Hawkes
Brad Hawkes, New South Wales AU
Patent application number | Description | Published |
---|---|---|
20110093512 | SYSTEMS AND METHODS FOR MANAGING BUSINESS OBJECTS - Described herein are systems and methods for managing business objects. In overview, various embodiments provide software, hardware and methodologies underlying a data driven application including a data driven business layer, optionally in combination with a data driven user interface and presentation layer. In overview, an object-oriented computer program includes a presentation layer, a business layer, and a database. The business layer provides business objects, which effectively interpose the presentation layer with the database. Substantive business object data is defined within the database, and loaded to the business layer following the receipt of a page call-up request at the presentation layer. | 04-21-2011 |
Meghan Elizabeth Hawkes, Ottawa CA
Patent application number | Description | Published |
---|---|---|
20140141484 | Multiple Hybrid Immunoassay - The invention relates to compositions and methods for the immunoassay of an analyte of interest. The analyte is detected in an immunoassay using three or more antibodies, wherein each antibody specifically binds to a different epitope on the analyte. When the analyte of interest in a clinical marker for an acute disease, the detection of the analyte by immunoassay is a diagnosis of the occurrence of the disease. | 05-22-2014 |
20160123976 | MULTIPLE HYBRID IMMUNOASSAY - The invention relates to compositions and methods for the immunoassay of an analyte of interest. The analyte is detected in an immunoassay using three or more antibodies, where in each antibody specifically binds to a different epitope on the analyte. When the analyte of interest in a clinical marker for an acute disease, the detection of the analyte by immunoassay is a diagnosis of the occurrence of the disease. | 05-05-2016 |
Nicholas C. Hawkes, Markham CA
Patent application number | Description | Published |
---|---|---|
20140282026 | OBJECT AND CONNECTION ORGANIZATION IN A DIAGRAM - A computer program product includes computer usable program code configured to present, on a display, a diagram. The presenting of the diagram includes presenting a first row that defines a location where objects of a first object type can be created, wherein a first ghosted object of a first object type is displayed in the first row. The first ghosted object represents a first creatable object of the first object type. The presenting of the diagram includes presenting a second row that defines a location where objects of a second object type can be created. The computer program product is configured to, responsive to a first input to create a first object of the first object type in the first row, creating the first object of the first object type. | 09-18-2014 |
20140282028 | OBJECT AND CONNECTION ORGANIZATION IN A DIAGRAM - A method includes presenting, on a display, a diagram. The presenting of the diagram includes presenting a first row that defines a location where objects of a first object type can be created, wherein a first ghosted object of a first object type is displayed in the first row. The first ghosted object represents a first creatable object of the first object type. The presenting of the diagram includes presenting a second row that defines a location where objects of a second object type can be created. The method also includes responsive to a first input to create a first object of the first object type in the first row, creating the first object of the first object type. Also in response to the first input, the method includes graphically changing the first ghosted object into the first object and presenting a second ghosted object of the second object type in the second row. | 09-18-2014 |
Philip Hawkes, Valley Heights AU
Patent application number | Description | Published |
---|---|---|
20160135011 | METHODS AND APPARATUS FOR IDENTIFYING AND AUTHORIZING LOCATION SERVERS AND LOCATION SERVICES - Techniques are provided which may be implemented in various methods, apparatus, and/or articles of manufacture to allow a mobile device to obtain certain location service(s) and/or the like from one or more computing devices that have been authorized for use. For example, in certain implementations, an authorizing location server may obtain a first message from a mobile device indicating a first set of location servers, determine a second set of location servers based, at least in part, on the first set of location servers, and transmit a second message to the mobile device indicating that the second set of location servers are authorized for location service related access by the mobile device. | 05-12-2016 |
Philip Hawkes, Burwood AU
Patent application number | Description | Published |
---|---|---|
20080226073 | METHOD AND APPARATUS FOR SECURITY IN A DATA PROCESSING SYSTEM - Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein sufficient information to calculate the short-time key is provided in an Internet protocol header preceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key. | 09-18-2008 |
Philip Hawkes, Warrimoo AU
Patent application number | Description | Published |
---|---|---|
20130006868 | METHOD AND APPARATUS FOR DETERMINING AND UTILIZING VALUE OF DIGITAL ASSETS - Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison. | 01-03-2013 |
