Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Shape Corp patents


Recent patent applications related to Shape Corp. Shape Corp is listed as an Agent/Assignee. Note: Shape Corp may have other listings under different names/spellings. We're not affiliated with Shape Corp, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "S" | Shape Corp-related inventors


Vehicle battery tray structure with nodal modularity

A battery support structure for a vehicle includes a plurality of side reinforcement members and front and rear reinforcement members. The plurality of side reinforcement members are configured to extend longitudinally relative to an associated vehicle frame, and the front and rear reinforcement members are configured to extend laterally relative to the associated vehicle frame. ... Shape Corp

Obfuscating source code sent, from a server computer, to a browser on a client computer

Programs written in interpreted languages, such as javascript, are distributed in source form, which is helpful to attackers so that they can more easily derive the purposes and effects of a program. As discussed herein, a program's high-level code may be effectively obfuscated by transforming the program's code from its high-level programming language to low-level processor-specific language, such as x86 instructions for x86 processors, jvm bytecode for jvms, or proprietary opcodes for a corresponding proprietary processor or interpreter. ... Shape Corp

Reliable selection of security countermeasures

Among other things, this document describes a computer-implemented security method such as for authenticated selection of security countermeasures and for reliable identification of computing devices. The method can include receiving, by a computing system, a request from a computing device for an electronic resource. ... Shape Corp

Method and system for managing flight plan for unmanned aerial vehicle

A method for managing a flight plan for an unmanned aerial vehicle. The method includes providing a preliminary flight plan for the unmanned aerial vehicle, flying the unmanned aerial vehicle according to the preliminary flight plan, monitoring a location of the flying unmanned aerial vehicle, executing flight planning actions when the location is proximal to at least one asset, and modifying the preliminary flight plan based on the executed flight planning actions. ... Shape Corp

Polymorphic treatment of annotated content

A computer-implemented method includes receiving content and annotation information that describe a structure of the content, the annotation information having been previously generated by a sub-system that is separate from a content transformation sub-system and at a time before the content was requested to be served; interpreting the annotation information to generate transcoding rules that identify one or more portions of the received content to be transcoded in serving the content; applying the transcoding rules to the content to change the content in a manner that interferes with an ability of malware on a client device to interfere with operation of the content; and providing the transcoded content to a client device that requested the content.. . ... Shape Corp

Apparatus for providing maintenance and shelter to drone

An apparatus for providing maintenance and shelter to at least one drone. The apparatus includes at least one maintenance unit operable to provide maintenance to a drone that has arrived for maintenance thereat; a base structure for providing support to the at least one maintenance unit; at least one landing structure suitable for the drone to land thereat, each landing structure including a first actuator that is operable to move the landing structure in relation to the base structure, so as to align the drone landed on the landing structure with respect to the at least one maintenance unit; and means for supporting the base structure on ground, the means for supporting the base structure operable to alter position of the base structure to provide shelter to the landing structure.. ... Shape Corp

Method and system for monitoring operational status of drone

A method of monitoring an operational status of a drone includes capturing statistical data pertaining to a plurality of flight parameters for a flight route using at least one drone whilst the drone flies substantially along the flight route at least once. Transmitting the statistical data to a ground control station and analyzing the statistical data to determine at least a minimum and a maximum threshold for each of the flight parameters. ... Shape Corp

Multi-part counting system for three-dimensional printed parts

According to one aspect, embodiments herein provide a 3d printing system comprising an interface, a database, a production planning system configured to receive a model provided by a user, and a multi-part counting system configured to receive, from the production planning system, the user-provided model, calculate a bounds of the user-provided model, perform a first test on each of the plurality of pieces of the model to determine if each piece can escape the bounds of the model individually in relation to each other piece of the model, perform a second test on each of the plurality of pieces of the model to determine if each piece can escape the bounds of the model simultaneously in relation to all other pieces of the model, and output, based on the first test and the second test, a determination of different discrete and interlocking parts in the model.. . ... Shape Corp

Systems, methods and apparatus for guided tools

The present disclosure is directed to calibrating position detection for a tool. The tool can use a sensor to detect a first value of a parameter. ... Shape Corp

