640443GoodAscom Tech AGAscom Tech AG
US5870666A0.405Radio channel estimation based on BER and RSSIGRANT1999-02-091995-02-1312113939GoodNEC CorpNEC Corp
US5737328A0.404Network communication system with information rerouting capabilitiesGRANT1998-04-071995-10-0424149920GoodAironet Wireless Communications IncCisco Technology Inc
US6188681B10.404Method and apparatus for determining alternative second stationary access point in response to detecting impeded wireless connectionGRANT2001-02-131998-04-0121981759GoodSymbol Technologies LLCSymbol Technologies LLC
US7031288B20.403Reduced-overhead protocol for discovering new neighbor nodes and detecting the loss of existing neighbor nodes in a networkGRANT2006-04-182000-09-1226925634GoodSRI International IncSRI International Inc
US6453159B10.402Multi-level encryption system for wireless networkGRANT2002-09-171999-02-2522977521GoodTelxon CorpExtreme Networks Inc
US20030076841A10.402System and method of providing computer networkingAPPLICATION2003-04-242001-10-2225532467GoodPCTEL IncSmith Micro Software Inc, CYBERPIXIECOM
US20010030956A10.402Dynamic channel allocation in multiple-access communication systemsAPPLICATION2001-10-182000-01-0722638663GoodMobility Network Systems IncRateze Remote Mgmt LLC
US5673322A0.402System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networksGRANT1997-09-301996-03-2224462012GoodTelcordia Technologies IncRakuten Inc
US6980537B10.401Method and apparatus for communication network cluster formation and transmission of node link status messages with reduced protocol overhead trafficGRANT2005-12-271999-11-1235482663GoodITT Manufacturing Enterprises LLCStingray Ip Solutions LLC
US7116643B20.401Method and system for data in a collection and route discovery communication networkGRANT2006-10-032002-04-3029249494GoodMotorola Solutions IncArris Enterprises LLC
US5577209A0.400Apparatus and method for providing multi-level security for communication among computers and terminals on a networkGRANT1996-11-191991-07-1124927638GoodITT CorpRound Rock Research LLC
US7072432B20.399System and method for correcting the clock drift and maintaining the synchronization of low quality clocks in wireless networksGRANT2006-07-042002-07-0529999584GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7280545B10.399Complex adaptive routing system and method for a nodal communication networkGRANT2007-10-092001-12-2038562184GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6330244B10.399System for digital radio communication between a wireless lan and a PBXGRANT2001-12-111996-09-0521733216GoodSymbol Technologies LLCSymbol Technologies LLC
US6751455B10.398Power- and bandwidth-adaptive in-home wireless communications system with power-grid-powered agents and battery-powered clientsGRANT2004-06-151999-09-1733513538GoodUniversity of CaliforniaUniversity of California
US6580909B10.398Communications system and method based on the relative positions of mobile unitsGRANT2003-06-171999-08-268242464GoodInternational Business Machines CorpInternational Business Machines Corp
US7389354B10.397Preventing HTTP server attacksGRANT2008-06-172000-12-1139510511GoodCisco Technology IncCisco Technology Inc
US5297137A0.396Process for routing data packets around a multi-node communications networkGRANT1994-03-221991-01-3024598179GoodInternational Business Machines CorpInternational Business Machines Corp
US6014558A0.395Variable rate optional security measures method and apparatus for wireless communications networkGRANT2000-01-111998-12-2822829931GoodNorthern Telecom LtdRPX Clearinghouse LLC
US20020133622A10.394Switched fabric network and method of mapping nodes using batch requestsAPPLICATION2002-09-192001-01-1725059789GoodIntel CorpIntel Corp
US5903848A0.393Method of and apparatus for dynamic channel allocationGRANT1999-05-111996-03-2513358389GoodNEC CorpNEC Corp
US6615358B10.393Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented networkGRANT2003-09-021998-08-0727767351GoodNATIONAL SECURITY AGENCY United States,NATIONAL SECURITY AGENCY United States,
US6816460B10.392Location based routing for mobile ad-hoc networksGRANT2004-11-092000-03-1424094404GoodNokia of America CorpNokia of America Corp
US8499030B10.392Software and method that enables selection of one of a plurality of network communications service providersGRANT2013-07-301994-05-3122953138GoodIntellectual Ventures I LLCTmi Solutions LLC
US6829222B20.391Clusterhead selection in wireless ad hoc networksGRANT2004-12-072000-04-2526894987GoodUniversity of Texas SystemUniversity of Texas System
US5781857A0.390Method of establishing an email monitor responsive to a wireless communications system userGRANT1998-07-141996-06-2824710801GoodMotorola Solutions IncGoogle Technology Holdings LLC
US20040022186A10.390Methods  apparatus and program product for controlling network securityAPPLICATION2004-02-052002-07-3031186784GoodInternational Business Machines CorpInternational Business Machines Corp
US20020066034A10.389Distributed network security deception systemAPPLICATION2002-05-302000-10-2426935245Good
US7089428B20.389Method and system for managing computer security informationGRANT2006-08-082000-04-2822741198GoodInternet Security Systems IncInternational Business Machines Corp
US6205551B10.388Computer security using virus probingGRANT2001-03-201998-01-2921772149GoodNokia of America CorpNokia of America Corp, Provenance Asset Group LLC, Nokia USA Inc
US20020161755A10.388Method and apparatus for intercepting performance metric packets for improved security and intrusion detectionAPPLICATION2002-10-312001-04-3025293786GoodHuawei Technologies Co LtdHuawei Technologies Co Ltd
US5796832A0.388Wireless transaction and information systemGRANT1998-08-181995-11-1324228177GoodTransaction Technology IncTransaction Technology Inc, Citicorp Credit Services Inc USA
US6134587A0.387Method of setting up ad hoc local area network  method of communicating using said network  and terminal for use with said networkGRANT2000-10-171996-12-2718460638GoodNEC CorpRakuten Inc
US20040008681A10.386Prevention of denial of service attacksAPPLICATION2004-01-152002-07-1530115082GoodIntel CorpIntel Corp
US7360244B20.384Method for authenticating a user access requestGRANT2008-04-151996-02-0624385402GoodGraphOn CorpGraphOn Corp
US7280519B10.383Dynamic metropolitan area mobile networkGRANT2007-10-092002-01-0838562181Good
US7073198B10.382Method and system for detecting a vulnerability in a networkGRANT2006-07-041999-08-2636613932GoodNcircle Network Security IncTripwire Inc
US20040028123A10.382System and method for real-time spectrum analysis in a radio deviceAPPLICATION2004-02-122002-04-2231499746GoodCognio LLCCisco Technology Inc
US20040081192A10.379Transmission of multicast and broadcast multimedia services via a radio interfaceAPPLICATION2004-04-292001-10-198164644GoodNokia OyjNokia Solutions and Networks Oy
US5896499A0.378Embedded security processorGRANT1999-04-201997-02-2125187131GoodInternational Business Machines CorpInternational Business Machines Corp
EP1143665A20.377Unified policy management system with integrated policy enforcerGRANT2001-10-101999-06-1027585868GoodAlcatel Internetworking IncAlcatel Internetworking Inc
US20040136389A10.376Telecommunications networksAPPLICATION2004-07-152001-04-269913524GoodMarconi UK Intellectual Property LtdEricsson AB
EP0599632A20.375Apparatus and methods for wireless communicationsGRANT1994-06-011992-11-273776560GoodCommonwealth Scientific and Industrial Research Organization CSIROCommonwealth Scientific and Industrial Research Organization CSIRO
US6560213B10.375Wideband wireless access local loop based on millimeter wave technologyGRANT2003-05-061999-03-2423053682GoodHRL Laboratories LLCHRL Laboratories LLC
US5475625A0.374Method and arrangement for monitoring computer manipulationsGRANT1995-12-121991-01-1625900272GoodWincor Nixdorf International GmbHWincor Nixdorf International GmbH
US6845084B20.373Routing protocol selection for an ad hoc networkGRANT2005-01-182001-12-2821842474GoodTSYS Acquisition CorpAether Systems Inc, TeleCommunication Systems Inc
US5915226A0.371Prepaid smart card in a GSM based wireless telephone network and method for operating prepaid cardsGRANT1999-06-221996-04-1924545300GoodGemplus Card International SAGemplus SA
US7106703B10.370System and method for controlling pipeline delays by adjusting the power levels at which nodes in an ad-hoc network transmit data packetsGRANT2006-09-122002-05-2836951858GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
WO2002101561A10.370SYSTEM AND METHOD FOR LOAD BALANCING IN AD HOC NETWORKSAPPLICATION2002-12-192001-06-1326867125Good
US20020060994A10.370Transmission of carry-on objects using a wireless ad-hoc networking environmentAPPLICATION2002-05-232000-11-178170408GoodSony International Europe GmbHSony Deutschland GmbH
US7272404B20.369Position acquisitionGRANT2007-09-182000-02-0226243550GoodNokia OyjNokia Oyj
US6202156B10.368Remote access-controlled communicationGRANT2001-03-131997-09-1225456141GoodSun Microsystems IncOracle America Inc
US6351640B10.367Initiating a Telecommunications call to a party based on an identifying signal wirelessly transmitted by the party or its proxyGRANT2002-02-261995-12-1524294529GoodNokia of America CorpNokia of America Corp
US7251222B20.367Procedures for merging the mediation device protocol with a network layer protocolGRANT2007-07-312001-05-1526696522GoodMotorola Solutions IncArris Enterprises LLC
US6941474B20.367Firewall subscription service system and methodGRANT2005-09-062001-02-2025149544GoodInternational Business Machines CorpTrend Micro Inc
US7133526B20.364System and method for providing WLAN security through synchronized update and rotation of WEP keysGRANT2006-11-072002-05-2129554167GoodWavelink CorpWAVELINK SOFTWARE LLC, Ivanti Inc
US6446173B10.362Memory controller in a multi-port bridge for a local area networkGRANT2002-09-031997-09-1726699648GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6421731B10.362Dynamic next hop routing protocolGRANT2002-07-161996-10-2924979795GoodTelxon CorpBank One Corp, Extreme Networks Inc
US20030145232A10.360Denial of service attacks characterizationAPPLICATION2003-07-312002-01-3127610451GoodMazu Networks IncRiverbed Technology Inc
US4825206A0.360Automatic feedback of network topology dataGRANT1989-04-251985-11-0425164530GoodInternational Business Machines CorpInternational Business Machines Corp
US20030145233A10.358Architecture to thwart denial of service attacksAPPLICATION2003-07-312002-01-3127610456GoodMazu Networks IncRiverbed Technology Inc
US6260072B10.358Method and apparatus for adaptive routing in packet networksGRANT2001-07-101997-06-1225361978GoodNokia of America CorpNokia of America Corp
US8064412B20.357Systems and methods for monitoring conditionsGRANT2011-11-221998-06-2234557865GoodSipco LLCLandis and Gyr Technologies LLC, Sipco LLC
US6993325B10.355Method for facilitating electronic communicationsGRANT2006-01-312000-02-2924048156GoodEricsson IncEricsson Inc
US6832321B10.355Public network access server having a user-configurable firewallGRANT2004-12-141999-11-0223715748GoodAmerica Online IncFacebook Inc
US7139262B10.355Systems and methods for creating wireless small world networksGRANT2006-11-212000-05-1837423269GoodBBN Technologies CorpRaytheon BBN Technologies Corp
US7126996B20.355Adaptive transmission methodGRANT2006-10-242001-12-2821880243GoodMotorola Solutions IncGoogle Technology Holdings LLC
US5603054A0.354Method for triggering selected machine event when the triggering properties of the system are met and the triggering conditions of an identified user are perceivedGRANT1997-02-111993-12-0322583600GoodXerox CorpUBICOMM LLC
US6308053B10.353Recyclable wireless telephone unit with a secured activation switchGRANT2001-10-231997-06-1927397583GoodKUYPER REENA (ONE-EIGHTH INTEREST)RPX Corp
US20020031134A10.353Device to protect victim sites during denial of service attacksAPPLICATION2002-03-142000-09-0726924532GoodMazu Networks IncRiverbed Technology Inc
US6975613B10.350System and method for scheduling communication sessions in an ad-hoc networkGRANT2005-12-131999-12-0623805958GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6961310B20.349Multiple path reactive routing in a mobile ad hoc networkGRANT2005-11-012002-08-0831494766GoodHarris CorpStingray Ip Solutions LLC
US6751200B10.348Route discovery based piconet formingGRANT2004-06-151999-12-0632396594GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US5812865A0.347Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or usersGRANT1998-09-221993-12-0322582467GoodXerox CorpUBICOMM LLC
US6625462B10.347Method for establishing a radio communication and telecommunication networkGRANT2003-09-231998-02-056918618GoodIP2H AGIP2H AG
