Brown, CA
Andrew James Guy Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20110225298 | COMMUNICATIONS SYSTEM PROVIDING SERVER LOAD BALANCING BASED UPON LOAD AND SEPARATION METRICS AND RELATED METHODS - A communications system may include a plurality of client devices configured to generate client processing jobs, each having a respective unique client ID associated therewith. A plurality of geographically spaced apart servers may be configured to process the client processing jobs, each having a respective unique server ID associated therewith. A load balancer may be configured to receive the client processing jobs from the plurality of client devices, and for each client processing job, generate a respective load balancing score for each server based upon the client ID of the client device requesting the client processing job, the server ID of each server, a processing load metric for each server, and a separation metric corresponding to a separation between the requesting client device and each server. The load balancer may also be configured to assign each client processing job to a respective server based upon the load balancing scores. | 09-15-2011 |
20120246257 | Pre-Caching Web Content For A Mobile Device - A web service for pre-caching web content on a mobile device includes receiving a request from the mobile device for first web content, fetching the first web content, determining second web content to pre-fetch based upon the first web content, fetching the second web content, and causing the second web content to be stored in a content cache on the mobile device responsive to the request for the first web content. Pre-caching web content in this manner provides web content to the mobile device that the user of the mobile device is likely to access. Pre-caching of additional web content prior to receiving an explicit request improves web browsing performance of the mobile device. | 09-27-2012 |
20130252583 | AUTHENTICATION SERVER AND METHODS FOR GRANTING TOKENS COMPRISING LOCATION DATA - An authentication server and methods of generating a token for use by a mobile device to establish authorization for the mobile device to access a service provided by a service server, the method comprising receiving a request for the token from the mobile device, generating the token comprising location data identifying a location for the mobile device and authentication data indicating a level of access that the mobile device is permitted to have to the service provided by the service server, and transmitting the token to the mobile device. | 09-26-2013 |
Anthony Brown, Fredericton CA
Patent application number | Description | Published |
---|---|---|
20110205526 | FLEXIBLE FIBRE OPTIC DEFORMATION SENSOR SYSTEM AND METHOD - A cable for distributed fibre optic sensing comprising a flexible tape, an optical fibre suitable for Brillouin scattering measurement forming at least two lengths, and at least one free end of at least one length being connectable to a reading unit, wherein at least a section of the longitudinal length of the flexible tape is situated between at least a section of the two lengths such that the two lengths are in close proximity such that a temperature gradient between the two lengths is minimized, and wherein the section of the tape and the section of lengths can flex together. | 08-25-2011 |
20120224865 | PHASE LOCKED LOOP - An optical phase-locked loop (OPLL) comprising a phase-frequency detector; first and second lasers; a local oscillator; a detector and a low pass filter; operably connected in a circuit comprising a feedback path. The OPLL can also include a pre-scaler, a second local oscillator and a mixer. | 09-06-2012 |
20140086593 | PHASE LOCKED LOOP - An optical phase-locked loop (OPLL) comprising a phase-frequency detector; first and second lasers; a local oscillator; a detector and a low pass filter connected in a circuit comprising a feedback path. The OPLL can also include a pre-scaler, a second local oscillator and a mixer. | 03-27-2014 |
Bradley Brown, Winnipeg CA
Patent application number | Description | Published |
---|---|---|
20110163158 | SYSTEM AND METHOD FOR PERSONALIZING A CARD - Systems and methods for personalizing data card are disclosed. One embodiment includes a card receiver configured to receive one or more data cards, a control system connected to the card receiver, the control system configured to receive personalization information, an encoder system connected to the control system, the encoder system configured to encode the one or more data cards with at least some portion of the personalization information, a card reader connected to the control system, the card reader configured to read magnetic fingerprint information from the one or more data cards, and the control system configured to store the magnetic fingerprint information. | 07-07-2011 |
20140202347 | SYSTEM AND METHOD FOR PERSONALIZING A CARD - Systems and methods for personalizing data card are disclosed. One embodiment includes a card receiver configured to receive one or more data cards, a control system connected to the card receiver, the control system configured to receive personalization information, an encoder system connected to the control system, the encoder system configured to encode the one or more data cards with at least some portion of the personalization information, a card reader connected to the control system, the card reader configured to read magnetic fingerprint information from the one or more data cards, and the control system configured to store the magnetic fingerprint information. | 07-24-2014 |
Cameron Brown, Oakville CA
Casey Brown, Calgary CA
Patent application number | Description | Published |
---|---|---|
20100015476 | THERMALLY INTEGRATED FUEL CELL SYSTEM - A thermally integrated fuel cell system includes a stack zone, a burner zone and a low temperature zone. The fuel is combined with steam and passed sequentially through a primary reformer and a secondary reformer or a radiative fuel heat exchanger. Air may be passed sequentially through an afterburner heat exchanger and a radiative air heat exchanger such that the radiative heat exchanger may be used to heat the stack zone. The stack exhaust is combusted in an afterburner. Afterburner exhaust heats the primary reformer, the high temperature air heat exchanger, the low temperature air heat exchanger and steam generator. The stack zone includes the stacks, the secondary reformer and the radiative heat exchanger. The burner zone includes the afterburner which includes a start burner, the primary reformer and the high temperature air heat exchanger. The low temperature zone includes the low temperature air heat exchanger and a steam generator. | 01-21-2010 |
20120231360 | THERMALLY INTEGRATED FUEL CELL SYSTEM - A thermally integrated fuel cell system includes a stack zone, a burner zone and a low temperature zone. The fuel is combined with steam and passed sequentially through a primary reformer and a secondary reformer or a radiative fuel heat exchanger. Air may be passed sequentially through an afterburner heat exchanger and a radiative air heat exchanger such that the radiative heat exchanger may be used to heat the stack zone. The stack exhaust is combusted in an afterburner. Afterburner exhaust heats the primary reformer, the high temperature air heat exchanger, the low temperature air heat exchanger and steam generator. The stack zone includes the stacks, the secondary reformer and the radiative heat exchanger. The burner zone includes the afterburner which includes a start burner, the primary reformer and the high temperature air heat exchanger. The low temperature zone includes the low temperature air heat exchanger and a steam generator. | 09-13-2012 |
Chad A. Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20090253366 | CEILING VENT DIFFUSER - A device for altering the airflow pattern from a ceiling vent diffuser. The device comprises a flexible member that is secured to a diffuser vane by a spring-biased hook and one or more tabs. A release button on the outer surface of the device is depressed to pivot the hook out of engagement with the vane. The device is complementary shaped to a region of the diffuser. When installed, the device blocks the openings in that region and substantially prevents air from flowing out of the openings. One or more devices may be installed in selected regions to block airflow from those selected regions. A plurality of devices may be utilized to completely prevent airflow from the diffuser. | 10-08-2009 |
20110269391 | CEILING VENT DIFFUSER - A device for altering the airflow pattern from a ceiling vent diffuser by obstructing openings in a region of the diffuser. The device comprises a flexible member that is secured to a diffuser vane by a hook member and two tabs. The hook member has two or more engagement regions which enable it to engage vanes on different manufacturer's diffusers. The first end of the hook member is either pivotally secured to the flexible member or is engaged in an adjustment mechanism thereon. The adjustment mechanism allows the second end of the hook to be situated in different positions relative to an interior edge of the flexible member so as to accommodate different diffusers. An extension detachably engages the flexible member to increase the size thereof to accommodate larger diffusers. | 11-03-2011 |
Colin Brown, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20080291985 | AGILE SPECTRUM MONITORING IN A RADIO TRANSCEIVER - The invention relates to a method and an apparatus for agile RF spectrum monitoring in a radio system with dynamic frequency access. It provides a spectrum monitor based on non-coherent heterodyne detection that utilizes a DDS signal generator to digitally generate a reference signal at a variable reference frequency for mixing with an input RF signal received from an RF antenna, a pass-band filter and a log amplifier for obtaining energy estimates at a monitored transmission frequency corresponding to the reference frequency. A processor is provided for adaptively selecting sets of monitored transmission frequencies, for controlling the DDS signal generator, and for processing obtained spectral energy estimates to assess spectral usage data. | 11-27-2008 |
Dale Kevin Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20080280192 | BATTERY THERMAL MANAGEMENT SYSTEM - Disclosed herein is a battery thermal management system for maintaining the temperature of a battery pack in a hybrid vehicle below a maximum operating temperature threshold. The system comprises a battery pack having a plurality of electronically linked cells and a supply air diffuser having a pattern of openings therein for diffusing exhausted air at a substantially uniform flow throughout the battery pack. The system further comprises sensors for monitoring the temperature of at least a portion of the cells, a fan comprising an inlet through which air is drawn in and an outlet in communication with at least the supply air diffuser, for exhausting air into the first diffuser to lower the temperature of the battery pack, and an electronic control unit in communication with the sensors and the fan for controlling operation of the fan based on temperature signals received from the sensors to maintain the temperature of the battery pack below a maximum operating temperature. | 11-13-2008 |
Daniel R. Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20090074180 | METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE ARITHMETIC - A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use the information. The computations produce an incorrect result if the point is not on the elliptic curve. | 03-19-2009 |
Daniel R. Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20090323944 | METHOD OF PUBLIC KEY GENERATION - A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not it is rejected and a new key is generated. | 12-31-2009 |
Danny J. Brown, Ilderton CA
Patent application number | Description | Published |
---|---|---|
20080220668 | Marine Outdrive - A marine outdrive ( | 09-11-2008 |
Darren Earl Brown, Burnaby CA
Patent application number | Description | Published |
---|---|---|
20110071801 | METHOD AND APPARATUS FOR DISPLAYING A REPRESENTATION OF A TRAFFIC INTERSECTION - A method and apparatus for displaying a representation of a traffic intersection on a display of a computer is disclosed. The method involves receiving operator input defining a relative orientation between a first roadway and a second roadway, the first and second roadways forming an intersection area therebetween. The method also involves receiving an operator selection of a design vehicle that is expected to use the traffic intersection, the design vehicle being defined by a plurality of design vehicle parameters. The method further involves generating at least one turning path of the design vehicle through the intersection between the first roadway and the second roadway, and generating first vehicle extent locations associated with passage of the design vehicle along the at least one turning path. The method also involves generating an outer edge of the intersection area, the outer edge being generally aligned with selected ones of the first vehicle extent locations, and generating display signals for causing the computer display to display an image representing the traffic intersection. | 03-24-2011 |
20140032184 | PROCESS AND APPARATUS FOR GENERATING A THREE-DIMENSIONAL SWEPT ENVELOPE OF A VEHICLE - A method, apparatus, media and signals for generating a computer representation of a three-dimensional swept envelope of a vehicle having a wheeled chassis operable to support a vehicle body for movement along a terrain is disclosed. The method involves receiving terrain data representing a 3D terrain, receiving data defining parameters of the vehicle, and receiving data defining a path for movement of the vehicle from an initial position on the terrain to a displaced position on the terrain. The method also involves disposing a computer representation of the vehicle on the 3D representation of the terrain at successive locations along the path using the parameters. Disposing involves determining points of engagement between wheels of the wheeled chassis and the 3D representation of the terrain to dispose the chassis with respect to the terrain, and determining a corresponding 3D location of the vehicle body with respect to the terrain. The method further involves generating a plurality of spatial extents of the vehicle at the successive locations, the spatial extents defining the 3D swept envelope of the vehicle when moving between the initial position and the displaced position. In another aspect a method for generating a computer representation of a three-dimensional swept envelope of an object moving along a guideway disposed with respect to a 3D representation of a terrain is disclosed. | 01-30-2014 |
Dave Brown, Coquitlam CA
Patent application number | Description | Published |
---|---|---|
20080265061 | FUEL OIL ATOMIZER - There is provided a fuel oil atomizer comprised of an elongated outer member, an elongated inner member and an atomizing head. The inner member is a fuel supply conduit which coaxially received within the central opening of the outer member defining therebetween a generally annular atomizing fluid supply conduit. The atomizing head includes a fuel chamber, an atomizing fluid chamber and a mixing chamber. The fuel supply conduit communicates with the fuel chamber. The atomizing fluid supply conduit communicates with the atomizing fluid chamber. The fuel chamber has a first end and a second end. The atomizing fluid chamber is circumambient to the first end of the fuel chamber and the fuel chamber has a portion that extends axially from the atomizing fluid chamber. The mixing chamber is circumambient to the second end of the fuel chamber. | 10-30-2008 |
20080265062 | FUEL OIL ATOMIZER - There is provided a fuel oil atomizer comprised of an elongated outer member, an elongated inner member and an atomizing head. The inner member is a fuel supply conduit which is coaxially received within the central opening of the outer member defining therebetween a generally annular atomizing fluid supply conduit. The atomizing head includes a fuel chamber, an atomizing fluid chamber and a mixing chamber. The fuel supply conduit communicates with the fuel chamber. The atomizing fluid supply conduit communicates with the atomizing fluid chamber. The fuel chamber has a first end and a second end. The atomizing fluid chamber is circumambient to the first end of the fuel chamber and the fuel chamber has a portion that extends axially from the atomizing fluid chamber. The mixing chamber is circumambient to the second end of the fuel chamber. | 10-30-2008 |
David Alan Brown, Carp CA
Patent application number | Description | Published |
---|---|---|
20090128114 | POWER SUPPLY OUTPUT VOLTAGE TRIMMING - A power supply trim control signal is produced by integrating differences between monitored and target values of the output voltage of a power supply. Register storage requirements are reduced by producing the target value from a nominal voltage value and one of a plurality of margin offsets selected in accordance with control data. The control data also selects between open and closed loop trim control. Stability is enhanced by changing the target value slowly in response to any change in the control data. | 05-21-2009 |
David Andrew Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20120079123 | METHOD, SYSTEM AND APPARATUS FOR ENABLING ACCESS OF A FIRST MOBILE ELECTRONIC DEVICE TO AT LEAST ONE NETWORK ACCESSIBLE BY A SECOND MOBILE ELECTRONIC DEVICE - A method, system and apparatus for or automatically enabling access of a first mobile electronic device to at least one network accessible by a second mobile electronic device, the second mobile electronic device storing configuration data for accessing the at least one network. A communication session is automatically established between the first mobile electronic device and the second mobile electronic device via a local link. The configuration data is automatically received at the first mobile electronic device from the second mobile electronic device via the local link in response to establishing the communication session. The configuration data is automatically installed at the first mobile electronic device such that the at least one network is accessible by the first mobile electronic device using the configuration data. | 03-29-2012 |