Obfuscating web code

A computer-implemented method, the method includes identifying a piece of data to be served from a server system to a client device that is remote from the server system; creating a plurality of expressions that, when executed, provide a result that corresponds to the piece of data; and providing the plurality of expressions to the client device with code for executing the plurality of expressions.. . ... Shape Corp

Systems and methods for identifying three-dimensional printed objects

According to some aspects, a system for identifying a printed object is provided. The system may include an imaging device configured to image a three-dimensional (3d) printed object and a processor coupled to the imaging device. ... Shape Corp

Systems and methods for planning printing of three-dimensional objects

A system for planning printing of three-dimensional (3d) objects. The system comprises at least one computer hardware processor, and at least one non-transitory computer-readable storage medium storing processor-executable instructions that, when executed by the at least one computer hardware processor, cause the at least one computer hardware processor to perform acts of: accessing information specifying a plurality of 3d objects to be printed using at least one 3d printer, the at least one 3d printer including a first 3d printer; determining a priority for each of at least some of the plurality 3d objects to obtain determined 3d object priorities; assigning, based on the determined 3d object priorities, a subset of the plurality of 3d objects to a first printer tray adapted for use with the first 3d printer; and obtaining a packing plan indicating an arrangement of the subset of the 3d objects within the first printer tray.. ... Shape Corp

Challenge-dynamic credential pairs for client/server request validation

In an embodiment, a computer system configured to: generate a first challenge credential to be sent to a client computer; render one or more first dynamic-credential instructions, which when executed by the client computer, cause the client computer to generate a first dynamic credential that corresponds to the first challenge credential; modify a first set of instructions, which define one or more original operations, to produce a second set of instructions, wherein the second set of instructions include the first challenge credential and the one or more first dynamic-credential instructions, and which when executed by the client computer, cause the first challenge credential to be included in the one or more requests sent from the client computer; send the second set of instructions to a second computer.. . ... Shape Corp

System and method of providing a multi-validator oracle

Disclosed is a system and method of implementing a multi-validator oracle. The method includes receiving a notification at a multi-validator oracle from an external smart contract that requests data from the multi-validator oracle to be provided to the external smart contract according to a set of parameters to yield requested data, gathering the requested data from at least one application programming interface for a website that provides information associated with the requested data, validating the requested data based on a first verification from a first private key and a second verification from a second private key to yield a validation and, based on the notification and validation, providing the requested data to the external smart contract.. ... Shape Corp

03/29/18 / #20180089761

System and method of providing a leader-follower multi-asset portfolio

Disclosed is a system and method of implementing a leader-follower set of smart contracts on a blockchain. The method includes establishing a follower multi-asset blockchain based trustless smart contract for managing a multi-asset portfolio, inserting into the multi-asset blockchain based trustless smart contract an authorization for a leader multi-asset blockchain based trustless smart contract to send messages from the leader multi-asset blockchain based trustless smart contract to the multi-asset blockchain based trustless smart contract regarding a leader rebalancing of the follower multi-asset blockchain based trustless smart contract to yield a follower multi-asset blockchain based trustless smart contract, and modifying the follower multi-asset blockchain based trustless smart contract based at least in part on the leader rebalancing of the leader multi-asset blockchain based trustless smart contract.. ... Shape Corp

03/29/18 / #20180089760

System and method of providing a multi-asset rebalancing mechanism

Disclosed is a system and method of implementing a smart contract on a blockchain. The method includes establishing a multi-asset blockchain based trustless smart contract for managing a multi-asset portfolio, receiving an indication from an individual associated with the multi-asset portfolio of a desire to rebalance the multi-asset portfolio, presenting the individual with an interface to rebalance the multi-asset portfolio, receiving input from the individual comprising a rebalancing of the multi-asset portfolio and updating the multi-asset blockchain based trustless smart contract to yield a modified multi-asset blockchain based trustless smart contract which incorporates the rebalancing.. ... Shape Corp