US20020035683A10.346Architecture to thwart denial of service attacksAPPLICATION2002-03-212000-09-0726924535GoodMazu Networks IncRiverbed Technology Inc
US20020032880A10.346Monitoring network traffic denial of service attacksAPPLICATION2002-03-142000-09-0726924534GoodMazu Networks IncRiverbed Technology Inc
US20020145978A10.345Mrp-based hybrid routing for mobile ad hoc networksAPPLICATION2002-10-102001-04-0525245121GoodTURBOWAVE IncTURBOWAVE Inc
US6990080B20.344Distributed topology control for wireless multi-hop sensor networksGRANT2006-01-242000-08-0726917721GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US20020103916A10.343Thwarting connection-based denial of service attacksAPPLICATION2002-08-012000-09-0726924536GoodRiverbed Technology IncRiverbed Technology Inc
US20030140246A10.343Location based security modification system and methodAPPLICATION2003-07-242002-01-1821981353GoodPalm IncQualcomm Inc
US20020095492A10.342Coordinated thwarting of denial of service attacksAPPLICATION2002-07-182000-09-0726924531GoodMazu Networks IncRiverbed Technology Inc
US6842439B20.342Free space optical terminal with ad hoc network back-up and associated methodsGRANT2005-01-112002-06-1729733358GoodHarris CorpHarris Corp
US20020032774A10.341Thwarting source address spoofing-based denial of service attacksAPPLICATION2002-03-142000-09-0726924533GoodMazu Networks IncRiverbed Technology Inc
US6088450A0.341Authentication system based on periodic challenge/response protocolGRANT2000-07-111996-04-1724542304GoodIntel CorpIntel Corp
US6842425B10.341Method and apparatus for optimizing routing through network nodesGRANT2005-01-112000-02-1424001871GoodNokia of America CorpNokia of America Corp
US20020112185A10.340Intrusion threat detectionAPPLICATION2002-08-152000-07-1026911484GoodOblix IncOracle International Corp, Oracle America Inc
US7764617B20.340Mobile ad-hoc network and methods for performing functions therein based upon weighted quality of service metricsGRANT2010-07-272002-04-2929717809GoodHarris CorpStingray Ip Solutions LLC
US6667957B10.340Adaptive routing method for a dynamic networkGRANT2003-12-231998-03-1428456533GoodUniversity of Maryland at Baltimore, US Department of NavyUniversity of Maryland at Baltimore, US Department of Navy
US5815553A0.338Apparatus for voice communication over local area networksGRANT1998-09-291996-10-0224895549GoodMcDonnell Douglas CorpCisco Systems Inc
EP1768332A20.337Hierarchical mobile ad-hoc network and methods for performing reactive routing thereinGRANT2007-03-282002-04-2929249250GoodHarris CorpHarris Corp
US5654958A0.337System and method for learning and dynamic routing of data in a mobile communication networkGRANT1997-08-051995-06-0523841462GoodMotorola Solutions IncMotorola Solutions Inc
US5237614A0.337Integrated network security systemGRANT1993-08-171991-06-0724861092GoodSecurity Dynamics Technologies IncEMC Corp
US6201814B10.337Telecommunications round-robin message deliveryGRANT2001-03-131996-12-1225071815GoodAT&T CorpShoretel Inc, AT&T Properties LLC
US6243758B10.336Internetwork multicast routing using flag bits indicating selective participation of mobile hosts in group activities within scopeGRANT2001-06-051996-06-0615358753GoodNEC CorpNEC Corp
US7448084B10.336System and methods for detecting intrusions in a computer system by monitoring operating system registry accessesGRANT2008-11-042002-01-2539916611GoodColumbia University of New YorkColumbia University of New York
US20020035628A10.336Statistics collection for network trafficAPPLICATION2002-03-212000-09-0726924530GoodMAZU METWORKS IncRiverbed Technology Inc
US5583996A0.335Method and system for shortcut routing over public data networksGRANT1996-12-101993-03-1621871562GoodTelcordia Technologies IncNytell Software LLC
US20040023674A10.334System and method for classifying signals using timing templates  power templates and other techniquesAPPLICATION2004-02-052002-07-3031192467GoodCognio LLCCisco Technology Inc
US20030145231A10.334Architecture to thwart denial of service attacksAPPLICATION2003-07-312002-01-3127610395GoodMazu Networks IncRiverbed Technology Inc
US20020075873A10.334Method of protecting traffic in a mesh networkAPPLICATION2002-06-202000-12-2024973461GoodNortel Networks LtdCiena Corp
US7054126B20.334System and method for improving the accuracy of time of arrival measurements in a wireless ad-hoc communications networkGRANT2006-05-302002-06-0529714965GoodMeshNetworks IncArris Enterprises LLC
US6914877B10.333System for alerting a network of changes in operational status of communication linksGRANT2005-07-051999-09-3034699794GoodNokia of America CorpNokia of America Corp, WSOU Investments LLC
EP1381191A10.333Node search method  node  mobile communication system  and computer program productGRANT2004-01-142002-07-1229728545GoodNTT Docomo IncNTT Docomo Inc
US20030041125A10.332Internet-deployed wireless systemAPPLICATION2003-02-272001-08-1625460765GoodWavelink CorpWavelink Corp
US6870846B20.331Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using dynamic source routing (DSR)GRANT2005-03-222002-04-2929249315GoodHarris CorpStingray Ip Solutions LLC
US8898746B20.331Method for managing access to protected computer resourcesGRANT2014-11-251997-06-1141118015GoodPrism Technologies LLCPrism Technologies LLC
US20020029288A10.330Internet protocol (IP) work group routingAPPLICATION2002-03-071995-07-1223993060Good
EP0713262A20.329Antenna apparatus and direction methodGRANT1996-05-221994-11-1823341352GoodSymbios IncMagnaChip Semiconductor Ltd
US7397789B20.329Providing routing paths for wireless devicesGRANT2008-07-082000-12-2925021217GoodTropos Networks IncABB Power Grids Switzerland AG
US7184421B10.328Method and apparatus for on demand multicast and unicast using controlled flood multicast communicationsGRANT2007-02-272001-12-2121819083GoodITT Manufacturing Enterprises LLCStingray Ip Solutions LLC
US5862345A0.328System for location multicasting and database management for mobile sessions in any computer subnetworks without using a home router of a home subnetworkGRANT1999-01-191996-02-0712035548GoodNEC CorpNEC Corp
US20030202494A10.326Establishing an ad hoc networkAPPLICATION2003-10-302002-04-2629248915GoodIntel CorpIntel Corp
US6185689B10.326Method for network self security assessmentGRANT2001-02-061998-06-2422297714GoodRichard S Carson and Assoc IncRichard S Carson and Assoc Inc
US20020184532A10.326Method and system for implementing security devices in a networkAPPLICATION2002-12-052001-05-3123134533GoodInternet Security Systems IncInternational Business Machines Corp
US6718394B20.326Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using ad-hoc on-demand distance vector routing (AODV)GRANT2004-04-062002-04-2929249330GoodHarris CorpStingray Ip Solutions LLC
US7080250B20.325System  method and program product for automatically collecting state information for computer system intrusion analysisGRANT2006-07-182002-03-2928673651GoodInternational Business Machines CorpTrend Micro Inc
US5652751A0.322Architecture for mobile radio networks with dynamically changing topology using virtual subnetsGRANT1997-07-291996-03-2624503111GoodHazeltine CorpTamiras Per Pte Ltd LLC
US5729695A0.321Method and device for acknowledgement of transmitted informationGRANT1998-03-171992-11-0920387749GoodPricer IncPricer Inc
US6990075B20.320Scalable unidirectional routing with zone routing protocol extensions for mobile AD-HOC networksGRANT2006-01-242000-02-1222670727GoodMRL Labs LLCHRL Laboratories LLC, MRL Labs LLC
US6628620B10.320Hierarchical modile ad-hoc network and methods for route error recovery thereinGRANT2003-09-302002-04-2928454055GoodHarris CorpStingray Ip Solutions LLC
US6304556B10.319Routing and mobility management protocols for ad-hoc networksGRANT2001-10-161998-08-2422482606GoodCornell Research Foundation IncCornell Research Foundation Inc
US5784298A0.314Apparatus and method for using finite state machines (FSMs) to monitor a serial data stream for characteristic patternsGRANT1998-07-211993-10-1522480190GoodInternational Business Machines CorpInternational Business Machines Corp
US5646936A0.314Knowledge based path set up and spare capacity assignment for distributed network restorationGRANT1997-07-081995-06-2223961534GoodMCI CorpMCI Corp, Verizon Patent and Licensing Inc
US7500015B20.313Mobile tracking system for QoS guaranteed paths  router device used for this system  mobile communications terminal  and control program for controlling router deviceGRANT2009-03-032001-12-1226625026GoodNTT Docomo IncNTT Docomo Inc
US6145083A0.310Methods and system for providing data and telephony securityGRANT2000-11-071998-04-2322585259GoodSiemens Information and Communication Networks IncRPX Corp
US7661129B20.309Secure traversal of network componentsGRANT2010-02-092002-02-2627753279GoodCitrix Systems IncCitrix Systems Inc
US20030204621A10.306Architecture to thwart denial of service attacksAPPLICATION2003-10-302002-04-3029249757GoodMazu Networks IncRiverbed Technology Inc
US6424673B10.305Method and apparatus in a wireless communication system for facilitating detection of  and synchronization with  a predetermined synchronization signalGRANT2002-07-232000-11-1024850936GoodMotorola Solutions IncGoogle Technology Holdings LLC
US4864559A0.305Method of multicast message distributionGRANT1989-09-051988-09-2722945729GoodDigital Equipment CorpHewlett Packard Development Co LP
US6016313A0.304System and method for broadband millimeter wave data communicationGRANT2000-01-181996-11-0724976051GoodWavtrace IncComerica Bank Canada, BWA Technology Inc
US5511168A0.303Virtual circuit manager for multicast messagingGRANT1996-04-231993-07-0122199601GoodDigital Equipment CorpEnterasys Networks Inc
US7106747B20.301Systems and methods for implementing second-link routing in packet switched networksGRANT2006-09-121999-11-3026863599GoodLevel 3 Communications LLCVerizon Corporate Services Group Inc, Level 3 Communications LLC
US6502205B10.300Asynchronous remote data mirroring systemGRANT2002-12-311993-04-2321975034GoodEMC CorpEMC Corp
US6301699B10.298Method for detecting buffer overflow for computer securityGRANT2001-10-091999-03-1826680349GoodCorekt Security Systems IncENTERCEPT SECURITY TECHNOLOGIES Inc, McAfee LLC
US7418274B20.297Reducing multipath fade of RF signals in a wireless data applicationGRANT2008-08-262001-01-2625088904GoodDell Products LPDell Products LP
US6070244A0.296Computer network security management systemGRANT2000-05-301997-11-1025512030GoodChase Manhattan Bank NAJPMorgan Chase Bank NA
US6535498B10.295Route updating in ad-hoc networksGRANT2003-03-181999-12-0623807668GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US5987609A0.295System for remotely securing/locking a stolen wireless device via an Email messageGRANT1999-11-161996-10-0317384616GoodToshiba CorpToshiba Corp
US6192051B10.295Network router search engine using compressed tree forwarding tableGRANT2001-02-201999-02-2622983357GoodRedstone Communications IncJuniper Networks Inc
US6460141B10.294Security and access management system for web-enabled and non-web-enabled applications and content on a computer networkGRANT2002-10-011998-10-2822667724GoodRSA Security LLCEMC Corp
WO2002052787A20.294MESSAGE SPLITTING AND SPATIALLY DIVERSIFIED MESSAGE ROUTING FOR INCREASING TRANSMISSION ASSURANCE AND DATA SECURITY OVER DISTRIBUTED NETWORKSAPPLICATION2002-07-042000-12-2222979192Good
US6704293B10.293Broadcast as a triggering mechanism for route discovery in ad-hoc networksGRANT2004-03-091999-12-0631888479GoodTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6058482A0.290Apparatus  method and system for providing network security for executable code in computer and communications networksGRANT2000-05-021998-05-2222185007GoodSun Microsystems IncOracle America Inc
US6070184A0.290Server-side asynchronous form managementGRANT2000-05-301997-08-2825442855GoodInternational Business Machines CorpInternational Business Machines Corp
US6470384B10.289Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environmentGRANT2002-10-221999-10-2826858325GoodNetworks Associates IncMcAfee LLC
US7349343B20.287Network routing and congestion controlGRANT2008-03-252000-03-318172880GoodBritish Telecommunications PLCBritish Telecommunications PLC
US6823378B20.286Method and apparatus in network management system for performance-based network protocol layer firewallGRANT2004-11-232000-12-1824975667GoodInternational Business Machines CorpInternational Business Machines Corp
US5918016A0.284System with program for automating protocol assignments when newly connected to varing computer network configurationsGRANT1999-06-291997-06-1025359617GoodTexas Instruments IncTexas Instruments Inc
