Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Hearnden

David Hearnden, Mountain View, CA US

Patent application numberDescriptionPublished
20130318633DATA EXCHANGE BETWEEN APPLICATIONS OF AN ELECTRONIC DEVICE - An electronic device includes a requesting application and a hosting application. When the requesting application requests permission from the hosting application to access a category of data, the device identifies the requesting application and the permission request. The device awaits a user input to determine whether the user will permit the requesting application's request to be granted.11-28-2013

Jane Ellen Hearnden, Ottawa CA

Patent application numberDescriptionPublished
20140095873METHOD AND SYSTEM FOR HYPERTEXT TRANSFER PROTOCOL DIGEST AUTHENTICATION - A method and system for hypertext transfer protocol digest authentication through the use of a token issuing entity trusted by both a client and a service provider. The token issuing entity may issue an encrypted token and a token secret to the client. The client may then use the token secret instead of a password for digest authentication, and provided the encrypted token along with the digest authentication response to the service provider. The service provider may decrypt the encrypted token to obtain the token secret, which may then be used for digest authentication with the client.04-03-2014

Stephen Hearnden, Santa Clara, CA US

Patent application numberDescriptionPublished
20150281888PROVABLE GEO-LOCATION - A geo-location provider station signs geo-location data and a previous signature provided by a mobile device, returning a new signature to the mobile device. The mobile device uses the new signature when requesting a signature from another geo-location provider station. The mobile device stores the geo-location data and the signatures provided by geo-location provider stations. The stored geo-location data may be verified upon request by using the stored signature data.10-01-2015

Stephen Owen Hearnden, Milton Keynes GB

Patent application numberDescriptionPublished
20130042320SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING PORTIONS OF DATA - A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data.02-14-2013
20150067856SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SCANNING PORTIONS OF DATA - A scanning system, method and computer program product are provided. In use, portions of data are scanned. Further, access to a scanned portion of the data is allowed during scanning of another portion of the data.03-05-2015

Stephen Owen Hearnden, Miton Keynes GB

Patent application numberDescriptionPublished
20130246378PARTIAL HASH SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT - A system, method, and computer program product are provided for outputting a signal based on a partial hash comparison. In use, data is identified. In addition, a partial hash is determined utilizing a portion of the data. Further, the partial hash is compared with a plurality of known partial hashes, and an additional hash is conditionally determined based on the comparison. Still yet, a signal is output based on the comparison.09-19-2013

Steve O. Hearnden, Milton Keynes GB

Patent application numberDescriptionPublished
20120167166SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR ENABLING COMMUNICATION BETWEEN SECURITY SYSTEMS - A system, method, and computer program product are provided for enabling communication between security systems. In use, a first communication protocol of a first security system and a second communication protocol of a second security system are identified, where the first communication protocol and the second communication protocol are different such that the first security system and the second security system are incapable of communicating therebetween. Further, the first security system is updated with a first security definition and/or the second security system is updated with a second security definition for enabling communication between the first security system and the second security system.06-28-2012
20130246370SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR DETERMINING WHETHER CODE IS UNWANTED BASED ON THE DECOMPILATION THEREOF - A system, method, and computer program product are provided for determining whether code is unwanted based on the decompilation thereof. In use, code is identified and the code is decompiled. In addition, it is determined whether the code is unwanted, based on the decompiled code.09-19-2013
Website © 2015 Advameg, Inc.