20130013875 | METHOD AND SYSTEM FOR AUTOMATICALLY SAVING A FILE - Described herein are a method, system, and computer readable medium for automatically saving a file. A save score for the file is determined and compared against a save threshold. The save score is determined from a combination of autosave indicators indicative of whether to immediately autosave the file. Each of the autosave indicators that adjust the save score increases or decreases the likelihood that the file will be automatically saved. If the comparison indicates that the file should be automatically saved, the file is automatically saved; otherwise, the file is not automatically saved. The save score can take into consideration factors such as the number of dirty characters in the file and the time at which the file was last saved. Utilizing the save score reduces the number of saves performed when only immaterial changes have been made to the file, which helps preserve system resources such as battery life. | 01-10-2013 |
David Everton Brown, Cochrane CA
Patent application number | Description | Published |
---|---|---|
20100241610 | METHODS AND SYSTEMS FOR PRESERVING AND ACCESSING INFORMATION RELATED TO DECISION-MAKING - Exemplary embodiments provide integrated functionalities for data retrieval, encapsulation and visualization to facilitate a user in making a decision. Exemplary embodiments provide controls which correspond to actions that the user takes in making a decision. The user can use a control to access one or more data sources, send queries to the data sources, retrieve results of the queries, and automatically display the results on a display device. Exemplary embodiments also provide scenarios, each encapsulating a decision-making process. A scenario encapsulates and displays data sources and controls used in making a decision. | 09-23-2010 |
David Richard Brown, Burlington CA
Patent application number | Description | Published |
---|---|---|
20090257510 | System and Method for Programmable Pre-Amplification of a Signal - Systems and methods are provided for communicating a data signal. A data signal is transmitted along a communications line. The transmitted data signal is split among a plurality of routers, each router configured to receive the data signal and forward the data signal along one or more output data paths. The data signal is received at a destination, and flat-band amplification is provided to the received data signal via a selectable gain amplifier. A frequency dependent amplification is provided to the received data signal via an equalizer. The amplified received signal is then decoded. | 10-15-2009 |
Earl G. Brown, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20110070254 | MUTATIONS IN THE INFLUENZA A VIRUS NS1 GENE AND USE THEREOF - NS1 variant polypeptides, proteins or functional fragments thereof are described which have useful properties for increasing viral protein synthesis, IFN induction, and IFN resistance. The NS1 variant polypeptides, proteins or functional fragments comprise a substitution in the amino acid sequence of the wild type NS1 protein at a position corresponding to Asp-2, Val-23, Leu-98, Phe-103, Ser-103, Met-106, Met-124, Asp-125, Val-180, Val-226 or Arg-227, or combinations thereof expressed alone or in infectious virus. | 03-24-2011 |
Eric D. Brown, Oakville CA
Patent application number | Description | Published |
---|---|---|
20090075960 | Method of treating gaucher disease - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 03-19-2009 |
20120021487 | METHOD OF TREATING GAUCHER DISEASE - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 01-26-2012 |
20130090388 | METHOD OF TREATING GAUCHER DISEASE - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 04-11-2013 |
20130184352 | METHOD OF TREATING GAUCHER DISEASE - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 07-18-2013 |
20140088069 | NOVEL ANTIBACTERIAL COMBINATION THERAPY - An antibacterial composition is provided including a combination of a β-lactam antibiotic that has a binding affinity for bacterial penicillin-binding protein 2; and a non-antibiotic compound which may be a thienopyridine or a non-thienopyridine compound. A method of treatment using the composition is also provided. | 03-27-2014 |
20140235713 | METHOD OF TREATING LYSOSOMAL STORAGE DISORDERS - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 08-21-2014 |
20140249233 | METHOD FOR ENHANCING FOLDING AND TRANSPORT OF MISFOLDED GLUCOCEREBROSIDASE - Therapeutic compositions and methods for treatment of late-onset Gaucher disease are described herein. The compositions comprise compounds having activity as pharmacological chaperones for mutant forms of the beta-glucocerebrosidase. Methods of treatment involve providing therapeutically effective amounts of such compositions to subjects in need thereof. | 09-04-2014 |
Gary Brown, Chatham CA
Patent application number | Description | Published |
---|---|---|
20120059084 | Method and System for Treating Elastomers and Articles Made Therefrom - A method and system for treating rubber-containing elastomers to produce materials suitable for blending with thermoplastic or thermoset polymers are disclosed. The elastomers may comprise virgin or recycled particulate rubber such as from used tires. The blended rubber and polymer materials possess thermoplastic properties and can be reused many times. | 03-08-2012 |
Gary Alan Brown, Kelowna CA
Patent application number | Description | Published |
---|---|---|
20090303436 | Discoloration of sports and military items for vision training - Findings by sports optometrists conclude that sporting hand eye coordination is improved when high color contrast between figure and ground exist. Ground is defined as any and all possible background coloring. Figure herein refers to the prime sports objects; soccer balls, baseballs, footballs, bowling pins, handballs, lawn bowling posts, pucks, ringette rings, horseshoe pins, polo balls, golf balls, ping pong balls, badminton birds, hand balls, volleyballs, racquet balls and any military targets, that can be made available in discolored selections, including but not limited to; green, blue, white, two color combinations such as but not limited to; white and gray, red and white yellow and white. Military targets may be prepared in camouflage, or any colors expected to be replication of critical naturally anticipated backgrounds. Among these are the greens and browns of earth, blue and blue-green of sea, and various blues and cloud conditions of the sky and dark shades of night. High contrast improves visual performance and the accompanying hand eye or hand foot coordination needed in athletics leading to improved sport performance. It hence follows that practicing with discolored contrast, referred herein as specific discoloration of the prime sports object, and military targets, challenges the athlete to elevate visual competence and performance. Training the eyes to handle less agreeable colors by use of the method described improves the visual acuity and associated hand-eye or foot-eye coordination to raise athletic performance in contests and games and military performance in battle. | 12-10-2009 |
Geoffrey P. Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20100175461 | METHOD AND SYSTEM FOR MONITORING GAS LEAKS BY AMPLIFICATION OF FLOW - A method to amplify the pressure effects of very small flows, or very small leaks, in contained fluid systems, and the effects of small leaks in fluid systems that have small flows such as would occur in a combustible gas system with lighted pilot lights or a contained water system with a drip watering system, while not affecting the normal operation of such fluid systems, and without interfering with the function of such small flows. | 07-15-2010 |
20110247703 | DIFFERENTIAL FLOW SIGNAL AMPLIFICATION - A means to amplify the pressure effects of very small flows, or very small leaks, in contained fluid systems using pressure sensors in differential flow measurement devices. A ball valve in the passageway to the sensor static port achieves a small delay. | 10-13-2011 |
20110248855 | METHOD AND SYSTEM FOR ANALYZING VARIATIONS IN MONITORED GAS FLOW USING FLOW SIGNAL ANALYSIS AND AMPLIFICATION - A signal analysis method to enable flow and leak detection devices to accurately detect and amplify the signal from a flow measurement means detecting the pressure effects of very small leaks in contained fluid systems, and leaks in fluid systems that have small flows, where the raw signal is an order of magnitude less than the random pressure fluctuations in the contained system, and is an order of magnitude less than the effects of temperature and manufacturer's variations in the sensing device and the components used in the manufacture of the flow detection device. The method involves windowing the signal in a small section of the range of the sensor, then periodically re-centering the signal. | 10-13-2011 |
Graham T. Brown, Sarnia CA
Patent application number | Description | Published |
---|---|---|
20090200797 | PIPE FITTING AND PIPE COUPLING ASSEMBLY EMPLOYING SUCH FITTING - A fitting for fixedly attaching to pipes and the like includes an inner and outer ring being coaxially provided over a pipe. The inner and outer rings are preferably connected by means of a ratchet mechanism allowing for one way advancement there-between. Advancement of the outer ring over the inner ring radially compresses the latter thereby resulting in swaging of the pipe. The radial compression of the pipe results in the fitting being locked in place and prevents axial movement between the fitting and the pipe. Various apparatus are provided for advancing the outer ring over the inner ring. Coupling assemblies are provided utilizing the fittings for forming joints between abutting pipes. | 08-13-2009 |
20110204052 | INTERNAL RESTRAINT DEVICE - A restraint or gripping device for anchoring within the interior of a pipe comprises a pair of end plates adapted to be urged towards each other and a plurality of shoes, positioned between the end plates, and adapted to be moved radially outwardly as the end plates are urged together. In a further aspect, a method of restraining a pipe plug or isolation tool is provided. Also provided are assemblies for pipe isolation including an integral restraint or gripping mechanism. | 08-25-2011 |
20140299327 | APPARATUS AND METHOD FOR ISOLATING A SECTION OF A PIPE RISER BORE IN THE COURSE OF RISER RENEWAL - The isolation tool works at depth in the bore of a pipe whose upper end is to be severed and replaced. The tool isolates the lower pipe bore from the upper bore so that flammable downhole fluid is prevented from reaching a welding site along the pipe wall. The tool incorporates: means for establishing a pair of axially spaced apart annular seals engaging the pipe inner surface; means for venting downhole fluid to ground surface. The tool is primarily mechanical in nature. It finds use in connection with off-shore platform riser renewal operations. | 10-09-2014 |
Grant Perry Brown, Red Deer CA
Patent application number | Description | Published |
---|---|---|
20120034049 | RATCHET FIT FASTENER - A ratchet mounting fastener includes a rigid body having a socket drive receiving cavity formed in a first end for receiving a male socket drive shaft into snug mating engagement and releasable locking means to releasably lock the fastener onto the drive shaft, and having a threaded portion on an opposite second end for threaded mating engagement of the threaded portion with a threaded second fastener, the cavity and the threaded portion are oppositely disposed for mounting of the drive shaft to the cavity and mounting of the second fastener to the threaded portion from opposed facing opposite directions. | 02-09-2012 |
Hans-Frederick Brown, Montreal CA
Patent application number | Description | Published |
---|---|---|
20100269041 | DYNAMIC MACRO CREATION USING HISTORY OF OPERATIONS - A computer implemented method, apparatus, and computer readable storage medium provide the ability to perform a series of steps in a graphics drawing application. A drawing is opened and a series of two or more drawing operations is performed. Subsequent to the performing, the series of the two or more drawing operations is displayed in a history list of drawing operations. An arbitrary subset of the two or more drawing operations is selected from anywhere in the history list. The selecting provides for the recording of the arbitrary selected subset. The recorded arbitrary subset of drawing operations is dynamically performed. | 10-21-2010 |
20120086719 | EXPANDABLE GRAPHICAL AFFORDANCES - A method, apparatus, system, article of manufacture, and computer readable storage medium provide the ability to create and edit a surface object in a computer implemented surface modeler. A surface object creation process is commenced and a surface object type is selected. During the surface object creation process, visual affordances are presented. The visual affordances are grips that can be used to inject modification into the surface object creation process. Subsequent to creation of the surface object, the same visual affordances are displayed and used to edit the surface object. | 04-12-2012 |
20120089374 | PASSIVE ASSOCIATIVITY IN THREE-DIMENSIONAL (3D) MODELING - A method, system, apparatus, article of manufacture, and computer-readable storage medium provide the ability to edit surface objects in a surface modeler. A dependent surface object (that is dependent on one or more input objects) having one or more properties is obtained. First user input is received that indicates that a surface associativity for the dependent surface object is off. In response to the receiving, an association between the dependent surface object and the one or more input objects is maintained. The association is used to expose the one or more properties of the dependent surface object. The properties are then displayed for editing by the user. | 04-12-2012 |
20120262458 | TRANSFORM MANIPULATOR CONTROL - A method, apparatus, system, article of manufacture, and computer readable storage device provides the ability to manipulate an object in a three-dimensional (3D) modeling system. A first object is displayed and then selected in the 3D modeling system. In response to the selecting, a transform manipulator is displayed displaying coincident with the first object. The transform manipulator includes a two-dimensional (2D) control plane object and grips located on the 2D control plane object. One of the grips is activated and used to manipulate the first object. | 10-18-2012 |
20130016126 | DRAWING AID SYSTEM FOR MULTI-TOUCH DEVICESAANM Wang; TaoAACI ShanghaiAACO CNAAGP Wang; Tao Shanghai CNAANM Brown; Hans-FrederickAACI MontrealAACO CAAAGP Brown; Hans-Frederick Montreal CA - A method, apparatus, system, and computer program product/article of manufacture provide the ability to enable and use a tool implement on a multi-touch device. The tool implements may be activated and deactivated using the borders of touch-sensitive region of a multi-touch device. The tool implement can be positioned in the display area (e.g., by dragging grips of the tool) and then used (in combination with a touch gesture to perform an operation. The tool implement may be a drawing aid tool that is used to remap a user's stroke gesture to a defined stroke that is displayed. | 01-17-2013 |
Ian E. Brown, Kingston CA
Patent application number | Description | Published |
---|---|---|
20080304935 | Robotic exoskeleton for limb movement - This invention relates to a robotic exoskeleton comprising mechanical linkages that couple to one or more selected joints of a limb of a subject. The robotic exoskeleton may be provided with means for obtaining data respecting angular position, torque, and/or acceleration of at least one of the joints or the links of the mechanical linkages, and may be used for assessing, studying, diagnosing a deficit, and/or treating an impairment in sensorimotor function of a limb of a subject. | 12-11-2008 |
20120038629 | System and Method for Integrating Gaze Tracking with Virtual Reality or Augmented Reality - This invention relates to gaze tracking methods and systems integrated with virtual reality (VR) or augmented reality (AR). A system may include one or more cameras for capturing images of a subject's eyes, a display device for displaying a VR or AR image, a first reflecting surface associated with the display device for at least partially reflecting light from the eyes to the one or more cameras and for transmitting the VR or AR image; and a second reflecting surface for at least partially reflecting light from the eyes to the one or more cameras and for receiving the VR or AR image and rendering the VR or AR image to the subject as at least one component of a VR or AR environment. The methods and systems described herein may be used in research, medical, industrial, aerospace, and entertainment applications. | 02-16-2012 |
20130158438 | Robotic Exoskeleton for Limb Movement - This invention relates to a robotic exoskeleton comprising mechanical linkages that couple to one or more selected joints of a limb of a subject. The robotic exoskeleton may be provided with means for obtaining data respecting angular position, torque, and/or acceleration of at least one of the joints or the links of the mechanical linkages, and may be used for assessing, studying, diagnosing a deficit, and/or treating an impairment in sensorimotor function of a limb of a subject. | 06-20-2013 |
Jeremy Brown, Halifax CA
Patent application number | Description | Published |
---|---|---|
20090108710 | High Frequency Piezocomposite And Methods For Manufacturing Same - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 04-30-2009 |
20110273059 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 11-10-2011 |
20120016243 | HIGH-FREQUENCY ULTRASOUND IMAGING SYSTEM - A high frequency ultrasound analog beamformer comprises a linear array of surface acoustic wave (SAW) devices formed on a single crystal piezoelectric substrate, such as a PMN-PT single crystal piezoelectric substrate. Each SAW device comprises ultrasound input and output electrode structures separated by a variable delay structure. The beamformer further comprises a delay controller operably connected to each variable delay structure to control the delay of each SAW device to dynamically focus signals received at each input electrode. | 01-19-2012 |
20120296215 | Ultrasound Imaging System Using Beamforming Techniques for Phase Coherence Grating Lobe Suppression - High-frequency ultrasound imaging can be performed with greater quality and suppressed grating lobes by using methods and systems for effectively reducing the temporal length of transmit grating lobe signals in received ultrasound echoes. Systems and methods are provided for improved high-frequency ultrasound imaging. In various aspects, the method of shortening the time domain of grating lobe signals comprises splitting an array of N transmit elements into K sub-apertures. In further aspects, the grating lobes are suppressed by performing signal processing of the shortened grating lobe signals. In certain aspects, the signal processing method comprises weighting the samples by a calculated phase coherence factor. | 11-22-2012 |
