loadpatents
name:-0.026582956314087
name:-0.021625995635986
name:-0.0007331371307373
Sundaram; Ganapathy S. Patent Filings

Sundaram; Ganapathy S.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Sundaram; Ganapathy S..The latest application filed is for "session key generation and distribution with multiple security associations per protocol instance".

Company Profile
0.28.24
  • Sundaram; Ganapathy S. - Hillsborough NJ
  • Sundaram; Ganapathy S. - Hillsboro NJ
  • Sundaram; Ganapathy S. - Middlesex NJ
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Automated security provisioning protocol for wide area network communication devices in open device environment
Grant 9,590,961 - Sundaram , et al. March 7, 2
2017-03-07
Policy routing-based lawful interception in communication system with end-to-end encryption
Grant 9,544,334 - Heck , et al. January 10, 2
2017-01-10
Secure registration of group of clients using single registration procedure
Grant 9,450,928 - Broustis , et al. September 20, 2
2016-09-20
Secure group messaging
Grant 9,166,778 - Sundaram , et al. October 20, 2
2015-10-20
Identity based authenticated key agreement protocol
Grant 9,106,410 - Sundaram August 11, 2
2015-08-11
Secure key management in conferencing system
Grant 9,049,024 - Sundaram , et al. June 2, 2
2015-06-02
Session key generation and distribution with multiple security associations per protocol instance
Grant 8,908,865 - Cakulev , et al. December 9, 2
2014-12-09
Secure key management in multimedia communication system
Grant 8,850,203 - Sundaram , et al. September 30, 2
2014-09-30
Session Key Generation And Distribution With Multiple Security Associations Per Protocol Instance
App 20140254794 - Cakulev; Violeta ;   et al.
2014-09-11
Session key generation and distribution with multiple security associations per protocol instance
Grant 8,774,411 - Cakulev , et al. July 8, 2
2014-07-08
Discovery of security associations
Grant 8,769,288 - Sundaram , et al. July 1, 2
2014-07-01
Bootstrapping method for setting up a security association
Grant 8,667,151 - Mizikovsky , et al. March 4, 2
2014-03-04
Identity Based Authenticated Key Agreement Protocol
App 20130297939 - Sundaram; Ganapathy S.
2013-11-07
Identity based authenticated key agreement protocol
Grant 8,510,558 - Sundaram August 13, 2
2013-08-13
Secure Group Messaging
App 20130182848 - Sundaram; Ganapathy S. ;   et al.
2013-07-18
Network-assisted Peer-to-peer Secure Communication Establishment
App 20130110920 - Broustis; Ioannis ;   et al.
2013-05-02
Secure Key Management In Conferencing System
App 20120322416 - Sundaram; Ganapathy S. ;   et al.
2012-12-20
Policy Routing-based Lawful Interception In Communication System With End-to-end Encryption
App 20120287922 - Heck; John Frederick ;   et al.
2012-11-15
Secure key management in conferencing system
Grant 8,301,883 - Sundaram , et al. October 30, 2
2012-10-30
System and method for cell-edge performance management in wireless systems using distributed scheduling
Grant 8,300,584 - Rudrapatna , et al. October 30, 2
2012-10-30
Discovery Of Security Associations
App 20120272064 - Sundaram; Ganapathy S. ;   et al.
2012-10-25
Secure Registration of Group of Clients Using Single Registration Procedure
App 20110307694 - Broustis; Ioannis ;   et al.
2011-12-15
Secure Key Management in Conferencing System
App 20110051912 - Sundaram; Ganapathy S. ;   et al.
2011-03-03
Secure Key Management in Multimedia Communication System
App 20110055567 - Sundaram; Ganapathy S. ;   et al.
2011-03-03
Automated Security Provisioning Protocol for Wide Area Network Communication Devices in Open Device Environment
App 20110016321 - Sundaram; Ganapathy S. ;   et al.
2011-01-20
Session Key Generation and Distribution with Multiple Security Associations per Protocol Instance
App 20100303238 - Cakulev; Violeta ;   et al.
2010-12-02
System and method for cell-edge performance management in wireless systems using centralized scheduling
App 20100284346 - Rudrapatna; Ashok N. ;   et al.
2010-11-11
System and method for cell-edge performance management in wireless systems using distributed scheduling
App 20100284345 - Rudrapatna; Ashok N. ;   et al.
2010-11-11
Method of sharing mobile unit state information between base station routers
Grant 7,826,849 - Bosch , et al. November 2, 2
2010-11-02
Techniques for efficient control of aggregating wireless voice communications
Grant 7,801,174 - Joshi , et al. September 21, 2
2010-09-21
Identity Based Authenticated Key Agreement Protocol
App 20100211779 - Sundaram; Ganapathy S.
2010-08-19
Network Enforced Access Control For Femtocells
App 20090191845 - MORGAN; TODD C. ;   et al.
2009-07-30
Method for differentiating services and users in communication networks
Grant 7,502,317 - Joshi , et al. March 10, 2
2009-03-10
Bootstrapping Method For Setting Up A Security Association
App 20090043901 - Mizikovsky; Semyon B. ;   et al.
2009-02-12
Method Of Sharing Mobile Unit State Information Between Base Station Routers
App 20080268853 - Bosch; Peter ;   et al.
2008-10-30
Method and apparatus for managing packet data resources
Grant 7,426,196 - Gopalakrishnan , et al. September 16, 2
2008-09-16
Method and apparatus for managing packet data resources
App 20060171307 - Gopalakrishnan; Nandu ;   et al.
2006-08-03
Techniques for efficient control of aggregating wireless voice communications
App 20060140216 - Joshi; Niranjan ;   et al.
2006-06-29
Method for differentiating services and users in communication networks
App 20030214951 - Joshi, Niranjan S. ;   et al.
2003-11-20

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed