An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information.
|
0. 26. A method for intercepting data, comprising:
in response to receiving a connection request, negotiating a point-to-point encryption scheme with a mobile device, the point-to-point encryption scheme negotiated between a management server and the mobile device;
automatically intercepting, at the management server, data received and/or sent by an intercept target, wherein data is intercepted without altering operation of application services on the mobile device;
inspecting packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the device;
preserving encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; and
transferring both the decrypted other information and the end-to-end information.
1. A method for intercepting data, comprising:
receiving, at a management server, a connection from a remote client, the connection being initiated by the remote client and established outbound from the remote client;
negotiating a point-to-point encryption scheme with a remote mobile device, the point-to-point encryption scheme negotiated between the management server and the remote mobile device;
receiving, at the management server, a value identifying an intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the remote mobile device;
automatically intercepting, at the management server, data received and/or sent by the intercept target identified by the value, wherein data is intercepted without altering operation of email application services that operate on the remote mobile device;
inspecting packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the remote mobile device;
preserving encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; and
transferring both the decrypted other information and the end-to-end information from the management server to a remote device.
17. A communication management system, comprising:
a management server configured to receive a connection initiated by a remote client and established outbound from the remote client;
the management server configured to negotiate a point-to-point encryption scheme with a remote mobile device, the point-to-point encryption scheme negotiated between the management server and the remote mobile device;
the management server configured to receive a value identifying an intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the remote mobile device;
the management server configured to automatically intercept data received and/or sent by the intercept target identified by the value, wherein the data is intercepted without altering operation of email application services that operate on the remote mobile device;
the management server configured to inspect packets having the intercepted data to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme negotiated with the remote mobile device;
the management server configured to preserve encryption that is included on the end-to-end encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained during the point-to-point encryption scheme negotiation; and
the management server configured to transfer both the decrypted other information and the end-to-end information from the management server to a remote device.
0. 45. A communication management system for intercepting data, comprising:
a processor;
a network interface configured to receive a connection request; and
a memory unit having instructions stored thereon, wherein the instructions, when executed by the processor, causes the communication management system to:
negotiate a point-to-point encryption scheme;
inspect packets having the data to be intercepted to distinguish end-to-end encrypted information from other information that is encrypted according to the point-to-point encryption scheme;
preserve encryption that is included on the encrypted information when received while removing encryption that is included on at least a portion of the other information, said other information decrypted using a key obtained in association with the point-to-point encryption scheme;
transfer both the decrypted other information and the end-to-end encrypted information;
automatically format the intercepted data into log files including:
generating log files that identify intercepted data for associated contiguous predetermined time periods extending over a continuous intercept period; and
generating the log files for back-to-back time periods, the management server generating each log file by selecting between inserting the intercepted data and an inactivity indication therein such that each of the log files contains at least one selected from the group including the intercepted data for the associated time period and an indication that no data was intercepted during the associated time period;
negotiate the point-to-point encryption scheme with a mobile device in response to receiving the connection request, and
intercept data received and/or sent by an intercept target, wherein data is intercepted without altering operation of application services on the mobile device.
2. The method of
formatting the data that is intercepted during the requested time period and associated with the target user into one or more first log files, each of the first log files corresponding to a different time segment occurring during the requested time period and indicating one or more intercept events for its corresponding time segment; and
formatting one or more second different log files associated with the requested time period, the second log files indicating inactivity and corresponding to different remaining time segments that occur during the requested time period and that are unrepresented by the first log files that indicate the intercept events such that the first and second log files record monitoring for the entire requested time period independently of whether the data is intercepted intermittently during the requested time period.
3. The method of
4. The method of
6. The method of
7. The method according to
8. The method of
9. The method according to
combining, at the management server, the end-to-end encrypted information of the intercepted data with the decrypted other information of the intercepted data in a same log file.
10. The method according to
storing, at the management server, the intercepted data in a structure format that identifies when the data was intercepted and at the same time provides authentication that the stored intercepted data has not been altered or deleted.
11. The method according to
12. The method according to
generating, using the management server, log files over an intercept period that encompasses the multiple contiguous time periods;
storing the log files in a same intercept directory;
inserting a warrant identifier received together with the value into the intercept directory; and
generating a name for the intercept directory that identifies the intercept target and the intercept period over which the log files were generated.
13. The method according to
encrypting the log files in the intercept directory with an encryption scheme known by an agency issuing the warrant, said encryption performed using the management server that intercepted the data; and
sending the encrypted intercept directory to an electronic mailbox accessible by the agency.
14. The method according to
generating a Cyclic Redundancy Check (CRC) or other digital signature value for all of the log files in the intercept directory;
encrypting the resulting generated value; and
providing the encrypted generated value to the enforcement agency, said encrypted generated value sent in a different communication than the encrypted intercept directory, said encrypted generated value verifying that the log files have not been altered.
15. The method according to
upon reading the intercept configuration file automatically intercepting data received and/or sent by the remote mobile device;
formatting any intercepted data into log files that identify when the data was intercepted; and
encrypting the log files using the encryption key.
16. The method according to
18. The communication management system of
the management server configured to automatically format the intercepted data into log files;
the management server configured to generate multiple log files that identify any intercepted data for associated contiguous predetermined time periods extending over a continuous intercept period; and
the management server configured to generate the log files for back-to-back time periods, the management server further configured to generate each log file by selecting between inserting the intercepted data and an inactivity indication therein such that each of the log files contains at least one selected from the group comprising the intercepted data for the associated time period and an indication that no data was intercepted during the associated time period.
19. The communication management system of
the management server is configured to select a same duration for the time periods according to selectable time interval values included in an intercept configuration file.
20. The communication management system of
the management server configured to encrypt the log files according to an encryption key known by an enforcement agency associated with the warrant before emailing the encrypted log files to a mailbox for the enforcement agency.
21. The communication management system of
the management server configured to identify a first portion of the intercepted data encrypted using a first known security association for which the management server has knowledge of the encryption key and identify a second portion of the intercepted data encrypted using a second unknown security association, the management server configured to decrypt and store the first portion of the intercepted data into an associated one of the log files and combine the encrypted second portion of the intercepted data with the decrypted first portion of the intercepted data in the same associated log file.
22. The communication management system of
23. The communication management system of
the management server is configured to encrypt both the decrypted first portion of the intercepted data and the second encrypted portion of the intercepted data.
24. The communication management system of
25. The communication management system of
0. 27. The method of claim 26, further comprising, receiving, at the management server, a value identifying the intercept target for a legal intercept and an indication that interception is authorized by a warrant, the intercept target corresponding to the mobile device.
0. 28. The method of claim 26, wherein the packets are intercepted during a requested time period, and the method further comprises: formatting the data that is intercepted during the requested time period and associated with a target user into one or more first log files.
0. 29. The method of claim 28, wherein: each of the first log files corresponding to a different time segment occurring during the requested time period and indicating one or more intercept events for its corresponding time segment.
0. 30. The method of claim 29, further comprising:
formatting one or more second different log files associated with the requested time period, the second log files indicating inactivity and corresponding to different remaining time segments that occur during the requested time period and that are unrepresented by the first log files that indicate the intercept events such that the first and second log files record monitoring for the entire requested time period independently of whether the data is intercepted intermittently during the requested time period.
0. 31. The method of claim 28, wherein the log files record an unbroken sequence of continuous monitoring over the requested time period independently of whether the data is intercepted intermittently.
0. 32. The method of claim 28, further comprising formatting the log files with different time values usable for verifying that communications from the mobile device were continuously monitored during the requested time period regardless of whether the data was intercepted intermittently.
0. 33. The method of claim 26, wherein the data is intercepted according to an intercept configuration file that includes at least a intercept identifier and a user ID identifying a target user.
0. 34. The method of claim 26, wherein the encryption that is included on the end-to-end encryption information uses a security association that is kept secret from the management.
0. 35. The method of claim 26, further comprising determining whether to encrypt at least one of the end-to-end information and the decrypted information prior to said transferring.
0. 36. The method according to claim 26, further comprising:
combining the end-to-end encrypted information of the intercepted data with the decrypted other information of the intercepted data in a log file.
0. 37. The method according to claim 26, further comprising:
storing the intercepted data in a structure format that identifies when the data was intercepted and provides authentication that the stored intercepted data has not been altered or deleted.
0. 38. The method according to claim 26, further comprising monitoring communications between a remote client and the device for multiple contiguous time periods.
0. 39. The method according to claim 38, further comprising:
generating log files over an intercept period that encompasses the multiple contiguous time periods;
storing the log files in a same intercept directory.
0. 40. The method according to claim 39, further comprising:
inserting a warrant identifier received together with the value into the intercept directory; and
generating a name for the intercept directory that identifies the intercept target and the intercept period over which the log files were generated.
0. 41. The method according to claim 39, further comprising:
encrypting the log files in the intercept directory with an encryption scheme known by an agency issuing the warrant, said encryption performed using the management server that intercepted the data; and
sending the encrypted intercept directory to an electronic mailbox accessible by the agency.
0. 42. The method according to claim 39, further comprising:
generating a Cyclic Redundancy Check (CRC) or other digital signature value for all of the log files in the intercept directory;
encrypting the resulting generated value; and
providing the encrypted generated value to the enforcement agency, said encrypted generated value sent in a different communication than the encrypted intercept directory, said encrypted generated value verifying that the log files have not been altered.
0. 43. The method according to claim 26, further comprising:
reading an intercept configuration file that contains a warrant identifier, the value identifying the user, an enforcement agency known encryption key and an electronic mailbox address;
upon reading the intercept configuration file automatically intercepting data received and/or sent by the remote mobile device;
formatting any intercepted data into log files that identify when the data was intercepted; and
encrypting the log files using the encryption key.
0. 44. The method according to claim 26, wherein the end-to-end encrypted information is associated with content and is protected with an end-to-end encryption scheme that is kept secret from any midpoints located between transmitting and receiving endpoints, and the other information is associated with transaction routing information and is protected with the point-to-point encryption scheme.
|
The present This patent application is a reissue application for commonly assigned U.S. Pat. No. 7,680,281, issued from U.S. patent application Ser. No. 12/211,790, filed on Sep. 16, 2008, which is a continuation of U.S. patent application Ser. No. 11/255,291, filed on Oct. 20, 2005, now U.S. Pat. No. 7,441,271, which claims priority to U.S. Provisional Patent Application No. 60/620,889, filed on Oct. 20, 2004, each of which are hereby incorporated by reference in their entirety.
Wireless digital communication systems wirelessly transport electronic mail (email), text messages, text files, images, Voice Over Internet Protocol (VoIP) data, and any other types of digital data and communications to wireless devices. Wireless communication system providers are facing the prospects of having to comply with a variety of legal-intercept (wiretap) requirements. Authorization for a legal intercept may include warrants for “wiretap/interception”, “search and seizure”, or both. For example, the requirements outlined in CALEA (US Communications Assistance for Law Enforcement Act of 1994, http://www.askcalea.net/) may have to be met by any proposed solution. In another example, the requirements outlined by the Australian Communications Authority (http://www.aca.gov.au) in the Australia Telecommunications Act of 1997 may have to be met by any proposed solution.
There are several technical challenges complying with these legal intercept requirements that may not exist in conventional telephone systems. For example, the intercepted data may be encrypted. The wireless network provider must be able to intercept the encrypted data, and any other non-encrypted information, without tipping off the intercept target that the wiretap is taking place.
The wiretap warrant may require the communication system provider to provide any intercepted information in substantially real-time or may require the communication system provider to intercept and store communications in an automated manner for later retrieval and analysis by the law enforcement agency. Evidentiary problems exist with information intercepted outside the presence and control of the enforcement agency. For example, the intercepted communications could be either intentionally or inadvertently deleted. A system malfunction could also prevent some communications from being intercepted. There is also the evidentiary issue of whether or not someone has tampered with the intercepted information. It may also be necessary to prevent technicians operating the communication system from accessing or viewing the intercepted information.
The invention addresses these and other problems with the present technology.
An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept, capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept for communications where there is no access to encryption keys, provision of transactional logs to the authorized agency, interception without altering the operation of the target services, and encryption of stored intercepted information.
The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings.
In the description below, an intercept event refers to an event where an agency issues a warrant requesting data interception for a targeted user. A targeted user is identified by a unique label, such as a username or account number, that corresponds to a user who is under intercept. A communication event, transaction, or intercept data is any message either sent or received by the targeted user. The intercept data can include synchronization messages, email data, calendars, contacts, tasks, notes, electronic documents, files or any other type of data passing through the communication management system.
Communication Management System
The communication system 12 in one implementation is used for intercepting data pursuant to legal search warrants. For example, a law enforcement agency may require the operator of communication system 12 to intercept all messages sent to and from a mobile device 21. It should be understood that this is just one example of a communication system 12 and that the legal intercept system described in more detail below can operate with any communication network that is required to provide legal interception.
The communication system 12 includes a mobile network 14, an enterprise network 18, and a communication management system 16 that manages communications between the mobile network 14 and the enterprise network 18. The mobile network 14 includes mobile devices 21 that communicate with an IP infrastructure through a wireless or landline service provider. Since mobile networks 14 are well known, they are not described in further detail.
The enterprise network 18 can be any business network, individual user network, or local computer system that maintains local email or other data for one or more users. In the embodiment shown in
The PC 38 is connected to the server 34 over a Local Area Network (LAN) 35. The PC 38 includes memory (not shown) for storing local files that may include personal email data as well as any other types of electronic documents. Personal client software 40 is executed by a processor 37 in the PC 38. The personal client 40 enables the mobile device 21 to access email, calendars, and contact information as well as local files in enterprise network 18 associated with PC 38.
The communication management system 16 includes one or more management servers 28 that each include a processor 33. The processor 33 operates a transfer agent 31 that manages the transactions between the mobile device 21 and the enterprise network 18. A user database 42 includes configuration information for different users of the mobile communication service. For example, the user database 42 may include login data for mobile device 21.
While referred to as a communication management system 16 and management server 28, this can be any intermediary system that includes one or more intermediary servers that operate between the mobile network 14 and the enterprise or private network 18. For example, a separate Smart Device Server (SDS) 30 may be used in management system 16 for handling communications with mobile devices in mobile network 14. Correspondingly, a SEVEN Connection Server (SCS) 32 may be used for handling communications with personal clients in enterprise networks 18.
Legal Interception
A Legal Intercept (LI) software module 50 is operated by the processor 33 and communicates with the transfer agent 31 in order to capture intercept data 49 associated with targeted user 51B. An operator sets up a configuration file 51 that is then used by the legal intercept module to automatically intercept communications for a particular target user and then format the intercepted communications into self authenticating log files.
