Device management proxy for secure devices

Information

  • Patent Grant
  • 10972480
  • Patent Number
    10,972,480
  • Date Filed
    Friday, March 23, 2018
    6 years ago
  • Date Issued
    Tuesday, April 6, 2021
    3 years ago
Abstract
A hardware device architecture is described that improves security and flexibility in access to hardware device settings. A device management proxy service is digitally signed and granted access to device settings. Applications are then digitally provisioned by the proxy service and only validated signed requests from applications are permitted to change hardware device settings. Further granularity over hardware device settings is achieved through user accounts and groups established by the applications.
Description
CROSS-REFERENCE TO RELATED APPLICATION

The present application claims the benefit of U.S. patent application Ser. No. 14/676,327 for Device Management Proxy for Secure Devices filed Apr. 1, 2015 (and published Oct. 6, 2016 as U.S. Patent Application Publication No. 2016/0294779), now U.S. Pat. No. 9,930,050. Each of the foregoing patent application, patent publication, and patent is hereby incorporated by reference in its entirety.


FIELD OF THE INVENTION

The present invention relates to the security of hardware devices running applications.


BACKGROUND

Recent years have seen a worldwide proliferation of electronic devices. Hardware manufacturers have been able to use standard operating systems such as, for example, popular smartphone operating systems like Google Android™, Apple iOS™, and Microsoft Windows Embedded 8 Handheld™ to create a new generation of products to enhance productivity and address various challenges in both the personal and commercial realm. Further, a robust software ecosystem has emerged around many of these devices to enhance their functionality and utility and to leverage the vast amount of information and services available from the Internet. The development of applications for these devices has undeniably been a significant factor in the market adoption of many of these devices. However, this development has also driven a need for enhanced security, as it is common nowadays for the hardware manufacturer, operating system provider, and application developer to be separate entities.


In the interest of increased security, the operating systems of many devices, now regularly restrict or eliminate the ability for applications to interact with hardware device settings. A current solution to this problem involves the elevation of the privileges of the application. However, the privilege rights offered by the operating systems are typically not specific enough to provide access only to the hardware settings that the application desires. The result is a different kind of security risk in that applications with elevated privileges have access to critical functionality that exceeds their needs.


Therefore, there is a need for further advances in hardware device architectures that allow for operating systems to provide applications with secure and specific access to hardware device settings.


SUMMARY

Accordingly, in one embodiment of the present invention, access to the hardware device settings are controlled by a device management proxy service (DMPS) that is digitally signed and that only accepts requests to change the hardware device settings from applications that have been provisioned on the device and send validated signed requests.


In another embodiment of the present invention, access to the hardware device settings are controlled by a device management proxy service (DMPS) that is digitally signed but runs on a server as a separate service and that only accepts requests to change the hardware device settings from applications that have been provisioned on the device and send validated signed requests.


In yet another exemplary embodiment of the present invention, access to the hardware device settings are controlled by a device management proxy service (DMPS) that is digitally signed but runs on a server as a separate service and that only accepts requests to change the hardware device settings from applications that have been provisioned on the device and operated with account and group privileges sufficient to send validated signed requests.


The foregoing illustrative summary, as well as other exemplary objectives and/or advantages of the invention, and the manner in which the same are accomplished, are further explained within the following detailed description and its accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of the elements of the system in accordance with one embodiment of the disclosed subject matter.



FIGS. 2A-2C graphically depict different embodiments of the disclosed subject matter involving applications on the device.



FIGS. 3A-3B are schematics outlining the flow of information according to different embodiments of the disclosed subject matter involving applications on the device.



FIGS. 4A-4B are schematics outlining the initial provisioning of the device with applications according to different embodiments of the disclosed subject matter.



FIGS. 5A-5D graphically depict different embodiments of the disclosed subject matter involving device management solutions on the device.



FIGS. 6A-6B are schematics outlining the flow of information according to different embodiments of the disclosed subject matter involving device management solutions applications on the device.



FIG. 7 is a schematic outlining the initial provisioning of the device with a device management solution according to one embodiment of the disclosed subject matter.





DETAILED DESCRIPTION

The present invention involves the concept of applications or device management solutions using digitally signed communications to interact with operating system services in order to provide secure and managed access to hardware settings on a device. In the present disclosure, “digitally signed” is meant in the context of public/private key cryptography, i.e. digitally signed communications are messages, data, or documents that are sent with a digital certificate or identity certificate issued by a certificate authority meant to demonstrate the authenticity of the sender. In the present disclosure, “applications” refer to software applications that are offered by independent software vendors, and “device management solutions” refer to commercial mobile device management software technology applications, such as applications offered by vendors including but not limited to SOTI™, LANDESK™, CITRIX™, AIRWATCH™, and the like.


In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.



FIG. 1 illustrates an exemplary system 100 for one embodiment of the present invention. In general, the system 100 includes a device 110 and one or more servers 130, 140, and 150. The servers 130, 140, and 150 and the device 110 are connected via a network 160. The network 160 may be any type of Wide Area Network (WAN), such as the Internet, Local Area Network (LAN), or the like, or any combination thereof, and may include wired components, such as Ethernet, wireless components, such as LTE or Wi-Fi, or both wired and wireless components. Note that while the servers 130, 140, and 150 are illustrated as individual single servers, each may be alternatively distributed across multiple servers having the respective functionality of the single servers 130, 140, and 150 shown in FIG. 1. And still in other embodiments, the servers 130, 140, and 150 may also be combined into one single server or distributed across multiple servers having the overall combined functionality of servers 130, 140, and 150.


In general, the server 130 includes at least one processor 131 and associated memory 132 and a communication interface 134. The server 130 may also include additional components such as a storage component 133, a Device Management Proxy Service (DMPS) 220, and a DMPS Download Service 135, as described below. The components of server 130 may be interconnected using one more buses (not shown) and may be mounted on a motherboard (not shown) or some other appropriate configuration.


In general, the server 140 includes at least one processor 141 and associated memory 142 and a communication interface 144. The server 140 may also include additional components such as a storage component 143 and an application download service 145 and an application certificate service 146, as described below. The components of server 140 may be interconnected using one more buses (not shown) and may be mounted on a motherboard (not shown) or some other appropriate configuration. In one embodiment, the device 110 may download digitally signed and provisioned applications 210 from the app download service 145 of server 140 or may obtain new or updated provisioning certificates for applications 210, user accounts 270, and/or groups 275 from the app certificate service 146 on server 140. In another embodiment, the device 110 may side load applications and/or certificates directly.


In general, the server 150 includes at least one processor 151 and associated memory 152 and a communication interface 154. The server 150 may also include additional components such as a storage component 153 and the server component of a device management solution, as described below. The components of server 150 may be interconnected using one more buses (not shown) and may be mounted on a motherboard (not shown) or some other appropriate configuration.


In general, the device 110 includes a processor 118 and associated memory 117 as well as a communication interface 119. The device 110 may include additional components such as a storage component 114 such as a hard drive or solid state drive, a location determination component 111 such as a Global Positioning System (GPS) chip, audio input component 112 such as a microphone, audio output component 113 such as a speaker, visual input component 115 such as a camera or barcode reader, visual output component 116 such as a display, and a user input component 120 such as a touchscreen, navigation shuttle, soft keys, or the like, an external storage component 121 such as a smart media card, micro Secure Digital card or the like, a hardware security module (HSM) 122, application settings 123 which are used to configure applications installed on the device 110 and may be stored in the storage 114 or memory 117 or a combination of both, and system settings which are used to configure the device 110 and may be stored in the storage 114 or memory 117 or a combination of both. The components of device 110 may be interconnected using one more buses (not shown) and may be mounted on a motherboard (not shown) or some other appropriate configuration. Examples of device 110 include, but are not limited to, consumer electronics such as smartphones, tablets, televisions, media players, smart watches, personal navigation devices, and health/activity trackers, and commercial electronics such as rugged mobile computers, vehicle mount computers, wearable scanners, barcode scanners, radio frequency identification (RFID) scanners, intelligent sensors, and tracking devices.



FIG. 2A illustrates one embodiment of the present invention. Application 210 is installed on device 110 in its own trust level, an application trust level, which is separate and distinct from the operating system trust level. The separate trust levels offer security on the device 110 so that applications cannot make changes to the hardware settings of the device 110 except through the mechanisms described in the present invention. At the operating system trust level, device 110 has a DMPS 220, a storage repository for storing digital certificates, i.e. a certificate repository 250, and an operating system driver 230 that interacts and controls the hardware elements 240 of the device.


The DMPS 220 is signed and provisioned by the operating system. In some embodiments, the DMPS 220 is included in the operating system image installed on the device by the manufacturer. In other embodiments, the DMPS 220 is loaded on the device 110 after manufacture, such as from a DMPS download service 135, but is still digitally signed and provisioned using the operating system vendor certificates.


The DMPS 220 is used on the device 110 to install and manage application certificates. The DMPS 220 may be implemented as a lightweight service, such as a daemon, that runs in the background or may be implemented as a device driver. In some embodiments, the DMPS 220 and storage repository for storing digital certificates 250 run on the hardware security module 122. The combination of the DMPS 220 and the certificate repository 250 on the HSM 122 ensure tamper-proof handling of the certificates.


The operating system driver 230 interacts with the DMPS 220 to relay hardware setting changes to the hardware elements 240 of the device. Settings that may be altered using the operating system driver 230 include, but are not limited to display settings, network settings, power management settings, global positioning system (GPS) settings, audio settings, user account settings, user personalization settings, time settings, file management settings, system settings, security settings, camera settings, and barcode scanner/reader settings. In some embodiments, the operating system driver is provisioned by the operating system vendor by inclusion in the operating system image installed on the device.


The application 210 and the DMPS 220 interact through a cross process communication, such as remote procedure calls (RPC) or system calls such as input/output control (ioctl) using a device management application programming interface (API) 290 over a protocol.


The DMPS 220 and the operating system driver 230 interact through a device driver API over a protocol. The operating system driver 230 has the ability to directly change the settings of the hardware element 240.



FIG. 3A illustrates the communication flow between the application 210 and the DMPS 220. The application 210 first generates a digitally signed request to the DMPS 220 to change a hardware setting in a hardware element 240 (step 3A-1). The request is digitally signed using the application's digital certificate. The DMPS 220 retrieves the application's digital certificate from the certificate repository 250 (step 3A-2). The DMPS 220 then validates the digitally signed request using the retrieved application certificate (Step 3A-3). If validated, then the DMPS 220 sends the request to change the hardware setting to the operating system driver 230 (Step 3A-4) which then changes the setting of the hardware element 240 (step 3A-5).



FIG. 2B illustrates another embodiment of the present invention. The embodiment in FIG. 2B is similar to FIG. 2A with the exception that user accounts 270 and/or groups 275 have been included in the application 210. In this embodiment, the application 210 has user and/or group privileges defined that control the functions of the application that are available to particular users or groups of users of the application.



FIG. 3B is similar to FIG. 3A in that it illustrates the communication flow between the application 210 and the DMPS 220, but FIG. 3B further illustrates the involvement of the user accounts 270 and/or groups 275. A user first logs into the application 210 on the device 110 (Step 3B-1). The application 210 then validates the user's login (Step 3B-2). If the user is validated, then the application 210 controls the application functions with which the user may interact according to the user's login and/or group credentials. The applications functions controlled by the credentials include the ability of the user to generate hardware changes with the application. If permitted, the application 210 then generates a digitally signed request to the DMPS 220 to change a hardware setting in a hardware element 240 (step 3B-3). The request is digitally signed using the application's digital certificate. The DMPS 220 retrieves the application's digital certificate from the certificate repository 250 (step 3B-4). The DMPS 220 then validates the digitally signed request using the retrieved application certificate (Step 3B-5). If validated, then the DMPS 220 sends the request to change the hardware setting to the operating system driver 230 (Step 3B-6) which then changes the setting of the hardware element 240 (step 3B-7).



FIG. 2C illustrates another embodiment of the present invention. The embodiment in FIG. 2C is similar to FIG. 2B with the exception that in FIG. 2C the DMPS 220 is no longer running on the device 110 as in FIG. 2B but is now running on server 130 as a service over the network 160.



FIG. 4A illustrates the initial provisioning process according to one embodiment of the present invention. In this embodiment, the DMPS 220 utilizes an open API that accepts incoming connections from any application 210 (Step 4A-1). An application 210 is installed on the device 110 and attempts to communicate with the DMPS 220. Once the communication has been established between the DMPS 220 and the application 210, the application 210 sends its application certificate to the DMPS (Step 4A-2). Once the application certificate has been received, the DMPS 220 stores it in the certificate repository 250 (Step 4A-3). In this embodiment, the DMPS 220 has been programmed to close the open API once an application certificate has been provisioned and receive only incoming communications from that point on if they have been digitally signed with the application certificate (Step 4A-4). In other embodiments, the DMPS 220 is programmed to accept digital certificates from a pre-programmed number of different applications before closing the open API. For example, in one embodiment, the DMPS 220 could be programmed to accept digital certificates from up to 3 applications. In this instance, the DMPS 220 accepts application certificates from the first three unique applications with which it communicates. The very next unique application that tries to communicate with the DMPS 220 and send its digital certificate is not provisioned.



FIG. 4B illustrates the initial provisioning process according to another embodiment of the present invention. In this embodiment, the certificate repository 250 on the device 110 is first provisioned with a certificate from the provider of the DMPS 220, i.e. a DMPS certificate (Step 4B-1). The DMPS certificate could be installed in the certificate repository 250 as part of the operating system image used to manufacture the device or could be downloaded to the device 110 after manufacture from a DMPS download service 135 from server 130. The DMPS 220 utilizes a proprietary API that accepts incoming connections from any application 210 that is provisioned with the DMPS certificate (Step 4B-2). An application 210 that has been signed with the DMPS certificate (Step 4B-3) is installed on the device 110 and attempts to communicate with the DMPS 220 by sending its application certificate in a communication request that is digitally signed using the DMPS certificate (Step 4B-4). The DMPS 220 then retrieves the DMPS certificate from the certificate repository 250 (Step 4B-5). The DMPS 220 then validates the signature of the application message using the DMPS certificate (Step 4B-6). If validated, the DMPS 220 then stores the application's certificate in the certificate repository 250 (Step 4B-7). In this embodiment, the DMPS 220 has been programmed to close the proprietary API once an application certificate has been provisioned and receive only incoming communications from that point on if they have been digitally signed with the application certificate. In other embodiments, the DMPS 220 may keep the proprietary API open and accept incoming communications and digital certificates from any application that has been digitally signed using the DMPS certificate.



FIG. 5A illustrates one embodiment of the present invention. In this embodiment, a device management solution is installed on the device 110. The device management solution may involve a device management server 260 component and a device management client 265 component. Again, the device management solution 260 and 265 is installed on device 110 in its own trust level, a device management trust level, which is separate and distinct from the operating system trust level. The separate trust levels offer security on the device 110 so that device management solutions cannot make changes to the hardware settings of the device 110 except through the mechanisms described in the present invention. At the operating system trust level, device 110 has a DMPS 220, a storage repository for storing digital certificates, i.e. a certificate repository 250, and an operating system driver 230 that interacts and controls the hardware elements 240 of the device.


The DMPS 220 is signed and provisioned by the operating system. In some embodiments, the DMPS 220 is included in the operating system image installed on the device by the manufacturer. In other embodiments, the DMPS 220 is loaded on the device 110 after manufacture, such as from a DMPS download service 135, but is still digitally signed and provisioned using the operating system vendor certificates.


The DMPS 220 is used on the device 110 to install and manage the device management client certificates. The DMPS 220 may be implemented as a lightweight service, such as a daemon, that runs in the background or may be implemented as a device driver. In some embodiments, the DMPS 220 and certificate repository 250 run on the hardware security module 122. The combination of the DMPS 220 and the certificate repository 250 on the HSM 122 ensure tamper-proof handling of the certificates.


The operating system driver 230 interacts with the DMPS 220 to relay hardware setting changes to the hardware elements 240 of the device. Settings that may be altered using the operating system driver 230 include, but are not limited to display settings, network settings, power management settings, global positioning system (GPS) settings, audio settings, user account settings, user personalization settings, time settings, file management settings, system settings, security settings, camera settings, and barcode scanner/reader settings. In some embodiments, the operating system driver is provisioned by the operating system vendor by inclusion in the operating system image installed on the device.


The device management server 260 and the device management client 265 communicate using a proprietary protocol from the provider of the device management solution. The device management client 265 and the DMPS 220 interact through a cross process communication, such as remote procedure calls (RPC) or system calls such as input/output control (ioctl) using a device management application programming interface (API) 290 over a protocol.


The DMPS 220 and the operating system driver 230 interact through a device driver API over a protocol. The operating system driver 230 has the ability to directly change the settings of the hardware element 240.



FIG. 6A illustrates the communication flow between the device management client 265 and the DMPS 220. The device management client 265 first generates a digitally signed request to the DMPS 220 to change a hardware setting in a hardware element 240 (step 6A-1). The request is digitally signed using the device management client's digital certificate. The DMPS 220 retrieves the device management client's digital certificate from the certificate repository 250 (step 6A-2). The DMPS 220 then validates the digitally signed request using the retrieved device management client certificate (Step 6A-3). If validated, then the DMPS 220 sends the request to change the hardware setting to the operating system driver 230 (Step 6A-4) which then changes the setting of the hardware element 240 (step 6A-5). In some embodiments, the device management client 265 is authorized to access the operating system driver 230 directly (Step 6A-6) to effect a change in the setting of the hardware element (Step 6A-7). In this embodiment, the device management solution has the ability to change some hardware settings directly, i.e. native support to change some hardware settings, but has its abilities augmented to change additional hardware settings through the DMPS 220 that may not be natively supported.



FIG. 5B illustrates another embodiment of the present invention. The embodiment in FIG. 5B is similar to FIG. 5A with the exception that user accounts 280 and/or groups 285 have been included in the device management server 260. In this embodiment, the device management server 260 has user and/or group privileges defined that control the functions of the device management client 265 that are available to particular users or groups of users of the device management client 265.



FIG. 6B is similar to FIG. 6A in that it illustrates the communication flow between the device management client 265 and the DMPS 220, but FIG. 6B further illustrates the involvement of the user accounts 280 and/or groups 285. A user first logs into the device management client 265 on the device 110 (Step 6B-1). The device management client 265 then communicates with the device management server 260 to authenticate the login (Step 6B-2). If the user is validated, then the device management client 265 controls the device management client with which the user may interact according to the user's login and/or group credentials set at the device management server 260. The device management client functions controlled by the credentials include the ability of the user to generate hardware changes through the device management client. If permitted, the device management client 265 then generates a digitally signed request to the DMPS 220 to change a hardware setting in a hardware element 240 (step 6B-3). The request is digitally signed using the device management client's digital certificate. The DMPS 220 retrieves the device management client's digital certificate from the certificate repository 250 (step 6B-4). The DMPS 220 then validates the digitally signed request using the retrieved device management client certificate (Step 6B-5). If validated, then the DMPS 220 sends the request to change the hardware setting to the operating system driver 230 (Step 6B-6) which then changes the setting of the hardware element 240 (step 6B-7). In some embodiments, the device management client 265 is authorized to access the operating system driver 230 directly (Step 6B-8) to effect a change in the setting of the hardware element (Step 6B-9). In this embodiment, the device management solution has the ability to change some hardware settings directly, i.e. native support to change some hardware settings, but has its abilities augmented to change additional hardware settings through the DMPS 220 that may not be natively supported.



FIG. 5C illustrates another embodiment of the present invention. The embodiment in FIG. 5C is similar to FIG. 5B with the exception that in FIG. 5C the DMPS 220 is no longer running on the device 110 as in FIG. 5B but is now running on server 130 as a service over the network 160.



FIG. 5D illustrates another embodiment of the present invention. The embodiment in FIG. 5D is similar to FIG. 5C with the exception that in FIG. 5D the device management server 260 is no longer running on the device 110 as in FIG. 5C but is now running on server 150 as a service over the network 160.



