Patents Assigned to Good Technology
  • Patent number: 9813514
    Abstract: An information repository system comprises a wireless device configured to receive a first version of information from a server. The first version of information has a first unique identifier associated therewith. The information repository is configured to store the first version of information having the first unique identifier and is configured to store a second version of the information having the first unique identifier. The second version of information overwrites the first version of information.
    Type: Grant
    Filed: November 24, 2015
    Date of Patent: November 7, 2017
    Assignee: Good Technology Holdings Limited
    Inventor: Gary Kushner
  • Patent number: 9807075
    Abstract: Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device.
    Type: Grant
    Filed: July 29, 2015
    Date of Patent: October 31, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Saul Kessler, Sean Michael Quinlan, Haniff Somani, Nigel Thompson, Adrian Satmarel
  • Publication number: 20170310627
    Abstract: Systems and methods for monitoring a plurality of mailboxes by a plurality of computer nodes. The plurality of computer nodes comprises a first computer node and a second computer node. The first computer node is configured to detect an update to a database record associated with a message store; determine, in response to detecting the update to the database record, a second computer node in the plurality of computer nodes to monitor the message store, based at least in part on an attribute stored in the database record; and update the database record to store an identifier corresponding to the second computer node. The second computer node is configured to: detect the update to the database record by the first computer node based at least in part on the identifier; and configure a monitoring process for the message store based, at least in part, on the attribute stored in the database record.
    Type: Application
    Filed: September 23, 2015
    Publication date: October 26, 2017
    Applicant: GOOD TECHNOLOGY HOLDINGS LIMITED
    Inventors: Gautam PULLA, Gary GILCHRIST, Junjun LIU, Rejish Puthiyedath CHERUVATTA
  • Publication number: 20170310480
    Abstract: A computing device stores a set of executable code comprising first, second and third subsets of data. The first and second subsets of data comprise first and second encrypted data, respectively. Responsive to receipt of first authentication data for authenticating a respective user, the computing device is arranged to decrypt one of the first and second encrypted data to generate decrypted data, and to configure the third subset of data based on the decrypted data. The third subset of data, having been so configured, is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the respective user. Thus an application-level log in is provided.
    Type: Application
    Filed: September 23, 2015
    Publication date: October 26, 2017
    Applicant: GOOD TECHNOLOGY HOLDINGS LIMITED
    Inventors: Haniff SOMANI, Siavash James Joorabchian HAWKINS
  • Publication number: 20170302976
    Abstract: A method and system for retrieving media data. The method comprises: receiving webpage data at an application running on a computing device; rendering a webpage based on the webpage data using a rendering engine native to the computing device; identifying a media element in the webpage, wherein the media element includes data identifying media data stored at a media server which is remote from the computing device; and replacing the media element in the webpage with a dummy element comprising code which, when executed, invokes a media handler provided by the application; retrieving, by the media handler, the media data from the media server; and providing the media data to a first media player component for playback.
    Type: Application
    Filed: September 23, 2015
    Publication date: October 19, 2017
    Applicant: GOOD TECHNOLOGY HOLDINGS LIMITED
    Inventors: Krishna Prasad PUTTAGUNTA, John NITISH, Raghuveer BOINAPALLI, Venkat Krishna Mohan DASYAM, Jorge Alberto Parada SERRANO, Kiran Kumar SRIPADA
  • Publication number: 20170288879
    Abstract: A method for monitoring user activity in respect of a plurality of applications on a computing device. The method comprises storing, by a first application running on the computing device, a first timestamp indicating the time that user activity was last detected with respect to the first application. The first application receives a message from a second application running on the computing device. The message comprises a second timestamp indicating the time that user activity was last detected with respect to the second application. The first application updates the first timestamp based on the second timestamp when the time indicated by the second timestamp is later than the time indicated by the first timestamp. Thus, user activity across the plurality of application can be monitored, such that an inactivity timer running on a particular application in the group of applications can account for user activity with respect to the other application in the plurality.
    Type: Application
    Filed: September 4, 2015
    Publication date: October 5, 2017
    Applicant: Good Technology Holdings Limited
    Inventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
  • Publication number: 20170269963
    Abstract: A method of managing a plurality of applications on a computing device. The method comprises receiving, by a first application running on the computing device, a lock message comprising a timestamp and a digital signature associated with the timestamp, from a second application miming on the computing device. Upon receipt of the lock message, the first application verifies the digital signature to confirm the authenticity of the timestamp. Once the timestamp has been confirmed by the first application, the first application locks the first application. Accordingly, a lock event with respect to an application in the plurality of applications can be propagated to other applications in the plurality of applications.
