The present invention relates to mobile devices and barcode scanning, and in particular to protecting applications from SQL injection during barcode scanning operations.
Generally speaking there are many Smartphone and mobile device applications that require the ability to scan a barcode. In order for a developer to add barcode scanning capability to their application, developers quite frequently rely on a third party software development kit (SDK). The SDK must be integrated into their application. This only gives the user access to barcode scanning from within that particular application. If a user wants a universal method of scanning barcodes for data entry across all their applications, even for applications written by a third party, the solution is more complicated.
Sometimes a keyboard wedge style application is used to facilitate universal scanning in any application by keeping a background service running that responds to a particular key press. When the service detects this key press, it brings up the barcode scanner and inserts the resultant scan data into the keyboard buffer so that it is inserted at the cursor as text in whichever application has focus at the moment.
A keyboard wedge can be either a software program or an inserted hardware device that translates digital signals from a barcode reader or magnetic strip reader into keyboard strokes for a computer, smartphone, or mobile device. The software form of a keyboard wedge intercepts the digital signals from the reader when they arrive at the computer and instantly translates them into keyboard strokes. Data sent through a wedge appears as if it was typed into the device, while the keyboard itself remains fully functional. Because an application running on a computer or a mobile device using a keyboard wedge cannot tell the difference between data that is entered by a scanning device or data that is entered by keyboard typing, a wedge can be used to easily add barcode reading capability to an existing device without modifying software applications.
Today, many Smartphone operating systems allow you to create custom software keyboards (software input panels) which are sometimes used to add a barcode scanning button and associated scan wedge functionality. When the custom keyboard is loaded, if the user wants to enter barcode data into a text field they simply open the software keyboard, hit the scanner button, scan the barcode and the result is placed in the text field that has focus.
Each of these types of keyboard wedges or scan wedge applications do not care what fields they enter data into, assuming they are editable. The applications cannot discriminate which fields scan wedge data is allowed in. This is because the application cannot differentiate between scan wedge data and actual keyboard data. This can be a security risk as barcode data could contain malicious code injection attacks (e.g. SQL Injection) disguised as valid data, which could seriously compromise application data.
SQL Injection is a code injection technique, where malicious software is used to attack data-driven applications. Typically statements are inserted into an entry field for execution, for example to dump the database contents of a running application to the malicious attacker. SQL injection attacks are considered one of the top vulnerabilities on the internet.
Therefore, a need exists for system to scan barcodes into applications running on smartphones or mobile devices with the functionality and flexibility of a scan wedge while regulating the data the running application is exposed to from a barcode scan.
Accordingly, in one aspect, the present invention embraces a system for regulating the injection of barcode scan data into an application running on a smart device. In the present invention a smart device may be a smartphone or a tablet. For purposes of the present invention, a smart device has a central processing unit, barcode scanning operation capability, a viewfinder, and an embedded camera. The smart device also includes a visual display and a keypad. As known in the art, a custom software input panel keypad is provided with a barcode scanning key. Additionally, the smart device has an operating system, is wireless communication enabled, and has other features commonly found on smart devices. These components of the smart device are communicatively linked.
In an exemplary embodiment, the system comprises a running application on a smart device. The running application has text fields. Each of the text fields has text field properties. The text field properties are designated to either accept access or restrict access to each of the text fields from barcode scan data. The system also comprises a keyboard buffer and a scan wedge. The scan wedge has access to the keyboard buffer. The scan wedge is further provided with means to discriminate between access and restricted access designations in the text field properties. The means to discriminate are configured to interrogate the text field properties to determine if the text field permits access to barcode scan data. The scan wedge is also configured to begin a barcode scan operation if the text field permits access to barcode scan data. The scan wedge is further configured to load barcode scan data into the keyboard buffer. The keyboard buffer is configured to display the barcode scan data as text in the text field of the application.
In another exemplary embodiment, the scan wedge is provided with logic to recognize patterns in barcode scan data. The scan wedge is configured to inspect the barcode scan data for regular patterns consistent with malicious attacks. The scan wedge is configured to instruct the keyboard buffer to insert an error message in the running application if the regular patterns are found.
In yet another exemplary embodiment of the system, at least one of the text field properties is a readable property of the text field. The readable property has associated values which describe attributes of the text field. The attributes designate whether access to the text field is permitted or not permitted. The scan wedge is provided with the value of the readable property. The property and the associated property are a value pair. The scan wedge is configured to look for the value pairs of the text field property. The scan wedge is further configured to begin the barcode scan operation only if the value pair on the text property corresponds to the value pair provided on the scan wedge.
In another exemplary embodiment of the system, the readable property describes the text field and is selected from an id, a name, a tag, and other descriptor properties.
In another exemplary embodiment of the system, the means to discriminate is accomplished with programming techniques selected from reflection and introspection.
In yet another exemplary embodiment of the system, the scan wedge is configured to close if the text field restricts access to barcode scan data.
In another exemplary embodiment of the system, the scan wedge is configured to load an error message in the keyboard buffer if the text field restricts access to barcode scan data. The keyboard buffer is then configured to display the error message in the text field of the running application.
In yet another exemplary embodiment of the system, the means to discriminate comprises a white list and a black list provided on the scan wedge. The text field properties are values either on the white list or on the black list. Values on the white list designate permitted access to the text field by barcode scan data; values on the black list designate restricted access to the text field by barcode scan data. The scan wedge is configured to interrogate the text field properties and identify whether the text field property values are on the white list or on the black list.
In yet another exemplary embodiment of the system, the application is native on the smart device.
In yet another exemplary embodiment of the system, the application is a web application running in a browser on the smart device.
In another aspect, the present invention embraces a method of regulating the injection of barcode scan data into a running application on a smart device. The smart device, for the purposes of the present invention may be a smartphone or a tablet. In addition, as known in the art, a smart device will generally have a central processing unit, barcode scanning operation capability, a viewfinder, and an embedded camera. The smart device also includes a visual display and a keypad. As known in the art, a custom software input panel keypad is provided with a barcode scanning key. Additionally, the smart device has an operating system, is wireless communication enabled, and has other features commonly found on smart devices. These components of the smart device are communicatively linked.
In an exemplary embodiment of the invention the method comprises the steps of: running an application on a smart device, the application having at least one text field, the text field having text field properties, the text field properties designate whether bar code scan data is permitted or not permitted in the text field; inspecting the running application with a scan wedge; finding the text field within the application having focus with the scan wedge; reviewing and cross-referencing properties of the text field with the scan wedge; determining if barcode data can be deposited in the text field based on the properties reviewed.
In another exemplary embodiment, the method further comprises the step of: commencing a barcode scan if the determining step shows that barcode data is permitted.
