Patents by Inventor Sean Michael Quinlan
Sean Michael Quinlan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9807075Abstract: Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device.Type: GrantFiled: July 29, 2015Date of Patent: October 31, 2017Assignee: Good Technology Holdings LimitedInventors: Saul Kessler, Sean Michael Quinlan, Haniff Somani, Nigel Thompson, Adrian Satmarel
-
Publication number: 20170293769Abstract: A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing device.Type: ApplicationFiled: April 7, 2016Publication date: October 12, 2017Inventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA, Peter BARKER, Siavash James Joorabchian HAWKINS
-
Publication number: 20170288879Abstract: A method for monitoring user activity in respect of a plurality of applications on a computing device. The method comprises storing, by a first application running on the computing device, a first timestamp indicating the time that user activity was last detected with respect to the first application. The first application receives a message from a second application running on the computing device. The message comprises a second timestamp indicating the time that user activity was last detected with respect to the second application. The first application updates the first timestamp based on the second timestamp when the time indicated by the second timestamp is later than the time indicated by the first timestamp. Thus, user activity across the plurality of application can be monitored, such that an inactivity timer running on a particular application in the group of applications can account for user activity with respect to the other application in the plurality.Type: ApplicationFiled: September 4, 2015Publication date: October 5, 2017Applicant: Good Technology Holdings LimitedInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20170269963Abstract: A method of managing a plurality of applications on a computing device. The method comprises receiving, by a first application running on the computing device, a lock message comprising a timestamp and a digital signature associated with the timestamp, from a second application miming on the computing device. Upon receipt of the lock message, the first application verifies the digital signature to confirm the authenticity of the timestamp. Once the timestamp has been confirmed by the first application, the first application locks the first application. Accordingly, a lock event with respect to an application in the plurality of applications can be propagated to other applications in the plurality of applications.Type: ApplicationFiled: September 4, 2015Publication date: September 21, 2017Applicant: GOOD TECHNOLOGY HOLDINGS LIMITEDInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20170230468Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.Type: ApplicationFiled: April 28, 2017Publication date: August 10, 2017Applicant: Good Technology Holdings LimitedInventors: Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20170206100Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.Type: ApplicationFiled: April 5, 2017Publication date: July 20, 2017Applicant: Good Technology Holdings LimitedInventors: Haniff SOMANI, Sanjiv MAURYA, Sean Michael QUINLAN
-
Publication number: 20170180335Abstract: Methods and systems for managing access to a resource by one of a plurality of applications. The method comprises: storing, in a first storage area associated with a first application, a first credential for use in accessing the resource; receiving, at a second application, a message comprising data for determining that the first application stores a validated credential for accessing the resource; sending a request for the validated credential from the second application to the first application; receiving the first credential at the second application from the first application in response to the request sent; and storing the first credential in a second storage area associated with the second application; wherein the message received at the second application is received from a server system, remote from the plurality of applications, which maintains data indicating a subset of the plurality of applications which store respective validated credentials for accessing the resource.Type: ApplicationFiled: February 25, 2016Publication date: June 22, 2017Inventors: Sean Michael QUINLAN, Haniff SOMANI, Alibek JORAJEV, Sanjiv MAURYA, Gary GILCHRIST, Luis CHIRINOS, Kevin Charles LOHMAN, Nicholas VAN SOMEREN
-
Patent number: 9667707Abstract: Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. In response to determining that the first service is to be executed on behalf of the first service, a request message is sent to a data store including an identifier of the first service. The data store comprising entries indicating applications held on one or more user terminals, and indicating one or more services that may be executed, on request, by a corresponding application. The first user terminal receives a response message from the data store identifying one or more applications to which execution of the first service may be delegated.Type: GrantFiled: January 16, 2015Date of Patent: May 30, 2017Assignee: Good Technology Holdings LimitedInventors: Sean Michael Quinlan, Haniff Somani, Sanjiv Maurya
-
