Patents by Inventor Paul Delivett

Paul Delivett has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9471549
    Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol.
    Type: Grant
    Filed: November 21, 2012
    Date of Patent: October 18, 2016
    Assignee: APPSENSE LIMITED
    Inventors: Paul Delivett, Richard James Somerfield, James Tupper
  • Patent number: 9460296
    Abstract: Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file using a selective decryption process associated with the secure file storage area. Content of each of the at least one file is protected with an encryption. The method also includes detecting a request by an application program for one of the at least one file. The method further includes determining whether the application program needs to access the content of the requested file. The method also includes, when it is determined that the application program does not need to access the content of the requested file, allowing the application program to access the file content without decrypting the encryption.
    Type: Grant
    Filed: July 19, 2013
    Date of Patent: October 4, 2016
    Assignee: APPSENSE LIMITED
    Inventors: Travis Walton, Paul Delivett
  • Patent number: 9373003
    Abstract: Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted storage. The electronic file is encrypted to generate a new level of encryption for the electronic file using an encryption process that uses encryption data to generate the new level of encryption and to decrypt the new level of encryption. A set of existing encryption data associated with the electronic file is identified, wherein each existing encryption data from the set of existing encryption data is associated with an existing level of encryption already applied to the electronic file. The encryption data is added to the set of existing encryption data associated with the electronic file so that the existing levels of encryption and the new level of encryption can be decrypted.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: June 21, 2016
    Assignee: AppSense Limited
    Inventors: Paul Keith Branton, Paul Delivett
  • Patent number: 9355261
    Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: May 31, 2016
    Assignee: APPSENSE LIMITED
    Inventors: Travis Walton, Richard James Somerfield, Paul Delivett
  • Publication number: 20150379295
    Abstract: Systems and methods are provided for automatically handling multiple levels of encryption and decryption. An electronic file is received to add to encrypted storage. The electronic file is encrypted to generate a new level of encryption for the electronic file using an encryption process that uses encryption data to generate the new level of encryption and to decrypt the new level of encryption. A set of existing encryption data associated with the electronic file is identified, wherein each existing encryption data from the set of existing encryption data is associated with an existing level of encryption already applied to the electronic file. The encryption data is added to the set of existing encryption data associated with the electronic file so that the existing levels of encryption and the new level of encryption can be decrypted.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Paul Keith BRANTON, Paul DELIVETT
  • Patent number: 9215251
    Abstract: Disclosed embodiments of a data protection mechanism can provide secure data management. In particular, the disclosed embodiments provide secure data management mechanisms that can control transfer of data items so that contents of protected data items are not accessible to non-authorized parties. For example, the disclosed system can prevent an application from storing a protected file using a new file name. As another example, the disclosed system can prevent an application from sending a protected file to another computing device over a communication network.
    Type: Grant
    Filed: September 11, 2013
    Date of Patent: December 15, 2015
    Assignee: AppSense Limited
    Inventors: Ian J. McLean, Paul Delivett
  • Publication number: 20150074744
    Abstract: Disclosed embodiments of a data protection mechanism can provide secure data management. In particular, the disclosed embodiments provide secure data management mechanisms that can control transfer of data items so that contents of protected data items are not accessible to non-authorized parties. For example, the disclosed system can prevent an application from storing a protected file using a new file name. As another example, the disclosed system can prevent an application from sending a protected file to another computing device over a communication network.
    Type: Application
    Filed: September 11, 2013
    Publication date: March 12, 2015
    Applicant: APPSENSE LIMITED
    Inventors: Ian James MCLEAN, Paul DELIVETT
  • Patent number: 8959657
    Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 17, 2015
    Assignee: AppSense Limited
    Inventors: Travis Walton, Paul Delivett, Richard James Somerfield
  • Publication number: 20150026460
    Abstract: Systems, methods and media are provided for selective decryption of files. One method includes monitoring a secure file storage area including at least one file using a selective decryption process associated with the secure file storage area. Content of each of the at least one file is protected with an encryption. The method also includes detecting a request by an application program for one of the at least one file. The method further includes determining whether the application program needs to access the content of the requested file. The method also includes, when it is determined that the application program does not need to access the content of the requested file, allowing the application program to access the file content without decrypting the encryption.
    Type: Application
    Filed: July 19, 2013
    Publication date: January 22, 2015
    Applicant: AppSense Limited
    Inventors: Travis WALTON, Paul DELIVETT
  • Publication number: 20140282820
    Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: APPSENSE LIMITED
    Inventors: Travis WALTON, Richard James SOMERFIELD, Paul DELIVETT
  • Publication number: 20140283107
    Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: APPSENSE LIMITED
    Inventors: Travis WALTON, Paul DELIVETT, Richard James SOMERFIELD
  • Publication number: 20140143663
    Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. A client can perform contextual based truncations of character strings using at least one truncation symbol when the characters strings extend beyond the width of an output display. The client can analyze the character strings for differences and similarities. The client can then generate the truncated representations of the character strings based on predetermined parameters for truncation. The truncated representations can include similar and different portions of the character strings that maintain descriptive information that differentiates them.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: APPSENSE LIMITED
    Inventors: Paul DELIVETT, Richard James SOMERFIELD, James TUPPER
  • Publication number: 20140143662
    Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: APPSENSE LIMITED
    Inventors: Paul DELIVETT, Richard James SOMERFIELD, James TUPPER
  • Publication number: 20140139530
    Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal. For example, the client can display a selected character string in its entirety or an excerpt of the truncated representation. The signal can be detected from a touchscreen or input device. This allows a user to view those portions of the selected character string that may be obscured by the truncation symbol.
    Type: Application
    Filed: November 21, 2012
    Publication date: May 22, 2014
    Applicant: AppSense Limited
    Inventors: Paul Delivett, Richard James Somerfield, James Tupper