Learn more

DST TECHNOLOGIES INC

Overview
  • Total Patents
    16
  • GoodIP Patent Rank
    160,391
About

DST TECHNOLOGIES INC has a total of 16 patent applications. Its first patent ever was published in 2007. It filed its patents most often in United States, Canada and United Kingdom. Its main competitors in its focus markets computer technology, it methods for management and digital networks are SHENZHEN MPR TECHNOLOGY CO LTD, SMARTGLYPH LTD and ALIPAY LABORATORIES SINGAPORE PTE LTD.

Patent filings in countries

World map showing DST TECHNOLOGIES INCs patent filings in countries

Patent filings per year

Chart showing DST TECHNOLOGIES INCs patent filings per year from 1900 to 2020

Top inventors

# Name Total Patents
#1 Clark Peter E 10
#2 Gentry Michael V 10
#3 Ives Paul M 6
#4 Esposito Deni 5
#5 Hudgins Michael C 5
#6 Metzger Michael G 5
#7 Hsu Chin 4
#8 Ives Paul Martin 3
#9 Shelby Tracy W 3
#10 Mock James R 3

Latest patents

Publication Filing date Title
US2015324638A1 System and method for identification and separation of form and feature elements from handwritten and other user supplied elements
WO2016032596A2 Secure processing of secure information in a non-secure environment
US2015193639A1 Internal social network for an enterprise and applications thereof
US2015131916A1 Contextualizing noisy samples by substantially minimizing noise induced variance
US2014348424A1 Segregation of handwritten information from typographic information on a document
US2014355890A1 Candidate identification by image fingerprinting and model matching
US2014344902A1 Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery
US2014298409A1 Secure Processing of Secure Information in a Non-Secure Environment
US2015339620A1 Scheduling Method and System
US2014056469A1 Contextualization of machine indeterminable information based on machine determinable information
US2014149440A1 User Generated Context Sensitive Information Presentation
GB0910086D0 Secure processing of secure information in a non-secure environment