Patents Assigned to Good Technology
-
Patent number: 9813514Abstract: An information repository system comprises a wireless device configured to receive a first version of information from a server. The first version of information has a first unique identifier associated therewith. The information repository is configured to store the first version of information having the first unique identifier and is configured to store a second version of the information having the first unique identifier. The second version of information overwrites the first version of information.Type: GrantFiled: November 24, 2015Date of Patent: November 7, 2017Assignee: Good Technology Holdings LimitedInventor: Gary Kushner
-
Patent number: 9807075Abstract: Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device.Type: GrantFiled: July 29, 2015Date of Patent: October 31, 2017Assignee: Good Technology Holdings LimitedInventors: Saul Kessler, Sean Michael Quinlan, Haniff Somani, Nigel Thompson, Adrian Satmarel
-
Publication number: 20170310627Abstract: Systems and methods for monitoring a plurality of mailboxes by a plurality of computer nodes. The plurality of computer nodes comprises a first computer node and a second computer node. The first computer node is configured to detect an update to a database record associated with a message store; determine, in response to detecting the update to the database record, a second computer node in the plurality of computer nodes to monitor the message store, based at least in part on an attribute stored in the database record; and update the database record to store an identifier corresponding to the second computer node. The second computer node is configured to: detect the update to the database record by the first computer node based at least in part on the identifier; and configure a monitoring process for the message store based, at least in part, on the attribute stored in the database record.Type: ApplicationFiled: September 23, 2015Publication date: October 26, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventors: Gautam PULLA, Gary GILCHRIST, Junjun LIU, Rejish Puthiyedath CHERUVATTA
-
Publication number: 20170310480Abstract: A computing device stores a set of executable code comprising first, second and third subsets of data. The first and second subsets of data comprise first and second encrypted data, respectively. Responsive to receipt of first authentication data for authenticating a respective user, the computing device is arranged to decrypt one of the first and second encrypted data to generate decrypted data, and to configure the third subset of data based on the decrypted data. The third subset of data, having been so configured, is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the respective user. Thus an application-level log in is provided.Type: ApplicationFiled: September 23, 2015Publication date: October 26, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventors: Haniff SOMANI, Siavash James Joorabchian HAWKINS
-
Publication number: 20170302976Abstract: A method and system for retrieving media data. The method comprises: receiving webpage data at an application running on a computing device; rendering a webpage based on the webpage data using a rendering engine native to the computing device; identifying a media element in the webpage, wherein the media element includes data identifying media data stored at a media server which is remote from the computing device; and replacing the media element in the webpage with a dummy element comprising code which, when executed, invokes a media handler provided by the application; retrieving, by the media handler, the media data from the media server; and providing the media data to a first media player component for playback.Type: ApplicationFiled: September 23, 2015Publication date: October 19, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventors: Krishna Prasad PUTTAGUNTA, John NITISH, Raghuveer BOINAPALLI, Venkat Krishna Mohan DASYAM, Jorge Alberto Parada SERRANO, Kiran Kumar SRIPADA
-
Publication number: 20170288879Abstract: A method for monitoring user activity in respect of a plurality of applications on a computing device. The method comprises storing, by a first application running on the computing device, a first timestamp indicating the time that user activity was last detected with respect to the first application. The first application receives a message from a second application running on the computing device. The message comprises a second timestamp indicating the time that user activity was last detected with respect to the second application. The first application updates the first timestamp based on the second timestamp when the time indicated by the second timestamp is later than the time indicated by the first timestamp. Thus, user activity across the plurality of application can be monitored, such that an inactivity timer running on a particular application in the group of applications can account for user activity with respect to the other application in the plurality.Type: ApplicationFiled: September 4, 2015Publication date: October 5, 2017Applicant: Good Technology Holdings LimitedInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20170269963Abstract: A method of managing a plurality of applications on a computing device. The method comprises receiving, by a first application running on the computing device, a lock message comprising a timestamp and a digital signature associated with the timestamp, from a second application miming on the computing device. Upon receipt of the lock message, the first application verifies the digital signature to confirm the authenticity of the timestamp. Once the timestamp has been confirmed by the first application, the first application locks the first application. Accordingly, a lock event with respect to an application in the plurality of applications can be propagated to other applications in the plurality of applications.Type: ApplicationFiled: September 4, 2015Publication date: September 21, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Patent number: 9742777Abstract: A system and method for confirming an application change event associated with a device infrastructure of a mobile device, the method comprising: identifying an application change event processed by the device infrastructure; disabling an application associated with the application change event; sending an application authorization request from the mobile device over a communications network, the application authorization request including application identification information which identifies the application associated with the application change event; receiving a decision instruction at the mobile device, the decision instruction being based on a comparison of the application identification information with one or more listed applications in a plurality of applications identified in an application authorization list, the application authorization list being remote from the mobile device over the communications network; and performing an action on the mobile device in respect of the application associatedType: GrantFiled: March 11, 2016Date of Patent: August 22, 2017Assignee: Good Technology Holdings LimitedInventors: Chun Fung Yuen, Wing Young Lam, Richard Segal, Alex Lau