20130193805 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 08-01-2013 |
20140354113 | HIGH FREQUENCY PIEZOCOMPOSITE AND METHODS FOR MANUFACTURING SAME - A transducer with triangular cross-sectional shaped pillars is described for suppressing lateral modes within a composite, and a method for producing the same. According to one aspect of the present application, a plurality of triangular cross-sectional shaped pillars extends outwardly from a substrate and form an array of pillars. The resulting array of pillars is configured to suppress the lateral modes of the transducer at higher operating frequencies, such as, at or above 15 MHz, at or above 20 MHz, or at or above 30 MHz. | 12-04-2014 |
Jessica M. Brown, Edmonton CA
Patent application number | Description | Published |
---|---|---|
20090042301 | TEMPERATURE REGULATED GENE EXPRESSION - A method for regulation of gene expression by variation of temperature uses a riboswitch. The riboswitch includes a 5′-UTR construct of crhC which alters its secondary structure in response to temperature, resulting in a more stable transcript at lower temperatures, permitting translation. At higher temperatures, the transcript is destabilized and functionally inactive. The 5′-UTR construct of crhC may be operatively linked to a promoter and a gene and administered to cells with an expression vector. | 02-12-2009 |
Josh C. Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20090197686 | SYSTEM AND METHOD FOR DRIVING ARTIFICIAL INTELLIGENCE (AI) CHARACTERS HAVING CONTINUOUS REEVALUATION OF CURRENT GOALS AND HAVING NAVIGATION PATH - A method for driving an artificial intelligence (AI) character involving computing a navigational graph for a virtual environment and moving the AI character along a current path for an AI character from a current location to a current destination is disclosed. While moving the AI character along the current path the potential alternative destinations are continuously evaluated and a new destination or the current destination based upon a heuristic analysis of the alternative destinations and the current destination. The system also continuously determines whether the AI character can leave the current path. | 08-06-2009 |
Keddie Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20110063607 | Sample holder for dynamic light scattering - There is described a sample holder and associated fluid container assembly for optical analysis of a fluid sample within a translucent container of the fluid container assembly. The sample holder includes clamping members rotatably mounted to a frame for rotation, about parallel axes spaced apart from each other, between a container accepting position in which the clamping members are spaced apart from the translucent container, and an analysis position in the clamping members abut the translucent container. The clamping members each define an optical waveguide slot extending therethrough that is substantially aligned with the translucent container when the clamping members are disposed in the analysis position, to thereby provide optical access to the translucent container for optical analysis of the fluid sample therein. | 03-17-2011 |
Kimberly Brown, Elk Grove CA
Patent application number | Description | Published |
---|---|---|
20100192260 | Polypeptides having alpha-glucosidase activity and polynucleotides encoding same - The present invention relates to isolated polypeptides having alpha-glucosidase activity and isolated polynucleotides encoding the polypeptides. The invention also relates to nucleic acid constructs, vectors, and host cells comprising the polynucleotides as well as methods for producing and using the polypeptides. | 07-29-2010 |
Loch T. Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20110064388 | User Customized Animated Video and Method For Making the Same - A customized animation video system and method generate a customized or personalized animated video using user input where the customized animated video is rendered in a near immediate timeframe (for example, in less than 10 minutes). The customized animation video system and method of the present invention enable seamless integration of an animated representation of a subject or other custom object into the animated video. That is, the system and method of the present invention enable the generation of an animated representation of a subject that can be viewed from any desired perspective in the animated video without the use of multiple photographs or other 2D depictions of the subject. Furthermore, the system and method of the present invention enables the generation of an animated representation of a subject that is in the same graphic style as the rest of the animated video. | 03-17-2011 |
Martin Brown, Victoria CA
Patent application number | Description | Published |
---|---|---|
20080290687 | METHOD FOR INSTALLING A GLASS WINDOW IN A FOLDING OR REMOVABLE SOFT AUTOMOBILE TOP - A method of attaching a glass window to an auto soft top by positioning a ring around a window opening in the soft top and wrapping an edge of the window opening around at least a portion of the ring. An adhesive is positioned between the edge portion of the ring and the soft top and the glass window is positioned over the ring and secured thereto by an adhesive. | 11-27-2008 |
20130057017 | Convertible top - A convertible top having a glass window attached to the top by positioning a ring around a window opening in the soft top and wrapping an edge of the window opening around at least a portion of the ring. An adhesive is positioned between the edge portion of the ring and the soft top and the glass window is positioned over the ring and secured thereto by an adhesive. | 03-07-2013 |
Martyn Brown, Scarborough CA
Patent application number | Description | Published |
---|---|---|
20110281887 | COMPOUNDS AND METHOD FOR TREATMENT OF CANCER - The present invention is directed to methods of use of a compound of Formula I: | 11-17-2011 |
20120077820 | COMPOUNDS AND METHOD FOR TREATMENT OF CANCER - The present invention is directed to methods of use of a compound of Formula I: | 03-29-2012 |
20130165449 | Compounds and Method for Treatment of Cancer - The present invention is directed to methods of use of a compound of Formula I: | 06-27-2013 |
Martyn Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20090298855 | Protein Tyrosine Kinase Inhibitors - The present invention relates to compounds of the Formula I, the pharmaceutically acceptable salts and stereoisomers thereof, which inhibit, regulate and/or modulate tyrosine kinase signal transduction, compositions which contain these compounds, and methods of using them to treat tyrosine kinase-dependent diseases and conditions in mammals: | 12-03-2009 |
Martyn A. Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20100056811 | Synthesis of Hexahydrodibenzopyranones - An improved process is provided for the synthesis of hexahydrodibenzo[b,d]pyran-9-ones, such as nabilone. | 03-04-2010 |
Matthew Douglas Brown, Kinburn CA
Patent application number | Description | Published |
---|---|---|
20090121790 | System and method for signal level detection - An electronic signal level detection system and method are provided. The method receives an analog input signal having a variable voltage and compares the input signal voltage to a threshold. A detection signal is generated for input signal voltages exceeding the threshold in a periodic first time frame. In a second periodic time frame (following the first time frame), a count is updated in response to the generated detection signals. The count is used to create a metric representative of the difference between the input signal voltage and the threshold. The count is incremented in response to the generating a detection signal (“1”) in the first time frame, and decremented in response to not generating a detection signal (“0”) in the first time frame. | 05-14-2009 |
20100156635 | Signal Level Detection Method - An electronic signal level detection system and method are provided. The method receives an analog input signal having a variable voltage and compares the input signal voltage to a threshold. A detection signal is generated for input signal voltages exceeding the threshold in a periodic first time frame. In a second periodic time frame (following the first time frame), a count is updated in response to the generated detection signals. The count is used to create a metric representative of the difference between the input signal voltage and the threshold. The count is incremented in response to the generating a detection signal (“1”) in the first time frame, and decremented in response to not generating a detection signal (“0”) in the first time frame. | 06-24-2010 |
Michael J. Brown, Kitchener CA
Patent application number | Description | Published |
---|---|---|
20090058586 | METHOD AND APPARATUS FOR MOUNTING A CIRCUIT BOARD TO A TRANSFORMER - An electromagnetic assembly which has a base, at least one winding, and a magnetic core connected to the base, where at least one winding is mounted on the magnetic core. A housing part encloses at least part of at least one winding, and a printed circuit board is mounted to the housing part. The electromagnetic assembly can be a transformer or inductor, for example. | 03-05-2009 |
Michael James Brown, West Vancouver CA
Patent application number | Description | Published |
---|---|---|
20090290848 | Method and System for Generating a Replay Video - A plurality of cameras are controlled to follow a common moving target in a three dimensional environment such that each camera generates a video feed comprising a plurality of video segments captured sequentially. Each video segment comprises a static image of the target at a respective point in time. A resulting video is generated by selecting a sequence of video segments which may include video segments from different cameras and at the same or different points in time to create various video effects. The recorded video segments are categorized for later recall according to camera identification and point in time to allow for instantaneous recall for producing video replays from a variety of camera angles during a live event. Auxiliary video segments can be computer generated for insertion between video segments captured by the cameras for smoothing the appearance of the resulting video. | 11-26-2009 |
Michael K. Brown, Ontario CA
Patent application number | Description | Published |
---|---|---|
20090220084 | SYSTEM AND METHOD FOR DYNAMICALLY UPDATING MESSAGE LIST INDICATORS - Systems and methods for processing messages within a wireless communications system are disclosed. At least part of an encrypted message is received at a device for which it is intended. A security indicator on the device indicates that a message is encrypted. The message is decrypted, and it is determined whether the decrypted message includes a logical attachment. If there is such a logical attachment, an attachment indicator on the device indicates that the encrypted message includes an attachment associated with the message independent of the encryption attachment itself. The indicators may be updated via direct user action, or transparently and free from direct user input to said device. | 09-03-2009 |
Michael K. Brown, Peterborough CA
Patent application number | Description | Published |
---|---|---|
20090234931 | System and Method for Selecting Messaging Settings On A Messaging Client - A system and method of selecting messaging settings on a messaging client are provided. A data store configured to operate in conjunction with the messaging client stores records comprising messaging settings or characteristics for previously received and/or sent messages. The messaging client is configured to send outgoing messages, each of the messages having message characteristics, to determine whether a record for an addressed recipient of an outgoing message exists in the data store, and to select messaging settings to control the message characteristics of the outgoing message based on the record where a record exists. | 09-17-2009 |
20100104102 | Systems and Methods to Securely Generate Shared Keys - A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key. | 04-29-2010 |
20100146270 | System and Method of Indicating the Strength of Encryption - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message. | 06-10-2010 |
20100235628 | System and Method for Accessing Keys for Secure Messaging - Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user. | 09-16-2010 |
20100284536 | SYSTEM AND METHOD FOR OBTAINING CERTIFICATE STATUS OF SUBKEYS - Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced. | 11-11-2010 |
20110126013 | Systems and Methods to Securely Generate Shared Keys - A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key. | 05-26-2011 |
20120159164 | MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device. | 06-21-2012 |
20120257746 | Systems and Methods to Securely Generate Shared Keys - A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated based upon a shared secret. First and second public keys are sent to a second system, and third and fourth public keys are received from the second system. The fourth public key is generated based upon the shared secret. A master key for encrypting messages is calculated based upon a first private key, a second private key, the third public key and the fourth public key. For re-keying, a new second key pair having a new second public key and a new second private key is generated, and a new fourth public key is received. A new master key is calculated using elliptic curve calculations using the new second private key and the new fourth public key. | 10-11-2012 |
Michael Kenneth Brown, Kitchener CA
Patent application number | Description | Published |
---|---|---|
20100121725 | METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein. | 05-13-2010 |
20100217998 | System and Method for Managing Secure Registration of a Mobile Communications Device - In one embodiment, a method is provided for managing secure registration of a mobile communications device, the method comprising registering, at a network node, the mobile communications device using a first registration process, the first registration process requiring an authentication key associated with the mobile communications device; processing a request from the mobile communications device, the request including an indication that the mobile communications device is changing to a second registration process; and clearing the authentication key associated with the mobile communications device upon expiration of a time window. | 08-26-2010 |
20110211530 | System and Method for Securing a Personalized Indicium Assigned to a Mobile Communications Device - In one embodiment, a method operable on a mobile communications device is disclosed, the method comprising generating an authentication key for securing a personalized indicium assigned to the mobile communications device, wherein the personalized indicium comprises a Personal Information Number (PIN) that is mapped to at least one identifier associated with the mobile communications device; transmitting a registration request to a network node operable with a wireless network, the registration request having a registration request payload including the authentication key; receiving a challenge message from the network node, the challenge message generated when the network node detects a change of the IP address associated with the mobile communications device, and responsive to receiving the challenge message, executing a challenge response including an authentication value of a challenge string transmitted in the challenge message, wherein the authentication value is created using the authentication key. | 09-01-2011 |
20120310835 | METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein. | 12-06-2012 |
20140114858 | METHOD AND APPARATUS FOR CONTACTLESS PAYMENT AUTHENTICATION - The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein. | 04-24-2014 |
Michael Kenneth Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20090313705 | SECURITY MEASURES FOR COUNTERING UNAUTHORIZED DECRYPTION - After a predetermined limit for decryption attempts has been exceeded by a user attempting to decrypt an encrypted electronic message or attempting to decrypt a encrypted electronic certificate associated with an electronic message, access to the electronic message may be restricted. | 12-17-2009 |
20120159592 | MULTI-LAYERED COLOR-SENSITIVE PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and selection of a color for a portion of the display that matches a pre-selected color. | 06-21-2012 |
20120159593 | MULTI-LAYER ORIENTATION-CHANGING PASSWORD - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and the change in orientation matching a pre-selected orientation criterion. | 06-21-2012 |
20120159594 | ADJUSTING THE POSITION OF AN ENDPOINT REFERENCE FOR INCREASING SECURITY DURING DEVICE LOG-ON - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and with each execution of the method, at least one of a position of a pre-selected base image reference point on the modified base image and a position of a pre-selected overlay image reference point on the modified overlay image is varied. Positive authentication is indicated in response to an input resulting in the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image. | 06-21-2012 |
20120159608 | PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, at least one of the base image reference point and the overlay image reference point having coordinates in three dimensions. | 06-21-2012 |
20120159609 | PASSWORD ENTRY USING MOVING IMAGES - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method, an authentication video is displayed on a display. In response to receiving an input at a point in time in the video that matches a pre-selected time reference point, positive authentication is indicated. | 06-21-2012 |
20120159613 | MULTI-LAYER MULTI-POINT OR RANDOMIZED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point. | 06-21-2012 |
20120159614 | SIMPLE ALGEBRAIC AND MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. The modified overlay image comprises a plurality of numbers. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, in sequence, with two or more numbers from the overlay image that equal a pre-selected algebraic result when one or more algebraic operator is apply to the numbers. | 06-21-2012 |
20120159615 | MULTI-LAYER MULTI-POINT OR PATHWAY-BASED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after moving through at least one other pre-selected reference point. | 06-21-2012 |
20120159616 | PRESSURE SENSITIVE MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with a computer readable medium and a computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. Positive authentication is indicated in response to alignment of a base image reference point and an overlay image reference point and an indication of a correct level of pressure applied to a pressure sensitive input device. | 06-21-2012 |