FIG. 7 illustrates the initial provisioning process according to one embodiment of the present invention. In this embodiment, the DMPS 220 utilizes an open API that accepts incoming connections from any device management client 265 (Step 7-1). A device management client 265 is installed on the device 110, retrieves the device management client certificate from the device management server 260 (Step 7-2) which may be running on its own server 150 over the network 160, and attempts to communicate with the DMPS 220. Once the communication has been established between the DMPS 220 and the device management client 265, the device management client 265 sends the device management client certificate to the DMPS (Step 7-3). Once the device management client certificate has been received, the DMPS 220 stores it in the certificate repository 250 (Step 7-4). In this embodiment, the DMPS 220 has been programmed to close the open API once a device management client certificate has been provisioned and receive only incoming communications from that point on if they have been digitally signed with the device management certificate (Step 7-5). In other embodiments, the DMPS 220 is programmed to accept digital certificates from a pre-programmed number of different device management clients before closing the open API. In yet other embodiments, the DMPS 220 may continue to utilize the open API to accept incoming connections from any device management solution that may be installed on the device 110.


Several implementations have been described herein. However, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.


Additionally, the communication flows in the schematics of the figures do not require the particular order shown or sequential order to achieve the specified results. Further, other steps may be provided or eliminated from the schematics and other components may be added to or removed from the described systems. These other implementations are within the scope of the claims.


To supplement the present disclosure, this application incorporates entirely by reference the following commonly assigned patents, patent application publications, and patent applications:

