1
Poornima Lalwaney, Jonathan A Fellows: Dynamic network configuration of a one-way adapter using a proxy agent that communicates with a resource server through a configured return path adapter. General Instrument Corporation, Barry R Lipsitz, Douglas M McAllister, September 11, 2001: US06289377 (56 worldwide citation)

A one-way adapter such as a cable modem is initialized to allow a personal computer to receive data from a computer network such as the Internet via a broadcast channel, while transmitting data upstream to the computer network via a telephone line. First, a two-way adapter such as a phone modem is i ...


2
Michael A Grossman, Jonathan A Fellows, Clive E Holborow: MPEG packet header compression for television modems. General Instrument Corporation of Delaware, Barry R Lipsitz, Ralph F Hoppin, November 10, 1998: US05835730 (42 worldwide citation)

A method and apparatus are provided for receiving a packet stream having fixed length packets. Data carried in the packet stream is selectively processed for output to a computer. A packet identifier filter selects particular packets from the recovered packet stream. A computer disk controller recei ...


3
Eric J Sprunk, Paul Moroney, Alexander Medvinsky, Steven E Anderson, Jonathan A Fellows: Internet protocol telephony security architecture. General Instrumental Corporation, Larry T Cullen, July 28, 2009: US07568223 (2 worldwide citation)

A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as si ...


4
Eric J Sprunk, Paul Moroney, Alexander Medvinsky, Steven E Anderson, Jonathan A Fellows: Internet protocol telephony security architecture. Motorola Mobility, September 24, 2013: US08544077 (2 worldwide citation)

A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as si ...


5
Eric J Sprunk, Paul Moroney, Alexander Medvinsky, Steven E Anderson, Jonathan A Fellows: Internet protocol telephony security architecture. General Instrument Corporation, Townsend And Townsend And Crew, February 3, 2005: US20050027985-A1

A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as si ...


6
Eric J Sprunk, Paul Moroney, Alexander Medvinsky, Steven E Anderson, Jonathan A Fellows: Internet protocol telephony security architecture. General Instrument Corporation, Motorola, Law Department, December 31, 2009: US20090323954-A1

A secure Internet Protocol (IP) telephony system, apparatus, and methods are disclosed. Communications over an IP telephony system can be secured by securing communications to and from a Cable Telephony Adapter (CTA). The system can include one or more CTAs, network servers, servers configured as si ...


7

8

9