20130254437 | System and Method for Handling Peripheral Connections to Mobile Devices - Systems and methods for establishing a data connection between a mobile device and a peripheral. The mobile device is configured to determine whether to handle user approval of the data connection between the mobile device and the peripheral. Through the mobile device, an input mechanism is provided for the user to provide input. The input is used in determining whether to approve the data connection between the mobile device and the peripheral. | 09-26-2013 |
20130288646 | SYSTEM AND METHOD FOR HANDLING MESSAGE RECEIPT NOTIFICATION - Systems and methods for operation upon a wireless mobile device to handle message notifications. A method can include receiving a message by the wireless mobile device over a wireless communications network. The received message is processed so that at least a portion of the sender's message is displayed to a user of the wireless mobile device before a signed receipt is provided to the sender. | 10-31-2013 |
20130305180 | Device And Method For Improving Efficiency Of Entering A Password Using A Key-Limited Keyboard - A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices: and computer readable medium for implementing the method arc also provided. | 11-14-2013 |
20140359274 | SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security. | 12-04-2014 |
20140373155 | SYSTEM AND METHOD FOR CONTROLLING APPLICATIONS TO MITIGATE THE EFFECTS OF MALICIOUS SOFTWARE - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 12-18-2014 |
Michael Kenneth Brown, Fergus CA
Patent application number | Description | Published |
---|---|---|
20090221267 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 09-03-2009 |
20100328110 | METHOD OF GENERATING AND PROVIDING A PASSWORD TO A HANDHELD ELECTRONIC DEVICE - A method of providing a password to a handheld electronic device having a reduced keyboard and a non-predictive keystroke interpretation system, wherein the reduced keyboard is of a particular keyboard type and the non-predictive keystroke interpretation system is of a particular system type. The method includes receiving a first character string in an electronic device, such as, without limitation, a PC, that is separate from the handheld electronic device, generating one or more second character strings in the electronic device based on the particular keyboard type, the first character string, and, possibly, the particular system type, and transmitting the one or more second character strings from the electronic device to the handheld electronic device as the password. | 12-30-2010 |
20110103588 | Key Agreement and Re-keying over a Bidirectional Communication Path - A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key. | 05-05-2011 |
20110214184 | System and method for controlling applications to mitigate the effects of malicious software - Methods and systems for mitigating the effects of a malicious software application are disclosed. A dedicated module on the computing device receives from a malicious software detector a message indicating whether the application is malicious or has a malicious component. The dedicated module obtains a set of permissions to be granted to the application, and instructs software on the computing device that controls the permissions of the application to grant the set of permissions. | 09-01-2011 |
20120063599 | Key Agreement and Re-keying over a Bidirectional Communication Path - A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key. | 03-15-2012 |
20120079110 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device. | 03-29-2012 |
20120079586 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer. | 03-29-2012 |
20120079609 | METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE - A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device. | 03-29-2012 |
20120294440 | Key Agreement and Re-keying over a Bidirectional Communication Path - A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second public key generated by the second system, and calculating a master key based upon the first private key, the second public key, a long-term private key, and a long-term public key. The long-term private key was generated by the first system during a previous key-agreement method as part of a long-term key pair. The long-term public key was generated by the second system and received during the previous key-agreement method. The previous key-agreement method required a secret to be known to the first system and the second system, thus conferring authentication based on the secret to the long-term public key. | 11-22-2012 |
20130067009 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 03-14-2013 |
20130093596 | NOTIFICATION OF ACCESS CONTROL REQUEST AND EXPLANATION INDICATIVE OF THE ACCESS CONTROL REQUEST ON A COMMUNICATION DEVICE - A communication device includes a display screen upon which information is displayed. A microprocessor configured to execute at least one notification program is provided that displays a notification descriptive of an access control request on the display screen. The at least one notification program is programmed to receive data indicative of an access control request and to receive data descriptive of the access control request. Additionally, the at least one notification program is further programmed to display a notification indicative of the access control request and comprising an explanation of the access control request based on the received descriptive data. | 04-18-2013 |
20130133065 | SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTION - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message. | 05-23-2013 |
20130145480 | E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request. | 06-06-2013 |
20130167194 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A device comprising a processor is disclosed herein. In one broad aspect, the processor is configured to: determine whether a general message encoding configuration setting at the device is set to a first setting indicating that when a security encoding is to be applied to a message, the security encoding is to be established by a policy engine, wherein the established security encoding cannot be overridden by a security encoding selection algorithm at the device; and if the general message encoding configuration setting is set to the first setting, transmit the message to at least one message recipient via the policy engine such that the policy engine applies the security encoding to the message prior to the policy engine transmitting the message. | 06-27-2013 |
20130167247 | SELECTIVELY WIPING A REMOTE DEVICE - A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level. | 06-27-2013 |
20130198508 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 08-01-2013 |
20130227360 | Method and Apparatus for Providing Intelligent Error Messaging - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. | 08-29-2013 |
20130232334 | SYSTEM AND METHOD FOR OBTAINING CERTIFICATE STATUS OF SUBKEYS - Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced. | 09-05-2013 |
20130239225 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device. | 09-12-2013 |
20130246549 | SYSTEM AND METHOD FOR SELECTING MESSAGING SETTINGS ON A MESSAGING CLIENT - A system and method of selecting messaging settings on a messaging client are provided. A display configured to operate in conjunction with the messaging client displays a compose screen that includes a message portion and a messaging settings portion when an outgoing message is to be composed on the messaging client. Messaging settings selected to control message characteristics of the outgoing message are displayed in the messaging settings portion of the compose screen. | 09-19-2013 |
20130247143 | SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 09-19-2013 |
20130254528 | SECURE MESSAGE HANDLING ON A MOBILE DEVICE - Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size. | 09-26-2013 |
20130268607 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 10-10-2013 |
20130283049 | METHOD AND DEVICES FOR PROVIDING SECURE DATA BACKUP FROM A MOBILE COMMUNICATION DEVICE TO AN EXTERNAL COMPUTING DEVICE - A method and devices for providing secure data backup from a mobile communication device to an external computing device is described. In one embodiment, there is provided a method of backing up data from a mobile communication device to an external computing device, the mobile communication device being in communication with the external computing device, the method includes: receiving a request to backup one or more data items stored on the mobile communication device; encrypting a data item using an encryption key stored in a protected memory of the mobile communication device; and transferring the encrypted data item to the external computing device for storage by the external computing device. A method of restoring backup data to a mobile communication device from an external computing device is also provided, as are mobile communication devices and computing devices configured for implementing the backup and restore operations. | 10-24-2013 |
20130318344 | SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers. | 11-28-2013 |
20140027508 | Controlling Connectivity of a Wireless-Enabled Peripheral Device - A system includes a wireless-enabled peripheral device configured to be coupled to a personalized security device. The wireless-enabled peripheral device has a wireless communication interface. The system also includes a mobile device configured to establish a wireless connection with the wireless-enabled peripheral device via the wireless communication interface. Upon establishment of the wireless connection, the mobile device is further configured to control establishment of at least one contemporaneous connection of the wireless-enabled peripheral device to one or more other devices attempting to access the personalized security device. | 01-30-2014 |
20140059342 | System and Method of Accessing Keys for Secure Messaging - Methods and systems for handling on an electronic device a secure message to be sent to a recipient. Data is accessed about a security key associated with the recipient. The received data is used to perform a validity check related to sending a secure message to the recipient. The validity check may uncover an issue that exists with sending a secure message to the recipient. A reason is determined for the validity check issue and is provided to the mobile device's user. | 02-27-2014 |
20140115665 | MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device. | 04-24-2014 |
20140237246 | Generating a Symmetric Key to Secure a Communication Link - A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed to create a hash result; the first symmetric key, the second symmetric key and the hash result are hashed to generate a third symmetric key to be used to secure the communication link. | 08-21-2014 |
20140351599 | SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS - Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like. | 11-27-2014 |
20140380045 | SYSTEM AND METHOD FOR WIPING AND DISABLING A REMOVED DEVICE - A system and method implemented at a server system, for securely wiping a remote mobile device after the device registration has been removed from the server system. Prior to removal of the device registration from the server system, a “pre-packaged” command is created and stored at the server system. In the event that it is determined, after removal of the registration, that the device should be wiped or disabled, means are provided for an administrator to issue the previously stored command to the target mobile device. | 12-25-2014 |
20150016612 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 01-15-2015 |
20150033329 | PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT - A method of controlling access to an electronic device is disclosed. The method comprises: generating a modified first image from a first image, wherein the first image and the modified first image include a first image reference point; generating a modified second image from a second image, wherein the second image and the modified second image include a second image reference point; displaying a three dimensional representation of the modified first image overlaid by the modified second image; authenticating access to the electronic device in response to substantial alignment of the first image reference point in the modified first image with the second image reference point in the modified second image. | 01-29-2015 |
Michael N. Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20090205354 | FROSTING DEHUMIDIFIER WITH ENHANCED DEFROST - A dehumidifier apparatus comprises a housing having an air inlet for receiving incoming air, an air outlet spaced therefrom for allowing the air to exit from the housing, the housing being configured to provide an interior air passageway connecting the air inlet to the air outlet; an air mover mounted within the air passageway for moving the air through the air passageway from the air inlet to the air outlet; a compressor mounted in the housing for compressing a refrigerant; an evaporator located within the air passageway for evaporating the refrigerant during a dehumidifying cycle, and thereby cooling air flowing through the evaporator and causing water in the air to condense on a surface of the evaporator; a condenser for condensing the refrigerant during the dehumidifier cycle, the condenser being located in the air passageway downstream of the evaporator in series with the evaporator; refrigerant flow lines configured to allow for a flow of the refrigerant between the compressor, the condenser, and the evaporator; and a defrosting cycle system for performing a defrosting cycle during a frosting condition of the evaporator, wherein during the defrosting cycle the flow of the refrigerant is reversed, causing the evaporator to condense the refrigerant and the condenser to evaporate the refrigerant. The compressor and the air mover are configured to run continuously during the dehumidifying cycle and the defrosting cycle. | 08-20-2009 |
Michael Stephen Brown, Waterloo CA
Patent application number | Description | Published |
---|---|---|
20090279392 | ELECTRONIC DEVICE AND METHOD PROVIDING IMPROVED INDICATION THAT AN ALARM CLOCK IS IN AN ON CONDITION - An improved electronic device and method provide an improved clock feature having an alarm clock function that advantageously provides an indication to a user that the alarm is set, i.e., is in an ON condition, by outputting the alarm time itself. | 11-12-2009 |
20120079005 | METHOD, APPARATUS AND SYSTEM FOR CONTROLLING TRANSMISSION OF AN ATTACHMENT TO AN EMAIL USING A PLURALITY OF COMPUTERS - A method, apparatus and system for controlling transmission of an attachment to an email using a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser, specifically e-mail functionality and control of transmission of attachments. Further, updates on attachment download at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120147246 | Methods And Apparatus For Use In Enabling An Efficient Review Of Photographic Images Which May Contain Irregularities - Techniques for use in an electronic device which includes a camera module for producing photographic images are described. An input request for capturing a photographic image is detected via a user interface of the electronic device. In response to detecting the input request, a photographic image is captured via the camera lens using the camera module, and the captured photographic image is produced in a visual display. In addition, a zoomed-in portion of the image is produced in the visual display, simultaneously with the display of the image. The zoomed-in portion of the image may be a picture-in-picture (PIP) window or virtual magnifying glass window overlaid with the image, for example. The image may include a blur characteristic which is only visually apparent from the zoomed-in portion of the image, in which case the image may be manually deleted by the user so that another photographic image may be captured. | 06-14-2012 |
20130013875 | METHOD AND SYSTEM FOR AUTOMATICALLY SAVING A FILE - Described herein are a method, system, and computer readable medium for automatically saving a file. A save score for the file is determined and compared against a save threshold. The save score is determined from a combination of autosave indicators indicative of whether to immediately autosave the file. Each of the autosave indicators that adjust the save score increases or decreases the likelihood that the file will be automatically saved. If the comparison indicates that the file should be automatically saved, the file is automatically saved; otherwise, the file is not automatically saved. The save score can take into consideration factors such as the number of dirty characters in the file and the time at which the file was last saved. Utilizing the save score reduces the number of saves performed when only immaterial changes have been made to the file, which helps preserve system resources such as battery life. | 01-10-2013 |
20130246794 | SYSTEMS, DEVICES, AND METHODS FOR SECURELY TRANSMITTING A SECURITY PARAMETER TO A COMPUTING DEVICE - Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an audio signal. The audio signal is transmitted from the first computing device to the second computing device. The password is determined from the audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein. | 09-19-2013 |
20130288646 | SYSTEM AND METHOD FOR HANDLING MESSAGE RECEIPT NOTIFICATION - Systems and methods for operation upon a wireless mobile device to handle message notifications. A method can include receiving a message by the wireless mobile device over a wireless communications network. The received message is processed so that at least a portion of the sender's message is displayed to a user of the wireless mobile device before a signed receipt is provided to the sender. | 10-31-2013 |
20140215205 | System and Method for Exchanging Cryptographic Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 07-31-2014 |
Michael Stephen Brown, Kitchener CA
Patent application number | Description | Published |
---|---|---|
20100328110 | METHOD OF GENERATING AND PROVIDING A PASSWORD TO A HANDHELD ELECTRONIC DEVICE - A method of providing a password to a handheld electronic device having a reduced keyboard and a non-predictive keystroke interpretation system, wherein the reduced keyboard is of a particular keyboard type and the non-predictive keystroke interpretation system is of a particular system type. The method includes receiving a first character string in an electronic device, such as, without limitation, a PC, that is separate from the handheld electronic device, generating one or more second character strings in the electronic device based on the particular keyboard type, the first character string, and, possibly, the particular system type, and transmitting the one or more second character strings from the electronic device to the handheld electronic device as the password. | 12-30-2010 |
