11 patents
Utility
Methods for Certificate Issuance in Remote Provisioning Architectures for Embedded UICCS
13 Apr 23
A system and method includes mobile device, a SIM associated with mobile device, an MNO computer, a computer associated with an owner of the mobile device, a first set of keys stored in the SIM for securely communicating with the MNO computer, and a second set of keys for securely communicating with the computer associated with the owner of the mobile device, to exchange application information.
Ron GRIPPO, Luke KIERNAN, William BUCHANAN, Brian PEEBLES
Filed: 28 Nov 22
Utility
System and method for accessing a privately hosted application from a device connected to a wireless network
9 Jun 22
A method and system for determining a path of data traffic based on a destination Internet Protocol (IP) address, the destination IP address being either private or public and belonging to any one of multiple organizations.
Ranjith Kumar CHENNUPATI, Stuart MITCHELL, Marc SCHNEIDER, Eric Alistair WILLIAMS
Filed: 23 Feb 22
Utility
3wl5z58lk24ce35locaxgvq0c 4xqrqsa1a7xdfnx
12 Aug 21
A system is provided that allows profiles from multiple mobile network operators to be provisioned across multiple eUICCs from different eUICC manufacturers that may each utilize different provisioning methods.
Michael Joseph HIGGINS, Damien John STEPHENS, Minh Tam Patrick CAO
Filed: 6 May 19
Utility
19fr48wiar6sflc5ojtz1edty6b gmv8l7dbdaxrv
12 Aug 21
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data.
Carlos Miranda, Manish Arora, Kumar Thirumalaiappan, Brian Dowd
Filed: 26 Apr 21
Utility
9cu96txsrbzqvv pthxsnchkc5bty4p1rpwnfgr2l9we5iq3gz8vwf2r8
11 Mar 21
A system and method includes mobile device, a SIM associated with mobile device, an MNO computer, a computer associated with an owner of the mobile device, a first set of keys stored in the SIM for securely communicating with the MNO computer, and a second set of keys for securely communicating with the computer associated with the owner of the mobile device, to exchange application information.
Ron GRIPPO, Luke KIERNAN, William BUCHANAN, Brian PEEBLES
Filed: 7 May 19
Utility
iar7yu15g mpbdpz8rr8mvhsfnml4wf06tuodbu66j5thcr5
21 Jan 21
A method and a system for determining a path of data traffic based on a destination Internet Protocol (IP) address, the destination IP address being either private or public and belonging to any one of multiple organizations.
Ranjith Kumar CHENNUPATI, Stuart MITCHELL, Marc SCHNEIDER, Eric Alistair WILLIAMS
Filed: 5 Oct 20
Utility
wrjwmlhmhlzib0n8sw2vco0b08q14q7ml9 7qi8achs0qsgnvfj0m68l
4 Mar 20
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data.
Carlos Miranda, Manish Arora, Kumar Thirumalaiappan, Brian Dowd
Filed: 5 Nov 19
Utility
vnjgf6bkbsleljvez5d9z1gnx73ya3dw3kl348uarc0d42g5owyn76lc8
4 Mar 20
A telecommunications service provider's real time analysis system analyzes communications data to detect potentially fraudulent communications data, where the analysis is performed in real time in the routing path of the communications data.
Carlos Miranda, Manish Arora, Kumar Thirumalaiappan, Brian Dowd
Filed: 6 Nov 19
Utility
26c3dcs7jhpgogw4737psb6iff52o432oritf9p
25 Dec 19
A method that detects unwanted calls based on information shared between a first telecommunications network provided by a first service provider and a second service provider providing a second telecommunications network including receiving, by a data-processing system, a request to provide a telecommunications service to the first telecommunications network, the request being received by the first telecommunications network from a user of the first telecommunications network through a first gateway, and wherein the request comprises a calling party identification that identified a calling party and a called party identification that identified a called party.
Robert BENLOLO, Carlos MIRANDA, Alan TAI, Kumar THIRUMALAIAPPAN
Filed: 31 Jan 18
Utility
t8b2gsm8oo5xmb6nph9jpp4qrtytecmozn2n4b
18 Dec 19
A method and a system for determining a path of data traffic based on a destination Internet Protocol (IP) address, the destination IP address being either private or public and belonging to any one of multiple organizations.
Ranjith Kumar CHENNUPATI, Stuart MITCHELL, Marc SCHNEIDER, Eric Alistair WILLIAMS
Filed: 23 Jan 18
Utility
zwy09b3res9qddvppo6ppdo9gjjfyx6lt740
18 Dec 19
A method and system for determining a path of data traffic based on a destination Internet Protocol (IP) address, the destination IP address being either private or public and belonging to any one of multiple organizations.
Ranjith Kumar CHENNUPATI, Stuart MITCHELL, Marc SCHNEIDER, Eric Alistair WILLIAMS
Filed: 18 Feb 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first