03/29/18 / #20180089759

System and method of managing trustless asset portfolios

In some examples, a system or method of implementing a smart contract on a blockchain can involve receiving an indication of a portfolio of assets, an amount from a buyer to invest in the portfolio, a number of assets in the portfolio that is based on exchange rates and the amount to invest, and a confirmation from the buyer of the number of assets. The system or method can involve calculating a cost of the portfolio to yield a contract, receiving the amount and excess collateral from the buyer as a buyer acceptance of the contract, and an entity acceptance of the contract including an entity amount. ... Shape Corp

03/29/18 / #20180089758

System and method of providing a contract-creator application

Disclosed is a system and method of creating a smart contract on a blockchain. The approach includes receiving, from a user, one or more parameters via a user interface, each of the one or more parameters being associated with a creation of a customized smart contract. ... Shape Corp

03/15/18 / #20180077160

Client/server security by executing instructions and rendering client application instructions

In an embodiment, a method comprises intercepting, from a server computer, a first set of instructions that define a user interface; executing, using a headless browser, the first set of instructions without presenting the user interface; rendering a second set of instructions, which when executed by a client application on a client computer, cause the client computer to present the user interface, wherein the second set of instructions are different than the first set of instructions; sending the second set of instructions to the client computer.. . ... Shape Corp

03/01/18 / #20180059880

Methods and systems for interactive three-dimensional electronic book

The present inventive concept relates to a system for providing an interactive three-dimensional electronic book. The system includes an input module, a processor, and an output module. ... Shape Corp

03/01/18 / #20180056352

Warm forming process and apparatus for transverse bending of an extruded aluminum beam to warm form a vehicle structural component

A method for warm forming an aluminum beam, such as an aluminum component for a vehicle, includes providing an extruded aluminum beam with a hollow cross-sectional shape. A portion of a forming die is heated to a desired temperature, so as to heat a portion of the aluminum beam in the die to a temperature below the artificial aging temperature of the aluminum beam. ... Shape Corp

02/22/18 / #20180050607

Battery support and protection structure for a vehicle

A battery support structure for a vehicle includes a first peripheral member configured to be supported by a longitudinal section of a vehicle frame. A second peripheral member has an end surface that selectively attaches at an inside surface of the first peripheral member to enclose a corner section of a battery containment area. ... Shape Corp

02/15/18 / #20180048671

Securing web page content

Methods and apparatus are described for automatically modifying web page source code to address a variety of security vulnerabilities such as, for example, vulnerabilities that are exploited by mixed content attacks.. . ... Shape Corp

02/08/18 / #20180041527

Using instrumentation code to detect bots or malware

Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. ... Shape Corp

01/25/18 / #20180026943

Modifying authentication for an application programming interface

Application programming interfaces (apis) can be unintentionally exposed and allow for potentially undesirable use of corporate resources. An api call filtering system configured to monitor api call requests received via an endpoint and api call responses received via a supporting service of an api or web service. ... Shape Corp

01/25/18 / #20180024550

Method and system for controlling remotely piloted aircraft

Disclosed are a method and a system for modifying flight parameters of a remotely piloted aircraft. The remotely piloted aircraft includes a clock, at least one radio receiver and at least one radio transmitter for communicating with at least one radio transmitter of a ground station, via at least one radio communication network. ... Shape Corp

01/25/18 / #20180020992

Systems and methods for medical visualization

A visualization system includes an imaging device, a processing circuit, and a display device. The imaging device is configured to acquire image data relating to an object. ... Shape Corp

01/04/18 / #20180006814

Client-side security key generation

Techniques are provided for client-side security key generation. An initial request is received from an application executing on a client device. ... Shape Corp

12/21/17 / #20170361793

Multi-strip beam for a vehicle

. . A beam article for a vehicle includes a plurality of separate elongated metal sheets attached together to form generally planar walls of an elongated tubular structure. At least one of the plurality of separate elongated metal sheets has a shear wall that is disposed along a hollow interior of the elongated tubular structure and is attached at opposing walls of the elongated tubular structure. ... Shape Corp

