Patents by Inventor Kenneth Browne

Kenneth Browne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120109520
    Abstract: An improved process for collecting, storing, and sending crop data is disclosed. The process allows data to be collected by PDA and uploaded to a server for remote analysis.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 3, 2012
    Applicant: InTime, Inc.
    Inventors: Kenneth Brown Hood, Hendrik Willem van Riessen, William Matthew Peterson, Patrick Michael Jackson, Phillip Dewey Gillis
  • Patent number: 8156336
    Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    Type: Grant
    Filed: January 11, 2010
    Date of Patent: April 10, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael Kenneth Brown, Herbert Anthony Little, Dinah Lea Marie Davis
  • Publication number: 20120079609
    Abstract: A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device.
    Type: Application
    Filed: April 30, 2011
    Publication date: March 29, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Christopher Lyle Bender, Herbert Anthony Little, Michael Kenneth Brown, Michael Stephen Brown
  • Publication number: 20120079586
    Abstract: A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer.
    Type: Application
    Filed: September 23, 2011
    Publication date: March 29, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael Kenneth BROWN, Christopher Lyle BENDER, Herbert Anthony LITTLE
  • Publication number: 20120079110
    Abstract: A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device.
    Type: Application
    Filed: September 23, 2011
    Publication date: March 29, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael Kenneth BROWN, Christopher Lyle BENDER, Herbert Anthony LITTLE, Michael Stephen BROWN
  • Publication number: 20120063599
    Abstract: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key.
    Type: Application
    Filed: November 24, 2011
    Publication date: March 15, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Herbert Anthony Little, Michael Kenneth Brown
  • Patent number: 8135860
    Abstract: A content interpolating web proxy server is configured in a computer network for processing retrieved web content so as to place it in a format suitable for presentation on a particular client device such as, e.g., a computer, personal digital assistant (PDA), wireless telephone or voice browser-equipped device. The server processes a client request generated by a client device to determine a particular client type associated with the client device, retrieves web content identified in the client request, retrieves one or more augmentation files associated with the web content and the particular client type, and alters the retrieved web content in accordance with the one or more augmentation files. The altered web content is then delivered to the client device. The one or more augmentation files may be co-located with the web content at a site remote from the proxy server, such that the content owner need not own, maintain or otherwise control the proxy server.
    Type: Grant
    Filed: July 20, 2000
    Date of Patent: March 13, 2012
    Assignee: Alcatel Lucent
    Inventors: Michael Kenneth Brown, Biing-Hwang Juang
  • Patent number: 8123061
    Abstract: A refuse container assembled from a kit comprising thermoformed recycled plastic front, left and right, and rear panels, with predrilled holes, a waffled bottom, reinforcement angles, corner angles, castors, assembly hardware, caulking, sealing tape, lifting tubes for a front loading option, and an attachment rod and a swivel eye assembly for a rear loading option.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: February 28, 2012
    Inventor: Charles Kenneth Brown
  • Patent number: 8099592
    Abstract: A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the client device. This stop data can be transmitted (e.g. by the client device) to the server. When processed by the server, the stop data indicates to the server that at least some of the encrypted data received by the client device from the server was not decrypted using the second key (e.g. as may be the case when the second key has been deleted). Upon receiving the stop data, the server may, for example, withhold the transmission of data encrypted with the first key to the client device until the second key is restored on the client device. In one embodiment, the stop data is provided to the client device in an encoded (e.g. encrypted) form.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: January 17, 2012
    Assignee: Research In Motion Limited
    Inventors: David Bajar, Phillip Chi-Jim Luk, Michael Kenneth Brown, Darrell Reginald May
  • Patent number: 8099595
    Abstract: Systems and methods for processing messages within a wireless communications system are disclosed. A server within the wireless communications system maintains a list of certificates contained in devices that use the server. The server synchronizes or updates the list of certificates based on information contained in message to and from the device. By providing a server with certificates associated with devices that use the server, and providing a system and method for synchronizing the certificates between the device and server, the server can implement powerful features that will improve the efficiency, speed and user satisfaction of the devices. The exemplary embodiments also enable advantageous bandwidth savings by preventing transmission of certificates unnecessarily.
    Type: Grant
    Filed: April 21, 2011
    Date of Patent: January 17, 2012
    Assignee: Research In Motion Limited
    Inventors: Michael Kenneth Brown, Herbert Anthony Little, Michael Stephen Brown, Neil Patrick Adams
  • Patent number: 8090107
    Abstract: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key.
