[vc_row][vc_column][vc_column_text]UPDATE (4/21/2017): On April 13th, 2017 the OpenPeak patent assets were sold in a public auction for $1,025,000. 

 

Read the Order

OpenPeak Inc. is headquartered in Boca Raton, FL. It is a provider of multimedia touch-screen device and device management platforms. The company designs managed platforms, software, and devices for enterprises, SMBs, service providers, developers, and content owners to interact with end-users in their homes and offices. It offers products for communication, information, and entertainment applications.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space][vc_tta_tabs][vc_tta_section title=”Company Info” tab_id=”1485966886423-b3803678-c7ec”][vc_column_text]

Address

5355 Town Center Rd 301

Boca Raton, FL  33486

United States

www.openpeak.com

Ownership

Private

Industry

Mobile Application Software

Employees

22

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Patent-Backed Value Estimation ” tab_id=”1485966886486-c8105d58-76bb”][vc_column_text]

Chapter Type Case Number Assets Liabilities Industry/Description
7 16-28464 $1 -10 Million $50 – 100 Million Computer Software
Portfolio Valuation Range Asset Valuation Range Total Assets Valuation Range Liability Range Leverage Ratio Range
 $1.7 – 10.25 Million  $1 – $10 Million  $2.2 – $20.25 Million  $5 – $25 Million  0.08 – 4.05

 

Patent Portfolio

169 Active Assets

  • 34 U.S. Patents
  • 68 U.S. Applications
  • 16 Korean Applications

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Featured Assets” tab_id=”1485967825251-b275f45c-d8b5″][vc_column_text]

  1. US8237068 B2

Title: Projected capacitive touch-sensitive panel

Abstract: A touch-sensitive panel is described herein that includes a first sensor layer and a second sensor layer and at least one shield electrode integrated into the first sensor layer and/or the second sensor layer. The at least one shield electrode is operable to cancel parasitic capacitance between at least one sense electrode in the first sensor layer and at least one sense electrode in the second sensor layer. The integrated shield electrode(s) in the first sensor layer and/or the second sensor layer can be used in place of an additional shield layer to combat parasitic capacitance in the touch-sensitive panel, thereby reducing the cost and materials necessary to manufacture the touch-sensitive panel. A touch-screen display that includes such a touch-sensitive panel and a method of operating such a touch-sensitive panel are also described.

First Claim:

A touch-sensitive panel, comprising:

a first sensor layer comprising a first plurality of sense electrodes that are disposed upon and extend in a first direction across a first substrate surface; and

a second sensor layer comprising a second plurality of sense electrodes that are disposed upon and extend in a second direction across a second substrate surface and at least one shield electrode disposed on the second substrate surface;

wherein each sense electrode is operable to generate an electrostatic field used in sensing touch events and wherein the at least one shield electrode is operable to cancel parasitic capacitance between at least one sense electrode in the first plurality of sense electrodes and at least one sense electrode in the second plurality of sense electrodes.

 

  1. US8695060 B2

Title: System and method for creating secure applications

Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.

First Claim:

A method for generating a secure application, comprising:

via a processor, obtaining a target application;

via a processor, decomposing the target application into original files that contain predictable instructions;

identifying one or more predictable instructions in the original files;

modifying the target application to create the secure application by binding one or more intercepts to the target application to enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application, wherein the modification of the target application is conducted without access to the source code of the target application.

 

 

  1. US8650658 B2

Title: Creating distinct user spaces through user identifiers

Abstract: A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform.

First Claim:

A method of creating distinct user spaces, comprising:

in a platform originally intended to be a single user platform, for each of a plurality of users:

via a processor, assigning to a first application used by the user a first user identifier (UID) unique to the user and the first application;

associating the first UID with user data exclusively associated with the user and the first application to create a multi-user platform;

providing user level-servicing using a loop device-based file system to enable the single user platform to accommodate multiple users; and

allocating to the user a range of UIDs, wherein the first UID is selected from the range of UIDs.

[/vc_column_text][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row][vc_row][vc_column][vc_cta h2=”Portfolio Valuation Services” h4=”IPVal provides patent portfolio valuations for acquisition diligence” add_button=”right” btn_title=”Contact Us ” btn_link=”url:http%3A%2F%2Fipval.com%2Fcontact-us%2F%231467647561464-2a34809f-529c||” btn_add_icon=”true”][/vc_cta][/vc_column][/vc_row]