US6839541B20.278Technique for establishing a virtual backbone in an ad hoc wireless networkGRANT2005-01-042001-12-0421723388GoodIllinois Inst of TechnologyIllinois Inst of Technology
US6158010A0.274System and method for maintaining security in a distributed computer networkGRANT2000-12-051998-10-2826803151GoodCrossLogix IncOracle International Corp
US6711153B10.274Route lookup engineGRANT2004-03-231999-12-1323824784GoodAscend Communications IncAscend Communications Inc, WSOU Investments LLC
US6088804A0.271Adaptive system and method for responding to computer network security attacksGRANT2000-07-111998-01-1221719077GoodMotorola Solutions IncGeneral Dynamics Mission Systems Inc
US6202157B10.271Computer network security system and method having unilateral enforceable security policy provisionGRANT2001-03-131997-12-0825532442GoodEntrust LtdEntrust Ltd
US6873848B20.270Method of call routing and connectionGRANT2005-03-291995-02-2723561560GoodJSDQ One LLCJSDQ MESH TECHNOLOGIES LLC
US20030198304A10.269System and method for real-time spectrum analysis in a communication deviceAPPLICATION2003-10-232002-04-2229220020GoodCognio LLCCisco Technology Inc
US8060013B10.267Establishing communications between devices within a mobile ad hoc networkGRANT2011-11-152001-08-1525459752GoodIntel CorpIntel Corp
US6035324A0.266Client-side asynchronous form managementGRANT2000-03-071997-08-2825443439GoodInternational Business Machines CorpInternational Business Machines Corp
US7403980B20.265Methods and apparatus for scalable  distributed management of virtual private networksGRANT2008-07-222000-11-0827400020GoodSRI International IncCisco Systems Inc
US6751677B10.265Method and apparatus for allowing a secure and transparent communication between a user device and servers of a data access network system via a firewall and a gatewayGRANT2004-06-151999-08-2432393219GoodHewlett Packard Development Co LPPlectrum LLC
US6151357A0.265Method and apparatus for displaying a visual indication of a transmission statusGRANT2000-11-211998-01-1621734686GoodAspect Communications CorpAspect Communications Corp, Wilmington Trust NA
US6754192B20.263Temporal transition network protocol (TTNP) in a mobile ad hoc networkGRANT2004-06-222002-04-2929249314GoodHarris CorpStingray Ip Solutions LLC
US5768312A0.263Method and apparatus for evaluating digital transmission systemsGRANT1998-06-161994-02-1812050814GoodLeader Electronics CorpLeader Electronics Corp
US6463468B10.261Targeted network video download interfaceGRANT2002-10-081999-06-0123260374GoodNetZero IncNetZero Inc
US6324656B10.261System and method for rules-driven multi-phase network vulnerability assessmentGRANT2001-11-271998-06-3022319446GoodCisco Technology IncCisco Technology Inc
US5809060A0.259High-data-rate wireless local-area networkGRANT1998-09-151994-02-1722732139GoodMicrilor IncSymbol Technologies LLC
US5671357A0.258Method and system for minimizing redundant topology updates using a black-out timerGRANT1997-09-231994-07-2923082660GoodMotorola Solutions IncMotorola Solutions Inc
US5497368A0.257Routing method for a hierarchical communications network  and a hierarchical communications network having improved routingGRANT1996-03-051993-08-1819862770GoodKoninklijke PTT Nederland NVKoninklijke KPN NV
US4912656A0.256Adaptive link assignment for a dynamic communication networkGRANT1990-03-271988-09-2622942361GoodHarris CorpHarris Corp
US7071814B10.254Contextually aware network announcements of peopleGRANT2006-07-042000-07-3124522492GoodMotorola Solutions IncGoogle Technology Holdings LLC
US6324647B10.252System  method and article of manufacture for security management in a development architecture frameworkGRANT2001-11-271999-08-3123532860GoodAccenture LLPAccenture Global Services Ltd
US7277963B20.249TCP proxy providing application layer modificationsGRANT2007-10-022002-06-2629999135GoodSandvine Inc ULCSandvine Corp Canada
US6385170B10.247Method and system for dynamically triggering flow-based quality of service shortcuts through a routerGRANT2002-05-071998-12-2922829674GoodAT&T CorpAT&T Corp
US7177652B10.247Method and apparatus for determining a pro-active region of a mobile ad hoc networkGRANT2007-02-132000-07-1137719750GoodMotorola Solutions IncGoogle Technology Holdings LLC
US6925572B10.239Firewall with two-phase filteringGRANT2005-08-022000-02-2828455014GoodMicrosoft CorpPirelli Pneumatici SpA, Microsoft Technology Licensing LLC
US6289214B10.238Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service emailGRANT2001-09-111998-05-2922203027GoodEricsson IncEricsson Inc
US5600794A0.236Method and apparatus for managing exchange of metrics in a computer network by exchanging only metrics used by a node in the networkGRANT1997-02-041995-08-0424034713GoodBay Networks IncAvaya Holdings Ltd
US20030200445A10.235Secure computer system using SIM card and control method thereofAPPLICATION2003-10-232002-04-1828673104GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
USRE40117E10.234Cellular radio routing systemGRANT2008-02-261998-09-1442753295GoodJSDQ MESH TECHNOLOGIES LLCJSDQ MESH TECHNOLOGIES LLC
US5051987A0.231Information transmission network including a plurality of nodes interconnected by links and methods for the transmission of information through a network including a plurality of nodes interconnected by linksGRANT1991-09-241988-07-2010640796GoodRACAL MILGO LtdRACAL-MILGO Ltd A BRITISH Co, RACAL MILGO Ltd
US20010030969A10.227Systems and methods for implementing global virtual circuits in packet-switched networksAPPLICATION2001-10-181999-11-3026863597GoodGenuity Inc, GTE Service Corp, BBNT Solutions LLCVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US6674790B10.224System and method employing concatenated spreading sequences to provide data modulated spread signals having increased data rates with extended multi-path delay spreadGRANT2004-01-062002-01-2427609124GoodMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6317829B10.221Public key cryptography based security system to facilitate secure roaming of usersGRANT2001-11-131998-06-1922276862GoodEntrust LtdEntrust Ltd
US20020010855A10.221System for determining web application vulnerabilitiesAPPLICATION2002-01-242000-03-0322686713GoodSanctum LtdFinjan Blue Inc
US7206281B20.218Calculating physical routes in a communication networkGRANT2007-04-172002-05-0329269438GoodCiena CorpCiena Corp
US20020009088A10.216Systems and methods for negotiating virtual circuit paths in packet switched networksAPPLICATION2002-01-241999-11-3026863598GoodGenuity Inc, GTE Service Corp, BBNT Solutions LLCVerizon Corporate Services Group Inc, Raytheon BBN Technologies Corp, Level 3 Communications LLC
US5822305A0.216Port-link configuration tracking method and apparatusGRANT1998-10-131995-10-3124197964GoodCabletron Systems IncComputer Associates Think Inc, Concord Communications LLC
US20020090952A10.213Location of devices using wireless network nodesAPPLICATION2002-07-112001-01-0825047514GoodHewlett Packard CoHewlett Packard Development Co LP
US6195691B10.211Method and apparatus for creating and using dynamic universal resource locatorsGRANT2001-02-271996-09-1724872271GoodNational Systems CorpIPDEV Co
US5754774A0.211Client/server communication systemGRANT1998-05-191996-02-1524408840GoodInternational Business Machines CorpInternational Business Machines Corp
US20020101837A10.208Method and apparatus for efficient use of communication resources in a data communication system under overload conditionsAPPLICATION2002-08-012001-01-3125099462GoodQualcomm IncQualcomm Inc
US7386880B20.205Web server employing multi-homed  modular frameworkGRANT2008-06-101996-02-0624430672GoodGraphOn CorpGraphOn Corp
US5117236A0.191Antenna pattern selection for optimized communicationsGRANT1992-05-261990-10-1924407626GoodMotorola Solutions IncMotorola Solutions Inc
WO1998059428A10.186WIRELESS COMMUNICATIONS SYSTEM FOR TRANSMITTING AND RECEIVING DATA WITH INCREASED DATA RATES AND ROBUSTNESSAPPLICATION1998-12-301997-06-2321965664Good
US4987536A0.185Communication system for sending an identical routing tree to all connected nodes to establish a shortest route and transmitting messages thereafterGRANT1991-01-221988-05-1222713449GoodCodex CorpMotorola Solutions Inc
EP0432647A20.184Mobile antenna systemGRANT1991-06-191989-12-1127339873GoodToyota Central R&D Labs IncToyota Central R&D Labs Inc
US8117298B10.182Multi-homed web serverGRANT2012-02-141996-02-2635600761GoodGraphOn CorpGraphOn Corp
US20050063337A10.178Node selecting methodAPPLICATION2005-03-242001-12-2811738099GoodNokia OyjNokia Oyj
US7245619B10.178Method and apparatus for managing routesGRANT2007-07-172002-05-3138235614GoodExtreme Networks IncRPX Corp
US6122258A0.172Method for creating a numbering plan-independent directory structure for telecommunications applicationsGRANT2000-09-191997-08-2925444776GoodNortel Networks CorpRPX Clearinghouse LLC
US6813485B20.119Method and system for down-converting and up-converting an electromagnetic signal  and transforms for sameGRANT2004-11-021998-10-2127538943GoodParkerVision IncParkerVision Inc
TW563308BNRA system and method of repetitive transmission of frames for frame-based communicationsGRANT2003-11-212001-01-1126948602Good
TW515179BNRSegmentation and reassembly of data framesGRANT2002-12-212000-03-3127789272Good
KR100930637B1NRNo titleGRANT2009-12-092001-06-1423147669Good
FR2778809A1NRNo titleGRANT1999-11-191998-05-189526453GoodInstitut National de Recherche en Informatique et en Automatique INRIAConversant Intellectual Property Management Inc
DE19946017B4NRNo titleGRANT2007-04-121998-10-223520783GoodATB AUTOMATISIERUNGSTECHNIK GmbH and Co KGATB AUTOMATISIERUNGSTECHNIK GmbH and Co KG
US4951029A0.587Micro-programmable security systemGRANT1990-08-211988-02-1622560020FairInteractive Technologies IncCarrier Fire and Security Americas Corp
US6281790B10.567Method and apparatus for remotely monitoring a siteGRANT2001-08-281999-09-0123530132FairNet Talon Security Systems IncNetTalon Security Systems Inc, Net Talon Security Systems Inc
US6799047B10.543Locating and tracking a user in a wireless network through environmentally profiled dataGRANT2004-09-281999-02-2532993397FairMicrosoft CorpMicrosoft Technology Licensing LLC
US6253064B10.539Terminal based traffic management and security surveillance system for aircraft and other commercial vehiclesGRANT2001-06-261999-02-2522977812Faire-Watch Ince-Watch Inc
US5892442A0.519Two-way pager alarm systemGRANT1999-04-061997-01-2925150532FairNapco Security Systems IncNapco Security Systems Inc
US7054296B10.516Wireless local area network (WLAN) technology and applications including techniques of universal frequency translationGRANT2006-05-301999-08-0436462700FairParkerVision IncParkerVision Inc
US6104785A0.468Subscriber control unit for united home security systemGRANT2000-08-151999-01-2026052055FairTempa Communication IncFormosa Electronic Industries Inc
US6014557A0.462Apparatus and methods for providing wireless system fraud and visibility dataGRANT2000-01-111996-03-1424467480FairBellSouth Intellectual Property CorpAT&T Delaware Intellectual Property Inc
US8613053B20.457System and method for authorizing a portable communication deviceGRANT2013-12-171998-12-0845528060FairNomadix IncGate Worldwide Holdings LLC
US6420973B20.452Wireless smoke detection systemGRANT2002-07-161999-01-2322888562Fair
US6362736B10.446Method and apparatus for automatic recovery of a stolen objectGRANT2002-03-262000-01-0423895384FairNokia of America CorpAlcatel Lucent SAS, Sound View Innovations LLC
US7167715B20.443System and method for determining relative positioning in AD-HOC networksGRANT2007-01-232002-05-1729553519FairMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US8171136B20.430System and method for transmitting pollution information over an integrated wireless networkGRANT2012-05-012001-10-3021802335FairSipco LLCSipco LLC
US5682142A0.428Electronic control system/networkGRANT1997-10-281994-07-2923083961FairID Systems IncID Systems Inc
US10489449B20.414Computer accepting voice input and/or generating audible outputGRANT2019-11-262002-05-2367057695FairGula Consulting LLCGula Consulting LLC
US7072618B10.407Adaptive threshold selection system and method for detection of a signal in the presence of interferenceGRANT2006-07-042001-12-2136613831FairMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US6288739B10.392Distributed video communications systemGRANT2001-09-111997-09-0525452947FairIntelect Systems CorpTeraForce Tech Corp
US6327570B10.376Personal business service system and methodGRANT2001-12-041998-11-0622690219FairIII Holdings 1 LLCIII Holdings 1 LLC
US8410931B20.375Mobile inventory unit monitoring systems and methodsGRANT2013-04-021998-06-2236815114FairSipco LLCSipco LLC
