Patents by Inventor Erwin P. Comer

Erwin P. Comer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7367055
    Abstract: Using protocol cause codes, a mobile telecommunications network (10) may be pre-configured with a rule set (63) to report the results of the cause codes to an automated security event processing system (50) for security event detection and containment. The cause code information sent from the network nodes (30, 40) to the automated security event processing system will allow for security event correlation across network nodes for the determination and resolution of security breaches.
    Type: Grant
    Filed: June 11, 2002
    Date of Patent: April 29, 2008
    Assignee: Motorola, Inc.
    Inventors: Erwin P. Comer, Mary M. Madine
  • Patent number: 7187759
    Abstract: A voice mail method screens calls made by a calling subscriber (10) to a called subscriber (20) which is unavailable (or otherwise screening calls). The screening method determines (110) whether the called subscriber (20) has a voice mail screening feature. An internet protocol multi-media system (50) receives the call from the called subscriber (114). The internet protocol multi-media system then transfers call control to a voicemail screening server which plays subscriber (20) the beginning of the voicemail message being left by subscriber (10) and offers to-route the call back to the called subscriber (20). The called subscriber then indicates via a short code whether the called subscriber will accept the call (124).
    Type: Grant
    Filed: August 6, 2004
    Date of Patent: March 6, 2007
    Inventors: Pramodkumar Patel, Erwin P. Comer
  • Patent number: 7116786
    Abstract: A method for interception of encrypted end-to-end (12, 14) communication data stores encryption keys (42, 44) of secure communication users. Upon intercept activation (47) a decrypt function (20) provides plain text data to an authorized appropriate law agency (30).
    Type: Grant
    Filed: September 10, 2001
    Date of Patent: October 3, 2006
    Assignee: Motorola, Inc.
    Inventors: Bernerd R. McKibben, Erwin P. Comer, William Turner Scott
  • Publication number: 20030229803
    Abstract: Using protocol cause codes, a mobile telecommunications network (10) may be pre-configured with a rule set (63) to report the results of the cause codes to an automated security event processing system (50) for security event detection and containment. The cause code information sent from the network nodes (30, 40) to the automated security event processing system will allow for security event correlation across network nodes for the determination and resolution of security breaches.
    Type: Application
    Filed: June 11, 2002
    Publication date: December 11, 2003
    Inventors: Erwin P. Comer, Mary M. Madine
  • Publication number: 20030051158
    Abstract: A method for interception of encrypted end-to-end (12, 14) communication data stores encryption keys (42, 44) of secure communication users. Upon intercept activation (47) a decrypt function (20) provides plain text data to an authorized appropriate law agency (30).
    Type: Application
    Filed: September 10, 2001
    Publication date: March 13, 2003
    Inventors: Bernerd R. McKibben, Erwin P. Comer, William Turner Scott
  • Publication number: 20020138554
    Abstract: A method of verifying the integrity of software resident on a remote network appliance is disclosed. The method includes providing a secure hash algorithm coupled with a seed value that may be employed by a network host to verify the integrity of the software associated with one or more network appliances.
    Type: Application
    Filed: March 26, 2001
    Publication date: September 26, 2002
    Applicant: Motorola, Inc.
    Inventors: Ronald G. Feigen, Richard A. Perona, James T. Lynn, Erwin P. Comer
  • Publication number: 20020056001
    Abstract: User (113) requests multimedia services from a visited network (129). The user's home network (101) dynamically establishes a secure call control link between two prior negotiated call stat control function units (305) and (315).
    Type: Application
    Filed: August 1, 2001
    Publication date: May 9, 2002
    Inventors: Stephen D. Magee, Erwin P. Comer, Jin Yang
  • Publication number: 20010052081
    Abstract: A communication network (10) utilized for providing communications between a first party and a second party includes a surveillance server (26) within a core network (10) to provide communication surveillance capability. The core network (10) may be a packet data network, and the surveillance server (26) is operable responsive to trigger information to establish communications surveillance. Communication surveillance may be established by creating duplicate bearer packets of those data packets carrying the communicated data between the parties, creating duplicate control packets of those data packets carrying in-band or out-of-band call control information between the parties and within the packet data network, and/or various combinations thereof. The duplicate bearer packets and the duplicate control packets are routed to appropriate authorized law enforcement agencies for providing surveillance.
    Type: Application
    Filed: April 5, 2001
    Publication date: December 13, 2001
    Inventors: Bernard R. McKibben, Erwin P. Comer