Patents by Inventor Peter Bermingham

Peter Bermingham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130091564
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a method includes detecting that a security compromise event has occurred for a mobile device. The method also includes altering a function of the mobile device in response to the security compromise event to mitigate loss of control by an authorized user. Altering the function of the mobile device includes denying access to data stored on the mobile device.
    Type: Application
    Filed: August 13, 2012
    Publication date: April 11, 2013
    Inventors: William Fitzgerald, Peter Bermingham, Paul Prendergast
  • Publication number: 20120237908
    Abstract: Certain embodiments are directed to systems and methods for monitoring and/or managing a device with respect to a rule or set of rules and/or altering the functionality of the device in response. In one embodiment, a method includes monitoring a mobile user's equipment with respect to a rule. The method also includes applying at least one consequence to the mobile user equipment when the rule is at least one of followed or violated. The at least one consequence comprises at least one of a reward or a punishment. The at least one consequence pertains to use of the mobile user equipment.
    Type: Application
    Filed: December 21, 2011
    Publication date: September 20, 2012
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Patent number: 8248237
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Grant
    Filed: April 2, 2008
    Date of Patent: August 21, 2012
    Assignee: Yougetitback Limited
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20110282697
    Abstract: Embodiments of the present invention delineate systems and methods for dynamically assessing and mitigating risk of an insured entity. Additional embodiments of the present invention delineate systems and methods for providing a user of a mobile device with information relevant to a position of a mobile device, wherein such information may describe one of a risk and an opportunity within a predetermined distance of a location for the mobile device.
    Type: Application
    Filed: July 22, 2011
    Publication date: November 17, 2011
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20100138297
    Abstract: Embodiments of the present invention include a primary access interface where messages are in an auxiliary interface area, where a user can see/hear the message without having to log in (that is, when they normally would have to have logged in to access the message). Included in various embodiments are types of messages output, emergency messages, advertising messages and conditions for outputting messages. Also provided is allowing for user input through an auxiliary interface triggering services or features normally requiring login (before they can be used). What is further provided is an application programming interface for independent or third party applications. What is also provided is an advertising server system integrated with a front-end interface.
    Type: Application
    Filed: August 24, 2009
    Publication date: June 3, 2010
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20100134299
    Abstract: The invention is directed to systems and methods for that provide a user interface on an electronic device, the user interface including: (i) an auxiliary interface for receiving input from a user and providing output to the user; and (ii) a primary access interface. Using the auxiliary interface, a message to the user is provided, without requiring the user to be authenticated through the primary access interface.
    Type: Application
    Filed: August 24, 2009
    Publication date: June 3, 2010
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20100138298
    Abstract: There is provided a system for managing advertisement using an auxiliary user interface to a provided electronic device, the system comprising a provided user device and an advertising data server configured to communicate with the provided user device through the communication link.
    Type: Application
    Filed: August 24, 2009
    Publication date: June 3, 2010
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20100134275
    Abstract: The invention is directed to a user interface on a provided electronic device, the user interface including: (i) an auxiliary interface for receiving input from a user and providing output to the user; and (ii) a primary access interface. Using the auxiliary interface, a message to the user is provided, wherein the message is provided without requiring the user to be authenticated through the primary access interface. Input from the user is accepted through the auxiliary interface to access a service available from the provided electronic device, wherein access to the service is provided without requiring the user to be authenticated through the primary access interface.
    Type: Application
    Filed: August 24, 2009
    Publication date: June 3, 2010
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090251282
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: April 2, 2008
    Publication date: October 8, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090253408
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: April 2, 2008
    Publication date: October 8, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090253410
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: September 3, 2008
    Publication date: October 8, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090253406
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: September 3, 2008
    Publication date: October 8, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090247122
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: September 3, 2008
    Publication date: October 1, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090249460
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 1, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090249497
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: September 3, 2008
    Publication date: October 1, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast
  • Publication number: 20090249443
    Abstract: The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a device monitors its use, its local environment, and/or its operating context to determine that the device is no longer within the control of an authorized user. The device may receive communications or generate an internal signal altering its functionality, such as instructing the device to enter a restricted use mode, a surveillance mode, to provide instructions to return the device and/or to prevent unauthorized use or unauthorized access to data. Additional embodiments also address methods and systems for gathering forensic data regarding an unauthorized user to assist in locating the unauthorized user and/or the device.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 1, 2009
    Inventors: William Fitzgerald, Peter Bermingham, Frank Hannigan, Paul Prendergast