An operator runs a toolkit utility 54 from a computer terminal 52 to configure the management server 28 for capturing intercept data 49. The toolkit utility 54 is used for creating and loading the configuration file 51 into memory in management server 28 and can also display detected intercept data 49. To initiate an intercept, an entry is loaded into the configuration file 51. To stop capturing intercept data 49, the system administrator deletes the entry or configuration file 51 from memory. Changes to the configuration file 51 of management server 28 may be automatically replicated to other management servers that are part of the communication management system 16. The toolkit utility 54 may have tightly controlled access that only allows operation by a user with an authorized login and password.
The toolkit 54 allows the operator to view, add, modify, and delete a warrant sequence number 51A, user identifier (ID) 51B, and encryption key 57 in the configuration file 51. The warrant identifier may be the actual sequence number for a wiretap or search warrant issued by a court of law and presented to the operator of communication management system 16 by a federal, state, or municipal government agency. The user ID 51B for example may be an identifier used by communication management system 16 to uniquely identify different mobile clients 21.
The public encryption key 57 may be the public key component of a public/private key pair, such as a Pretty Good Privacy (PGP) or GNU Privacy Guard (GPG) public key, for encrypting the intercept data 49. In one embodiment, the legal intercept module 50 may not allow the management server 28 to start an interception process until a valid public key 57 is loaded into configuration file 51. This ensures that the intercepted data 49 can be immediately encrypted while being formatted into a log file 56. If this encryption fails for any reason, the legal intercept module 50 may shut down the intercept process ensuring that no intercept data 49 is stored in the clear.
The configuration file 51 may also include one or more entries defining a transport protocol, destination, and associated configuration values for the transmission of intercepted data via a network. In one embodiment, this could include a destination email address associated with a Simple Mail Transfer Protocol (SMTP) host and port number or other Internet Protocol (IP) destination address that is used by the legal intercept module 50 to automatically transmit the intercept data 49 to mail box 77 on a remote server 76 that is accessible by the agency issuing the warrant.
After the configuration file 51 is enabled, the legal intercept module 51 starts intercepting data 49 associated with the targeted user identified by user ID 51B. As mentioned above, this can include any emails, calendar information, contacts, tasks, notes, electronic documents, files or any other type of control or content data associated with user ID 51B. The intercepted data can include any type of communications such as email sent or received, calendar items sent or received, and other data sent/received by and from the targeted smart device 21. The captured intercept data 49 may then be encrypted using the encryption key 57 contained in the configuration file 51. The encrypted copy of the captured intercept data 49 may then be formatted and written to log file 56.
Data Delivery
The legal intercept module 50 running on each management server 28 may periodically poll the directory or location containing the encrypted intercept log files 56 for each user ID under intercept for the presence of new files or data. The poll period in one example is approximately every minute. Of course this is only one example and any user configurable time period can be used. New intercept data 49 which has been stored in one or more log files 56 and identified by the legal intercept module 50 during the polling process may be automatically reprocessed and/or transmitted according to the specification in configuration file 51. As an alternative to storing encrypted intercept data 49 in log file 56 on a file system, intercept data may be stored in database 42. Also, as shown in
In one implementation, an official from the agency physically sits at terminal 52 at the location of communication management system 16. The agency official then reads the log files 56 in semi-real-time as the intercept events 49 are being detected in the management server 49. The agency official then uses terminal 52 to store or copy the log files 56 onto a portable storage medium, such as a Compact Disc (CD), memory stick, etc. In this implementation, the legal intercept log files 56 may not reside in user database 42 at all, or may only reside in database 42 for some relatively brief period of time while being transferred onto the portable storage media.
A copy of the log files may be stored onto the portable storage medium while the same log files remain in the communication management system 16. The copy of the log files in the management system 16 could then be used, if necessary, for evidentiary purposes when admitting the copy under control of the agency official into evidence.
In an alternative implementation, the legal intercept module 50 may automatically send the log files 56 for the intercepted events to an email mailbox 77 operated in a remote server 76. The remote server 76 may be located in a wireless service provider network or may be located at the facilities of the enforcement agency issuing the warrant. In this implementation, a terminal 72 at the remote location 70 may include a toolkit utility 54 that has some of the same functionality as toolkit 54. The utility 54 only allows authorized users to decrypt and access the log files 56 received from communication management system 16.
For example, the toolkit utility 54 may include public and private PGP or GPG encryption keys 57 and 55, respectively, that are associated with the public encryption key 57 previously loaded into configuration file 51. Only personnel having authorized access to the toolkit 54 can decrypt and read the log files 56 previously generated and encrypted by legal intercept module 50. This provides additional privacy of the intercept data 49 from technical personnel of the communication management system 16 that may not be authorized to view the intercept data 49.
The intercept module 50 may transfer each captured log file 56 to a SMTP email server 76 via the Simple Mail Transfer Protocol (SMTP). The SMTP server 76 stores each log file 56 in an inbox of mailbox 77. The name of the mailbox 77 may be the same as the warrant sequence number @ the agency's domain name. For example, warrant123@LAPD.com. The warrant sequence number may correspond with the warrant identifier 51A in configuration file 51 and the domain name may correspond with the IP address 51D in configuration file 51. Once transmitted and accepted by the SMTP email server 76, the log file 56 may be automatically deleted from user database 42.
The agency issuing the warrant can retrieve the captured log files 56 in remote server 76 for a particular user ID under interception using for example the Post Office Protocol (POPv3). The agency is given the name of email server 76, POP and SMTP port numbers, the mailbox id (warrant sequence number 51) and a password to access the mailbox 77. The agency then retrieves log files 56 in mailbox 77 using POP. Once a file is downloaded from the mailbox 77 to an agency terminal 72, the log file 56 may be automatically deleted from the mailbox 77.
Log Files
Referring to
The log files 56 stored in directory 60 may indicate the number of events intercepted for the targeted device during each minute. For example, a first log file 56A is identified by the following log file name: fe0-2005/09/23-00:00.ASC, containing a single line that reads as follows: “0 events logged in the last minute”. This indicates that a management server fe0 on Sep. 23, 2005, at 12:00 midnight logged zero intercept events for a particular user ID during the specified time period. A second log file 56B is named to identify a next minute of the intercept period and indicates that between 12:00 A.M and 12:01 A.M, on the same day, no intercept events were logged.
The first detected intercept events for this particular user ID for this particular day were detected in log file 56C identified by the log file name: fe0-2005/09/23-00:02.ASC, the first and/or last line of which reads “3 events logged in the last minute”. Log file 56C indicates that 3 intercept events were detected on Sep. 23, 2005, between 12:01 A.M. and 12:02 A.M. The legal intercept 50 generates this contiguous set of log files 56 that cover each minute or other configured interval of the intercept period.
The legal intercept 50 may also load a first entry into the log file directory 60 that lists the warrant id 51A, PGP key 57, etc. The legal intercept 50 may also generate a log file 56 that indicates any management server status-change events. For example, if the management server 28 conducts a graceful shutdown, a log file 56 may be generated that indicates when the shut down occurred and possibly the cause of the shutdown.
This highly structured log file format provides the agency official a quick indicator of when intercept events are detected for a particular target user. Further, as shown above, the log files are created contiguously for predetermined time periods over a particular intercept period even when no intercept events are detected. This provides further verification that the legal intercept 50 was actually in operation and continuously monitoring for intercept events during the intercept period.
As described above, the log files 56 may be stored into a portable storage media that can be transported by an agency official. Alternatively, the log files 56 may be stored in the user database 42 in the communication management system 16 for later retrieval by the agency official via toolkit 54. In another implementation, the log files 56 may be sent to the mailbox 77 in a server 76 in a mobile operator infrastructure which is accessible by the agency official.
When intercept events are detected, all the intercepted data for that time period is formatted into a same log file 56 in operation 64. The log file is encrypted in operation 65 using the encryption key 57 (
When interception for a current interception period is completed, a Cyclic Redundancy Check (CRC) value, or some other type of digital certificate/signature, may be generated in operation 67. The CRC can be used to verify that the contents of intercept directory 60 have not been tampered with or deleted after their initial generation. The CRC may be encrypted in operation 68 and then separately emailed to the agency or separately stored for later validation. As discussed above, the encrypted log files may then either be emailed to a mailbox or stored locally for later retrieval by the enforcement agency.
Thus, the individual log file encryption in operation 65 ensures the authenticity of intercepted events for a particular time period and the CRC generated in operation 67 ensures that none of the individual log files have been removed or replaced.
Encrypted Intercept Data
Referring to
The mobile device 21 also negotiates a point-to-point security association, specifying a cryptographic ciphersuite and a unique encryption key 27, with the management server 28. In one example, the point-to-point encryption key 27 is also an AES encryption key. The negotiated security association that includes encryption key 27 enables secure point-to-point communication between the mobile device 21 and the management server 28 over connection 23. Each different mobile device 21 negotiates a different security association that includes a unique encryption key 27 with the management server 28.
The point-to-point encryption key 27 may be used for encrypting control data that needs to be transferred between the mobile device 21 and management server 28. The point-to-point encryption key 29 may be used for encrypting control data that needs to be transferred between the management server 28 and personal client 40. For example, the control data may include login information and transaction routing information.
An end-to-end security association, specifying a cryptographic ciphersuite and a unique encryption key 46, is negotiated between the mobile device 21 and the personal client 40. In one example, the end-to-end encryption key 46 is also an AES encryption key. The end-to-end encryption key 46 in one example is used for encrypting transaction payloads transferred between personal client 40 and mobile device 21. For example, the end-to-end encryption key 46 may be used for encrypting the content of emails, files, file path names, contacts, notes, calendars, electronic documents and any other type of data transferred between mobile device and the PC. The end-to-end encryption key 46 is only known by the mobile device 21 and the personal client 40. Data encrypted using the end-to-end key 46 cannot be decrypted by the management server 28.
Referring to
The communication management system 16 has access to the point-to-point encryption keys 27 and 29 used for encrypting the point-to-point encrypted information 49B. Therefore, the management system 16 can automatically decrypt the point-to-point encrypted information 49B before it is reformatted into log file 56.
The end-to-end encryption keys 46 are only shared between the endpoints 21 and 38 and are unknown to the communication management system 16. Therefore, the agency issuing the warrant may be required to extract the end-to-end encryption keys 46 either at the mobile device 21 or at the enterprise server 34 or personal computer 38. The end-to-end encrypted information 49C may then be decrypted at a later time separately from the point-to-point encrypted information 49B.
For example, after receiving and decrypting the log file 56, the enforcement agency may then independently conduct a seizure of the end-to-end encryption key 46 from either the enterprise network 18 or the mobile device 21. The enforcement agency could then separately decrypt information 56B in log file 56 with the seized end-to-end encryption key 46.
In operation 84, any point-to-point encrypted portion 49B of the intercepted data 49 (
Detecting Different Types of Intercept Data
A second portion 106 of intercept data 102 may include control information that only needs to be processed by one particular server. In this case, control data 106 may be encrypted using a first point-to-point encryption key. A third portion 104 of intercept data 102 may have other control information, for example, error checking data, that needs to be processed by a different server. Accordingly, the error checking data 104 is encrypted using a second point-to-point encryption key different than either of the other two encryption keys used for encrypting data 108 and 106.
It should be understood that this is only an example, and the devices shown in
The mobile device 21, management server 28, and the personal client 40 are all configured with an encryption schema 112 that identifies how specific items in the transaction 110 are to be encrypted. Each device is also configured with different security associations as described above in
The mobile device 21 forms the request transaction 110. One example of a request is as follows.
Request:
{auth_token = “abc”,
device_id = “xyz”,
method_id = “GetDocument”,
args = {path = “/docs”}
}
Mobile device 21 attaches an auth_token to transactions sent to the management server 28. For example, the mobile device 21 may be required to authenticate to the management server 28 by transmitting a username and password prior to being permitted to submit other transactions for processing. The management server 28 issues the mobile device 21 an auth_token after successfully validating the username and password against information in the user database 42. The mobile device 21 then attaches the auth_token to subsequent transactions sent to the management server 28. The management server 28 uses the auth_token to identify and authenticate the source of each transaction and to determine where to route the transaction.
The device_id identifies the particular mobile device 21 sending the request 110. The device_id may be necessary, for example, when a user has more than one mobile device. The personal client 40 can use different device_id values to track when synchronization information was last sent to each of multiple different mobile devices. The device_id can also be used by either the management server 28 or the personal client 40 to determine how to format data sent to particular types of mobile devices 21. For example, data may need to be formatted differently for a cell phone as opposed to a personal computer. The device_id can also be used to correlate a known security association with a particular mobile device.
The method_id item in the example identifies a particular function GetDocument associated with request 110. The method_id item also requires the inclusion of related argument items that identify the parameters for the GetDocument function. For example, the argument items might include the expression path=“/docs” identifying the pathname where the requested documents are located.
In order to prepare the request 110 for transmission, the mobile device 21 performs a pattern match of the request 110 using the encryption schema 112. This pattern match separates the items in request 110 into different channels. One example of the different channels is shown below. In this example, the items in each channel are associated with predefined security associations: clear, pp, and ee.
Channels:
{clear = {device_id = “xyz”}
pp = {auth_token = “abc”, method_id = “GetDocument”}
ee = {args = {path = {path = “/docs”}}}
}
The channel contents are encoded (via a process commonly known as serialization) into arrays of bits or bytes referred to as data groups. These groupings of bits or bytes are referred to generally below as arrays, but can be any type of partition, group, etc.
The contents of the clear channel are encoded into an array of bits referred to as data_group—1, the contents of the pp channel are encoded into an array of bits referred to as data_group—2, and the contents of the ee channel are encoded into an array of bits referred to as data_group—3. The contents of each channel need to be encoded into bit arrays so that they can be encrypted. The contents of the channels after being encoded into bit arrays are represented as follows.
Encoded
Channels:
{clear = data_group_1
pp = data_group_2
ee = data_group_3 }
The bit arrays are then encrypted according to the security association parameters for each channel. According to the encryption schema 112, bits in the clear channel (data_group—1) are not encrypted. The bits in the pp channel data_group—2 are encrypted using the point-to-point security association between mobile device 21 and management server 28, using PP key 27, and are referred to after encryption as pp_data_group—2. The bits in the ee channel data_group—3 are encrypted using the end-to-end security association between mobile device 21 and personal client 40, using EE key 46, and are referred to after encryption as ee_data_group—3. The data groups are represented as follows after encryption:
Encrypted
Channels:
{clear = data_group_1
pp = pp_data_group_2
ee = ee_data_group_3}
The bits making up the encrypted and unencrypted channels are then encoded into one or more packets. For clarity, the description below will refer to a single packet, however, the data from the channels may be contained in multiple packets. Some of the contents of the packet are shown below.
Packet:
Header
length
version
flags
Payload
count = 3
“clear”
data_group_1
pp_data_group_2
“ee”
ee_data_group_3
Information in the packet header may include the packet length, a version number, and other flags. The packet payload includes a count identifying 3 pairs of items. The three items include the non-encrypted contents in the clear channel, the pp encrypted contents of the pp channel, and the ee encrypted contents of the ee channel. The packet is then transported by mobile device 21 to the management server 28.
