Patent application number | Description | Published |
20110226105 | SAFETY MECHANISMS FOR POWER TOOLS - Various safety systems for power tools, and in particular table saws, are disclosed herein. The disclosed safety systems include detection systems for detecting a dangerous condition relative to a blade of the power tool, reaction systems for taking mitigation action in response to detection of a dangerous condition. Generally, the embodiments described herein may detect, prevent, and/or mitigate a dangerous condition associated with the power tool. | 09-22-2011 |
20150075342 | SAFETY MECHANISMS FOR POWER TOOLS, INCLUDING KICKBACK DETECTION SYSTEM WITH TORQUE SENSOR - Various safety systems for power tools, and in particular table saws include detection systems for detecting a dangerous condition relative to a blade of the power tool, reaction systems for taking mitigation action in response to detection of a dangerous condition. The safety system may detect, prevent, and/or mitigate a dangerous condition associated with the power tool. | 03-19-2015 |
20150075343 | SAFETY MECHANISMS FOR POWER TOOLS, INCLUDING MAGNETORHELOGICAL BRAKE FOR BLADE - Various safety systems for power tools, and in particular table saws include detection systems for detecting a dangerous condition relative to a blade of the power tool, reaction systems for taking mitigation action in response to detection of a dangerous condition. The safety system may detect, prevent, and/or mitigate a dangerous condition associated with the power tool. | 03-19-2015 |
Patent application number | Description | Published |
20090204457 | System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 08-13-2009 |
20090204815 | System and method for wireless device based user authentication - An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g. BLUETOOTH or Wi-Fi) or long-range wireless interfaces (e.g. cellular or WiMAX) to detect the presence or location of the wireless device and it's proximity to the secure system to be accessed. The wireless device incorporates a unique identifier and secure authentication key information associated with the user of the wireless device. An authentication result is generated and may be used for a variety of applications. The application may process the result and determine the degree of access for which the entity or individual is allowed. | 08-13-2009 |
20110202407 | SYSTEM AND METHOD FOR IMPROVING INTERNET SEARCH RESULTS USING TELECOMMUNICATIONS DATA - A method of displaying advertising to a user includes receiving a request including search terms from the user, receiving a mobile directory number associated with the user, requesting telecommunications data based on the mobile directory number, receiving the telecommunications data, determining advertising results based on the search terms and the telecommunications data, and displaying the advertising results to the user. | 08-18-2011 |
20120130898 | MOBILE DIRECTORY NUMBER AND EMAIL VERIFICATION OF FINANCIAL TRANSACTIONS - Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address. | 05-24-2012 |
20120144498 | System And Method For Mobile Identity Protection of a User of Multiple Computer Applications, Networks or Devices - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 06-07-2012 |
20130132568 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 05-23-2013 |
20130197998 | AUTHENTICATING ENTITIES ENGAGING IN AUTOMATED OR ELECTRONIC TRANSACTIONS OR ACTIVITIES - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity and/or reliability verification is provided. | 08-01-2013 |
20130262311 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 10-03-2013 |
20140040155 | SYSTEM AND METHOD FOR MOBILE IDENTITY PROTECTION OF A USER OF MULTIPLE COMPUTER APPLICATIONS, NETWORKS OR DEVICES USING A WIRELESS DEVICE - An automated system and method for authenticating entities or individuals engaging in automated or electronic transactions or activities such as financial transactions, accessing computer applications, computer software, data networks or other automated or electronic devices requiring identity verification is provided. A unique Personal Identity Value is computed and stored in an Identity Register for the entity or individual and may be used for a variety of applications including recognizing incidents of identity theft. This Personal Identity Value is based on one or more computer logic resources that incorporate the relationship among a variety of identification information elements and parameters associated with the entity or individual, such as the entity's or individual's wireless device location, the entity's or individual's home location, other associated locations, automated activities engaged in and applications accessed. | 02-06-2014 |
20140187205 | SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION - A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location, Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine. | 07-03-2014 |
Patent application number | Description | Published |
20080249936 | BILL PAYING SYSTEMS AND ASSOCIATED METHODS - Methods of paying user bills on behalf of a user are described. In one embodiment, the method includes receiving from a vendor a user bill having a user identifier, a vendor identifier, and a bill amount. The method further includes obtaining the user identifier, the vendor identifier, and the bill amount, associating the bill with the user based on the user identifier, and associating the bill with the vendor based on the vendor identifier. The method further includes determining whether the bill is payable, which includes comparing the bill to stored bill data associated with the user and the vendor. When the bill is payable, the method further includes obtaining funds from an account of the user, dispersing funds to the vendor to pay the bill and storing an indication of the paying of the bill. | 10-09-2008 |
20140244490 | BILL PAYING SYSTEMS AND ASSOCIATED METHODS - Methods of paying user bills on behalf of a user are described. In one embodiment, the method includes receiving from a vendor a user bill having a user identifier, a vendor identifier, and a bill amount. The method further includes obtaining the user identifier, the vendor identifier, and the bill amount, associating the bill with the user based on the user identifier, and associating the bill with the vendor based on the vendor identifier. The method further includes determining whether the bill is payable, which includes comparing the bill to stored bill data associated with the user and the vendor. When the bill is payable, the method further includes obtaining funds from an account of the user, dispersing funds to the vendor to pay the bill and storing an indication of the paying of the bill. | 08-28-2014 |