  • U.S. Pat. Nos. 6,832,725; 7,128,266; 7,159,783; 7,413,127; 7,726,575; 8,294,969; 8,317,105; 8,322,622; 8,366,005; 8,371,507; 8,376,233; 8,381,979; 8,390,909; 8,408,464; 8,408,468; 8,408,469; 8,424,768; 8,448,863; 8,457,013; 8,459,557; 8,469,272; 8,474,712; 8,479,992; 8,490,877; 8,517,271; 8,523,076; 8,528,818; 8,544,737; 8,548,242; 8,548,420; 8,550,335; 8,550,354; 8,550,357; 8,556,174; 8,556,176; 8,556,177; 8,559,767; 8,599,957; 8,561,895; 8,561,903; 8,561,905; 8,565,107; 8,571,307; 8,579,200; 8,583,924; 8,584,945; 8,587,595; 8,587,697; 8,588,869; 8,590,789; 8,596,539; 8,596,542; 8,596,543; 8,599,271; 8,599,957; 8,600,158; 8,600,167; 8,602,309; 8,608,053; 8,608,071; 8,611,309; 8,615,487; 8,616,454; 8,621,123; 8,622,303; 8,628,013; 8,628,015; 8,628,016; 8,629,926; 8,630,491; 8,635,309; 8,636,200; 8,636,212; 8,636,215; 8,636,224; 8,638,806; 8,640,958; 8,640,960; 8,643,717; 8,646,692; 8,646,694; 8,657,200; 8,659,397; 8,668,149; 8,678,285; 8,678,286; 8,682,077; 8,687,282; 8,692,927; 8,695,880; 8,698,949; 8,717,494; 8,717,494; 8,720,783; 8,723,804; 8,723,904; 8,727,223; D702,237; 8,740,082; 8,740,085; 8,746,563; 8,750,445; 8,752,766; 8,756,059; 8,757,495; 8,760,563; 8,763,909; 8,777,108; 8,777,109; 8,779,898; 8,781,520; 8,783,573; 8,789,757; 8,789,758; 8,789,759; 8,794,520; 8,794,522; 8,794,526; 8,798,367; 8,807,431; 8,807,432; 8,820,630;
  • International Publication No. 2013/163789;
  • International Publication No. 2013/173985;
  • International Publication No. 2014/019130;
  • International Publication No. 2014/110495;
  • U.S. Patent Application Publication No. 2008/0185432;
  • U.S. Patent Application Publication No. 2009/0134221;
  • U.S. Patent Application Publication No. 2010/0177080;
  • U.S. Patent Application Publication No. 2010/0177076;
  • U.S. Patent Application Publication No. 2010/0177707;
  • U.S. Patent Application Publication No. 2010/0177749;
  • U.S. Patent Application Publication No. 2011/0202554;
  • U.S. Patent Application Publication No. 2012/0111946;
  • U.S. Patent Application Publication No. 2012/0138685;
  • U.S. Patent Application Publication No. 2012/0168511;
  • U.S. Patent Application Publication No. 2012/0168512;
  • U.S. Patent Application Publication No. 2012/0193423;
  • U.S. Patent Application Publication No. 2012/0203647;
  • U.S. Patent Application Publication No. 2012/0223141;
  • U.S. Patent Application Publication No. 2012/0228382;
  • U.S. Patent Application Publication No. 2012/0248188;
  • U.S. Patent Application Publication No. 2013/0043312;
  • U.S. Patent Application Publication No. 2013/0056285;
  • U.S. Patent Application Publication No. 2013/0070322;
  • U.S. Patent Application Publication No. 2013/0075168;
  • U.S. Patent Application Publication No. 2013/0082104;
  • U.S. Patent Application Publication No. 2013/0175341;
  • U.S. Patent Application Publication No. 2013/0175343;
  • U.S. Patent Application Publication No. 2013/0200158;
  • U.S. Patent Application Publication No. 2013/0256418;
  • U.S. Patent Application Publication No. 2013/0257744;
  • U.S. Patent Application Publication No. 2013/0257759;
  • U.S. Patent Application Publication No. 2013/0270346;
  • U.S. Patent Application Publication No. 2013/0278425;
  • U.S. Patent Application Publication No. 2013/0287258;
  • U.S. Patent Application Publication No. 2013/0292475;
  • U.S. Patent Application Publication No. 2013/0292477;
  • U.S. Patent Application Publication No. 2013/0293539;
  • U.S. Patent Application Publication No. 2013/0293540;
  • U.S. Patent Application Publication No. 2013/0306728;
  • U.S. Patent Application Publication No. 2013/0306730;
  • U.S. Patent Application Publication No. 2013/0306731;
  • U.S. Patent Application Publication No. 2013/0307964;
  • U.S. Patent Application Publication No. 2013/0308625;
  • U.S. Patent Application Publication No. 2013/0313324;
  • U.S. Patent Application Publication No. 2013/0313325;
  • U.S. Patent Application Publication No. 2013/0341399;
  • U.S. Patent Application Publication No. 2013/0342717;
  • U.S. Patent Application Publication No. 2014/0001267;
  • U.S. Patent Application Publication No. 2014/0002828;
  • U.S. Patent Application Publication No. 2014/0008430;
  • U.S. Patent Application Publication No. 2014/0008439;
  • U.S. Patent Application Publication No. 2014/0025584;
  • U.S. Patent Application Publication No. 2014/0027518;
  • U.S. Patent Application Publication No. 2014/0034734;
  • U.S. Patent Application Publication No. 2014/0036848;
  • U.S. Patent Application Publication No. 2014/0039693;
  • U.S. Patent Application Publication No. 2014/0042814;
  • U.S. Patent Application Publication No. 2014/0049120;
  • U.S. Patent Application Publication No. 2014/0049635;
  • U.S. Patent Application Publication No. 2014/0061305;
  • U.S. Patent Application Publication No. 2014/0061306;
  • U.S. Patent Application Publication No. 2014/0063289;
  • U.S. Patent Application Publication No. 2014/0066136;
  • U.S. Patent Application Publication No. 2014/0067692;
  • U.S. Patent Application Publication No. 2014/0070005;
  • U.S. Patent Application Publication No. 2014/0071840;
  • U.S. Patent Application Publication No. 2014/0074746;
  • U.S. Patent Application Publication No. 2014/0075846;
  • U.S. Patent Application Publication No. 2014/0076974;
  • U.S. Patent Application Publication No. 2014/0078341;
  • U.S. Patent Application Publication No. 2014/0078342;
  • U.S. Patent Application Publication No. 2014/0078345;
  • U.S. Patent Application Publication No. 2014/0084068;
  • U.S. Patent Application Publication No. 2014/0097249;
  • U.S. Patent Application Publication No. 2014/0098792;
  • U.S. Patent Application Publication No. 2014/0100774;
  • U.S. Patent Application Publication No. 2014/0100813;
  • U.S. Patent Application Publication No. 2014/0103115;
  • U.S. Patent Application Publication No. 2014/0104413;
  • U.S. Patent Application Publication No. 2014/0104414;
  • U.S. Patent Application Publication No. 2014/0104416;
  • U.S. Patent Application Publication No. 2014/0104451;
  • U.S. Patent Application Publication No. 2014/0106594;
  • U.S. Patent Application Publication No. 2014/0106725;
  • U.S. Patent Application Publication No. 2014/0108010;
  • U.S. Patent Application Publication No. 2014/0108402;
  • U.S. Patent Application Publication No. 2014/0108682;
  • U.S. Patent Application Publication No. 2014/0110485;
  • U.S. Patent Application Publication No. 2014/0114530;
  • U.S. Patent Application Publication No. 2014/0124577;
  • U.S. Patent Application Publication No. 2014/0124579;
  • U.S. Patent Application Publication No. 2014/0125842;
  • U.S. Patent Application Publication No. 2014/0125853;
  • U.S. Patent Application Publication No. 2014/0125999;
  • U.S. Patent Application Publication No. 2014/0129378;
  • U.S. Patent Application Publication No. 2014/0131438;
  • U.S. Patent Application Publication No. 2014/0131441;
  • U.S. Patent Application Publication No. 2014/0131443;
  • U.S. Patent Application Publication No. 2014/0131444;
  • U.S. Patent Application Publication No. 2014/0131445;
  • U.S. Patent Application Publication No. 2014/0131448;
  • U.S. Patent Application Publication No. 2014/0133379;
  • U.S. Patent Application Publication No. 2014/0136208;
  • U.S. Patent Application Publication No. 2014/0140585;
  • U.S. Patent Application Publication No. 2014/0151453;
  • U.S. Patent Application Publication No. 2014/0152882;
  • U.S. Patent Application Publication No. 2014/0158770;
  • U.S. Patent Application Publication No. 2014/0159869;
  • U.S. Patent Application Publication No. 2014/0160329;
  • U.S. Patent Application Publication No. 2014/0166755;
  • U.S. Patent Application Publication No. 2014/0166757;
  • U.S. Patent Application Publication No. 2014/0166759;
  • U.S. Patent Application Publication No. 2014/0166760;
  • U.S. Patent Application Publication No. 2014/0166761;
  • U.S. Patent Application Publication No. 2014/0168787;
  • U.S. Patent Application Publication No. 2014/0175165;
  • U.S. Patent Application Publication No. 2014/0175169;
  • U.S. Patent Application Publication No. 2014/0175172;
  • U.S. Patent Application Publication No. 2014/0175174;
  • U.S. Patent Application Publication No. 2014/0191644;
  • U.S. Patent Application Publication No. 2014/0191913;
  • U.S. Patent Application Publication No. 2014/0197238;
  • U.S. Patent Application Publication No. 2014/0197239;
  • U.S. Patent Application Publication No. 2014/0197304;
  • U.S. Patent Application Publication No. 2014/0203087;
  • U.S. Patent Application Publication No. 2014/0204268;
  • U.S. Patent Application Publication No. 2014/0214631;
  • U.S. Patent Application Publication No. 2014/0217166;
  • U.S. Patent Application Publication No. 2014/0217180;
  • U.S. patent application Ser. No. 13/367,978 for a Laser Scanning Module Employing an Elastomeric U-Hinge Based Laser Scanning Assembly, filed Feb. 7, 2012 (Feng et al.);
  • U.S. patent application Ser. No. 29/436,337 for an Electronic Device, filed Nov. 5, 2012 (Fitch et al.);
  • U.S. patent application Ser. No. 13/771,508 for an Optical Redirection Adapter, filed Feb. 20, 2013 (Anderson);
  • U.S. patent application Ser. No. 13/852,097 for a System and Method for Capturing and Preserving Vehicle Event Data, filed Mar. 28, 2013 (Barker et al.);
  • U.S. patent application Ser. No. 13/902,110 for a System and Method for Display of Information Using a Vehicle-Mount Computer, filed May 24, 2013 (Hollifield);
  • U.S. patent application Ser. No. 13/902,144, for a System and Method for Display of Information Using a Vehicle-Mount Computer, filed May 24, 2013 (Chamberlin);
  • U.S. patent application Ser. No. 13/902,242 for a System For Providing A Continuous Communication Link With A Symbol Reading Device, filed May 24, 2013 (Smith et al.);
