1
LUNA Michael, BOTT Ross: [fr] SURVEILLANCE DES ACTIVITÉS DES APPLICATIONS MOBILES À LA RECHERCHE DUN TRAFIC MALVEILLANT SUR UN DISPOSITIF MOBILE, [en] MONITORING MOBILE APPLICATION ACTIVITIES FOR MALICIOUS TRAFFIC ON A MOBILE DEVICE. SEVEN NETWORKS, LUNA Michael, BOTT Ross, FU Yenyun, January 31, 2013: WO/2013/015994 (46 worldwide citation)

[en] Systems and methods for monitoring mobile application activities for malicious traffic on a mobile device are disclosed. One embodiment of a method which can be implemented on a system includes, monitoring application activities of a mobile application on the mobile device, detecting, from the ...


2
Judson Flynn, Erick John Haughn, John Lewis: Mobile handset extension to a device. AT&T Mobility II, Amin Turocy & Watson, May 20, 2014: US08731519 (45 worldwide citation)

System(s) and method(s) are provided for extension of mobile operation to a device. An extension interface comprises a client component within a mobile that is linked to a client component within the device. Extension of mobile operation is secured via delivery of credentials associated with the mob ...


3
LUNA Michael, BOTT Ross: [fr] GÉNÉRATION ET DISTRIBUTION AUTOMATIQUES DINFORMATIONS DE POLITIQUE CONCERNANT UN TRAFIC MOBILE MALVEILLANT DANS UN RÉSEAU SANS FIL, [en] AUTOMATIC GENERATION AND DISTRIBUTION OF POLICY INFORMATION REGARDING MALICIOUS MOBILE TRAFFIC IN A WIRELESS NETWORK. LUNA Michael, BOTT Ross, SEVEN NETWORKS, FU Yenyun, January 31, 2013: WO/2013/015995 (45 worldwide citation)

[en] Systems and methods for automatically generating and distributing policy information for malicious mobile traffic in a wireless network are disclosed. One embodiment of a method which can be implemented on a system includes, aggregating suspicious activity information detected across multiple m ...


4
Ieon Chen: Cellphone controllable car intrusion recording and monitoring reaction system. Innova Electronics, Stetina Brunda Garred & Brucker, October 7, 2014: US08855621 (36 worldwide citation)

A cellphone controllable car intrusion system is provided. This system includes a vehicle OEM system, including an electronic control unit (ECU), a diagnostic port, a plurality of OEM cameras, a plurality of OEM sensors, an OEM satellite communication system, and an OEM local communication system. T ...


5
Achim Luft: Methods and apparatus for machine-to-machine based communication service classes. Apple, Downey Brand, April 26, 2016: US09326173 (30 worldwide citation)

Methods and apparatus enabling a wireless network to provide differentiated services to a machine-to-machine (M2M) client. In one embodiment, the wireless network comprises a UMTS network, and the Home Location Register (HLR) entity identifies subscriptions as machine-to-machine (M2M) enabled device ...


6
David Richardson, Kevin Mahaffey, Jonathan Grubb: User account creation involving a mobile device. Lookout, Greenberg Traurig, January 20, 2015: US08938810 (27 worldwide citation)

Mobile devices may often communicate with network (“cloud”) services that require an account. Because it may be undesirable to require user interaction when creating an account, it may be desirable to create an account associating a mobile device to a network service without requiring a user to expl ...


7
Alexander A Medina, Andrew H Vyrros, Darryl N Bleau, Jeffrey T Davey, Justin E Santamaria, Justin N Wood: System and method for secure instant messaging. Apple, Blakely Sokoloff Taylor & Zafman, February 17, 2015: US08958559 (23 worldwide citation)

A system and method for secure instant messaging are described. For example, in one embodiment, a first user identifies a second user for an instant messaging session with the ID code of the second user. The first user is provided with network information for the second user and a public key associa ...


8
Choi Hyun Kyung: Authentication of a mobile station. LG Electronics, July 12, 2006: EP1679925-A1 (20 worldwide citation)

A method for processing authentication of a mobile station in a mobile communication system comprises determining whether an authentication state is inactivated, and requesting registration. The method also comprises receiving a result message from a network, and activating the authentication state ...


9
Kevin Patrick Mahaffey, David Golombek, David Luke Richardson, Timothy Micheal Wyatt, James David Burgess, John G Hering: System and method for adverse mobile application identification. Lookout, Dergosits & Noah, March 17, 2015: US08984628 (19 worldwide citation)

A system and method identifies mobile applications that can have an adverse effect on a mobile device or mobile network. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application has an adverse effect or has the poten ...


10
RIESCHICK GARY, DUNNE CAMERON ROSS, MCNAMEE ALAN, HOGAN JOE: [fr] Procédés, systèmes et dispositifs pour la détection et la prévention de programmes malveillants dans un réseau, [de] Verfahren, Systeme und Vorrichtungen zur Erkennung und Vermeidung von Schadprogrammen in einem Netzwerk, [en] Methods, systems and devices for the detection and prevention of malware within a network. OPENET TELECOM, September 12, 2012: EP2498442-A1 (19 worldwide citation)

[en] Methods, systems and devices examine data flows in a communication system control network for known malware threats and suspicious properties typically associated with malware threats. A policy management system inside the control network accesses a user repository and a charging network, and p ...