Patent
|
Patent infringement is the making, using or selling of a patented invention. The abstract description of ECT’s innovations (taken word-for-word from the the abstracts for both the ’414 Patent and the ’239 Patent) includes:
Systems and methods are disclosed for notification or messaging systems that give confidence to the notification-receiving party that a notification concerning the travel status of a mobile thing is from a proper authorized source. One representative method, among others, comprises the following steps: monitoring travel data associated with a mobile thing; communicating a notification involving a delivery or pickup task associated with the mobile thing to a personal communications device associated with a party; and providing authentication information to the personal communications device that indicates to the party that the notification is from an authorized source. The abstract for the ’261 Patent describes: Systems and methods are disclosed for automated computer based notification systems. The systems and methods enable secure notification communication sessions. A representative method, among others that are disclosed herein, can be broadly summarized by the following steps: enabling a first party associated with a personal communication device (PCD) to input or select authentication information for use in connection with a subsequent notification communication session involving advance notice of a delivery or pickup of a good or service at a stop location by a mobile thing (MT); storing the authentication information; monitoring location or travel information in connection with the MT; causing initiation of the notification communication session to the PCD, in advance of arrival of the MT at the stop location, based at least in part upon the location or travel information associated with the MT; during the notification communication session, providing the authentication information to the PCD that indicates to the first party that the notification communication session was initiated by an authorized source; and during the notification communication session, enabling the first party to select whether or not to communicate with a second party having access to particulars of the pickup or delivery. |