Patents by Inventor Peter Boucher

Peter Boucher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7478420
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: January 13, 2009
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080109679
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Application
    Filed: October 29, 2007
    Publication date: May 8, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Patent number: 7353533
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Grant
    Filed: April 11, 2003
    Date of Patent: April 1, 2008
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080077971
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device.
    Type: Application
    Filed: October 29, 2007
    Publication date: March 27, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080052395
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Application
    Filed: October 29, 2007
    Publication date: February 28, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20080046965
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Application
    Filed: October 29, 2007
    Publication date: February 21, 2008
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Patent number: 7308703
    Abstract: Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Grant
    Filed: February 28, 2003
    Date of Patent: December 11, 2007
    Assignee: Novell, Inc.
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20060120526
    Abstract: The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating. The security tool may be either located at the mobile computing device or at the server. The security tool includes a file access module for determining whether files are visible or accessible. The file access module comprises a tag generator, an association module, and a policy enforcement module. The tag generator creates source information for the file being accessed and the policy enforcement module determines what actions, if any, can be performed on the file and under what conditions such as location and network environment, type of file and other factors.
    Type: Application
    Filed: January 11, 2006
    Publication date: June 8, 2006
    Inventors: Peter Boucher, Michael Wright, Tim Cranny, Gabe Nault, Merrill Smith
  • Publication number: 20060094400
    Abstract: The present invention filters access points presented to a user and locks onto an access point. The present invention includes an access point filtering unit and an access point locking unit. The access point filtering unit determines the access points that are accessible by a client device and then filters them to present only the access points that are acceptable to under a security policy in force. The access point locking unit has a plurality of operating modes and can lock onto a user selected access point, a security policy prescribed access point, or the access point with the best signal profile. The present invention also includes several methods such as: a method for filtering access points for presentation to the user, a method for locking onto an access point selected by the user, a method for locking onto an access point with the best signal profile, and a method for locking onto an access point prescribed by a security policy for a given location.
    Type: Application
    Filed: July 7, 2005
    Publication date: May 4, 2006
    Inventors: Brent Beachem, Peter Boucher, Gabe Nault, Richard Rollins, Jonathan Wood, Michael Wright
  • Publication number: 20060001721
    Abstract: Structures and methods are disclosed for at least partially forming an image on a media disposed on a platen, directing air from a dryer at the platen, and circulating the air from the platen back to the dryer.
    Type: Application
    Filed: July 2, 2004
    Publication date: January 5, 2006
    Inventors: Robert Yraceburu, Bryan Bihlmaier, Stephen McNally, David Whalen, Peter Boucher
  • Publication number: 20050055578
    Abstract: The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
    Type: Application
    Filed: July 21, 2004
    Publication date: March 10, 2005
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20040123150
    Abstract: Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.
    Type: Application
    Filed: February 28, 2003
    Publication date: June 24, 2004
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Publication number: 20040123153
    Abstract: The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.
    Type: Application
    Filed: April 11, 2003
    Publication date: June 24, 2004
    Inventors: Michael Wright, Peter Boucher, Gabe Nault, Merrill Smith, Sterling K. Jacobson, Jonathan Wood, Robert Mims
  • Patent number: 6655679
    Abstract: Apparatus for advancing media through a hardcopy device includes a cylindrical guide wheel having a first radius mounted on a shaft having an axis transverse to a media feed path axis. A guide surface is spaced apart from the guide wheel and defines a media feed path between the guide wheel and the guide surface. A drive wheel having an extended portion that is concentric with the guide wheel, and which has a greater radius than the first radius is fixed to the shaft. A pinch roller communicates with the media feed path.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: December 2, 2003
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Peter Boucher, Vance M. Stephens
  • Publication number: 20030141657
    Abstract: Apparatus for advancing media through a hardcopy device includes a cylindrical guide wheel having a first radius mounted on a shaft having an axis transverse to a media feed path axis. A guide surface is spaced apart from the guide wheel and defines a media feed path between the guide wheel and the guide surface. A drive wheel having an extended portion that is concentric with the guide wheel, and which has a greater radius than the first radius is fixed to the shaft. A pinch roller communicates with the media feed path.
    Type: Application
    Filed: January 31, 2002
    Publication date: July 31, 2003
    Inventors: Peter Boucher, Vance M. Stephens