Validity Report
Basic Report
US8272037B2 — Flexible WLAN access point architecture capable of accommodating different user devices
Priority Date: 2003-03-14, Publication Date: 2012-09-18, Current Assignee: TRANQUILITY IP LLCReport Generated: 2022-10-06

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1604308A2●●●●●AUTOMATIC CONFIGURATION OF CLIENT TERMINAL IN PUBLIC HOT SPOTGRANT2005-12-142003-03-14GreatThomson Licensing SASTHOMSON LICENSING
EP1330073A1●●●●●Method and apparatus for access control of a wireless terminal device in a communications networkGRANT2003-07-232002-01-18GreatNokia OyjNokia Oyj
EP1618697A2●●●●●AN IDENTITY MAPPING MECHANISM IN WLAN ACCESS CONTROL WITH PUBLIC AUTHENTICATION SERVERSGRANT2006-01-252003-03-10GreatThomson Licensing SASThomson Licensing SAS
EP1497934B1●●●●●AUTHENTICATION SYSTEM AND METHOD HAVING MOBILITY IN PUBLIC WIRELESS LOCAL AREA NETWORKGRANT2016-03-162002-04-23GreatSK Telecom Co LtdSK Telecom Co Ltd
EP1076975B1●●●●●USER SPECIFIC AUTOMATIC DATA REDIRECTION SYSTEMGRANT2009-10-141998-05-04GreatAuric Web Systems IncAuric Web Systems Inc
EP1175765B1●●●●●SIM BASED AUTHENTICATION MECHANISM FOR DHCRv4/v6 MESSAGESGRANT2004-09-081999-05-03GreatNokia OyjNokia Oyj
EP1504621A2●●●●●SEAMLESS PUBLIC WIRELESS LOCAL AREA NETWORK USER AUTHENTICATIONGRANT2005-02-092002-05-13GreatThomson Licensing SASTHOMSON LICENSING
EP1502463A1●●●●●METHOD AND APPARATUS FOR ENSURING ADDRESS INFORMATION OF A WIRELESS TERMINAL DEVICE IN COMMUNICATIONS NETWORKGRANT2005-02-022002-05-07GreatNokia OyjNokia Oyj
EP1597866B1●●●●●Fast re-authentication with dynamic credentialsGRANT2009-07-222003-02-26GreatCisco Technology IncCisco Technology Inc
EP1311930A2●●●●●SYSTEMS AND METHODS FOR AUTHENTICATING A USER TO A WEB SERVERGRANT2003-05-212000-08-04GreatComputer Associates Think IncCA Inc
EP1430640B1●●●●●A METHOD FOR AUTHENTICATING A USER IN A TERMINAL  AN AUTHENTICATION SYSTEM  A TERMINAL  AND AN AUTHORIZATION DEVICEGRANT2006-05-102001-09-28GreatNokia OyjNokia Oyj
EP1495586A1●●●●●METHOD  SYSTEM AND DEVICE FOR SERVICE SELECTION VIA A WIRELESS LOCAL AREA NETWORKGRANT2005-01-122002-04-18GreatNokia OyjNokia Oyj
EP1602216B1●●●●●FORCED ENCRYPTION FOR WIRELESS LOCAL AREA NETWORKSGRANT2007-12-122003-03-13GreatNokia OyjNokia Oyj
EP1345386A2●●●●●Method of controlling network access in wireless environment and recording medium thereforGRANT2003-09-172002-03-16GreatSamsung Electronics Co LtdSamsung Electronics Co Ltd
EP1168763B1●●●●●Systems and methods for delegated digest access authorizationGRANT2006-11-152000-06-30GreatMicrosoft CorpMicrosoft Corp
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateEARLY
Tech DiversityNARROW
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
816
Recommended Classes
204
Government Assigned Classes
16
CPC
Title
Score
H04L9/32including means for verifying the identity or authority of a user of the system | or for message authentication  e.g. authorization  entity authentication  data integrity or data verification  non-repudiation  key authentication or verification of credentials| network architectures or network communication protocols for supporting entities authentication in a packet data network | (ref: H04L63/08)| | applying verification of the received information | (ref: H04L63/12)| | |  computer systems | (ref: G06F)| | coin-freed or like apparatus with coded identity card or credit card | (ref: G07F7/08)●●●●●
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)●●●●●
H04W12/06Authentication●●●●●
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)●●●●●
H04L61/35involving non-standard use of addresses for implementing network functionalities  e.g. coding subscription information within the address or functional addressing  i.e. assigning an address to a function●●●●●
H04L61/10of different types●●●●●
H04L63/0892by using authentication-authorization-accounting [AAA] servers or protocols●●●●●
H04L63/123received data contents  e.g. message integrity●●●●●
H04W48/16Discovering  processing access restriction or access information●●●●●
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.