20100328154 | CONTROLLING A GPS RECEIVER BY DETECTING MOTION BASED ON RADIOFREQUENCY SIGNAL TRACES - Operation of a GPS receiver on a wireless communications device is controlled by determining whether the device is stationary or in motion. Motion determination is accomplished by analyzing radiofrequency signal traces, e.g. GSM signal traces, received from one or more nearby base stations. A three-tiered analysis provides a progressively more accurate determination as to whether the device is moving or stationary while providing, in certain instances, a more rapid determination than prior-art techniques. When the device is determined to be stationary, the GPS receiver can be deactivated. When the device is determined to be moving, the GPS receiver can be reactivated. | 12-30-2010 |
20110210171 | METHODS AND DEVICES FOR TRANSMITTING AND RECEIVING DATA USED TO ACTIVATE A DEVICE TO OPERATE WITH A SERVER - Embodiments of the systems, devices, and methods described herein generally facilitate transmission and reception of activation data for use in activating a mobile device to operate with a server. In accordance with one example embodiment, an activation barcode is received from a server by reading an image comprising the activation barcode via a computing device, wherein the image is displayed on a display associated with the computing device, and wherein the activation barcode encodes activation data comprising an activation password. The activation barcode is decoded at the mobile device to obtain the activation password, and an authentication is performed using the activation password after a device activation request is transmitted to the server, wherein the mobile device is activated to operate with the server if the authentication is successful. | 09-01-2011 |
20110231216 | SYSTEM AND METHOD FOR CONTROLLING EVENT REMINDERS - A system and method are provided for obtaining data that could affect event details, such that this data can be used to generate alerts that are sent early enough to give the user time to reach the event, predict lateness, arrange replacements/delegates, reschedule, cancel meetings in advance, etc. By more intelligently providing reminders to the user, the above-described unforeseen circumstances can be dealt with. In some embodiments, an aggregation of various external data sources as well as internal data can be used to better predict when a user should be reminded of the time for their event, determine and advise whether they may be late regardless, and/or enable the user to arrange a delegate or replacement or to reschedule or cancel the event. | 09-22-2011 |
20110238779 | System and Method for Music Resource Connection, Selection and Rating for Providing a Radio Like User Listening Experience - A novel and useful system and method of automatic resource connection, selection and rating for providing a radio like listening experience to a user. The mechanism is operative to automatically establish a connection from a mobile communications device having media player capability to a music file collection. Playlists maintained on the device are periodically updated with new playlists downloaded to the device. The device generates playlists so as to eventually cycle though the entire contents of a music file collection. Users are given the ability to rate songs by title, artist, album, etc. These ratings are used to calculate scores for each song which are used to bias a random selection process for determining the next song to play. This provides a user with a radio like listening experience. | 09-29-2011 |
20110246762 | System and Method for Exchanging Cryptographic Protocol Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 10-06-2011 |
20110307598 | AUTOMATED CALENDAR RECONCILIATION - There is provided a computer implemented method of providing data reconciliation on a first delegate device associated with an assigned task. The method comprises the steps of: determining a likelihood of failure of the first delegate device associated with the task defined in a first data entry thereon to complete the task, the first data entry associated with a start time and a task location; determining a replacement delegate device for completing the task in response to detecting task information for the replacement delegate device indicating suitability for the task; and updating respective data entries for the first delegate device and the replacement delegate device to associate the replacement delegate device for the task. | 12-15-2011 |
20110319074 | Method and apparatus for low cost cellular roaming - A wireless device (WD) is associated with a preprogrammed user roaming setting and an automated adjustment algorithm stored in operative communication with the device. The algorithm is initiated and run when the device enters a roaming area, thereby automatically activating the roaming setting. A user response query is operatively connected to the automated adjustment algorithm, and operates as a switch for the automated adjustment algorithm, which initiates changing the user settings in accordance with the roaming setting. A user available query is connected to the user response query, to determine if the wireless device is in use, and to generate a notification if the device is idle or a prompt if the device is in use. An output from the switch of the user response query selectively enables the automated adjustment algorithm responsive to at least one of a responsive and a nonresponsive input to the user response query. | 12-29-2011 |
20120079007 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING APPLICATIONS AND CONTENT ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for accessing applications and content across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. When the client machine accesses an email or other message with referenced content, different portions of the system can be configured to select a particular pathway to actually fetch the content. | 03-29-2012 |
20120079008 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING EVENT NOTIFICATIONS ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for providing an event notification across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. Further, events received at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120079043 | METHOD, APPARATUS AND SYSTEM FOR ACCESSING AN APPLICATION ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for accessing an application across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. | 03-29-2012 |
20120079063 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING EVENT NOTIFICATIONS ACROSS A PLURALITY OF COMPUTERS - A method, apparatus and system for providing an event notification across a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser. Further, events received at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120079110 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device having a connection with a second device, the method checking whether a timer has expired on the second device or if a connection is lost to the second device; and preventing at least one of the plurality of application subsets from being launched or enabled if the timer has expired on the second device or the connection is lost to the second device. | 03-29-2012 |
20120079122 | DYNAMIC SWITCHING OF A NETWORK CONNECTION BASED ON SECURITY RESTRICTIONS - Systems and methods for providing access to an enterprise network from a remote computer are described. In one example, a system includes a mobile device configurable for connection to the remote computer, the mobile device adapted to establish secure communication to the enterprise network and a connection server application located on the mobile device for receiving a request from the remote computer specifying a location and a connection path and selectively providing to the remote computer access to the enterprise network via the mobile device based on the request. Other implementations are possible. | 03-29-2012 |
20120079582 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 03-29-2012 |
20120079593 | System and Method For Hindering a Cold Boot Attack - A method for hindering a cold boot attack on a user equipment (UE) is provided. The method includes, in response to detection of the cold boot attack, executing prioritized security procedures. A user equipment (UE) is also provided that includes a processor configured to execute prioritized security procedures responsive to detection of a cold boot attack. | 03-29-2012 |
20120079609 | METHOD FOR ESTABLISHING A PLURALITY OF MODES OF OPERATION ON A MOBILE DEVICE - A method, device and system for establishing plural modes of operation on a mobile device, including: associating each application on the mobile device with one of a plurality of modes; and restricting access to data on the mobile device to only a subset of applications based on the mode associated for the each application. A system includes connection of an untrusted device to a trusted device and restricting data access for restricted data to a subset of trusted applications on the untrusted device. | 03-29-2012 |
20120223861 | CONTROLLING A GPS RECEIVER BY DETECTING MOTION BASED ON RADIOFREQUENCY SIGNAL TRACES - Operation of a satellite-based navigation-signal broadcast system receiver, such as a GPS receiver, on a wireless communications device is controlled by determining whether the device is stationary or in motion. Motion determination is accomplished by analyzing radiofrequency signal traces, e.g. GSM signal traces, received from one or more nearby base stations. A three-tiered analysis provides a progressively more accurate determination as to whether the device is moving or stationary while providing, in certain instances, a more rapid determination than prior-art techniques. When the device is determined to be stationary, the GPS receiver can be deactivated. When the device is determined to be moving, the receiver can be reactivated. | 09-06-2012 |
20120233681 | METHOD AND SYSTEM OF USER AUTHENTICATION USING A PORTABLE AUTHENTICATOR - Systems and methods are provided for facilitating access to an electronic device. Password information is stored on the electronic device, and on a portable authenticator. When a user attempts to access the electronic device, the user is prompted to enter a password at the electronic device. The portable authenticator determines the validity of the entered password. The electronic device receives the results of the validity determination from the portable authenticator, and provides access to the electronic device based on the received validity determination. | 09-13-2012 |
20120250470 | Electronic Device and Method Providing Improved Indication that an Alarm Clock is in an on Condition - An improved electronic device and method provide an improved clock feature having an alarm clock function that advantageously provides an indication to a user that the alarm is set, i.e., is in an ON condition, by outputting the alarm time itself. | 10-04-2012 |
20120311020 | Pre-Caching Resources Based on A Cache Manifest - A method executed on a first electronic device for accessing an application server on a second electronic device includes receiving a cache manifest for an application, the cache manifest identifying a resource item that can be pre-cached on the first electronic device, pre-caching the resource item as a cached resource item in a cache memory of the first electronic device prior to launching an application client on the first electronic device. The method further includes, upon launching the application client on the first electronic device, retrieving data from the application server, wherein the data includes content and a reference to the resource item, obtaining, from the cache memory, the cached resource item that corresponds to the resource item, and displaying an output based upon the content and the cached resource item. | 12-06-2012 |
20130007725 | METHOD, APPARATUS AND SYSTEM FOR TRANSMITTING AN APPLICATION USING A PLURALITY OF COMPUTERS - A method, apparatus and system for transmitting an application using a plurality of computers is provided. In one aspect, a computing machine and a mobile computing device are provided. The computing machine is configured to execute a browser application. The mobile computing device is configured to host a manager application. When the computing machine and the mobile computing device are connected, the manager application becomes available on the client machine so that transmitting of applications to the mobile computing device can be controlled by the computing machine. | 01-03-2013 |
20130067009 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 03-14-2013 |
20130097239 | ENABLING CONTENT INTERACTION AT A CONNECTED ELECTRONIC DEVICE - A content item may be identified at a first electronic device with selection for the content item to be “opened” at a second electronic device. The first electronic device may instruct that the content item be displayed or otherwise made available for further interaction at the second electronic device. A web protocol session may be established between the first electronic device and the second electronic device to allow for an instruction message from the first electronic device to the second electronic device. Upon receiving a user interface command at the first electronic device, the user interface command indicating that the content item should be displayed at the second electronic device, the instruction message is sent to the second electronic device, via the web protocol session. As a result, the content item is caused to be displayed at the second electronic device. | 04-18-2013 |
20130133065 | SYSTEM AND METHOD OF INDICATING THE STRENGTH OF ENCRYPTION - A method and system are provided for secure messaging on mobile computing devices. The method and system provide for an indication of a security trust level associated with a security method used with an electronic message. | 05-23-2013 |
20130145150 | CODE SIGNING SYSTEM AND METHOD - A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (APIs). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of the requestor to access the one or more specific APIs. In one example, the digital signature is provided by the code signing authority or a delegate thereof. In another example, the code signing request may include one or more of the following: code, an application, a hash of an application, an abridged version of the application, a transformed version of an application, a command, a command argument, and a library. | 06-06-2013 |
20130145151 | Derived Certificate based on Changing Identity - A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed root certificate that binds an identity of the first device to a long-term public key of the first device. The root certificate is digitally signed using a long-term private key, where the long-term public key and the long-term private key form a public/private key pair. The first device provides its root certificate to the second device in any trusted manner. The first device can then create a certificate for one or more short-term identities acquired by the first device and sign the newly-created certificate using the long-term private key. The first device can authenticate itself to the second device by sending the newly-created certificate to the second device. | 06-06-2013 |
20130145153 | METHOD AND DEVICE FOR SECURE NOTIFICATION OF IDENTITY - A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a device to notify or detect the presence of the device in a network. Each certificate is associated with an identity which is excluded from the communication of the hash of the certificate. The received hash is compared to hashes of certificates stored in an electronic device to determine an identity. The identity may represent an electronic device or a user of the electronic device. | 06-06-2013 |
20130145165 | METHOD OF SENDING A SELF-SIGNED CERTIFICATE FROM A COMMUNICATION DEVICE - A method of sending a self-signed certificate from a communication device, the self-signed certificate being signed by the communication device. The method includes: receiving a communication in relation to establishing a session from a second communication device in proximity to said communication device, outputting on an output device of said communication device a certificate hash of the self-signed certificate or an address of where to obtain the certificate hash, and sending the self-signed certificate to said second communication device. The method may also include sending a broadcast message to announce a presence of the communication device. | 06-06-2013 |
20130145480 | E-MAIL WITH SECURE MESSAGE PARTS - A method for preventing a recipient of an electronically transmitted message from taking at least one action in relation to the message is disclosed. The message has at least two parts with one of the parts having a higher level of security than the other part. The method includes the step of extracting information from the message. The information indicates that the higher level security part is not permitted to have the action taken on it while the other part is so permitted. The method also includes the step of preventing the higher level security part from having the action taken on it in reaction to said recipient making an offending request. | 06-06-2013 |
20130160091 | SYSTEM AND METHOD FOR ASSOCIATING MESSAGE ADDRESSES WITH CERTIFICATES - A system and method for associating message addresses with certificates, in which one or more message addresses are identified and associated with a user-selected certificate that does not contain any e-mail addresses. In certain situations, a message may be encrypted using a certificate that does not contain an e-mail address that matches the e-mail address of the individual to which the message is to be sent, so long as the address to which the message is to be sent matches any of the message addresses associated with the certificate. The message addresses are saved in a data structure that resides in a secure data store on a computing device, such as a mobile device. | 06-20-2013 |
20130166907 | Trusted Certificate Authority to Create Certificates Based on Capabilities of Processes - A device certificate binds an identity of a first device to a public key of the first device. The first device comprises a certificate authority service that creates for a process on the first device a process certificate certifying one or more capabilities of the process on the first device. The process certificate is presented to the second device. Upon validating the process certificate using the device certificate, the second device permits the process on the first device to have on the second device one or more of the verified certified capabilities. | 06-27-2013 |
