Patents Assigned to OpenPeak, Inc.
-
Patent number: 9367692Abstract: A method and system for validating components during a booting process of a computing device are described herein. The method can include the steps of detecting a power up signal and in response to detecting the power up signal, progressively determining whether software components of the computing device are valid. If the software components are determined to be valid, the computing device may be permitted to move to an operational state. If, however, at least some of the software components are determined to be not valid, the computing device may be prevented from moving to the operational state. In one arrangement, if the computing device is prevented from moving to the operational state, corrective action can be taken in an effort to permit the computing device to move to the operational state.Type: GrantFiled: September 29, 2014Date of Patent: June 14, 2016Assignee: OPENPEAK INC.Inventors: John R. Brown, John Irwin Perret-Gentil
-
Patent number: 9350818Abstract: A method and system for data usage accounting are described herein. On a computing device that includes enterprise applications and personal applications, a datagram send request for an enterprise application can be received. The datagram send request may involve unreliable transport communication with a final destination and may be conducted in a native fashion with respect to the enterprise application. Based on the datagram send request, addressing information of a relay destination that is different from the final destination can be received. In addition, outbound datagrams of the unreliable transport communication can be corresponded with the received addressing information of the relay destination. The outbound datagrams of the unreliable transport communication may also be supplemented with the addressing information of the final destination.Type: GrantFiled: July 17, 2015Date of Patent: May 24, 2016Assignee: OPENPEAK INC.Inventor: James Asnis
-
Patent number: 9232012Abstract: A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure applications and unsecure applications. Via one of the secure applications, a request to access data can be received in which the request is intended for a content provider via a system service. The request that is intended for the content provider via the system service can be intercepted and modified, which can cause the system service to direct the request back to the secure application instead of the content provider. In addition, a connection can be established with the content provider for the request through the secure application to enable data usage accounting of data that is returned by the content provider.Type: GrantFiled: December 17, 2014Date of Patent: January 5, 2016Assignee: OpenPeak Inc.Inventors: Brian A. Roberge, James Asnis, David Medina
-
Patent number: 9232078Abstract: A method and system for data accounting across multiple communication networks are described herein. An enterprise data session request is received from a device configured to operate on a home communication network in which the device is associated with an enterprise. A usage amount can be determined for the session request, and it can be determined that the device is associated with the enterprise. In addition, the usage amount for the session request can be attributed to the enterprise. Another enterprise data session request can be received from a second device configured to operate on a second home communication network in which the second device is also associated with the enterprise. A usage amount can be determined for the session request from the second device, and it can be determined that the second device is associated with the enterprise.Type: GrantFiled: March 16, 2015Date of Patent: January 5, 2016Assignee: OpenPeak Inc.Inventor: Philip Schentrup
-
Patent number: 9232013Abstract: A method and system for enabling data usage accounting are described herein. As an example, the method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session can be received through a secure application. The request for the data session can be intercepted, and the request for the data session can be modified to cause the request to be re-directed back to the secure application. In addition, a connection can be initiated to enable retrieval of data in response to the request and to enable an accounting of the data session. In one arrangement, this process of modifying the request for a data session may be restricted to secure applications such that data usage of the secure applications is tabulated separately from data usage associated with the unsecure applications.Type: GrantFiled: January 29, 2015Date of Patent: January 5, 2016Assignee: OpenPeak Inc.Inventor: James Asnis
-
Patent number: 9197672Abstract: A method and system for selective application of device policies are described herein. The method can include the step of receiving one or more policies from a messaging server in which the policies are intended to be indiscriminately applied to a computing device. Out of the received policies, one or more container policies that are to be applied to a container of the computing device can be identified. The identified container policies can be applied to the container such that the identified container policies may be prevented from being indiscriminately applied to the computing device.Type: GrantFiled: July 8, 2014Date of Patent: November 24, 2015Assignee: OPENPEAK INC.Inventors: Andrew James Dobson, David Medina
-
Patent number: 9165139Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.Type: GrantFiled: May 12, 2015Date of Patent: October 20, 2015Assignee: OPENPEAK INC.Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
-
Patent number: 9147084Abstract: A system and method for isolating secure communication events from a non-secure application are described herein. The method can include the steps of intercepting a communication event from an external communications network or an external communications device and determining whether the communication event is a secure communication event. If the communication event is a secure communication event, the secure communication event can be processed by a secure application. In addition, the secure communication event can be prevented from being processed by the non-secure application.Type: GrantFiled: May 30, 2014Date of Patent: September 29, 2015Assignee: OPENPEAK INC.Inventors: Andrew James Dobson, David Medina
-
Patent number: 9135418Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.Type: GrantFiled: February 25, 2014Date of Patent: September 15, 2015Assignee: OPENPEAK INC.Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M Dare
-
Patent number: 9122885Abstract: A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform.Type: GrantFiled: September 3, 2014Date of Patent: September 1, 2015Assignee: OPENPEAK, INC.Inventors: Philip Schentrup, Michael Kelly, Eoin Hyden
-
Patent number: 9124493Abstract: A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.Type: GrantFiled: March 11, 2014Date of Patent: September 1, 2015Assignee: OPENPEAK INC.Inventors: Vadim Kacherov, Robert M Dare, Gregory Paul Watson, Parag Goel
-
Patent number: 9106538Abstract: A method and system for enabling data usage accounting is described herein. The method can be practiced on a computing device that has secure applications and unsecure applications installed thereon. Initially, a request for a data session that includes a final endpoint can be received through a secure application. The request for the data session can be intercepted and modified to cause the request to be re-directed back to the secure application. A connection with a relay server can be initiated instead of the final endpoint such that data usage accounting for the data session is to be conducted at a remote location.Type: GrantFiled: March 26, 2015Date of Patent: August 11, 2015Assignee: OPENPEAK INC.Inventor: James Asnis