    Type: Application
    Filed: September 4, 2015
    Publication date: September 21, 2017
    Applicant: GOOD TECHNOLOGY HOLDINGS LIMITED
    Inventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
  • Patent number: 9742777
    Abstract: A system and method for confirming an application change event associated with a device infrastructure of a mobile device, the method comprising: identifying an application change event processed by the device infrastructure; disabling an application associated with the application change event; sending an application authorization request from the mobile device over a communications network, the application authorization request including application identification information which identifies the application associated with the application change event; receiving a decision instruction at the mobile device, the decision instruction being based on a comparison of the application identification information with one or more listed applications in a plurality of applications identified in an application authorization list, the application authorization list being remote from the mobile device over the communications network; and performing an action on the mobile device in respect of the application associated
    Type: Grant
    Filed: March 11, 2016
    Date of Patent: August 22, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Chun Fung Yuen, Wing Young Lam, Richard Segal, Alex Lau
  • Patent number: 9740884
    Abstract: Methods and devices arranged to provide functions for generating a security code are described. These functions include defining a set of locations in the one or more images on the basis of one or more user-selected locations, and generating a security code based on values determined and derived from display parameters associated with imaging elements having locations corresponding to the defined set of locations. This enables a security code to be generated that contains a high level of entropy, and is therefore capable of providing high levels of security, based on user input that is easy for the user to remember.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: August 22, 2017
    Assignee: Good Technology Holdings Limited
    Inventor: Siavash James Joorabchian Hawkins
  • Publication number: 20170230468
    Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 10, 2017
    Applicant: Good Technology Holdings Limited
    Inventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
  • Publication number: 20170228553
    Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 10, 2017
    Applicant: Good Technology Holdings Limited
    Inventors: Daniel J. MENDEZ, Mason NG
  • Publication number: 20170206100
    Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.
    Type: Application
    Filed: April 5, 2017
    Publication date: July 20, 2017
    Applicant: Good Technology Holdings Limited
    Inventors: Haniff SOMANI, Sanjiv MAURYA, Sean Michael QUINLAN
  • Patent number: 9672371
    Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
    Type: Grant
    Filed: July 2, 2015
    Date of Patent: June 6, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Daniel J. Mendez, Mason Ng
  • Patent number: 9667707
    Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: May 30, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Sean Michael Quinlan, Haniff Somani, Sanjiv Maurya
  • Patent number: 9645861
    Abstract: A method for managing application containers, comprising: assigning a first application to a master container in a memory of a system; assigning a second application to a slave container in the memory; using a processor, assigning the master and slave containers to a container group by: delegating access to container meta-data of the slave container by a container run-time of the slave container or by the first application to a container meta-data accessor of the master container via a class loader of the master container; and, delegating interaction between the container run-time of the slave container and a container management channel of the slave container to a container management channel of the master container via the class loader of the master container; and, accessing the first and second applications via the container group.
    Type: Grant
    Filed: April 29, 2014
    Date of Patent: May 9, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Alex Lau, Namrata Jayant Bandekar, Chun Fung Yuen, Wing Young Lam
  • Patent number: 9645834
    Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.
    Type: Grant
    Filed: January 18, 2013
    Date of Patent: May 9, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Haniff Somani, Sanjiv Maurya, Sean Michael Quinlan
  • Patent number: 9646152
    Abstract: A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user, each of the environments having the same persona, the device having: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate interaction between the device user and the pair of environments presented on the user interface by: configuring the user interface to present the personal environment for facilitating interaction between the device user and personal applications associated with the personal environment, the personal environment having an assigned user name of said persona and a personal password, the personal environment presented using a set of unique personal environment user interface design elements for distinguishing the personal environment from the work environment via the user interface; and responding to a switch environment command generated by a switch mechanism invoked by the device user via
    Type: Grant
    Filed: December 21, 2015
    Date of Patent: May 9, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Wing Young Lam, Chun Fung Yuen, Richard Segal
  • Publication number: 20170126408
    Abstract: The present invention provides methods of, and computer programs and systems for, controlling access to a resource via a computing device configured to perform a method that enables new encrypted versions of a key, encrypted with code values in a sequence of code values that are valid at a future time, to be provided and made available for future performance of the method. This in turn enables a method of user verification that does not require access to a remote server in order to provide one-time passcode verification, and so provides an offline one-tome passcode authentication method that is self-sustaining.
    Type: Application
    Filed: May 29, 2015
    Publication date: May 4, 2017
    Applicant: GOOD TECHNOLOGY HOLDINGS LIMITED
    Inventor: Nicholas B. VAN SOMEREN
  • Patent number: 9621405
    Abstract: An Constant Access Gateway provides secure access for remote mobile computing users to centrally stored data without requiring a VPN connection or a direct connection to the LAN in which the data resides. A Cache Server works alone or in conjunction with the Constant Access Gateway to provide distributed access to the centrally stored data. The Cache Server performs local storage of de-duplicated versions of the centrally stored data, and may interact with the Constant Access Gateway to maintain cache coherency with the central data store.
    Type: Grant
    Filed: August 24, 2011
    Date of Patent: April 11, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Puneesh Chaudhry, Sanjay Jain
  • Patent number: RE46355
    Abstract: A method is disclosed. The method includes receiving an update package from a wireless service provider that includes information indicating that multiple language versions of an update are included in the update package. Based on the information, the method further specifies an update associated with a language from the update package, and transmits the update associated with the language to a wireless device.
    Type: Grant
    Filed: December 13, 2013
    Date of Patent: March 28, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Sanjiv Maurya, Chih-Yu Chow, Tony Robinson