FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Third Party topics
Third Party
Cloud Computing
Data Storage
Search Engine
Internet Of Things
Database Server
Data Processing
Documentation
Information Technology
Digital Content
Social Media
Content Provider
User Interface
User Input

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Third Party patents



      
           
This page is updated frequently with new Third Party-related patent applications. Subscribe to the Third Party RSS feed to automatically get the update: related Third RSS feeds. RSS updates for this page: Third Party RSS RSS


Method and device for ensuring information integrity and non-repudiation over time

Data acquisition pertaining to connectivity of client applications of a service provider network

Facilitated third-party communication

Date/App# patent app List of recent Third Party-related patents
09/04/14
20140250538
 Distinguish valid users from bots, ocrs and third party solvers when presenting captcha patent thumbnailDistinguish valid users from bots, ocrs and third party solvers when presenting captcha
Embodiments of the present invention relate to a method of providing an automated public turing test to a client display system. The method includes providing an image having a plurality of random characters, as well as providing a browser code to the client, whereby the browser code is adapted to restrict display of the image to only a predetermined portion of the image.
09/04/14
20140250298
 Method and device for ensuring information integrity and non-repudiation over time patent thumbnailMethod and device for ensuring information integrity and non-repudiation over time
The present invention relates to a method and a device for ensuring information integrity and non-repudiation over time. At least one example embodiment provides a mechanism for secure distribution of information, which information relates to an instance in time when usage of cryptographic key pairs associated with a certain brand identity commenced, as well as when the key pairs ceased to be used, i.e.
09/04/14
20140250229
 Data acquisition pertaining to connectivity of client applications of a service provider network patent thumbnailData acquisition pertaining to connectivity of client applications of a service provider network
Providing for external control of data network client resources for application-based client network access is described herein. By way of example, the external control can be implemented by a third party service provider in conjunction with delivery of content to the client devices.
09/04/14
20140250186
 Facilitated third-party communication patent thumbnailFacilitated third-party communication
In various embodiments, systems, methods, computer-readable media, and apparatuses for facilitation of communication between recipients and third-parties. A recipient, such, for example, a physician may request and then be facilitated in engaging in communication with a selected third party, such as a medical specialist.
09/04/14
20140250147
 Generating search results containing state links to applications patent thumbnailGenerating search results containing state links to applications
A method for generating search results containing state links to applications. The method includes receiving a search query from a remote computing device, generating a state link to a state of a native application based on the search query and providing the state link to the remote computing device, all by a processing device.
09/04/14
20140250106
 Generating search results containing state links to applications patent thumbnailGenerating search results containing state links to applications
A disclosure provides techniques for generating search results containing state links to applications. A method includes receiving a query containing one or more query parameters from a remote computing device and identifying a set of third party applications corresponding to the one or more query parameters.
09/04/14
20140249832
 Rems management tool patent thumbnailRems management tool
The various technologies presented herein relate to assisting a prescriber in obtaining and maintaining risk evaluation and mitigation strategy (rems) compliance. A centralized approach is presented for obtaining rems compliance data from a drug manufacturer, federal regulator, etc., and based on identifying one or more rems medications associated with a prescriber, compliance of the prescriber with regard to the rems compliance data for the one or more rems medications can be determined.
09/04/14
20140248851
 Providing network access patent thumbnailProviding network access
A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device.
09/04/14
20140247199
 Providing augmented reality based on third party information patent thumbnailProviding augmented reality based on third party information
An apparatus and method for providing augmented or mixed reality environments based on other user or third party information, such as from a profile, is disclosed. Also, an apparatus and method for providing a transparent display device with adaptive transparency is disclosed.
08/28/14
20140245396
 System and method for integrating two-factor authentication in a device patent thumbnailSystem and method for integrating two-factor authentication in a device
A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider.. .
08/28/14
20140245340
Systems and methods for third-party aggregated video ratings
A computer implemented method for providing a third-party video content rating unit to a client device, is disclosed. A web browser running on the client device requests video content from a affiliate video content server.
08/28/14
20140245253
Third party application scriptability
A system and method for allowing third-party script developers to create secure scripts that can safely be incorporated into software applications is disclosed. The system may provide the flow and mechanisms for enabling a client/server secure scripting environment to be added to a hosted software application development environment so that third-party scripts can be added to software applications without application developers having to be concerned about protecting their applications from malicious scripts.
08/28/14
20140244514
Methods and arrangements for smartphone payments and transactions
The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors.
08/28/14
20140244511
Online challenge-response
Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer.
08/28/14
20140244470
Triggered bond or debt structure swap