US6028551A0.373Micro-miniature beacon transmit-only geo-location emergency system for personal securityGRANT2000-02-221994-12-1326999030Fair
US20020059420A10.365Networked position multiple tracking processAPPLICATION2002-05-162000-09-0926925177FairAmerican GNC CorpAmerican GNC Corp
US6310549B10.364Wireless security systemGRANT2001-10-302000-08-2924613220FairDigitech InternationalCHAMBERLAIN PROFESSIONAL PRODUCTS Inc, PREFERRED TECHNOLOGY SYSTEMS LLC, Source Pti Opco LLC
US8032409B10.356Enhanced visibility during installation management in a network-based supply chain environmentGRANT2011-10-041999-11-2244676810FairAccenture Global Services LtdAccenture Global Services Ltd
US20040203380A10.352Method and wireless terminal for generating and maintaining a relative positioning systemAPPLICATION2004-10-142000-07-0322804614FairEcole Polytechnique Federale de Lausanne EPFLEcole Polytechnique Federale de Lausanne EPFL
US5088032A0.350Method and apparatus for routing communications among computer networksGRANT1992-02-111988-01-2922531929FairCisco Systems IncCisco Technology Inc
US5909442A0.343Intelligent network access to obscure and remote servicesGRANT1999-06-011995-01-1326306326FairGPT LtdEricsson AB
US5393965A0.342Flexible merchandise checkout and inventory management systemGRANT1995-02-281990-11-1327086822FairSymbol Technologies LLCSymbol Technologies LLC
US5866888A0.338Traveler security and luggage control systemGRANT1999-02-021990-11-2027417168FairSymbol Technologies LLCSymbol Technologies LLC
US6285318B10.336Micro-miniature beacon transmit-only geo-location emergency system for personal securityGRANT2001-09-041994-12-1327368073Fair
US5646389A0.330Inventory management system using coded re-order informationGRANT1997-07-081990-11-1327541233FairSymbol Technologies LLCSymbol Technologies LLC
EP1314284A20.324AUTOMATICALLY CONFIGURABLE TELECOMMUNICATIONS SWITCHING NETWORKGRANT2003-05-282000-07-1724473491FairRedcom Laboratories IncRedcom Laboratories Inc
US20030217189A10.323Event data acquisitionAPPLICATION2003-11-202002-05-1529418954FairMicrosoft CorpMicrosoft Technology Licensing LLC
US7046962B10.322System and method for improving the quality of range measurement based upon historical dataGRANT2006-05-162002-07-1836318230FairMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US7136587B10.320System and method for providing simulated hardware-in-the-loop testing of wireless communications networksGRANT2006-11-142001-11-1537397745FairMeshNetworks IncMeshNetworks Inc
US7519729B20.300Method and apparatus for monitoring remote devices through a local monitoring station and communicating with a central station supporting multiple manufacturersGRANT2009-04-142002-02-2735188380FairRicoh Co LtdRicoh Co Ltd
US5638357A0.294Distributed method for periodical routing verification test schedulingGRANT1997-06-101995-08-2524069243FairTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US6512616B10.281Optical packet switchGRANT2003-01-281998-11-3018327696FairNEC CorpNEC Corp
US20030192055A10.280Access point for local area radio communication and radio communication system using the sameAPPLICATION2003-10-092002-04-0328672122FairSharp CorpSharp Corp
US6539207B10.271Component for a wireless communications equipment cardGRANT2003-03-252000-06-2724418617FairSymbol Technologies LLCSymbol Technologies LLC
US5526414A0.271Dynamically controlled routing using virtual nodesGRANT1996-06-111994-10-2623286689FairNorthern Telecom LtdRPX Clearinghouse LLC
US6598003B10.259Power and environmental condition monitoring system and methodGRANT2003-07-222000-10-3124824378FairRX Monitoring Services LLCRX Monitoring Services LLC
US5377344A0.257Selective memory transaction monitor systemGRANT1994-12-271991-07-3124973060FairToyo CorpToyo Corp
US6263358B10.254Scheduler for a software system having means for allocating tasksGRANT2001-07-171997-07-258229436FairBritish Telecommunications PLCBritish Telecommunications PLC
US6119230A0.245Distributed dynamic security capabilitiesGRANT2000-09-121997-10-0125479828FairMicro Focus Software IncMicro Focus Software Inc
US6102284A0.242Cradle for holding a deviceGRANT2000-08-151997-04-2325285024FairLXE LLCTouchpoint Medical Inc
US5959287A0.236Apparatus and method for supporting a cradleGRANT1999-09-281997-04-2325278711FairLXE LLCTouchpoint Medical Inc
US5877812A0.236Method and apparatus for increasing channel utilization for digital video transmissionGRANT1999-03-021995-11-2124241858FairImedia CorpTerayon Corp, Google Technology Holdings LLC
US5991708A0.236Performance monitor and method for performance monitoring within a data processing systemGRANT1999-11-231997-07-0725393934FairInternational Business Machines CorpGoogle LLC
US6300902B10.230Personalized locator method and apparatusGRANT2001-10-091999-02-1022935912FairAT&T CorpRakuten Inc
US5978919A0.229Mobile computer and a method for controlling in a mobile computerGRANT1999-11-021996-09-1817147630FairToshiba CorpToshiba Corp
US20040066311A10.217Interactive user interface for a revenue meterAPPLICATION2004-04-081999-08-0923460776FairPower Measurement LtdPower Measurement Ltd
US5970439A0.214Performance monitoring in a data processing systemGRANT1999-10-191997-03-1325221177FairInternational Business Machines CorpInternational Business Machines Corp
US6567770B20.212Remote semiconductor microscopyGRANT2003-05-201998-04-2327374359FairMicron Technology IncMicron Technology Inc
US20020021745A10.208Multi-channel-bandwidth frequency-hopping systemAPPLICATION2002-02-212000-04-0722722147FairProxim Wireless CorpProxim Wireless Corp
US7853833B10.190Method and apparatus for enhancing reliability of automated data processingGRANT2010-12-142000-09-0824642850FairCorel CorpCorel Corp, JPMorgan Chase Bank NA
US7584425B20.187Systems and methods for generating reportsGRANT2009-09-012001-07-3123194605FairVerizon Business Global LLCVerizon Patent and Licensing Inc
US6141778A0.187Method and apparatus for automating security functions in a computer systemGRANT2000-10-311998-06-2922312930FairMCI Communications CorpVerizon Patent and Licensing Inc
US6617990B10.184Digital-to-analog converter using pseudo-random sequences and a method for using the sameGRANT2003-09-092002-03-0627787654FairMeshNetworks IncMeshNetworks Inc
US6272172B10.169Measurement acquisition and display apparatusGRANT2001-08-071998-03-3121979982FairTektronix IncTektronix Inc
US6332117B10.168General event stamping schemeGRANT2001-12-181998-10-2222646922FairInternational Business Machines CorpInternational Business Machines Corp
US5077753A0.159RADIO COMMUNICATION SYSTEM USING SPREAD SPECTRUM TECHNIQUESGRANT1991-12-311990-04-0924014760FairProxim Wireless CorpProxim Wireless Corp
US6825781B20.147Method and system for compressing structured descriptions of documentsGRANT2004-11-302001-02-0523012331FairExpway SAExpway SA
US7145903B20.146Multi-master bus architecture for system-on-chip designsGRANT2006-12-052001-09-0625487378FairMeshNetworks IncMeshNetworks Inc, Arris Enterprises LLC
US5913174A0.129Connectorized antenna for wireless LAN PCMCIA card radiosGRANT1999-06-151996-06-1924676388FairProxim Wireless CorpGoogle LLC
US6175814B10.124Apparatus for determining the instantaneous average number of instructions processedGRANT2001-01-161997-11-2625525125FairCompaq Computer CorpSamsung Electronics Co Ltd
WO1997022289A10.046DRYING CUBICLEAPPLICATION1997-06-261995-12-199485637Fair
TW515176BNRISUP/IP signal processing systemGRANT2002-12-212001-06-1827786828Fair
JP2002091683ANRCOORDINATE DETECTING METHOD  COORDINATE INPUT/DETECTION DEVICE  ELECTRONIC BLACKBOARD SYSTEM AND STORAGE MEDIUMAPPLICATION2002-03-292000-09-2018768707Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityNARROW
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
630
Recommended Classes
158
Government Assigned Classes
5
CPC
Title
Score
H04L63/1408by monitoring network traffic | monitoring network traffic | per se|  | (ref: H04L43/00)2.447
H04L63/1416Event detection  e.g. attack signature detection2.307
H04L1/00Arrangements for detecting or preventing errors in the information received | correcting synchronisation | (ref: H04L7/00)| | | for digital computers | (ref: G06F11/00)|  | arrangements in the transmission path | (ref: H04B)2.008
H04L63/123received data contents  e.g. message integrity1.830
H04W74/0816carrier sensing with collision avoidance1.199
H04W74/02Hybrid access techniques1.152
H04W74/0808using carrier sensing  e.g. as in CSMA1.095
H04W16/14Spectrum sharing arrangements | between different networks1.076
H04W74/08Non-scheduled | or contention based|  access  e.g. random access  ALOHA  CSMA [Carrier Sense Multiple Access]1.076
H04W74/04Scheduled | or contention-free|  access1.073
H04W74/0841with collision treatment1.046
H04L12/413with random access  e.g. carrier-sense multiple-access with collision detection (CSMA-CD)1.042
H04W24/04Arrangements for maintaining operational condition1.019
H04W72/1284in the uplink  i.e. from terminal to network1.008
H04W74/00Wireless channel access  e.g. scheduled or random access0.983
H04W40/00Communication routing or communication path finding0.976
H04W28/0289Congestion control | performing reselection for handling the traffic | (ref: H04W36/22)| | load shedding arrangements in network planning | (ref: H04W16/08)| | dynamic wireless traffic scheduling | (ref: H04W72/12)0.973
H04W48/16Discovering  processing access restriction or access information0.971
H04W74/0825carrier sensing with collision detection0.970
H04W48/08Access restriction or access information delivery  e.g. discovery data delivery0.970
H04J3/06Synchronising arrangements | for television systems | (ref: H04N5/04)| | bit-synchronisation | (ref: H04L7/00)0.969
H04W72/082using the level of interference0.967
H04B7/12Frequency diversity0.967
G08C17/02using a radio link0.966
H02J50/20using microwaves or radio frequency waves0.966
H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation | means for verifying the identity or the authority of a user of a secure or secret communication system | (ref: H04L9/32)0.963
H04W74/0858collision detection0.956
H04W88/10adapted for operation in multiple networks  e.g. multi-mode access points0.954
H04W28/14using intermediate storage0.954
H04L12/417with deterministic access  e.g. token passing0.953
H04W72/0406involving control information exchange between nodes0.947
H04L1/0072Error control for data other than payload data  e.g. control data0.947
H04L47/10Flow control or congestion control0.946
H04L29/06characterised by a protocol0.942
H04K3/65using deceptive jamming or spoofing  e.g. transmission of false signals for premature triggering of RCIED  for forced connection or disconnection to/from a network or for generation of dummy target signal0.942
H04W84/12WLAN [Wireless Local Area Networks]0.940
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)0.940
H04W40/248Connectivity information update0.939
H04L5/0007the frequencies being orthogonal  e.g. OFDM(A)  DMT0.938
H04W74/06using polling0.937
H04L43/00Arrangements for monitoring or testing packet switching networks | networking arrangements or communications protocols for supporting networked applications for tracking the activity of the application user | (ref: H04L67/22)| | monitoring of computing systems | (ref: G06F11/30)| | monitoring of computer activity | (ref: G06F11/34)0.937
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)0.936
H04L27/2602Signal structure0.931
H04W72/1252based on load0.929
H04L1/0002by adapting the transmission rate0.925
H04L63/1458Denial of Service0.918
H04L63/14for detecting or protecting against malicious traffic0.916
H04W8/18Processing of user or subscriber data  e.g. subscribed services  user preferences or user profiles| Transfer of user or subscriber data0.916
H04W72/048where an allocation plan is defined based on terminal or device properties0.914
H04W52/0219where the power saving management affects multiple terminals0.913
H04L41/0893Assignment of logical groupings to network elements| Policy based network management or configuration0.913
H04W92/18between terminal devices0.908
H04W28/16Central resource management| Negotiation of resources | or communication parameters|   e.g. negotiating bandwidth or QoS [Quality of Service]0.907
H04W74/002Transmission of channel access control information0.906
H04W74/0833using a random access procedure0.901
H04L12/1886with traffic restrictions for efficiency improvement  e.g. involving subnets or subdomains0.901
H04L12/4035in which slots of a TDMA packet structure are assigned based on a contention resolution carried out at a master unit | TDM/TDMA multiplex systems | per se|  | (ref: H04J3/1694)| | hybrid switching systems | (ref: H04L12/64)0.899