-
Patent number: 9740884Abstract: Methods and devices arranged to provide functions for generating a security code are described. These functions include defining a set of locations in the one or more images on the basis of one or more user-selected locations, and generating a security code based on values determined and derived from display parameters associated with imaging elements having locations corresponding to the defined set of locations. This enables a security code to be generated that contains a high level of entropy, and is therefore capable of providing high levels of security, based on user input that is easy for the user to remember.Type: GrantFiled: March 15, 2013Date of Patent: August 22, 2017Assignee: Good Technology Holdings LimitedInventor: Siavash James Joorabchian Hawkins
-
Publication number: 20170230468Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.Type: ApplicationFiled: April 28, 2017Publication date: August 10, 2017Applicant: Good Technology Holdings LimitedInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20170228553Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.Type: ApplicationFiled: April 28, 2017Publication date: August 10, 2017Applicant: Good Technology Holdings LimitedInventors: Daniel J. MENDEZ, Mason NG
-
Publication number: 20170206100Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.Type: ApplicationFiled: April 5, 2017Publication date: July 20, 2017Applicant: Good Technology Holdings LimitedInventors: Haniff SOMANI, Sanjiv MAURYA, Sean Michael QUINLAN
-
Patent number: 9672371Abstract: This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.Type: GrantFiled: July 2, 2015Date of Patent: June 6, 2017Assignee: Good Technology Holdings LimitedInventors: Daniel J. Mendez, Mason Ng
-
Patent number: 9667707Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.Type: GrantFiled: January 16, 2015Date of Patent: May 30, 2017Assignee: Good Technology Holdings LimitedInventors: Sean Michael Quinlan, Haniff Somani, Sanjiv Maurya
-
Patent number: 9645861Abstract: A method for managing application containers, comprising: assigning a first application to a master container in a memory of a system; assigning a second application to a slave container in the memory; using a processor, assigning the master and slave containers to a container group by: delegating access to container meta-data of the slave container by a container run-time of the slave container or by the first application to a container meta-data accessor of the master container via a class loader of the master container; and, delegating interaction between the container run-time of the slave container and a container management channel of the slave container to a container management channel of the master container via the class loader of the master container; and, accessing the first and second applications via the container group.Type: GrantFiled: April 29, 2014Date of Patent: May 9, 2017Assignee: Good Technology Holdings LimitedInventors: Alex Lau, Namrata Jayant Bandekar, Chun Fung Yuen, Wing Young Lam
-
Patent number: 9645834Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.Type: GrantFiled: January 18, 2013Date of Patent: May 9, 2017Assignee: Good Technology Holdings LimitedInventors: Haniff Somani, Sanjiv Maurya, Sean Michael Quinlan
-
Patent number: 9646152Abstract: A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user, each of the environments having the same persona, the device having: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate interaction between the device user and the pair of environments presented on the user interface by: configuring the user interface to present the personal environment for facilitating interaction between the device user and personal applications associated with the personal environment, the personal environment having an assigned user name of said persona and a personal password, the personal environment presented using a set of unique personal environment user interface design elements for distinguishing the personal environment from the work environment via the user interface; and responding to a switch environment command generated by a switch mechanism invoked by the device user viaType: GrantFiled: December 21, 2015Date of Patent: May 9, 2017Assignee: Good Technology Holdings LimitedInventors: Wing Young Lam, Chun Fung Yuen, Richard Segal
-
Publication number: 20170126408Abstract: The present invention provides methods of, and computer programs and systems for, controlling access to a resource via a computing device configured to perform a method that enables new encrypted versions of a key, encrypted with code values in a sequence of code values that are valid at a future time, to be provided and made available for future performance of the method. This in turn enables a method of user verification that does not require access to a remote server in order to provide one-time passcode verification, and so provides an offline one-tome passcode authentication method that is self-sustaining.Type: ApplicationFiled: May 29, 2015Publication date: May 4, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventor: Nicholas B. VAN SOMEREN
-
Patent number: 9621405Abstract: An Constant Access Gateway provides secure access for remote mobile computing users to centrally stored data without requiring a VPN connection or a direct connection to the LAN in which the data resides. A Cache Server works alone or in conjunction with the Constant Access Gateway to provide distributed access to the centrally stored data. The Cache Server performs local storage of de-duplicated versions of the centrally stored data, and may interact with the Constant Access Gateway to maintain cache coherency with the central data store.Type: GrantFiled: August 24, 2011Date of Patent: April 11, 2017Assignee: Good Technology Holdings LimitedInventors: Puneesh Chaudhry, Sanjay Jain
-
Patent number: RE46355Abstract: A method is disclosed. The method includes receiving an update package from a wireless service provider that includes information indicating that multiple language versions of an update are included in the update package. Based on the information, the method further specifies an update associated with a language from the update package, and transmits the update associated with the language to a wireless device.Type: GrantFiled: December 13, 2013Date of Patent: March 28, 2017Assignee: Good Technology Holdings LimitedInventors: Sanjiv Maurya, Chih-Yu Chow, Tony Robinson