12/07/17 / #20170353711

System for capturing a textured 3d scan of a human body

One variation of a system for capturing a textured 3d scan of an human body includes: a base configured to support a user; a sensor assembly configured to record optical scans; a robotic arm coupled to the base and configured to move the sensor assembly along a helical path extending upwardly from and around the base during a scanning routine; and a controller configured to stitch optical scans recorded by the sensor assembly during the scanning routine into the 3d scan of the human body of the user.. . ... Shape Corp

11/30/17 / #20170345317

Dynamic routing based on captured data quality

Disclosed are a method, system, and a computer readable medium for dynamic routing of a drone. The method includes receiving a first flight mission by the drone, the first flight mission having a first cost relating to resources of the drone; flying the drone and capturing data according to the flight mission by a sensor; assessing quality of the captured data; and comparing the quality of the captured data to a pre-defined threshold. ... Shape Corp

11/09/17 / #20170324722

Management of dynamic credentials

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.. . ... Shape Corp

10/26/17 / #20170308078

Method and system for controlling remotely piloted aircraft

Disclosed are a method and a system for modifying flight parameters of a remotely piloted aircraft. The remotely piloted aircraft includes a clock, at least one radio receiver and at least one radio transmitter for communicating with at least one radio transmitter of a ground station, via at least one radio communication network. ... Shape Corp

10/26/17 / #20170305570

System and method for calculating weight distribution of drone

A system having a drone and a payload frame connected to the drone, wherein the payload frame includes a mechanism for attaching at least one payload module to the payload frame and electrically coupling the at least one payload module to the payload frame. The electrical coupling includes a communication interface for communicating with a controller of the drone, and is configured to communicate a relative location of the at least one payload module in the payload frame, a weight of the at least one payload module and a volume of the at least one payload module. ... Shape Corp

10/26/17 / #20170304679

Sensor equipped resistance training grip

An example exercise tracker includes a grip for receiving an adjustable amount of exercise resistance, a force sensor having one or more strain gauges programmed to output a force signal representing a force applied to the grip, and a motion sensor programmed to detect movement of the grip and output a motion signal. The exercise tracker further includes a processor programmed to receive the force signal and the motion signal and determine, from the force signal and the motion signal, exercise data including the amount of resistance applied to the grip.. ... Shape Corp

09/14/17 / #20170264623

Applying bytecode obfuscation techniques to programs written in an interpreted language

In an embodiment, a computer system configured to improve security of client computer interacting with server computers comprises one or more processors; a digital electronic memory storing a set of program instructions which when executed using the one or more processors cause the one or more processors to: process a first set of original instructions that produce a first set of outputs or effects; generate a first set of interpreter instructions that define a first interpreter; generate a first set of alternate instructions from the first set of original instructions, wherein the first set of alternate instructions is functionally equivalent to the first set of original instructions when the first set of alternate instructions is executed by the first interpreter; send, to the first client computer, the first set of alternate instructions and the first set of interpreter instructions.. . ... Shape Corp

09/14/17 / #20170259767

Multi-tubular reinforcement beam with center leg

A vehicle reinforcement beam is roll formed from a metal sheet to provide a multi-tubular reinforcement beam that includes two adjacent tubular sections that share a common center wall. The outer sections the metal sheet extend from opposing ends of the common center wall and are formed to enclose the adjacent tubular sections. ... Shape Corp

09/14/17 / #20170258253

Container holder apparatus and system and method for attaching a holder and a lid to a container

A device for holding a container having a bead around an opening is provided. The device includes a handle and at least two curved elements extending from the handle, with each curved element including an upper section sized to be positionable adjacent to the container bead. ... Shape Corp

09/07/17 / #20170257385

Variable runtime transpilation

In an approach, an apparatus comprises: one or more processors; a processor logic coupled to the one or more processors and configured to: intercept, from a client computer, a request directed to a server computer that identifies a purported user agent executing on the client computer; send, to the server computer, the request from the client computer; intercept, from the server computer, one or more original instructions to be executed by the purported user agent of the client computer; determine one or more features supported by the purported user agent that are not utilized by the one or more original instructions; transform the one or more original instructions into one or more revised instructions which, when executed by the purported user agent, cause the purported user agent to utilize the one or more features; send, to the client computer, the one or more revised instructions.. . ... Shape Corp