20130038461 | DYNAMIC ROAD MARKERS TO PROVIDE VISUAL FEEDBACK AS TO VEHICLE SPEED - Disclosed is an apparatus, system, and method to utilize road markers to control vehicle speeds. The road markers may be commanded to emit a light for a pre-determined period of time. Further, the road markers may be controlled such that they are commanded to emit the light based upon a timing sequence associated with a desired speed so that the road markers emit light in a strobe pattern. In this way, if a vehicle is traveling at the desired speed, then the strobe pattern appears static to a driver of the vehicle. Additionally, a message may be transmitted from a traffic authority to increase or decrease the timing sequence of the strobe pattern to increase or decrease the speed to the desired speed. | 02-14-2013 |
20130275760 | Method for configuring an internal entity of a remote station with a certificate - Disclosed is a method for configuring an internal entity of a WiFi-enabled remote station with a certificate. In the method, the remote station receives the certificate in at least one message from a registrar acting as a certificate authority. The remote station provides the certificate to the internal entity. The internal entity securely communicates with an external entity based on the certificate. | 10-17-2013 |
Philip M. Hawkes, Burwood AU
Patent application number | Description | Published |
---|---|---|
20080260164 | Method and Application for Authentication of a Wireless Communication Using an Expiration Marker - Systems and methods of securing wireless communications between a network and a subscriber station are disclosed. One embodiment creates authentication triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them. | 10-23-2008 |
Philip Michael Hawkes, Warimoo AU
Patent application number | Description | Published |
---|---|---|
20130212649 | SECURE MECHANISM FOR OBTAINING AUTHORIZATION FOR A DISCOVERED LOCATION SERVER - Methods and apparatuses are presented for obtaining authorized access from a terminal to a discovered location server. The methods may include switching from a first network that does not support authenticated access from the terminal to a home location server to a second network that does support authenticated access from the terminal to the home location server. Authenticated access to the home location server may be obtained using the second network. Authorization for the discovered location server may then be obtained from the home location server. The terminal may then switch from the second network back to the first network. The terminal may then access the discovered location server using the first network based on the obtained authorization from the home location server. | 08-15-2013 |
20130212663 | ENABLING SECURE ACCESS TO A DISCOVERED LOCATION SERVER FOR A MOBILE DEVICE - A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client. The client may receive a client token, wherein the client token contains data associated with the first server, the second server, the client, and a digital signature. Then, the client may request secure communication access to the first server, wherein the request includes transferring the client token to the first server. Finally, the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token. | 08-15-2013 |
20150031323 | APPARATUS AND METHOD TO IMPLEMENT A QUEUING PROCESS BY A POSITION ENABLED MOBILE DEVICE TO PRIORITIZE THE LEGITIMACY OF INITIATION MESSAGES FROM EMERGENCY LOCATION PLATFORMS - Disclosed is an apparatus and method to implement a queuing process by a position enabled mobile device to prioritize the legitimacy of initiation messages. The method may include: transmitting an emergency call; receiving at least one initiation message; and assigning the received initiation message to one of a plurality of priority queues, wherein the assignment to the priority queue is based upon at least one of an identifier of an emergency location platform or a whitelist. | 01-29-2015 |
20150373540 | SECURE MECHANISM FOR OBTAINING AUTHORIZATION FOR A DISCOVERED LOCATION SERVER - Methods and apparatuses are presented for use in a terminal to access a discovered location server. The methods may include in response to a determination that a first network does not support authenticated access from the terminal to a home location server, obtaining authenticated access to the home location server using a second network that does support authenticated access to the home location server by the terminal. In response to obtaining authorization for the discovered location server from the home location server, the terminal may access the discovered location server using the first network. | 12-24-2015 |
Philip Michael Hawkes, New South Wales AU
Patent application number | Description | Published |
---|---|---|
20110191835 | METHOD AND APPARATUS FOR IDENTITY REUSE FOR COMMUNICATIONS DEVICES - An apparatus and method for identity reuse operable in a communications system, the method comprising selecting an identity value for a device; registering the device onto a network with the selected identity value; determining if the registration of the device is successful; and establishing a communication session for the device and deregistering the selected identity value upon termination of the communication session if the registration is successful, or determining whether to try a different identity value if the registration is not successful. In one aspect, the apparatus and method further comprising waiting a predetermined time period before either re-registering with the selected identity value or registering with the different identity value. | 08-04-2011 |