In another exemplary embodiment, the method further comprises the steps of: inspecting barcode scan data for regular patterns of malicious attacks; loading the barcode scan data into the keyboard buffer; inserting the barcode scan data as text in the text field of the running application if no regular patterns are found in the inspecting barcode scan data step; and displaying an error message if regular patterns are found in the inspecting barcode scan data step.
In yet another exemplary embodiment, the method further comprises the step of: closing the scan wedge application if the determining step shows that barcode data is not permitted.
In another exemplary embodiment of the invention, the method further comprises the step of: displaying an error message.
In another exemplary embodiment of the method, the scan wedge is provided with programming capabilities selected from reflection and introspection, and wherein the inspecting step, the finding step, and the reviewing step are accomplished using the programming techniques.
In yet another exemplary embodiment of the method, the scan wedge is provided with logic, and the inspecting barcode scan data step is accomplished using the logic.
In another exemplary embodiment of the method the scan wedge is provided with a white list and a black list. The text field properties are values either on the white list or on the black list. Values on the white list designate permitted access to the text field by barcode scan data, and values on the black list designate restricted access to the text field by barcode scan data. The reviewing step is accomplished by cross-referencing the text field property values with the white list and black list on the scan wedge.
In another exemplary embodiment of the method, the barcode data can be deposited in a text field if the determining step shows the text field property value is on the white list of the scan wedge.
In yet another exemplary of the method, the barcode data cannot be deposited in a text field if the determining step shows the text field property value is on the black list of the scan wedge.
The foregoing illustrative summary, as well as other exemplary objectives and/or advantages of the invention, and the manner in which the same are accomplished, are further explained within the following detailed description and its accompanying drawings.
The present invention embraces a system for regulating the injection of barcode scan data into an application running on a smart device. The smart device may be a smart phone, tablet, or the like. Generally, a smart device proper to the present invention will have certain components as depicted schematically in
In an exemplary embodiment, the smart device (5) is further provided with a keyboard wedge or scan wedge (21) application, which communicatively linked to the other components of the smart device (5). The scan wedge (21) application is enabled through a custom software input panel (20). The custom software input panel (20) preferably has a barcode scan key (not shown) which when touched would activate the scan wedge application (21). The scan wedge (21) has access to a keyboard buffer (22). The keyboard buffer (22) can insert data, such as barcode scan data, as text in a running application on the smart device (5). The scan wedge (21) is preferably provided with programming techniques such as reflection or introspection (not shown) in order to interrogate a running application on the smart device (5). Further, the scan wedge (21) is preferably provided with logic to recognize patterns in barcode scan data. Malicious code injection attacks (SQL injection) often have regular patterns which can be detected by logic.
Reflection is a programming technique known in the art which can be used for observing and/or modifying an application execution at runtime. A reflection-oriented application component can monitor the execution of an enclosure of code and can modify itself according to a desired goal related to that enclosure. This is typically accomplished by dynamically assigning program code at runtime.
Introspection is a programming technique known in the art, which is the ability of a program or an application to examine the type or properties of an object or application at runtime.
In one exemplary embodiment the invention, a system for regulating the injection of barcode scan data into an application running on a smart device is provided and schematically depicted in
In another exemplary embodiment, before the scan wedge (21) loads barcode scan data into keyboard buffer (22), the scan wedge (21) is configured to use logic (27) to inspect the barcode scan data for regular patterns consistent with malicious attacks.
SQL injection attacks may exhibit regular patterns of code. For example, the malicious attack may try to pull records in an application. Next, the malicious attack uses code to set database properties or usernames as variables and block legitimate queries. With true statements in code, the attack co-opts the username (made variable before) for authentication. Finally, once in, the attacks instruct the application to dump its database to the malicious attacker. These steps have known patterns.
The logic (27) recognizes the presence or absence of these regular patterns. The logic (27) decision box (29) in the Figure shows the options if regular patterns consistent with malicious attacks are found or not found in the barcode data. If, “yes”, there are regular patterns, then the scan wedge (21) is configured to instruct the keyboard buffer (22b) to insert an error message in the running application (32). For example, the error message may be: “Warning, the barcode data has been flagged as malicious, would you like to accept it anyway?”, or something similar. If, “no”, the regular patterns are not found, then the barcode scan data is loaded into the keyboard buffer (22a) for insertion in the text field (34) of the running application (32) as text.
In an exemplary embodiment illustrated in the
The readable text field property (36) describes the text field (34) and is selected from an id, a name, a tag, and other descriptor properties. The means to discriminate is accomplished with programming techniques selected from reflection and introspection. Further, the means to discriminate comprises a white list (23) and a black list (24) provided on the scan wedge (21). The text field properties (36) are values either on the white list (23) or on the black list (24). Values on the white list (23) designate permitted access to the text field (34) by barcode scan data. Values on the black list (24) designate restricted access to the text field (34) by barcode scan data. The scan wedge (21) is configured to interrogate (25) the text field properties (36) and identify whether the text field property (36) values, in this case the Name Property, are on the white list (23) or on the black list (24). In the figure, the value pair for the Name text field Property is “Name=Wedge”. This value pair is on the white list (23). Therefore the scan wedge (21) allows the barcode scan operation to begin.
Referring now to
The present invention embraces a method for regulating the injection of barcode scan data into an application running on a smart device. The smart device may be a smart phone, tablet, or the like. Generally, a smart device proper to the present invention will have certain components as depicted schematically and described hereinbefore in conjunction with
In an exemplary embodiment of the present invention, a method is schematically depicted as a flow chart in
In a further exemplary embodiment of the method (40) shown in the present Figure, if the (46) commencing step is permitted, the method (40) further comprises the steps of: (47) inspecting barcode scan data for regular patterns of malicious attacks, (48) loading the barcode scan data into the keyboard buffer, and (49) inserting the barcode scan data as text in the text field of the running application if no regular patterns are found in the (47) inspecting barcode scan data step. If regular patterns are found in the (47) inspecting barcode scan data step, the method (40) further comprises the step of (50) displaying an error message on visual display as text.
In an exemplary embodiment of the invention, the scan wedge is provided with logic, and the (47) inspecting barcode scan data step is accomplished using the logic.
In yet another exemplary embodiment of the invention, the scan wedge is provided with programming capabilities selected from reflection and introspection, and (42) the inspecting step, the (43) finding step, and the (44) reviewing step are accomplished using the programming techniques.
In yet another exemplary embodiment of the invention, the scan wedge is provided with a white list and a black list. The text field properties are values either on the white list or on the black list. The values on the white list designate permitted access to the text field by barcode scan data. Values on the black list designate restricted access to the text field by barcode scan data. The (44) reviewing step is accomplished by cross-referencing the text field property values with the white list and black list on the scan wedge. Thus, barcode data can be inserted in a text field in the (49) inserting data step if the (45) determining step shows the text field property value is on the white list of the scan wedge. Contrarily, barcode data cannot be deposited in a text field if the (45) determining step shows the text field property value is on the black list of the scan wedge.