  • U.S. patent application Ser. No. 13/912,262 for a Method of Error Correction for 3D Imaging Device, filed Jun. 7, 2013 (Jovanovski et al.);
  • U.S. patent application Ser. No. 13/912,702 for a System and Method for Reading Code Symbols at Long Range Using Source Power Control, filed Jun. 7, 2013 (Xian et al.);
  • U.S. patent application Ser. No. 29/458,405 for an Electronic Device, filed Jun. 19, 2013 (Fitch et al.);
  • U.S. patent application Ser. No. 13/922,339 for a System and Method for Reading Code Symbols Using a Variable Field of View, filed Jun. 20, 2013 (Xian et al.);
  • U.S. patent application Ser. No. 13/927,398 for a Code Symbol Reading System Having Adaptive Autofocus, filed Jun. 26, 2013 (Todeschini);
  • U.S. patent application Ser. No. 13/930,913 for a Mobile Device Having an Improved User Interface for Reading Code Symbols, filed Jun. 28, 2013 (Gelay et al.);
  • U.S. patent application Ser. No. 29/459,620 for an Electronic Device Enclosure, filed Jul. 2, 2013 (London et al.);
  • U.S. patent application Ser. No. 29/459,681 for an Electronic Device Enclosure, filed Jul. 2, 2013 (Chaney et al.);
  • U.S. patent application Ser. No. 13/933,415 for an Electronic Device Case, filed Jul. 2, 2013 (London et al.);
  • U.S. patent application Ser. No. 29/459,785 for a Scanner and Charging Base, filed Jul. 3, 2013 (Fitch et al.);
  • U.S. patent application Ser. No. 29/459,823 for a Scanner, filed Jul. 3, 2013 (Zhou et al.);
  • U.S. patent application Ser. No. 13/947,296 for a System and Method for Selectively Reading Code Symbols, filed Jul. 22, 2013 (Rueblinger et al.);
  • U.S. patent application Ser. No. 13/950,544 for a Code Symbol Reading System Having Adjustable Object Detection, filed Jul. 25, 2013 (Jiang);
  • U.S. patent application Ser. No. 13/961,408 for a Method for Manufacturing Laser Scanners, filed Aug. 7, 2013 (Saber et al.);
  • U.S. patent application Ser. No. 14/018,729 for a Method for Operating a Laser Scanner, filed Sep. 5, 2013 (Feng et al.);
  • U.S. patent application Ser. No. 14/019,616 for a Device Having Light Source to Reduce Surface Pathogens, filed Sep. 6, 2013 (Todeschini);
  • U.S. patent application Ser. No. 14/023,762 for a Handheld Indicia Reader Having Locking Endcap, filed Sep. 11, 2013 (Gannon);
  • U.S. patent application Ser. No. 14/035,474 for Augmented-Reality Signature Capture, filed Sep. 24, 2013 (Todeschini);
  • U.S. patent application Ser. No. 29/468,118 for an Electronic Device Case, filed Sep. 26, 2013 (Oberpriller et al.);
  • U.S. patent application Ser. No. 14/055,234 for Dimensioning System, filed Oct. 16, 2013 (Fletcher);
  • U.S. patent application Ser. No. 14/053,314 for Indicia Reader, filed Oct. 14, 2013 (Huck);
  • U.S. patent application Ser. No. 14/065,768 for Hybrid System and Method for Reading Indicia, filed Oct. 29, 2013 (Meier et al.);
  • U.S. patent application Ser. No. 14/074,746 for Self-Checkout Shopping System, filed Nov. 8, 2013 (Hejl et al.);
  • U.S. patent application Ser. No. 14/074,787 for Method and System for Configuring Mobile Devices via NFC Technology, filed Nov. 8, 2013 (Smith et al.);
  • U.S. patent application Ser. No. 14/087,190 for Optimal Range Indicators for Bar Code Validation, filed Nov. 22, 2013 (Hejl);
  • U.S. patent application Ser. No. 14/094,087 for Method and System for Communicating Information in an Digital Signal, filed Dec. 2, 2013 (Peake et al.);
  • U.S. patent application Ser. No. 14/101,965 for High Dynamic-Range Indicia Reading System, filed Dec. 10, 2013 (Xian);
  • U.S. patent application Ser. No. 14/150,393 for Indicia-reader Having Unitary Construction Scanner, filed Jan. 8, 2014 (Colavito et al.);
  • U.S. patent application Ser. No. 14/154,207 for Laser Barcode Scanner, filed Jan. 14, 2014 (Hou et al.);
  • U.S. patent application Ser. No. 14/165,980 for System and Method for Measuring Irregular Objects with a Single Camera filed Jan. 28, 2014 (Li et al.);
  • U.S. patent application Ser. No. 14/166,103 for Indicia Reading Terminal Including Optical Filter filed Jan. 28, 2014 (Lu et al.);
  • U.S. patent application Ser. No. 14/200,405 for Indicia Reader for Size-Limited Applications filed Mar. 7, 2014 (Feng et al.);
  • U.S. patent application Ser. No. 14/231,898 for Hand-Mounted Indicia-Reading Device with Finger Motion Triggering filed Apr. 1, 2014 (Van Horn et al.);
  • U.S. patent application Ser. No. 14/250,923 for Reading Apparatus Having Partial Frame Operating Mode filed Apr. 11, 2014, (Deng et al.);
  • U.S. patent application Ser. No. 14/257,174 for Imaging Terminal Having Data Compression filed Apr. 21, 2014, (Barber et al.);
  • U.S. patent application Ser. No. 14/257,364 for Docking System and Method Using Near Field Communication filed Apr. 21, 2014 (Showering);
  • U.S. patent application Ser. No. 14/264,173 for Autofocus Lens System for Indicia Readers filed Apr. 29, 2014 (Ackley et al.);
  • U.S. patent application Ser. No. 14/274,858 for Mobile Printer with Optional Battery Accessory filed May 12, 2014 (Marty et al.);
  • U.S. patent application Ser. No. 14/277,337 for MULTIPURPOSE OPTICAL READER, filed May 14, 2014 (Jovanovski et al.);
  • U.S. patent application Ser. No. 14/283,282 for TERMINAL HAVING ILLUMINATION AND FOCUS CONTROL filed May 21, 2014 (Liu et al.);
  • U.S. patent application Ser. No. 14/300,276 for METHOD AND SYSTEM FOR CONSIDERING INFORMATION ABOUT AN EXPECTED RESPONSE WHEN PERFORMING SPEECH RECOGNITION, filed Jun. 10, 2014 (Braho et al.);
  • U.S. patent application Ser. No. 14/305,153 for INDICIA READING SYSTEM EMPLOYING DIGITAL GAIN CONTROL filed Jun. 16, 2014 (Xian et al.);
  • U.S. patent application Ser. No. 14/310,226 for AUTOFOCUSING OPTICAL IMAGING DEVICE filed Jun. 20, 2014 (Koziol et al.);
  • U.S. patent application Ser. No. 14/327,722 for CUSTOMER FACING IMAGING SYSTEMS AND METHODS FOR OBTAINING IMAGES filed Jul. 10, 2014 (Oberpriller et al);
  • U.S. patent application Ser. No. 14/327,827 for a MOBILE-PHONE ADAPTER FOR ELECTRONIC TRANSACTIONS, filed Jul. 10, 2014 (Hejl);
  • U.S. patent application Ser. No. 14/329,303 for CELL PHONE READING MODE USING IMAGE TIMER filed Jul. 11, 2014 (Coyle);
  • U.S. patent application Ser. No. 14/333,588 for SYMBOL READING SYSTEM WITH INTEGRATED SCALE BASE filed Jul. 17, 2014 (Barten);
  • U.S. patent application Ser. No. 14/334,934 for a SYSTEM AND METHOD FOR INDICIA VERIFICATION, filed Jul. 18, 2014 (Hejl);
  • U.S. patent application Ser. No. 14/336,188 for METHOD OF AND SYSTEM FOR DETECTING OBJECT WEIGHING INTERFERENCES, Filed Jul. 21, 2014 (Amundsen et al.);
  • U.S. patent application Ser. No. 14/339,708 for LASER SCANNING CODE SYMBOL READING SYSTEM, filed Jul. 24, 2014 (Xian et al.);
  • U.S. patent application Ser. No. 14/340,627 for an AXIALLY REINFORCED FLEXIBLE SCAN ELEMENT, filed Jul. 25, 2014 (Rueblinger et al.);
  • U.S. patent application Ser. No. 14/340,716 for an OPTICAL IMAGER AND METHOD FOR CORRELATING A MEDICATION PACKAGE WITH A PATIENT, filed Jul. 25, 2014 (Ellis);
  • U.S. patent application Ser. No. 14/342,544 for Imaging Based Barcode Scanner Engine with Multiple Elements Supported on a Common Printed Circuit Board filed Mar. 4, 2014 (Liu et al.);
  • U.S. patent application Ser. No. 14/345,735 for Optical Indicia Reading Terminal with Combined Illumination filed Mar. 19, 2014 (Ouyang);
  • U.S. patent application Ser. No. 14/336,188 for METHOD OF AND SYSTEM FOR DETECTING OBJECT WEIGHING INTERFERENCES, Filed Jul. 21, 2014 (Amundsen et al.);
  • U.S. patent application Ser. No. 14/355,613 for Optical Indicia Reading Terminal with Color Image Sensor filed May 1, 2014 (Lu et al.);
  • U.S. patent application Ser. No. 14/370,237 for WEB-BASED SCAN-TASK ENABLED SYSTEM AND METHOD OF AND APPARATUS FOR DEVELOPING AND DEPLOYING THE SAME ON A CLIENT-SERVER NETWORK filed Jul. 2, 2014 (Chen et al.);
  • U.S. patent application Ser. No. 14/370,267 for INDUSTRIAL DESIGN FOR CONSUMER DEVICE BASED SCANNING AND MOBILITY, filed Jul. 2, 2014 (Ma et al.);
  • U.S. patent application Ser. No. 14/376,472, for an ENCODED INFORMATION READING TERMINAL INCLUDING HTTP SERVER, filed Aug. 4, 2014 (Lu);
  • U.S. patent application Ser. No. 14/379,057 for METHOD OF USING CAMERA SENSOR INTERFACE TO TRANSFER MULTIPLE CHANNELS OF SCAN DATA USING AN IMAGE FORMAT filed Aug. 15, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/452,697 for INTERACTIVE INDICIA READER, filed Aug. 6, 2014 (Todeschini);
  • U.S. patent application Ser. No. 14/453,019 for DIMENSIONING SYSTEM WITH GUIDED ALIGNMENT, filed Aug. 6, 2014 (Li et al.);
  • U.S. patent application Ser. No. 14/460,387 for APPARATUS FOR DISPLAYING BAR CODES FROM LIGHT EMITTING DISPLAY SURFACES filed Aug. 15, 2014 (Van Horn et al.);
  • U.S. patent application Ser. No. 14/460,829 for ENCODED INFORMATION READING TERMINAL WITH WIRELESS PATH SELECTION CAPABILITY, filed Aug. 15, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/462,801 for MOBILE COMPUTING DEVICE WITH DATA COGNITION SOFTWARE, filed on Aug. 19, 2014 (Todeschini et al.);
  • U.S. patent application Ser. No. 14/446,387 for INDICIA READING TERMINAL PROCESSING PLURALITY OF FRAMES OF IMAGE DATA RESPONSIVELY TO TRIGGER SIGNAL ACTIVATION filed Jul. 30, 2014 (Wang et al.);
  • U.S. patent application Ser. No. 14/446,391 for MULTIFUNCTION POINT OF SALE APPARATUS WITH OPTICAL SIGNATURE CAPTURE filed Jul. 30, 2014 (Good et al.);
  • U.S. patent application Ser. No. 29/486,759 for an Imaging Terminal, filed Apr. 2, 2014 (Oberpriller et al.);
  • U.S. patent application Ser. No. 29/492,903 for an INDICIA SCANNER, filed Jun. 4, 2014 (Zhou et al.); and
  • U.S. patent application Ser. No. 29/494,725 for an IN-COUNTER BARCODE SCANNER, filed Jun. 24, 2014 (Oberpriller et al.).