H04L12/4135using bit-wise arbitration0.899
H04L61/6022Layer 2 addresses  e.g. medium access control [MAC] addresses0.898
H04W12/12Fraud detection0.898
H04W72/042in downlink direction of a wireless link  i.e. towards terminal0.897
H04W28/10Flow control | between communication endpoints0.897
H04L1/188Time-out mechanisms0.896
H04K3/43characterized by the control of the jamming power  signal-to-noise ratio or geographic coverage area0.895
H04L1/06using space diversity0.894
H04L1/1685the supervisory signal being transmitted in response to a specific request  e.g. to a polling signal0.893
H04W48/04based on user or terminal location or mobility data  e.g. moving direction  speed0.892
H04W28/18Negotiating wireless communication parameters0.889
H04W74/0891for synchronized access0.888
H04L1/1607Details of the supervisory signal0.888
H04W40/24Connectivity information management  e.g. connectivity discovery or connectivity update0.887
H04W72/04Wireless resource allocation0.887
H04W24/10Scheduling measurement reports | | Arrangements for measurement reports0.885
H04L5/0048Allocation of pilot signals  i.e. of signals known to the receiver0.885
H04W4/025using location based information parameters0.885
H04B7/0452Multi-user MIMO systems0.885
H04W72/046the resource being in the space domain  e.g. beams0.884
H04W72/02Selection of wireless resources by user or terminal0.883
H04W28/26Resource reservation0.882
H04W52/0206in access points  e.g. base stations | access point devices | per se|  | (ref: H04W88/08)0.882
H04L1/1893Physical mapping arrangements | physical resource mapping in general | (ref: H04L5/00)0.882
H04W52/265taking into account the quality of service QoS0.880
H04W72/1289in the downlink  i.e. towards the terminal0.879
H04L63/1441Countermeasures against malicious traffic | countermeasures against attacks on cryptographic mechanisms | (ref: H04L9/002)0.879
H04W74/0875with assigned priorities based access0.879
A61F7/08Warming pads  pans or mats | (ref: A61F7/02)|  takes precedence| Hot-water bottles0.879
H04L12/4625Single bridge functionality  e.g. connection of two networks over a single bridge0.878
H04W99/00Subject matter not provided for in other groups of this subclass0.878
H04W88/08Access point devices0.878
H04W4/06Selective distribution of broadcast services  e.g. multimedia broadcast multicast service [MBMS]| Services to user groups| One-way selective calling services0.877
H04W72/0446the resource being a slot  sub-slot or frame0.872
H04L69/04Protocols for data compression | compression in general | (ref: H03M7/30)| | reduction of the amount or size of exchanged application data at an intermediate network processing stage | (ref: H04L67/2828)| | optimizing  e.g. header compression  information sizing in wireless communication networks | (ref: H04W28/06)0.871
H04W28/02Traffic management  e.g. flow control or congestion control0.870
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.870
H04W84/18Self-organising networks  e.g. ad-hoc networks or sensor networks0.867
H04L29/12273involving timing and renewal aspects0.866
H04W72/1242based on precedence or priority of the traffic information0.866
H04L63/20for managing network security| network security policies in general | filtering policies | (ref: H04L63/0227)0.865
H04L65/80QoS aspects | monitoring of the downstream path of a video distribution network | (ref: H04N21/2402)|   | (ref: H04N21/44209)| | network service management  ensuring proper service fulfillment according to an agreement or contract between two parties  e.g. between an IT-provider and a customer | (ref: H04L41/50)| | monitoring arrangements  testing arrangements  with monitoring of QoS metrics | (ref: H04L43/08)| | traffic-type related flow control in packet switching networks  e.g. priorities or QoS | (ref: H04L47/24)| | admission control/resource reservation in packet switching networks based 0.862
H04W84/20Master-slave | selection or change|  arrangements0.861
H04B7/061using feedback from receiving side0.861
H04W28/06Optimizing | the usage of the radio link|   e.g. header compression  information sizing |   discarding information | system modifying transmission characteristic according to link quality by modifying frame length | (ref: H04L1/0007)| | dynamic adaptation of the packet size for flow control or congestion control | (ref: H04L47/365)0.860
H04W12/06Authentication0.860
H04W74/085collision avoidance0.858
H04L12/46Interconnection of networks0.858
H04W4/08User group management0.857
H04W24/00Supervisory  monitoring or testing arrangements0.857
H04W40/02Communication route or path selection  e.g. power-based or shortest path routing0.857
H04W16/00Network planning  e.g. coverage or traffic planning tools| Network deployment  e.g. resource partitioning or cells structures0.857
H04W88/04adapted for relaying to or from another terminal or user0.856
H04W72/1215for collaboration of different radio technologies0.856
H04L41/5019Ensuring SLA | flow or congestion control at network level | (ref: H04L47/10)0.855
G06F21/55Detecting local intrusion or implementing counter-measures0.854
H04W28/20Negotiating bandwidth0.854
H04L5/0073Allocation arrangements that take into account other cell interferences | for intercell interference mitigation or co-ordination in orthogonal multiplex systems | (ref: H04J11/005)0.853
H04W52/46in multi hop networks  e.g. wireless relay networks0.852
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.852
H04W88/06adapted for operation in multiple networks | or having at least two operational modes|   e.g. multi-mode terminals0.852
H04W48/02Access restriction performed under specific conditions0.852
H04W4/12Messaging| Mailboxes| Announcements0.852
H05B3/08having electric connections specially adapted for high temperatures0.851
H04W52/248where transmission power control commands are generated based on a path parameter0.850
H04L1/0001Systems modifying transmission characteristics according to link quality  e.g. power backoff | adaptive data allocation for multicarrier modulation | (ref: H04L5/0044)| | controlling transmission power for radio systems | (ref: H04W52/04)0.850
H04W16/26Cell enhancers | or enhancement|   e.g. for tunnels  building shadow0.850
H04W72/0413in uplink direction of a wireless link  i.e. towards network0.849
H04W24/02Arrangements for optimising operational condition0.849
H04W72/14using a grant | or specific|  channel0.849
H04W72/1273of downlink data flows0.849
H04L63/1425Traffic logging  e.g. anomaly detection0.849
H04W52/0229where the received signal is a wanted signal0.847
H04W72/1257based on resource usage policy0.846
H04W28/24Negotiating SLA [Service Level Agreement]| Negotiating QoS [Quality of Service]0.845
H04B7/022Site diversity| Macro-diversity | using two or more spaced independent antennas | (ref: H04B7/04)0.844
H04L63/1433Vulnerability analysis0.844
H04L47/787Bandwidth trade among domains0.843
H04W28/065using assembly or disassembly of packets0.842
H04W36/005involving radio access media independent information  e.g. MIH [Media independent Hand-off]0.841
H04J3/16in which the time allocation to individual channels within a transmission cycle is variable  e.g. to accommodate varying complexity of signals  to vary number of channels transmitted | (ref: H04J3/17)|   | (ref: H04J3/24)|  take precedence0.841
H04L49/354Support for virtual LAN  VLAN tagging or multiple registration  e.g. according to IEEE 802.1q0.840
H04L41/00Arrangements for maintenance or administration or management of packet switching networks0.839
H04W56/0015one node acting as a reference for the others0.838
H04L12/2801Broadband local area networks0.838
H04W36/02Buffering or recovering information during reselection | | Modification of the traffic flow during hand-off0.838
H04W28/04Error control0.838
H04B3/58Repeater circuits | amplifiers therefor | (ref: H03F)0.838
H04W72/1226based on channel quality criteria  e.g. channel state dependent scheduling0.837
H04W72/12Dynamic|  Wireless traffic scheduling | | Dynamically scheduled allocation on shared channel0.837
H04W52/325Power control of control or pilot channels0.837
H04W8/26Network addressing or numbering for mobility support0.837
H04L65/607Stream encoding details | interfacing the downstream path of a video distribution network | (ref: H04N21/238)|   | (ref: H04N21/438)| | controlling the complexity of a video stream | (ref: H04N21/2662)|   | (ref: H04N21/4621)|   | (ref: H04N21/64792)| | protocols for data compression | (ref: H04L69/04)| | header parsing or analysis | (ref: H04L69/22)0.836
H04W72/0473the resource being transmission power0.834
H04B7/0697using spatial multiplexing0.834
H04W52/0235where the received signal is a power saving command0.834
H04W52/24using SIR [Signal to Interference Ratio] or other wireless path parameters0.833
H04L1/1887Scheduling and prioritising arrangements0.833
H04L1/1829Arrangements specific to the receiver end0.832
H04W12/04Key management0.832
H04L45/26Route discovery packet0.830
H04L12/407with decentralised control0.830
H03J5/242used exclusively for band selection0.830
H04W72/1205Schedule definition  set-up or creation0.829
H04W74/006in the downlink  i.e. towards the terminal0.829
H04B7/0695using beam selection0.829
H04W24/08Testing  | supervising or monitoring|  using real traffic0.828
H04W48/10using broadcasted information0.827
H04L29/12839Layer 2 addresses  e.g. Medium Access Control [MAC] addresses0.827
H04L12/4641Virtual LANs  VLANs  e.g. virtual private networks [VPN] | LAN interconnection over a bridge based backbone | (ref: H04L12/462)| | encapsulation techniques | (ref: H04L12/4633)| | virtual private networks for security | (ref: H04L29/06612)| | routing of packets | (ref: H04L45/00)| | packet switches | (ref: H04L49/00)0.826
H04W48/12using downlink control channel0.826
H04W12/00Security arrangements  e.g. access security or fraud detection| Authentication  e.g. verifying user identity or authorisation| Protecting privacy or anonymity0.826
H04L1/0079Formats for control data | (ref: H04L1/16)|  takes precedence| training sequences | (ref: H04L25/00)|  and | (ref: H04L27/00)0.826
H04L27/2613Structure of the reference signals | per se0.826
H04L12/28characterised by path configuration  e.g. local area networks [LAN]  wide area networks [WAN]0.826
H04W60/00Registration  e.g. affiliation to network| De-registration  e.g. terminating affiliation0.826
H04W12/08Access security0.825
H04L5/1438Negotiation of transmission parameters prior to communication | modified according to link quality | (ref: H04L1/0001)0.825
H04L63/0227Filtering policies | mail message filtering | (ref: H04L51/12)0.825
H04L12/66Arrangements for connecting between networks having differing types of switching systems  e.g. gateways0.825
H04W36/18for allowing seamless reselection  e.g. soft reselection0.825
H04W72/1247based on priority of the information source or recipient0.824
H04W12/02Protecting privacy or anonymity0.824
H04L61/2038for local use  e.g. on local area networks [LAN] or on universal serial bus [USB] networks | bus addresses inside a computer | (ref: G06F13/42)0.824
H04W28/22Negotiating communication rate0.823
H04L1/0007by modifying the frame length0.823
H01Q1/246specially adapted for base stations0.823
H04L1/1671the supervisory signal being transmitted together with control information0.823
H04B7/0808comparing all antennas before reception0.823
H04W4/80Services using short range communication  e.g. near-field communication [NFC]  radio-frequency identification [RFID] or low energy communication0.822
H04L1/08by repeating transmission  e.g. Verdan system | (ref: H04L1/1858)|  and | (ref: H04L1/189)|  take precedence0.822
H04B7/02Diversity systems| Multi-antenna system  i.e. transmission or reception using multiple antennas | RAKE receivers | (ref: H04B1/7115)0.822
H04B7/04using two or more spaced independent antennas0.822
H04L5/023Multiplexing of multicarrier modulation signals | multicarrier modulation | (ref: H04L27/2601)0.822
H04L41/0896Bandwidth or capacity management  i.e. automatically increasing or decreasing capacities  e.g. bandwidth on demand | reallocation of resources  renegotiation of resources  e.g. in-call | (ref: H04L47/76)0.822
H04W52/0216using a pre-established activity schedule  e.g. traffic indication frame0.822
H04W92/02Inter-networking arrangements0.821
H04W4/90Services for handling of emergency or hazardous situations  e.g. earthquake and tsunami warning systems [ETWS]0.820
H04W72/1236using requested quality0.820
H04L12/40156by using dedicated slots associated with a priority level0.820
H04L12/42Loop networks0.820
H04L41/0681involving configuration of triggering conditions0.819
H04L1/0009by adapting the channel coding | (ref: H04L1/1812)|  takes precedence0.818