To supplement the present disclosure, this application incorporates entirely by reference the following commonly assigned patents, patent application publications, and patent applications:
In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.
| Number | Name | Date | Kind |
|---|---|---|---|
| 6832725 | Gardiner et al. | Dec 2004 | B2 |
| 7128266 | Marlton et al. | Oct 2006 | B2 |
| 7159783 | Walczyk et al. | Jan 2007 | B2 |
| 7413127 | Ehrhart et al. | Aug 2008 | B2 |
| 7726575 | Wang et al. | Jun 2010 | B2 |
| 8294969 | Plesko | Oct 2012 | B2 |
| 8296477 | Polk | Oct 2012 | B1 |
| 8317105 | Kotlarsky et al. | Nov 2012 | B2 |
| 8322622 | Suzhou et al. | Dec 2012 | B2 |
| 8366005 | Kotlarsky et al. | Feb 2013 | B2 |
| 8371507 | Haggerty et al. | Feb 2013 | B2 |
| 8376233 | Van Horn et al. | Feb 2013 | B2 |
| 8381979 | Franz | Feb 2013 | B2 |
| 8390909 | Plesko | Mar 2013 | B2 |
| 8408464 | Zhu et al. | Apr 2013 | B2 |
| 8408468 | Horn et al. | Apr 2013 | B2 |
| 8408469 | Good | Apr 2013 | B2 |
| 8424768 | Rueblinger et al. | Apr 2013 | B2 |
| 8448863 | Xian et al. | May 2013 | B2 |
| 8457013 | Essinger et al. | Jun 2013 | B2 |
| 8459557 | Havens et al. | Jun 2013 | B2 |
| 8469272 | Kearney | Jun 2013 | B2 |
| 8474712 | Kearney et al. | Jul 2013 | B2 |
| 8479992 | Kotlarsky et al. | Jul 2013 | B2 |
| 8490877 | Kearney | Jul 2013 | B2 |
| 8517271 | Kotlarsky et al. | Aug 2013 | B2 |
| 8523076 | Good | Sep 2013 | B2 |
| 8528818 | Ehrhart et al. | Sep 2013 | B2 |
| 8544737 | Gomez et al. | Oct 2013 | B2 |
| 8548420 | Grunow et al. | Oct 2013 | B2 |
| 8550335 | Samek et al. | Oct 2013 | B2 |
| 8550354 | Gannon et al. | Oct 2013 | B2 |
| 8550357 | Keamey | Oct 2013 | B2 |
| 8556174 | Kosecki et al. | Oct 2013 | B2 |
| 8556176 | Van Horn et al. | Oct 2013 | B2 |
| 8556177 | Hussey et al. | Oct 2013 | B2 |
| 8559767 | Barber et al. | Oct 2013 | B2 |
| 8561895 | Gomez et al. | Oct 2013 | B2 |
| 8561903 | Sauerwein | Oct 2013 | B2 |
| 8561905 | Edmonds et al. | Oct 2013 | B2 |
| 8565107 | Pease et al. | Oct 2013 | B2 |
| 8571307 | Li et al. | Oct 2013 | B2 |
| 8579200 | Samek et al. | Nov 2013 | B2 |
| 8583924 | Caballero et al. | Nov 2013 | B2 |
| 8584945 | Wang et al. | Nov 2013 | B2 |
| 8587595 | Wang | Nov 2013 | B2 |
| 8587697 | Hussey et al. | Nov 2013 | B2 |
| 8588869 | Sauerwein et al. | Nov 2013 | B2 |
| 8590789 | Nahill et al. | Nov 2013 | B2 |
| 8596539 | Havens et al. | Dec 2013 | B2 |
| 8596542 | Havens et al. | Dec 2013 | B2 |
| 8596543 | Havens et al. | Dec 2013 | B2 |
| 8599271 | Havens et al. | Dec 2013 | B2 |
| 8599957 | Peake et al. | Dec 2013 | B2 |
| 8600158 | Li et al. | Dec 2013 | B2 |
| 8600167 | Showering | Dec 2013 | B2 |
| 8602309 | Longacre et al. | Dec 2013 | B2 |
| 8608053 | Meier et al. | Dec 2013 | B2 |
| 8608071 | Liu et al. | Dec 2013 | B2 |
| 8611309 | Wang et al. | Dec 2013 | B2 |
| 8615487 | Gomez et al. | Dec 2013 | B2 |
| 8621123 | Caballero | Dec 2013 | B2 |
| 8622303 | Meier et al. | Jan 2014 | B2 |
| 8628013 | Ding | Jan 2014 | B2 |
| 8628015 | Wang et al. | Jan 2014 | B2 |
| 8628016 | Winegar | Jan 2014 | B2 |
| 8629926 | Wang | Jan 2014 | B2 |
| 8630491 | Longacre et al. | Jan 2014 | B2 |
| 8635309 | Berthiaume et al. | Jan 2014 | B2 |
| 8636200 | Kearney | Jan 2014 | B2 |
| 8636212 | Nahill et al. | Jan 2014 | B2 |
| 8636215 | Ding et al. | Jan 2014 | B2 |
| 8636224 | Wang | Jan 2014 | B2 |
| 8638806 | Wang et al. | Jan 2014 | B2 |
| 8640958 | Lu et al. | Feb 2014 | B2 |
| 8640960 | Wang et al. | Feb 2014 | B2 |
| 8643717 | Li et al. | Feb 2014 | B2 |
| 8646692 | Meier et al. | Feb 2014 | B2 |
| 8646694 | Wang et al. | Feb 2014 | B2 |
| 8657200 | Ren et al. | Feb 2014 | B2 |
| 8659397 | Vargo et al. | Feb 2014 | B2 |
| 8668149 | Good | Mar 2014 | B2 |
| 8678285 | Kearney | Mar 2014 | B2 |
| 8678286 | Smith et al. | Mar 2014 | B2 |
| 8682077 | Longacre | Mar 2014 | B1 |
| D702237 | Oberpriller et al. | Apr 2014 | S |
| 8687282 | Feng et al. | Apr 2014 | B2 |
| 8692927 | Pease et al. | Apr 2014 | B2 |
| 8695880 | Bremer et al. | Apr 2014 | B2 |
| 8698949 | Grunow et al. | Apr 2014 | B2 |
| 8702000 | Barber et al. | Apr 2014 | B2 |
| 8717494 | Gannon | May 2014 | B2 |
| 8720783 | Biss et al. | May 2014 | B2 |
| 8723804 | Fletcher et al. | May 2014 | B2 |
| 8723904 | Marty et al. | May 2014 | B2 |
| 8727223 | Wang | May 2014 | B2 |
| 8740082 | Wilz | Jun 2014 | B2 |
| 8740085 | Furlong et al. | Jun 2014 | B2 |
| 8746563 | Hennick et al. | Jun 2014 | B2 |
| 8750445 | Peake et al. | Jun 2014 | B2 |
| 8752766 | Xian et al. | Jun 2014 | B2 |
| 8756059 | Braho et al. | Jun 2014 | B2 |
| 8757495 | Qu et al. | Jun 2014 | B2 |
| 8760563 | Koziol et al. | Jun 2014 | B2 |
