Patents by Inventor Paul Delivett
Paul Delivett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9471549Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol.Type: GrantFiled: November 21, 2012Date of Patent: October 18, 2016Assignee: APPSENSE LIMITEDInventors: Paul Delivett, Richard James Somerfield, James Tupper
-
Patent number: 9460296Abstract: Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file using a selective decryption process associated with the secure file storage area. Content of each of the at least one file is protected with an encryption. The method also includes detecting a request by an application program for one of the at least one file. The method further includes determining whether the application program needs to access the content of the requested file. The method also includes, when it is determined that the application program does not need to access the content of the requested file, allowing the application program to access the file content without decrypting the encryption.Type: GrantFiled: July 19, 2013Date of Patent: October 4, 2016Assignee: APPSENSE LIMITEDInventors: Travis Walton, Paul Delivett
-
Patent number: 9373003Abstract: Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted storage. The electronic file is encrypted to generate a new level of encryption for the electronic file using an encryption process that uses encryption data to generate the new level of encryption and to decrypt the new level of encryption. A set of existing encryption data associated with the electronic file is identified, wherein each existing encryption data from the set of existing encryption data is associated with an existing level of encryption already applied to the electronic file. The encryption data is added to the set of existing encryption data associated with the electronic file so that the existing levels of encryption and the new level of encryption can be decrypted.Type: GrantFiled: June 27, 2014Date of Patent: June 21, 2016Assignee: AppSense LimitedInventors: Paul Keith Branton, Paul Delivett
-
Patent number: 9355261Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.Type: GrantFiled: March 14, 2013Date of Patent: May 31, 2016Assignee: APPSENSE LIMITEDInventors: Travis Walton, Richard James Somerfield, Paul Delivett
-
Publication number: 20150379295Abstract: Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted storage. The electronic file is encrypted to generate a new level of encryption for the electronic file using an encryption process that uses encryption data to generate the new level of encryption and to decrypt the new level of encryption. A set of existing encryption data associated with the electronic file is identified, wherein each existing encryption data from the set of existing encryption data is associated with an existing level of encryption already applied to the electronic file. The encryption data is added to the set of existing encryption data associated with the electronic file so that the existing levels of encryption and the new level of encryption can be decrypted.Type: ApplicationFiled: June 27, 2014Publication date: December 31, 2015Inventors: Paul Keith BRANTON, Paul DELIVETT
-
Patent number: 9215251Abstract: Disclosed embodiments of a data protection mechanism can provide secure data management. In particular, the disclosed embodiments provide secure data management mechanisms that can control transfer of data items so that contents of protected data items are not accessible to non-authorized parties. For example, the disclosed system can prevent an application from storing a protected file using a new file name. As another example, the disclosed system can prevent an application from sending a protected file to another computing device over a communication network.Type: GrantFiled: September 11, 2013Date of Patent: December 15, 2015Assignee: AppSense LimitedInventors: Ian J. McLean, Paul Delivett
-
Publication number: 20150074744Abstract: Disclosed embodiments of a data protection mechanism can provide secure data management. In particular, the disclosed embodiments provide secure data management mechanisms that can control transfer of data items so that contents of protected data items are not accessible to non-authorized parties. For example, the disclosed system can prevent an application from storing a protected file using a new file name. As another example, the disclosed system can prevent an application from sending a protected file to another computing device over a communication network.Type: ApplicationFiled: September 11, 2013Publication date: March 12, 2015Applicant: APPSENSE LIMITEDInventors: Ian James MCLEAN, Paul DELIVETT
-
Patent number: 8959657Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: AppSense LimitedInventors: Travis Walton, Paul Delivett, Richard James Somerfield
-
Publication number: 20150026460Abstract: Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file using a selective decryption process associated with the secure file storage area. Content of each of the at least one file is protected with an encryption. The method also includes detecting a request by an application program for one of the at least one file. The method further includes determining whether the application program needs to access the content of the requested file. The method also includes, when it is determined that the application program does not need to access the content of the requested file, allowing the application program to access the file content without decrypting the encryption.Type: ApplicationFiled: July 19, 2013Publication date: January 22, 2015Applicant: AppSense LimitedInventors: Travis WALTON, Paul DELIVETT
-
Publication number: 20140282820Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: APPSENSE LIMITEDInventors: Travis WALTON, Richard James SOMERFIELD, Paul DELIVETT
-
Publication number: 20140283107Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: APPSENSE LIMITEDInventors: Travis WALTON, Paul DELIVETT, Richard James SOMERFIELD
-
Publication number: 20140143663Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. A client can perform contextual based truncations of character strings using at least one truncation symbol when the characters strings extend beyond the width of an output display. The client can analyze the character strings for differences and similarities. The client can then generate the truncated representations of the character strings based on predetermined parameters for truncation. The truncated representations can include similar and different portions of the character strings that maintain descriptive information that differentiates them.Type: ApplicationFiled: November 21, 2012Publication date: May 22, 2014Applicant: APPSENSE LIMITEDInventors: Paul DELIVETT, Richard James SOMERFIELD, James TUPPER
-
Publication number: 20140143662Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol.Type: ApplicationFiled: November 21, 2012Publication date: May 22, 2014Applicant: APPSENSE LIMITEDInventors: Paul DELIVETT, Richard James SOMERFIELD, James TUPPER
-
Publication number: 20140139530Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal. For example, the client can display a selected character string in its entirety or an excerpt of the truncated representation. The signal can be detected from a touchscreen or input device. This allows a user to view those portions of the selected character string that may be obscured by the truncation symbol.Type: ApplicationFiled: November 21, 2012Publication date: May 22, 2014Applicant: AppSense LimitedInventors: Paul Delivett, Richard James Somerfield, James Tupper