Patent number: 9645834Abstract: Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. The operating parameter can be configured remotely and pushed to the user device where it is enforced by the application. Methods for providing information of the operating parameter to a remote device and for updating the configuration of an application are also described.Type: GrantFiled: January 18, 2013Date of Patent: May 9, 2017Assignee: Good Technology Holdings LimitedInventors: Haniff Somani, Sanjiv Maurya, Sean Michael Quinlan
-
Patent number: 9600257Abstract: A method, system and computer program product for generating a list of applications available for installation on a user terminal is disclosed. In one aspect, a catalogue server identifies a first and a second installation control setting corresponding to an application on the basis of user identification data from a data store comprising entries for a plurality of applications and their corresponding installation control settings. Subsequently, the catalogue server determines installation control data for at least one of the first and second application on the basis of the first and the second installation control setting. The determined installation control data is used to generate the list of application available for installation on the user terminal.Type: GrantFiled: May 28, 2015Date of Patent: March 21, 2017Assignee: Good Technology Holdings LimitedInventors: Haniff Somani, Sean Michael Quinlan
-
Publication number: 20160315923Abstract: A method and system for negotiating a secure device-to-device communications channel between a first computing device and a second computing device, wherein the first computing device is associated with a first user and the second computing device is associated with a second user. The method comprises receiving, at a server, a first connection request comprising first address data and a first cryptographic key associated with the first computing device, the first connection request being received over a first secure communications channel, and receiving, at the server, a second connection request comprising second address data and a second cryptographic key associated with the second computing device, the second connection request being received over a second secure communications channel.Type: ApplicationFiled: December 11, 2014Publication date: October 27, 2016Applicant: GOOD TECHNOLOGY CORPORATIONInventors: Phillip RISCOMBE-BURTON, Siavash James Joorabchian HAWKINS, Sean Michael QUINLAN, Haniff SOMANI, Sanjiv MAURYA
-
Publication number: 20160308845Abstract: A computing device has a first application and a second application. The first application generates a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using the data access application key. In operation, the second application generates a public/private key pair. The second application sends a request to the first application for the first application to send the second application a data access application key, the request including the public key. The first application derives the requested data access application key as a function of at least the public key. The first application sends the derived data access application key to the second application.Type: ApplicationFiled: April 12, 2016Publication date: October 20, 2016Inventor: Sean Michael QUINLAN
-
Patent number: 9385996Abstract: Data is stored on a computing device in an encrypted form using a control application. A data access application requests access to the data. It is determined whether the data access application has available a shared encryption key that is available to the control application. If a shared encryption key is available, the shared encryption key is used to encrypt a request for access to the data. If a shared encryption key is not available, a shared encryption key is negotiated with the control application, and the negotiated shared encryption key is used to encrypt the request for access to the data. The control application receives the encrypted request, decrypts the encrypted request using the shared encryption key, and makes the data stored on the computing device in encrypted form available to the data access application in response to the decrypted request.Type: GrantFiled: February 28, 2013Date of Patent: July 5, 2016Assignee: Good Technology CorporationInventors: Sean Michael Quinlan, Kevin Charles Lohman, Haniff Somani, Peter Maximilian Barker, Nicholas Benedict Van Someren
-
Patent number: 9361603Abstract: A smartphone that includes a communications interface to communicate via one or more Internet communications channels is provided. The smartphone also includes a service engine that communicates with a global server via an Internet channel using the communications interface to provide identification data to the global server. In response to providing the identification data, the service engine receives configuration data to configure the service engine with a selectable set of downloadable executables. The selectable set of downloadable executables include a selection of downloadable executables that is made at least in part by the global server using the identification data. A display presents at least some of the selectable set of downloadable executables on the smartphone, and an input device selects a downloadable executable from the selectable set. The service engine initiates a download of the selected downloadable executable using the communications interface.Type: GrantFiled: March 2, 2011Date of Patent: June 7, 2016Assignee: Good Technology CorporationInventors: Daniel J. Mendez, Mark D. Riggins, Prasad Wagle, Hong Q. Bui, Mason Ng, Sean Michael Quinlan, Christine C. Ying, Christopher R. Zuleeg, David J. Cowan, Joanna A. Aptekar-Strober, R. Stanley Bailes