    Type: Grant
    Filed: December 20, 2010
    Date of Patent: January 3, 2012
    Assignee: Research In Motion Limited
    Inventors: Herbert Anthony Little, Michael Kenneth Brown
  • Publication number: 20110295980
    Abstract: A system, apparatuses and methods are provided to download and process data and other content streamed over a wide area network using one or more dynamically fetched, material specific, data handlers (e.g., download assistants). A download assistant fetches a data stream from a remote location and processes the streamed data iteratively using buffers and multi-threaded processes through the decoder (e.g., codec), allowing source material-specific processing of the data as it is streamed from one or more download sources as well as content-indifferent and platform-indifferent decoding. To minimize versioning issues, payload construction for secure delivery is simplified to packing and encrypting a directory tree containing any number of files or other digital media into an archive and, when needed, dividing a payload into multiple files or archives with a descriptor that lists the archives.
    Type: Application
    Filed: May 27, 2011
    Publication date: December 1, 2011
    Inventors: David Aldis, Kenneth Brown, Andrew Gallant
  • Publication number: 20110211530
    Abstract: In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key.
    Type: Application
    Filed: April 21, 2011
    Publication date: September 1, 2011
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: David Bajar, Herb A. Little, James Godfrey, Allan David Lewis, Wen Gao, Marc Plumb, Michael Kenneth Brown, Graeme Whittington, Neil Patrick Adams
  • Publication number: 20110214184
    Abstract: Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions.
    Type: Application
    Filed: August 19, 2010
    Publication date: September 1, 2011
    Inventors: Oliver Whitehouse, Michael Grant Kirkup, Christopher Lyle Bender, Michael Kenneth Brown
  • Publication number: 20110169447
    Abstract: An electric vehicle charging system includes a portable housing having an integral holder to hold a connector for an electric vehicle supply circuit. An electric vehicle supply equipment enclosure includes an integral chamber to store all or part of a cord. A mounting bracket for an electric vehicle supply equipment enclosure covers an open portion of the enclosure. A method for facilitating use of an electric vehicle includes providing a prewiring kit for the electric vehicle. An electric vehicle supply equipment enclosure includes an integral disconnect switch. An electric vehicle supply circuit includes a grounding monitor circuit having automatic test functionality. Another electric vehicle supply circuit includes a contact monitor circuit to monitor the state of one or more of the contacts.
    Type: Application
    Filed: January 11, 2010
    Publication date: July 14, 2011
    Applicant: LEVITON MANUFACTURING CO., INC.
    Inventors: Kenneth Brown, Carlos Ramirez, Manoj Karwa, Erwin F. Hani, Amy Swift
  • Publication number: 20110167282
    Abstract: A system to monitor power loading in a plurality of power distribution units. The system includes a power monitoring gateway with a port configured to communicate with an internet protocol network using an internet protocol address. The power monitoring gateway is also configured to communicate with the plurality of power distribution units through a communication link that does not use internet protocol addressing. The communication link in some embodiments is a wireless link. In other embodiments, the communication link uses a single pair of wires with the power monitoring gateway and the power distribution units configured in a daisy chain topology.
    Type: Application
    Filed: March 16, 2011
    Publication date: July 7, 2011
    Inventors: Kenneth Brown, Carlos G. Ramirez, Mark A. Guymon, Thomas Richard Schoepf
  • Patent number: 7961883
    Abstract: In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device. Upon detecting at a network node that an address associated with the mobile communications device has changed, a challenge-and-response procedure is negotiated between the mobile communications device and the network node for authenticating the personalized indicium using a shared authentication key.
    Type: Grant
    Filed: November 24, 2004
    Date of Patent: June 14, 2011
    Assignee: Research In Motion Limited
    Inventors: David Bajar, Herb A. Little, James Godfrey, Allan David Lewis, Wen Gao, Marc Plumb, Michael Kenneth Brown, Graeme Whittington, Neil Patrick Adams
  • Publication number: 20110103588
    Abstract: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key.
    Type: Application
    Filed: December 20, 2010
    Publication date: May 5, 2011
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Herbert Anthony Little, Michael Kenneth Brown
  • Patent number: 7930591
    Abstract: A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. For example, when the mobile device is being used to decrypt a cryptographically secured electronic message, and a problem is encountered, program logic of the device provides the user with (1) an indication of exactly what problem is preventing opening of the message, for example, a required cryptographic key is not available; (2) an indication of exactly what may be done to overcome the problem, for example, what utilities should be run on the device; and (3) exactly what data, if any, needs to be downloaded to the device, for example, what cryptographic keys should be downloaded.
    Type: Grant
    Filed: September 20, 2010
    Date of Patent: April 19, 2011
    Assignee: Research In Motion Limited
    Inventors: Neil Patrick Adams, Michael Stephen Brown, Herbert Anthony Little, Michael Grant Kirkup, Michael Kenneth Brown
  • Patent number: 7920865
    Abstract: In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window.
    Type: Grant
    Filed: May 4, 2010
    Date of Patent: April 5, 2011
    Assignee: Research In Motion Limited
    Inventors: David Bajar, Allen David Lewis, Wen Gao, Herb A. Little, James Godfrey, Marc Plumb, Michael Kenneth Brown, Neil Patrick Adams