| 8736909 | Reed et al. | Jul 2014 | B2 |
| 8777108 | Coyle | Jul 2014 | B2 |
| 8777109 | Oberpriller et al. | Jul 2014 | B2 |
| 8779898 | Havens et al. | Jul 2014 | B2 |
| 8781520 | Payne et al. | Jul 2014 | B2 |
| 8783573 | Havens et al. | Jul 2014 | B2 |
| 8789757 | Barten | Jul 2014 | B2 |
| 8789758 | Hawley et al. | Jul 2014 | B2 |
| 8789759 | Xian et al. | Jul 2014 | B2 |
| 8794520 | Wang et al. | Aug 2014 | B2 |
| 8794522 | Ehrhart | Aug 2014 | B2 |
| 8794525 | Amundsen et al. | Aug 2014 | B2 |
| 8794526 | Wang et al. | Aug 2014 | B2 |
| 8798367 | Ellis | Aug 2014 | B2 |
| 8807431 | Wang et al. | Aug 2014 | B2 |
| 8807432 | Van Horn et al. | Aug 2014 | B2 |
| 8820630 | Qu et al. | Sep 2014 | B2 |
| 8822848 | Meagher | Sep 2014 | B2 |
| 8824692 | Sheerin et al. | Sep 2014 | B2 |
| 8824696 | Braho | Sep 2014 | B2 |
| 8842849 | Wahl et al. | Sep 2014 | B2 |
| 8844822 | Kotlarsky et al. | Sep 2014 | B2 |
| 8844823 | Fritz et al. | Sep 2014 | B2 |
| 8849019 | Li et al. | Sep 2014 | B2 |
| D716285 | Chaney et al. | Oct 2014 | S |
| 8851383 | Yeakley et al. | Oct 2014 | B2 |
| 8854633 | Laffargue | Oct 2014 | B2 |
| 8866963 | Grunow et al. | Oct 2014 | B2 |
| 8868421 | Braho et al. | Oct 2014 | B2 |
| 8868519 | Maloy et al. | Oct 2014 | B2 |
| 8868802 | Barten | Oct 2014 | B2 |
| 8868803 | Bremer et al. | Oct 2014 | B2 |
| 8870074 | Gannon | Oct 2014 | B1 |
| 8879639 | Sauerwein | Nov 2014 | B2 |
| 8880426 | Smith | Nov 2014 | B2 |
| 8881983 | Havens et al. | Nov 2014 | B2 |
| 8881987 | Wang | Nov 2014 | B2 |
| 8903172 | Smith | Dec 2014 | B2 |
| 8908995 | Benos et al. | Dec 2014 | B2 |
| 8910870 | Li et al. | Dec 2014 | B2 |
| 8910875 | Ren et al. | Dec 2014 | B2 |
| 8914290 | Hendrickson et al. | Dec 2014 | B2 |
| 8914788 | Pettinelli et al. | Dec 2014 | B2 |
| 8915439 | Feng et al. | Dec 2014 | B2 |
| 8915444 | Havens et al. | Dec 2014 | B2 |
| 8916789 | Woodburn | Dec 2014 | B2 |
| 8918250 | Hollifield | Dec 2014 | B2 |
| 8918564 | Caballero | Dec 2014 | B2 |
| 8925818 | Kosecki et al. | Jan 2015 | B2 |
| 8939374 | Jovanovski et al. | Jan 2015 | B2 |
| 8942480 | Ellis | Jan 2015 | B2 |
| 8944313 | Williams et al. | Feb 2015 | B2 |
| 8944327 | Meier et al. | Feb 2015 | B2 |
| 8944332 | Harding et al. | Feb 2015 | B2 |
| 8950678 | Germaine et al. | Feb 2015 | B2 |
| D723560 | Zhou et al. | Mar 2015 | S |
| 8967468 | Gomez et al. | Mar 2015 | B2 |
| 8971346 | Sevier | Mar 2015 | B2 |
| 8976030 | Cunningham et al. | Mar 2015 | B2 |
| 8976368 | Akel et al. | Mar 2015 | B2 |
| 8978981 | Guan | Mar 2015 | B2 |
| 8978983 | Bremer et al. | Mar 2015 | B2 |
| 8978984 | Hennick et al. | Mar 2015 | B2 |
| 8985456 | Zhu et al. | Mar 2015 | B2 |
| 8985457 | Soule et al. | Mar 2015 | B2 |
| 8985459 | Kearney et al. | Mar 2015 | B2 |
| 8985461 | Gelay et al. | Mar 2015 | B2 |
| 8988578 | Showering | Mar 2015 | B2 |
| 8988590 | Gillet et al. | Mar 2015 | B2 |
| 8991704 | Hopper et al. | Mar 2015 | B2 |
| 8996194 | Davis et al. | Mar 2015 | B2 |
| 8996384 | Funyak et al. | Mar 2015 | B2 |
| 8998091 | Edmonds et al. | Apr 2015 | B2 |
| 9002641 | Showering | Apr 2015 | B2 |
| 9007368 | Laffargue et al. | Apr 2015 | B2 |
| 9010641 | Qu et al. | Apr 2015 | B2 |
| 9015513 | Murawski et al. | Apr 2015 | B2 |
| 9016576 | Brady et al. | Apr 2015 | B2 |
| D730357 | Fitch et al. | May 2015 | S |
| 9022288 | Nahill et al. | May 2015 | B2 |
| 9030964 | Essinger et al. | May 2015 | B2 |
| 9033240 | Smith et al. | May 2015 | B2 |
| 9033242 | Gillet et al. | May 2015 | B2 |
| 9036054 | Koziol et al. | May 2015 | B2 |
| 9037344 | Chamberlin | May 2015 | B2 |
| 9038911 | Xian et al. | May 2015 | B2 |
| 9038915 | Smith | May 2015 | B2 |
| D730901 | Oberpriller et al. | Jun 2015 | S |
| D730902 | Fitch et al. | Jun 2015 | S |
| D733112 | Chaney et al. | Jun 2015 | S |
| 9047098 | Barten | Jun 2015 | B2 |
| 9047359 | Caballero et al. | Jun 2015 | B2 |
| 9047420 | Caballero | Jun 2015 | B2 |
| 9047525 | Barber | Jun 2015 | B2 |
| 9047531 | Showering et al. | Jun 2015 | B2 |
| 9049640 | Wang et al. | Jun 2015 | B2 |
| 9053055 | Caballero | Jun 2015 | B2 |
| 9053378 | Hou et al. | Jun 2015 | B1 |
| 9053380 | Xian et al. | Jun 2015 | B2 |
| 9057641 | Amundsen et al. | Jun 2015 | B2 |
| 9058526 | Powilleit | Jun 2015 | B2 |
| 9064165 | Havens et al. | Jun 2015 | B2 |
| 9064167 | Xian et al. | Jun 2015 | B2 |
| 9064168 | Todeschini et al. | Jun 2015 | B2 |
| 9064254 | Todeschini et al. | Jun 2015 | B2 |
| 9066032 | Wang | Jun 2015 | B2 |
| 9070032 | Corcoran | Jun 2015 | B2 |
| D734339 | Zhou et al. | Jul 2015 | S |
| D734751 | Oberpriller et al. | Jul 2015 | S |
| 9082023 | Feng et al. | Jul 2015 | B2 |
| 9262633 | Todeschini | Feb 2016 | B1 |
