Patents by Inventor Matt Kyle

Matt Kyle has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140337756
    Abstract: Methods and systems for facilitating user interaction are described. One such method includes receiving, from a first user device, identification information associated with a targeted user and retrieving, from a database, contact information associated with the identification information. The method may further include providing the contact information to the first user device to facilitate communication between the first user device and a user device of the targeted user and/or providing a message to the user device of the targeted user.
    Type: Application
    Filed: November 25, 2013
    Publication date: November 13, 2014
    Inventors: Frederick Mitchell THROWER, Matt Kyle Clifford, William Donald Rennie, John Sheldon Albers-Mead, Andrew Wayne Couch, Ashish Gupta, Kristina Anne Kenyon, Julia Nicole Metcalf, Andrew Michael Phipps, Fontaine Hanying Shu
  • Publication number: 20120089675
    Abstract: Methods and systems for facilitating user interaction are described. One such method includes receiving, from a first user device, identification information associated with a targeted user and retrieving, from a database, contact information associated with the identification information. The method may further include providing the contact information to the first user device to facilitate communication between the first user device and a user device of the targeted user and/or providing a message to the user device of the targeted user.
    Type: Application
    Filed: September 13, 2011
    Publication date: April 12, 2012
    Inventors: Frederick Mitchell Thrower, III, Matt Kyle Clifford, William Donald Rennie, John Sheldon Albers-Mead, Andrew Wayne Couch, Ashish Gupta, Kristina Anne Kenyon, Julia Nicole Metcalf, Andrew Michael Phipps, Fontaine Hanying Shu
  • Publication number: 20090121861
    Abstract: A security system used to detect, deter, and/or document security events and information from a secured area. The security system may include an intelligence system for distinguishing between false alarms and actual alarm events. The security system may also include multiple deter devices actionable upon detection of an actual alarm event. The security system may further include a security event data collection system that collects event or alarm data pertaining to security events either onsite or remote and a video/camera system that records images of security events.
    Type: Application
    Filed: January 26, 2008
    Publication date: May 14, 2009
    Inventors: Joel Pat Latham, Steven Wayne Belden, Greig Stovall Latham, Barry Arthur Hall, Michael A. Ramsey, Matt Kyle
  • Publication number: 20090122143
    Abstract: A security system and network used to detect and deter adverse events in an area to be secured. The security system may include an operator for supervising the area, and a wireless communication system for transceiving data indicative of detection events received from the secured area, wherein the operator can determine if a deter device is to be actuated based on the data. The security system may include an intelligence system for distinguishing between false alarms and actual alarm events, for also actuating a deter device, and for notifying operators. The security system and network may also include a plurality of areas to be secured, wherein each area is serviced by a different wireless hub within the wireless communication system.
    Type: Application
    Filed: January 26, 2008
    Publication date: May 14, 2009
    Inventors: Joel Pat Latham, Steven Wayne Belden, Greig Stovall Latham, Barry Arthur Hall, Michael A. Ramsey, Matt Kyle
  • Publication number: 20090122144
    Abstract: A method for detecting events/activities at a secured location in which the security method may include an operator and/or determination application for supervising the location, and a transmission network for transceiving data indicative of determined activities of the secured location, wherein the determination application and the operator can initiate a deter device in response to adverse activities. The determination application of the security method may include an intelligence system for distinguishing between normal and adverse conditions. The method may also include an application for the transfer of activity data to a storage device in which operator(s) may access the stored data.
    Type: Application
    Filed: January 26, 2008
    Publication date: May 14, 2009
    Inventors: Joel Pat Latham, Steven Wayne Belden, Greig Stovall Latham, Barry Arthur Hall, Michael A. Ramsey, Matt Kyle