The transfer agent operating in server 28 receives the packet. The bits in the packet are separated into the different channels clear=data_group—1, pp=pp_data_group—2, and ee=ee_data_group—3.
The data in the clear channel does not need to be decrypted. The transfer agent decrypts the only bits in channels for which it has a known security association. The transfer agent, as a member of the point-to-point security association between mobile device 21 and management server 28, possesses the PP key 27 and therefore decrypts the contents of the pp channel. The transfer agent is not a member of the end-to-end security association between mobile device 21 and personal client 40, does not have the EE key 46 and therefore does not decrypt the data in the ee channel. Decryption produces the following data groups: clear data_group—1, pp=data_group—2, and ee=ee_data_group—3.
The transfer agent decodes the contents of the clear and pp channels. The contents of the encrypted ee channel are not decoded, but instead are maintained in an unmodified state for eventual transport to the personal client 40. Decoding produces the following contents.
Decoded
Channels:
{clear = {device_id = “xyz”}
pp = {auth_token = “abc”, method_id = “GetDocument”}
ee=ee_data_group_3
}
A partial request is formed by merging the items of the clear and pp channels. The partial request in this example could look similar to the following:
Partial Request:
{auth_token = “abc”,
device_id = “xyz”,
method_id = “GetDocument”,
args = { }
encrypted = {ee=ee_data_group_3}
}
The transfer agent 31 in the management server 28 processes the partial request. In this example, the transfer agent may verify the request is authorized by matching the value of auth_token (“abc”) with contents in the user database 42 (
The transfer agent may identify a user_id=“joe” associated with the auth_token=“abc” and generate the following new request.
New Request:
{user_id = “joe”,
device_id = “xyz”,
method_id = “GetDocument”,
args = { }
encrypted = {ee=ee_data_group_3}
}
The legal intercept 50 in
The end-to-end encrypted data in group 3 remains encrypted and therefore may not provide all of the information desired for the enforcement agency. However, the decrypted information does provide enough information to adequately indicate that the intercepted data is associated with a particular user_id. The intercepted unencrypted data may also provide further evidence that the enforcement agency can then use to obtain another warrant to seize the ee encryption key from the targeted user.
As described above in
End-to-End Encrypted Data
As described above, the communication management system 16 may not have access to the end-to-end encryption keys 46 (
The intercept logs 56 can therefore contain data encrypted using encryption keys known only to the endpoints. For example, a mobile device 21 and a desktop connector running on personal computer 38 (
In order to make use of this functionality, the enforcement agency seeking the information may need to obtain both an intercept warrant, and either a search-and-seizure warrant authorizing the extraction of the configuration data from the smart device client in the mobile device 21 or a search-and-seizure warrant authorizing the extraction of the end-to-end encryption key from the desktop connector in the PC 38 (
After the authorized agency has executed the necessary warrants, the toolkit 54 is used by the agency to facilitate the recovery of the end-to-end key 46. The toolkit utility 54 then uses the end-to-end key 46 to decrypt the end-to-end encrypted information in the log files 56.
The system described above can use dedicated processor systems, micro controllers, programmable logic devices, or microprocessors that perform some or all of the operations. Some of the operations described above may be implemented in software and other operations may be implemented in hardware.
For the sake of convenience, the operations are described as various interconnected functional blocks or distinct software modules. This is not necessary, however, and there may be cases where these functional blocks or modules are equivalently aggregated into a single logic device, program or operation with unclear boundaries. In any event, the functional blocks and software modules or features of the flexible interface can be implemented by themselves, or in combination with other operations in either hardware or software.
Having described and illustrated the principles of the invention in a preferred embodiment thereof, it should be apparent that the invention may be modified in arrangement and detail without departing from such principles. Claim is made to all modifications and variation coming within the spirit and scope of the following claims.
Fiatal, Trevor A., Sutaria, Jay, Nanjundeswaran, Sridhar, Bavadekar, Shailesh
Patent | Priority | Assignee | Title |
11165817, | Oct 24 2019 | ARBOR NETWORKS, INC | Mitigation of network denial of service attacks using IP location services |
Patent | Priority | Assignee | Title |
222458, | |||
4200770, | Sep 06 1977 | Stanford University | Cryptographic apparatus and method |
4255796, | Feb 14 1978 | NCR Corporation | Associative information retrieval continuously guided by search status feedback |
4276597, | Jan 17 1974 | VOLT DELTA RESOURCES, INC | Method and apparatus for information storage and retrieval |
447918, | |||
4531020, | Jul 23 1982 | TV COM INTERNATIONAL, INC | Multi-layer encryption system for the broadcast of encrypted information |
4807182, | Mar 12 1986 | ADVANCED SOFTWARE, INC , 44 PIERCE MITCHELL PLACE, STANFORD, CALIFORNIA 94305 A CA CORP | Apparatus and method for comparing data groups |
4831582, | Nov 07 1986 | ALLEN-BRADLEY COMPANY, INC | Database access machine for factory automation network |
4875159, | Dec 22 1987 | Amdahl Corporation | Version management system using plural control fields for synchronizing two versions of files in a multiprocessor system |
4897781, | Feb 13 1987 | International Business Machines Corporation | System and method for using cached data at a local node after re-opening a file at a remote node in a distributed networking environment |
4972457, | Jan 19 1989 | MLR, LLC | Portable hybrid communication system and methods |
5008853, | Dec 02 1987 | XEROX CORPORATION, A CORP OF NY | Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment |
5159624, | Oct 23 1989 | Sharp Kabushiki Kaisha | Communication system for transmitting to a portable receiver data indicative of received image or voice signals |
5220657, | Dec 02 1987 | Xerox Corporation | Updating local copy of shared data in a collaborative system |
5263157, | Feb 15 1990 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles |
5283856, | Oct 04 1991 | Banyan Systems Incorporated | Event-driven rule-based messaging system |
5357431, | Jan 27 1992 | Fujitsu Limited | Character string retrieval system using index and unit for making the index |
5384892, | Dec 31 1992 | Apple Inc | Dynamic language model for speech recognition |
5386564, | Feb 24 1993 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Conversion of data and objects across classes in an object management system |
5392390, | Apr 10 1992 | Intellisync Corporation | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
5434994, | May 23 1994 | International Business Machines Corporation | System and method for maintaining replicated data coherency in a data processing system |
5436960, | May 20 1991 | NTP, INC | Electronic mail system with RF communications to mobile processors and method of operation thereof |
5438611, | May 20 1991 | NTP Incorporated | Electronic mail system with RF communications to mobile processors originating from outside of the electronic mail system and method of operation thereof |
5479472, | May 20 1991 | NTP, Incorporated | System for interconnecting electronic mail systems by RF communications and method of operation thereof |
5487100, | Sep 30 1992 | Motorola Mobility LLC | Electronic mail message delivery system |
5491703, | Jun 30 1992 | Inmos Limited | Cam with additional row cells connected to match line |
5493692, | Dec 03 1993 | UBICOMM, LLC | Selective delivery of electronic messages in a multiple computer system based on context and environment of a user |
5519606, | Jan 21 1992 | Intellisync Corporation | System and methods for appointment reconciliation |
5555376, | Dec 03 1993 | UBICOMM, LLC | Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request |
5559800, | Jan 19 1994 | BlackBerry Limited | Remote control of gateway functions in a wireless data communication network |
5572571, | Dec 30 1994 | IRONWORKS PATENTS LLC | Programmable cellular telephone and system |
5572643, | Oct 19 1995 | INTERNETAD SYSTEMS LLC | Web browser with dynamic display of information objects during linking |
5574859, | Nov 01 1991 | Method and apparatus for using a software configurable connector to connect a palmtop computer having a custom port to a host having a standard port | |
5581749, | Dec 21 1992 | TheDow Chemical Company | System and method for maintaining codes among distributed databases using a global database |
5600834, | May 14 1993 | Binary Services Limited Liability Company | Method and apparatus for reconciling different versions of a file |
5603054, | Dec 03 1993 | UBICOMM, LLC | Method for triggering selected machine event when the triggering properties of the system are met and the triggering conditions of an identified user are perceived |
5604788, | Mar 16 1995 | Google Technology Holdings LLC | Wireless messaging system with electronic mail replication |
5613012, | Nov 28 1994 | Open Invention Network, LLC | Tokenless identification system for authorization of electronic transactions and electronic transmissions |
5619507, | Jun 30 1993 | NEC Corporation | Method and apparatus for establishing and maintaining frame synchronization in a satellite communication system |
5619648, | Nov 30 1994 | Alcatel Lucent | Message filtering techniques |
5623601, | Nov 21 1994 | RPX Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
5625670, | May 20 1991 | NTP Incorporated | Electronic mail system with RF communications to mobile processors |
5625815, | Jan 23 1995 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Relational database system and method with high data availability during table data restructuring |
5627658, | Dec 14 1994 | Xerox Corporation | Automatic networked facsimile queuing system |
5630081, | Sep 07 1995 | Intellisync Corporation | Connection resource manager displaying link-status information using a traffic light iconic representation |
5631946, | May 20 1991 | NTP, Incorporated | System for transferring information from a RF receiver to a processor under control of a program stored by the processor and method of operation thereof |
5632018, | Jan 18 1993 | Fujitsu Limited | Electronic mail system |
5634053, | Aug 29 1995 | HE HOLDINGS, INC , A DELAWARE CORP ; Raytheon Company | Federated information management (FIM) system and method for providing data site filtering and translation for heterogeneous databases |
5647002, | Sep 01 1995 | AVAYA Inc | Synchronization of mailboxes of different types |
5652884, | Nov 14 1994 | Apple Inc | Method and apparatus for dynamic update of an existing object in an object editor |
5664207, | Dec 16 1994 | iAnywhere Solutions, Inc | Systems and methods for automatically sharing information among remote/mobile nodes |
5666530, | Dec 02 1992 | Qualcomm Incorporated | System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between |
5666553, | Apr 10 1992 | Intellisync Corporation | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
5680542, | Jun 07 1995 | Motorola, Inc.; Motorola, Inc | Method and apparatus for synchronizing data in a host memory with data in target MCU memory |
5682524, | May 26 1995 | Intellisync Corporation | Databank system with methods for efficiently storing non-uniform data records |
5684990, | Jan 11 1995 | Intellisync Corporation | Synchronization of disparate databases |
5689654, | Jun 29 1992 | INPRO II LICENSING SARL | Digital assistant system including a host computer with a docking bay for the digital assistant wherein a heat sink is moved into contact with a docked digital assistant for cooling the digital assistant |
5692039, | Mar 27 1992 | Verizon Patent and Licensing Inc | Improved data transmission via a public switched telephone network |
5696903, | May 11 1993 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | Hierarchical communications system using microlink, data rate switching, frequency hopping and vehicular local area networking |
5701423, | Apr 10 1992 | Intellisync Corporation | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
5701469, | Jun 07 1995 | Microsoft Technology Licensing, LLC | Method and system for generating accurate search results using a content-index |
5704029, | May 23 1994 | Seven Networks, Inc | System and method for completing an electronic form |
5706211, | Mar 02 1995 | Google Technology Holdings LLC | Message communications system |
5706502, | Mar 26 1996 | Oracle America, Inc | Internet-enabled portfolio manager system and method |
5706507, | Jul 05 1995 | ACTIVISION PUBLISHING, INC | System and method for controlling access to data located on a content server |
5710918, | Jun 07 1995 | GOOGLE LLC | Method for distributed task fulfillment of web browser requests |
5713019, | Oct 26 1995 | Iconic access to remote electronic monochrome raster data format document repository | |
5715403, | Nov 23 1994 | CONTENTGUARD HOLDINGS, INC | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
5717925, | Oct 08 1993 | International Business Machines Corporation | Information catalog system with object-dependent functionality |
5721908, | Jun 07 1995 | GOOGLE LLC | Computer network for WWW server data access over internet |
5721914, | Sep 14 1995 | Verizon Patent and Licensing Inc | System and method for hierarchical data distribution |
5727202, | Oct 18 1995 | ACCESS CO , LTD | Method and apparatus for synchronizing information on two different computer systems |
5729549, | Mar 16 1995 | Verizon Patent and Licensing Inc | Simulcasting digital video programs for broadcast and interactive services |
5729704, | Jul 21 1993 | Xerox Corporation | User-directed method for operating on an object-based model data structure through a second contextual image |
5729735, | Feb 08 1995 | Remote database file synchronizer | |
5742905, | Sep 19 1994 | ACCESS CO , LTD | Personal communications internetworking |
5745360, | Aug 14 1995 | International Business Machines Corp.; IBM Corporation | Dynamic hypertext link converter system and process |
5752186, | Jun 07 1995 | SITO MOBILE LTD | Access free wireless telephony fulfillment service system |
5752246, | Jun 07 1995 | GOOGLE LLC | Service agent for fulfilling requests of a web browser |
5754938, | Nov 29 1994 | Pinpoint Incorporated | Pseudonymous server for system for customized electronic identification of desirable objects |
5757916, | Oct 06 1995 | Google Inc | Method and apparatus for authenticating the location of remote users of networked computing systems |
5758088, | May 08 1995 | Cranberry Properties, LLC | System for transmitting messages, between an installed network and wireless device |