H04L65/608Streaming protocols  e.g. RTP or RTCP0.818
H04L12/1868Measures taken after transmission  e.g. acknowledgments0.818
H04W72/0426between access points0.818
H04L45/74Address processing for routing0.818
H04W8/02Processing of mobility data  e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]| Transfer of mobility data  e.g. between HLR  VLR or external networks0.818
H04W24/06Testing  | supervising or monitoring|  using simulated traffic0.817
H04W88/02Terminal devices0.817
H04L63/0236Filtering by address  protocol  port number or service  e.g. IP-address or URL0.816
H04L43/0864Round trip delays0.816
H04W16/28using beam steering0.816
H04B7/2126using a reference station0.815
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)0.815
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material0.815
H04W72/1263Schedule usage  i.e. actual mapping of traffic onto schedule| Multiplexing of flows into one or several streams| Mapping aspects| Scheduled allocation0.813
H04W16/24Cell structures0.813
H04L12/5602Bandwidth control in ATM Networks  e.g. leaky bucket0.812
H04W8/005Discovery of network devices  e.g. terminals0.812
H04L5/0037Inter-user or inter-terminal allocation0.811
H04L12/462LAN interconnection over a bridge based backbone0.809
H04L63/107wherein the security policies are location-dependent  e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals0.808
H04L63/1483service impersonation  e.g. phishing  pharming or web spoofing | detection of rogue wireless access points | (ref: H04W12/12)0.808
H04W12/10Integrity0.686
H04L5/1453of modulation type0.378
H04L27/0008arrangements for allowing a transmitter or receiver to use more than one type of modulation | negotiating modulation type for two-way transmission paths | (ref: H04L5/1453)0.378
H04W56/0035detecting errors in frequency or phase0.378
H04W56/0005synchronizing of arrival of multiple uplinks0.378
H04L47/2416Real time traffic | arrangements for real-time multimedia communications | (ref: H04L65/00)0.377
H04L63/1466Active attacks involving interception  injection  modification  spoofing of data unit addresses  e.g. hijacking  packet injection or TCP sequence number attacks0.376
H04L47/14in wireless networks0.375
H04L45/121Minimizing delay0.366
H04W52/0212managed by the network  e.g. network or access point is master and terminal is slave0.365
H04W48/00Access restriction| Network selection| Access point selection0.365
H04J3/0664unidirectional timestamps0.363
H04W72/1231using measured or perceived quality0.363
H04W56/00Synchronisation arrangements0.363
H02J50/40using two or more transmitting or receiving devices | (ref: H02J50/50)|  takes precedence0.362
H02J7/025using non-contact coupling  e.g. inductive  capacitive0.362
H02J50/80involving the exchange of data  concerning supply or distribution of electric power  between transmitting devices and receiving devices0.362
H04W40/22using selective relaying for reaching a BTS [Base Transceiver Station] or an access point0.362
H04L47/2425Service specification  e.g. SLA | general aspects of SLA management | (ref: H04L41/50)0.362
H04L49/90Queuing arrangements0.358
H04L12/403with centralised control  e.g. polling0.357
H04L1/18Automatic repetition systems  e.g. van Duuren system | | ARQ protocols0.355
H04L47/35Embedded flow control information in regular packets  e.g. Piggybacking0.355
H04K3/86related to preventing deceptive jamming or unauthorized interrogation or access  e.g. WLAN access or RFID reading | record carriers with integrated circuit chips including means for preventing undesired reading or writing from or to record carriers by hindering electromagnetic reading or writing | (ref: G06K19/07318)| | arrangements for sensing record carriers including arrangements for protecting the interrogation against piracy attacks | (ref: G06K7/10257)0.353
H04K3/94related to allowing or preventing testing or assessing0.353
H04L61/2514between local and global IP addresses0.353
H04L29/12367between local and global IP addresses0.353
H04L63/102Entity profiles0.353
H04L63/162at the data link layer0.353
H04J11/00Orthogonal multiplex systems  | e.g. using WALSH codes| (ref: H04J13/00)|  takes precedence0.352
H04L27/0006Assessment of spectral gaps suitable for allocating digitally modulated signals  e.g. for carrier allocation in cognitive radio | for spectrum sharing between different networks | (ref: H04W16/14)0.352
H04J11/005of intercell interference0.352
H04L5/0035Resource allocation in a cooperative multipoint environment0.352
H04J11/0053using co-ordinated multipoint transmission/reception | co-ordinated antenna or beam-forming aspects | (ref: H04B7/022)0.352
H04J1/00Frequency-division multiplex systems | (ref: H04J14/00)|  takes precedence0.352
H04J11/0063of multipath interference  e.g. Rake receivers0.352
H04L5/0032Distributed allocation  i.e. involving a plurality of allocating devices  each making partial allocation0.352
H04L5/0098Signalling of the activation or deactivation of component carriers  subcarriers or frequency bands0.352
H04L5/0087when data requirements change0.352
H04L1/1854Scheduling and prioritising arrangements0.352
H04L47/24depending on the type of traffic  e.g. priority or quality of service [QoS] | network arrangements for networked applications for scheduling or organising the servicing of application requests whereby quality of service or priority requirements are taken into account | (ref: H04L67/322)0.351
H04L47/13in a LAN segment  e.g. ring or bus0.351
H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture| Specification of modified or new header fields | protocols engines in general | (ref: H04L69/12)| | OSI stack based layering aspects | (ref: H04L69/32)| | protocol header analysis in general | (ref: H04L69/22)| | addressing aspects in multiple interfaces involving dual-stack hosts | (ref: H04L61/6086)0.351
H04L69/163Adaptation of TCP data exchange control procedures | generic OSI layer 4 protocols  e.g. SCTP | (ref: H04L69/326)| | TCP or UDP flow control procedures | (ref: H04L47/19)| | error control procedures in general | (ref: H04L1/18)0.351
H04L5/0055Physical resource allocation for ACK/NACK | for physical mapping arrangements in ARQ protocols | (ref: H04L1/1861)0.349
H04W72/08where an allocation plan is defined|  based on quality criteria0.349
H04L49/00Packet switching elements | selecting arrangements for multiplex arrangements using optical switching | (ref: H04Q11/0001)0.348
H04L1/1628List acknowledgements  i.e. the acknowledgement message consisting of a list of identifiers  e.g. of sequence numbers | (ref: H04L1/1614)|  takes precedence0.347
H04L43/0894Packet rate0.347
H04L47/263Source rate modification after feedback0.347
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.346
H04L1/0025Transmission of mode-switching indication0.346
H04W80/02Data link layer protocols0.343
H04B17/3913Predictive models0.342
H04N21/4126portable device  e.g. remote control with a display  PDA  mobile phone | constructional details of equipment or arrangements specially adapted for portable computer application | (ref: G06F1/1626)0.339
H04W74/0866using a dedicated channel for access0.339
H04L47/32Packet discarding or delaying0.338
H04L12/6418Hybrid transport0.337
H04L29/12009Arrangements for addressing and naming in data networks0.337
H04L47/28using time considerations0.336
H04L1/1678where the control information is for timing  e.g. time stamps0.336
H04L5/0044allocation of payload0.336
H04K3/45characterized by including monitoring of the target or target signal  e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases  called "look-through mode"0.336
H04L1/1806Go-back-N protocols0.335
H04L1/16in which the return channel carries supervisory signals  e.g. repetition request signals0.335
H04W74/004in the uplink  i.e. towards network0.334
H04L63/02for separating internal from external traffic  e.g. firewalls0.334
H04W28/0231based on communication conditions | dynamic wireless traffic scheduling definition based on channel quality criteria | (ref: H04W72/1226)0.333
H04L47/36Evaluation of the packet size  e.g. maximum transfer unit [MTU]0.333
H04W40/246Connectivity information discovery0.333
H04W76/14Direct-mode setup0.333
H04L25/0224using sounding signals0.332
H04L27/20Modulator circuits | in general | (ref: H03C)|  | (ref: H03K7/04)| Transmitter circuits0.331
H04L27/18Phase-modulated carrier systems  i.e. using phase-shift keying | (ref: H04L27/32)|  takes precedence| includes continuous phase systems0.331
H04W52/50at the moment of starting communication in a multiple access environment0.330
H04L1/1664the supervisory signal being transmitted together with payload signals| piggybacking0.330
H04L63/101Access control lists [ACL]0.330
H04L63/18using different networks or paths for security  e.g. using out of band channels | cryptographic mechanisms or cryptographic arrangements for key distribution involving distinctive intermediate devices or communication paths | (ref: H04L9/0827)| | cryptographic mechanisms or cryptographic arrangements for authentication using a plurality of channels | (ref: H04L9/3215)0.330
A61N5/06using light0.330
A61F7/007characterised by electric heating0.330
H04W80/00Wireless network protocols or protocol adaptations to wireless operation  e.g. WAP [Wireless Application Protocol]0.329
H04L27/2601Multicarrier modulation systems0.329
H04W28/0236radio quality  e.g. interference  losses or delay0.329
H04W52/243taking into account interferences0.327
H04L5/00Arrangements affording multiple use of the transmission path | multiplex communication in general | (ref: H04J)| | | orthogonal multiplex systems | (ref: H04J11/00)0.327
H04L43/0811Connectivity0.327
H04L1/0021in which the algorithm uses adaptive thresholds0.326
H04L69/26Special purpose or proprietary protocols or architectures | network applications for proprietary or special purpose networking environments | (ref: H04L67/12)0.326
H04L1/1812Hybrid protocols0.326
H04L63/068using time-dependent keys  e.g. periodically changing keys | cryptographic mechanisms or cryptographic arrangements for controlling usage of secret information | (ref: H04L9/088)0.326
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.326
H04L5/0023Time-frequency-space0.325
H04L61/10Mapping of addresses of different types| Address resolution0.325
H04L29/12018Mapping of addresses of different types| address resolution0.325
H04L69/324in the data link layer  i.e. layer two  e.g. HDLC | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | bus networks | (ref: H04L12/40)0.325
H04L61/2053involving timing or renewal aspects0.325
H04L63/0407wherein the identity of one or more communicating identities is hidden | cryptographic mechanisms or cryptographic arrangements for anonymous credentials or for identity based cryptographic systems | (ref: H04L9/00)0.325
H04L47/805QOS or priority aware0.325
H04L47/6215Individual queue per QOS  rate or priority0.325
H04L47/70Admission control or resource allocation | medium access in wavelength-division multiplex systems | (ref: H04J14/0227)0.325
H04L47/11Congestion identification0.325
H04L47/29Using a combination of thresholds0.325
H04L47/824Applicable to portable or mobile terminals0.325
H04L47/2433Allocation of priorities to traffic types0.325
H04L47/767after changing the attachment point  e.g. after hand-off0.325
H04L47/122Diverting traffic away from congested spots0.325
H04L41/06involving management of faults or events or alarms0.324
H04L41/0213using standardized network management protocols  e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]0.324
H04L9/002Countermeasures against attacks on cryptographic mechanisms | network architectures or network communication protocols for protection against malicious traffic | (ref: H04L63/1441)0.324
H04W76/11Allocation or use of connection identifiers0.324
H04L29/06027Protocols for multimedia communication0.323
H04W76/12Setup of transport tunnels0.323
C23C16/4408by purging residual gases from the reaction chamber or gas lines0.323
H04L65/1006SIP0.323
H04L1/02by diversity reception | in general | (ref: H04B7/02)0.323
H04W8/186Processing of subscriber group data0.323
H04L12/43with synchronous transmission  e.g. time division multiplex [TDM]  slotted rings0.322
H04W36/0038of security context information0.322
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.322
H04L63/1491using deception as countermeasure  e.g. honeypots  honeynets  decoys or entrapment0.322
H04W64/003locating network equipment0.322
G01S13/74Systems using reradiation of radio waves  e.g. secondary radar systems| Analogous systems0.322
G01S13/767Responders| Transponders | teaching or practice apparatus for gun-aiming or gun-laying using reflecting targets or active targets | (ref: F41G3/26)0.322