| 9338164 | Liu | May 2016 | B1 |
| 20070063048 | Havens et al. | Mar 2007 | A1 |
| 20090134221 | Zhu et al. | May 2009 | A1 |
| 20100177076 | Essinger et al. | Jul 2010 | A1 |
| 20100177080 | Essinger et al. | Jul 2010 | A1 |
| 20100177707 | Essinger et al. | Jul 2010 | A1 |
| 20100177749 | Essinger et al. | Jul 2010 | A1 |
| 20100321739 | Amagai | Dec 2010 | A1 |
| 20110169999 | Grunow et al. | Jul 2011 | A1 |
| 20110202554 | Powilleit et al. | Aug 2011 | A1 |
| 20120111946 | Golant | May 2012 | A1 |
| 20120168512 | Kotlarsky et al. | Jul 2012 | A1 |
| 20120193423 | Samek | Aug 2012 | A1 |
| 20120203647 | Smith | Aug 2012 | A1 |
| 20120223141 | Good et al. | Sep 2012 | A1 |
| 20120308003 | Mukherjee | Dec 2012 | A1 |
| 20130043312 | Van Horn | Feb 2013 | A1 |
| 20130075168 | Amundsen et al. | Mar 2013 | A1 |
| 20130175341 | Kearney et al. | Jul 2013 | A1 |
| 20130175343 | Good | Jul 2013 | A1 |
| 20130257744 | Daghigh et al. | Oct 2013 | A1 |
| 20130257759 | Daghigh | Oct 2013 | A1 |
| 20130270346 | Xian et al. | Oct 2013 | A1 |
| 20130287258 | Kearney | Oct 2013 | A1 |
| 20130292475 | Kotlarsky et al. | Nov 2013 | A1 |
| 20130292477 | Hennick et al. | Nov 2013 | A1 |
| 20130293539 | Hunt et al. | Nov 2013 | A1 |
| 20130293540 | Laffargue et al. | Nov 2013 | A1 |
| 20130306728 | Thuries et al. | Nov 2013 | A1 |
| 20130306731 | Pedraro | Nov 2013 | A1 |
| 20130307964 | Bremer et al. | Nov 2013 | A1 |
| 20130308625 | Corcoran | Nov 2013 | A1 |
| 20130313324 | Koziol et al. | Nov 2013 | A1 |
| 20130313325 | Wilz et al. | Nov 2013 | A1 |
| 20130342717 | Havens et al. | Dec 2013 | A1 |
| 20140001267 | Giordano et al. | Jan 2014 | A1 |
| 20140002828 | Laffargue et al. | Jan 2014 | A1 |
| 20140008439 | Wang | Jan 2014 | A1 |
| 20140022572 | Washington | Jan 2014 | A1 |
| 20140025584 | Liu et al. | Jan 2014 | A1 |
| 20140034734 | Sauerwein | Feb 2014 | A1 |
| 20140036848 | Pease et al. | Feb 2014 | A1 |
| 20140039693 | Havens et al. | Feb 2014 | A1 |
| 20140042814 | Kather et al. | Feb 2014 | A1 |
| 20140049120 | Kohtz et al. | Feb 2014 | A1 |
| 20140049635 | Laffargue et al. | Feb 2014 | A1 |
| 20140061306 | Wu et al. | Mar 2014 | A1 |
| 20140063289 | Hussey et al. | Mar 2014 | A1 |
| 20140066136 | Sauerwein et al. | Mar 2014 | A1 |
| 20140067692 | Ye et al. | Mar 2014 | A1 |
| 20140070005 | Nahill et al. | Mar 2014 | A1 |
| 20140071840 | Venancio | Mar 2014 | A1 |
| 20140074746 | Wang | Mar 2014 | A1 |
| 20140076974 | Havens et al. | Mar 2014 | A1 |
| 20140078341 | Havens et al. | Mar 2014 | A1 |
| 20140078342 | Li et al. | Mar 2014 | A1 |
| 20140078345 | Showering | Mar 2014 | A1 |
| 20140098792 | Wang et al. | Apr 2014 | A1 |
| 20140100774 | Showering | Apr 2014 | A1 |
| 20140100813 | Showering | Apr 2014 | A1 |
| 20140103115 | Meier et al. | Apr 2014 | A1 |
| 20140104413 | McCloskey et al. | Apr 2014 | A1 |
| 20140104414 | McCloskey et al. | Apr 2014 | A1 |
| 20140104416 | Li et al. | Apr 2014 | A1 |
| 20140104451 | Todeschini et al. | Apr 2014 | A1 |
| 20140106594 | Skvoretz | Apr 2014 | A1 |
| 20140106725 | Sauerwein | Apr 2014 | A1 |
| 20140108010 | Maltseff et al. | Apr 2014 | A1 |
| 20140108402 | Gomez et al. | Apr 2014 | A1 |
| 20140108682 | Caballero | Apr 2014 | A1 |
| 20140110485 | Toa et al. | Apr 2014 | A1 |
| 20140114530 | Fitch et al. | Apr 2014 | A1 |
| 20140121438 | Kearney | May 2014 | A1 |
| 20140121445 | Ding et al. | May 2014 | A1 |
| 20140124577 | Wang et al. | May 2014 | A1 |
| 20140124579 | Ding | May 2014 | A1 |
| 20140125842 | Winegar | May 2014 | A1 |
| 20140125853 | Wang | May 2014 | A1 |
| 20140125999 | Longacre et al. | May 2014 | A1 |
| 20140129378 | Richardson | May 2014 | A1 |
| 20140131441 | Nahill et al. | May 2014 | A1 |
| 20140131443 | Smith | May 2014 | A1 |
| 20140131444 | Wang | May 2014 | A1 |
| 20140131448 | Xian et al. | May 2014 | A1 |
| 20140133379 | Wang et al. | May 2014 | A1 |
| 20140136208 | Maltseff et al. | May 2014 | A1 |
| 20140140585 | Wang | May 2014 | A1 |
| 20140151453 | Meier et al. | Jun 2014 | A1 |
| 20140152882 | Samek et al. | Jun 2014 | A1 |
| 20140158770 | Sevier et al. | Jun 2014 | A1 |
| 20140159869 | Zumsteg et al. | Jun 2014 | A1 |
| 20140166755 | Liu et al. | Jun 2014 | A1 |
| 20140166757 | Smith | Jun 2014 | A1 |
| 20140166759 | Liu et al. | Jun 2014 | A1 |
| 20140168787 | Wang et al. | Jun 2014 | A1 |
| 20140175165 | Havens et al. | Jun 2014 | A1 |
| 20140175172 | Jovanovski et al. | Jun 2014 | A1 |
| 20140191644 | Chaney | Jul 2014 | A1 |
| 20140191913 | Ge et al. | Jul 2014 | A1 |
| 20140197234 | Hammad | Jul 2014 | A1 |
| 20140197238 | Lui et al. | Jul 2014 | A1 |
| 20140197239 | Havens et al. | Jul 2014 | A1 |
