1
Lee R Boynton, Trevor A Fiatal, Scott M Burke, Mark Sikes: Secure transport for mobile communication network. Seven Networks, Stolowitz Ford Cowger, December 4, 2007: US07305700 (136 worldwide citation)

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.


2
Trevor A Fiatal, Lee R Boynton, Scott M Burke, Brian D Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J Duncan: Connection architecture for a mobile network. Seven Networks, Marger Johnson & McCollum P C, November 21, 2006: US07139565 (130 worldwide citation)

A real-time communication architecture establishes a continuous connection between an enterprise network and a communication management system. The connection is continuously held open allowing mobile devices real-time access to enterprise email systems. The real-time communication architecture can ...


3
Lee R Boynton, Trevor A Fiatal, Scott M Burke, Mark Sikes: Secure transport for mobile communication network. Seven Networks, Townsend and Townsend and Crew, November 2, 2010: US07827597 (100 worldwide citation)

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.


4
Lee R Boynton, Trevor A Fiatal, Scott M Burke, Mark Sikes: Secure end-to-end transport through intermediary nodes. Seven Networks, Perkins Coie, February 28, 2012: US08127342 (80 worldwide citation)

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.


5
Lee R Boynton, Trevor A Fiatal, Scott M Burke, Mark Sikes: Secure end-to-end transport through intermediary nodes. Seven Networks, Perkins Coie, October 1, 2013: US08549587 (5 worldwide citation)

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.


6
Trevor A Fiatal, Lee R Boynton, Scott M Burke, Brian D Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J Duncan: Mobile device power management in data synchronization over a mobile network with or without a trigger notification. Seven Networks, Nifong Kiefer and Klinck PLLC, August 19, 2014: US08811952 (2 worldwide citation)

A real-time communication architecture establishes a continuous connection between an enterprise network and a communication management system. The connection is continuously held open allowing mobile devices real-time access to enterprise email systems. The real-time communication architecture can ...


7
Trevor A Fiatal, Lee R Boynton, Scott M Burke, Brian D Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J Duncan: Connection architecture for a mobile network. Seven Networks, NKK Patent Law PLLC, March 24, 2015: US08989728 (1 worldwide citation)

A real-time communication architecture establishes a continuous connection between an enterprise network and a communication management system. The connection is continuously held open allowing mobile devices real-time access to enterprise email systems. The real-time communication architecture can ...


8
Trevor A Fiatal, Lee R Boynton, Scott M Burke, Brian D Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J Duncan: Connection architecture for a mobile network. Seven Networks, NK Patent Law PLLC, March 28, 2017: US09608968 (1 worldwide citation)

A mobile device for accessing content stored on a remote server over a mobile network is provided. The mobile device includes a processor configured to direct the mobile device to receive at least a portion of a list initiated by the remote server, the list identifying folders or files stored on the ...


9
Lee R Boynton, Trevor A Fiatal, Scott M Burke, Mark Sikes: Secure end-to-end transport through intermediary nodes. Seven Networks, NK Patent Law PLLC, July 18, 2017: US09712476 (1 worldwide citation)

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.


10
Trevor A Fiatal, Lee R Boynton, Scott M Burke, Brian D Gustafson, Binu Raj, William Alvarado, Juan Benitez, Fred J Duncan: Mobile device having power save feature for establishing communications. Seven Networks, NK Patent Law PLLC, March 21, 2017: US09602457

A mobile device for accessing content stored on a remote server over a mobile network includes a processor configured to direct the mobile device to send a request directing a management server to initiate a transaction.