THE NPE PROBLEM

 

What is an NPE? How does Unified protect against frivolous patent litigation? Answers to these questions and more are provided in the video below.

 
 

 

BENEFITS

 

Unified works to reduce NPE activity through monitoring, market intelligence, analytic tools, prior art, and USPTO challenges.

 

Protects Verticals

  • Holistic approach to protecting technology areas

  • Changes investment decision of NPEs

Proactive

  • Willing to deter the largest NPEs

  • Affects decisions of all NPEs

Always Deter

  • Never incentivizes future assertions

  • Deters future NPEs

Startups add value

  • Startups provide notice before NPE sale

 

Analytics

  • Data increases transparency in the system and improves decision making

  • Independent of law firm, NPE, or consultant bias

All Inclusive

  • All services included in yearly fees

  • Leave whenever you want and keep everything

 

ZONES


Content Zone

DEFINITION

Production

  • Encoding/Compression

  • Placement

  • Image Processing

  • Workflow management/Metadata

 

Distribution

  • Content Delivery Network (CDN)

  • Load Balancing/Cache Servers/Replication

  • Unicasting/Multicasting/ Broadcasting

  • Routing /Overlay Routing

  • Data Multiplexing

  • IP/DOCSIS Delivery

  • Bandwidth Management/Throttling

  • Smooth Streaming/Adaptive Bitrate Streaming

Storage/Management Systems

  • Billing/Accounting Systems

  • Monitoring

  • Storage systems

  • File sharing/replication

 

Personalization / Ad Systems

  • Advertising/Ad insertion / Segmentation

  • User Data

  • Skipping

  • Program Guide

  • Interactive Advertising

  • Content Recommendation

Endpoint Distribution

  • Voice/Data Multiplexing

  • Analog/Digital Multiplexing

  • GUI optimization

  • User interaction/interface

Consumption

  • Control/Navigation

  • Content Selection

  • Enhanced or Augmented Viewing/Content

  • Device customization

  • Mobile delivery

  • Power management

Security

  • Output control

  • Protection/DRM/Encryption technologies

  • Secure computing


Cloud Zone

DEFINITION

Access

  • Network

  • Web

  • Mobile

  • Security

Service Models

  • SaaS, IaaS, PaaS, etc.

  • File Hosting and Sharing

  • Backup, Synchronize, Archive, Restore

  • Cloud computing

  • Enterprise Storage

  • Table storage

Architecture & Operation

  • Software and hardware

  • Storage Networking

  • Volumes/ File systems

  • Virtualization

  • Load balancing & scaling

  • Data center optimization

  • Reliability / Redundancy


Transactions Zone

DEFINITION

Secure Electronic Transactions and Payments

  • Credit/debit/pre-paid

  • Money transfer and value exchange methods, including b2b, trading and commercial/retail transactions

  • Online transactions

  • Mobile payments

  • SMS and Text

  • Currency Conversion

  • Blockchain / Virtual currency

Authentication and Security

  • Encryption methods

  • Tokenization

  • Fraud systems and methods

  • Transaction notifications and alerts

  • Data Security

  • Distributed ledger

  • Multi-factor authentication

  • Out-of-Band authentication

Online Bill Pay

  • Retail and commercial

 

Mobile

  • Card/account management

  • Payments

  • Security and authentication

  • Transaction processing

  • Digital wallet

  • SMS and text

Card and Payment Device Readers

  • Point of sale systems

  • Chip

  • Mag-stripe

  • NFC/proximity

  • Device Testing

  • Security

Image-Based Transactions

  • Bar code

  • QR code

  • Other image-based transactions


IoT Zone

DEFINITION

Wireless Functions & Features

  • Security

  • Wearables

  • Health/fitness monitors

  • Brown Goods (speakers, TVs, etc.)

  • White Goods (refrigerators, etc.)

  • Connected devices (instruments, power, lighting)

  • Networking (routers, modems)

  • Management applications (apps, web)

  • IP Communications (voice, video, messaging)

Connectivity Protocols

  • Mesh Networking/IEEE 802.15.4

  • Near field communication (NFC)

  • Radio Frequency Identification (RFID)

  • Bluetooth

  • WiFi (802.11)

  • LiFi


Retail Zone

DEFINITION

eCommerce Functions & Features

  • Catalog systems

  • Website implementation

  • Shopping cart/checkout

  • Localization

  • Payment gateway

  • Verification systems

  • Data encryption

  • Performance enhancement

  • Online marketing

  • Recommendation systems

  • Advertising systems

  • Graphical user interface design & optimization

Back-end

  • Merchandise management (MMS)

  • Enterprise Resource Management (ERP)

  • Supply chain management (SCM)

  • Warehouse management (WMS)

  • Consumer relationship management (CRM)

  • Delivery management/package tracking

  • Call center systems

  • Automation technologies

  • Legacy integration

Retail Storefront

  • Electronic point of sale (EPOS)