| 20140197304 | Feng et al. | Jul 2014 | A1 |
| 20140203087 | Smith et al. | Jul 2014 | A1 |
| 20140204268 | Grunow et al. | Jul 2014 | A1 |
| 20140214631 | Hansen | Jul 2014 | A1 |
| 20140217166 | Berthiaume et al. | Aug 2014 | A1 |
| 20140217180 | Liu | Aug 2014 | A1 |
| 20140231500 | Ehrhart et al. | Aug 2014 | A1 |
| 20140232930 | Anderson | Aug 2014 | A1 |
| 20140247315 | Marty et al. | Sep 2014 | A1 |
| 20140263493 | Amurgis et al. | Sep 2014 | A1 |
| 20140263645 | Smith et al. | Sep 2014 | A1 |
| 20140270196 | Braho et al. | Sep 2014 | A1 |
| 20140270229 | Braho | Sep 2014 | A1 |
| 20140278387 | DiGregorio | Sep 2014 | A1 |
| 20140282210 | Bianconi | Sep 2014 | A1 |
| 20140283118 | Anderson | Sep 2014 | A1 |
| 20140284384 | Lu et al. | Sep 2014 | A1 |
| 20140288933 | Braho et al. | Sep 2014 | A1 |
| 20140297058 | Barker et al. | Oct 2014 | A1 |
| 20140299665 | Barber et al. | Oct 2014 | A1 |
| 20140312121 | Lu et al. | Oct 2014 | A1 |
| 20140319220 | Coyle | Oct 2014 | A1 |
| 20140319221 | Oberpriller et al. | Oct 2014 | A1 |
| 20140326787 | Barten | Nov 2014 | A1 |
| 20140332590 | Wang et al. | Nov 2014 | A1 |
| 20140344943 | Todeschini et al. | Nov 2014 | A1 |
| 20140346233 | Liu et al. | Nov 2014 | A1 |
| 20140351317 | Smith et al. | Nov 2014 | A1 |
| 20140353373 | Van Horn et al. | Dec 2014 | A1 |
| 20140361073 | Qu et al. | Dec 2014 | A1 |
| 20140361082 | Xian et al. | Dec 2014 | A1 |
| 20140362184 | Jovanovski et al. | Dec 2014 | A1 |
| 20140363015 | Braho | Dec 2014 | A1 |
| 20140369511 | Sheerin et al. | Dec 2014 | A1 |
| 20140374483 | Lu | Dec 2014 | A1 |
| 20140374485 | Xian et al. | Dec 2014 | A1 |
| 20150001301 | Ouyang | Jan 2015 | A1 |
| 20150001304 | Todeschini | Jan 2015 | A1 |
| 20150003673 | Fletcher | Jan 2015 | A1 |
| 20150006672 | Morel | Jan 2015 | A1 |
| 20150009338 | Laffargue et al. | Jan 2015 | A1 |
| 20150009610 | London et al. | Jan 2015 | A1 |
| 20150014416 | Kotlarsky et al. | Jan 2015 | A1 |
| 20150019444 | Purves | Jan 2015 | A1 |
| 20150021397 | Rueblinger et al. | Jan 2015 | A1 |
| 20150028102 | Ren et al. | Jan 2015 | A1 |
| 20150028103 | Jiang | Jan 2015 | A1 |
| 20150028104 | Ma et al. | Jan 2015 | A1 |
| 20150029002 | Yeakley et al. | Jan 2015 | A1 |
| 20150032709 | Maloy et al. | Jan 2015 | A1 |
| 20150039309 | Braho et al. | Feb 2015 | A1 |
| 20150040378 | Saber et al. | Feb 2015 | A1 |
| 20150048168 | Fritz et al. | Feb 2015 | A1 |
| 20150049347 | Laffargue et al. | Feb 2015 | A1 |
| 20150051992 | Smith | Feb 2015 | A1 |
| 20150053766 | Havens et al. | Feb 2015 | A1 |
| 20150053768 | Wang et al. | Feb 2015 | A1 |
| 20150053769 | Thuries et al. | Feb 2015 | A1 |
| 20150062366 | Liu et al. | Mar 2015 | A1 |
| 20150063215 | Wang | Mar 2015 | A1 |
| 20150063676 | Lloyd et al. | Mar 2015 | A1 |
| 20150069130 | Gannon | Mar 2015 | A1 |
| 20150071818 | Todeschini | Mar 2015 | A1 |
| 20150083800 | Li et al. | Mar 2015 | A1 |
| 20150086114 | Todeschini | Mar 2015 | A1 |
| 20150088522 | Hendrickson et al. | Mar 2015 | A1 |
| 20150096872 | Woodburn | Apr 2015 | A1 |
| 20150099557 | Pettinelli et al. | Apr 2015 | A1 |
| 20150100196 | Hollifield | Apr 2015 | A1 |
| 20150102109 | Huck | Apr 2015 | A1 |
| 20150115035 | Meier et al. | Apr 2015 | A1 |
| 20150127791 | Kosecki et al. | May 2015 | A1 |
| 20150128116 | Chen et al. | May 2015 | A1 |
| 20150129659 | Feng et al. | May 2015 | A1 |
| 20150133047 | Smith et al. | May 2015 | A1 |
| 20150134470 | Hejl et al. | May 2015 | A1 |
| 20150136851 | Harding et al. | May 2015 | A1 |
| 20150136854 | Lu et al. | May 2015 | A1 |
| 20150142492 | Kumar | May 2015 | A1 |
| 20150144692 | Hejl | May 2015 | A1 |
| 20150144698 | Teng et al. | May 2015 | A1 |
| 20150144701 | Xian et al. | May 2015 | A1 |
| 20150149946 | Benos et al. | May 2015 | A1 |
| 20150161429 | Xian | Jun 2015 | A1 |
| 20150169925 | Chang et al. | Jun 2015 | A1 |
| 20150169929 | Williams et al. | Jun 2015 | A1 |
| 20150186703 | Chen et al. | Jul 2015 | A1 |
| 20150193644 | Kearney et al. | Jul 2015 | A1 |
| 20150193645 | Colavito et al. | Jul 2015 | A1 |
| 20150199957 | Funyak et al. | Jul 2015 | A1 |
| 20150204671 | Showering | Jul 2015 | A1 |
| 20160099963 | Mahaffey | Apr 2016 | A1 |
| Number | Date | Country |
|---|---|---|
| 2013163789 | Nov 2013 | WO |
| 2013173985 | Nov 2013 | WO |
| 2014019130 | Feb 2014 | WO |
| 2014110495 | Jul 2014 | WO |
| Entry |
|---|
| App Building Two cents' Worth: Barcode Apps for IPad/IPhne, Android & Blackberry by Good, published on Jul. 23, 2013. |
| Scanning Barcodes with Androids devices—TracerPlus Support Center, published on Oct. 17, 2013. |
| Create your own Barcode Scanning App in Minutes on ioS and Androids Devices by Baldwin, published on Apr. 17, 2012. |