-
Patent number: 9356994Abstract: Data is stored on a computing device in encrypted form in respective digital containers. At least one data access application is stored on the computing device. A control application of the computing device connects to a remote control center. A command from the remote control center is received at the connected control application. The command contains an action to be taken in respect of at least one of the at least one data access application and the containers stored on the computing device. The command is passed from the connected control application to the data access application or container, and the data access application or container carries out the command.Type: GrantFiled: February 28, 2013Date of Patent: May 31, 2016Assignee: Good Technology CorporationInventors: Sean Michael Quinlan, Kevin Charles Lohman, Haniff Somani, Peter Maximilian Barker
-
Patent number: 9319219Abstract: A data access application key is generated. The data access application key is for use by a data access application to enable decryption of data that is stored in encrypted form on a computing device using the data access application key. The data access application key is generated using an identifier of the data access application and an application key that is specific to at least one of the computing device and/or a user of the computing device.Type: GrantFiled: February 28, 2013Date of Patent: April 19, 2016Assignee: GOOD TECHNOLOGY CORPORATIONInventors: Sean Michael Quinlan, Kevin Charles Lohman, Haniff Somani, Peter Maximilian Barker
-
Publication number: 20160105522Abstract: A system and method for provisioning a push notification session via a communications network between an application on a client terminal and a server corresponding to the application. In one aspect, a push provisioning entity transmits a message to the client terminal, whereby to configure the client terminal into a state in which it is able to request a push notification session with the server. An application on the client terminal can then request establishment of a push notification session by transmitting a push notification session request message to the push provisioning entity. The push provisioning entity generates a token for use in validating the push notification session, associates the generated token with the application and transmits the token to the application, which uses it to establish the push notification session.Type: ApplicationFiled: December 17, 2015Publication date: April 14, 2016Inventors: Haniff SOMANI, Sean Michael QUINLAN
-
Publication number: 20150334105Abstract: Methods for activating a second application on a user device using a first application already installed and activated on the user device are described. In one embodiment the second application requests activation from the first application. The first application then authenticates a user before providing an activation response. The activation response can be requested from a remote server by the first application on behalf of the second application. The methods improve the ease of activating new software on a user device.Type: ApplicationFiled: July 29, 2015Publication date: November 19, 2015Inventors: Saul KESSLER, Sean Michael QUINLAN, Haniff SOMANI, Nigel THOMPSON, Adrian SATMAREL
-
Publication number: 20150261515Abstract: A method, system and computer program product for generating a list of applications available for installation on a user terminal is disclosed. In one aspect, a catalogue server identifies a first and a second installation control setting corresponding to an application on the basis of user identification data from a data store comprising entries for a plurality of applications and their corresponding installation control settings. Subsequently, the catalogue server determines installation control data for at least one of the first and second application on the basis of the first and the second installation control setting. The determined installation control data is used to generate the list of application available for installation on the user terminal.Type: ApplicationFiled: May 28, 2015Publication date: September 17, 2015Inventors: Haniff SOMANI, Sean Michael QUINLAN
-
Patent number: 9130935Abstract: Embodiments of the invention are concerned with providing access credentials associated with a user of a service to a server hosting the service, e.g. enabling single sign on by the user to a number of servers. The embodiments include functionality for establishing a first data connection with a terminal associated with the user and a second data connection with the server, and bridging the first and second data connections in order to establish a first communications session, using a first communications protocol, between the terminal and the server. A second communications session, using a second communications protocol, is also established with the server, via which a request for access credentials associated with the user is received. This request includes information received by the server in the first communications session, which is used to identify access credentials of the user that are transmitted to the server via the second communications session.Type: GrantFiled: May 5, 2011Date of Patent: September 8, 2015Assignee: GOOD TECHNOLOGY CORPORATIONInventors: Haniff Somani, Sean Michael Quinlan