Disclosed herein is a method that includes providing a contract between a first party and a second party, the contract including: a right of the first party, upon the occurrence of a credit downgrade of a first debt structure, to exercise a put option to receive cash in exchange for the first debt structure from at least one of the second party and a third party. The method further includes determining, by a computer system, that the credit downgrade of the first debt structure occurred.
08/28/14
20140244317
Computerized system and method for pre-filling of insurance data using third party sources
Systems and methods are disclosed herein for processing data in connection with insurance information submissions. The system may be configured to receive entity data relating to an entity for which insurance coverage is sought, and query an interface of a third-party platform based on the entity data.
08/28/14
20140244308
Hipaa-compliant third party access to electronic medical records
Methods, computer systems, and computer storage media are provided for providing a third-party user hipaa-compliant access to an electronic medical record system at a clinical site. A request for a clinical study participant list is received from the third-party user, and it is determined that the third-party user has viewing and access rights with respect to the clinical study participant list.
08/28/14
20140243046
Provisioning user attributes for use with mobile computing device
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
08/28/14
20140242905
Provisioning user attributes for use with mobile computing device
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
08/28/14
20140241523
Installable secret functions for a peripheral
There is provided a pluggable secure device identity module (sdim) attached to a peripheral where the sdim includes one or more secret functions provided by a third party that are used by the peripheral to provide additional security features or functions that can only be authenticated by the third party. The peripheral is attached to a computer and a secure provisioning manifest is used to authenticate and communicate with the peripheral.
08/28/14
20140241517
Dynamically overriding alert suppressions based on prior actions
A suppression override engine on a user device may be configured to detect communication alert suppressions. An incoming communication from a third party may be detected.
08/28/14
20140241207
Method and apparatus for discovering network node
A method and an apparatus for discovering a node in a wireless self-organized network are disclosed. The method comprises the steps of determining, by nodes in the network, a unified node discovery channel based on unified information provided by a trusted third party; and finding the node based on the unified node discovery channel.
08/21/14
20140237496
Audience segment validation device and method
In one embodiment, a non-transitory computer-readable medium contains computer-executable instructions that, upon execution, result in the implementation of operations comprising: receiving from a third party data corresponding to a first collection of users, each user having first data associating the user to a first audience segment; acquiring or creating audience segment validation data using an audience segment validation method on the first collection of users; and transferring or presenting the audience segment validation data in a form of a collection of data or a report. The collection of data or the report may be transferred or presented to an advertiser, an advertising network, or an advertising agency.
08/21/14
20140237234
Enhanced system security
Methods and systems for maintaining the confidentiality of data provided by an organization for storage on a third party database system are provided. The data can be encrypted on an internal network of the organization and sent to the third party database system for storage.
08/21/14
20140236900
Systems and methods for performing replication copy storage operations
A system and method are provided for performing storage operations relating to a first secondary copy of electronic data. A storage policy or storage preferences may dictate that a replication copy should be used in storage operations performed to a particular client, sub-client, data, media or other item.
08/21/14
20140236833
Transaction method based on the genetic identity of an individual and tools related thereof
The current invention relates to a method for establishing a transaction between an individual and a third party, based on the genetic identity of an individual, characterized in that said individual allows third party to access and analyze only a subset of said genetic identity, required for the offer and establishment of the transaction. In a second aspect, the invention discloses tools for the analysis of the genetic identity of individuals..
08/21/14
20140236821
Method and system for the transmission of authenticated authorization requests
A method for verifying the source of an authorization request includes: storing an integrated circuit card (icc) master key; receiving an authorization request for a transaction, wherein the request includes an icc dynamic number, and the icc dynamic number is extracted from signed data, based on the icc master key, generated by a payment card during combined data authentication (cda); verifying the authenticity of the icc dynamic number using the stored icc master key; and transmitting the authorization request to a third party. A method for transmitting an authentic authorization request includes: storing payment card data, the data including an icc master key associated with the payment card; authenticating the card data using cda to generate signed data; extracting, from the signed data, an icc dynamic number based on the icc master key; and transmitting an authorization request for a transaction, the request including the extracted icc dynamic number..
08/21/14
20140236818
Integrated bill presentment and payment system and method of operating the same
An integrated bill presentment and payment system and an associated method are disclosed which can accomplish the entire process of bill presentment and payment directly with billers, customers, and their respective financial institutions, but which are also capable of interfacing with independent biller service providers, independent customer service providers, independent consolidators, and/or independent payment providers. The integrated bill presentment and payment system and method of the present invention can link directly to billers and customers, and can also access and distribute billing information from third party biller service providers or consolidators and participate in the distribution of the billing information to customers through third party customer service providers and consolidators.