| U.S. Appl. No. 14/519,179 for Dimensioning System With Multipath Interference Mitigation filed Oct. 21, 2014 (Thuries et al.); 30 pages. |
| U.S. Appl. No. 14/264,173 for Autofocus Lens System for Indicia Readers filed Apr. 29, 2014, (Ackley et al.); 39 pages. |
| U.S. Appl. No. 14/453,019 for Dimensioning System With Guided Alignment, filed Aug. 6, 2014 (Li et al.); 31 pages. |
| U.S. Appl. No. 14/452,697 for Interactive Indicia Reader , filed Aug. 6, 2014, (Todeschini); 32 pages. |
| U.S. Appl. No. 14/231,898 for Hand-Mounted Indicia-Reading Device with Finger Motion Triggering filed Apr. 1, 2014 (Van Horn et al.); 36 pages. |
| U.S. Appl. No. 14/715,916 for Evaluating Image Values filed May 19, 2015 (Ackley); 60 pages. |
| U.S. Appl. No. 14/513,808 for Identifying Inventory Items in a Storage Facility filed Oct. 14, 2014 (Singel et al.); 51 pages. |
| U.S. Appl. No. 29/458,405 for an Electronic Device, filed Jun. 19, 2013 (Fitch et al.); 22 pages. |
| U.S. Appl. No. 29/459,620 for an Electronic Device Enclosure, filed Jul. 2, 2013 (London et al.); 21 pages. |
| U.S. Appl. No. 14/483,056 for Variable Depth of Field Barcode Scanner filed Sep. 10, 2014 (McCloskey et al.); 29 pages. |
| U.S. Appl. No. 14/531,154 for Directing an Inspector Through an Inspection filed Nov. 3, 2014 (Miller et al.); 53 pages. |
| U.S. Appl. No. 29/525,068 for Tablet Computer With Removable Scanning Device filed Apr. 27, 2015 (Schulte et al.); 19 pages. |
| U.S. Appl. No. 29/468,118 for an Electronic Device Case, filed Sep. 26, 2013 (Oberpriller et al.); 44 pages. |
| U.S. Appl. No. 14/340,627 for an Axially Reinforced Flexible Scan Element, filed Jul. 25, 2014 (Reublinger et al.); 41 pages. |
| U.S. Appl. No. 14/676,327 for Device Management Proxy for Secure Devices filed Apr. 1, 2015 (Yeakley et al.); 50 pages. |
| U.S. Appl. No. 14/257,364 for Docking System and Method Using Near Field Communication filed Apr. 21, 2014 (Showering); 31 pages. |
| U.S. Appl. No. 14/327,827 for a Mobile-Phone Adapter for Electronic Transactions, filed Jul. 10, 2014 (Hejl); 25 pages. |
| U.S. Appl. No. 14/334,934 for a System and Method for Indicia Verification, filed Jul. 18, 2014 (Hejl); 38 pages. |
| U.S. Appl. No. 29/530,600 for Cyclone filed Jun. 18, 2015 (Vargo et al); 16 pages. |
| U.S. Appl. No. 14/707,123 for Application Independent DEX/UCS Interface filed May 8, 2015 (Pape); 47 pages. |
| U.S. Appl. No. 14/283,282 for Terminal Having Illumination and Focus Control filed May 21, 2014 (Liu et al.); 31 pages. |
| U.S. Appl. No. 14/619,093 for Methods for Training a Speech Recognition System filed Feb. 11, 2015 (Pecorari); 35 pages. |
| U.S. Appl. No. 29/524,186 for Scanner filed Apr. 17, 2015 (Zhou et al.); 17 pages. |
| U.S. Appl. No. 14/705,407 for Method and System to Protect Software-Based Network-Connected Devices From Advanced Persistent Threat filed May 6, 2015 (Hussey et al.); 42 pages. |
| U.S. Appl. No. 14/614,706 for Device for Supporting an Electronic Tool on a User's Hand filed Feb. 5, 2015 (Oberpriller et al.); 33 pages. |
| U.S. Appl. No. 14/628,708 for Device, System, and Method for Determining the Status of Checkout Lanes filed Feb. 23, 2015 (Todeschini); 37 pages. |
| U.S. Appl. No. 14/704,050 for Intermediate Linear Positioning filed May 5, 2015 (Charpentier et al.); 60 pages. |
| U.S. Appl. No. 14/529,563 for Adaptable Interface for a Mobile Computing Device filed Oct. 31, 2014 (Schoon et al.); 36 pages. |
| U.S. Appl. No. 14/705,012 for Hands-Free Human Machine Interface Responsive to a Driver of a Vehicle filed May 6, 2015 (Fitch et al.); 44 pages. |
| U.S. Appl. No. 14/715,672 for Augumented Reality Enabled Hazard Display filed May 19, 2015 (Venkatesha et al.); 35 pages. |
| U.S. Appl. No. 14/695,364 for Medication Management System filed Apr. 24, 2015 (Sewell et al.); 44 pages. |
| U.S. Appl. No. 14/664,063 for Method and Application for Scanning a Barcode With a Smart Device While Continuously Running and Displaying an Application on the Smart Device Display filed Mar. 20, 2015 (Todeschini); 37 pages. |
| U.S. Appl. No. 14/735,717 for Indicia-Reading Systems Having an Interface With a User's Nervous System filed Jun. 10, 2015 (Todeschini); 39 pages. |
| U.S. Appl. No. 14/527,191 for Method and System for Recognizing Speech Using Wildcards in an Expected Response filed Oct. 29, 2014 (Braho et al.); 45 pages. |
| U.S. Appl. No. 14/702,110 for System and Method for Regulating Barcode Data Injection Into a Running Application on a Smart Device filed May 1, 2015 (Todeschini et al.); 38 pages. |
| U.S. Appl. No. 14/535,764 for Concatenated Expected Responses for Speech Recognition filed Nov. 7, 2014 (Braho et al.); 51 pages. |