20130167194 | SYSTEM AND METHOD FOR DETERMINING A SECURITY ENCODING TO BE APPLIED TO OUTGOING MESSAGES - A device comprising a processor is disclosed herein. In one broad aspect, the processor is configured to: determine whether a general message encoding configuration setting at the device is set to a first setting indicating that when a security encoding is to be applied to a message, the security encoding is to be established by a policy engine, wherein the established security encoding cannot be overridden by a security encoding selection algorithm at the device; and if the general message encoding configuration setting is set to the first setting, transmit the message to at least one message recipient via the policy engine such that the policy engine applies the security encoding to the message prior to the policy engine transmitting the message. | 06-27-2013 |
20130167247 | SELECTIVELY WIPING A REMOTE DEVICE - A system and method for selectively securing data from unauthorized access on a client device storing a plurality of data types with reference to an authorization level indicated in a command. A command is received at a client device comprising an authorization level indicator. Based on at least one predefined rule, which may be implemented in an IT policy stored at the client device, each of the plurality of data types to be secured is determined, and then the data corresponding to those types is secured. The data may be secured by encrypting and/or deleting the data at the client device. The predefined rules associated with each authorization level may be configured by a user or administrator having an authorization level that exceeds the associated authorization level. | 06-27-2013 |
20130179148 | METHOD AND APPARATUS FOR DATABASE AUGMENTATION AND MULTI-WORD SUBSTITUTION - A method and communication device are provided for database augmentation using linguistic data stored on a device, and utilizing a database stored on a device to perform multi-word substitution. A database may be augmented by monitoring other databases that contain linguistic data, such as contact databases containing linguistic data regarding entities that a device may communicate with, and updating the database with linguistic data in the other databases. The linguistic data in the augmented database may be compared with words received from an input apparatus to determine whether any of the received words should be replaced with linguistic data from the augmented database. The augmented database may contain one word entries and multi-word entries to allow for multi-word substitution. | 07-11-2013 |
20130191220 | Systems and Methods for Displaying Over-Scroll Regions on Electronic Devices - A method and system are provided for displaying advertising content on a mobile device by displaying an over-scroll region on a display of the mobile device, and displaying a first advertisement in at least a first portion of the over-scroll region. The method may include determining information associated with the over-scroll region, and selecting the first advertisement based on the information associated with the over-scroll region. The method may also include displaying a second advertisement in a second portion of the over-scroll region and selecting the second advertisement based on the information associated with the over-scroll region. | 07-25-2013 |
20130198508 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 08-01-2013 |
20130219471 | ESTABLISHING CONNECTIVITY BETWEEN AN ENTERPRISE SECURITY PERIMETER OF A DEVICE AND AN ENTERPRISE - A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device. | 08-22-2013 |
20130227360 | Method and Apparatus for Providing Intelligent Error Messaging - A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist the user in overcoming errors associated with the processing of electronic messages and data. | 08-29-2013 |
20130239225 | Deleting Confidential Information Used to Secure a Communication Link - A system includes a first wireless-enabled device that transparently stores confidential information and a second wireless-enabled device that stores the same confidential information. The confidential information is to be used to secure a wireless communication link between the first device and the second device. One or both of the first device and the second device is to delete the confidential information upon fulfillment of one or more conditions related to the communication link. The conditions include general timeout, device inactivity, loss of connection over the communication link, a decline in signal strength, and a predefined number of transactions having occurred between the first device and the second device. | 09-12-2013 |
20130246547 | SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication. | 09-19-2013 |
20130246549 | SYSTEM AND METHOD FOR SELECTING MESSAGING SETTINGS ON A MESSAGING CLIENT - A system and method of selecting messaging settings on a messaging client are provided. A display configured to operate in conjunction with the messaging client displays a compose screen that includes a message portion and a messaging settings portion when an outgoing message is to be composed on the messaging client. Messaging settings selected to control message characteristics of the outgoing message are displayed in the messaging settings portion of the compose screen. | 09-19-2013 |
20130247143 | SYSTEM AND METHOD FOR CONFIGURING DEVICES FOR SECURE OPERATIONS - Systems and methods for establishing a security-related mode of operation for computing devices. A policy data store contains security mode configuration data related to the computing devices. Security mode configuration data is used in establishing a security-related mode of operation for the computing devices. | 09-19-2013 |
20130254528 | SECURE MESSAGE HANDLING ON A MOBILE DEVICE - Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a digital signature, or both, is determined, and if the mobile device does not include a complete copy of a parent message for insertion into the child message, the mobile device selectively downloads the parent message from the messaging server prior to the computation of a digital signature or prior to encryption. The systems and methods may also provide a check of the child message size, when the child message includes inserted parent content, to ensure that the child message does not exceed any prescribed limits on message size. | 09-26-2013 |
20130268607 | SYSTEM AND METHOD FOR HANDLING ELECTRONIC MAIL MISMATCHES - A system and method for handling e-mail address mismatches between the address contained within a user's certificate or certificate chain, and the account address actually being used is disclosed. In order to resolve address mismatches a canonical or generic domain name or user name may, for example, be used as a lifelong address of a user that is contained in the user's certificate. Upon detection of an address mismatch, the system and method disclosed herein may automatically re-check the certificate or search for a certificate containing the canonical or generic domain name and/or user name to attempt to resolve the mismatch. | 10-10-2013 |
20130282848 | SYSTEMS AND METHODS FOR PROTECTING HEADER FIELDS IN A MESSAGE - Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication. | 10-24-2013 |
20130318344 | SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE - A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers. | 11-28-2013 |
20140068741 | AUTHENTICATING AN AUXILIARY DEVICE FROM A PORTABLE ELECTRONIC DEVICE - This document discusses, among other things, a method for authenticating a browser executing on an auxiliary device with a web service executing on a portable electronic device. The method includes receiving a request for a resource from the browser, determining whether the request identifies a protected resource, and selectively authenticating the request based on whether the request identifies a protected resource. | 03-06-2014 |
20140075191 | SYSTEM AND METHOD FOR TRANSMITTING AND UTILIZING ATTACHMENTS - A method of handling cryptographic information in a communication comprising body elements and attachment elements to a mobile device includes the steps of determining if the communication includes an attachment element comprising cryptographic information and converting the attachment element into a body element upon determining that the communication includes an attachment element comprising cryptographic information. | 03-13-2014 |
20140115665 | MESSAGE-HANDLING SERVER AND METHOD FOR HANDLING SECURE MESSAGE ATTACHMENTS FOR A MOBILE DEVICE - A secure message that includes an attachment is received at a server. The secure message may have a secure layer that indicates that the secure message is at least digitally signed. The secure message may be provided without the attachment to the mobile device over a wireless network. A request may be received from the mobile device to access the attachment. The request may include an attachment identifier (ID) that identifies the attachment in accordance with a message-attachment indexing system. In response to the request to access the attachment, the server may perform an index lookup to find the attachment based upon the attachment ID, may look through the secure layer of the secure message in order to locate the attachment within the secure message, and may render at least an initial portion of the attachment by the server in a format for viewing by the mobile device. | 04-24-2014 |
20140237246 | Generating a Symmetric Key to Secure a Communication Link - A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed to create a hash result; the first symmetric key, the second symmetric key and the hash result are hashed to generate a third symmetric key to be used to secure the communication link. | 08-21-2014 |
20140253574 | Development Environment For Capture Of Image Data From A Mobile Device - A method and device for acquiring an image such as a splash screen for an application. A screenshot instruction is sent to a target device upon detecting a trigger event; image data is received from the target device in response to the screenshot instruction; and upon receiving the image data, the image data is automatically stored and associated with the application. | 09-11-2014 |
20140258894 | Visual Timeline Of An Application History - The present disclosure provides methods and devices for interacting with a visual timeline of an application. The method comprises displaying on a display a visual timeline having one or more visual elements each representing an action performed in respect of the application, each action corresponding to a save point or an incremental change to the application, wherein the visual elements are arranged in a chronological order in which the actions occurred. An application state for display within an editor user interface can be selected using the visual timeline. | 09-11-2014 |
20140258968 | Visual Representation Of Edits For Collaborative Application Development - The present disclosure provides a method and device of distributing visual representation of changes to an application. The method includes: determining one or more pages in the application which have changed between a first state of the application at a first time and second state of the application at a second time; rendering the one or more pages which have changed at the first state of the application; rendering the one or more pages which have changed at the second state of the application; and sending a notification including a visual differential of one or more rendered pages of the application which have changed between the first state of the application and the second state of the application. | 09-11-2014 |
20140258969 | Web-Based Integrated Development Environment For Real-Time Collaborative Application Development - The present disclosure provides methods and devices for real-time collaboration on an application under development among two or more collaborating devices. A server maintains the application code for the application. Changes to the application, which may be additions, deletions or modifications, made by the collaborating devices are sent to the server. The server distributes the changes to other collaborating devices in real-time or near real-time, which update the current state of the application to reflect the changes. | 09-11-2014 |
20140258970 | COLLABORATIVE APPLICATION DEVELOPMENT ENVIRONMENT USING A CONNECTED DEVICE - The present disclosure provides a Web-based integrated development environment and graphical user interface for real-time collaborative application development which uses a connected device. Changes made to an application within the application development tool are applied to a connected mobile device in real-time or near real-time application. | 09-11-2014 |
20140297516 | METHOD FOR PROVIDING COMPOSITE USER INTERFACE CONTROLS AND AN ONLINE STOREFRONT FOR SAME - The present disclosure provides a method for providing composite user interface controls and a library or online storefront for same. In one aspect, there is provided a method for a client computer of sharing a custom control, comprising: receiving by a browser an encrypted custom control comprising a number of user interface elements which are positioned in a specified manner with respect to each other, wherein each of the user interface elements has one or more properties; receiving by the browser a decryption key; and decrypting by the browser the encrypted custom control using the decryption key. | 10-02-2014 |
20140320387 | Device, System and Method for Generating Display Data - A method for use in a device is described. The method comprising the steps of detecting a gesture at the device; and outputting data, to a remote device, for controlling a display object on a portion of a display generated by the remote device, wherein the display object is controlled in response to the detected gesture performed at the device, and wherein the data pertains to an application executable on the device. A device is also described. | 10-30-2014 |
20140324962 | Device, System and Method for Utilising Display Objects - A method of generating a display object is provided, the method comprising operating a first processor comprised within a first device to: execute an application; generate an display object associated with the application; output the active display object on the first device; transmit the display object to a second device for output by the second device; and receive user input to the application via the display object output on the second device. | 10-30-2014 |
20140325382 | Device, System And Method For Processing Character Data - A method is described. The method comprising: receiving character data from the remote device in response to a user applying the character data to a displayed target; and supplying the character data to one of a plurality of components executable on a processor of a device based on one or more characters in the character data. A device is also described. | 10-30-2014 |
20140325383 | Device, System And Method For Processing Character Data - A method is described. The method comprising the steps of receiving character data from the remote device following a selection of character data for application to a target; and determining, based on one or more characters in the character data, one or more components executable on the processor for supplying the character data thereto. A device is also described. | 10-30-2014 |
20140337619 | Derived Certificate based on Changing Identity - A first device with a changing identity establishes a secure connection with a second device in a network by acting as its own certificate authority. The first device issues itself a self-signed root certificate that binds an identity of the first device to a long-term public key of the first device. The root certificate is digitally signed using a long-term private key, where the long-term public key and the long-term private key form a public/private key pair. The first device provides its root certificate to the second device in any trusted manner The first device can then create a certificate for one or more short-term identities acquired by the first device and sign the newly-created certificate using the long-term private key. The first device can authenticate itself to the second device by sending the newly-created certificate to the second device. | 11-13-2014 |
20140351599 | SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS - Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like. | 11-27-2014 |
20140358675 | CLICK DETECTION METHOD, APPARATUS AND SYSTEM - A click detection method, apparatus and system is provided. An embodiment includes a method that receives a request from a client destined for a server and a unique identifier for the client. The method also includes generating a representation of the unique identifier, and forwarding the representation of the unique identifier and the request to the server. | 12-04-2014 |
20140359274 | SYSTEM AND METHOD FOR EXCHANGING ENCRYPTION KEYS BETWEEN A MOBILE DEVICE AND A PERIPHERAL DEVICE - Systems and methods for providing additional security for data being transmitted across a wireless connection that has been established using a known wireless protocol (e.g. Bluetooth) are described. An encryption key is exchanged between a computing device (e.g. a mobile device) and a wireless peripheral device (e.g. a keyboard, a printer). In some embodiments, the encryption key is generated at one of the two devices. Data associated with the encryption key is output at the one device, which can be input by the user at the other device. The encryption key is then recovered at the other device from the input, thereby completing the key exchange. The encryption key can then be used to encrypt and decrypt data transmitted over the established wireless connection, providing additional security. | 12-04-2014 |
20140359293 | METHOD AND DEVICE FOR SECURE NOTIFICATION OF IDENTITY - A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a device to notify or detect the presence of the device in a network. Each certificate is associated with an identity which is excluded from the communication of the hash of the certificate. The received hash is compared to hashes of certificates stored in an electronic device to determine an identity. The identity may represent an electronic device or a user of the electronic device. | 12-04-2014 |
20150016612 | SYSTEM AND METHOD FOR REMOTE RESET OF PASSWORD AND ENCRYPTION KEY - Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created. | 01-15-2015 |
