top of page

322 results found

  • Open Source Vulnerabilities - What are they and how to check them?

    The Open source software’s source code files are managed by many people, therefore vulnerability relies Thus, once they find a flaw in the code, they can manipulate it to cause harm or retrieve sensitive data The files may further comprise open source libraries and dependencies that are left unchecked by the CVEs have remained at exponentially high levels into the first three months of 2020 too, suggesting this These tools find vulnerabilities in the source code of an application and help in determining which type

  • Understanding Reissued Patents

    enlarge the scope of the claims of the original patent or the application for the original patent was filed Additionally, Section 251 allows either the inventors or the assignee of the entire interest to file Earlier the filing of a reissue application required a formal surrender of the granted patent. What are the Grounds for Filing for a Reissued Patent? Can We Broaden the Scope of the Patent Through Filing a Reissue?

  • IoT-Based Glucose Monitoring Systems

    physicians to deliver superlative care. 4-Step Process for IoT based Healthcare System Step 1: The first Step 4: Final data is managed and analyzed at the required level. Finally, the work provides many advanced services at a gateway level such as a push notification service The guidelines for Electromagnetic Field Exposure (EMF) is in terms of Specific Absorption Rate (SAR) The graph shows that Samsung is actively working in the field of IoT healthcare as well.

  • What is Technology Risk Assessment?

    Information Technology (IT) has gained wide importance amongst the competitive position of firms and While laying out the enterprise’s risk mitigation plan, consider how it fits into the existing security Financial institutions have started relying on technology on a massive scale to help support their business is also important for companies that need to comply with consumer privacy standards like PCI DSS or financial The next step would be to find an appropriate risk management process that covers usually steps like

  • Smart Clothing - IoT gets even closer!

    are adapted to the human body in order to be worn as accessories like smartwatches, smart glasses or fitness Growing awareness about the importance for sports & fitness is expected to provide substantial growth These advanced uniforms are used to identify the fitness of the soldiers, detect wounds & injuries and Sensoria Fitness Socks - These fitness socks use advanced textile sensors built into each sock, plus Google partnered with Levi’s to launch the first generation of Jacquard-enabled jackets a couple of years

  • In re DABUS: Can AI be granted patents?

    that this may cause the courts to look at what manner and categories of patent eligibility will AI fit

  • Flexible Batteries: State of the Art

    These new batteries possess : Footprints (micro-batteries or large-area batteries) Thickness (thin-film Thin-film batteries are also widely used in smart packaging, smart cards and wearable devices. demand for miniaturized products used in these applications has led to a rise in the adoption of thin-film Therefore, electrolytes that possess a wide electrochemical window and stable interface‐film‐forming High-energy thin-film batteries have the highest potential here followed by printed rechargeable zinc

  • Fake News: Patents To The Rescue?

    It works by selecting the first news article from a plurality of news sources, analyses it via a stored The rating is then accumulated for all categories and the final rating is delivered the user’s device The analysis keeps proceeding onto the next tier in order find the accurate rating. The Filtering module based on language and profanity removes the inappropriate data. The Organization module then fetches the filtered data from filtered data store to determine key concepts

  • Working Towards a Greener Future - HyperSolar's Environment Friendly Hydrogen Generator

    cells is high, and can be produced at a lower cost than what it would take to produce the traditional film

  • Tokenized securities on blockchain are here. And they’ve been around for a while.

    With the entire year in crypto defined by a maelstrom of projects embarking on decentralized finance But SPiCE will argue it was even earlier, as the VC fund set up in 2017 and lays claim to being the first This year, AllianceBlock, which is building the “world’s first globally compliant decentralized capital market” partnered with another blockchain firm AIKON for a secure blockchain-based identity management service -- making decentralized finance services accessible to all, and securing that access with the

  • LTE (4G) network security model and its drawbacks covered in 5G network

    cross-industry transformation has led to the involvement of the concept of wireless connectivity for the fifth Telecommunication networks, both fixed and mobile, are set to play an important role in the 5G era, ultimately used for providing inter-operator signaling and security functions such as topology hiding, message filtering References 1.https://www-file.huawei.com/-/media/corporate/pdf/trust-center/huawei-5g-security-white-paper

  • Quantum Cascade Lasers as a Source for Terahertz Radiation

    The fast pace advancement in this field owes largely to the advances in photonics, quantum mechanics. The field receiving the most attention is medical imaging and spectroscopy. Before proceeding further, it’s necessary to first understand the concept of quantum wells. Figure above shows the quantum well for the conduction band. In figure below initial and final states have the same curvature.

Let's Talk!

Ready to take your IP efforts to the next level? We would love to discuss how our expertise can help you achieve your goals!

Copperpod is one of the world's leading technology research and forensics firms, with an acute focus on management and monetization of intellectual property assets. 

Policy Statements

Contact Info

9901 Brodie Lane, Suite 160 - 828

Austin, TX 78748

​​​​

info@copperpodip.com

  • LinkedIn
  • Facebook
  • X
  • YouTube
  • Medium 2

© 2025 Carthaginian Ventures Private Limited d/b/a Copperpod IP. All Rights Reserved.                                                                                                               

bottom of page