Hearnden
David Hearnden, Mountain View, CA US
Patent application number | Description | Published |
---|---|---|
20130318633 | DATA EXCHANGE BETWEEN APPLICATIONS OF AN ELECTRONIC DEVICE - An electronic device includes a requesting application and a hosting application. When the requesting application requests permission from the hosting application to access a category of data, the device identifies the requesting application and the permission request. The device awaits a user input to determine whether the user will permit the requesting application's request to be granted. | 11-28-2013 |
Jane Ellen Hearnden, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20140095873 | METHOD AND SYSTEM FOR HYPERTEXT TRANSFER PROTOCOL DIGEST AUTHENTICATION - A method and system for hypertext transfer protocol digest authentication through the use of a token issuing entity trusted by both a client and a service provider. The token issuing entity may issue an encrypted token and a token secret to the client. The client may then use the token secret instead of a password for digest authentication, and provided the encrypted token along with the digest authentication response to the service provider. The service provider may decrypt the encrypted token to obtain the token secret, which may then be used for digest authentication with the client. | 04-03-2014 |
Stephen Hearnden, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20150281888 | PROVABLE GEO-LOCATION - A geo-location provider station signs geo-location data and a previous signature provided by a mobile device, returning a new signature to the mobile device. The mobile device uses the new signature when requesting a signature from another geo-location provider station. The mobile device stores the geo-location data and the signatures provided by geo-location provider stations. The stored geo-location data may be verified upon request by using the stored signature data. | 10-01-2015 |
Stephen Owen Hearnden, Milton Keynes GB
Patent application number | Description | Published |
---|---|---|
20130042320 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING PORTIONS OF DATA - A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data. | 02-14-2013 |
20150067856 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING PORTIONS OF DATA - A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data. | 03-05-2015 |
Stephen Owen Hearnden, Miton Keynes GB
Patent application number | Description | Published |
---|---|---|
20130246378 | PARTIAL HASH SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT - A system, method, and computer program product are provided for outputting a signal based on a partial hash comparison. In use, data is identified. In addition, a partial hash is determined utilizing a portion of the data. Further, the partial hash is compared with a plurality of known partial hashes, and an additional hash is conditionally determined based on the comparison. Still yet, a signal is output based on the comparison. | 09-19-2013 |
Steve O. Hearnden, Milton Keynes GB
Patent application number | Description | Published |
---|---|---|
20120167166 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ENABLING COMMUNICATION BETWEEN SECURITY SYSTEMS - A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system. | 06-28-2012 |
20130246370 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING WHETHER CODE IS UNWANTED BASED ON THE DECOMPILATION THEREOF - A system, method, and computer program product are provided for determining whether code is unwanted based on the decompilation thereof. In use, code is identified and the code is decompiled. In addition, it is determined whether the code is unwanted, based on the decompiled code. | 09-19-2013 |