08/21/14
20140236817
Bar coded monetary transaction system and method
A monetary transaction system allowing a biller to generate an invoice for a customer with a bar code comprising data identifying the customer and the biller, and a scanning apparatus for use by a third party configured both to scan the bar code and, based on the identifying data, to effect payment to the biller in a predetermined or customer-specified amount.. .
08/21/14
20140236706
System and method for measuring advertising effectiveness
In some embodiments, a method defines a test group from a population of consumers that have been exposed to a communication associated with a promoted entity. The test group includes a (1) retailer profile, and (2) a first purchase amount associated with the promoted entity.
08/21/14
20140236695
Transaction log for loyalty based offers and awards
Financial transactions are tracked and a communication thread related to a financial transaction is generated. A reward stimulus is offered as part of and related to the communication thread.
08/21/14
20140236672
Systems and methods to provide real-time offers via a cooperative database
In one aspect, a computing apparatus is configured to: store transaction data recording transactions processed by a transaction handler; organize third party data according to community, where the third party data includes first data received from a first plurality of entities of a first community and second data received from a second plurality of entities of a second community; and responsive to a request from a merchant in the second community, present an offer of the merchant in the second community to users identified via the transaction data and the first data received from the first plurality of entities of the first community. In one embodiment, the first data provides permission from the merchant in the first community to allow the merchant in the second community to use intelligence information of the first community to identify users for targeting offers from the merchant in the second community..
08/21/14
20140236632
Liability insurer and health plan data exchange
A data information exchange, which accesses data from liability insurers and health plans, manages the data and allows health plans to identify when their plan participants are third party claimants in injury claims. In another aspect, subrogation entities access the data information exchange in order to perform subrogation operations for the health plans, relating to the health plan's participants.
08/21/14
20140235276
Personally attended service notification based on temporal and spatial proximity
A computer system may notify a user about personally attended services satisfying temporal-spatial criteria. The computer system may use a user location and/or information on already scheduled events to determine whether a personally attended service satisfies the temporal-spatial criteria.
08/21/14
20140234952
Diagnostic apparatus
There is described a diagnostic apparatus (1) for analysing a blood sample, the apparatus comprising a luminometer (9) for generating a “luminescence curve” and white blood cell counters (5,7) for determining a lymphocyte count and a neutrophil count, and processing means (10) to determine a physical condition of the subject on the basis of the “luminescence curve” and the white blood cell counts. A diagnostic method is also disclosed, for determining the physical condition of a subject on the basis of the blood test data.
08/21/14
20140233728
Method for secure symbol comparison
A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm on the encrypted data can be decrypted to a result which is equivalent to the result of running the algorithm on the original unencrypted data.
08/14/14
20140229898
Browser-based application management
Systems and methods are provided for managing multiple software applications. A browser-based application interface portal provides users a single, unified portal for accessing software applications running on different operating systems, hosted servers, and third party servers, as well as web applications.
08/14/14
20140229821
Third party application communication api
A device for a website building system. The device includes a page composer to create a page containing website instances of at least one third party application and a configurer to define a 2-way communication backchannel between the page and the at least one third party application or between the at least one third party application and at least one other third party application.
08/14/14
20140229739
Delayed data access
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic.
08/14/14
20140229737
Federated key management
A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic.
08/14/14
20140229344
Systems and methods for parsing unknown codes obtained from a customizable spreadsheet application interface
An improvement in a customizable spreadsheet application is provided. The improvement preferably provides an interface between the customizable spreadsheet application and a third party financial institution application.
08/14/14
20140229331
Embedded purchasing system and method
An online retailer may post content to a third-party web site to offer content items for sale. A user may view or preview the posted content items, and may select an item to purchase.
08/14/14
20140229299
Systems for distributing content from affiliated entity rankings
Systems, methods, and computer-readable storage media that may be used to provide content based on third-party ratings are provided. One method includes receiving data identifying a plurality of affiliated entities that a content provider wishes to promote within published content.
08/14/14
20140229292
Following content providers in a social context
In general, a method for providing content to a user includes providing a content item to a user responsive to a received request. The content item is displayed to the user in a slot associated with a third party content site.
08/14/14
20140229290
Targeting users based on persona data
A method of targeted advertisement distribution based on persona data derived from a social network, wherein the social network includes a plurality of content streams, each content stream associated with a user and a user summary. The method includes the steps of receiving an advertisement request from a third party environment with associated content, identifying a content stream that includes a reference to the third party content, identifying a persona based on the user associated with the identified content stream, and serving an advertisement to the third party environment based on the identified persona..