20150089005 | METHOD AND ELECTRONIC DEVICE FOR CONTENT SHARING - Methods and apparatus for enabling content interaction at a connected electronic device re described. An example method includes establishing a web protocol session between a web server executing on a first electronic user device and a client executing on a second electronic user device via a direct radio frequency connection between the first electronic user device and the second electronic user device, wherein the first electronic user device and the second electronic user device are associated with a same user, the establishing including sending an open request from the client to the web server; and transmitting a response to the open request from the web server to the client, the response including a universal resource identifier identifying a location of content for presenting, on the second electronic device, the application executing on the first electronic device. | 03-26-2015 |
Murray James Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20090055642 | Method, system and computer program for protecting user credentials against security attacks - A method, system and computer program is provided for protecting against one or more security attacks from third parties directed at obtaining user credentials on an unauthorized basis, as between a client computer associated with a user and a server computer is provided. The server computer defines a trusted Public Key Cryptography utility for use on the client computer. The Public Key Cryptography utility is operable to perform one or more cryptographic operations consisting of encrypting/decrypting data, authenticating data, and/or authenticating a sender, decrypting and/or verifying data. The user authenticates to the Public Key Cryptography utility, thereby invoking the accessing of user credentials associated with the user, as defined by the server computer. The Public Key Cryptography Utility facilitates the communication of the user credentials to the server computer, whether directly or indirectly via an authentication agent, the server computer thereby authenticating the user. In response, the server computer providing access to one or more system resources linked to the server computer to the user. The present invention also provides a series of methods enabling the server computer to authenticate the user by operation of the Public Key Cryptography utility and/or based on enrolment of the user and providing the Public Key Cryptography utility to the user. | 02-26-2009 |
Nigel Brown, Ontario CA
Patent application number | Description | Published |
---|---|---|
20090055431 | PRIVACY ONTOLOGY FOR IDENTIFYING AND CLASSIFYING PERSONALLY IDENTIFIABLE INFORMATION AND A RELATED GUI - Method and system of providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, in one aspect, may comprise obtaining a list of terms and a policy that includes one or more of the terms; identifying a plurality of meta-tags used in a system; developing one or more mappings between the terms and the meta-tags; identifying system data objects in the system having one or more meta-tags; creating for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped, the association indicating whether the system data object is or is not covered by the policy. | 02-26-2009 |
20090055887 | PRIVACY ONTOLOGY FOR IDENTIFYING AND CLASSIFYING PERSONALLY IDENTIFIABLE INFORMATION AND A RELATED GUI - Method and system of providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, in one aspect, may comprise obtaining a list of terms and a policy that includes one or more of the terms; identifying a plurality of meta-tags used in a system; developing one or more mappings between the terms and the meta-tags; identifying system data objects in the system having one or more meta-tags; creating for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped, the association indicating whether the system data object is or is not covered by the policy. | 02-26-2009 |
Paul J. Brown, Wakefield CA
Patent application number | Description | Published |
---|---|---|
20110235283 | REMOVABLE IC PACKAGE STIFFENING BRACE AND METHOD - Various exemplary embodiments relate to a brace for use with an integrated circuit (IC), and to an IC package with a brace, having a main body portion and a fastening portion for mechanically fastening the main body portion to the IC, by for example clipping or sliding attachment. Other exemplary embodiments relate to a method of stabilizing an IC during an operation carried out on the IC, such as a soldering operation, involving for example steps of attaching a brace to the IC, performing the operation on the IC, and/or removing the brace after performing the operation. | 09-29-2011 |
20110235304 | IC PACKAGE STIFFENER WITH BEAM - Various exemplary embodiments relate to a stiffener for use with and integrated circuit (IC). The stiffener can be attached to the IC, and can utilize a planar portion and one or more beam portions that project from the planar portion at a non-zero angle. The stiffener can alternatively include a frame formed of beam portions that are adjacent the sides of the IC. The stiffener can provide added stiffness to the IC package to resist warping of the IC during soldering. | 09-29-2011 |
Paul James Brown, Wakefield CA
Patent application number | Description | Published |
---|---|---|
20080205011 | In-grid decoupling for ball grid array (BGA) devices - A ball grid array (BGA) having an array of BGA pads on one side and at least a pair of contiguous through board vias, at least a pair of conductive pads surrounding the through hole vias, wherein the conductive pads have octagonal shapes and four sides of each octagonal pad are mutually parallel. | 08-28-2008 |
20080225502 | Alternating micro-vias and throughboard vias to create PCB routing channels in BGA interconnect grid - A printed circuit board (PCB) assembly having a plurality of circuit layers including outer layers and intervening layers with through-vias and micro-vias used to translate a portion of the signal connections of the grid, thereby creating a set of diagonal routing channels between the vias on internal layers of the board and a BGA package mounted on the printed circuit board. | 09-18-2008 |
20080225848 | Emergency alert system enhancement using alert server and metro ATM network for DSL deployment - An emergency alert system for alerting DSL subscribers of imminent perils includes an alert server connected over a direct link to an edge node of a metro network for receiving an event notification, configuring from an event notification a highest priority alert message, and broadcasting the alert message to subscriber terminals over the metro network. An add multiplexer (ADM) multiplexes the alert traffic with the regular traffic onto the direct link, anthe multiplexed traffic reaches the edge node of the metro network, which is configured with a high priority policy. The edge node discards the lower priority traffic in the presence of the alert traffic and an applet installed on said subscriber terminal accepts and displays the alert message in a browser or a media player. | 09-18-2008 |
20120081871 | WARP REACTIVE IC PACKAGE - An apparatus and method for temperature induced warpage compensation in an integrated circuit package is disclosed. The apparatus consists of a layer of material bonded to the top of the integrated circuit package. The layer of material may have a generally planar-convex or a generally planar-concave cross-section. By appropriate choice of temperature coefficient and degree of concavity or convexity, the layer of material can compensate for either convex or concave warpage. In some embodiments the layer of material has apertures therein allowing compensation for more complex warpages. The apparatus provides an alternative to apparatus for dealing with IC package warpage known in the art. | 04-05-2012 |
20120081872 | THERMAL WARP COMPENSATION IC PACKAGE - An apparatus and method for temperature induced warpage compensation in an integrated circuit package is disclosed. The apparatus consists of bonded layers of material having different thermal coefficients of expansion. The bonded layers are bonded to the top of the integrated circuit package. By appropriate choice of temperature coefficients the layers of material can compensate for either convex or concave warpage. In some embodiments the layers of material have apertures therein allowing compensation for more complex warpages. As well, in some embodiments the top layer of material does not have a planar cross-section. A method is also disclosed for manufacturing an integrated circuit package assembly. The apparatus and method provide an alternative to methods of dealing with IC package warpage known in the art. | 04-05-2012 |
20120168216 | 0201 LAND PATTERN FOR 1.0 mm AND .08 mm PITCH ARRAYS - A land pattern for 1 mm and 0.8 mm pitch arrays has been disclosed for placing two port devices. The land pattern includes a ball grid array (BGA) of BGA pads each connected to a respective through hole via, and a pair of rectangular conductive pads electrically connected to a an adjacent pair of through hole vias, wherein each rectangular pad extends out from its via towards the other via of the pair along a line connecting the centers of said adjacent pair vias. A solder mask is located on the rectangular pad side and has apertures over each rectangular conductive pad. The land pattern is particularly useful for locating two port devices directly underneath a BGA device while minimizing the distance from a BGA ball to the two port device lead. | 07-05-2012 |
20130062762 | IN-GRID ON-DEVICE DECOUPLING FOR BGA - Embodiments of the invention place surface-mount such as decoupling capacitors, resistors or other devices directly on the underside of a ball grid array (BGA) electronic integrated circuit (EIC) package, between BGA pads. | 03-14-2013 |
20130113067 | THERMAL WARP COMPENSATION IC PACKAGE - An apparatus and method for temperature induced warpage compensation in an integrated circuit package is disclosed. The apparatus consists of bonded layers of material having different thermal coefficients of expansion. The bonded layers are bonded to the top of the integrated circuit package. By appropriate choice of temperature coefficients the layers of material can compensate for either convex or concave warpage. In some embodiments, the layers of material have apertures therein allowing compensation for more complex warpages. As well, in some embodiments the top layer of material does not have a planar cross-section. A method is also disclosed for manufacturing an integrated circuit package assembly. The apparatus and method provide an alternative to methods of dealing with IC package warpage known in the art. | 05-09-2013 |
Peter W.a. Brown, Almonte CA
Patent application number | Description | Published |
---|---|---|
20120025105 | POWER CONCENTRATOR FOR TRANSMUTING ISOTOPES - A method of effecting a chemical, physical or transmutational change in a target material using a high power particle beam concentrated on the target material. The particle beam is scanned in a controlled manner to reduce its power density and to avoid damage to equipment which is unable to tolerate high power densities. Movement between the target and the scanned beam is synchronized to cause the scanned beam to persistently or continuously strike the target to effect the chemical, physical or transmutational change, thereby concentrating the beam on the target. | 02-02-2012 |
Richard Brown, Calgary CA
Patent application number | Description | Published |
---|---|---|
20100213198 | COMPOSITE STRUCTURE VESSEL AND TRANSPORTATION SYSTEM FOR LIQUEFIED GASES - The invention relates to a composite structure vessel and transportation system for liquefied gases and methods of manufacture. More specifically, the system provides a composite vessel for operative connection to a truck trailer system for transporting at least two gas products such as carbon dioxide and liquid nitrogen within the composite vessel at different times. The composite vessel includes an inner liner, a composite layer including a plurality of resin-impregnated fiber layers, a thermal insulation layer, and an outer protective layer. | 08-26-2010 |
20110219648 | LED EDGE-LIT SIGNAGE UTILIZING DIGITAL PRINT TECHNOLOGY - An LED edge-lit sign comprises a transparent light panel, an image-carrying sheet in front of the light panel and a reflective back plate behind the light panel. The image to be displayed is printed onto the image-carrying sheet and a translucent layer of white ink is uniformly applied over the printed image. The result is uniform and effective back lighting of the image. A transparent window may be provided to view a changeable display therethrough. | 09-15-2011 |
20130235617 | LED EDGE-LIT SIGNAGE UTILIZING DIGITAL PRINT TECHNOLOGY - A display assembly combines a digital display with an edge-lit illuminated faceplate, using light sources mounted around the digital display. The light sources direct illumination radially outwardly of the digital display and into the edge of the faceplate. An intermediate housing may accommodate the digital display, the light sources and the faceplate. The light sources are configurable and the digital display may be programmed to create zones with different content and customizable according to schedules of operation. | 09-12-2013 |
Richard S. Brown, Brantford CA
Patent application number | Description | Published |
---|---|---|
20080260489 | Captured nut assembly - A strip has a plurality of slots therein each which has a captured nut freely rotatable in the slot to be assembled to a work piece. | 10-23-2008 |
20090290954 | Threaded Fastener with Retainer and Method of Making Such Fastener - A fastener element ( | 11-26-2009 |
Robert G. Brown, Dartmouth CA
Patent application number | Description | Published |
---|---|---|
20090297593 | Use of Liposomes in a Carrier Comprising a Continuous Hydrophobic Phase as a Vehicle for Cancer Treatment - The invention compositions comprising a continuous hydrophobic phase and liposomes as a vehicle for delivery of an antigen capable of inducing a cytotoxic T lymphocyte (CTL) response and methods for their use in the treatment of cancer. | 12-03-2009 |
Robert George Brown, Dartmouth CA
Patent application number | Description | Published |
---|---|---|
20090074853 | Vaccines with enhanced immune response and methods for their preparation - The present invention is concerned with vaccines and their preparation. An effective long-term immune response, especially in mammals, can be produced using a vaccine comprising an antigen encapsulated in liposomes, a suitable adjuvant and a carrier comprising a continuous phase of a hydrophobic substance. The vaccine is particularly effective in eliciting the production of antibodies that recognize epitopes of native proteins. | 03-19-2009 |
20090092666 | Vaccines with enhanced immune response and methods for their preparation - The present invention is concerned with vaccines and their preparation. An effective long-term immune response, especially in mammals, can be produced using a vaccine comprising an antigen encapsulated in liposomes, a suitable adjuvant and a carrier comprising a continuous phase of a hydrophobic substance. The vaccine is particularly effective in eliciting the production of antibodies that recognize epitopes of native proteins. | 04-09-2009 |
20140099358 | VACCINES WITH ENHANCED IMMUNE RESPONSE AND METHODS FOR THEIR PREPARATION - The present invention is concerned with vaccines and their preparation. An effective long-term immune response, especially in mammals, can be produced using a vaccine comprising an antigen encapsulated in liposomes, a suitable adjuvant and a carrier comprising a continuous phase of a hydrophobic substance. The vaccine is particularly effective in eliciting the production of antibodies that recognize epitopes of native proteins. | 04-10-2014 |
Robert William Brown, Arnprior CA
Patent application number | Description | Published |
---|---|---|
20100216430 | CONTENT-BASED PUBLICATION-SUBSCRIPTION SYSTEM FOR PRESENCE INFORMATION - A method for content-based presence communication entails receiving presence information, storing the presence information in any arbitrary data format, validating a subscription request to subscribe to the presence information by determining if information contained within the subscription request represents an authorized subscription relationship, and communicating the presence information when the presence information matches the subscription expression. | 08-26-2010 |
20100217614 | METHOD AND SYSTEM FOR UPDATING A VIRTUAL BUSINESS CARD - A method of updating a virtual business card entails receiving the virtual business card, subscribing to an update service that notifies of updates made to the virtual business card, and receiving a notification that an update to the virtual business card has been published. By publishing updates, contacts who subscribe to the business card receive notifications whenever the business card is updated. | 08-26-2010 |
20100217615 | SUBSCRIPTION MANAGEMENT FOR A CONTENT-BASED PRESENCE SERVICE - A method for managing a subscription to content-based presence information entails receiving a subscription-suspension message from a device at a presence service, identifying the subscription associated with the subscription-suspension message, suspending the subscription, and sending a response from the presence service to the device to notify the device that the subscription has been suspended. Suspending the subscription may involve accumulating notifications in a persistent data store. The method may further involve receiving a subscription-resumption message at the presence service to resume the subscription that was suspended. | 08-26-2010 |
20100217982 | METHOD AND SYSTEM FOR REGISTERING A PRESENCE USER WITH A PRESENCE SERVICE - A method, performed by a registrar of a presence service, for registering a user with a presence service. The method entails negotiating a key with a client device operated by the user in order to establish an encrypted communications channel between the client device and the registrar via a proxy node, authenticating the user by exchanging messages through the encrypted communications channel and through a separate e-mail channel, binding a universally unique identifier identifying the user with one particular function node that is interposed between the proxy node and a publish-subscribe subsystem of the presence service and creating a user profile for the user and storing the user profile in a persistent data store. | 08-26-2010 |