Claims
  • 1. A device, comprising: a first software module;a second software module;a third software module;at least one hardware processor; andmemory storing hardware settings related to at least one hardware element and the first and second software modules executable by the at least one hardware processor to:cause the first software module to transmit a first digitally signed request to the second software module,cause the second software module to validate the first digitally signed request received from the first software module by retrieving a digital certificate associated with the first software module from a repository, wherein the first digitally signed request is validated based on the retrieved digital certificate associated with the first software module,in response to validating the digitally signed request, causing the second software module to generate and transmit a second digitally signed request, to change the hardware settings, to the third software module, wherein the second software module is signed by the third software module using one or more certificates associated with the third software module, andcause the third software module to change the hardware settings in response to the receipt of the second digitally signed request.
  • 2. The device of claim 1, wherein the first software module is an application.
  • 3. The device of claim 2, wherein the application is a device management solution.
  • 4. The device of claim 1, wherein the second software module is a device management proxy service and the third software module is an operating system installed on the device.
  • 5. The device of claim 4, wherein the device management proxy service is embedded in a device driver.
  • 6. The device of claim 4, wherein the device management proxy service is embedded in a hardware security module (HSM).
  • 7. The device of claim 1, wherein the first and second software modules interact through a cross-process communication using a device management application programming interface (API) over a protocol.
  • 8. The device of claim 7, wherein the cross-process communication is one of a group consisting of: remote procedure calls (RPC), system calls, and input/output control (ioctl).
  • 9. The device of claim 1, wherein the access to the first software module is dependent upon at least one of user privileges and group privileges.
  • 10. The device of claim 1, wherein the hardware settings are display settings, network settings, power management settings, global positioning system (GPS) settings, audio settings, user account settings, user personalization settings, time settings, file management settings, system settings, security settings, camera settings, and barcode scanner/reader settings.
  • 11. The device of claim 1, wherein the first software module, the second software module, and the third software module are installed in the device.
US Referenced Citations (414)
Number Name Date Kind
6275851 Cromer et al. Aug 2001 B1
6683954 Searle Jan 2004 B1
6789135 Yamamoto et al. Sep 2004 B1
6832725 Gardiner et al. Dec 2004 B2
7128266 Zhu et al. Oct 2006 B2
7159783 Walczyk et al. Jan 2007 B2
7213152 Gafken et al. May 2007 B1
7413127 Ehrhart et al. Aug 2008 B2
7726575 Wang et al. Jun 2010 B2
8073935 Viswanath Dec 2011 B2
8294969 Plesko Oct 2012 B2
8317105 Kotlarsky et al. Nov 2012 B2
8322622 Liu Dec 2012 B2
8366005 Kotlarsky et al. Feb 2013 B2
8371507 Haggerty et al. Feb 2013 B2
8376233 Horn et al. Feb 2013 B2
8381979 Franz Feb 2013 B2
8390909 Plesko Mar 2013 B2
8408464 Zhu et al. Apr 2013 B2
8408468 Van et al. Apr 2013 B2
8408469 Good Apr 2013 B2
8424768 Rueblinger et al. Apr 2013 B2
8448863 Xian et al. May 2013 B2
8457013 Essinger et al. Jun 2013 B2
8490877 Kearney Jul 2013 B2
8528818 Ehrhart et al. Sep 2013 B2
8544737 Gomez et al. Oct 2013 B2
8548420 Grunow et al. Oct 2013 B2
8550335 Samek et al. Oct 2013 B2
8550354 Gannon et al. Oct 2013 B2
8550357 Kearney Oct 2013 B2
8556174 Kosecki et al. Oct 2013 B2
8556176 Van et al. Oct 2013 B2
8556177 Hussey et al. Oct 2013 B2
8559767 Barber et al. Oct 2013 B2
8561895 Gomez et al. Oct 2013 B2
8561903 Sauerwein, Jr. Oct 2013 B2
8561905 Edmonds et al. Oct 2013 B2
8565107 Pease et al. Oct 2013 B2
8571307 Li et al. Oct 2013 B2
8579200 Samek et al. Nov 2013 B2
8583924 Caballero et al. Nov 2013 B2
8584945 Wang et al. Nov 2013 B2
8587595 Wang Nov 2013 B2
8587697 Hussey et al. Nov 2013 B2
8588869 Sauerwein et al. Nov 2013 B2
8590789 Nahill et al. Nov 2013 B2
8596539 Havens et al. Dec 2013 B2
8596542 Havens et al. Dec 2013 B2
8596543 Havens et al. Dec 2013 B2
8599271 Havens et al. Dec 2013 B2
8599957 Peake et al. Dec 2013 B2
8600158 Li et al. Dec 2013 B2
8600167 Showering Dec 2013 B2
8602309 Longacre et al. Dec 2013 B2
8608053 Meier et al. Dec 2013 B2
8608071 Liu et al. Dec 2013 B2
8611309 Wang et al. Dec 2013 B2
8615487 Gomez et al. Dec 2013 B2
8621123 Caballero Dec 2013 B2
8622303 Meier et al. Jan 2014 B2
8628013 Ding Jan 2014 B2
8628015 Wang et al. Jan 2014 B2
8628016 Winegar Jan 2014 B2
8629926 Wang Jan 2014 B2
8630491 Longacre et al. Jan 2014 B2
8635309 Berthiaume et al. Jan 2014 B2
8636200 Kearney Jan 2014 B2
8636212 Nahill et al. Jan 2014 B2
8636215 Ding et al. Jan 2014 B2
8636224 Wang Jan 2014 B2
8638806 Wang et al. Jan 2014 B2
8640958 Lu et al. Feb 2014 B2
8640960 Wang et al. Feb 2014 B2
8643717 Li et al. Feb 2014 B2
8646692 Meier et al. Feb 2014 B2
8646694 Wang et al. Feb 2014 B2
8657200 Ren et al. Feb 2014 B2
8659397 Vargo et al. Feb 2014 B2
8668149 Good Mar 2014 B2
8678285 Kearney Mar 2014 B2
8678286 Smith et al. Mar 2014 B2
8682077 Longacre, Jr. Mar 2014 B1
D702237 Oberpriller et al. Apr 2014 S
8687282 Feng et al. Apr 2014 B2
8692927 Pease et al. Apr 2014 B2
8695880 Bremer et al. Apr 2014 B2
8702000 Barber et al. Apr 2014 B2
8717494 Gannon May 2014 B2
8720783 Biss et al. May 2014 B2
8723804 Fletcher et al. May 2014 B2
8723904 Marty et al. May 2014 B2
8727223 Wang May 2014 B2
8736909 Sato et al. May 2014 B2
8740082 Wilz, Sr. Jun 2014 B2
8740085 Furlong et al. Jun 2014 B2
8746563 Hennick et al. Jun 2014 B2
8750445 Peake et al. Jun 2014 B2
8752766 Xian et al. Jun 2014 B2
8756059 Braho et al. Jun 2014 B2
8757495 Qu et al. Jun 2014 B2
8760563 Koziol et al. Jun 2014 B2
8763909 Reed et al. Jul 2014 B2
8777108 Coyle Jul 2014 B2
8777109 Oberpriller et al. Jul 2014 B2
8779898 Havens et al. Jul 2014 B2
8781520 Payne et al. Jul 2014 B2
8783573 Havens et al. Jul 2014 B2
8789757 Barten Jul 2014 B2
8789758 Hawley et al. Jul 2014 B2
8789759 Xian et al. Jul 2014 B2
8794520 Wang et al. Aug 2014 B2
8794522 Ehrhart Aug 2014 B2
8794526 Wang et al. Aug 2014 B2
8798367 Ellis Aug 2014 B2
8807431 Wang et al. Aug 2014 B2
8807432 Van et al. Aug 2014 B2
8820630 Qu et al. Sep 2014 B2
8824692 Sheerin et al. Sep 2014 B2
8824696 Braho Sep 2014 B2
8842849 Wahl et al. Sep 2014 B2
8844822 Kotlarsky et al. Sep 2014 B2
D716285 Chaney et al. Oct 2014 S
8851383 Yeakley et al. Oct 2014 B2
8868421 Braho et al. Oct 2014 B2
8868519 Maloy et al. Oct 2014 B2
8868802 Barten Oct 2014 B2
8868803 Caballero Oct 2014 B2
8870074 Gannon Oct 2014 B1
8879639 Sauerwein, Jr. Nov 2014 B2
8880426 Smith Nov 2014 B2
8881983 Havens et al. Nov 2014 B2
8881987 Wang Nov 2014 B2
8908995 Benos et al. Dec 2014 B2
8910870 Li et al. Dec 2014 B2
8914290 Hendrickson et al. Dec 2014 B2
8914788 Pettinelli et al. Dec 2014 B2
8915444 Havens et al. Dec 2014 B2
8918250 Hollifield Dec 2014 B2
8939374 Jovanovski et al. Jan 2015 B2
8942480 Ellis Jan 2015 B2
8944313 Williams et al. Feb 2015 B2
8944332 Harding et al. Feb 2015 B2
8950678 Germaine et al. Feb 2015 B2
D723560 Zhou et al. Mar 2015 S
8971346 Sevier Mar 2015 B2
8976368 El et al. Mar 2015 B2
8978981 Guan Mar 2015 B2
8978983 Bremer et al. Mar 2015 B2
8978984 Hennick et al. Mar 2015 B2
8985456 Zhu et al. Mar 2015 B2
8985459 Kearney et al. Mar 2015 B2
8985461 Gelay et al. Mar 2015 B2
8988578 Showering Mar 2015 B2
8988590 Gillet et al. Mar 2015 B2
8991704 Hopper et al. Mar 2015 B2
8996194 Davis et al. Mar 2015 B2
8996384 Funyak et al. Mar 2015 B2
9015513 Murawski et al. Apr 2015 B2
D730357 Fitch et al. May 2015 S
9030964 Essinger et al. May 2015 B2
9036054 Koziol et al. May 2015 B2
9037344 Chamberlin May 2015 B2
9038911 Xian et al. May 2015 B2
9038915 Smith May 2015 B2
D730901 Oberpriller et al. Jun 2015 S
D730902 Fitch et al. Jun 2015 S
D733112 Chaney et al. Jun 2015 S
9047098 Barten Jun 2015 B2
9047420 Caballero Jun 2015 B2
9047531 Showering et al. Jun 2015 B2
9049640 Wang et al. Jun 2015 B2
9053055 Caballero Jun 2015 B2
9053378 Hou et al. Jun 2015 B1
9057641 Amundsen et al. Jun 2015 B2
9058526 Powilleit Jun 2015 B2
9064167 Xian et al. Jun 2015 B2
9064254 Todeschini et al. Jun 2015 B2
9070032 Corcoran Jun 2015 B2
D734339 Zhou et al. Jul 2015 S
D734751 Oberpriller et al. Jul 2015 S
9082023 Feng et al. Jul 2015 B2
20020048369 Ginter et al. Apr 2002 A1
20020181641 Wingen Dec 2002 A1
20050039016 Aissi et al. Feb 2005 A1
20070063048 Havens et al. Mar 2007 A1
20080126740 Wrighton May 2008 A1
20080183896 Carlson et al. Jul 2008 A1
20080184060 Carlson et al. Jul 2008 A1
20080185432 Caballero et al. Aug 2008 A1
20080298589 Katar et al. Dec 2008 A1
20090134221 Zhu et al. May 2009 A1
20090221267 Bender et al. Sep 2009 A1
20090238367 Pinder Sep 2009 A1
20100177076 Essinger et al. Jul 2010 A1
20100177080 Essinger et al. Jul 2010 A1
20100177707 Essinger et al. Jul 2010 A1
20100177749 Essinger et al. Jul 2010 A1
20110161672 Martinez et al. Jun 2011 A1
20110169999 Grunow et al. Jul 2011 A1