5758150, | Oct 06 1995 | Tele-Communications, Inc. | System and method for database synchronization |
5758322, | Dec 09 1994 | INTERNATIONAL VOICE REGISTER, INC | Method and apparatus for conducting point-of-sale transactions using voice recognition |
5758354, | Apr 28 1995 | Intel Corporation | Application independent e-mail synchronization |
5758355, | Aug 07 1996 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | Synchronization of server database with client database using distribution tables |
5765171, | Dec 29 1995 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | Maintaining consistency of database replicas |
5778346, | Jan 21 1992 | Intellisync Corporation | System and methods for appointment reconcilation |
5778361, | Sep 29 1995 | Microsoft Technology Licensing, LLC | Method and system for fast indexing and searching of text in compound-word languages |
5781614, | Jan 19 1996 | AVAYA Inc | Message retrieval via alternative access |
5781901, | Dec 21 1995 | Intel Corporation | Transmitting electronic mail attachment over a network using a e-mail page |
5781906, | Jun 06 1996 | International Business Machines Corporation | System and method for construction of a data structure for indexing multidimensional objects |
5787430, | Jun 30 1994 | International Business Machines Corporation | Variable length data sequence backtracking a trie structure |
5787441, | Jan 11 1996 | International Business Machines Corporation | Method of replicating data at a field level |
5790425, | Feb 19 1997 | Sun Microsystems, Inc. | Generic server benchmarking framework in a client-server environment |
5790790, | Oct 24 1996 | AXWAY INC | Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof |
5790974, | Apr 29 1996 | Oracle America, Inc | Portable calendaring device having perceptual agent managing calendar entries |
5793413, | May 01 1995 | Verizon Patent and Licensing Inc | Wireless video distribution |
5794210, | Dec 11 1995 | MYPOINTS COM, INC | Attention brokerage |
5799318, | Apr 13 1993 | Oracle International Corporation | Method and apparatus for collecting and displaying information from diverse computer resources |
5802312, | Sep 27 1994 | BlackBerry Limited | System for transmitting data files between computers in a wireless environment utilizing a file transfer agent executing on host system |
5802454, | Dec 15 1995 | TELETRAC, INC , A DELAWARE CORPORATION | Remotely distributed location and messaging system |
5802518, | Jun 04 1996 | Thomson Reuters Global Resources Unlimited Company | Information delivery system and method |
5802524, | Jul 29 1996 | International Business Machines Corporation | Method and product for integrating an object-based search engine with a parametrically archived database |
5806074, | Mar 19 1996 | Oracle International Corporation | Configurable conflict resolution in a computer implemented distributed database |
5809242, | Apr 19 1996 | JUNO ONLINE SERVICES, INC | Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system |
5809415, | Dec 11 1995 | UNWIRED PLANET IP MANAGER, LLC; Unwired Planet, LLC | Method and architecture for an interactive two-way data communication network |
5818437, | Jul 26 1995 | Nuance Communications, Inc | Reduced keyboard disambiguating computer |
5819172, | May 20 1991 | NTP Incorporated | Electronic mail system with RF communications to mobile radios |
5819274, | Dec 16 1994 | iAnywhere Solutions, Inc | Methods, systems and computer program products for transferring files from a data processing server to a remote/mobile data processing node |
5819284, | Mar 24 1995 | AT&T Corp | Personalized real time information display as a portion of a screen saver |
5822324, | Mar 16 1995 | Verizon Patent and Licensing Inc | Simulcasting digital video programs for broadcast and interactive services |
5822747, | Aug 23 1996 | Hewlett Packard Enterprise Development LP | System and method for optimizing database queries |
5826269, | Jun 21 1995 | Microsoft Technology Licensing, LLC | Electronic mail interface for a network server |
5831664, | Dec 15 1995 | COMCAST MO GROUP, INC | Method and system for synchronizing data between at least one mobile interface device and an interactive terminal |
5832483, | Dec 13 1996 | EMC IP HOLDING COMPANY LLC | Distributed control interface for managing the interoperability and concurrency of agents and resources in a real-time environment |
5832489, | Oct 18 1995 | ACCESS CO , LTD | Method and apparatus for synchronizing information on two different computer systems |
5832500, | Aug 09 1996 | EUREKA DATABASE SOLUTIONS, LLC | Method for searching an index |
5835087, | Nov 29 1994 | Pinpoint Incorporated | System for generation of object profiles for a system for customized electronic identification of desirable objects |
5835722, | Jun 27 1996 | TW SECURITY CORP ; TRUSTWAVE HOLDINGS, INC | System to control content and prohibit certain interactive attempts by a person using a personal computer |
5838252, | Sep 09 1996 | RATEZE REMOTE MGMT L L C | Interactive two-way pager systems |
5838768, | Oct 03 1996 | Telefonaktiebolaget L M Ericsson | System and method for controlled media conversion in an intelligent network |
5838973, | May 03 1996 | Accenture Global Services Limited | System and method for interactively transforming a system or process into a visual representation |
5845278, | Sep 12 1997 | GOOGLE LLC | Method for automatically selecting collections to search in full text searches |
5852775, | Sep 12 1996 | RPX Corporation | Cellular telephone advertising system |
5852820, | Aug 09 1996 | R2 SOLUTIONS LLC | Method for optimizing entries for searching an index |
5857201, | Jun 18 1996 | Good Technology Corporation | Enterprise connectivity to handheld devices |
5862223, | Jul 24 1996 | Community United IP, LLC | Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce |
5867665, | Mar 24 1997 | Cisco Technology, Inc | Domain communications server |
5867817, | Aug 19 1996 | ALLIGATOR HOLDINGS, INC | Speech recognition manager |
5870759, | Oct 09 1996 | Oracle International Corporation | System for synchronizing data between computers using a before-image of data |
5884323, | Oct 13 1995 | ACCESS CO , LTD | Extendible method and apparatus for synchronizing files on two different computer systems |
5889845, | Nov 15 1995 | DATA RACE, INC | System and method for providing a remote user with a virtual presence to an office |
5890147, | Mar 07 1997 | Microsoft Technology Licensing, LLC | Scope testing of documents in a search engine using document to folder mapping |
5892909, | Jan 31 1997 | Open Text SA ULC | Intranet-based system with methods for co-active delivery of information to multiple users |
5898780, | May 21 1996 | CHANNEL IP B V | Method and apparatus for authorizing remote internet access |
5898917, | Aug 27 1996 | AG Communication Systems Corporation; AG Communications Systems Corporation | System for providing enhanced services in cellular radio telecommunication systems using #CCSC based triggers |
5903723, | Dec 21 1995 | INCYTE PHARMACEUTICALS, INC | Method and apparatus for transmitting electronic mail attachments with attachment references |
5907618, | Jan 03 1997 | International Business Machines Corporation | Method and apparatus for verifiably providing key recovery information in a cryptographic system |
5909689, | Sep 18 1997 | Sony Corporation; Sony Electronics, Inc. | Automatic update of file versions for files shared by several computers which record in respective file directories temporal information for indicating when the files have been created |
5913032, | Apr 04 1994 | Borland Software Corporation | System and methods for automatically distributing a particular shared data object through electronic mail |
5924096, | Oct 15 1997 | JPMORGAN CHASE BANK, N A , AS SUCCESSOR AGENT | Distributed database using indexed into tags to tracks events according to type, update cache, create virtual update log on demand |
5928325, | Feb 24 1997 | MOTOROLA SOLUTIONS, INC | Method of dynamically establishing communication of incoming messages to one or more user devices presently available to an intended recipient |
5928329, | Dec 02 1992 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels therebetween |
5937161, | Apr 12 1996 | BAE SYSTEMS APPLIED INTELLIGENCE US CORP | Electronic message forwarding system |
5940813, | Jul 26 1996 | CITIBANK, N A | Process facility management matrix and system and method for performing batch, processing in an on-line environment |
5943676, | Nov 13 1996 | Intellisync Corporation | Synchronization of recurring records in incompatible databases |
5948066, | Mar 13 1997 | Google Technology Holdings LLC | System and method for delivery of information over narrow-band communications links |
5951636, | Dec 04 1997 | International Business Machines Corp. | Accessing a post office system from a client computer using applets |
5960394, | Feb 01 1995 | Nuance Communications, Inc | Method of speech command recognition with dynamic assignment of probabilities according to the state of the controlled applications |
5960406, | Jan 22 1998 | LTT GLOBAL CONSULTANTS | Scheduling system for use between users on the web |
5961590, | May 29 1997 | Malikie Innovations Limited | System and method for synchronizing electronic mail between a client site and a central site |
5963642, | Dec 30 1996 | LONG CORNER SECURITY LLC | Method and apparatus for secure storage of data |
5964833, | Feb 07 1997 | HANGER SOLUTIONS, LLC | Pager enhanced keyboard and system |
5968131, | Apr 11 1997 | Malikie Innovations Limited | System and method for securely synchronizing multiple copies of a workspace element in a network |
5974238, | Aug 07 1996 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Automatic data synchronization between a handheld and a host computer using pseudo cache including tags and logical data elements |
5974327, | Oct 21 1997 | AT&T Corp. | Adaptive frequency channel assignment based on battery power level in wireless access protocols |
5978837, | Sep 27 1996 | HANGER SOLUTIONS, LLC | Intelligent pager for remotely managing E-Mail messages |
5978933, | Jan 11 1996 | Hewlett Packard Enterprise Development LP | Generic fault tolerant platform |
5987440, | Jul 22 1996 | CYVA RESEARCH HOLDINGS, LLC | Personal information security and exchange tool |
6000000, | Oct 13 1995 | ACCESS CO , LTD | Extendible method and apparatus for synchronizing multiple files on two different computer systems |
6003070, | Feb 25 1997 | IntervVoice Limited Partnership | E-mail system and interface for equipment monitoring and control |
6006274, | Jan 30 1997 | ACCESS CO , LTD | Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer |
6016478, | Aug 13 1996 | Intellisync Corporation | Scheduling system with methods for peer-to-peer scheduling of remote users |
6016520, | Jul 14 1995 | Microsoft Technology Licensing, LLC | Method of viewing at a client viewing station a multiple media title stored at a server and containing a plurality of topics utilizing anticipatory caching |
6018762, | Mar 31 1998 | AVAYA Inc | Rules-based synchronization of mailboxes in a data network |
6023700, | Jun 17 1997 | OATH INC | Electronic mail distribution system for integrated electronic communication |
6023708, | May 29 1997 | Malikie Innovations Limited | System and method for using a global translator to synchronize workspace elements across a network |
6029238, | Mar 31 1994 | Canon Kabushiki Kaisha | Control of information processing using one or more peripheral apparatus |
6034621, | Nov 18 1997 | Alcatel Lucent | Wireless remote synchronization of data between PC and PDA |
6035104, | Jun 28 1996 | BRECKENRIDGE CAPITAL FUND LLC | Method and apparatus for managing electronic documents by alerting a subscriber at a destination other than the primary destination |
6044372, | Jul 18 1997 | GOOGLE LLC | Method and apparatus for publishing information to a communications network and enabling subscriptions to such information |
6044381, | Sep 11 1997 | Intellisync Corporation | Using distributed history files in synchronizing databases |
6047051, | Nov 11 1996 | Nokia Technologies Oy | Implementation of charging in a telecommunications system |
6047327, | Feb 16 1996 | Dialogic Corporation | System for distributing electronic information to a targeted group of users |
6052563, | Dec 10 1997 | Google Technology Holdings LLC | Communication device controlled by appointment information stored therein, and method therefor |
6052735, | Oct 24 1997 | Microsoft Technology Licensing, LLC | Electronic mail object synchronization between a desktop computer and mobile device |
6057855, | Jul 02 1997 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for providing polygon pixel sub-sample information using incremental means |
6065055, | Apr 20 1998 | BLACKBIRD TECH LLC | Inappropriate site management software |
6073138, | Jun 11 1998 | TRADECO ASIA LTD | System, method, and computer program product for providing relational patterns between entities |
6073142, | Jun 23 1997 | TUMBLEWEED HOLDINGS LLC | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
6073165, | Jul 29 1997 | J2 CLOUD SERVICES, LLC | Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver |
6085166, | Jun 19 1998 | International Business Machines | Electronic calendar with group scheduling and asynchronous fan out method |
6085192, | Apr 11 1997 | Malikie Innovations Limited | System and method for securely synchronizing multiple copies of a workspace element in a network |
6088677, | May 30 1997 | System for exchanging health care insurance information | |
6101320, | Aug 01 1997 | Aurora Communications Exchange Ltd. | Electronic mail communication system and method |
6101480, | Jun 19 1998 | International Business Machines | Electronic calendar with group scheduling and automated scheduling techniques for coordinating conflicting schedules |
6101531, | Dec 19 1995 | Google Technology Holdings LLC | System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client |
6112181, | Nov 06 1997 | INTERTRUST TECHNOLOGIES CORP | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
6119014, | Apr 01 1998 | Ericsson Inc. | System and method for displaying short messages depending upon location, priority, and user-defined indicators |
6119171, | Jan 29 1998 | HANGER SOLUTIONS, LLC | Domain name routing |
6125369, | Oct 02 1997 | Microsoft Technology Licensing, LLC | Continuous object sychronization between object stores on different computers |
6125388, | May 31 1994 | TMI SOLUTIONS, LLC | System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station |
6128627, | Apr 15 1998 | R2 SOLUTIONS LLC | Consistent data storage in an object cache |
6130898, | Mar 16 1995 | Verizon Patent and Licensing Inc | Simulcasting digital video programs for broadcast and interactive services |
6131096, | Oct 05 1998 | BlackBerry Limited | System and method for updating a remote database in a network |
6131116, | Dec 13 1996 | Malikie Innovations Limited | System and method for globally accessing computer services |
6134432, | Jun 17 1997 | MESSAGE4U PTY LTD | System and process for allowing wireless messaging |
6138013, | Feb 12 1998 | CDC PROPRIETE INTELLECTUELLE | Method for location based intercept in a communication system |