| U.S. Appl. No. 14/687,289 for System for Communication Via a Peripheral Hub filed Apr. 15, 2015 (Kohtz et al.); 37 pages. |
| U.S. Appl. No. 14/747,197 for Optical Pattern Projector filed Jun. 23, 2015 (Thuries et al.); 33 pages. |
| U.S. Appl. No. 14/674,329 for Aimer for Barcode Scanning filed Mar. 31, 2015 (Bidwell); 36 pages. |
| U.S. Appl. No. 14/702,979 for Tracking Battery Conditions filed May 4, 2015 (Young et al.); 70 pages. |
| U.S. Appl. No. 29/529,441 for Indicia Reading Device filed Jun. 8, 2015 (Zhou et al.); 14 pages. |
| U.S. Appl. No. 14/747,490 for Dual-Projector Three-Dimensional Scanner filed Jun. 23, 2015 (Jovanovski et al.); 40 pages. |
| U.S. Appl. No. 14/740,320 for Tactile Switch for a Mobile Electronic Device filed Jun. 16, 2015 (Barndringa); 38 pages. |
| U.S. Appl. No. 14/695,923 for Secure Unattended Network Authentication filed Apr. 24, 2015 (Kubler et al.); 52 pages. |
| U.S. Appl. No. 14/740,373 for Calibrating a Volume Dimensioner filed Jun. 16, 2015 (Ackley et al.); 63 pages. |
| U.S. Appl. No. 13/367,978, filed Feb. 7, 2012, (Feng et al.); now abandoned. |
| U.S. Appl. No. 14/462,801 for Mobile Computing Device With Data Cognition Software, filed on Aug. 19, 2014 (Todeschini et al.); 38 pages. |
| U.S. Appl. No. 14/596,757 for System and Method for Detecting Barcode Printing Errors filed Jan. 14, 2015 (Ackley); 41 pages. |
| U.S. Appl. No. 14/277,337 for Multipurpose Optical Reader, filed May 14, 2014 (Jovanovski et al.); 59 pages. |
| U.S. Appl. No. 14/200,405 for Indicia Reader for Size-Limited Applications filed Mar. 7, 2014 (Feng et al.); 42 pages. |
| U.S. Appl. No. 14/662,922 for Multifunction Point of Sale System filed Mar. 19, 2015 (Van Horn et al.); 41 pages. |
| U.S. Appl. No. 14/446,391 for Multifunction Point of Sale Apparatus With Optical Signature Capture filed Jul. 30, 2014 (Good et al.); 37 pages. |
| U.S. Appl. No. 29/528,165 for In-Counter Barcode Scanner filed May 27, 2015 (Oberpriller et al.); 13 pages. |
| U.S. Appl. No. 29/528,890 for Mobile Computer Housing filed Jun. 2, 2015 (Fitch et al.); 61 pages. |
| U.S. Appl. No. 14/614,796 for Cargo Apportionment Techniques filed Feb. 5, 2015 (Morton et al.); 56 pages. |
| U.S. Appl. No. 29/516,892 for Table Computer filed Feb. 6, 2015 (Bidwell et al.); 13 pages. |
| U.S. Appl. No. 29/523,098 for Handle for a Tablet Computer filed Apr. 7, 2015 (Bidwell et al.); 17 pages. |
| U.S. Appl. No. 14/578,627 for Safety System and Method filed Dec. 22, 2014 (Ackley et al.); 32 pages. |
| U.S. Appl. No. 14/573,022 for Dynamic Diagnostic Indicator Generation filed Dec. 17, 2014 (Goldsmith); 43 pages. |
| U.S. Appl. No. 14/529,857 for Barcode Reader With Security Features filed Oct. 31, 2014 (Todeschini et al.); 32 pages. |
| U.S. Appl. No. 14/519,195 for Handheld Dimensioning System With Feedback filed Oct. 21, 2014 (Laffargue et al.); 39 pages. |
| U.S. Appl. No. 14/519,211 for System and Method for Dimensioning filed Oct. 21, 2014 (Ackley et al.); 33 pages. |
| U.S. Appl. No. 14/519,233 for Handheld Dimensioner With Data-Quality Indication filed Oct. 21, 2014 (Laffargue et al.); 36 pages. |
| U.S. Appl. No. 14/533,319 for Barcode Scanning System Using Wearable Device With Embedded Camera filed Nov. 5, 2014 (Todeschini); 29 pages. |
| U.S. Appl. No. 14/748,446 for Cordless Indicia Reader With a Multifunction Coil for Wireless Charging and EAS Deactivation, filed Jun. 24, 2015 (Xie et al.); 34 pages. |
| U.S. Appl. No. 29/528,590 for Electronic Device filed May 29, 2015 (Fitch et al.); 9 pages. |
| U.S. Appl. No. 14/519,249 for Handheld Dimensioning System With Measurement-Conformance Feedback filed Oct. 21, 2014 (Ackley et al.); 36 pages. |
| U.S. Appl. No. 29/519,017 for Scanner filed Mar. 2, 2015 (Zhou et al.); 11 pages. |
| U.S. Appl. No. 14/398,542 for Portable Electronic Devices Having a Separate Location Trigger Unit for Use in Controlling an Application Unit filed Nov. 3, 2014 (Bian et al.); 22 pages. |
| U.S. Appl. No. 14/405,278 for Design Pattern for Secure Store filed Mar. 9, 2015 (Zhu et al.); 23 pages. |
| U.S. Appl. No. 14/590,024 for Shelving and Package Locating Systems for Delivery Vehicles filed Jan. 6, 2015 (Payne); 31 pages. |
| U.S. Appl. No. 14/568,305 for Auto-Contrast Viewfinder for an Indicia Reader filed Dec. 12, 2014 (Todeschini); 29 pages. |
| U.S. Appl. No. 29/526,918 for Charging Base filed May 14, 2015 (Fitch et al.); 10 pages. |
| U.S. Appl. No. 14/580,262 for Media Gate for Thermal Transfer Printers filed Dec. 23, 2014 (Bowles); 36 pages. |
| Number | Date | Country | |
|---|---|---|---|
| 20160323310 A1 | Nov 2016 | US |