1
James Arthur Proctor Jr, James Arthur Proctor III: Visual identification information used as confirmation in a wireless communication. Hamilton Brook Smith & Reynolds P C, January 3, 2012: US08090616 (174 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


2
James Arthur Proctor Jr, James Arthur Proctor III: Protocol for anonymous wireless communication. Hamilton Brook Smith & Reynolds P C, February 14, 2012: US08116749 (112 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


3
James Arthur Proctor Jr, James Arthur Proctor III: Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided. Hamilton Brook Smith & Reynolds P C, January 3, 2012: US08090359 (110 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


4
James Arthur Proctor Jr, James Arthur Proctor III: Enforcing policies in wireless communication using exchanged identities. Hamilton Brook Smith & Reynolds P C, May 3, 2011: US07936736 (73 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


5
James Arthur Proctor Jr, James Arthur Proctor III: Using a first wireless link to exchange identification information used to communicate over a second wireless link. Proxicom Wireless, Cesari and McKenna, February 26, 2013: US08385913 (3 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


6
James Arthur Proctor Jr, James Arthur Proctor III: Enforcing policies in wireless communication using exchanged identities. Proxicom Wireless, Cesari and McKenna, February 5, 2013: US08370955 (3 worldwide citation)

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


7
James Arthur Proctor Jr, James Arthur Proctor III: Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided. Proxicom Wireless, Cesari and McKenna, September 30, 2014: US08849698 (1 worldwide citation)

A server exchanges information between one or more wireless devices to complete a transaction. The server receives second device identifier information from a first wireless device using a wide area network. The second device identifier information was previously provided to the first wireless devic ...


8
James Arthur Proctor Jr, James Arthur Proctor III: Exchanging identifiers between wireless communication to determine further information to be exchanged or further services to be provided. PROXICOM WIRELESS, Cesari and McKenna, October 13, 2015: US09161164

A server exchanges information between one or more wireless devices to complete a transaction. The server receives second device identifier information from a first wireless device using a wide area network. The second device identifier information was previously provided to the first wireless devic ...


9
James Arthur Proctor Jr, James Arthur Proctor III: Enforcing policies in wireless communication using exchanged identities. Proxicom Wireless, Cesari and McKenna, May 19, 2015: US09038129

Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first device uses a first short range wireless capability to detect an identifier transmitted from a second devi ...


10
James A Proctor Jr, Maria Elena Tripoli, James Arthur Proctor III: Proximity detection, virtual detection, or location based triggering of the exchange of value and information. Proctor Consulting, Cesari and McKenna, October 4, 2016: US09460433

A system, methods, and apparatuses are provided for valuation and exchange of stored value assets, information of value, and the transfer of value to or among individuals. The exchanged assets may be of a similar nature, e.g., music files exchanged for other music files, and exchange or trade of inf ...



Click the thumbnails below to visualize the patent trend.