1
Hansen Mark D, Chow Richard T, Mowry Kevin C, Smith Dwight R, Warden James P: System and method for managing access to protected content by untrusted applications. Motorola A Corporation Of The State Of Delaware, Hansen Mark D, Chow Richard T, Mowry Kevin C, Smith Dwight R, Warden James P, WATANABE Hisashi David, December 8, 2005: WO/2005/117390 (2 worldwide citation)

There is provided a communication device, and a method thereof, for managing access to protected content. The communication device comprises an application (302), a trusted file system service (316), a trusted agent (318) and a trusted content renderer (320). The application (302) requests performan ...


2
Lau Vincent W, Binzel Charles P, Bruner John D, Hansen Mark D, Kotzin Michael D: System and method for managing time-to-live information of media content. Motorola, Lau Vincent W, Binzel Charles P, Bruner John D, Hansen Mark D, Kotzin Michael D, WATANABE Hisashi David, October 13, 2005: WO/2005/096596 (1 worldwide citation)

A wireless communication network, and a method thereof, for communicating with a remote device (104) via a wireless link comprising a transceiver (202) and a processor (204). The transceiver (202) obtains preference information relating to the remote device (104). The processor (204) adjusts time-to ...


3
Hansen Mark D, Pince Julien: Dynamic mobile call forwarding by local area service discovery. Motorola, Hansen Mark D, Pince Julien, CYGAN Joseph T, December 21, 2007: WO/2007/146471

A mobile communication device as described herein is configured to support a wireless service discovery routine within a wireless local area. The service discovery routine identifies compatible devices in the vicinity of the mobile device, where the compatible devices represent potential forward-to ...


4
Arnal Julien, Ehrhart Francois Xavier, Hansen Mark D: Method and apparatus for recovery from network disconnections in a peer-to-peer network. Motorola, Arnal Julien, Ehrhart Francois Xavier, Hansen Mark D, CYGAN Joseph T, May 2, 2008: WO/2008/051724

A P2P network (100) includes a client device (102), a source device (104) and a proxy device (106). The source device (104) has access to a file and assigns a queue position for download of the file (904) in response to a request for download of the file (902). The client device (102) requests downl ...


5
Gurney David P, Ayoub Ramy S, Belcea John M, Bonta Jeffrey D, Braun Mark R, Corke Robert J, Hansen Mark D, Silk S David, Ware Christopher G: Method and apparatus for operating a node within a mobile ad hoc cognitive radio network. Motorola, Gurney David P, Ayoub Ramy S, Belcea John M, Bonta Jeffrey D, Braun Mark R, Corke Robert J, Hansen Mark D, Silk S David, Ware Christopher G, KARPINIA Randi L, June 11, 2009: WO/2009/073333

A method and apparatus for operation of a node (102, 104, 106) within a mobile ad hoc cognitive radio network (100) is provided. The method includes sensing at least one assigned communications channel. Sensing at least one assigned communications channel includes measuring a value of at least one p ...