Patents by Inventor Michael Kirkup
Michael Kirkup has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9346738Abstract: A method for the preparation of treprostinil and its derivatives is described. In contrast to prior art, this method utilizes an easily scalable enzymatic resolution of a key intermediate for making these compounds. Another significant improvement of the described method over prior methods is the regioselective Claisen rearrangement of a 5-allyloxy-benzaldehyde precursor, which is facilitated by a bromo substituent in 2-position.Type: GrantFiled: May 22, 2013Date of Patent: May 24, 2016Assignee: SciPharm SaRLInventors: Nareshkumar Jain, Michael Kirkup, Michael Marella, Sanjeevani Ghone
-
Publication number: 20150126761Abstract: A method for the preparation of treprostinil and its derivatives is described. In contrast to prior art, this method utilizes an easily scalable enzymatic resolution of a key intermediate for making these compounds. Another significant improvement of the described method over prior methods is the regioselective Claisen rearrangement of a 5-allyloxy-benzaldehyde precursor, which is facilitated by a bromo substituent in 2-position.Type: ApplicationFiled: May 22, 2013Publication date: May 7, 2015Inventors: Nareshkumar Jain, Michael Kirkup, Michael Marella, Sanjeevani Ghone
-
Patent number: 8943323Abstract: A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established communications channel between the communication device and the server. The device certificate request comprises at least a user identifier and a device identifier. The server provides to the communication device a device certificate that includes the user identifier and the device identifier and that is signed by a private key of a certificate authority.Type: GrantFiled: May 1, 2012Date of Patent: January 27, 2015Assignee: BlackBerry LimitedInventors: Michael K. Brown, Michael S. Brown, Michael Kirkup
-
Patent number: 8856859Abstract: There is disclosed a system and method for setting application permissions. In an embodiment, the method comprises reviewing the current application permissions settings on the device; comparing the current application permissions settings to a set of required application permissions settings for the software application; listing the set of required application permissions; and providing means to grant permission for all required application permissions the user is authorized to grant. In another embodiment, only the required application permissions requiring a grant of permission and which the user is authorized to grant are listed. The user may be provided with means to grant permission for all required permissions the user is authorized to grant in a single response.Type: GrantFiled: February 6, 2007Date of Patent: October 7, 2014Assignee: BlackBerry LimitedInventors: Michael Kirkup, Tariq Tahir, Michael K. Brown
-
Patent number: 8665105Abstract: A mobile computing device may include an interface device, a near field communication (NFC) device, and a processor coupled with the interface device and the NFC device. The processor may be capable of detecting proximity of an encasement based upon the NFC device, and changing an operational mode of the interface device based upon detecting the proximity of the encasement.Type: GrantFiled: February 6, 2012Date of Patent: March 4, 2014Assignee: BlackBerry LimitedInventors: Michael Kirkup, Sean Wilson, Christopher Pattenden, Vahid Moosavi
-
Patent number: 8527770Abstract: A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The communication network includes a mobile data server. An activation request is initiated to the mobile data server for activating the device on the communication network. During activation, a device certificate request is provided to the mobile data server for the device. The device certificate request includes at least a user identifier, a device identifier and a device public key. The device certificate request is forwarded from the mobile data server to a predefined certification authority. A device certificate from the predefined certification authority is received at the device in response to the device certificate request.Type: GrantFiled: July 20, 2006Date of Patent: September 3, 2013Assignee: Research In Motion LimitedInventors: Michael K. Brown, Michael S. Brown, Michael Kirkup
-
Publication number: 20120216042Abstract: A method is provided for provisioning a device certificate. A device certificate request is transmitted from a communication device to a server in a communication network using an established communications channel between the communication device and the server. The device certificate request comprises at least a user identifier and a device identifier. The server provides to the communication device a device certificate that includes the user identifier and the device identifier and that is signed by a private key of a certificate authority.Type: ApplicationFiled: May 1, 2012Publication date: August 23, 2012Applicant: Research In Motion LimitedInventors: Michael K. Brown, Michael S. Brown, Michael Kirkup
-
