Patents by Inventor Jeremy Debate

Jeremy Debate has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220368530
    Abstract: A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user, allows invocation of trusted enterprise applications without hindering external or non-enterprise apps from running on the same computing device. Each of the trusted apps can interact with other trusted apps on the same enterprise computing device in a trusted manner such that other apps or untrusted network connections are prevented for access to the trusted apps. The computing device, however, also executes non enterprise applications which operate independently of the enterprise apps in the same address space using the same unmodified operating system as the enterprise apps on the computing device. The trusted execution environment therefore restricts interprocess communication to be only within the set of enterprise apps and also permits unimpeded operation of other apps under the same OTS (off the shelf) operating system.
    Type: Application
    Filed: July 20, 2022
    Publication date: November 17, 2022
    Inventors: James Seibel, Kevin LaFlamme, Fred Koschara, Reinhard Schumak, Jeremy Debate
  • Patent number: 11424931
    Abstract: A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user, allows invocation of trusted enterprise applications without hindering external or non-enterprise apps from running on the same computing device. Each of the trusted apps can interact with other trusted apps on the same enterprise computing device in a trusted manner such that other apps or untrusted network connections are prevented for access to the trusted apps. The computing device, however, also executes non enterprise applications which operate independently of the enterprise apps in the same address space using the same unmodified operating system as the enterprise apps on the computing device. The trusted execution environment therefore restricts interprocess communication to be only within the set of enterprise apps and also permits unimpeded operation of other apps under the same OTS (off the shelf) operating system.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: August 23, 2022
    Assignee: BlackBerry Limited
    Inventors: James Seibel, Kevin LaFlamme, Fred Koschara, Reinhard Schumak, Jeremy Debate
  • Patent number: 9954728
    Abstract: A network environment can include a proxy management server. The proxy management server can have access to multiple disparately located MDM servers. A mobile device receives configuration information including a network address of the proxy management server. The mobile device stores the network address of the proxy management server. In response to receiving a management notification such as notification that one or more of the multiple MDM servers has management information (e.g., commands, data, etc., to be executed by the mobile device) available for the mobile device, the mobile device utilizes the stored network address to communicate with the proxy management server. The proxy management server checks availability of the management information from multiple disparately located MDM management servers. The proxy management server retrieves the management information from the management servers and forwards it to the mobile device.
    Type: Grant
    Filed: April 9, 2015
    Date of Patent: April 24, 2018
    Assignee: ARXAN TECHNOLOGIES, INC.
    Inventors: Jeremy Debate, Aaron A. Alexander
  • Publication number: 20170214530
    Abstract: A trusted execution environment on a computing device within an enterprise, whether owned by the enterprise or the employee/user, allows invocation of trusted enterprise applications without hindering external or non-enterprise apps from running on the same computing device. Each of the trusted apps can interact with other trusted apps on the same enterprise computing device in a trusted manner such that other apps or untrusted network connections are prevented for access to the trusted apps. The computing device, however, also executes non enterprise applications which operate independently of the enterprise apps in the same address space using the same unmodified operating system as the enterprise apps on the computing device. The trusted execution environment therefore restricts interprocess communication to be only within the set of enterprise apps and also permits unimpeded operation of other apps under the same OTS (off the shelf) operating system.
    Type: Application
    Filed: January 27, 2016
    Publication date: July 27, 2017
    Inventors: James Seibel, Kevin LaFlamme, Fred Koschara, Reinhard Schumak, Jeremy Debate
  • Patent number: 9354849
    Abstract: A multi-component control technique includes a first component and a second component. The first component is supplemental code or evaluation engine as specified by a modification to a set of received originally compiled executable code. The modification to the original executable code ensures that, upon execution, the supplemental code (such as an evaluation engine) as specified by the modification is executed upon initial instantiation or use of the application. The second component is a retrievable and executable policy such as a set of rules fetched and used by the supplemental code to control the functionality supported by the originally compiled executable code of the corresponding application. An application administrator can produce the retrievable policy to control functionality of the originally compiled executable code.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: May 31, 2016
    Assignee: Apperian, Inc.
    Inventors: Jeremy Debate, Aaron A. Alexander, Ricardo Villamil, James P. Seibel
  • Publication number: 20150295757
    Abstract: A network environment can include a proxy management server. The proxy management server can have access to multiple disparately located MDM servers. A mobile device receives configuration information including a network address of the proxy management server. The mobile device stores the network address of the proxy management server. In response to receiving a management notification such as notification that one or more of the multiple MDM servers has management information (e.g., commands, data, etc., to be executed by the mobile device) available for the mobile device, the mobile device utilizes the stored network address to communicate with the proxy management server. The proxy management server checks availability of the management information from multiple disparately located MDM management servers. The proxy management server retrieves the management information from the management servers and forwards it to the mobile device.