09/07/17 / #20170257383

Deterministic reproduction of client/server computer state or output sent to one or more client computers

Computer systems and methods for improving security or performance of one or more client computers interacting with a plurality of server computers. In an embodiment, a computer system comprises a first server computer and a second server computer; wherein the first server computer is configured to: generate a challenge nonce, wherein the challenge nonce corresponds to a challenge state; generate the challenge state based on the challenge nonce, wherein the challenge state corresponds to a response state; send, to a first client computer, the challenge nonce and the challenge state, but not the response state; wherein the second server computer is configured to: receive, from the first client computer, a test nonce and a test response state; determine whether the test response state matches the response state based on the test nonce, without: receiving the challenge state from the first server computer; receiving the challenge state from the first client computer.. ... Shape Corp

08/17/17 / #20170237766

Reverse proxy computer: deploying countermeasures in response to detecting an autonomous browser executing on a client computer

A computer system configured to improve security of server computers interacting with client computers, the system comprising: one or more processors executing instructions that cause the one or more processors to: select, from the plurality of detection tests, one or more first detection tests to be performed by a client computer; send, to the client computer, a first set of detection instructions that define the one or more first detection tests, and which when executed causes generating a first set of results that identifies a first set of characteristics of the client computer; receive the first set of results from the client computer; select one or more first countermeasures from a plurality of countermeasures based on the first set of characteristics identified in the first set of results; send, to the client computer, a first set of countermeasure instructions that define the one or more first countermeasures.. . ... Shape Corp

07/13/17 / #20170201540

Protecting a server computer by detecting the identity of a browser on a client computer

A computer-implemented method for identifying abnormal computer behavior includes receiving, at a computer server subsystem, data that characterizes subsets of particular document object models for web pages rendered by particular client computers; identifying clusters from the data that characterize the subsets of the particular document object models; and using the clusters to identify alien content on the particular client computers, wherein the alien content comprises content in the document object models that is not the result of content that is the basis of the document object model served.. . ... Shape Corp

07/13/17 / #20170196895

Composition comprising gpcr19 agonist as an active ingredient for preventing or treating allergic dermatitis

The present invention is about a pharmaceutical composition, an oral preparation, and an injection preparation containing a g protein-coupled receptor19 (gpcr19) agonist, specifically sodium taurodeoxycholate(hy2191) and its derivative, as an active ingredient for preventing or treating allergic skin diseases. The present invention is also about an external preparation and a cosmetic composition containing said pharmaceutical composition for preventing and improving allergic skin diseases. ... Shape Corp

06/01/17 / #20170154331

Systems and methods for improving security in blockchain-asset exchange

The embodiments described herein comprise hardware and software improvements in blockchain-asset exchange technology, whereby one or more servers automatically, based on a set of predetermined rules, executes a mechanism allowing blockchain-asset exchange customers to place standing-limit or market orders for blockchain-based digital assets (e.g., cryptocurrencies) with a counter-party, but without counter-party risk. The counter-party will not receive the payment until the customer's exchange order has executed, and the customer has taken possession and ownership of the desired asset. ... Shape Corp

05/11/17 / #20170132808

Method and system for inertial measurement

A method and a system for inertial measurement. The method includes controlling at least one imaging sensor to capture at least two consecutive images, processing the at least two consecutive images to identify at least one feature therein and determining at least one parameter associated with the at least one feature, and determining a change in a position and an orientation of the at least one imaging sensor, based upon the at least one parameter associated with the at least one feature. ... Shape Corp

05/11/17 / #20170131390

Planar imaging sensor

A planar imaging sensor is provided. The planar imaging sensor includes a plurality of photo detectors divided into at least a first group of photo detectors and a second group of photo detectors, the first group of photo detectors having a first detection window and the second group of photo detectors having a second detection window, wherein the second detection window is configured to start later in time than the first detection window.. ... Shape Corp