6138124, | Jan 11 1996 | International Business Machines | Field level replication method |
6138128, | Apr 02 1997 | Microsoft Technology Licensing, LLC | Sharing and organizing world wide web references using distinctive characters |
6138146, | Sep 29 1997 | CLUSTER, LLC; Optis Wireless Technology, LLC | Electronic mail forwarding system and method |
6141664, | Nov 13 1996 | Intellisync Corporation | Synchronization of databases with date range |
6151606, | Jan 16 1998 | BlackBerry Limited | System and method for using a workspace data manager to access, manipulate and synchronize network data |
6157630, | Jan 26 1998 | Google Technology Holdings LLC | Communications system with radio device and server |
6161140, | Sep 30 1996 | Casio Computer Co., Ltd. | System for transferring information between a server and a data terminal through a network |
6167379, | Mar 24 1998 | BlackBerry Limited | System for user to accept or decline updating a calendar remotely with a proposed schedule update that may have schedule confliction |
6167435, | Oct 30 1998 | VALIDITY, INC | Double opt-inâ„¢ method and system for verifying subscriptions to information distribution services |
6170014, | Mar 18 1999 | Digital-Vending Services International, LLC | Computer architecture for managing courseware in a shared use operating environment |
6173312, | Jul 09 1996 | Hitachi, LTD | System for reliably connecting a client computer to a server computer |
6173446, | Feb 02 1999 | TUMBLEWEED HOLDINGS LLC | Apparatus for licensing software applications |
6175831, | Jan 17 1997 | DEGREES OF CONNECTION LLC | Method and apparatus for constructing a networking database and system |
6178419, | Jul 31 1996 | SUFFOLK TECHNOLOGIES, LLC | Data access system |
6181935, | Sep 27 1996 | Unwired Planet, LLC | Mobility extended telephone application programming interface and method of use |
6185184, | Sep 25 1995 | STRAIGHT PATH IP GROUP, INC | Directory server for providing dynamically assigned network protocol addresses |
6195533, | May 27 1998 | GLENAYRE ELECTRONICS, INC | Method for storing an application's transaction data in a wireless messaging system |
6198696, | Jun 16 1999 | UNIFY GMBH & CO KG | Device and method for tracking time zone changes in communications devices |
6198922, | Sep 22 1998 | IRIDIUM SATELLITE LLC | Method and system for locating subscribers in a global telecommunications network |
6201469, | Feb 12 1999 | SENSORMATIC ELECTRONICS, LLC | Wireless synchronization of pulsed magnetic EAS systems |
6202085, | Dec 06 1996 | Microsoft Technology Licensing, LLC | System and method for incremental change synchronization between multiple copies of data |
6205448, | Jan 30 1998 | ACCESS CO , LTD | Method and apparatus of synchronizing two computer systems supporting multiple synchronization techniques |
6212529, | Nov 13 1996 | Intellisync Corporation | Synchronization of databases using filters |
6219694, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device having a shared electronic address |
6221877, | Apr 12 2000 | Regents of the University of California | Substituted 4-phthalimidocarboxanilides as inhibitors of purine salvage phosphoribosyltransferases |
6223187, | Sep 11 1997 | Intellisync Corporation | Distributed synchronization of databases |
6226686, | Feb 01 1996 | CRICKET COMMUNICATIONS, INC | Server-group messaging system for interactive applications |
6233341, | May 19 1998 | BlackBerry Limited | System and method for installing and using a temporary certificate at a remote site |
6243705, | Oct 18 1995 | ACCESS CO , LTD | Method and apparatus for synchronizing information on two different computer systems |
6246875, | Dec 04 1995 | Verizon Patent and Licensing Inc | Use of cellular digital packet data (CDPD) communications to convey system identification list data to roaming cellular subscriber stations |
6247135, | Mar 03 1999 | Intellisync Corporation | Synchronization process negotiation for computing devices |
6249808, | Dec 15 1998 | Nuance Communications, Inc | Wireless delivery of message using combination of text and voice |
6256666, | Jul 14 1998 | GOOGLE LLC | Method and system for remotely managing electronic mail attachments |
6263201, | Dec 25 1996 | Uniden Corporation | Scheduled data Transmission system, scheduled data transmission method, and transmission server |
6263340, | Oct 20 1998 | International Business Machines Corp. | User registration in file review systems |
6269369, | Nov 02 1997 | AMAZON COM HOLDINGS, INC | Networked personal contact manager |
6272545, | Oct 24 1997 | Microsoft Technology Licensing, LLC | System and method for interaction between one or more desktop computers and one or more mobile devices |
6275850, | Jul 24 1998 | SIEMENS INFORMATION AND COMMUNICATION NETWORKS, INC | Method and system for management of message attachments |
6275858, | Oct 20 1997 | International Business Machines Corporation | Intelligent method, apparatus and computer program product for automated refreshing of internet web pages |
6286099, | Jul 23 1998 | ENT SERVICES DEVELOPMENT CORPORATION LP | Determining point of interaction device security properties and ensuring secure transactions in an open networking environment |
6289212, | Sep 16 1998 | UNWIRED PLANET IP MANAGER, LLC; Unwired Planet, LLC | Method and apparatus for providing electronic mail services during network unavailability |
6289214, | May 29 1998 | Ericsson Inc.; Ericsson Inc | Systems and methods for deactivating a cellular radiotelephone system using an ANSI-41 short message service email |
6292904, | Dec 16 1998 | International Business Machines Corporation | Client account generation and authentication system for a network server |
6295541, | Aug 18 1998 | Intellisync Corporation | System and methods for synchronizing two or more datasets |
6300947, | Jul 06 1998 | Wistron Corporation | Display screen and window size related web page adaptation system |
6304881, | Mar 03 1998 | Intellisync Corporation | Remote data access and synchronization |
6308201, | Apr 08 1999 | ACCESS CO , LTD | System and method for sharing data among a plurality of personal digital assistants |
6317594, | Sep 27 1996 | Unwired Planet, LLC | System and method for providing data to a wireless device upon detection of activity of the device on a wireless network |
6320943, | Jun 12 1997 | TUMBLEWEED HOLDINGS LLC | Electronic directory system and method |
6324541, | Jun 11 1998 | TRADECO ASIA LTD | System, method, and computer program product for providing relational patterns between entities |
6324542, | Jun 18 1996 | Good Technology Corporation | Enterprise connectivity to handheld devices |
6324544, | Oct 21 1998 | Microsoft Technology Licensing, LLC | File object synchronization between a desktop computer and a mobile device |
6324587, | Dec 23 1997 | Microsoft Technology Licensing, LLC | Method, computer program product, and data structure for publishing a data object over a store and forward transport |
6327586, | May 27 1998 | GOOGLE LLC | System method and computer program product to automate the management and analysis of heterogeneous data |
6336117, | Apr 30 1999 | International Business Machines Corporation | Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine |
6336138, | Aug 25 1998 | Hewlett Packard Enterprise Development LP | Template-driven approach for generating models on network services |
6351767, | Jan 25 1999 | International Business Machines Corporation | Method and system for automatically caching dynamic content based on a cacheability determination |
6356937, | Jul 06 1999 | MEC MANAGEMENT, LLC | Interoperable full-featured web-based and client-side e-mail system |
6363051, | Jun 30 1998 | AT&T Corp. | Method and apparatus for achieving fast reconnection of permanent virtal channels in a frame relay network |
6363352, | Nov 13 1998 | Microsoft Technology Licensing, LLC | Automatic scheduling and formation of a virtual meeting over a computer network |
6370566, | Apr 10 1998 | Microsoft Technology Licensing, LLC | Generating meeting requests and group scheduling from a mobile device |
6377810, | Jun 11 1999 | Google Technology Holdings LLC | Method of operation of mobile wireless communication system with location information |
6380959, | Sep 27 1996 | Vivint, Inc | Web calendar architecture and uses thereof |
6389422, | Jan 27 1998 | Sharp Kabushiki Kaisha | METHOD OF RELAYING FILE OBJECT, DISTRIBUTED FILE SYSTEM, COMPUTER READABLE MEDIUM RECORDING A PROGRAM OF FILE OBJECT RELAY METHOD AND GATEWAY COMPUTER, ALLOWING REFERENCE OF ONE SAME FILE OBJECT AMONG NETWORKS |
6389455, | Sep 22 1998 | SERVSTOR TECHNOLOGIES, LLC | Method and apparatus for bouncing electronic messages |
6389457, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device |
6397057, | Jun 07 1995 | SITO MOBILE LTD | System and method of providing advertising information to a subscriber through a wireless device |
6397230, | Feb 09 1996 | B S D CROWN LTD | Real-time multimedia transmission |
6401104, | Jul 03 1999 | Intellisync Corporation | System and methods for synchronizing datasets using cooperation among multiple synchronization engines |
6401112, | Jan 29 1997 | ACCESS CO , LTD | Method and apparatus for synchronizing an Email client on a portable computer system with an Email client on a desktop computer |
6401113, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device |
6405197, | Sep 18 1998 | Oracle International Corporation | Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner |
6411696, | Dec 31 1996 | Intel Corporation | System for finding a user with a preferred communication mechanism |
6415031, | Mar 12 1999 | Comcast IP Holdings I, LLC | Selective and renewable encryption for secure distribution of video on-demand |
6418308, | Aug 29 1996 | WSOU Investments, LLC | Opinion poll utilizing a wireless data transmission connection |
6421669, | Sep 18 1998 | Oracle International Corporation | Method and apparatus for constructing and maintaining a user knowledge profile |
6421781, | Apr 30 1998 | Unwired Planet, LLC | Method and apparatus for maintaining security in a push server |
6430602, | Aug 22 2000 | Microsoft Technology Licensing, LLC | Method and system for interactively responding to instant messaging requests |
6438585, | May 29 1998 | Malikie Innovations Limited | System and method for redirecting message attachments between a host system and a mobile data communication device |
6438612, | Sep 11 1998 | Inside Secure | Method and arrangement for secure tunneling of data between virtual routers |
6442589, | Jan 14 1999 | Fujitsu Limited | Method and system for sorting and forwarding electronic messages and other data |
6442637, | Aug 12 1999 | Qualcomm Incorporated | Expandable mobile computer system |
6446118, | Feb 29 2000 | BUFFALO PATENTS, LLC | E-mail notification device |
6463463, | May 29 1998 | Malikie Innovations Limited | System and method for pushing calendar event messages from a host system to a mobile data communication device |
6463464, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device |
6487557, | Dec 26 1997 | HANGER SOLUTIONS, LLC | Network-access management system and method applied to network and computer program product including computer program recorded on storage medium for creating display data |
6487560, | Oct 28 1998 | Intellisync Corporation | System and methods for communicating between multiple devices for synchronization |
6490353, | Nov 23 1998 | Data encrypting and decrypting apparatus and method | |
6496802, | Jan 07 2000 | UNIVERSAL MUSIC GROUP, INC | System and method for providing access to electronic works |
6499054, | Dec 02 1999 | Western Digital Technologies, INC | Control and observation of physical devices, equipment and processes by multiple users over computer networks |
6505214, | Sep 28 1999 | Microsoft Technology Licensing, LLC | Selective information synchronization based on implicit user designation |
6516327, | Dec 24 1998 | International Business Machines Corporation | System and method for synchronizing data in multiple databases |
6526433, | Dec 15 1999 | International Business Machines Corporation | Adaptive timeout value setting for distributed computing environment (DCE) applications |
6526506, | Feb 25 1999 | Extreme Networks, Inc | Multi-level encryption access point for wireless network |
6529908, | May 28 1998 | DATA DISTRIBUTION TECHNOLOGIES LLC | Web-updated database with record distribution by email |
6532446, | Nov 24 1999 | Unwired Planet, LLC | Server based speech recognition user interface for wireless devices |
6535892, | Mar 08 1999 | Intellisync Corporation | System and methods for exchanging messages between a client and a server for synchronizing datasets |
6546005, | Mar 25 1997 | AT&T Corp. | Active user registry |
6549939, | Aug 31 1999 | International Business Machines Corporation | Proactive calendar notification agent |
6556217, | Jun 01 2000 | Nokia Technologies Oy | System and method for content adaptation and pagination based on terminal capabilities |
6593944, | May 18 2000 | ACCESS CO , LTD | Displaying a web page on an electronic display device having a limited display area |
6601026, | Sep 17 1999 | Microsoft Technology Licensing, LLC | Information retrieval by natural language querying |
6615253, | Aug 31 1999 | Accenture Global Services Limited | Efficient server side data retrieval for execution of client side applications |
6618710, | Jul 07 1999 | International Business Machines Corporation | Apparatus and method for intelligent routing of electronic messages to pagers and computers |
6621892, | Jul 14 2000 | Meta Platforms, Inc | System and method for converting electronic mail text to audio for telephonic delivery |
6625621, | Jan 04 2000 | INLOVITY LIMITED | System and methods for a fast and scalable synchronization server |
6636482, | Mar 08 2001 | ARRIS ENTERPRISES LLC | Method and apparatus for controlling traffic loading of different service levels in a cable data system |
6639693, | Apr 25 1995 | Canon Kabushiki Kaisha | Data communication apparatus and method therefor |
6640097, | Dec 13 1999 | Markport Limited | WAP service personalization, management and billing object oriented platform |
6640244, | Aug 31 1999 | Accenture Global Services Limited | Request batcher in a transaction services patterns environment |
6640249, | Aug 31 1999 | Accenture Global Services Limited | Presentation services patterns in a netcentric environment |
6643650, | May 09 2000 | Oracle America, Inc | Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment |
6643688, | Sep 22 1998 | SERVSTOR TECHNOLOGIES, LLC | Method and apparatus for bouncing electronic messages |
6647384, | Sep 18 1998 | Oracle International Corporation | Method and apparatus for managing user profiles including identifying users based on matched query term |
6650890, | Sep 29 2000 | GOOGLE LLC | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
6662016, | May 05 2000 | Unwired Planet, LLC | Providing graphical location information for mobile resources using a data-enabled network |
6668046, | May 18 1999 | Google Technology Holdings LLC | Method and system for generating a user's telecommunications bill |
6671695, | Jun 18 2001 | Procter & Gamble Company, The | Dynamic group generation and management |