08/14/14
20140229265
Method for enhancing contract based mobile phone consumer experience
The various embodiments herein provide a method for enhancing a wireless customer's experience by providing incentives in exchange for the consumer signing a limited period contract. The method comprises the steps of offering a new mobile phone for a subsidized price to an existing consumer, providing an additional discount on the new mobile phone in order to renew the contract at the contract commencement, providing an option for retaining their existing mobile phone that they are already accustomed and continue using the service without signing a renewal, allowing the existing consumer to choose a third party service provider for contract renewal, allowing the third party service provider for purchasing the new mobile phone from the primary wireless service provider at the subsidized price on behalf of consumer, and receiving a monetary payment from the third party service provider in exchange of contract renewal..
08/14/14
20140229189
Post-authorization transaction bundling control
A data processing control comprising an outgoing payment request control object having 1) user-selectable data records, each user-selectable data record having one or more associated fields, 2) graphical attributes to allow the user-selectable data records to be displayed, and 3) functional attributes to allow the user-selectable data records to be submitted for payment authorization by a third party. An incoming authorized payment control object having 1) authorized payment data records, each of the authorized payment data records having one or more associated fields, 2) graphical attributes to allow the authorized payment data records to be displayed, and 3) functional attributes to allow the authorized payment data records to be submitted for fund transfer in a single bundled payment transaction.
08/14/14
20140225731
Monitoring system using wireless sensor satellite modules
A system of monitoring the conditions within an interior space using a plurality of wirelessly connected sensor satellites is provided, wherein the satellites each contain a number of electrical sensors for monitoring emergency events and coordinate with a main hub within the structure. A satellite is placed within each area to be monitored, wherein each includes at least a fire sensor and a carbon monoxide sensor, and optionally includes a wired connection to various electrical outlets for monitoring the same.
08/07/14
20140222775
System for curation and personalization of third party video playback
A system and method for providing an improved video experience are disclosed. The system can comprise one or more algorithms for choosing and providing videos, or other media, to users based on a number of inputs.
08/07/14
20140222767
Page substitution verification preparation
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink.
08/07/14
20140222687
Apparatus and method for reverse authorization
An apparatus and method for user identity control are provided. The apparatus includes a communication unit, a storage unit including a unique id and a plurality of sections, each section including different identity information, and a controller for, in response to a transaction request, transmitting a request for identity information to an authorization server via the communication unit, and for, in response to authorization information received from the authorization server, transmitting identity information to a third party to complete the transaction according to the received authorization information..
08/07/14
20140222671
System and method for the execution of third party services transaction over financial networks through a virtual integrated automated teller machine on an electronic terminal device.
Disclosed is an automated computerized system and customer facing electronic device screen interface that acts as virtual integrated automated teller machine, referred to herein as the iatm system. The iatm system enables electronic terminal device users to request and authorize their preferred financial services through the existing automated teller machine (atm) and point-of-sale (pos) networks by automating non bank third party financial services transactions on the electronic terminal device.
08/07/14
20140222662
Intelligent automated online transaction system for automated interaction with online transaction web sites
Methods, techniques, and systems for providing adaptive automated interaction capabilities for computer applications that request automated conducting of domain specific transactions via a domain specific online transaction website, e.g. An online-banking web site in a failure-proof manner.
08/07/14
20140222624
Email checkout system for completing website cart checkout
A system for leveraging email to complete an online checkout from a customer accessing a third party vendor website is disclosed. The system may store customer information including a name, email address, shipping address, and billing information.
08/07/14
20140222555
Social revenue management method
The offer is typically to reserve a bookable entity for a period of time, typically accommodation or transportation. When one or more of the contacts accepts the offer, an agent of the third party rewards the first user with a commission calculated using the purchase price of the offer..
08/07/14
20140222532
System and method for directing and instructing customers to deal with specific merchants using incentives
A buyer-seller matching system that uses incentives to verify commissions from matching the buyer with a seller. An item locator system that comprises a repository of information about items for purchase may be provided over a network for users to access information about items for purchase.
08/07/14
20140222454
Systems and methods that administer a health improvement program and an adjunct medical treatment
Systems and methods that administer a health improvement program and an adjunct medical treatment are provided herein. A method includes tracking performance of a participant in a health improvement program, the health improvement program designed to improve the health condition of the participant, comparing the performance of the participant to a minimum threshold requirement that signals that the participant is not adequately improving under the health improvement program, identifying when the performance of the participant falls below the minimum threshold level, and when the performance of the participant falls below the minimum threshold level, outputting a message to at least one of the participant or a third party that the participant is a potential candidate for an adjunct medical treatment..