Publication number: 20120133493Abstract: A mobile computing device may include an interface device, a near field communication (NFC) device, and a processor coupled with the interface device and the NFC device. The processor may be capable of detecting proximity of an encasement based upon the NFC device, and changing an operational mode of the interface device based upon detecting the proximity of the encasement.Type: ApplicationFiled: February 6, 2012Publication date: May 31, 2012Applicant: Research in Motion LimitedInventors: MICHAEL KIRKUP, Sean Wilson, Christopher Pattenden, Vahid Moosavi
-
Patent number: 8111144Abstract: A mobile device, through the use of an NFC subsystem, may determine holster-proximity information, i.e., whether the mobile device is near to (including in) a holster or out of, and away from, the holster. The holster-proximity information may be used by the mobile device to enter into a user-inactive mode. Such entry into a user-inactive mode may involve disabling user interface components, such as input devices and output devices. In particular, the holster-proximity information may be used by the mobile device to disable the keyboard, that is, prevent presses on keys in the keyboard from being recorded. Such disabling may be considered of particular importance when the mobile device is going into and coming out of the holster.Type: GrantFiled: February 13, 2007Date of Patent: February 7, 2012Assignee: Research In Motion LimitedInventors: Michael Kirkup, Sean Wilson, Christopher Pattenden, Vahid Moosavi
-
Patent number: 8090409Abstract: A system and method for enabling functions on a primary mobile device from a secondary mobile device are described. The primary mobile device is configured to enable at least selected functions of the mobile communications device if authorization information is received at the primary mobile device at periodic intervals of time. The method comprises: storing at the secondary mobile device the authorization information; establishing a short range direct wireless communications link between the secondary mobile device and the primary mobile device; and periodically transmitting the authorization information to the primary mobile device to enable the at least selected functions of the mobile communications device.Type: GrantFiled: March 11, 2010Date of Patent: January 3, 2012Assignee: Research In Motion LimitedInventors: Michael K. Brown, Michael Kirkup, Michael S. Brown
-
Publication number: 20100159876Abstract: A system and method for enabling functions on a primary mobile device from a secondary mobile device are described. The primary mobile device is configured to enable at least selected functions of the mobile communications device if authorization information is received at the primary mobile device at periodic intervals of time. The method comprises: storing at the secondary mobile device the authorization information; establishing a short range direct wireless communications link between the secondary mobile device and the primary mobile device; and periodically transmitting the authorization information to the primary mobile device to enable the at least selected functions of the mobile communications device.Type: ApplicationFiled: March 11, 2010Publication date: June 24, 2010Applicant: RESEARCH IN MOTION LIMITEDInventors: Michael K. BROWN, Michael KIRKUP, Michael S. BROWN
-
Publication number: 20080191892Abstract: A mobile device, through the use of an NFC subsystem, may determine holster-proximity information, i.e., whether the mobile device is near to (including in) a holster or out of, and away from, the holster. The holster-proximity information may be used by the mobile device to enter into a user-inactive mode. Such entry into a user-inactive mode may involve disabling user interface components, such as input devices and output devices. In particular, the holster-proximity information may be used by the mobile device to disable the keyboard, that is, prevent presses on keys in the keyboard from being recorded. Such disabling may be considered of particular importance when the mobile device is going into and coming out of the holster.Type: ApplicationFiled: February 13, 2007Publication date: August 14, 2008Applicant: RESEARCH IN MOTION LIMITEDInventors: Michael Kirkup, SEAN WILSON, Christopher Pattenden, Vahid Moosavi
-
Publication number: 20080189793Abstract: There is disclosed a system and method for setting application permissions. In an embodiment, the method comprises reviewing the current application permissions settings on the device; comparing the current application permissions settings to a set of required application permissions settings for the software application; listing the set of required application permissions; and providing means to grant permission for all required application permissions the user is authorized to grant. In another embodiment, only the required application permissions requiring a grant of permission and which the user is authorized to grant are listed. The user may be provided with means to grant permission for all required permissions the user is authorized to grant in a single response.Type: ApplicationFiled: February 6, 2007Publication date: August 7, 2008Inventors: Michael Kirkup, Tariq Tahir, Michael K. Brown
-
