8 patents
Utility
Embedded trace capacitive signet stamp
17 Oct 23
An embedded trace capacitive signet is described.
Thomas Ree Worley, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul, Charles Alan McAllister
Filed: 7 Feb 22
Utility
Socket Security and Authentication Device, System and Method
13 Apr 23
A socket security and authentication device is disclosed that has a socket configured to receive a verification module or plug, where the verification module or plug may include, but is not limited to, RFID and Near Field Communications (NFC), QR codes, bar codes, bluetooth communications, magnetic stripe, magnetic memory, fingerprint and biometric identification, as well as capacitively patterned stamps and devices.
Ned Dykstra Hayes, Charles Alan McAllister
Filed: 9 Oct 22
Utility
Embedded Trace Capacitive Signet Stamp
26 May 22
An embedded trace capacitive signet is described.
Thomas Ree Worley, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul, Charles Alan McAllister
Filed: 7 Feb 22
Utility
Embedded trace capacitive signet stamp
10 May 22
An embedded trace capacitive signet is described.
Thomas Ree Worley, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul, Charles Alan McAllister
Filed: 29 Jun 18
Utility
Punched Card Capacitive Touch Stamp With Systems And Methods For Authentication
25 Nov 21
A punched card capacitive touch stamp is disclosed along with systems and methods for authentication using the punched card capacitive touch stamp.
Thomas Ree Worley, Charles Alan McAllister, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul
Filed: 15 May 21
Utility
Embedded Trace Capacitive Signet Stamp
15 Jul 20
An embedded trace capacitive signet is described.
Thomas Ree Worley, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul, Charles Alan McAllister
Filed: 28 Jun 18
Utility
Methods for enabling real-time digital object and tangible object interactions
23 Mar 20
A method for authorizing an electronic device to perform an action includes detecting interaction data from an interaction between a hardware sensor and an identity-augmented tangible object; wherein data of the first set of interaction data is intrinsically dependent on physical characteristics of the identity-augmented tangible device; computing parametric descriptors from the interaction data; transmitting the parametric descriptors and supplementary data to a remote database system; generating, on the remote database system, identity data from a comparison of parametric descriptors with a known set of parametric descriptors; and authorizing, in response to both of the identity data and the supplementary data, the electronic device to perform a first action.
Thomas Ree Worley, Jesse Edward Stewart, Alex Norman Haines, Sheradyn Thomas Mikul, Charles Alan McAllister
Filed: 14 Jan 18
Utility
Increased security method for hardware-tool-based authentication
23 Mar 20
A method for hardware-tool-based authentication includes detecting a first set of capacitive contact points and a second set of capacitive contact points, computing, from the first set of capacitive contact points, a first set of parametric descriptors, generating a first comparison of the first set of parametric descriptors and a set of known parametric descriptors, generating a second comparison of the first set of capacitive contact points and the second set of capacitive contact points, and performing an event on the electronic device based on analysis of the first and second comparisons.
Claus Christopher Moberg, Matt Luedke, Isaac Ray, Jami Morton, Erland Kelley
Filed: 8 Feb 15
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first