Patents by Inventor Sean Alexander
Sean Alexander has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8799634Abstract: Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.Type: GrantFiled: December 23, 2011Date of Patent: August 5, 2014Assignee: BlackBerry LimitedInventors: Sean Alexander Courtney, Alexander Truskovsky, Neil Patrick Adams
-
Publication number: 20140215206Abstract: A system for providing security services to a mobile device where the mobile device is in communication with a public network through a first network path that is subject to interference by a third party. The system includes a security server and a private network. The security server is operative to communicate with the mobile device through the private network. The security server is also operative to communicate with the public network through a second network path that is less susceptible to the interference by the third party than is the first network path. The security server communicates with the public network through the second network path to provide security services to the mobile device that are delivered over the private network.Type: ApplicationFiled: March 11, 2013Publication date: July 31, 2014Applicants: CERTICOM CORP., RESEARCH IN MOTION LIMITEDInventors: Sean Alexander Courtney, Matthew John Campagna, George Ross Staikos, Alexander Truskovsky
-
Publication number: 20140129343Abstract: A dynamic, personalized advertising avatar based on a user's own avatar used in an online service is used to provide branded advertising in a virtual context. A definition of a user avatar with user attributes is acquired, and custom attributes for a dynamic user-based avatar are received from an advertiser. Dynamically generated user-based avatars are created having at least a portion of user attributes of the user avatar and a portion of the custom attributes, so that the resulting custom avatar is recognizable to the user but represents a product brand or service. Information is then acquired regarding user activity on a device capable of displaying the dynamically generated user-based advertising avatar and advertisements generated based on the dynamically generated user-based advertising avatar and the targeting information. The advertisement is then rendered on the user device using the dynamically generated user-based advertising avatar.Type: ApplicationFiled: November 8, 2012Publication date: May 8, 2014Applicant: MICROSOFT CORPORATIONInventors: Diana Finster, Enrique de la Garza, Alexei Pineda, Sean Alexander
-
Patent number: 8709168Abstract: Hard surfaces can be treated to improve soil resistance, particularly resistance to oily soils, by applying a composition of a quaternised, polyamine, polypropoxylate, polyethoxylate. The polyamine can be a polyethyleneimme, desirably having a molecular weight of from 10 to 50 kDa. The average length of the polypropylenoxy chains is desirably from 10 to 100 and the polyethylenoxy chains from 5 to 50 (each per NH group in the polyamine), particularly at a molar ratio of PO:EO of about 3:1. The degree of quaternization of the nitrogen atoms in the polyamine is desirably from 70 to 100%. The polymer will usually be used in solution in water or an aqueous formulation, which may include detergent and other detergent formulation components.Type: GrantFiled: October 4, 2010Date of Patent: April 29, 2014Assignee: Croda International PLCInventors: Alan Geoffrey Waite, Trevor Graham Blease, Sean Alexander Robins
-
Patent number: 8701166Abstract: Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various embodiments include apparatus and methods to authenticate a communication session between a server and a client device without providing authentication tokens to the client device. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: December 9, 2011Date of Patent: April 15, 2014Assignee: BlackBerry LimitedInventors: Sean Alexander Courtney, Herbert Anthony Little, Alexander Truskovsky
-
Publication number: 20140059513Abstract: A computer system interacts with a software development environment to enable a software developer to submit one or more software projects to a submission portal for analysis. A processor obtains needed files associated with a software project and then may proceed to compile the artifacts based on compile parameters in order to generate additional artifacts typically containing at least one binary file but that may be dependent on a type of the software project. The configuration data may be created independently of a build environment of the software project. The computer system may then archive artifacts of the software project that may be compressed and uploaded to an analysis tool. The submissions portal can then determine whether the submitted code is complete. The submitted code can be further analyzed by a static analysis engine, where the results are presented to the developer.Type: ApplicationFiled: August 27, 2012Publication date: February 27, 2014Applicant: Bank of AmericaInventor: Sean Alexander Sabo
-
Patent number: 8627108Abstract: Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data.Type: GrantFiled: September 14, 2012Date of Patent: January 7, 2014Assignee: BlackBerry LimitedInventors: Sean Alexander Courtney, Neil Patrick Adams
-
Publication number: 20130294572Abstract: A method and imaging system for operating imaging computed tomography using at least one radiation source and at least one detector to generate an image of an object. The method includes: defining desired image characteristics; and performing calculations to determine the pattern of fluence to be applied by the at least one radiation source, to generate said desired image quality or characteristics. Then, the at least one radiation source is modulated, to generate the intended pattern of fluence between the beam source and the object to be imaged. The desired image characteristics can provide at least one of: desired image quality in at least one defined region of interest; and at least one desired distribution of said image quality.Type: ApplicationFiled: March 15, 2013Publication date: November 7, 2013Inventors: David A. Jaffray, Sean Alexander Graham, Jeffrey Harold Siewerdsen, Steven Joe Bartolac
-
Publication number: 20130166899Abstract: Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.Type: ApplicationFiled: December 23, 2011Publication date: June 27, 2013Applicant: RESEARCH IN MOTION LIMITEDInventors: Sean Alexander Courtney, Alexander Truskovsky, Neil Patrick Adams
-
Publication number: 20130152176Abstract: Apparatus, systems, and methods provide a mechanism to enhance the security of operating client devices with systems controlling secure data. Various embodiments include apparatus and methods to authenticate a communication session between a server and a client device without providing authentication tokens to the client device. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: December 9, 2011Publication date: June 13, 2013Inventors: Sean Alexander Courtney, Herbert Anthony Little, Alexander Truskovsky
-