Publication number: 20080022103Abstract: A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The communication network includes a mobile data server. An activation request is initiated to the mobile data server for activating the device on the communication network. During activation, a device certificate request is provided to the mobile data server for the device. The device certificate request includes at least a user identifier, a device identifier and a device public key. The device certificate request is forwarded from the mobile data server to a predefined certification authority. A device certificate from the predefined certification authority is received at the device in response to the device certificate request.Type: ApplicationFiled: July 20, 2006Publication date: January 24, 2008Inventors: Michael K. Brown, Michael S. Brown, Michael Kirkup
-
Publication number: 20080014984Abstract: A system and method for provisioning a primary mobile device from a secondary mobile device, including storing at the secondary mobile device provisioning data for the primary mobile device, the provisioning data including information used by the primary mobile device for communicating over a wireless network; establishing a direct wireless communications link between the secondary mobile device and the primary mobile device; and sending the provisioning data over the communications link from the secondary mobile device to the primary mobile device and storing the provisioning data at the primary mobile device.Type: ApplicationFiled: July 14, 2006Publication date: January 17, 2008Applicant: RESEARCH IN MOTION LIMITEDInventors: Michael K. Brown, Michael Kirkup, Michael S. Brown
-
Publication number: 20070266247Abstract: Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral output device (e.g. a printer, a headset). In exemplary embodiments, the encryption key is generated at the peripheral output device. Data associated with the encryption key is output at the peripheral output device, which can be input by the user at the computing device. The encryption key is then recovered at the computing device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.Type: ApplicationFiled: May 12, 2006Publication date: November 15, 2007Applicant: Research In Motion LimitedInventors: Michael Kirkup, Michael Brown, Michael Brown
-
Publication number: 20070263872Abstract: Embodiments of a system and method for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In exemplary embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security.Type: ApplicationFiled: May 12, 2006Publication date: November 15, 2007Applicant: Research In Motion LimitedInventors: Michael Kirkup, Michael Brown, Michael Brown
-
Publication number: 20070260874Abstract: A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a computing device (e.g. a mobile device) to determine status data that can be used to indicate the status of those certificates to a user of the computing device, without having to download those certificates to the computing device in their entirety. The data server is further adapted to transmit the status data to the computing device. In one embodiment, at least one status property of the certificates is verified at the data server in determining the status data. In another embodiment, additional certificate data is determined and transmitted to the computing device, which can be used by the computing device to verify, at the computing device, at least one other status property of the certificates.Type: ApplicationFiled: May 4, 2006Publication date: November 8, 2007Applicant: Research In Motion LimitedInventors: Neil Adams, Herbert Little, Michael Brown, Michael Brown, Michael Kirkup
-
Publication number: 20070258584Abstract: A system and method for processing messages with encryptable message parts. When constructing an encoded message, an encryption key of a plurality of identified encryption keys is used to encrypt message data of a message part. A key identifier is associated with the message part and identifies the encryption key used for the encryption of the message data of the message part. In at least one exemplary embodiment, encryption keys that are used to encrypt message data of message parts are provided in a separate message part, arranged by key identifier. In particular, the encryption keys, arranged by key identifier, may be provided in exactly one message part separate from the message parts containing message data. This allows for a compact message encoding.Type: ApplicationFiled: May 4, 2006Publication date: November 8, 2007Applicant: Research in Motion LimitedInventors: Michael Brown, Michael Kirkup, Michael Brown
-
Publication number: 20070194132Abstract: A portable adaptor for using a smart card of a first configuration with a smart card reader of a second configuration. For instance, the adaptor may enable use of a contactless smart card with a contact smart card reader, or vice versa. The adaptor is provided with a casing that is configured to engage a contact smart card or a contactless smart card, and where intended for use with a contact smart card reader is provided with an exterior portion that physically cooperates via a contact pad with a contact smart card reader. The adaptor is provided with an interface passing signals between a smart card of a first configuration and a smart card reader, of a second configuration. For instance, an interface for passing signals between a contact smart card and a contactless smart card reader or vice versa.Type: ApplicationFiled: February 22, 2007Publication date: August 23, 2007Applicant: Research In Motion LimitedInventors: Michael Brown, Michael Brown, Michael Kirkup