4917 Waters Edge Drive, Suite 275
Raleigh, NC 27606
2 Davis Drive
Durham, NC 27709
101 North Chestnut Street, Suite 103
Winston-Salem, NC 27101
Our work in this group includes authentication software for prescription filling services, mobile device power management systems, application store access systems, log on and authentication systems, cell phone handover systems, imaging blood flow and other medical products, and database management systems. Our professionals include engineers that have worked in software and related product development, have worked in-house for software companies, and have been named inventors on software patent applications.
We are well-positioned to address the ever changing standards for patent eligibility for software matters. For example, our professionals have been involved in recent caselaw addressing patent eligibility, and we have prosecuted hundreds of software patents to issuance. Our experience extends to foreign countries as well, in particular within the European Patent Office, where we have been able to prosecute to issuance patents in mobile device power management, email access systems, and communications networks, as an example.
According to one aspect, the subject matter described herein includes a method for dynamic execution of actions in response to communications events of one or more communications protocols that are generated in response to a variety of triggers. The method includes, at an event clearinghouse for receiving communications events, receiving a communications event that is associated with a trigger, the communications event having a first communication protocol, identifying an action to take in response to the communications event, identifying a target for the action, and initiating the identified action by or on behalf of the identified target, wherein the event clearinghouse supports a plurality of communications protocols.
A system for providing mobile network services is disclosed. A first server is communicatively coupled to a mobile device over a mobile network and configured to receive a unique authentication token from the mobile device over the mobile network and provide a service to the mobile device via the mobile network, the service associated with the unique authentication token and branded by an entity other than an operator of the mobile network. A second server is communicatively coupled to the mobile network and configured to monitor usage of the mobile network by the mobile device. A computing device is communicatively coupled to the mobile device over the mobile network and configured to receive the unique authentication token from the mobile device over the mobile network, access digital content over a network, and transfer a representation of the digital content to the mobile device over the mobile network.
System and methods for authenticating access to multiple data stores are disclosed. The system may include a server coupled to a network, a client device in communication with the server via the network and a plurality of data stores. The server may authenticate access to the data stores and forward information from those stores to the client device. An exemplary authentication method receives a request for access to data. Information concerning access to that data is stored and associated with an identifier assigned to a client device. If the identifier is found to correspond to the stored information during a future request for access to the store, access to that store is granted.