Patent number: 8397274Abstract: A system, devices and methods for verifying an administrator computing device to a guest computing device, verifying the guest device to the administrator device and outputting a list of the guest device capabilities for the administrator device such that the guest device is capable of verifying the administrator device, for example to ensure it does not divulge its capabilities to imposters, and the administrator device is capable of identifying whether the list of device capabilities is authentic. Verification can be achieved through cryptographic hashes of private certificates, digital signatures or expected output from verified modules. The list of device capabilities may be restricted based on the authorization granted to the administrator computer and may be altered or watermarked for verification. A failure to verify the administrator device may restrict execution of instructions on the guest device to prevent unauthorized access to the guest device's capabilities.Type: GrantFiled: July 13, 2010Date of Patent: March 12, 2013Assignee: Research In Motion LimitedInventors: Sean Alexander Courtney, Eli Omen Jackson, Alexander Truskovsky
-
Publication number: 20130013933Abstract: Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: Research In Motion LimitedInventors: Neil Patrick Adams, Sean Alexander Courtney
-
Patent number: 8296580Abstract: Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data.Type: GrantFiled: January 27, 2010Date of Patent: October 23, 2012Assignee: Research In Motion LimitedInventors: Neil Patrick Adams, Sean Alexander Courtney
-
Publication number: 20120129569Abstract: A method and apparatus for reacting to an alert message, such as a commercial mobile alert system (CMAS) message, is provided. A mobile device in receipt of an alert message automatically obtains status information such as mobile device position, for example via GPS, and prompts a user for status information such as emergency preparedness. A response message is automatically generated and transmitted to designated recipients, such as address book contacts or a datacentre.Type: ApplicationFiled: November 22, 2010Publication date: May 24, 2012Applicant: RESEARCH IN MOTION LIMITEDInventor: Sean Alexander COURTNEY
-
Patent number: 8178068Abstract: A catalyst charge for ammonia oxidation, including the Andrussow process, comprises a first stage ammonia oxidation catalyst capable of oxidizing 20 to 99% of designed ammonia throughput, to produce a first stage product gas comprising unreacted ammonia, oxygen and nitrogen oxides, and a second stage ammonia oxidation catalyst capable of completing the oxidation of unreacted ammonia. Low levels of nitrous oxide are produced an extended campaign lengths may be seen.Type: GrantFiled: April 27, 2004Date of Patent: May 15, 2012Assignee: Johnson Matthey PLCInventors: Sean Alexander Axon, Duncan Roy Coupland, Brian Thomas Horner, John Ridland, Ian Carmichael Wishart
-
Publication number: 20120017081Abstract: A system, devices and methods for verifying an administrator computing device to a guest computing device, verifying the guest device to the administrator device and outputting a list of the guest device capabilities for the administrator device such that the guest device is capable of verifying the administrator device, for example to ensure it does not divulge its capabilities to imposters, and the administrator device is capable of identifying whether the list of device capabilities is authentic. Verification can be achieved through cryptographic hashes of private certificates, digital signatures or expected output from verified modules. The list of device capabilities may be restricted based on the authorization granted to the administrator computer and may be altered or watermarked for verification. A failure to verify the administrator device may restrict execution of instructions on the guest device to prevent unauthorized access to the guest device's capabilities.Type: ApplicationFiled: July 13, 2010Publication date: January 19, 2012Applicant: RESEARCH IN MOTION LIMITEDInventors: Sean Alexander Courtney, Eli Omen Jackson, Alexander Truskovsky
-
Publication number: 20120011561Abstract: A system, method and apparatus for enabling temporary policies in a mobile computing device are provided. Data representative of the temporary policies is received, the data comprising a time period for applying the temporary policies. Settings of the mobile computing device are automatically changing from original settings to temporary settings, the temporary settings based on the data. When the time period has expired, the settings are changed back to the original settings.Type: ApplicationFiled: July 12, 2010Publication date: January 12, 2012Applicant: RESEARCH IN MOTION LIMITEDInventors: Sean Alexander COURTNEY, Eli Omen JACKSON, Kristof TAKACS
-
Publication number: 20110197065Abstract: A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the central server sends it a secret text string. The virtual machine requests the credentials from the central server by transmitting the secret string and its instance ID. The central server validates the secret string and source IP to determine whether they are authentic. Once verified, the central server transmits the credentials to the virtual machine in a secure channel and invalidates the secret string. The credentials can now be used to authenticate API calls.Type: ApplicationFiled: February 5, 2010Publication date: August 11, 2011Inventors: Sean Alexander STAUTH, Sewook WEE
-
Publication number: 20110185186Abstract: Methods and systems are disclosed for protecting data on a mobile device. A data protection module on the mobile device receives a transmission including a secret key. The secret key is used in encrypting data on the device and is then deleted. Subsequent to an event detectable to the mobile device, the data protection module receives another transmission including said secret key. The secret key is then used to decrypt the encrypted data.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Applicant: Research In Motion LimitedInventors: Neil Patrick Adams, Sean Alexander Courtney
-
Publication number: 20110040946Abstract: A computing device having controlled access and a method for controlling access there to are provided, the computing device comprising a memory device, a display device, and an input device. Data for rendering a map is retrieved from the memory device. The display device is controlled to render the map using the data. Geographic location data representative of a sequence of geographic locations selected from the map is received, via the input device. The geographic location data is converted to received password data. The received password data is compared to stored password data. If a match is found, access is granted to the computing device.Type: ApplicationFiled: August 12, 2009Publication date: February 17, 2011Applicant: METHOD AND APPARATUS FOR CONTROLLING ACCESS TO A COMPUTING DEVICEInventor: Sean Alexander Courtney