Jonathan Wood
Burglar Alarm in Orem, UT

License number
Utah 8671366-6502
Issued Date
Aug 6, 2013
Expiration Date
Mar 31, 2017
Category
Burglar Alarm
Type
Burglar Alarm Company Agent
Address
Address
Orem, UT

Personal information

See more information about Jonathan Wood at radaris.com
Name
Address
Phone
Jonathan Wood
4892 Thrush Hill Dr, West Jordan, UT 84081
Jonathan Wood, age 52
3447 W Via Felicidad Way, South Jordan, UT 84095
(801) 523-5809
Jonathan Wood
3543 Valley Heights Dr, Salt Lake Cty, UT 84129
Jonathan Wood, age 57
350 S Elizabeth St APT 1, Salt Lake Cty, UT 84102
Jonathan Wood, age 62
3543 W Valley Heights Dr APT 3, Salt Lake Cty, UT 84129

Professional information

See more information about Jonathan Wood at trustoria.com
Jonathan Wood Photo 1
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
7353533, Apr 1, 2008
Filed:
Apr 11, 2003
Appl. No.:
10/413443
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/00, G06F 17/00, H04K 1/00, G06F 15/16, G06F 17/30, G06F 7/04, G06F 7/58
US Classification:
726 1, 713153, 726 11, 379 1503, 379 2901, 379 3201, 37920112, 455 25
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 2
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
2008010, May 8, 2008
Filed:
Oct 29, 2007
Appl. No.:
11/926371
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
International Classification:
G06F 11/07
US Classification:
714037000, 714E11024
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 3
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
8020192, Sep 13, 2011
Filed:
Oct 29, 2007
Appl. No.:
11/926454
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K. Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
International Classification:
H04L 29/06, G06F 7/04, G06F 17/00
US Classification:
726 1, 726 11, 726 23, 380258, 709221, 709229, 713154
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 4
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
7478420, Jan 13, 2009
Filed:
Oct 29, 2007
Appl. No.:
11/926436
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K. Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/32, H04Q 7/32, G06F 17/00, H04M 3/22, H04Q 7/34
US Classification:
726 1, 726 11, 713153, 379 1503, 379 2901, 379 3201, 37920112, 4554561, 380258
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 5
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
7526800, Apr 28, 2009
Filed:
Jul 21, 2004
Appl. No.:
10/897060
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K. Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04M 3/24, G06F 7/04
US Classification:
726 11, 726 1, 713153, 379 1503, 379 2901, 379 3201, 37920112, 455 25
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 6
Administration Of Protection Of Data Accessible By A Mobile Device

Administration Of Protection Of Data Accessible By A Mobile Device

US Patent:
7636936, Dec 22, 2009
Filed:
Oct 29, 2007
Appl. No.:
11/926314
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 17/30, G06F 15/16, H04L 29/06, H04K 1/00
US Classification:
726 1, 726 11, 726 17, 713153, 380258, 379 1503, 379 2901, 379 3201, 37920112
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.


Jonathan Wood Photo 7
Protection Of Data Accessible By A Mobile Device

Protection Of Data Accessible By A Mobile Device

US Patent:
7308703, Dec 11, 2007
Filed:
Feb 28, 2003
Appl. No.:
10/377265
Inventors:
Michael Wright - Sandy UT, US
Peter Boucher - Orem UT, US
Gabe Nault - Draper UT, US
Merrill Smith - Riverton UT, US
Sterling K Jacobson - Saratoga Springs UT, US
Jonathan Wood - Orem UT, US
Robert Mims - West Valley City UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 17/00, H04K 1/00, H04L 9/00, G06F 17/30, G06F 11/00, H04L 9/32
US Classification:
726 1, 726 29, 726 35, 726 11, 380258
Abstract:
Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.