-
Patent number: 9100390Abstract: A method and system for authenticating a computing device for data usage accounting are described herein. As an example, the method can be practiced on a computing device that includes secure applications and unsecure applications. A data session request for a secure application can be received, and in response to the data session request, a data session connection can be initiated. As part of initiating the data session connection, an authentication package uniquely associated with the computing device can be sent to the authentication server. If the computing device is authenticated, the data session connection can be established to enable data exchange and data accounting in which the authenticating may be performed exclusively for the secure applications.Type: GrantFiled: March 9, 2015Date of Patent: August 4, 2015Assignee: OPENPEAK INC.Inventors: James Asnis, Matthew John Peterson, Michael Kelly
-
Patent number: 9098715Abstract: A system and method for enabling the sharing of content between secure applications and unsecure applications are described herein. Content requests can be received from secure applications and unsecure applications. In response to the content requests, listings of options can be returned that have the ability to satisfy the content requests from the requesting secure applications or the requesting unsecure applications. In addition, selections of the options of the listings of options can be received through the requesting secure applications or the requesting unsecure applications. Content locations that are to be returned to the secure applications can be selectively modified such that subsequent content requests that involve the modified content locations are identified as being associated with an unsecure option.Type: GrantFiled: October 28, 2014Date of Patent: August 4, 2015Assignee: OPENPEAK INC.Inventors: Stephen K. Spear, Jr., Andrew James Dobson
-
Patent number: 9077796Abstract: A communication system is described that includes a mobile communication device and a docking station with which the mobile communication device can be selectively engaged and disengaged. The mobile communication device includes telephony logic that enables a user to conduct a voice call using a first speaker/microphone and/or a first network interface provided by the mobile communication device when the mobile communication device is disengaged from the docking station and that enables the user to conduct a voice call using a second speaker/microphone and/or a second network interface provided by the docking station when the mobile communication device is engaged with the docking station. The telephony logic is also capable of dynamically switching between the use of the first and second speakers/microphones and/or the first and second network interfaces in response to detecting engagement or disengagement of the docking station during a voice call.Type: GrantFiled: August 17, 2011Date of Patent: July 7, 2015Assignee: OPENPEAK INC.Inventors: Daniel Gittleman, Paul Krzyzanowski
-
Patent number: 8938547Abstract: A method and system for data usage accounting are described herein. As an example, the method can be practiced in a setting that includes both secure applications and unsecure applications. Via one of the secure applications, a request to access data can be received in which the request is intended for a content provider via a system service. The request that is intended for the content provider via the system service can be intercepted and modified, which can cause the system service to direct the request back to the secure application instead of the content provider. In addition, a connection can be established with the content provider for the request through the secure application to enable data usage accounting of data that is returned by the content provider.Type: GrantFiled: September 5, 2014Date of Patent: January 20, 2015Assignee: OpenPeak Inc.Inventors: Brian A. Roberge, James Asnis, David Medina
-
Patent number: 8885096Abstract: A multi-media device and a method for manufacturing the multi-media device is described herein. The multi-media device includes a first and second substrate coupled to each other. Both the first and second substrates have a first side and a second side opposite to the first side. The multi-media device further includes a first camera coupled to the first side of the first substrate and a second camera coupled to the first side of the second substrate. The first camera includes a first lens housing, which houses one or more first lenses. The second camera includes a second lens housing, which houses one or more second lenses. The second substrate is coupled to the first substrate in a manner such that the one or more first lenses and the one or more second lenses receive light from opposite directions.Type: GrantFiled: October 21, 2011Date of Patent: November 11, 2014Assignee: OpenPeak Inc.Inventor: Bharat Vakil
-
Publication number: 20140317679Abstract: A method for generating a secure application is described herein. The method can include the steps of obtaining a target application and decomposing the target application into original files that contain predictable instructions. One or more predictable instructions in the original files may be identified. In addition, the target application may be modified to create the secure application by binding one or more intercepts to the target application. These intercepts can enable the modification of the predictable instructions in accordance with one or more policies such that the behavior of the secure application is different from the original behavior of the target application. Modification of the target application may be conducted without access to the source code of the target application.Type: ApplicationFiled: February 25, 2014Publication date: October 23, 2014Applicant: OpenPeak Inc.Inventors: Christopher Michael Wade, Danilo Tan, John R. Brown, Paul Krzyzanowski, Daniel Gittleman, Robert M. Dare
-
Publication number: 20140317680Abstract: A method for ensuring compliance with organizational policies is described herein. The method can include the step of monitoring one or more parameters of a managed computing device for compliance with one or more policies of an organization in which the organizational policies may include limitations on the managed computing device. The method can also include the step of detecting a non-conformance event at the managed computing device with respect to at least one organizational policy. In response to the detection of the non-conformance event, the operation of the managed computing device may be restricted with respect to features or data associated with the organization.Type: ApplicationFiled: March 11, 2014Publication date: October 23, 2014Applicant: OpenPeak Inc.Inventors: Vadim Kacherov, Robert M. Dare, Gregory Paul Watson, Parag Goel
-
Patent number: 8856959Abstract: A method of, and a processing system for, creating distinct user spaces. In a platform originally intended to be a single user platform, for each of a plurality of users, a first application used by the user can be assigned a user identifier (UID) unique to the user and the first application. The first UID can be associated with user data exclusively associated with the user and the first application to create a multi-user platform.Type: GrantFiled: February 4, 2014Date of Patent: October 7, 2014Assignee: OpenPeak Inc.Inventors: Philip Schentrup, Michael Kelly, Eoin Hyden