05/04/17 / #20170126627

Web transaction status tracking

Systems, methods, and other techniques for improving the operation of computing systems are described. Some implementations include a computer-implemented method. ... Shape Corp

04/27/17 / #20170118241

Multi-layer computer security countermeasures

A computer-implemented security method includes receiving, at a server sub-system, reports from a plurality of clients that were served content served by a web server system, the different versions of content varying from each other by polymorphic transformation that inserts varying content at common locations in the content; determining, with the server sub-system, an effectiveness level of security countermeasures applied to the content, using the received reports; selecting an updated security countermeasure package determined to address malware identified using data from the reports; and providing to the web server system information causing the web server system to switch to the updated security countermeasure package.. . ... Shape Corp

03/02/17 / #20170063923

Polymorphic obfuscation of executable code

This document generally relates to systems, method, and other techniques for identifying and interfering with the operation of computer malware, as a mechanism for improving system security. Some implementations include a computer-implemented method by which a computer security server system performs actions including receiving a request for content directed to a particular content server system; forwarding the request to the particular content server system; receiving executable code from the particular content server system; inserting executable injection code into at least one file of the executable code; applying a security countermeasure to the combined executable code and executable injection code to create transformed code; and providing the transformed code to a client computing device.. ... Shape Corp

02/09/17 / #20170041341

Polymorphic treatment of data entered at clients

A computer-implemented method includes identifying, in web code to be served to a client, presence of code for generating a form; generating additional, executable code to be run on the client device, the additional, executable code being arranged to identify user input on the client device and modify the form so that data from the user input is received into one or more alternative fields of the form other than a first field to which a user performing the input directed the input; receiving a request from the client device based on completion of input into the form; and converting data from the received request so that data for the one or more alternative fields of the form is directed to the first field of the form for processing by a web server system that initially generated the web code.. . ... Shape Corp

02/09/17 / #20170038968

User interface for three-dimensional modelling

Providing a user interface for three-dimensional (3d) modelling, via an apparatus with a touch surface includes displaying a 3d model of a virtual object having an elementary shape. A virtual mesh is displayed over or aside at least a portion of the virtual object. ... Shape Corp

01/26/17 / #20170021691

Steel for vehicle suspension spring part, vehicle suspension spring part, and method of fabricating the same

A steel, having a high corrosion resistance and low-temperature toughness, for a vehicle suspension spring part, the steel includes 0.21 to 0.35% by mass of c, more than 0.6% by mass but 1.5% by mass or less of si, 1 to 3% by mass of mn, 0.3 to 0.8% by mass of cr, 0.005 to 0.080% by mass of sol. Al, 0.005 to 0.060% by mass of ti, 0.005 to 0.060% by mass of nb, not more than 150 ppm of n, not more than 0.035% by mass of p, not more than 0.035% by mass of s, 0.01 to 1.00% by mass of cu, and 0.01 to 1.00% by mass of ni, the balance being fe and unavoidable impurities, with ti+nb≦0.07% by mass, wherein crystal grains of the steel after hardening have a prior austenite grain size number of 7.5 to 10.5, and the steel having a tensile strength of not less than 1,300 mpa.. ... Shape Corp

01/12/17 / #20170013012

Asymmetrical challenges for web security

This document describes, among other things, a computer-implemented method for improving the security of one or more computing systems. The method can include receiving, at a computing system, first code that defines at least a portion of an electronic resource that is to be served to a client computing device. ... Shape Corp

01/12/17 / #20170012960

Split serving of computer code

A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.. ... Shape Corp

01/05/17 / #20170001375

Sinter shell

According to some aspects, system and methods for generating a 3d model shell is provided. The system may include a memory and at least one processor coupled to the memory and specially configured to morphologically dilate a 3d model by a dilation distance, create a first copy of the 3d model and a second copy of the 3d model, perform morphological erosion on the first copy to generate a first shrunken model, perform morphological erosion on the second copy to generate a second shrunken model, and subtract the second shrunken model from the first shrunken model to generate the 3d model shell.. ... Shape Corp








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Shape Corp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Shape Corp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###