SEARCH
Tynax ~ Patent Library

Consumer : Utilities

Sign up for an email alert when new listing are posted, or subscribe to our RSS feed.

Can’t find what you are looking for?  Create your own topic - register for a Tynax Account, and Create a Saved Search.

Patents & Technology Available

Number of Technology Available listing in this topic: 503

Online Event Management Platform for sale
Manage events such as meetings, seminars, webinars, conferences, social events, etc. Creation and communication of events, managing attendees, cash,   > view
3G/4G Wireless Patent Portfolio
LTE is part of the GSM evolutionary path for mobile broadband.   > view
Instant Secure Communication Initiation and Provisioning for Mobile Devices
Secure authentication and data communication using two-dimensional images (e.g. bar codes), also known as quick response (QR) codes.   > view
Pain Diagnosis & Case Management System for Self Insured Companies, and Reinsurance Companies
Sophisticated web-based software system for sale, with documented 50% savings on workers compensation costs.  > view
Multi Chip Modules
Semiconductor Multi Chip Module (MCM / MCP) & System Package (SIP) devices and manufacturing  > view
Glow Home Decor
Renewable Energy  > view
Cloud-Based Dynamic Data Collection
Easily Create XML Templates for Web-Based Data Collection.  > view
Online SAN Storage Area Network Portfolio
Family of patents and applications related to online data storage  > view
Data Storage Apparatus, Systems, and Methods
Apparatus, systems, and methods that help to enhance and improve the availability, performance, and reliability of storage disk (disc) or storage tape systems.  > view
Electronic Publishing Portfolio
Portfolio of 14 Issued US Patents from an Operating Company   > view
Conditional Access System for Content Distributors & Service Providers
Reduces piracy, enhances security for service provider and subscriber.  > view
Encryption system
This patent covers the random generation of password and communication between 2 devices.  > view
Password Self Encryption
Secure technique for encryption of secret information by a numeric function of itself that defeats key factoring and spoofing attacks  > view
Procedures for Language Text Generation
Enhanced generation of text or characters in non-english languages  > view
Mobile Network Architecture
Scalable mobile network architecture with intelligent data routing  > view
Computing System Security & Integrity
PC & embedded computing system authorized and secure process execution and system device access.  > view
EDA and Integrated Circuit Design
EDA design methods, simulation and test of integrated circuits.  > view
Digital convergence portfolio
Significant portfolio covering digital audio, video, hardware, imaging processing and electronic circuitry  > view