    Type: Application
    Filed: April 9, 2015
    Publication date: October 15, 2015
    Inventors: Jeremy Debate, Aaron A. Alexander
  • Publication number: 20140351220
    Abstract: An image loader resource invokes execution of a backup restoration function in a target computer device to be configured or reconfigured. The backup restoration function in the target computer device is present on the target computer device to receive a device image of data settings derived from a previously configured computer device. In furtherance of configuring the target computer device, the image loader resource retrieves a device image. According to one configuration, rather than being an actual device image obtained from a previously configured or already used computer device, the device image information is synthesized from a set of computer configuration instructions received from an administrator resource. The computer configuration instructions specify settings to be applied to the target computer device. The image loader resource communicates the synthesized device image information to the backup restoration function on the target computer device to configure the target computer device.
    Type: Application
    Filed: May 21, 2014
    Publication date: November 27, 2014
    Inventor: Jeremy Debate
  • Publication number: 20140282446
    Abstract: A multi-component control technique includes a first component and a second component. The first component is supplemental code or evaluation engine as specified by a modification to a set of received originally compiled executable code. The modification to the original executable code ensures that, upon execution, the supplemental code (such as an evaluation engine) as specified by the modification is executed upon initial instantiation or use of the application. The second component is a retrievable and executable policy such as a set of rules fetched and used by the supplemental code to control the functionality supported by the originally compiled executable code of the corresponding application. An application administrator can produce the retrievable policy to control functionality of the originally compiled executable code.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Inventors: Jeremy Debate, Aaron A. Alexander, Ricardo Villamil, James P. Seibel
  • Publication number: 20140280459
    Abstract: An application installed on a host computer device includes a portion of originally compiled executable code derived from respective source code and a modification to the originally compiled executable code. The portion of originally compiled executable code supports functionality in accordance with the source code from which the originally compiled executable code is derived. The modification to the originally compiled executable code includes agent code. In response to receiving a request to execute the modified compiled application on a host computer device on which the modified compiled application is installed, the host computer device executes the application as well as executes a respective agent on the host computer device as specified by the modification. Via the agent, which is integrated into the application, the host computer device provides functionality such as control of the executed application on the host computer device from a remote source.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Inventor: Jeremy Debate
  • Publication number: 20140089376
    Abstract: According to example configurations, a primary application includes code that performs a check whether an agent application is installed and/or executing on a corresponding mobile device. If the primary application determines that the agent application is currently not installed and/or currently executing on the mobile device, the primary application initiates installation and/or execution of the agent application on the mobile device potentially unbeknownst to the user of the mobile device. A network administrator communicates with the agent application on the mobile device over a persistent communication link to manage a group of applications and/or related information on the mobile device.
    Type: Application
    Filed: September 18, 2013
    Publication date: March 27, 2014
    Inventors: John T. Caldas, Jeremy Debate
  • Publication number: 20140089487
    Abstract: An agent executing on a remotely controlled mobile computer device receives control input from a remote resource over a network. The remote resource transmits the control input to the agent application to control the mobile computer device. The agent application includes an emulator function to translate the control input. The emulator is configured to produce the translated control input in a format such that it appears to an operating system of the mobile computer device that an input sensing resource local to the mobile computer device generated the control input, even though the control input is generated via hardware and/or software disposed at the remote resource over a network. The agent application in the mobile computer device utilizes the translated control input produced by the emulator to control operation of the mobile computer device.
    Type: Application
    Filed: September 18, 2013
    Publication date: March 27, 2014
    Inventor: Jeremy Debate
  • Publication number: 20130080513
    Abstract: According to example configurations, a first server in network registers a first client as a participant in a communication session. In response to receiving a message posted by the first client to the communication session, the first server initiates broadcast of a notification of receiving the message to other servers in the network. A second server in the network receives the broadcast notification at a second server in the network. In response to receiving the broadcast notification at the second server and identifying that a second client is registered as a participant in the communication session, the second server notifies the second client of the message posted by the first client. Thus, a broadcast or multicast network can be configured to support targeted communications between multiple participants in a communication session.
    Type: Application
    Filed: September 26, 2012
    Publication date: March 28, 2013
    Inventor: Jeremy Debate