20100223333 | METHOD AND SYSTEM FOR DISTRIBUTION OF PRESENCE INFORMATION - A method and system for distributing data between a first user and a second user by detecting direct or indirect communication between the first user and the second user, creating an entry for the second user in a roster for the first user, populating the entry for the second user in the roster of the first user with data elements and attributes of the data elements, the data elements and attributes of the data elements indicating what data can be shared with the second user and how the data is to be shared and utilizing the roster of the first user to distribute data reflecting the first user to the second user. | 09-02-2010 |
20120059787 | Dynamically Manipulating An Emoticon or Avatar - Graphical user representations, such as emoticons or avatars, used to convey mood and emotion, can be dynamically modified and manipulated, e.g. by squeezing, rotating, distorting, colouring, etc. This enables a user to customize or tailor an existing emoticon to better reflect the user's current mood or emotion. For example, a user may insert a smiley face emoticon | 03-08-2012 |
R. Stanley Brown, Kingston CA
Patent application number | Description | Published |
---|---|---|
20100202950 | Method of Preparing Heterogeneous Catalysts - Efficient heterogeneous catalysts were prepared by derivatization and palladation of commercially available chloromethylated polystyrene, and derivatization and palladation of functionalized silica gels with benzylchloride pendant groups. Both polymer based and silica based heterogeneous catalysts exhibited catalytic activity. Catalytic activity was studied using methanolysis of commercially available P═S pesticides. Catalytic activity of catalysts immobilized on silica gel was greater than catalyst immobilized on polymer. | 08-12-2010 |
20110253580 | Method of Decomposing Organophosphorus Compounds - Methods and kits for decomposing organophosphorus compounds in non-aqueous media at ambient conditions are described. Insecticides, pesticides, and chemical warfare agents can be quickly decomposed to non-toxic products. The method comprises combining the organophosphorus compound with a non-aqueous solution, preferably an alcohol, comprising metal ions and at least a trace amount of alkoxide ions. In a first preferred embodiment, the metal ion is a lanthanum ion. In a second preferred embodiment, the metal ion is a transition metal. | 10-20-2011 |
R. Stephen Brown, Kingston CA
Patent application number | Description | Published |
---|---|---|
20090117600 | Detection of biological molecules by differential partitioning of enzyme substrates and products - This invention relates to a method and apparatus for detecting a biological molecule associated with enzyme activity in a sample. The invention is applicable to detecting a microorganism associated with an enzyme in a sample such as water, food, soil, or a biological sample. According to a preferred embodiment of the method of the invention, a sample containing an enzyme of interest or a microorganism associated with the enzyme is combined with a suitable substrate, and a fluorescent product of the enzyme-substrate reaction is selectively detected. The fluorescent product is detected with a partitioning element or optical probe/partitioning element of the invention. In one embodiment the partitioning element provides for partitioning of only the fluorescent product molecule into the probe. The invention also provides an automated system for monitoring for biological contamination of water or other samples. | 05-07-2009 |
20130105377 | Water with Switchable Ionic Strength | 05-02-2013 |
20130177937 | CONTAINER, A CLOSURE FOR A CONTAINER, AND A BASE FOR A CONTAINER - A container, comprising: a body; and, a closure; wherein the closure has a lid hinged to a ring mounted on the body, the lid moveable from an open position to a closed position; wherein the lid has a tab hinged thereto for: inserting into and engaging a slot formed in the ring as the lid is moved to the closed position from the open position to thereby lock the lid in the closed position; or, receiving and engaging a pin head of a pin mounted on the ring in a hole formed in the tab to thereby hold the lid in the closed position, the pin configured to detach from the ring when the tab and lid are returned to the opened position. | 07-11-2013 |
20130217040 | METHOD AND SYSTEM FOR DETECTING BIOLOGICAL MOLECULES IN SAMPLES - A system for detecting presence of an organism having an enzyme in a sample, comprising: a cartridge for containing the sample and a substrate such that the enzyme can react with the substrate to produce a biological molecule; a partitioning element mounted in a recess in a base of the cartridge, the partitioning element allowing partitioning of the biological molecule thereinto; a light source for irradiating the biological molecule partitioned into the partitioning element; and, a detector for detecting fluorescence of the biological molecule partitioned into the partitioning element, the detected fluorescence being indicative of presence of the organism in the sample; wherein the light source is in a raised cartridge mount of the system that mates with the recess in the base of the cartridge. | 08-22-2013 |
20130217041 | DETECTION OF BIOLOGICAL MOLECULES BY DIFFERENTIAL PARTITIONING OF ENZYME SUBSTRATES AND PRODUCTS - This invention relates to a method and apparatus for detecting a biological molecule associated with enzyme activity in a sample. The invention is applicable to detecting a microorganism associated with an enzyme in a sample such as water, food, soil, or a biological sample. According to a preferred embodiment of the method of the invention, a sample containing an enzyme of interest or a microorganism associated with the enzyme is combined with a suitable substrate, and a fluorescent product of the enzyme-substrate reaction is selectively detected. The fluorescent product is detected with a partitioning element or optical probe/partitioning element of the invention. In one embodiment the partitioning element provides for partitioning of only the fluorescent product molecule into the probe. The invention also provides an automated system for monitoring for biological contamination of water or other samples. | 08-22-2013 |
20140076810 | Systems and Methods for Use of Water with Switchable Ionic Strength - Methods and systems for use of switchable water, which is capable of reversibly switching between an initial ionic strength and an increased ionic strength, is described. The disclosed methods and systems can be used, for example, in distillation-free removal of water from solvents, solutes, or solutions, desalination, clay settling, viscosity switching, etc. Switching from lower to higher ionic strength is readily achieved using low energy methods such as bubbling with C0 | 03-20-2014 |
20140295403 | DETECTION OF BIOLOGICAL MOLECULES BY DIFFERENTIAL PARTITIONING OF ENZYME SUBSTRATES AND PRODUCTS - This invention relates to a method and apparatus for detecting a biological molecule associated with enzyme activity in a sample. The invention is applicable to detecting a microorganism associated with an enzyme in a sample such as water, food, soil, or a biological sample. According to a preferred embodiment of the method of the invention, a sample containing an enzyme of interest or a microorganism associated with the enzyme is combined with a suitable substrate, and a fluorescent product of the enzyme-substrate reaction is selectively detected. The fluorescent product is detected with a partitioning element or optical probe/partitioning element of the invention. In one embodiment the partitioning element provides for partitioning of only the fluorescent product molecule into the probe. The invention also provides an automated system for monitoring for biological contamination of water or other samples. | 10-02-2014 |
Stephen G. Brown, Lasalle CA
Patent application number | Description | Published |
---|---|---|
20080297595 | VISUAL COMMUNICATION SYSTEM - A visual communication system that is suitable for use in connection with a display surface is disclosed. The system includes a camera or other data-capturing device that can be remotely positioned from the display surface. A control unit receives image data from the camera or data-capturing device and processes the image data to create an electronic image of the display surface. | 12-04-2008 |
Stephen John Brown, Calgary CA
Patent application number | Description | Published |
---|---|---|
20110144289 | Multi reactor process - This invention relates to the polymerization of ethylene polymers using a continuously stirred tank reactor (CSTR) that is connected in series to a tubular reactor. The tubular reactor receives a polymer solution from the CSTR. Further polymerization in the tubular reactor improves production efficiencies, particularly with respect to lowering the amount of energy required to recover the polymer and residual comonomer from the solution. The use of tempered i.e. (heated) ethylene in the tubular reactor has been discovered to mitigate gel problems and lower/reduce levels of hexane extractables. | 06-16-2011 |
20120101321 | Ethylene oligomerization - The oligomerization of ethylene using a chromium catalyst having a bridged diphosphine ligand can produce a selective product distribution (to predominantly hexene or predominantly octene/hexene) when activated with an aluminoxane. The oligomerization reaction also produces polymer by product—particularly when the aluminoxane is provided in a non-aromatic solvent. The present invention mitigates this problem. | 04-26-2012 |
20120142989 | HEAT MANAGEMENT IN ETHYLENE OLIGOMERIZATION - The oligomerization of ethylene using a chromium catalyst having a heteroatomic ligand may be used to provide oligomerization products that are selective towards hexene and/or octene. However, such processes also typically produce some polymer as an undesirable by product. The present invention is directed towards improvements in the selective oligomerization of ethylene. | 06-07-2012 |
20120149856 | CATALYST ACTIVATION IN A DUAL REACTOR PROCESS - Catalysts are activated in a dual reactor solution process by adding substoichiometric and superstoichiometric amounts of an ionic activator to an organometallic polymerization catalyst in a first and second reactor respectively. The new activation method allows one to alter process conditions in a favorably way with minimum impact to process economics. The new activation method also provides polymers which give films having improved optical properties. | 06-14-2012 |
20120271087 | Activation for Oligomerization - The oligomerization of ethylene using a chromium catalyst and an aluminoxane activator is well known. The undesired formation of polyethylene as a by-product is also known to occur during prior oligomerization processes. We have discovered that the use of an aluminoxane that is prepared by non-hydrolytic means provides a highly productive activator (co-catalyst) for ethylene oligomerization and mitigates the undesired formation of by-product polyethylene. | 10-25-2012 |
20140142360 | BULK ETHYLENE OLIGOMERIZATION USING A LOW CONCENTRATION OF CHROMIUM CATALYST AND THREE-PART ACTIVATOR - This invention enables the “bulk” oligomerization of ethylene (i.e. the oligomerization of ethylene in the presence of the oligomer product) using a catalyst system comprising 1) a very low concentration of a chromium catalyst and 2) a three part activator. The chromium catalyst contains a diphosphine ligand, preferably a so called P—N—P ligand. The activator includes an aluminoxane, trimethyl aluminum, and triethyl aluminum. | 05-22-2014 |
Steven Cheyene Brown, Toronto CA
Patent application number | Description | Published |
---|---|---|
20120025052 | Aesthetic coasters - An aesthetic coaster (which can also perform other conventional functions, such as paper weights, plant pot bases, art objects, etc.), and a method of making such a coaster, allow the production of a good quality coaster at a reasonable cost. A plastic coaster body having an aesthetic top surface and a recessed bottom surface is made by injection molding the plastic coaster body, then forming a micro layer of metal (e.g. aluminum) on at least the top surface of the plastic coaster body, and then coating at least the metal micro layer on the top surface with a low temperature catalytic lacquer that produces an imitation chrome, silver, brass, platinum, copper, bronze, or gold color. An insert (e.g. of mild steel) having a density significantly greater than the density of the plastic coaster body is inserted into a recess in the bottom surface and substantially permanently adhered within the recess. The insert and recess are covered with a covering (e.g. felt) which will not scratch furniture surfaces. The coaster desirably has about the same weight and feel as a similar sized coaster formed primarily or substantially completely of brass or bronze | 02-02-2012 |
Thane Brown, Kanata CA
Patent application number | Description | Published |
---|---|---|
20100186094 | EMBEDDED SYSTEM ADMINISTRATION AND METHOD THEREFOR - An administration system for use within a server system is provided. The server system having a server that provides host management functions and the server system being able to accept computer cards inserted therein. The administration system comprises a computing system that is inserted in the server system, the computing system having a controller that assumes control over the communications bus. | 07-22-2010 |
Thomas A. Brown, Calgary CA
Patent application number | Description | Published |
---|---|---|
20080302021 | LOCK AND SEAL SYSTEM FOR SLIDING DOORS - Implementations of the present invention relate generally to systems and components for sealing and locking doors, including sliding doors for use with modular walls. A locking system can be configured to secure and release a sliding door. In particular, the locking system can include a sliding door with one or more receiving channels configured to receive a pin extending from a floor's surface. A locking mechanism can be included and configured to selectively drive a shaft to capture and release a pin that has been received by the receiving channel. The sealing system is configured to seal a gap between a modular wall and an adjacent sliding door. In particular, the sealing system can include a connector configured to connect trim to a wall panel wherein the connector includes an integrated gasket seal configured to seal the gap. | 12-11-2008 |
Torr Brown, North Vancouver CA
Patent application number | Description | Published |
---|---|---|
20090045599 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 02-19-2009 |
20110068553 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 03-24-2011 |
20120104724 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 05-03-2012 |
20120104726 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 05-03-2012 |
20120119466 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 05-17-2012 |
20130062858 | RECONFIGURABLE TILT WHEELCHAIR - A modular wheelchair assembly is adapted to be reconfigured between a fixed angle of tilt, a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's knees and a dynamically adjustable tilt-in-space configuration with the tilt axis being near the user's center of gravity. The reconfiguration is achieved by modifying a limited number of selectively removable components of the support assembly or the pivot assembly of the wheelchair. | 03-14-2013 |
Wayne Brown, Calgary CA
Patent application number | Description | Published |
---|---|---|
20120000830 | PROCESS FOR UPGRADING HEAVY OIL AND BITUMEN PRODUCTS - A process for upgrading bitumen recovered from an oil reservoir without hydrogen production is particularly useful in field upgrading applications. In this process, recovered bitumen enters a fractionator and is contacted with heated gases from a fluidized bed reactor. The bitumen and heated gases are fractionated into segregated products including at least a liquid pitch, unstable fractions, and an upgraded liquid product. The liquid pitch is introduced into the reactor to produce a vapor phase liquid product; the reactor comprises solid particles moving through the reactor and a fluidizing gas fluidizing the solid particles at a conversion temperature which is suitable for facilitating the conversion of at least some of the liquid pitch into the vapor phase liquid product. The heated gases comprising the vapor phase liquid product and fluidizing gas are directed from the reactor to the fractionator to contact the bitumen stream. In this process, enough of the segregated unstable fractions are burned that the liquid product and any remaining unstable fractions meets pipeline specifications without hydrogen treatment of any of the remaining unstable fractions. | 01-05-2012 |
20130341174 | METHOD FOR FEEDING A FLUIDIZED BED COKING REACTOR - A fluidized bed coking reactor apparatus comprises a reaction vessel; a temperature sensor inside the reaction vessel for measuring a reactor temperature, a solids feed mechanism for feeding solid particles into the reactor vessel at a mass flow rate, a feed material feed mechanism for feeding feed material into the reactor at an operating feed rate; and a supervisory controller programmed to determine an upper feed material feed rate of the reactor when operating at the reactor temperature and receiving solid particles at the mass flow rate. The upper feed material feed rate is defined as a feed rate of feed material deposited onto a selected fraction of a fluidized bed of solid particles that causes defluidization in the reactor when the reactor is operating under conditions having a selected degree of backmixing in the fluidized bed, wherein the degree of backmixing is modeled as a selected number of reactors arranged in series and each operating under continuous well-mixed conditions, with the selected number of reactors being an integer between one and infinity. | 12-26-2013 |
William G. Brown, Kingsville CA
Patent application number | Description | Published |
---|---|---|
20090105076 | PRODUCTION AND USE OF ENDOPHYTES AS NOVEL INOCULANTS FOR PROMOTING ENHANCED PLANT VIGOR, HEALTH, GROWTH, YIELD REDUCING ENVIRONMENTAL STRESS AND FOR REDUCING DEPENDENCY ON CHEMICAL PESTICIDES FOR PEST CONTROL - A process and method for the production of endophytes as plant inoculant products, specifically | 04-23-2009 |
Zachary Brown, Vancouver CA
Patent application number | Description | Published |
---|---|---|
20110119203 | Private entity profile network - In private equity and debt funding operations, resource providers define electronic data collection templates to be filled in by prospective resource consumers to form semi-homogeneous profiles. Providers and/or consumers can assign themselves and/or third parties various individualized levels of permissions to access and to perform activities on the profiles. Providers can organize profiles into portfolios to further manage the data. All accesses and activities, such as changes to the data, are tracked and recorded in logs useful for audit purposes. | 05-19-2011 |