Patents by Inventor Philip N. Ballai

Philip N. Ballai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8170611
    Abstract: Described is a method and system which includes an arrangement including an internal wireless communication antenna and a wireless communication device couplable to one of an external wireless communication antenna and the arrangement. When the arrangement is attached to the device, the device is capable of unitizing either first or second wireless channels. When the arrangement is not attached to the device, the device utilizes only the second channel.
    Type: Grant
    Filed: September 4, 2002
    Date of Patent: May 1, 2012
    Assignee: Symbol Technologies, Inc.
    Inventor: Philip N. Ballai
  • Patent number: 7676218
    Abstract: Described are a system and method for detecting an unauthorized access point accessing a communication network. An authorized access point and/or an authorized mobile unit detects a beacon generated by a transmitting access point. The beacon includes identification information of the transmitting access point. A computing arrangement verifies the identification information of the transmitting access point with a preexisting database of the communication network. The preexisting database includes data corresponding to identification information of a plurality of authorized access points. The computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
    Type: Grant
    Filed: May 3, 2006
    Date of Patent: March 9, 2010
    Assignee: Symbol Technologies, Inc.
    Inventor: Philip N. Ballai
  • Patent number: 7068999
    Abstract: Described are a system and method for detecting an unauthorized access point accessing a communication network. An authorized access point and/or an authorized mobile unit detects a beacon generated by a transmitting access point. The beacon includes identification information of the transmitting access point. A computing arrangement verifies the identification information of the transmitting access point with a preexisting database of the communication network. The preexisting database includes data corresponding to identification information of a plurality of authorized access points. The computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
    Type: Grant
    Filed: August 2, 2002
    Date of Patent: June 27, 2006
    Assignee: Symbol Technologies, Inc.
    Inventor: Philip N. Ballai
  • Publication number: 20040034861
    Abstract: Described is a system and method for automatically updating a firmware program. During an initialization process of a portable card (e.g., a wireless radio card), a first version of the firmware program is determined. The first version is a version which is currently stored in a non-volatile memory of the card that is connected with a computing device. The first version is compared with a second version of the firmware program. The first version is automatically updated with the second version in the non-volatile memory if the second version is a subsequent verison of the firmware program. After the firmware is updated, the card is activated using the second version.
    Type: Application
    Filed: August 19, 2002
    Publication date: February 19, 2004
    Inventor: Philip N. Ballai
  • Publication number: 20040023640
    Abstract: Described are a system and method for detecting an unauthorized access point accessing a communication network. An authorized access point and/or an authorized mobile unit detects a beacon generated by a transmitting access point. The beacon includes identification information of the transmitting access point. A computing arrangement verifies the identification information of the transmitting access point with a preexisting database of the communication network. The preexisting database includes data corresponding to identification information of a plurality of authorized access points. The computing arrangement initiates a tracking procedure to determine a location of the unauthorized access point where the verification of the transmitting access point identification information with the preexisting database fails.
    Type: Application
    Filed: August 2, 2002
    Publication date: February 5, 2004
    Inventor: Philip N. Ballai