Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Warranty management system and methods of performing the same 2018-5-04 2018-11-08
Decision-making system and method based on supervised learning 2018-4-13 2023-6-20 2023-6-20
Synchronizing a source, response and comment presentation 2017-1-19 2017-5-11
Automated document analysis comprising a user interface based on content types 2016-8-27 2019-8-20 2019-8-20
Network monitoring system with remote access 2016-6-06 2017-12-07
Membranous waterproof juncture 2016-6-06 2017-11-07 2017-11-07
Method of manufacturing and installation of prefabricated shower bench and … 2015-10-26 2016-2-11
Table attachment apparatus 2015-9-28 2019-3-26 2019-3-26
Shower enclosure design and assembly methods using prefabricated shower benches 2015-6-08 2016-1-21
Measuring, categorizing, and/or mitigating malware distribution paths 2015-3-25 2018-3-27 2018-3-27
Method and system of assessing and managing risk associated with compromised … 2015-2-06 2015-8-06
Preventing unauthorized access to an application server 2014-11-12 2016-2-18
User interface operation based on similar spelling of tokens in text 2014-8-15 2018-8-28 2018-8-28
User Interface Operation Based on Token Frequency of Use in Text 2014-8-15 2016-2-18
Drain Wall for a Prefabricated Shower Module 2014-7-10 2015-1-01
Method and system for network-based detecting of malware from behavioral … 2014-6-27 2018-4-17 2018-4-17
Presenting a source presentation 2014-6-25 2017-3-07 2017-3-07
Systems and methods for traffic classification 2014-6-16 2017-2-14 2017-2-14
Dynamically optimized content display 2014-3-03 2019-3-12 2019-3-12
System and method to capture an image over the web 2014-2-13 2015-8-13
Method and system for detecting malicious domain names at an upper dns … 2013-12-04 2014-6-05
Method and system for identifying job candidates 2013-11-29 2014-3-27
Molding tools with interchangeable inserts to form a variety of parts with … 2013-10-18 2017-8-24
Molding tools with interchangeable inserts to form a variety of parts with … 2013-10-18 2014-6-26
Method and system for detecting malware 2013-9-30 2016-12-20 2016-12-20
Historical analysis to identify malicious activity 2013-8-30 2017-6-13 2017-6-13
Automation discovery to identify malicious activity 2013-8-30 2014-3-13
Data mining to identify malicious activity 2013-8-30 2018-2-13 2018-2-13
Traffic simulation to identify malicious activity 2013-8-30 2018-9-25 2018-9-25
Methods and systems for network flow analysis 2013-8-26 2020-1-28 2020-1-28
Enterprise grade metadata and data mapping management application 2013-2-11 2015-10-13 2015-10-13
Methods of manufacturing prefabricated shower pans with standard trench drains 2013-1-28 2014-2-06
Method and system for detecting DGA-based malware 2013-1-24 2018-3-20 2018-3-20
Compression drain with adjustable-height grate 2012-12-12 2014-6-12
Shower enclosure design and assembly methods using prefabricated shower benches 2012-11-12 2013-5-23
Method and system for source tracking 2012-8-30 2018-10-16 2018-10-16
Method and apparatus for analyzing a document 2012-7-31 2014-2-06
Method and apparatus for analyzing abbreviations in a document 2012-6-25 2013-7-04
System and method for providing automated computer security compromise as a … 2012-6-05 2014-8-21
Client Specific Interactions with Enterprise Software Systems 2012-3-26 2013-9-26
Method and apparatus for analyzing a document 2012-1-04 2013-7-04
Method and system for determining whether domain names are legitimate or … 2011-8-09 2012-2-16
Method and system for channel optimization 2011-6-24 2017-11-07 2017-11-07
Real-time application of filters based on image attributes 2011-6-14 2012-12-20
System and method for electronic lead verification 2011-5-12 2012-11-15
Establishing and enforcing security and privacy policies in web-based … 2010-10-21 2012-3-27 2012-3-27
System and method for probabilistic attack planning 2010-9-08 2013-7-16 2013-7-16
System and method of rendering interior surfaces of 3D volumes to be viewed … 2010-8-30 2014-1-21 2014-1-21
System and method for extending automated penetration testing to develop an … 2010-8-05 2013-7-16 2013-7-16
System and method for dentition specific image enhancement 2010-5-07 2011-11-10
Handicapped accessible shower enclosure with ramp and/or floor pan 2010-2-17 2011-8-18
Third party acquisition of images at the direction of an independent imaging … 2009-12-16 2010-5-20
Method and system for automatic intra-oral sensor locating for image … 2009-8-28 2010-11-30 2010-11-30
Methods of populating a third-party document with digital information content 2009-8-13 2009-12-24
Method and system for detecting malicious and/or botnet-related domain names 2009-8-10 2018-7-17 2018-7-17
Direct connection single user-interface control of multiple computers and … 2009-6-22 2012-3-13 2012-3-13
System and method to adjust medical imaging equipment 2009-4-22 2009-9-24
Apparatus and method for virtual flaw removal from X-ray sensitive plates 2009-4-16 2012-9-11 2012-9-11
System and method for scoring groups 2009-2-13 2010-8-19
System and method for generating sales lead information and user interface for … 2009-2-13 2010-8-19
Automatic spatial adjustment of a pan-oral x-ray source in response to the … 2008-12-23 2010-6-24
Policy enforcement using ESSO 2008-12-10 2013-12-03 2013-12-03
Identity map creation 2008-10-03 2013-9-17 2013-9-17
System and method for preparing spatially related medical digital image data … 2008-8-07 2010-2-11
Apparatus and methods for full-mouth intraoral image acquisition 2008-7-24 2010-1-28
System and method for simulating computer network attacks 2008-6-26 2013-1-15 2013-1-15
System and method for providing network penetration testing 2008-4-14 2008-10-16
System and Method for Providing Application Penetration Testing 2008-3-06 2008-10-23
Auto-distribution of scanned digital images based on standardized identifiers 2008-2-22 2009-8-27
Methods of populating a third-party document with digital information content 2007-7-16 2012-1-31 2012-1-31
Automated computer system security compromise 2007-4-16 2007-8-30
Prefabricated shower pan having varying sidewall heights and method of … 2007-3-17 2008-9-18
Method for manufacturing a prefabricated modular shower curb and associated … 2007-3-17 2008-9-18
Drain wall for a prefabricated shower module 2007-3-17 2012-5-22 2012-5-22
Method for manufacturing a prefabricated shower module 2007-3-17 2008-9-18
System and method for sensor device manufacturer oriented calibration 2005-8-15 2007-2-15
System and method for the automatic generation of a query to a DICOM server 2005-5-10 2006-11-16
System and method for name grabbing via optical character reading 2005-3-11 2006-9-14
System and method of capturing images 2005-3-11 2013-5-21 2013-5-21
System and method for generating SQL using templates 2004-7-09 2005-6-02
Distributed computing using syscall proxying 2003-7-16 2007-10-02 2007-10-02
Security framework for protecting rights in computer software 2003-4-15 2003-11-27
Prefabricated shower pan with integrally molded curb reinforcements 2002-10-30 2003-11-11 2003-11-11
System and method for opening and activating applications, windows or data sets … 2001-2-15 2002-8-15