20110202554 Powilleit et al. Aug 2011 A1
20120054877 Rosu Mar 2012 A1
20120111946 Golant May 2012 A1
20120138685 Qu et al. Jun 2012 A1
20120168511 Kotlarsky et al. Jul 2012 A1
20120168512 Kotlarsky et al. Jul 2012 A1
20120193423 Samek Aug 2012 A1
20120203647 Smith Aug 2012 A1
20120223141 Good et al. Sep 2012 A1
20120228382 Havens et al. Sep 2012 A1
20120248188 Kearney Oct 2012 A1
20120284702 Ganapathy Nov 2012 A1
20130043312 Van Horn Feb 2013 A1
20130056285 Meagher Mar 2013 A1
20130070322 Fritz et al. Mar 2013 A1
20130075168 Amundsen et al. Mar 2013 A1
20130082104 Kearney et al. Apr 2013 A1
20130175341 Kearney et al. Jul 2013 A1
20130175343 Good Jul 2013 A1
20130179676 Hamid Jul 2013 A1
20130200158 Feng et al. Aug 2013 A1
20130254542 Buer Sep 2013 A1
20130256418 Havens et al. Oct 2013 A1
20130257744 Daghigh et al. Oct 2013 A1
20130257759 Daghigh Oct 2013 A1
20130270346 Xian et al. Oct 2013 A1
20130278425 Cunningham et al. Oct 2013 A1
20130287258 Kearney Oct 2013 A1
20130292475 Kotlarsky et al. Nov 2013 A1
20130292477 Hennick et al. Nov 2013 A1
20130293539 Hunt et al. Nov 2013 A1
20130293540 Laffargue et al. Nov 2013 A1
20130306728 Thuries et al. Nov 2013 A1
20130306730 Brady et al. Nov 2013 A1
20130306731 Pedrao Nov 2013 A1
20130307964 Bremer et al. Nov 2013 A1
20130308625 Park et al. Nov 2013 A1
20130313324 Koziol et al. Nov 2013 A1
20130313325 Wilz et al. Nov 2013 A1
20130341399 Xian et al. Dec 2013 A1
20130342717 Havens et al. Dec 2013 A1
20140001267 Giordano et al. Jan 2014 A1
20140002828 Laffargue et al. Jan 2014 A1
20140008430 Soule et al. Jan 2014 A1
20140008439 Wang Jan 2014 A1
20140025584 Liu et al. Jan 2014 A1
20140027518 Edmonds et al. Jan 2014 A1
20140031024 Xie Jan 2014 A1
20140034734 Sauerwein, Jr. Feb 2014 A1
20140036848 Pease et al. Feb 2014 A1
20140039693 Havens et al. Feb 2014 A1
20140042814 Kather et al. Feb 2014 A1
20140044265 Kocher Feb 2014 A1
20140049120 Kohtz et al. Feb 2014 A1
20140049635 Laffargue et al. Feb 2014 A1
20140061305 Nahill et al. Mar 2014 A1
20140061306 Wu et al. Mar 2014 A1
20140063289 Hussey et al. Mar 2014 A1
20140066136 Sauerwein et al. Mar 2014 A1
20140067692 Ye et al. Mar 2014 A1
20140070005 Nahill et al. Mar 2014 A1
20140071840 Venancio Mar 2014 A1
20140074746 Wang Mar 2014 A1
20140075846 Woodburn Mar 2014 A1
20140076974 Havens et al. Mar 2014 A1
20140078341 Havens et al. Mar 2014 A1
20140078342 Li et al. Mar 2014 A1
20140078345 Showering Mar 2014 A1
20140084068 Gillet et al. Mar 2014 A1
20140097249 Gomez et al. Apr 2014 A1
20140098792 Wang et al. Apr 2014 A1
20140100774 Showering Apr 2014 A1
20140100813 Showering Apr 2014 A1
20140103115 Meier et al. Apr 2014 A1
20140104413 McCloskey et al. Apr 2014 A1
20140104414 McCloskey et al. Apr 2014 A1
20140104416 Giordano et al. Apr 2014 A1
20140104451 Todeschini et al. Apr 2014 A1
20140106594 Skvoretz Apr 2014 A1
20140106725 Sauerwein, Jr. Apr 2014 A1
20140108010 Maltseff et al. Apr 2014 A1
20140108402 Gomez et al. Apr 2014 A1
20140108682 Caballero Apr 2014 A1
20140110485 Toa et al. Apr 2014 A1
20140114530 Fitch et al. Apr 2014 A1
20140121438 Long et al. May 2014 A1
20140121445 Fontenot et al. May 2014 A1
20140124577 Wang et al. May 2014 A1
20140124579 Ding May 2014 A1
20140125842 Winegar May 2014 A1
20140125853 Wang May 2014 A1
20140125999 Longacre et al. May 2014 A1
20140129378 Richardson May 2014 A1
20140131438 Kearney May 2014 A1
20140131441 Nahill et al. May 2014 A1
20140131443 Smith May 2014 A1
20140131444 Wang May 2014 A1
20140131445 Ding et al. May 2014 A1
20140131448 Xian et al. May 2014 A1
20140133379 Wang et al. May 2014 A1
20140136208 Maltseff et al. May 2014 A1
20140140585 Wang May 2014 A1
20140151453 Meier et al. Jun 2014 A1
20140152882 Samek et al. Jun 2014 A1
20140158770 Sevier et al. Jun 2014 A1
20140159869 Zumsteg et al. Jun 2014 A1
20140160329 Ren et al. Jun 2014 A1
20140166755 Liu et al. Jun 2014 A1
20140166757 Smith Jun 2014 A1
20140166759 Liu et al. Jun 2014 A1
20140166760 Meier et al. Jun 2014 A1
20140166761 Todeschini et al. Jun 2014 A1
20140168787 Wang et al. Jun 2014 A1
20140175165 Havens et al. Jun 2014 A1
20140175169 Kosecki et al. Jun 2014 A1
20140175172 Jovanovski et al. Jun 2014 A1
20140175174 Barber et al. Jun 2014 A1
20140191644 Chaney Jul 2014 A1
20140191913 Ge et al. Jul 2014 A1
20140197238 Liu et al. Jul 2014 A1
20140197239 Havens et al. Jul 2014 A1
20140197304 Feng et al. Jul 2014 A1
20140203087 Smith et al. Jul 2014 A1
20140204268 Grunow et al. Jul 2014 A1
20140214631 Hansen Jul 2014 A1
20140217166 Berthiaume et al. Aug 2014 A1
20140217180 Liu Aug 2014 A1
20140231500 Ehrhart et al. Aug 2014 A1
20140232930 Anderson Aug 2014 A1
20140247315 Marty et al. Sep 2014 A1
20140258362 Komatsu Sep 2014 A1
20140263493 Amurgis et al. Sep 2014 A1
20140263645 Smith et al. Sep 2014 A1
20140270196 Braho et al. Sep 2014 A1
20140270229 Braho Sep 2014 A1
20140278387 Digregorio Sep 2014 A1
20140282210 Bianconi Sep 2014 A1
20140284384 Lu et al. Sep 2014 A1
20140288933 Braho et al. Sep 2014 A1
20140297058 Barker et al. Oct 2014 A1
20140299665 Barber et al. Oct 2014 A1
20140312121 Lu et al. Oct 2014 A1
20140319220 Coyle Oct 2014 A1
20140319221 Oberpriller et al. Oct 2014 A1
20140326787 Barten Nov 2014 A1
20140331279 Aissi Nov 2014 A1
20140332590 Wang et al. Nov 2014 A1
20140344943 Todeschini et al. Nov 2014 A1
20140346233 Liu et al. Nov 2014 A1
20140351317 Smith et al. Nov 2014 A1
20140353373 Van et al. Dec 2014 A1
20140361073 Qu et al. Dec 2014 A1
20140361082 Xian et al. Dec 2014 A1
20140362184 Jovanovski et al. Dec 2014 A1
20140363015 Braho Dec 2014 A1
20140369511 Sheerin et al. Dec 2014 A1
20140374483 Lu Dec 2014 A1
20140374485 Xian et al. Dec 2014 A1
20140380031 Jones Dec 2014 A1
20150001301 Ouyang Jan 2015 A1
20150001304 Todeschini Jan 2015 A1
20150003673 Fletcher Jan 2015 A1
20150009338 Laffargue et al. Jan 2015 A1
20150009610 London et al. Jan 2015 A1
20150014416 Kotlarsky et al. Jan 2015 A1
20150021397 Rueblinger et al. Jan 2015 A1
20150028102 Ren et al. Jan 2015 A1
20150028103 Jiang Jan 2015 A1
20150028104 Ma et al. Jan 2015 A1
20150029002 Yeakley et al. Jan 2015 A1
20150032709 Maloy et al. Jan 2015 A1
20150039309 Braho et al. Feb 2015 A1
20150040378 Saber et al. Feb 2015 A1
20150048168 Fritz et al. Feb 2015 A1
20150049347 Laffargue et al. Feb 2015 A1
20150051992 Smith Feb 2015 A1
20150053766 Havens et al. Feb 2015 A1
20150053768 Wang et al. Feb 2015 A1
20150053769 Thuries et al. Feb 2015 A1
20150062366 Liu et al. Mar 2015 A1
20150063215 Wang Mar 2015 A1
20150063676 Lloyd et al. Mar 2015 A1
20150069130 Gannon Mar 2015 A1
20150071818 Scheuren et al. Mar 2015 A1
20150083800 Li et al. Mar 2015 A1
20150086114 Todeschini Mar 2015 A1
20150088522 Hendrickson et al. Mar 2015 A1
20150096872 Woodburn Apr 2015 A1
20150099557 Pettinelli et al. Apr 2015 A1
20150100196 Hollifield Apr 2015 A1
20150102109 Huck Apr 2015 A1
20150115035 Meier et al. Apr 2015 A1
20150127791 Kosecki et al. May 2015 A1
20150128116 Chen et al. May 2015 A1
20150129659 Feng et al. May 2015 A1
20150133047 Smith et al. May 2015 A1
20150134470 Hejl et al. May 2015 A1
20150136851 Harding et al. May 2015 A1
20150136854 Lu et al. May 2015 A1
20150142492 Kumar May 2015 A1
20150144692 Hejl May 2015 A1
20150144698 Teng et al. May 2015 A1
20150144701 Xian et al. May 2015 A1
20150149946 Benos et al. May 2015 A1
20150161429 Xian Jun 2015 A1
20150169925 Chen et al. Jun 2015 A1
20150169929 Williams et al. Jun 2015 A1
20150186703 Chen et al. Jul 2015 A1
20150193644 Kearney et al. Jul 2015 A1
20150193645 Colavito et al. Jul 2015 A1
20150199957 Funyak et al. Jul 2015 A1
20150204671 Showering Jul 2015 A1
20150222604 Ylonen Aug 2015 A1
20170302441 Temple Oct 2017 A1
Foreign Referenced Citations (4)
Number Date Country
2013163789 Nov 2013 WO
2013173985 Nov 2013 WO
2014019130 Feb 2014 WO
2014110495 Jul 2014 WO
Non-Patent Literature Citations (90)
Entry
Fiberlink, “MaaS360 Mobile Device Management (MDM)—Administrators Guide”, MaaS360 by Fiberlink, Published Apr. 2014 (Year: 2014).
U.S. Appl. No. 29/523,098 for Handle for a Tablet Computer filed Apr. 7, 2015 (Bidwell et al.); 17 pages.
U.S. Appl. No. 29/524,186 for Scanner filed Apr. 17, 2015 (Zhou et al.); 17 pages.
U.S. Appl. No. 29/525,068 for Tablet Computer With Removable Scanning Device filed Apr. 27, 2015 (Schulte et al.); 19 pages.
U.S. Appl. No. 29/526,918 for Charging Base filed May 14, 2015 (Fitch et al.); 10 pages.
U.S. Appl. No. 29/528,165 for In-Counter Barcode Scanner filed May 27, 2015 (Oberpriller et al.); 13 pages.
U.S. Appl. No. 29/528,590 for Electronic Device filed May 29, 2015 (Fitch et al.); 9 pages.
U.S. Appl. No. 29/528,890 for Mobile Computer Housing filed Jun. 2, 2015 (Fitch et al.); 61 pages.
U.S. Appl. No. 29/529,441 for Indicia Reading Device filed Jun. 8, 2015 (Zhou et al.); 14 pages.
U.S. Appl. No. 29/530,600 for Cyclone filed Jun. 18, 2015 (Vargo et al); 16 pages.
U.S. Patent Application for a Device Having Light Source to Reduce Surface Pathogens, filed Sep. 6, 2013 (Todeschini), U.S. Appl. No. 14/019,616.
U.S. Patent Application for a Handheld Indicia Reader Having Locking Endcap, filed Sep. 11, 2013 (Gannon), U.S. Appl. No. 14/023,762.
U.S. Patent Application for a Laser Scanning Module Employing an Elastomeric U-Hinge Based Laser Scanning Assembly, filed Feb. 7, 2012 (Feng et al.), U.S. Appl. No. 13/367,978.
U.S. Patent Application for a Mobile-Phone Adapter for Electronic Transactions, filed Jul. 10, 2014 (Hejl), U.S. Appl. No. 14/327,827.