6671700, | May 23 2000 | ACCESS CO , LTD | Method and apparatus for parallel execution of conduits during simultaneous synchronization of databases |
6671702, | Jan 30 1998 | PALMSOURCE, INC | Method and apparatus for synchronization of two computer systems by executing a synchronization process at a portable computer |
6671757, | Jan 26 2000 | Synchronoss Technologies, Inc | Data transfer and synchronization system |
6694336, | Jan 25 2000 | Synchronoss Technologies, Inc | Data transfer and synchronization system |
6697807, | Jun 15 2000 | GENERATE, INC | Method of and system for comparing database records to determine connections between parties over a network |
6701378, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device |
6707801, | Mar 28 2001 | Qualcomm Incorporated | Method and apparatus for data transport in a wireless communication system |
6708221, | Dec 13 1996 | Malikie Innovations Limited | System and method for globally and securely accessing unified information in a computer network |
6714965, | Jul 03 1998 | Fujitsu Limited | Group contacting system, and recording medium for storing computer instructions for executing operations of the contact system |
6721787, | Feb 10 2000 | UNWIRED BROADBAND, INC | System and method for wireless hot-synchronization of a personal digital assistant |
6727917, | Jan 06 2000 | Microsoft Technology Licensing, LLC | User interface for palm-sized computing devices and method and apparatus for displaying the same |
6728530, | Dec 28 1999 | Nokia Technologies Oy | Calendar-display apparatus, and associated method, for a mobile terminal |
6728786, | Jan 30 1997 | PALMSOURCE, INC | Method and apparatus for synchronizing a portable computer system with a desktop computer system |
6732101, | Jun 15 2000 | ZIXCORP SYSTEMS, INC | Secure message forwarding system detecting user's preferences including security preferences |
6732158, | Dec 02 1999 | Western Digital Technologies, INC | VCR webification |
6735591, | Jan 26 1999 | Universal information warehouse system and method | |
6741232, | Jan 23 2002 | Malikie Innovations Limited | User interface for a data processing apparatus |
6741855, | Mar 24 2000 | Oracle America, Inc | Method and apparatus for remotely managing data via a mobile device |
6742015, | Aug 31 1999 | Accenture Global Services Limited | Base services patterns in a netcentric environment |
6742059, | Feb 04 2000 | EMC IP HOLDING COMPANY LLC | Primary and secondary management commands for a peripheral connected to multiple agents |
6745024, | Jan 10 2000 | Qualcomm Incorporated | System and method for preparing and sending an electronic mail communication using a wireless communications device |
6745326, | Jan 22 1999 | Societe Francaise du Radiotelephone | Authentication process including setting up a secure channel between a subscriber and a service provider accessible through a telecommunications operator |
6756882, | Sep 09 2002 | Google Technology Holdings LLC | Method and controller for providing a location-based game associated with a plurality of mobile stations |
6757362, | Mar 06 2000 | AVAYA Inc | Personal virtual assistant |
6757696, | Jan 25 2000 | Synchronoss Technologies, Inc | Management server for synchronization system |
6757708, | Mar 03 2000 | International Business Machines Corporation | Caching dynamic content |
6760916, | Jan 14 2000 | PARKER VISION, INC | Method, system and computer program product for producing and distributing enhanced media downstreams |
6771294, | Dec 29 1999 | AUGUMENTA OY | User interface |
6775362, | Mar 06 2002 | RPX Corporation | Graphical telephone system |
6779019, | May 29 1998 | Malikie Innovations Limited | System and method for pushing information from a host system to a mobile data communication device |
6782409, | May 29 1998 | Sony Corporation | Experience/sympathy information providing system |
6785868, | May 31 2000 | ACCESS CO , LTD | Method and apparatus for managing calendar information from a shared database and managing calendar information from multiple users |
6785906, | Jan 23 1997 | LG Electronics Inc | Polling internet module of web TV |
6799190, | Nov 13 1996 | Intellisync Corporation | Synchronizing databases |
6804707, | Oct 20 2000 | BENHOV GMBH, LLC | Method and system for delivering wireless messages and information to personal computing devices |
6816849, | May 26 1998 | Intellectual Ventures I LLC | Advanced internet interface |
6820088, | Apr 10 2000 | Malikie Innovations Limited | System and method for synchronizing data records between multiple databases |
6820204, | Mar 31 1999 | ZKEY INVESTMENTS LLC | System and method for selective information exchange |
6829487, | May 10 2001 | PIECE FUTURE PTE LTD | Method and apparatus for establishing a communication group |
6834195, | Apr 04 2000 | Wireless Agents, LLC | Method and apparatus for scheduling presentation of digital content on a personal communication device |
6847974, | Mar 26 2001 | CRICKET OPERATING COMPANY LLC | Method and apparatus for intelligent data assimilation |
6850757, | Apr 20 2000 | PANASONIC COMMUNICATIONS CO , LTD | Mail notification apparatus and a mail notification method |
6859212, | Dec 08 1998 | YODLEE, INC | Interactive transaction center interface |
6859440, | Jun 13 2000 | Apple Inc | Service prioritized access and paging |
6867774, | Dec 02 2002 | MCLOUD TECHNOLOGIES USA INC | Method and apparatus for transforming polygon data to voxel data for general purpose applications |
6868447, | May 09 2000 | Oracle America, Inc | Mechanism and apparatus for returning results of services in a distributed computing environment |
6871220, | Oct 28 1998 | YODLEE, INC | System and method for distributed storage and retrieval of personal information |
6871236, | Jan 26 2001 | Microsoft Technology Licensing, LLC | Caching transformed content in a mobile gateway |
6873688, | Sep 30 1999 | OY RIDDES LTD | Method for carrying out questionnaire based survey in cellular radio system, a cellular radio system and a base station |
6874017, | Mar 24 1999 | Kabushiki Kaisha Toshiba | Scheme for information delivery to mobile computers using cache servers |
6879985, | Oct 17 2000 | MEKIKI CO , LTD ; MEKIKI CREATES CO , LTD | HUMAN RELATIONSHIPS REGISTERING SYSTEM, METHOD AND DEVICE FOR REGISTERING HUMAN RELATIONSHIPS, PROGRAM FOR REGISTERING HUMAN RELATIONSHIPS, AND MEDIUM STORING HUMAN RELATIONSHIPS REGISTERING PROGRAM AND READABLE BY COMPUTER |
6886030, | Aug 18 1998 | Rovi Guides, Inc; UV CORP ; TV GUIDE, INC | Electronic mail system employing a low bandwidth link for e-mail notifications |
6892070, | Nov 05 2001 | KRON NETWORKS CORP | Communication system and method for minimizing international roaming costs |
6892196, | Dec 22 1999 | Accenture Global Services Limited | System, method and article of manufacture for a user programmable diary interface link |
6895394, | Nov 03 1998 | SAS TRUSTSEED | Method for transmitting data and implementing server |
6895558, | Feb 11 2000 | Microsoft Technology Licensing, LLC | Multi-access mode electronic personal assistant |
6898427, | Dec 29 1999 | Bellsouth Intellectual Property Corporation | Method of coupling portable communications device to first network by way of second network |
6922547, | Jun 27 2001 | Qualcomm Incorporated | Methods and apparatus for supporting group communications |
6922721, | Oct 17 2000 | Sony Corporation | Exchange of information in a communication system |
6925477, | Mar 31 1998 | Intellisync Corporation | Transferring records between two databases |
6931529, | Jan 05 2001 | International Business Machines Corporation | Establishing consistent, end-to-end protection for a user datagram |
6938079, | Sep 19 2000 | VALTRUS INNOVATIONS LIMITED | System and method for automatically configuring a client device |
6944447, | Apr 27 2001 | Accenture Global Services Limited | Location-based services |
6944662, | Aug 04 2000 | TAIWAN SEMICONDUCTOR MANUFACTURING CO , LTD | System and methods providing automatic distributed data retrieval, analysis and reporting services |
6947770, | Jun 22 2001 | Ericsson, Inc. | Convenient dialing of names and numbers from a phone without alpha keypad |
6950862, | May 07 2001 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for offloading a computational service on a point-to-point communication link |
6957397, | Jun 11 2001 | Qualcomm Incorporated | Navigating through a menu of a handheld computer using a keyboard |
6965917, | Sep 07 1999 | Mavenir LTD | System and method for notification of an event |
6966058, | Jun 12 2002 | AGAMI SYSTEMS, INC | System and method for managing software upgrades in a distributed computing system |
6968175, | Aug 13 2002 | RPX Corporation | Method and system for sharing transmission revenue between mobile operators and content providers |
6970879, | Sep 18 1998 | Oracle International Corporation | Method of constructing and displaying an entity profile constructed utilizing input from entities other than the owner |
6972682, | Jan 18 2002 | Georgia Tech Research Corporation | Monitoring and tracking of assets by utilizing wireless communications |
6973299, | Aug 01 2003 | Microsoft Technology Licensing, LLC | Unified contact list |
6981041, | Apr 13 2000 | AEP NETWORKS, INC | Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities |
6981047, | Oct 09 1998 | NETMOTION WIRELESS HOLDINGS, INC ; MOBILE SONIC INTERMEDIATE, INC ; MOBILE SONIC, INC | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
6985933, | May 30 2000 | SNAP INC | Method and system for increasing ease-of-use and bandwidth utilization in wireless devices |
6985983, | Mar 01 2001 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Translating device adapter having a common command set for interfacing multiple types of redundant storage devices to a host processor |
6986061, | Nov 20 2000 | TREND MICRO INCORPORATED | Integrated system for network layer security and fine-grained identity-based access control |
6987734, | Apr 20 2001 | NEWPORT TELEVISION LLC | Provision of digital data via multiple broadcasts |
6990472, | Oct 23 2000 | Starpound Corporation; STARPOUND CORP | Telecommunications initiated data fulfillment system |
6993326, | Apr 02 2001 | KNAPP INVESTMENT COMPANY LIMITED | System and method for providing short message targeted advertisements over a wireless communications network |
6993327, | Oct 29 2001 | Google Technology Holdings LLC | Multicast distribution of presence information for an instant messaging system |
6996627, | May 25 1999 | Intel Corporation | System and method for providing update information |
6999753, | Aug 07 2001 | Siemens Aktiengesellschaft | Method, subscriber device and radio communication system for transmitting group messages |
7020685, | Oct 08 1999 | Unwired Planet, LLC | Method and apparatus for providing internet content to SMS-based wireless devices |
7024491, | May 23 2001 | Western Digital Technologies, INC | Remotely synchronizing a mobile terminal by adapting ordering and filtering synchronization rules based on a user's operation of the mobile terminal |
7026984, | Nov 08 2004 | CINGULAR WIRELESS II, L L C | Intelligent utilization of resources in mobile devices |
7032242, | Mar 05 1998 | Hewlett Packard Enterprise Development LP | Method and system for distributed network address translation with network security features |
7035630, | Sep 16 2003 | Malikie Innovations Limited | Demand-based provisioning for a mobile communication device |
7046993, | Nov 18 1999 | Nokia Corporation | Group communication device and method |
7047202, | Jul 13 2000 | Microsoft Technology Licensing, LLC | Method and apparatus for optimizing networking potential using a secured system for an online community |
7062024, | Dec 19 2001 | AMERITECH COMMUNICATIONS, INC ; Pacific Telesis Shared Services; SOUTH WESTERN BELL CORP -LONG DISTANCE | Telecommunication services reporting system |
7069308, | Jun 16 2003 | Meta Platforms, Inc | System, method and apparatus for connecting users in an online computer system based on their relationships within social networks |
7072678, | Nov 20 2003 | TEKELEC GLOBAL, INC | Methods and systems for triggerless mobile group dialing |
7079499, | Sep 08 1999 | Apple | Internet protocol mobility architecture framework |
7080371, | Mar 03 1998 | Oracle America, Inc | Method, system, apparatus and program product for distribution and instantiation of software upgrades |
7082316, | Dec 27 2000 | WSOU Investments, LLC | Group creation for wireless communication terminal |
7085365, | Apr 16 2004 | Nokia Technologies Oy | Group information management |
7096030, | Jun 28 2002 | Nokia Technologies Oy | System and method for initiating location-dependent applications on mobile devices |
7100821, | May 15 2003 | CALLAHAN CELLULAR L L C | Charge card and debit transactions using a variable charge number |
7103432, | Jun 02 2004 | BlackBerry Limited | Auto-configuration of hardware on a portable computing device |
7120692, | Dec 02 1999 | Western Digital Technologies, INC | Access and control system for network-enabled devices |
7120928, | Jun 15 2001 | FINASTRA USA CORPORATION | Secure selective sharing of account information on an internet information aggregation system |
7130839, | May 29 2001 | Oracle America, Inc | Method and system for grouping entries in a directory server by group memberships defined by roles |
7136645, | Oct 09 1998 | NETMOTION WIRELESS HOLDINGS, INC ; MOBILE SONIC INTERMEDIATE, INC ; MOBILE SONIC, INC | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
7139555, | Aug 01 2003 | Microsoft Technology Licensing, LLC | Unified contact list |
7139565, | Jan 08 2003 | Seven Networks, Inc | Connection architecture for a mobile network |
7140549, | Feb 24 2004 | Oracle America, Inc | Method and apparatus for selecting a desired application on a smart card |
7146645, | Dec 30 1999 | Nokia Technologies Oy | Dedicated applications for user stations and methods for downloading dedicated applications to user stations |
7149780, | Dec 14 2001 | CUFER ASSET LTD L L C | Method for determining e-mail address format rules |
7149789, | Apr 18 1996 | ZHIGU HOLDINGS LIMITED | Distributing software via distribution files |
7149959, | Mar 25 1999 | Autodesk, Inc. | Method and apparatus for providing drawing collaboration on a network |
7162241, | May 18 2002 | LG Electronics Inc | Method for managing multicast group in mobile communication system |
7165727, | Feb 24 2004 | Oracle America, Inc | Method and apparatus for installing an application onto a smart card |
7172118, | Sep 29 2003 | TRUSTEES OF THE STEVENS INSTITUTE OF TECHNOLOGY, THE | System and method for overcoming decision making and communications errors to produce expedited and accurate group choices |
7181228, | Dec 31 2003 | Corporation for National Research Initiatives | System and method for establishing and monitoring the relative location of group members |
7184790, | Apr 02 2002 | MOTOROLA SOLUTIONS, INC | Method and apparatus for establishing a talk group |
7185362, | Aug 20 2001 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
7194273, | Feb 12 2004 | Alcatel-Lucent USA Inc | Location based service restrictions for mobile applications |
7200390, | Dec 30 2004 | MCDERMOTT, WILL & EMERY LLP | Device software update transport and download |