  • Conversion optimization

  • Loss prevention

  • Security systems

  • Employee management

  • Rewards programs

  • Interactive surveys


Transport Zone

DEFINITION

Infotainment

  • System integration

  • Multimedia Systems

  • Audio/radio

  • Entertainment

  • GPS / navigation

  • Tracking

  • Telematics

  • Data Connectivity

  • Charging

Powertrain / Hybrid / Electric

  • Battery Chargers

  • Battery Pack Systems

  • Controllers

  • Electric Vehicle Charging Systems

  • Emissions Systems

  • High Voltage Wiring & Electrical Centers

  • Integrated Solutions

  • Inverters

  • Vehicle Sound Generator

  • Motor

  • Fuel Cell Systems

Electronics

  • Actuators

  • Wipers

  • Semiconductors

  • Sensors

  • Electronic Control Units (ECU)

  • Mechatronic modules

  • Fleet Management

  • Remote management

Safety

  • Brake control

  • Sensors

  • Occupant (SRS)

  • Pedestrian (detection)

  • Adaptive Cruise Control

  • Pre-Collision Systems

  • Driver’s Assistance

  • Lane support

  • Security Systems

  • Anti-theft Systems

  • Tire Information Systems

  • Video Monitoring

Conventional Vehicle Components

  • Drivetrain / Engine / Transmission

  • Chassis/Frame/Body

  • Suspension / Steering / emissions Systems


Mobile Zone

DEFINITION

Communication Protocols/Standards

  • TDMA

  • CDMA

  • GSM/EDGE

  • UMTS

  • HSPA

  • HSPA+

  • GPRS

  • 3G

  • 4G/ 4G LTE

Mobile Features/Functions

  • MMS/SMS services

  • Caller ID / Voice recording

  • VoIP

  • Voice/biometric recognition

  • Touchscreen input

  • Display / LED light

  • Camera / Screen Capture

  • Security / screen lock

  • Keyboard input / Autocorrect

  • Microphone / Speakers

  • Hands-free communication

  • Noise cancellation

  • Phone casing / packaging

OS & Applications

  • iOS / Android platform

  • GUI / Mobile interface

  • Update/Syncronization system

  • App Store / In-app purchases

  • Mobile applications / notifications

  • Digital rights management (DRM)

Baseband, RF, Channel Processing

  • Multi-Core Processor

  • Clock Speed Management

  • Multithreading

  • Signal Quality

  • Antenna / RF Transceivers

  • Interference reduction / Frequency Hopping

  • Carrier Aggregation

  • Single Band / MultiBand

  • Channel Monitoring

  • QoS / Prioritization / Media serving

  • Buffering / File transfer optimization

  • Power Management / Control

  • Encryption & Security

  • Authentication / SIM cards

Connectivity

  • Bluetooth discovery / pairing

  • NFC / RFID

  • GPS / Location-based services

  • Peripheral access / Mobile hotspots

  • Data storage/retrieval systems


Cybersecurity Zone

DEFINITION

Digital Infrastructure and Information Protection

Asset Protection

  • Application Security Scanning and Testing

  • Secure Development Life Cycle

  • Application-Level Security Gateways

  • Database Security

  • Encryption at Rest / in Motion

  • Data Loss Prevention

  • Digital/Information Rights Management

  • Endpoint Security/Protection

  • Mobile Security

  • Host/Server Security

  • Operations Technology Security

  • Network Security

  • Perimeter Security

  • Network Behavior Analysis

  • Social and Collaboration Security

  • Email and Collaboration Security

  • Social Media Monitoring

Security Management

  • Threat and Vulnerability Management

  • Threat Intelligence

  • Vulnerability Management

  • Patch Management

  • Security Information and Event Management

  • Real-Time, Context-Aware Monitoring

  • Security Infrastructure Maintenance and Support

  • Automated Policy and Rules Administration

  • Security Orchestration Automation Response

IT Service Management

  • Change Management

  • Configuration Management

  • Problem Management

  • Service-Level Management

Identity and Access Management

Identity Governance and Administration

  • Identity Life Cycle Processes

  • Automated Provisioning

  • Access Request (Including Self-Service) Workflows

  • Role Management

  • Role and Entitlement Mining

  • Identity Analytics

  • Reporting

Identity Intelligence

  • Identity Audit

  • Identity Analytics

Access Management

  • Identity Assurance

  • Authentication

  • Authorization

  • Single Sign-On

Privileged Account Management

Governance, Risk and Program Management

Program Management

  • Awareness Communication and Behavior Change

  • Budget Management

  • Long-Term Strategy Planning

  • Organization and Security Team Skills Management

  • Policy/Process Management

Risk Management

  • Data Classification

  • Risk Assessment

  • Business Impact Assessments

  • Risk Register

Compliance and Assurance Management

  • Audit and Compliance Assessment

Privacy Management

  • Employee Privacy

  • Customer/Patient/Citizen Privacy

  • Metrics and Indicators

Business Continuity Management

  • BCM Governance and Program Management

  • Contingency Planning

  • Pandemic Planning

  • Emergency Response

  • Crisis/Incident Management

  • IT Disaster Recovery Management

  • Business Recovery

Vendor Management/Third-Party Management

  • Outsourcer/Cloud Provider Security

  • Procurement Security