Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Good Technology Corporation patents


Recent patent applications related to Good Technology Corporation. Good Technology Corporation is listed as an Agent/Assignee. Note: Good Technology Corporation may have other listings under different names/spellings. We're not affiliated with Good Technology Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "G" | Good Technology Corporation-related inventors


Message service

Systems and methods for monitoring a plurality of mailboxes by a plurality of computer nodes. The plurality of computer nodes comprises a first computer node and a second computer node. ... Good Technology Corporation

Access to software applications

A computing device stores a set of executable code comprising first, second and third subsets of data. The first and second subsets of data comprise first and second encrypted data, respectively. ... Good Technology Corporation

Controlling access to application data

A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing device. The method comprises: storing data comprising, for each of a plurality of access levels associated with the application, first data indicative of a combination of one or more credentials associated with the respective access level and an access level key corresponding to the respective access level, the access level key being encrypted by the combination of one or more credentials associated with the respective access level; determining, based on the first data, an access level in the plurality of access levels corresponding to a combination of one or more credentials available to the application; decrypting the access level key in the stored data corresponding to the determined access level using the combination of one or more credentials available to the application; and providing access to encrypted application data associated with the application and corresponding to the determined access level using, at least in part, the decrypted access level key corresponding to the determined access level.. ... Good Technology Corporation

Monitoring user activity

A method for monitoring user activity in respect of a plurality of applications on a computing device. The method comprises storing, by a first application running on the computing device, a first timestamp indicating the time that user activity was last detected with respect to the first application. ... Good Technology Corporation

Shared lock state

A method of managing a plurality of applications on a computing device. The method comprises receiving, by a first application running on the computing device, a lock message comprising a timestamp and a digital signature associated with the timestamp, from a second application miming on the computing device. ... Good Technology Corporation

Systems and methods for facilitating service provision between applications

Embodiments of the invention are concerned with facilitating service provision between software applications. In embodiments of the invention, a first user terminal includes an application which causes the first user terminal to delegate execution of a first service to a different application. ... Good Technology Corporation

System and method for preventing access to data on a compromised remote device

This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.. . ... Good Technology Corporation

Methods for remote configuration of software applications

Methods for remotely configuring application software on a user device are described. The application software defines at least one operating parameter having a set of pre-defined values which change the way the application interacts with the operating system. ... Good Technology Corporation

Managing access to resources

Methods and systems for managing access to a resource by one of a plurality of applications. The method comprises: storing, in a first storage area associated with a first application, a first credential for use in accessing the resource; receiving, at a second application, a message comprising data for determining that the first application stores a validated credential for accessing the resource; sending a request for the validated credential from the second application to the first application; receiving the first credential at the second application from the first application in response to the request sent; and storing the first credential in a second storage area associated with the second application; wherein the message received at the second application is received from a server system, remote from the plurality of applications, which maintains data indicating a subset of the plurality of applications which store respective validated credentials for accessing the resource.. ... Good Technology Corporation

Controlling access to a resource via a computing device

The present invention provides methods of, and computer programs and systems for, controlling access to a resource via a computing device configured to perform a method that enables new encrypted versions of a key, encrypted with code values in a sequence of code values that are valid at a future time, to be provided and made available for future performance of the method. This in turn enables a method of user verification that does not require access to a remote server in order to provide one-time passcode verification, and so provides an offline one-tome passcode authentication method that is self-sustaining.. ... Good Technology Corporation

Methods and system to create applications and distribute applications to a remote device

A remotely accessible integrated development environment, and a sub-system for deploying applications to a remote device is disclosed. The sub-system may further comprise a rendering engine which is configured based upon a platform of the remote device, wherein the rendering engine is configured to communicate with, and receive applications from, a remotely accessible application server.. ... Good Technology Corporation








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Good Technology Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Good Technology Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###