7203733, | Jul 03 1998 | ZHIGU HOLDINGS LIMITED | Method and arrangement for accessing information in a mobile communication network |
7206806, | May 30 2001 | UNWIRED BROADBAND, INC | Method and system for remote utilizing a mobile device to share data objects |
7209757, | May 19 2000 | NOKIA SOLUTIONS AND NETWORKS OY | Location information services |
7210121, | Feb 07 2003 | Oracle America, Inc | Method and system for generating first class citizen application implementing native software application wrapper |
7219139, | Jun 29 2001 | Gula Consulting Limited Liability Company | System and method for using continuous messaging units in a network architecture |
7219222, | Jan 18 2002 | GE Medical Technology Services, Inc. | Method and system to grant access to software options resident on a medical imaging device |
7224957, | Mar 16 2004 | AI-CORE TECHNOLOGIES, LLC | Apparatus and method for broadcasting messages to selected group(s) of users |
7231206, | Jun 29 2001 | Google Technology Holdings LLC | Group application for group formation and management |
7233795, | Mar 19 2001 | SAFE SECURE COMMUNICATIONS, LLC | Location based communications system |
7234111, | Sep 28 2001 | NTT DoCoMo, Inc | Dynamic adaptation of GUI presentations to heterogeneous device platforms |
7239877, | Oct 07 2003 | Accenture Global Services Limited | Mobile provisioning tool system |
7240095, | Feb 22 2002 | Bellsouth Intellectual Property Corporation | Electronic mail notification |
7242680, | Mar 20 2001 | Verizon Patent and Licensing Inc | Selective feature blocking in a communications network |
7245926, | Apr 11 2003 | FAR EASTONE TELECOMMUNICATIONS CO , LTD | Multimedia information and information inquiry download service |
7257391, | Mar 26 2002 | ZOOVE CORP | Wireless data system |
7257639, | Jan 19 2001 | Microsoft Technology Licensing, LLC | Enhanced email—distributed attachment storage |
7259666, | Apr 30 2004 | T-MOBILE INNOVATIONS LLC | Method and system for displaying status indications from communications network |
7260552, | Dec 12 2001 | SCYTL ELECTION TECHNOLOGIES S L | Secure remote electronic voting system and cryptographic protocols and computer programs employed |
7260590, | Dec 27 2000 | Cisco Technology, Inc.; Cisco Technology, Inc | Streamed database archival process with background synchronization |
7260651, | Jun 04 2001 | ARTERA GROUP, INC | System and method for increasing the effective bandwidth of a communications network |
7272830, | Jan 16 2003 | Oracle America, Inc | Ordering program data for loading on a device |
7277408, | May 08 2000 | Nokia Corporation | Shared application access for data services in wireless telecommunication systems |
7284664, | Oct 22 2001 | AMETEK PROGRAMMABLE POWER, INC | Methods and apparatus for performing data acquisition and control |
7289792, | May 27 1998 | Nokia Corporation | Method for transmitting multimedia messages and a multimedia message communication system |
7289964, | Aug 31 1999 | Accenture Global Services Limited | System and method for transaction services patterns in a netcentric environment |
7289971, | Jul 22 1996 | CYVA RESEARCH HOLDINGS, LLC | Personal information security and exchange tool |
7293107, | Oct 09 1998 | NETMOTION WIRELESS HOLDINGS, INC ; MOBILE SONIC INTERMEDIATE, INC ; MOBILE SONIC, INC | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
7295853, | Jun 30 2004 | Malikie Innovations Limited | Methods and apparatus for the immediate acceptance and queuing of voice data for PTT communications |
7296155, | Jun 08 2001 | Cisco Technology, Inc.; Cisco Technology, Inc | Process and system providing internet protocol security without secure domain resolution |
7305252, | Dec 09 2003 | RPX Corporation | System and method for service naming and related directory structure in a mobile data network |
7305700, | Jan 08 2003 | Seven Networks, Inc | Secure transport for mobile communication network |
7310350, | Dec 29 2000 | Oracle International Corporation | Mobile surveys and polling |
7310729, | Mar 12 2003 | LIMELIGHT NETWORKS, INC | Digital rights management license delivery system and method |
7324473, | Oct 07 2003 | Accenture Global Services Limited | Connector gateway |
7349871, | Aug 08 2002 | PCMS HOLDINGS, INC | Methods for purchasing of goods and services |
7353274, | May 09 2000 | MEDISYS RJB CONSULTING, INC | Method, apparatus, and system for determining whether a computer is within a particular location |
7359720, | Sep 27 1996 | Unwired Planet, LLC | Mobility extended telephone application programming interface and method of use |
7373386, | Aug 11 2003 | Malikie Innovations Limited | System and method for configuring access to electronic mailboxes |
7374099, | Feb 24 2004 | Oracle America, Inc | Method and apparatus for processing an application identifier from a smart card |
7376701, | Apr 29 2002 | CISCO SYSTEMS, INC , A CORP OF CALIFORNIA | System and methodology for control of, and access and response to internet email from a wireless device |
7382879, | Jul 23 2003 | T-MOBILE INNOVATIONS LLC | Digital rights management negotiation for streaming media over a network |
7388950, | Nov 12 1999 | GRAPE TECHNOLOGY GROUP, INC | Technique for providing personalized information and communications services |
7389412, | Aug 10 2001 | Syniverse Technologies, LLC | System and method for secure network roaming |
7392483, | Sep 28 2001 | NTT DoCoMo, Inc | Transformation of platform specific graphical user interface widgets migrated between heterogeneous device platforms |
7395329, | May 13 2002 | Bellsouth Intellectual Property Corporation | Real-time notification of presence availability changes |
7398271, | Apr 16 2001 | R2 SOLUTIONS LLC | Using network traffic logs for search enhancement |
7430609, | Apr 30 2001 | Meta Platforms, Inc | Managing access to streams hosted on duplicating switches |
7441271, | Oct 20 2005 | Seven Networks, Inc | Method and apparatus for intercepting events in a communication system |
7443847, | Jul 02 1999 | Cisco Technology, Inc. | Stateful failover of service managers |
7461071, | Apr 04 2005 | YOUnite, Inc.; YOUSERVICE, LLC | Distributed management framework for personal attributes |
7465231, | May 20 2004 | TGN, INC ; Gametap LLC | Systems and methods for delivering content over a network |
7469125, | Jun 17 2004 | Nokia Technologies Oy | Enhanced method of transferring data from a data originating device to a mobile terminal |
7483036, | Feb 21 2003 | Canon Kabushiki Kaisha | Reducing the number of compositing operations performed in a pixel sequential rendering system |
7499537, | Nov 12 1999 | GRAPE TECHNOLOGY GROUP, INC | Technique for providing personalized information and communications services |
7502615, | Jul 16 2004 | BRIDGEPORT NETWORKS, INC | Handoff for cellular and internet protocol telephony |
7519042, | Sep 12 2003 | Google Technology Holdings LLC | Apparatus and method for mixed-media call formatting |
7532571, | Jun 27 2003 | Microsoft Technology Licensing, LLC | Providing online connectivity across a range of electronic communications systems |
7539665, | Oct 23 2001 | Malikie Innovations Limited | System and method for merging remote and local data in a single user interface |
7539728, | Aug 07 2003 | HCL Technologies Limited | Time sensitive electronic mail |
7548947, | Nov 09 1999 | Digital River, Inc. | Predictive pre-download of a network object |
7548969, | Jul 27 2005 | Hewlett Packard Enterprise Development LP | Computer system polling with adjustable intervals based on rules and server states |
7551900, | Jun 23 2000 | LG Electronics Inc. | Apparatus and method for transmitting call holding message in mobile communication terminal |
7567575, | Sep 07 2001 | Meta Platforms, Inc | Personalized multimedia services using a mobile service platform |
7574208, | Oct 09 1998 | NETMOTION WIRELESS HOLDINGS, INC ; MOBILE SONIC INTERMEDIATE, INC ; MOBILE SONIC, INC | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
7575171, | Sep 01 2005 | System and method for reliable content access using a cellular/wireless device with imaging capabilities | |
7584294, | Mar 12 2007 | Citrix Systems, Inc | Systems and methods for prefetching objects for caching using QOS |
7587482, | Sep 08 2004 | Verizon Patent and Licensing Inc | Multimodal interface for mobile messaging |
7587608, | Nov 30 2004 | SAP SE | Method and apparatus for storing data on the application layer in mobile devices |
7593714, | Jun 24 2005 | Google Technology Holdings LLC | Communication services payment method and system |
7596608, | Mar 18 2005 | GOLUB CAPITAL LLC | Networked emergency management system |
7596791, | Dec 19 2000 | EMC IP HOLDING COMPANY LLC | Methods and techniques for delivering rich Java applications over thin-wire connections with high performance and scalability |
7613792, | Sep 11 2000 | HANDMARK, INC | Method for dynamic caching |
7630986, | Oct 27 1999 | STRIPE, INC | Secure data interchange |
7634558, | Sep 22 2003 | Sprint Spectrum LLC | Method and system for updating network presence records at a rate dependent on network load |
7643818, | Nov 22 2004 | Seven Networks, Inc | E-mail messaging to/from a mobile terminal |
7644166, | Mar 03 2003 | Meta Platforms, Inc | Source audio identifiers for digital communications |
7650416, | Aug 12 2003 | RIVERBED TECHNOLOGY LLC | Content delivery for client-server protocols with user affinities using connection end-point proxies |
7672291, | Jun 23 2004 | HTC Corporation | Methods for establishing wireless network communication and device utilizing same |
7672439, | Apr 02 2003 | Verizon Patent and Licensing Inc | Concatenated audio messages |
7680281, | Oct 20 2004 | Seven Networks, Inc. | Method and apparatus for intercepting events in a communication system |
7684346, | Dec 29 2006 | WSOU INVESTMENTS LLC | Communications control for extending the period over which a terminal is able to have an open connection with a host accessible via a packet data network |
7689664, | Aug 10 2006 | Sony Corporation | System and method for installing and configuring software applications on a mobile networked terminal |
7693555, | Oct 21 2005 | Apple Inc | Sleep-mode wireless cell reselection apparatus, systems, and methods |
7693944, | Mar 03 2003 | Meta Platforms, Inc | Recipient control of source audio identifiers for digital communications |
7694008, | May 04 2005 | VENTURI WIRELESS, INC | Method and apparatus for increasing performance of HTTP over long-latency links |
7706781, | Nov 22 2004 | Seven Networks, Inc | Data security in a mobile e-mail service |
7707573, | Dec 31 2003 | GOOGLE LLC | Systems and methods for providing and installing software |
7752633, | Mar 14 2005 | Seven Networks, Inc | Cross-platform event engine |
7757956, | Aug 31 1993 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | Modular, portable data processing terminal for use in a radio frequency communication network |
7769395, | Jun 20 2006 | Seven Networks, Inc. | Location-based operations and messaging |
7769400, | Nov 22 2004 | Seven Networks, Inc | Connectivity function for forwarding e-mail |
7769805, | Mar 31 2006 | T-MOBILE INNOVATIONS LLC | Mobile device catalog and caching and architecture |
7778792, | Dec 08 2006 | BBY SOLUTIONS, INC | Systems and methods for location, motion, and contact detection and tracking in a networked audiovisual device |
7783757, | Mar 12 2007 | Citrix Systems, Inc | Systems and methods of revalidating cached objects in parallel with request for object |
7796742, | Apr 21 2005 | Seven Networks, Inc | Systems and methods for simplified provisioning |
7797064, | Dec 13 2002 | CALLAHAN CELLULAR L L C | Apparatus and method for skipping songs without delay |
7809818, | Mar 12 2007 | Citrix Systems, Inc | Systems and method of using HTTP head command for prefetching |
7827055, | Jun 07 2001 | Amazon Technologies, Inc | Identifying and providing targeted content to users having common interests |
7827597, | Jan 08 2002 | Seven Networks, Inc. | Secure transport for mobile communication network |
7853563, | Aug 01 2005 | Seven Networks, Inc | Universal data aggregation |
7877703, | Mar 14 2005 | Seven Networks, Inc | Intelligent rendering of information in a limited display environment |
7881745, | Mar 10 2003 | Qualcomm Incorporated | Electronic device network employing provisioning techniques to update firmware and/or software in electronic devices |
7899996, | Dec 31 2007 | EMC IP HOLDING COMPANY LLC | Full track read for adaptive pre-fetching of data |
7908656, | Apr 23 2007 | Network Appliance, Inc. | Customized data generating data storage system filter for data security |
7917468, | Aug 01 2005 | Seven Networks, Inc | Linking of personal information management data |
7917505, | Aug 01 2005 | Seven Networks, Inc. | Methods for publishing content |
7921167, | Dec 21 2007 | DIGIVATION DIGITAL SOLUTIONS PVT LTD | Virtual electronic card based networking |
7930416, | May 11 1999 | June Ray Limited | Load balancing technique implemented in a data network device utilizing a data cache |
7933929, | Jun 27 2005 | GOOGLE LLC | Network link for providing dynamic data layer in a geographic information system |
7937091, | Jun 25 2003 | NTT DoCoMo, Inc | Method and apparatus for resource sharing over handset terminals |
7970860, | Mar 11 2002 | Malikie Innovations Limited | System and method for pushing data to a mobile device |
7996487, | Aug 23 2006 | Oracle International Corporation | Managing searches on mobile devices |
8005891, | Jul 22 2005 | Malikie Innovations Limited | Method for training a server for content delivery based on communication of state information from a mobile device browser |
8010082, | Oct 19 2005 | Seven Networks, Inc. | Flexible billing architecture |
8032409, | Nov 22 1999 | Accenture Global Services Limited | Enhanced visibility during installation management in a network-based supply chain environment |
8064583, | Apr 21 2005 | Seven Networks, Inc. | Multiple data store authentication |
8069166, | Aug 01 2005 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
8078158, | Jun 26 2008 | Seven Networks, Inc | Provisioning applications for a mobile device |
8107921, | Jan 11 2008 | Seven Networks, Inc | Mobile virtual network operator |
8116214, | Dec 03 2004 | Seven Networks, Inc | Provisioning of e-mail settings for a mobile terminal |
8127342, | Jan 08 2002 | Seven Networks, Inc. | Secure end-to-end transport through intermediary nodes |
8166164, | Nov 01 2010 | Seven Networks, Inc. | Application and network-based long poll request detection and cacheability assessment therefor |
8190701, | Nov 01 2010 | Seven Networks, Inc.; Seven Networks, Inc | Cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
8194680, | Mar 11 2009 | Amazon Technologies, Inc. | Managing communications for modified computer networks |
8204953, | Nov 01 2010 | Seven Networks, Inc.; Seven Networks, Inc | Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
8209709, | Mar 14 2005 | Seven Networks, Inc | Cross-platform event engine |
8260852, | Mar 02 2005 | GOOGLE LLC | Methods and apparatuses for polls |
8549587, | Jan 08 2002 | Seven Networks, Inc. | Secure end-to-end transport through intermediary nodes |
20010009025, | |||
20010010046, | |||
20010013069, | |||