U.S. Patent Application for a System and Method for Indicia Verification, filed Jul. 18, 2014 (Hejl), U.S. Appl. No. 14/334,934.
U.S. Patent Application for an Axially Reinforced Flexible Scan Element, filed Jul. 25, 2014 (Reublinger et al.); 41 pages, U.S. Appl. No. 14/340,627.
U.S. Patent Application for Autofocus Lens System for Indicia Readers filed Apr. 29, 2014 (Ackley et al.), U.S. Appl. No. 14/264,173.
U.S. Patent Application for Dimensioning System With Guided Alignment, filed Aug. 6, 2014 (Li et al.), U.S. Appl. No. 14/453,019.
U.S. Patent Application for Docking System and Method Using Near Field Communication filed Apr. 21, 2014 (Showering), U.S. Appl. No. 14/257,364.
U.S. Patent Application for Hand-Mounted Indicia-Reading Device with Finger Motion Triggering filed Apr. 1, 2014 (Van Horn et al.), U.S. Appl. No. 14/231,898.
U.S. Patent Application for Indicia Reader for Size-Limited Applications filed Mar. 7, 2014 (Feng et al.), U.S. Appl. No. 14/200,405.
U.S. Patent Application for Interactive Indicia Reader, filed Aug. 6, 2014 (Todeschini), U.S. Appl. No. 14/452,697.
U.S. Patent Application for Mobile Computing Device With Data Cognition Software, filed on Aug. 19, 2014 (Todeschini et al.), U.S. Appl. No. 14/462,801.
U.S. Patent Application for Multifunction Point of Sale Apparatus With Optical Signature Capture filed Jul. 30, 2014 (Good et al.), U.S. Appl. No. 14/446,391.
U.S. Patent Application for Multipurpose Optical Reader, filed May 14, 2014 (Jovanovski et al.); 59 pages; now abandoned., U.S. Appl. No. 14/277,337.
U.S. Patent Application for System and Method for Measuring Irregular Objects with a Single Camera filed Jan. 28, 2014 (Li et al.), U.S. Appl. No. 14/165,980.
U.S. Patent Application for Terminal Having Illumination and Focus Control filed May 21, 2014 (Liu et al.), U.S. Appl. No. 14/283,282.
U.S. Appl. No. 29/436,337 for an Electronic Device, filed Nov. 5, 2012 (Fitch et al.); 19 pages.
U.S. Appl. No. 29/458,405 for an Electronic Device, filed Jun. 19, 2013 (Fitch et al.); 22 pages.
U.S. Appl. No. 29/459,620 for an Electronic Device Enclosure, filed Jul. 2, 2013 (London et al.); 21 pages.
U.S. Appl. No. 29/459,681 for an Electronic Device Enclosure, filed Jul. 2, 2013 (Chaney et al.); 14 pages.
U.S. Appl. No. 29/459,785 for a Scanner and Charging Base, filed Jul. 3, 2013 (Fitch et al.); 21 pages.
U.S. Appl. No. 29/459,823 for a Scanner, filed Jul. 3, 2013 (Zhou et al.); 13 pages.
U.S. Appl. No. 29/468,118 for an Electronic Device Case, filed Sep. 26, 2013 (Oberpriller et al.); 4, pages.
U.S. Appl. No. 29/486,759 for an Imaging Terminal, filed Apr. 2, 2014 (Oberpriller et al.); 8 pages.
U.S. Appl. No. 29/492,903 for an Indicia Scanner, filed Jun. 4, 2014 (Zhou et al.); 23 pages.
U.S. Appl. No. 29/494,725 for an In-Counter Barcode Scanner, filed Jun. 24, 2014 (Oberpriller et al.); 23 pages.
U.S. Patent Application Reading Apparatus Having Partial Frame Operating Mode filed Apr. 11, 2014, (Deng et al.), U.S. Appl. No. 14/250,923.
U.S. Appl. No. 13/367,978, filed Feb. 7, 2012, (Feng et al.); now abandoned.
Requirement for Restriction/Election dated Mar. 1, 2017 for U.S. Appl. No. 14/676,327.
Notice of Allowance for U.S. Appl. No. 14/676,327, dated Nov. 16, 2017, 9 pages.
Office Action for U.S. Appl. No. 14/676,327, dated Jul. 27, 2017, 8 pages.
U.S. Appl. No. 14/398,542 for Portable Electronic Devices Having a Separate Location Trigger Unit for Use in Controlling an Application Unit filed Nov. 3, 2014 (Bian et al.); 22 pages.
U.S. Appl. No. 14/405,278 for Design Pattern for Secure Store filed Mar. 9, 2015 (Zhu et al.); 23 pages.
U.S. Appl. No. 14/483,056 for Variable Depth of Field Barcode Scanner filed Sep. 10, 2014 (McCloskey et al.); 29 pages.
U.S. Appl. No. 14/513,808 for Identifying Inventory Items in a Storage Facility filed Oct. 14, 2014 (Singel et al.); 51 pages.
U.S. Appl. No. 14/519,179 for Dimensioning System With Multipath Interference Mitigation filed Oct. 21, 2014 (Thuries et al.); 30 pages.
U.S. Appl. No. 14/519,195 for Handheld Dimensioning System With Feedback filed Oct. 21, 2014 (Laffargue et al.); 39 pages.
U.S. Appl. No. 14/519,211 for System and Method for Dimensioning filed Oct. 21, 2014 (Ackley et al.); 33 pages.
U.S. Appl. No. 14/519,233 for Handheld Dimensioner With Data-Quality Indication filed Oct. 21, 2014 (Laffargue et al.); 36 pages.
U.S. Appl. No. 14/519,249 for Handheld Dimensioning System With Measurement-Conformance Feedback filed Oct. 21, 2014 (Ackley et al.); 36 pages.
U.S. Appl. No. 14/527,191 for Method and System for Recognizing Speech Using Wildcards in an Expected Response filed Oct. 29, 2014 (Braho et al.); 45 pages.
U.S. Appl. No. 14/529,563 for Adaptable Interface for a Mobile Computing Device filed Oct. 31, 2014 (Schoon et al.); 36 pages.
U.S. Appl. No. 14/529,857 for Barcode Reader With Security Features filed Oct. 31, 2014 (Todeschini et al.); 32 pages.
U.S. Appl. No. 14/531,154 for Directing an Inspector Through an Inspection filed Nov. 3, 2014 (Miller et al.); 53 pages.
U.S. Appl. No. 14/533,319 for Barcode Scanning System Using Wearable Device With Embedded Camera filed Nov. 5, 2014 (Todeschini); 29 pages.
U.S. Appl. No. 14/535,764 for Concatenated Expected Responses for Speech Recognition filed Nov. 7, 2014 (Braho et al.); 51 pages.
U.S. Appl. No. 14/568,305 for Auto-Contrast Viewfinder for an Indicia Reader filed Dec. 12, 2014 (Todeschini); 29 pages.
U.S. Appl. No. 14/573,022 for Dynamic Diagnostic Indicator Generation filed Dec. 17, 2014 (Goldsmith); 43 pages.
U.S. Appl. No. 14/578,627 for Safety System and Method filed Dec. 22, 2014 (Ackley et al.); 32 pages.
U.S. Appl. No. 14/580,262 for Media Gate for Thermal Transfer Printers filed Dec. 23, 2014 (Bowles); 36 pages.
U.S. Appl. No. 14/590,024 for Shelving and Package Locating Systems for Delivery Vehicles filed Jan. 6, 2015 (Payne); 31 pages.
U.S. Appl. No. 14/596,757 for System and Method for Detecting Barcode Printing Errors filed Jan. 14, 2015 (Ackley); 41 pages.
U.S. Appl. No. 14/614,706 for Device for Supporting an Electronic Tool on a User's Hand filed Feb. 5, 2015 (Oberpriller et al.); 33 pages.
U.S. Appl. No. 14/614,796 for Cargo Apportionment Techniques filed Feb. 5, 2015 (Morton et al.); 56 pages.
U.S. Appl. No. 14/619,093 for Methods for Training a Speech Recognition System filed Feb. 11, 2015 (Pecorari); 35 pages.
U.S. Appl. No. 14/628,708 for Device, System, and Method for Determining the Status of Checkout Lanes filed Feb. 23, 2015 (Todeschini); 37 pages.
U.S. Appl. No. 14/662,922 for Multifunction Point of Sale System filed Mar. 19, 2015 (Van Horn et al.); 41 pages.
U.S. Appl. No. 14/664,063 for Method and Application for Scanning a Barcode With a Smart Device While Continuously Running and Displaying an Application on the Smart Device Display filed Mar. 20, 2015 (Todeschini); 37 pages.
U.S. Appl. No. 14/674,329 for Aimer for Barcode Scanning filed Mar. 31, 2015 (Bidwell); 36 pages.
U.S. Appl. No. 14/676,327 for Device Management Proxy for Secure Devices filed Apr. 1, 2015 (Yeakley et al.); 50 pages.
U.S. Appl. No. 14/687,289 for System for Communication via a Peripheral Hub filed Apr. 15, 2015 (Kohtz et al.); 37 pages.
U.S. Appl. No. 141695,364 for Medication Management System filed Apr. 24, 2015 (Sewell et al.); 44 pages.
U.S. Appl. No. 14/695,923 for Secure Unattended Network Authentication filed Apr. 24, 2015 (Kubler et al.); 52 pages.
U.S. Appl. No. 14/702,110 for System and Method for Regulating Barcode Data Injection Into a Running Application on a Smart Device filed May 1, 2015 (Todeschini et al.); 38 pages.
U.S. Appl. No. 14/702,979 for Tracking Battery Conditions filed May 4, 2015 (Young et al.); 70 pages.
U.S. Appl. No. 14/704,050 for Intermediate Linear Positioning filed May 5, 2015 (Charpentier et al.); 60 pages.
U.S. Appl. No. 14/705,012 for Hands-Free Human Machine Interface Responsive to a Driver of a Vehicle filed May 6, 2015 (Fitch et al.); 44 pages.
U.S. Appl. No. 14/705,407 for Method and System to Protect Software-Based Network-Connected Devices From Advanced Persistent Threat filed May 6, 2015 (Hussey et al.); 42 pages.
U.S. Appl. No. 14/707,123 for Application Independent DEX/UCS Interface filed May 8, 2015 (Pape); 47 pages.
U.S. Appl. No. 14/715,672 for Augumented Reality Enabled Hazard Display filed May 19, 2015 (Venkatesha et al.); 35 pages.
U.S. Appl. No. 14/715,916 for Evaluating Image Values filed May 19, 2015 (Ackley); 60 pages.
U.S. Appl. No. 14/735,717 for Indicia-Reading Systems Having an Interface With a User's Nervous System filed Jun. 10, 2015 (Todeschini); 39 pages.
U.S. Appl. No. 14/740,320 for Tactile Switch for a Mobile Electronic Device filed Jun. 16, 2015 (Bamdringa); 38 pages.
U.S. Appl. No. 14/740,373 for Calibrating a Volume Dimensioner filed Jun. 16, 2015 (Ackley et al.); 63 pages.
U.S. Appl. No. 14/747,197 for Optical Pattern Projector filed Jun. 23, 2015 (Thuries et al.); 33 pages.
U.S. Appl. No. 14/747,490 for Dual-Projector Three-Dimensional Scanner filed Jun. 23, 2015 (Jovanovski et al.); 40 pages.
U.S. Appl. No. 14/748,446 for Cordless Indicia Reader With a Multifunction Coil for Wireless Charging and EAS Deactivation, filed Jun. 24, 2015 (Xie et al.); 34 pages.
U.S. Appl. No. 29/516,892 for Table Computer filed Feb. 6, 2015 (Bidwell et al.); 13 pages.
U.S. Appl. No. 29/519,017 for Scanner filed Mar. 2, 2015 (Zhou et al.); 11 pages.
Related Publications (1)
Number Date Country
20180212978 A1 Jul 2018 US
Continuations (1)
Number Date Country
Parent 14676327 Apr 2015 US
Child 15933594 US