1
Vivek Sharma, Prasasth R Palnati, Rajeev Chawla, Arthur J Barabell, Champak Das: Non-circular paging areas. Airvana, Fish & Richardson P C, July 6, 2010: US07751835 (23 worldwide citation)

In a radio access network, techniques for defining a non-circular paging area in which an access terminal is to be paged based on distance-based location updating information for a sector of the network.


2
Jing Xiang, Shreedhar Shirgurkar, Vladimir Senkov, Champak Das: Technique for maintaining secure network connections. Rockstar Bidco, Withrow & Terranova PLLC, May 29, 2012: US08186026 (2 worldwide citation)

A technique for maintaining secure network connections is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for maintaining secure network connections. The method may comprise detecting a change of address associated with a first network element. The method ...


3
Jing Xiang, Shreedhar Shirgurkar, Vladimir Senkov, Champak Das: Technique for maintaining secure network connections. RPX CLEARINGHOUSE, Withrow & Terranova P L L C, August 16, 2016: USRE046113

A technique for maintaining secure network connections is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for maintaining secure network connections. The method may comprise detecting a change of address associated with a first network element. The method ...


4
Vivek Sharma, Prasasth R Palnati, Rajeev Chawla, Arthur J Barabell, Champak Das: Non-circular paging areas. Fish & Richardson PC, April 5, 2007: US20070077948-A1

In a radio access network, techniques for defining a non-circular paging area in which an access terminal is to be paged based on distance-based location updating information for a sector of the network.


5
Jing Xiang, Shreedhar Shirgurkar, Vladimir Senkov, Champak Das: Technique for maintaining secure network connections. Trop Pruner & Hu PC, September 8, 2005: US20050198691-A1

A technique for maintaining secure network connections is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for maintaining secure network connections. The method may comprise detecting a change of address associated with a first network element. The method ...


6
Jing Xiang, Shreedhar Shirgurkar, Vladimir Senkov, Champak Das: Technique for maintaining secure network connection. Nortel Networks, wang zhongzhong, December 26, 2012: CN201210302149

A technique for maintaining secure network connections is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for maintaining secure network connections. The method may comprise detecting a change of address associated with a first network element. The method ...