1
Authentication policy. British Telecomm, June 25, 2008: EP1978772-A1 (163 worldwide citation)

A method of managing an authentication policy in a mobile telecommunications device, wherein the mobile telecommunications device comprises a plurality of security module applications, said method comprising the steps of: providing a profile associated with each of the plurality of security module a ...


2
Zheng Zhibin, Liu Tingyong, Tu Weihua, Hou Zhipeng: A method, system and apparatus for realizing the data service safety of the mobile communication system. Huawei Tech, April 11, 2007: EP1772988-A1 (160 worldwide citation)

A method for implementing data service security in a mobile communication system includes: obtaining security condition of a user terminal based on security-relevant configuration information reported by the user terminal; determining a security policy for the user terminal based on the security-rel ...


3
Douglas Bell, Michael A Leabman: System and method for smart registration of wireless power receivers in a wireless power network. Energous Corporation, Eric L Sophir, Dentons US, January 3, 2017: US09537354 (136 worldwide citation)

A system and method for smart registration of wireless power receivers within a wireless power network is disclosed. Each wireless power device may include a universally unique identifier (UUID). Each wireless power device bought by a customer may be registered, at the time of purchase or later. The ...


4
Douglas Bell, Michael Leabman: System and method for smart registration of wireless power receivers in a wireless power network. Energous Corporation, Eric L Sophir, Dentons US, January 3, 2017: US09538382 (135 worldwide citation)

The embodiments described herein include a transmitter that transmits a power transmission signal (e.g., radio frequency (RF) signal waves) to create a three-dimensional pocket of energy. At least one receiver can be connected to or integrated into electronic devices and receive power from the pocke ...


5
CLARK DAVID: System and method for unlocking a device. BCE, Henderson Neil, July 8, 2010: WO/2010/075623 (83 worldwide citation)

A system for unlocking a mobile device including: an input module configured to receive voice information; an output module configured to output an unlock signal; a processor connected to the input module and output module and configured to: receive the voice information from the input module; analy ...


6
Ryan Yong Kim, Venkata Subba Rao Pathuri: Setup of multiple IOT devices. BELKIN INTERNATIONAL, Kilpatrick Townsend & Stockton, December 8, 2015: US09210192 (75 worldwide citation)

The present disclosure relates to the setup of multiple devices on a local area network. Specifically, various techniques and systems are provided for utilizing a network device to efficiently add a new device to a local area network using an existing network device. Exemplary embodiments of the pre ...


7
Caroline Jactat, Hisashi Futaki, Giorgio Nunzi: Network entity, communication device, mobile communication device and method thereof. NEC CORPORATION, Sughrue Mion PLLC, November 29, 2016: US09510203 (73 worldwide citation)

A communication system is described in which a mobile communication device receives MDT configuration requests from a base station or radio network controller to initiate an MDT measurement session for obtaining measurement data and location related data for identifying a location to which said meas ...


8
Yi Lu, Olivier Contant, Wei Zhao, Anirban Banerjee, Abhishek Abhishek, Yue Chen: Differentiated management of wireless connectivity. Microsoft Corporation, Andrew Sanders, Micky Minhas, July 29, 2014: US08793304 (68 worldwide citation)

In some embodiments, a wireless management service provides the capability to manage connectivity between a device and one or more wireless networks on a differentiated basis. For example, network profiles may be managed in a way that is influenced by the identity of the user, such that profiles whi ...


9
Waheed Qureshi, Kelly Brian Roach, John M McGinty, Olivier Andre, Shafaq Abdullah, Thomas H DeBenning, Ahmed Datoo: Secure mobile browser for protecting enterprise data. Citrix Systems, Banner & Witcoff, October 21, 2014: US08869235 (56 worldwide citation)

A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly ...


10
Mourad Ben Ayed: System for securing a mobile terminal. Daniel B Schein, June 18, 2013: US08467770 (54 worldwide citation)

A method and apparatus for securing user data on a mobile device using a Bluetooth fob. The method and apparatus enables robust access security, issues alerts when the user leaves proximity of his/her terminal, and can delete confidential data. The method also teaches using a Bluetooth smart phone s ...