20010023414, | |||
20010029524, | |||
20010032254, | |||
20010034225, | |||
20010034244, | |||
20010037453, | |||
20010039191, | |||
20010041566, | |||
20010042009, | |||
20010042099, | |||
20010043148, | |||
20010052052, | |||
20010053687, | |||
20020002478, | |||
20020002591, | |||
20020007303, | |||
20020013727, | |||
20020019225, | |||
20020019812, | |||
20020035556, | |||
20020035617, | |||
20020038253, | |||
20020042875, | |||
20020049818, | |||
20020049828, | |||
20020053078, | |||
20020055351, | |||
20020059201, | |||
20020059457, | |||
20020068559, | |||
20020073207, | |||
20020077077, | |||
20020077084, | |||
20020078384, | |||
20020087549, | |||
20020087679, | |||
20020087883, | |||
20020089542, | |||
20020091921, | |||
20020095319, | |||
20020095328, | |||
20020095391, | |||
20020095399, | |||
20020098855, | |||
20020099613, | |||
20020099809, | |||
20020101975, | |||
20020103934, | |||
20020107944, | |||
20020107985, | |||
20020116499, | |||
20020116501, | |||
20020120388, | |||
20020120766, | |||
20020120779, | |||
20020126701, | |||
20020133504, | |||
20020144109, | |||
20020146129, | |||
20020152379, | |||
20020155848, | |||
20020156839, | |||
20020158908, | |||
20020161587, | |||
20020161925, | |||
20020161928, | |||
20020164977, | |||
20020167484, | |||
20020174189, | |||
20020186848, | |||
20020188940, | |||
20020193094, | |||
20020194209, | |||
20020198027, | |||
20030005151, | |||
20030014491, | |||
20030022662, | |||
20030023692, | |||
20030023975, | |||
20030028430, | |||
20030028441, | |||
20030046433, | |||
20030046586, | |||
20030046587, | |||
20030050041, | |||
20030054810, | |||
20030056096, | |||
20030060188, | |||
20030063120, | |||
20030065738, | |||
20030065739, | |||
20030065802, | |||
20030070061, | |||
20030072451, | |||
20030078880, | |||
20030084165, | |||
20030088629, | |||
20030093691, | |||
20030097381, | |||
20030100321, | |||
20030100326, | |||
20030117432, | |||
20030120685, | |||
20030125023, | |||
20030126216, | |||
20030130984, | |||
20030145038, | |||
20030146934, | |||
20030153338, | |||
20030154212, | |||
20030156146, | |||
20030157947, | |||
20030169262, | |||
20030177281, | |||
20030182431, | |||
20030187984, | |||
20030204605, | |||
20030208529, | |||
20030208559, | |||
20030210666, | |||
20030211845, | |||
20030217098, | |||
20030217142, | |||
20030223554, | |||
20030227487, | |||
20030227745, | |||
20030235308, | |||
20030236857, | |||
20030236981, | |||
20040002324, | |||
20040006630, | |||
20040015504, | |||
20040024795, | |||
20040024824, | |||
20040024892, | |||
20040027326, | |||
20040027375, | |||
20040027378, | |||
20040043770, | |||
20040049579, | |||
20040049599, | |||
20040051715, | |||
20040054719, | |||
20040054739, | |||
20040064445, | |||
20040064488, | |||
20040068579, | |||
20040068698, | |||
20040073476, | |||
20040073651, | |||
20040075675, | |||
20040075695, | |||
20040078814, | |||
20040080515, | |||
20040082346, | |||
20040098625, | |||
20040103147, | |||
20040107319, | |||
20040110497, | |||
20040120323, | |||
20040123095, | |||
20040123304, | |||
20040127214, | |||
20040128375, | |||
20040133626, | |||
20040141011, | |||
20040147248, | |||
20040147262, | |||
20040148375, | |||
20040158611, | |||
20040167966, | |||
20040170257, | |||
20040172481, | |||
20040176128, | |||
20040177369, | |||
20040179513, | |||
20040181550, | |||
20040184475, | |||
20040186902, | |||
20040189610, | |||
20040199497, | |||
20040199582, | |||
20040199663, | |||
20040205248, | |||
20040205330, | |||
20040209602, | |||
20040210639, | |||
20040219940, | |||
20040230619, | |||
20040233930, | |||
20040236792, | |||
20040242209, | |||
20040252816, | |||
20040255126, | |||
20040258231, | |||
20040259535, | |||
20040259537, | |||
20040260948, | |||
20040264396, | |||
20040266364, | |||
20040268148, | |||
20050002501, | |||
20050002508, | |||
20050002509, | |||
20050002510, | |||
20050010694, | |||
20050015432, | |||
20050021750, | |||
20050022000, | |||
20050022182, | |||
20050027591, | |||
20050027716, | |||
20050027869, | |||
20050033812, | |||
20050033926, | |||
20050037741, | |||
20050038707, | |||
20050038724, | |||
20050038863, | |||
20050041793, | |||
20050044144, | |||
20050055578, | |||
20050063544, | |||
20050071489, | |||
20050071674, | |||
20050073982, | |||
20050076136, | |||
20050076241, | |||
20050086540, | |||
20050094625, | |||
20050097225, | |||
20050097570, | |||
20050101307, | |||
20050102257, | |||
20050102328, | |||
20050102351, | |||
20050108427, | |||
20050117606, | |||
20050120082, | |||
20050120084, | |||
20050120181, | |||
20050122333, | |||
20050124332, | |||
20050138111, | |||
20050138176, | |||
20050144219, | |||
20050147130, | |||
20050154698, | |||
20050154796, | |||
20050154836, | |||
20050155027, | |||
20050164703, | |||
20050164721, | |||
20050165909, | |||
20050170776, | |||
20050183143, | |||
20050188038, | |||
20050193036, | |||
20050193096, | |||
20050198170, | |||
20050203966, | |||
20050210104, | |||
20050210125, | |||
20050222891, | |||
20050228812, | |||
20050232295, | |||
20050234860, | |||
20050235214, | |||
20050246139, | |||
20050248526, | |||
20050251555, | |||
20050254443, | |||
20050262220, | |||
20050273804, | |||
20050278307, | |||
20050278641, | |||
20050278647, | |||
20050288006, | |||
20060012672, | |||
20060020525, | |||
20060020580, | |||
20060020804, | |||
20060020947, | |||
20060021023, | |||
20060022048, | |||
20060026580, | |||
20060029062, | |||
20060029063, | |||
20060029064, | |||
20060031114, | |||
20060031300, | |||
20060031365, | |||
20060031428, | |||
20060031785, | |||
20060037071, | |||
20060046686, | |||
20060047844, | |||
20060048061, | |||
20060052091, | |||
20060052137, | |||
20060059495, | |||
20060063544, | |||
20060069686, | |||
20060069687, | |||
20060069715, | |||
20060069742, | |||
20060069746, | |||
20060073810, | |||
20060074951, | |||
20060075028, | |||
20060084410, | |||
20060085503, | |||
20060093026, | |||
20060093135, | |||
20060099969, | |||
20060099970, | |||
20060112177, | |||
20060123042, | |||
20060132495, | |||
20060141962, | |||
20060143464, | |||
20060149591, | |||
20060149843, | |||
20060149970, | |||
20060155822, | |||
20060161621, | |||
20060165226, | |||
20060167969, | |||
20060168043, | |||
20060168164, | |||
20060179410, | |||
20060188864, | |||
20060190428, | |||
20060190569, | |||
20060190984, | |||
20060192014, | |||
20060195570, | |||
20060209842, | |||
20060212531, | |||
20060224629, | |||
20060230394, | |||
20060240804, | |||
20060240805, | |||
20060242137, | |||
20060242210, | |||
20060242320, | |||
20060242607, | |||
20060252435, | |||
20060253456, | |||
20060253605, | |||
20060259923, | |||
20060265595, | |||
20060271884, | |||
20060277265, | |||
20060277271, | |||
20060294071, | |||
20060294223, | |||
20070005738, | |||
20070006317, | |||
20070011367, | |||
20070019610, | |||
20070022118, | |||
20070027775, | |||
20070027832, | |||
20070027886, | |||
20070027917, | |||
20070027920, | |||
20070027921, | |||
20070027930, | |||
20070033531, | |||
20070038567, | |||
20070038931, | |||
20070044041, | |||
20070049258, | |||
20070060196, | |||
20070061393, | |||
20070067147, | |||
20070067381, | |||
20070067424, | |||
20070070931, | |||
20070072617, | |||
20070078857, | |||
20070078964, | |||
20070088852, | |||
20070105627, | |||
20070111764, | |||
20070116223, | |||
20070118620, | |||
20070130108, | |||
20070130217, | |||
20070140193, | |||
20070147317, | |||
20070147411, | |||
20070150881, | |||
20070156824, | |||
20070156842, | |||
20070162514, | |||
20070167178, | |||
20070174433, | |||
20070175998, | |||
20070198698, | |||
20070220080, | |||
20070220099, | |||
20070233855, | |||
20070237318, | |||
20070245010, | |||
20070249365, | |||
20070250591, | |||
20070254631, | |||
20070255848, | |||
20070264993, | |||
20070267492, | |||
20070276925, | |||
20070276926, | |||
20070288469, | |||
20070290787, | |||
20070293207, | |||
20070293238, | |||
20070293958, | |||
20070294295, | |||
20070294763, | |||
20070296701, | |||
20070299918, | |||
20080001717, | |||
20080008095, | |||
20080009344, | |||
20080016236, | |||
20080032718, | |||
20080034031, | |||
20080037787, | |||
20080059308, | |||
20080059398, | |||
20080061142, | |||
20080068519, | |||
20080077506, | |||
20080077571, | |||
20080085719, | |||
20080085724, | |||
20080086379, | |||
20080091773, | |||
20080103877, | |||
20080104666, | |||
20080108298, | |||
20080114881, | |||
20080125225, | |||
20080130663, | |||
20080133326, | |||
20080133641, | |||
20080133708, | |||
20080134292, | |||
20080140665, | |||
20080151817, | |||
20080154870, | |||
20080155613, | |||
20080166999, | |||
20080167019, | |||
20080168145, | |||
20080183800, | |||
20080192820, | |||
20080198995, | |||
20080201362, | |||
20080201751, | |||
20080207182, | |||
20080209491, | |||
20080214148, | |||
20080216094, | |||
20080220797, | |||
20080232290, | |||
20080233983, | |||
20080242370, | |||
20080263170, | |||
20080270379, | |||
20080273498, | |||
20080281798, | |||
20080288659, | |||
20080298386, | |||
20080299956, | |||
20080301231, | |||
20080301300, | |||
20080313282, | |||
20090010204, | |||
20090010259, | |||
20090012841, | |||
20090016526, | |||
20090019485, | |||
20090019532, | |||
20090024794, | |||
20090031006, | |||
20090052372, | |||
20090054034, | |||
20090055353, | |||
20090059950, | |||
20090063647, | |||
20090075683, | |||
20090077263, | |||
20090077326, | |||
20090094317, | |||
20090100416, | |||
20090110179, | |||
20090119266, | |||
20090125523, | |||
20090144632, | |||
20090147008, | |||
20090149203, | |||
20090156178, | |||
20090157792, | |||
20090164433, | |||
20090164560, | |||
20090172565, | |||
20090181641, | |||
20090182500, | |||
20090187939, | |||
20090191903, | |||
20090193130, | |||
20090193338, | |||
20090215504, | |||
20090221326, | |||
20090228545, | |||
20090241180, | |||
20090248670, | |||
20090248696, | |||
20090248794, | |||
20090248878, | |||
20090252136, | |||
20090254589, | |||
20090254971, | |||
20090264138, | |||
20090282125, | |||
20090286531, | |||
20090287750, | |||
20090299817, | |||
20090307133, | |||
20090318171, | |||
20090323678, | |||
20090325565, | |||
20090327390, | |||
20100042691, | |||
20100049872, | |||
20100057924, | |||
20100069127, | |||
20100077035, | |||
20100077083, | |||
20100083255, | |||
20100087167, | |||
20100088722, | |||
20100093273, | |||
20100115050, | |||
20100118190, | |||
20100131593, | |||
20100131617, | |||
20100146107, | |||
20100149975, | |||
20100174735, | |||
20100174939, | |||
20100186011, | |||
20100207870, | |||
20100211651, | |||
20100214984, | |||
20100227594, | |||
20100228863, | |||
20100229096, | |||
20100238915, | |||
20100250706, | |||
20100250986, | |||
20100268757, | |||
20100274983, | |||
20100279662, | |||
20100293335, | |||
20100299223, | |||
20100313018, | |||
20100319054, | |||
20100322124, | |||
20100325306, | |||
20110028129, | |||
20110040718, | |||
20110065424, | |||
20110066646, | |||
20110099363, | |||
20110113109, | |||
20110119134, | |||
20110126060, | |||
20110138102, | |||
20110138402, | |||
20110153937, | |||
20110158239, | |||
20110165889, | |||
20110179138, | |||
20110179377, | |||
20110182220, | |||
20110184827, | |||
20110185355, | |||
20110190014, | |||
20110191474, | |||
20110201304, | |||
20110207436, | |||
20110208810, | |||
20110213800, | |||
20110213898, | |||
20110214182, | |||
20110238772, | |||
20110246950, | |||
20110252088, | |||
20110264622, | |||
20110264731, | |||
20110294463, | |||
20110294464, | |||
20110296050, | |||
20110296120, | |||
20110296415, | |||
20110302154, | |||
20120005276, | |||
20120008536, | |||
20120022980, | |||
20120023190, | |||
20120023226, | |||
20120023236, | |||
20120030280, | |||
20120054386, | |||
20120072910, | |||
20120077482, | |||
20120078996, | |||
20120096092, | |||
20120108225, | |||
20120110109, | |||
20120110110, | |||
20120110111, | |||
20120110112, | |||
20120110118, | |||
20120110171, | |||
20120110173, | |||
20120110174, | |||
20120110275, | |||
20120130973, | |||
20120131095, | |||
20120131184, | |||
20120135726, | |||
20120140750, | |||
20120149352, | |||
20120151044, | |||
20120157170, | |||
20120158837, | |||
20120158908, | |||
20120170496, | |||
20120173616, | |||
20120174220, | |||
20120176968, | |||
20120178414, | |||
20120179801, | |||
20120185597, | |||
20120185918, | |||
20120210121, | |||
20120226767, | |||
20120227059, | |||
EP772327, | |||
EP1278390, | |||
EP1422899, | |||
EP1462975, | |||
EP1466261, | |||
EP1466435, | |||
EP1482702, | |||
EP1815634, | |||
EP1815652, | |||
EP1817883, | |||
FI117152, | |||
FI118288, | |||
FI119581, | |||
JP10336372, | |||
JP2001218185, | |||
JP2001350718, | |||
JP2001356973, | |||
JP2005515664, | |||
JP2009207177, | |||
JP4154233, | |||
JP4386732, | |||
KR100765238, | |||
KR20010018568, | |||
KR20060068186, | |||
KR20070071858, | |||
KR20070102091, | |||
KR20070117874, | |||
KR20090077515, | |||
KR20100064605, | |||
WO3098890, | |||
WO2004045171, | |||
WO9824257, | |||
WO130130, | |||
WO3007570, | |||
WO3058483, | |||
WO3058879, | |||
WO3065701, | |||
WO3098890, | |||
WO2004017591, | |||
WO2004045171, | |||
WO2005015925, | |||
WO2005020108, | |||
WO2006045005, | |||
WO2006045102, | |||
WO2006053952, | |||
WO2006053954, | |||
WO2006058967, | |||
WO2007015725, | |||
WO2007015726, | |||
WO2007149526, | |||
WO2007149540, | |||
WO2008061042, | |||
WO2011126889, | |||
WO2012018430, | |||
WO2012018431, | |||
WO2012018477, | |||
WO2012018479, | |||
WO2012018556, | |||
WO2012024030, | |||
WO2012060995, | |||
WO2012060996, | |||
WO2012060997, | |||
WO2012061430, | |||
WO2012061433, | |||
WO2012061437, | |||
WO2012071283, | |||
WO2012071384, | |||
WO2012094675, | |||
WO9741661, | |||
WO9824257, | |||
WO9858322, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 19 2005 | NANJUNDESWARAN, SRIDHAR | Seven Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029098 | /0619 | |
Oct 20 2005 | SUTARIA, JAY | Seven Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029098 | /0619 | |
Jan 10 2006 | FIATAL, TREVOR | Seven Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029098 | /0619 | |
Jan 10 2006 | BAVADEKAR, SHAILESH | Seven Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 029098 | /0619 | |
Mar 16 2012 | Seven Networks, Inc. | (assignment on the face of the patent) | / | |||
Jul 14 2015 | Seven Networks, Inc | Seven Networks, LLC | ENTITY CONVERSION | 036485 | /0059 |
Date | Maintenance Fee Events |
Sep 29 2015 | STOL: Pat Hldr no Longer Claims Small Ent Stat |
Sep 18 2017 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Nov 01 2021 | REM: Maintenance Fee Reminder Mailed. |
Apr 18 2022 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Jan 20 2018 | 4 years fee payment window open |
Jul 20 2018 | 6 months grace period start (w surcharge) |
Jan 20 2019 | patent expiry (for year 4) |
Jan 20 2021 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 20 2022 | 8 years fee payment window open |
Jul 20 2022 | 6 months grace period start (w surcharge) |
Jan 20 2023 | patent expiry (for year 8) |
Jan 20 2025 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 20 2026 | 12 years fee payment window open |
Jul 20 2026 | 6 months grace period start (w surcharge) |
Jan 20 2027 | patent expiry (for year 12) |
Jan 20 2029 | 2 years to revive unintentionally abandoned end. (for year 12) |