08/07/14
20140222414
Messaging translator
A seamless translation method particularly suited to xmpp instant messaging where each user has a unique account with an xmpp service provider. Each unique account is associated with a mobile device and has a preferred language selected.
08/07/14
20140217186
Wireless thermostat and system
A secure wireless thermostat and system comprising the thermostat are described and taught. The temperature control unit replaces the traditional thermostat by attaching to the wall and using the existing wiring from the traditional thermostat.
07/31/14
20140215638
Method to control the access of personal data of a user
A system and method give a user control of personal data. A trusted center comprises a database for personal data, access conditions for the personal data, and a counter.
07/31/14
20140215206
System and method for providing a trust framework using a secondary network
A system for providing security services to a mobile device where the mobile device is in communication with a public network through a first network path that is subject to interference by a third party. The system includes a security server and a private network.
07/31/14
20140215070
Prioritization of third party access to an online commerce site
Providing prioritization of user online access to an online commerce site. Third party applications using api function calls to access an online commerce site are restricted to specific services by an access rule.
07/31/14
20140215069
Prioritization of third party access to an online commerce site
Providing prioritization of user online access to an online commerce site. Third party applications using api function calls to access an online commerce site are restricted to specific services by an access rule.
07/31/14
20140215068
Prioritization of third party access to an online commerce site
Providing prioritization of user online access to an online commerce site. Third party applications using api function calls to access an online commerce site are restricted to specific services by an access rule.
07/31/14
20140215067
Prioritization of third party access to an online commerce site
Providing prioritization of user online access to an online commerce site. Third party applications using api function calls to access an online commerce site are restricted to specific services by an access rule.
07/31/14
20140214816
System and method of relationship datastore management
A system and method of discovering provider contact data is provided. Provider connectivity data can be built and maintained in a data-store.
07/31/14
20140214705
Data-privacy management technique
A technique for controlling release of data associated with an account is described. During this data-privacy management technique, a computer system provides at least a subset of data associated with an account to a third party based on a first consent (which may be received from a user of the account).
07/31/14
20140214697
Refuse collection system and method
This invention relates to a refuse collection system and method in which there are provided a plurality of households, each having their own refuse bin, a control centre computer in communication with each of the refuse bins, and a plurality of collection vehicles in communication with the control centre computer. An rfid tag with information regarding the type of refuse is associated with refuse prior to the refuse being placed in the refuse bin.
07/31/14
20140214668
Mobile communication device monitoring systems and methods
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services such as a mobile wallet on a mobile communication device may be monitored against rules stored in a central data center repository.
07/31/14
20140214667
System and method for chopping up and processing gift cards
Systems, methods, and computer-readable media for chopping up a gift card/code into smaller multiple gift card/codes. The system receives a request from a user to convert a closed-loop card/code having a value amount into two different closed-loop cards/codes and divides (or “chops up”) the closed-loop card/code into a first closed-loop card/code having a first value amount and a second closed-loop card/code having a second value amount, wherein the first value amount and the second value amount add up to no more than the value amount.
07/31/14
20140214656
Payment requests
The present disclosure relates to computing systems that support payments between two users. When implemented as a computer, the computer facilitates p2p payment.
07/31/14
20140214613
Prioritization of third party access to an online commerce site
Providing prioritization of user online access to an online commerce site. Third party applications using api function calls to access an online commerce site are restricted to specific services by an access rule.
07/31/14
20140214522
Methods and systems for providing online events
Exemplary embodiments of a method and system for providing an online event that can be customizable are provided. In some examples, a method can be provided including the steps of configuring a server to allow one or more users access to an online event having a specific date and time, configuring the server to allow a third party to provide event information to the one or more users related to the online event, and providing the event information from the third party to the one or more users regarding the online event at the specific date and time..
07/31/14
20140214231
Managed virtual power plant utilizing battery storage
Disclosed is a system and method for providing power generation and distribution with on-site energy storage and power input controlled by a utility or a third party manager. The system allows a utility manager to decide and direct how energy is delivered to a customer on both sides of the power meter, while the customer directs and controls when and how much energy is needed.


Popular terms: [SEARCH]

Third Party topics: Third Party, Cloud Computing, Data Storage, Search Engine, Internet Of Things, Database Server, Data Processing, Documentation, Information Technology, Digital Content, Social Media, Content Provider, User Interface, User Input

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Third Party for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Third Party with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.5798

3475

2 - 1 - 74