At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Control tag with environmentally selected conditional response
Systems (100) and methods (300) for selective device responsiveness using a plurality of control tags (132) affixed to a plurality of objects (102). The methods...
Programmable security system and method for protecting merchandise
A programmable security system and method for protecting an item of merchandise includes a programming station, a programmable key and a security system. The...
Door and window contact systems and methods that include time of flight
Systems and methods that address the gap, security, and robustness limitations of known door and window contact systems and methods without increasing the...
Home security system using wireless communication
The invention relates to a method for monitoring the security of an area, a corresponding security monitor device and a wireless access device. The method...
Communicating information to a user
A method and device for providing information to a user are provided. The method includes providing at least one user indicator device in operable communication...
Solar light-emitting diode lamp wireless sensor device for monitoring
structure safety in real-time
A long time monitoring and self-powered solar light-emitting diode (LED) lamp wireless sensor device, capable of monitoring bridge, building or structure in...
Systems and methods for site-wide jackpots
Systems, methods, and articles of manufacture provide for site-wide and/or community jackpots.
Skill-based bonusing interleaved wagering system
A skill-based bonusing interleaved wagering system is disclosed, including an interactive controller configured to: communicate application telemetry; receive a...
Portable intermediary trusted device
In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may include a position sensor configured to acquire position...
Remote control button actuation module, system, and method
An actuation system used to actuate one or more buttons on a remote control device, such as a key fob, based upon commands that are generated from a mobile...
System and method of transmitting data from an aircraft
A system for transmitting aircraft data from an aircraft includes a Data Acquisition Unit (DAU) that records aircraft data. A PC card is interfaced to the DAU...
Busyness defection and notification method and system
This disclosure provides a video-based method and system for busyness detection and notification. Specifically, according to an exemplary embodiment, multiple...
System and method of monitoring and confirming medication dosage
A medication monitoring system including a patient information unit having a processor, a memory and a patient monitoring unit and a program executing in the...
Second screen recipes function
Systems for, and methods of, displaying video information comprising: a second screen device obtaining current play position data of a video being played on a...
Methods and systems of four-valued Monte Carlo simulation for financial
Automatic trading environments with their high degree of automation have become the backbone of modern financial markets. The ability to process orders and...
System and method for dynamically changing the content of an internet web
A host Web page includes an evolving interactive dialog box wherein an Internet user may enter user data to be processed. When the user completes entering user...
Method and apparatus for controlling charging of a service
A method and apparatus for controlling charging of a service in a communication network comprising in an Online Charging System OCS receiving a request message...
Devices, systems and methods for identifying and/or billing an individual
in a vehicle
Devices, systems, and methods are disclosed for identifying a driver versus a passenger within a smart vehicle. This involves a determination of the relative...
Controlling a crowd of multiple mobile station devices
A method and apparatus of communicating with multiple mobile station devices in a concerted effort is disclosed. According to one example method of operation...
Automated system for adapting market data and evaluating performance in
A system includes a remotely-located server comprising a metric server adapter, a metrics application, and a communication application. The metric server...
Systems and methods to facilitate selling of products and services
The system of the present invention provides systems and methods for selling goods and services on, over, through, and in conjunction with the Internet. The...
One gesture, one blink, and one-touch payment and buying using haptic
control via messaging and calling...
Methods and systems for messaging, calling, and one blink, one-touch, and one gesture payments and buying via mobile and wearable devices are disclosed. An...
System and method for registering financial accounts
A session to enroll customers to make payments has two stages, a first stage completed on the telephone or on a merchant or debt collector website, and a second...
Context-informed summarization of communications
A method and computer program product for context-informed summarization is described. A method may comprise determining, via a computing device, a context of a...
System and method for community centric resource sharing based on a
publishing subscription model
The invention provides a Web service which enables a publisher to share his digital resources such as an address card or a calendar with a number of subscribers...
Method and apparatus for network controlled ticket access
The system provides a method and apparatus for providing controlled access to events, premises, transportation, and the like. In one embodiment, the system...
Trust based moderation
A network device, system, and method are directed towards detecting trusted reporters and/or abusive users in an online community using reputation event inputs,...
Methods and systems of four-valued simulation
A system for the dynamic encoding in a semantic network of both syntactic and semantic information into a common four valued logical notation. The encoding of...
Antenna device and communication terminal device
An antenna device includes a planar conductor, a coiled antenna element, and a feed coil. The feed coil includes a coil conductor wound around a magnetic core....
Method and system for power management of asset tracking system for
There is system for power management for radio frequency identification (RFID) tag asset tracking systems where the tag has a transceiver, configured to control...
Techniques for checking into a retail establishment
Techniques for checking into a retail establishment are provided. A retailer provides a substrate having a magnetic-field encoded tag. A consumer waves the...
Emotion recognition in video conferencing
Methods and systems for videoconferencing include recognition of emotions related to one videoconference participant such as a customer. This ultimately enables...
Systems and methods for serving pixel mapped content to merchandising
Described herein are systems and methods configured for serving pixel mapped content to one or more merchandising communication systems. A merchandising...
Host device for obtaining operating instructions for a barcode reader from
a remote server
A host device is configured to (i) establish a point-to-point connection with a barcode reader via a point-to-point communication interface, (ii) determine that...
In one aspect of the present disclosure, a method is disclosed. The method involves: a reader detecting an eye-mountable device within a wireless communication...
The present invention provides a security module having a communication interface being capable of operating according to any from a selection from a plurality...
Decodable indicia reading terminal with indicia analysis functionality
A decodable indicia reading terminal can comprise a multiple pixel image sensor, an imaging lens configured to focus an image of decodable indicia on the image...
Method for mitigating the unauthorized use of a device
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device...
Trusted computing host
A trusted computing host is described that provides various security computations and other functions in a distributed multitenant and/or virtualized computing...
Methods, systems and computer program product for providing verification
code recovery and remote authentication
The described embodiments relate to methods, systems, and products for providing verification code recovery and remote authentication for a plurality of devices...
Security policy application through data tagging
Techniques are described for applying data usage policies through data tagging. A metadata tag may be applied to data to indicate a type of the data. In some...
Secured file system management
Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of...
Method and system for analyzing integrity of encrypted data in electronic
control system for motor vehicle
A method for improving the functional security and increasing the availability of an electronic control system, particularly a motor vehicle control system,...
Malware detection system and method for mobile platforms
In one example, a management server is configured to provide malware protection for one or more client mobile platforms in communication with the management...
Authenticating activities of accounts
A system, a medium, and a method involve a communication interface of a server device that receives first activity data associated with a first activity of an...
System and method for securely retrieving and playing digital media
A system for securely downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass...
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that provide contextual services are provided. Embodiments...
Method for maintaining common data across multiple platforms
Systems and methods are described for maintaining a user's common data across multiple platforms. The common data is information about the user and graphical...
System and method for distributed SQL join processing in shared-nothing
relational database clusters using self...
System and method embodiments are provided for improving the performance of query processing in a massively parallel processing (MPP) database system by pushing...
Monitoring an application environment
In various embodiments, a system and related method for organizing transactional data from an application environment is disclosed. In some embodiments, a...