Patents by Inventor Christopher Burchett

Christopher Burchett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10157286
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: December 18, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Patent number: 10089482
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: October 2, 2018
    Assignee: DELL PRODUCTS LP
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039378
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039379
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with one or more policy/rule identifiers that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: December 18, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Publication number: 20170039376
    Abstract: Aspects of the present invention provide the ability to enforce access methods on data based upon a policy or policies identified within the metadata of a file. The data is self-protected by including or being wrapped with policies/rules that act as a form of body armor to the data when in transit or in different situations. In embodiments, access is only granted upon successful authentication and compliance with the identified policy or policies. In embodiments, depending upon the conditions and policies, varying level access may be granted. In embodiments, depending upon the conditions and policies, the system may take one or more mitigations or remedial access levels, such as containerizing, sandboxing, granting limited access, or erasing the data.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Applicant: DELL PRODUCTS L.P.
    Inventors: Chad Skipper, Elliot D. Lewis, David Konetski, Christopher Burchett, Richard William Schuckle, James Michael Burke, Warren Wade Robbins, Carrie Elaine Gates
  • Patent number: 9160535
    Abstract: Embodiments of systems and methods for providing anonymous cloud encryption are provided. One embodiment of a method for providing anonymous cloud encryption includes communicating an anonymizing token to a key broker. Additionally, the method may include communicating at least one encryption key associated with the anonymizing token to the key broker. The method may also include conducting a secure anonymous transaction with a cloud service using at least one of the encryption keys associated with the anonymizing token.
    Type: Grant
    Filed: March 19, 2013
    Date of Patent: October 13, 2015
    Assignee: Dell Inc
    Inventors: Christopher Burchett, Warren Robbins, Richard E Phillips
  • Patent number: 9110963
    Abstract: Embodiments of methods, systems, and services for transparent adaptive file transform are described. In one embodiment a method for transparent adaptive file transform is performed by a data processing device. The method may include automatically detecting a data transfer addressed to an external data storage. The method may also include redirecting data associated with the data transfer to a data transformer. Additionally, the method may include applying one or more data transforms to the data associated with the data transfer to generate a transformed data set. In an embodiment, the method may also include transferring the transformed data set to the external data storage. In one embodiment, the external data storage is a cloud storage facility.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: August 18, 2015
    Assignee: Dell Inc
    Inventors: Christopher Burchett, Warren Robbins, James Michael Burke, James Darrell Testerman, David Albert Consolver
  • Publication number: 20130305054
    Abstract: Embodiments of systems and methods for providing anonymous cloud encryption are provided. One embodiment of a method for providing anonymous cloud encryption includes communicating an anonymizing token to a key broker. Additionally, the method may include communicating at least one encryption key associated with the anonymizing token to the key broker. The method may also include conducting a secure anonymous transaction with a cloud service using at least one of the encryption keys associated with the anonymizing token.
    Type: Application
    Filed: March 19, 2013
    Publication date: November 14, 2013
    Inventors: Christopher Burchett, Warren Robbins, Richard E. Phillips
  • Publication number: 20130268545
    Abstract: Embodiments of methods, systems, and services for transparent adaptive file transform are described. In one embodiment a method for transparent adaptive file transform is performed by a data processing device. The method may include automatically detecting a data transfer addressed to an external data storage. The method may also include redirecting data associated with the data transfer to a data transformer. Additionally, the method may include applying one or more data transforms to the data associated with the data transfer to generate a transformed data set. In an embodiment, the method may also include transferring the transformed data set to the external data storage. In one embodiment, the external data storage is a cloud storage facility.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 10, 2013
    Applicant: Dell Inc.
    Inventors: Christopher Burchett, Warren Robbins, James Michael Burke, James Darrell Testerman, David Albert Consolver
  • Publication number: 20070174909
    Abstract: Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.
    Type: Application
    Filed: February 17, 2006
    Publication date: July 26, 2007
    Applicant: Credant Technologies, Inc.
    Inventors: Christopher Burchett, Jason Jaynes, Bryan Chin, David Consolver
  • Publication number: 20060242685
    Abstract: In a particular embodiment, a wireless security system is disclosed. The wireless security system includes a client module deployed on a wireless device, a network module, and a server module. The client module is adapted to authenticate a wireless device while the wireless device is operating independently from the network module and the server module. In another embodiment, a method of distributing security policy information from a server to a mobile computing device is disclosed. The method includes authentication of a connection between the server and a gatekeeper, sending a policy package to the gatekeeper, initiating data synchronization between the mobile computing device and the gatekeeper, authenticating the mobile computing device, and sending the policy package from the gatekeeper to the mobile computing device.
    Type: Application
    Filed: September 23, 2002
    Publication date: October 26, 2006
    Inventors: Robert Heard, Dwayne Mann, Christopher Burchett, Ian Gordon
  • Publication number: 20060236363
    Abstract: In a particular embodiment, a client module is deployed on a wireless device. The client module comprises a policy database including a list of authorized devices to which the wireless device may communicate. In another embodiment, the client module comprises a policy database including at least two user profiles on a wireless device, such as a personal profile and a business profile.
    Type: Application
    Filed: September 23, 2002
    Publication date: October 19, 2006
    Inventors: Robert Heard, Dwayne Mann, Christopher Burchett, Ian Gordon
  • Publication number: 20060190984
    Abstract: In a particular embodiment, a network module deployed at a wireless network access node is disclosed. The network module comprises a policy database including a list of authorized wireless mobile devices and an agent for enforcing rules of the policy database.
    Type: Application
    Filed: September 23, 2002
    Publication date: August 24, 2006
    Inventors: Robert Heard, Dwayne Mann, Christopher Burchett, Ian Gordon
  • Publication number: 20060147043
    Abstract: In a particular embodiment, a server module deployed on a server is disclosed. The server module is connected to a wireless network access node. The server module includes a database containing user information for multiple wireless devices. Each element in the database is attributable to at least one authorized wireless device and contains at least one type of data file from the following group: (i) wireless connectivity permissions, (ii) authorized wireless device identification, and (iii) authorized network access node information. In another embodiment, a computer memory is disclosed. The computer memory includes a plurality of operating keys for use in connection with security features of a mobile computing device and a root key. The root key is to encrypt the plurality of operating keys. In another embodiment, a method of enforcing security policies at a mobile computing device is provided.
    Type: Application
    Filed: September 23, 2002
    Publication date: July 6, 2006
    Inventors: Dwayne Mann, Robert Heard, Christopher Burchett, Ian Gordon