G01S13/876Combination of several spaced transponders or reflectors of known location for determining the position of a receiver | (ref: G01S13/874)|  takes precedence0.322
H04W72/1278Transmission of control information for scheduling0.322
H04W36/16Performing reselection for specific purposes0.322
H04J3/00Time-division multiplex systems | (ref: H04J14/00)|  takes precedence| relay systems | (ref: H04B7/14)| | selecting techniques | (ref: H04Q)0.322
H04W88/12Access point controller devices0.322
H04W48/06based on traffic conditions0.322
H04K3/226Selection of non-jammed channel for communication | spectrum sharing arrangements | (ref: H04W16/14)| | selection of wireless resources by user or terminal | (ref: H04W72/02)0.321
H04W56/002Mutual synchronization0.321
H04L5/0058Allocation criteria0.321
H04L1/1657Implicit acknowledgement of correct or incorrect reception  e.g. with a moving window0.321
H04B7/088using beam selection0.321
H04L41/5003Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]0.321
H04B7/0617for beam forming0.321
H04W72/0453the resource being a frequency  carrier or frequency band0.320
H04W52/08Closed loop power control0.320
H04W52/54Signalisation aspects of the TPC commands  e.g. frame structure0.320
H04W72/005Resource management for broadcast services0.320
H04W8/28Number portability | | Network address portability0.319
H04N21/43615Interfacing a Home Network  e.g. for connecting the client to a plurality of peripherals | home Audio Video Interoperability [HAVI] data switching networks | (ref: H04L12/2805)0.319
H04B7/2659for data rate control0.319
H04N21/43637involving a wireless protocol  e.g. Bluetooth or wireless LAN | IEEE 802.11| arrangements for wireless networking or broadcasting of information in indoor or near-field type systems | (ref: H04B10/114)| | wireless local area data switching networks | (ref: H04W)| | flow control in wireless networks | (ref: H04W28/10)0.319
H04N21/4122additional display device  e.g. video projector | digital output for controlling a plurality of local displays | (ref: G06F3/1423)0.319
H05B3/04Waterproof or air-tight seals for heaters0.319
H04W52/367Power values between minimum and maximum limits  e.g. dynamic range0.319
H04W52/286during data packet transmission  e.g. high speed packet access [HSPA]0.319
H04L47/822Collecting or measuring resource availability data0.319
H04W52/38TPC being performed in particular situations0.318
H04W40/244using a network of reference devices  e.g. beaconing0.318
H04W92/20between access points0.318
H04L69/323in the physical layer  i.e. layer one | arrangements for detecting or preventing errors in the information received | (ref: H04L1/00)| | baseband systems | (ref: H04L25/00)| | modulated-carrier systems | (ref: H04L27/00)0.318
H04L47/286Time to live0.317
H04L47/30using information about buffer occupancy at either end or transit nodes0.317
H04W52/10Open loop power control0.317
H04L47/26Explicit feedback to the source  e.g. choke packet0.317
H04B7/0626Channel coefficients  e.g. channel state information [CSI]0.317
H04B7/155Ground-based stations | (ref: H04B7/204)|  takes precedence | | for satellite systems | (ref: H04B7/18517)0.316
H04B7/2606Arrangements for base station coverage control  e.g. by using relays in tunnels0.316
H04L45/16Multipoint routing | arrangements for multicast or broadcast in data networks | (ref: H04L12/18)0.316
H04L45/123Evaluation of link metrics | techniques for monitoring network metrics | (ref: H04L43/08)0.316
H04L45/12Shortest path evaluation0.316
H04L45/122Minimizing distance  e.g. ? number of hops0.316
H04L45/125based on throughput or bandwidth0.316
H04L1/0045Arrangements at the receiver end0.316
H04L5/0094Indication of how sub-channels of the path are allocated0.316
H04L5/0096Indication of changes in allocation0.316
H04L27/26Systems using multi-frequency codes | (ref: H04L27/32)|  takes precedence0.316
H04W84/22with access to wired networks0.315
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)0.315
H04L63/104Grouping of entities0.315
H04L61/2046involving the solving of address allocation conflicts or involving testing of addresses0.315
H04L61/2092by self assignment  e.g. pick address randomly and test if already in use0.315
H04W28/0284detecting congestion or overload during communication | monitoring arrangements | (ref: H04L43/00)0.315
H04L41/12network topology discovery or management | topology discovery for routing | (ref: H04L45/02)0.315
H04Q11/0478Provisions for broadband connections0.315
H04L49/201Multicast or broadcast0.315
H04W72/0493where an allocation plan is defined based on a resource usage policy0.315
H04W36/08Reselecting an access point0.314
H04L5/0082at predetermined intervals0.314
H04L5/0053Allocation of signaling  i.e. of overhead other than pilot signals0.314
H04L1/0006by adapting the transmission format0.314
H04L5/0051of dedicated pilots  i.e. pilots destined for a single user or terminal0.314
H04B3/542the information being in digital form0.314
H04W56/0045compensating for timing error by altering transmission time0.314
H04L65/00Network arrangements or protocols for real-time communications | computer conference | (ref: H04L12/1813)| | real time or near real time messaging in message switching systems  e.g. instant messaging | (ref: H04L51/04)| | network applications in general | (ref: H04L67/00)| | systems providing special services to telephonic subscribers | (ref: H04M3/42)| | interconnection arrangements between switching centres for working between exchanges having different types of switching equipment where the types of switching equipment comprise PSTN/ISDN equipment and equipment of networks other than PSTN/I0.314
H04L61/6013Proxying of addresses0.314
H04L29/1282Proxying of addresses0.314
H04L5/001the frequencies being arranged in component carriers0.314
H04L5/0091Signaling for the administration of the divided path0.314
H04W52/247where the output power of a terminal is based on a path parameter sent by another terminal0.313
H04W52/244Interferences in heterogeneous networks  e.g. among macro and femto or pico cells or other sector / system interference [OSI]0.312
H04L9/0866involving user or device identifiers  e.g. serial number  physical or biometrical information  DNA  hand-signature or measurable physical characteristics0.312
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.312
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]0.312
H04L41/0886Fully automatic configuration0.312
H04L12/4633Interconnection of networks using encapsulation techniques  e.g. tunneling0.312
H04L41/0806for initial configuration or provisioning0.312
H04W40/30for proactive routing0.311
H04W40/12based on transmission quality or channel quality0.311
H03J9/002comprising one or more tuning stages separated from the rest of a receiver0.311
H03J7/047Automatic frequency control using an auxiliary signal  e.g. low frequency scanning of the locking range or superimposing a special signal on the input signal0.311
H04N5/50Tuning indicators| Automatic tuning control | tuning control in general | (ref: H03J)0.311
H04B7/0417Feedback systems0.311
H03J7/186using two or more tuners0.311
H04L43/18using protocol analyzers0.311
H04N21/63775for uploading keys  e.g. for a client to communicate its public key to the server | arrangements for network security key management | (ref: H04L29/06707)0.311
H04N21/63345by transmitting keys | key distribution for secret or secure communication | (ref: H04L9/08)| | arrangements for network security key management | (ref: H04L29/06707)0.311
H04W72/085using measured or perceived quality0.310
H04W4/20Services signaling| Auxiliary data signalling  i.e. transmitting data via a non-traffic channel0.310
H04W4/30Services specially adapted for particular environments  situations or purposes0.310
H04L1/20using signal quality detector0.310
H04W16/18Network planning tools0.310
H04L1/0083Formatting with frames or packets| Protocol or part of protocol for error control0.310
H04L1/0003by switching between different modulation schemes0.310
H04L1/0031Multiple signaling transmission | (ref: H04L1/1664)|   | (ref: F15)|  take precedence0.310
H04L69/08Protocols for interworking or protocol conversion | arrangements for connecting between networks having differing types of switching systems  e.g. gateways  | (ref: H04L12/66)| | network management protocols conversion | (ref: H04L41/0226)0.309
H04L27/0012arrangements for identifying the type of modulation0.309
H04W28/12using signalling between network elements0.309
H04L67/025for remote control or remote monitoring of the application | network management using Internet technology | (ref: H04L41/0246)| | network monitoring | (ref: H04L43/00)| | management of end-device applications over a special purpose or proprietor network | (ref: H04L67/125)0.309
H04L67/125involving the control of end-device applications over a network | network management of network elements | (ref: H04L41/00)| | end-device control or monitoring using web-based technology | (ref: H04L67/025)0.309
H04W4/023using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds0.309
H04L47/15in relation to multipoint traffic | arrangements for broadcast or multicast in data networks | (ref: H04L12/18)0.309
H04L47/788Autonomous allocation of resources0.309
H04L63/0414during transmission  i.e. party's identity is protected against eavesdropping  e.g. by using temporary identifiers  but is known to the other party or parties involved in the communication0.309
H04L29/12254for local use  e.g. on Local Area Networks [LAN] or on Universal Serial Bus [USB] networks | bus addresses inside a computer | (ref: G06F13/42)0.309
H04L5/0062Avoidance of ingress interference  e.g. ham radio channels0.309
H04L12/189in combination with wireless systems | selective distribution or broadcast in wireless communication networks | (ref: H04W4/06)0.309
H04W52/146Uplink power control0.309
H04B17/318Received signal strength0.309
H01Q3/2605Array of radiating elements provided with a feedback control over the element weights  e.g. adaptive arrays0.309
H04B7/0814based on current reception conditions  e.g. switching to different antenna when signal level is below threshold0.308
H04B7/0874using subgroups of receive antennas0.308
H04W40/023Limited or focused flooding to selected areas of a network0.308
H04L67/104for peer-to-peer [P2P] networking| Functionalities or architectural details of P2P networks | file transfer  upload  download | (ref: H04L67/06)| | accessing replicated servers | (ref: H04L67/1002)| | presence management | (ref: H04L67/24)| | scheduling provisions | (ref: H04L67/32)| | real-time communications | (ref: H04L65/00)| | information retrieval using distributed database systems | (ref: G06F17/30283)| | small scale hierarchical wireless network topologies | (ref: H04W84/10)| | wireless interfaces between terminal devices | (ref: H04W92/18)| | P2P connections between video clients | (r0.308
H04L47/20Policing0.308
H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof0.308
H04L47/34Sequence integrity  e.g. sequence numbers0.308
H04L63/0263Rule management0.308
H04W76/50for emergency connections0.307
H04L43/0852Delays0.307
H04L47/826Involving periods of time0.307
H04L1/1864ARQ related signaling | (ref: H04L1/1607)|  takes precedence0.307
H04B3/54Systems for transmission via power distribution lines0.307
H04W88/00Devices specially adapted for wireless communication networks  e.g. terminals  base stations or access point devices0.307
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.307
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks0.307
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.307
H04L43/0817functioning | networked applications tracking the activity of users | (ref: H04L67/22)| | monitoring appliance functionality of home appliances | (ref: H04L12/2803)0.307
H04L47/50Queue scheduling0.307
H04L67/322whereby quality of service [QoS] or priority requirements are taken into account | monitoring of QoS metrics | (ref: H04L43/08)| | QoS aspects in real-time communications | (ref: H04L65/80)0.307
H04L67/04adapted for terminals or networks with limited resources or for terminal portability  e.g. wireless application protocol [WAP] | services or facilities specially adapted for wireless communication networks | (ref: H04W4/00)0.307
H04L45/34Source routing0.307
H04L12/1877Measures taken prior to transmission0.307
H04L69/14Multichannel or multilink protocols0.307
H04L1/003Adaptive formatting arrangements particular to signalling  e.g. variable amount of bits0.307
H04L1/165Variable formats0.307
H04L1/1614using bitmaps0.307
H04L29/0604Protocols for data compression | compression in general | (ref: H03M7/30)0.307
H04L61/2596Non - internet protocol [IP] address translation0.307
H04L43/0888Throughput0.306
H04L43/50Testing arrangements0.306
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)0.306
H04L63/0869for achieving mutual authentication | cryptographic mechanisms or cryptographic arrangements for mutual authentication | (ref: H04L9/3273)0.306
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.306
H04B7/0408using two or more beams  i.e. beam diversity0.306
H04W40/20based on geographic position or location0.306
H04L47/12Congestion avoidance or recovery0.306
H04W76/10Connection setup0.306
H04L41/0803Configuration setting of network or network elements | communication protocols supporting networked applications involving the movement of software or networked applications configuration parameters | (ref: H04L67/34)0.306
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.306
H04L5/0025Spatial division following the spatial signature of the channel0.304
H01Q1/243with built-in antennas0.304
H04W52/0225using monitoring of external events  e.g. the presence of a signal0.304
H04W40/34Modification of an existing route0.303
H04L45/54Organization of routing tables0.303
H04W64/00Locating users or terminals | or network equipment|  for network management purposes  e.g. mobility management0.303
H04B7/0615of weighted versions of same signal0.060
H04L63/164at the network layer0.060
H04L63/166at the transport layer0.060
H04W76/20Manipulation of established connections0.060
H04K2203/18for wireless local area networks or WLAN0.059
H04L29/06884Monitoring network traffic0.059
H04L41/28Security in network management  e.g. restricting network management access | network architectures or network communication protocols for network security | (ref: H04L63/00)| | cryptographic mechanisms or cryptographic arrangements for secret or secure communication | (ref: H04L9/00)| | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorised activity | (ref: G06F21/00)0.059
H04L29/12028across network layers  e.g. resolution of network layer into physical layer addresses  Address Resolution Protocol [ARP]0.059
H04L61/103across network layers  e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]0.059
H04W72/10where an allocation plan is defined|  based on priority criteria0.059
H04L69/16Transmission control protocol/internet protocol [TCP/IP] or user datagram protocol [UDP] | flow control or congestion control in data switching networks | (ref: H04L47/10)| | transport layer addressing aspects | (ref: H04L61/6063)| | special adaptations of TCP  UDP or IP for interworking of IP based networks with other networks | (ref: H04L69/169)| | adapting video multiplex streams to a specific network | (ref: H04N21/2381)| | network layer protocol adaptations for supporting mobility  e.g. mobile IP  | (ref: H04W80/04)0.059
H04L43/16using threshold monitoring0.058
H04L43/0823Errors | management of events  faults or alarms in networks or network elements | (ref: H04L41/06)0.058
H04W8/06Registration at serving network Location Register  VLR or user mobility server0.057
H04W84/10Small scale networks| Flat hierarchical networks0.057
H04L1/1621Group acknowledgement  i.e. the acknowledgement message defining a range of identifiers  e.g. of sequence numbers0.057
H04W88/023with message or information receiving capability0.057
H04W92/10between terminal device and access point  i.e. wireless air interface0.057
H04W72/1268of uplink data flows0.056
H04L12/185with management of multicast group membership0.056
H04L63/1475Passive attacks  e.g. eavesdropping or listening without modification of the traffic monitored0.056
H04W84/04Large scale networks| Deep hierarchical networks0.056
H04B7/0413MIMO systems0.056
H04L63/0823using certificates | cryptographic mechanisms or cryptographic arrangements for entity authentication involving certificates | (ref: H04L9/3263)0.056
H04K2203/34involving multiple cooperating jammers0.056
H04L63/126the source of the received data0.056
H04L1/1861Physical mapping arrangements | for ACK signaling | see|  also | (ref: H04L5/0053)0.056
H04L2001/0093Point-to-multipoint0.056
H04W76/30Connection release0.056
H04L2001/125Arrangements for preventing errors in the return channel0.056
H04L1/1809Selective-repeat protocols0.056
H04L63/0218Distributed architectures  e.g. distributed firewalls0.056
H04L2001/0094Bus0.055
H04W84/042Public Land Mobile systems  e.g. cellular systems0.055
H04W40/10based on available power or energy0.055
H04L45/18Loop free0.055
H04W72/06where an allocation plan is defined|  based on a ranking criteria of the wireless resources0.055
Y02D70/446Relay systems0.055
Y02D70/10according to the Radio Access Technology [RAT]0.055
Y02D70/00Techniques for reducing energy consumption in wireless communication networks0.055
Y02D70/14in Institute of Electrical and Electronics Engineers [IEEE] networks0.055
H04B7/18502Airborne stations0.055
Y02D70/142in Wireless Local Area Networks [WLAN]0.055
H04M2242/04for emergency applications0.055
A61N2005/066far infrared0.055
A61F2007/0059with an open fluid circuit0.055
A61F2007/0269with separable compartments  e.g. reconnectable0.055
A61F2007/0091inflatable0.055
H04L12/2834Switching of information between an external network and a home network | access arrangements | (ref: H04L12/2856)0.055
H04W76/23Manipulation of direct-mode connections0.055
H04L5/0078Timing of allocation0.054
H04L47/828Allocation of resources per group of connections  e.g. per group of users0.054
H04L43/0847Transmission error0.054
H04W8/22Processing or transfer of terminal data  e.g. status or physical capabilities0.054
H04L43/12using dedicated network monitoring probes0.054
H04W48/20Selecting an access point0.054
H04L2012/6489Buffer Management  Threshold setting  Scheduling  Shaping0.054
H04W72/00Local resource management  e.g. wireless traffic scheduling or selection or allocation of wireless resources0.054
H04L2209/80Wireless | network architectures or network communication protocols for wireless network security | (ref: H04W12/00)0.054
H04W88/16Gateway arrangements0.054
G01S5/14Determining absolute distances from a plurality of spaced points of known location0.054
H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]0.054
H04K3/28with jamming and anti-jamming mechanisms both included in a same device or system  e.g. wherein anti-jamming includes prevention of undesired self-jamming resulting from jamming0.054
H04W36/14Reselecting a network or an air interface0.053
H04W52/16Deriving transmission power values from another channel0.053
H04L2463/146Tracing the source of attacks0.053
H05B2203/026Heaters specially adapted for floor heating0.053
H04W52/262taking into account adaptive modulation and coding [AMC] scheme | AMC | per se|  | (ref: H04L1/0001)0.053
H04W52/383power control in peer-to-peer links0.053
H04L63/0245Filtering by information in the payload0.053
H04L2001/0097Relays0.053
H04L43/0829Packet loss0.053
H04L61/6004Structures or formats of addresses0.053
H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks0.053
H04L12/2856Access arrangements  e.g. Internet access | asynchronous transfer mode networks | (ref: H04L12/5601)| | broadband local area networks | (ref: H04L12/2801)| | optical access or distribution networks | (ref: H04Q11/0067)| | access to open networks | (ref: H04L12/5691)| | digital subscriber line end-user equipment and bit-level processing of data on a PSTN-based network | (ref: H04M11/00)| | home network gateways | (ref: H04L12/2834)| | wireless access networks | (ref: H04W)0.053
H04L12/44Star or tree networks0.053
H04B2203/5445Local network0.053
H04W84/047using dedicated repeater stations0.053
H04L12/1863comprising mechanisms for improved reliability  e.g. status reports | arrangements for detecting or preventing errors by carrying supervisory signal the return channel | (ref: H04L1/16)0.053
H04W36/0033with transfer of context information0.053
H04L43/10using active monitoring  e.g. heartbeat protocols  polling  ping  trace-route0.053
H04L2012/5642Multicast/broadcast/point-multipoint  e.g. VOD0.053
H04L49/25Routing or path finding through a switch fabric0.053
H04L2012/5638Services  e.g. multimedia  GOS  QOS0.053
H04L1/1848Time-out mechanisms0.052
H04B2203/5408using protocols0.052
H04W80/04Network layer protocols  e.g. mobile IP [Internet Protocol]0.052
H04W52/143Downlink power control0.052
H04W52/246where the output power of a terminal is based on a path parameter calculated in said terminal0.052
H04W52/245taking into account received signal strength0.052
H04W52/223predicting future states of the transmission0.052
H04L2463/061applying further key derivation  e.g. deriving traffic keys from a pair-wise master key | cryptographic mechanisms or cryptographic arrangements for generation of secret information including derivation or calculation of cryptographic keys or passwords | (ref: H04L9/0861)0.052
H04L51/12with filtering and selective blocking capabilities0.052
H04W60/04using triggered events0.052
H04B2203/5416by adding signals to the wave form of the power source0.052
H04W52/0258controlling an operation mode according to history or models of usage information  e.g. activity schedule or time of day0.052
H04W52/0238where the received signal is an unwanted signal  e.g. interference or idle signal0.052
H04W84/14WLL [Wireless Local Loop]| RLL [Radio Local Loop]0.052
H03J2200/27Adjusting the seek sensitivity of a scanning or sweeping receiver0.052
H04B7/0619using feedback from receiving side | feedback signaling for adaptive modulation/coding | (ref: H04L1/0001)0.052
H04W84/02Hierarchically pre-organised networks  e.g. paging networks  cellular networks  WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]0.052
H04W4/021Services related to particular areas  e.g. point of interest [POI] services  venue services or geofences0.052
H03M13/09Error detection only  e.g. using cyclic redundancy check [CRC] codes or single parity bit | error detection or correction by redundancy in data representation | (ref: G06F11/08)0.052
H04B7/00Radio transmission systems  i.e. using radiation field | (ref: H04B10/00)|   | (ref: H04B15/00)|  take precedence0.052
H04L63/16Implementing security features at a particular protocol layer0.052
H04W36/00Hand-off or reselection arrangements0.052
H04L67/12adapted for proprietary or special purpose networking environments  e.g. medical networks  sensor networks  networks in a car or remote metering networks | digital computing or data processing equipment or methods  specially adapted for specific applications in healthcare or life sciences | (ref: G06F19/00)| | home automation networks | (ref: H04L12/2803)| | total factory control characterised by the network communication | (ref: G05B19/4185)| | games involving transmission systems | (ref: A63F13/30)0.052
H04L1/0026Transmission of channel quality indication0.052
H04W52/0232according to average transmission signal activity0.051
H04W52/42in systems with time  space  frequency or polarisation diversity0.051
H04W40/08based on transmission power0.051
H04L1/1874Buffer management0.051
H04W84/005Moving wireless networks0.051
H04L41/16Network management using artificial intelligence0.051
H04W28/0294forcing collision | non-scheduled or contention based wireless access channel | (ref: H04W74/08)0.051
H04W36/0072of resource information of target access point0.051
H04W36/0077of access information of target access point0.051
H04L69/329in the application layer  i.e. layer seven | network arrangements or network communication protocols for networked applications | (ref: H04L67/00)| | digital computing or data processing equipment or methods  specially adapted for specific applications | (ref: G06F19/00)| | data processing systems and methods specially adapted for administrative  commercial  financial or managerial purposes | (ref: G06Q)0.051
H04L2212/00Encapsulation of packets0.051
H04W4/00Services specially adapted for wireless communication networks| Facilities therefor0.051
G06F2221/0706Domain0.051
H04L2463/101applying security measures for digital rights management | data processing systems or methods  specially adapted for commerce  e.g. marketing  shopping  billing  auctions or e-commerce | (ref: G06Q30/00)0.051
H04L45/7453using hashing0.051
H04L41/22using GUI [Graphical User Interface]0.051
H04L43/06Report generation0.051
H04L61/2503Internet protocol [IP] address translation0.051
H04L29/12339Internet Protocol [IP] address translation0.051
H04W74/008with additional processing of random access related information at receiving side0.051
Y02D70/26in wearable devices  e.g. watches  glasses0.051
Y02D70/168in Digital Video Broadcasting [DVB] networks0.051
H04L1/0057Block codes | (ref: H04L1/0061)|   | (ref: H04L1/0064)|  take precedence0.051
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.