Patents by Inventor Richard James Somerfield
Richard James Somerfield has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11570064Abstract: An embodiment includes a method of secured, remote device access through dynamic scope adjustment in an incident management system. The method includes receiving an incident report indicative of a technical issue at a first device. Responsive to receipt of the incident report, the method includes determining that the first device is assigned an information technology (IT) support provider and dynamically elevating the first device to a scope of the IT support provider. Following a correction of at least a portion of the technical issue by the IT support provider, the method includes dynamically relegating the first device from the scope to prevent remote access to the first device following the correction.Type: GrantFiled: March 19, 2021Date of Patent: January 31, 2023Assignee: Ivanti, Inc.Inventor: Richard James Somerfield
-
Publication number: 20210377132Abstract: An embodiment includes a method of secured, remote device access through dynamic scope adjustment in an incident management system. The method includes receiving an incident report indicative of a technical issue at a first device. Responsive to receipt of the incident report, the method includes determining that the first device is assigned an information technology (IT) support provider and dynamically elevating the first device to a scope of the IT support provider. Following a correction of at least a portion of the technical issue by the IT support provider, the method includes dynamically relegating the first device from the scope to prevent remote access to the first device following the correction.Type: ApplicationFiled: March 19, 2021Publication date: December 2, 2021Applicant: Ivanti, Inc.Inventor: Richard James Somerfield
-
Patent number: 10291615Abstract: Systems and methods are described for a web event framework. A computerized method includes receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin.Type: GrantFiled: May 13, 2013Date of Patent: May 14, 2019Assignee: Ivanti US LLCInventors: Paul Keith Branton, James Tupper, Richard James Somerfield, Jonathan Rolls
-
Patent number: 10089139Abstract: A method, system and medium can manage embedded content in documents. The method, e.g., includes detecting, at a host device running a host application program, a user's action to initiate editing of content embedded in a document associated with the host application program and querying for the user's content management configuration to determine a target device having an interface suitable for editing the embedded content. If it is determined that the user's configuration specifies a device other than the host device as the target device, the method further includes sending a revision notification to the target device, wherein the notification includes a copy of, or a reference to, the document and receiving an update notification from the target device, wherein the update notification includes one of a copy of or a reference to a latest version of the document including the latest edits made to the embedded content.Type: GrantFiled: January 9, 2013Date of Patent: October 2, 2018Assignee: AppSense US LLCInventor: Richard James Somerfield
-
Patent number: 9542235Abstract: In one embodiment, a non-transitory processor-readable medium stores code representing instructions that when executed cause a processor to obtain a first mutual exclusion object. The first mutual exclusion object can be a write mutual exclusion object associated with a shared resource. The code can further represent instructions that when executed cause the processor to obtain a second mutual exclusion object associated with an object manager module and define a read event object with a name conforming to a predetermined format. The code can further represent instructions that when executed cause the processor to release the second mutual exclusion object, release the first mutual exclusion object, read at least a portion of the shared resource, obtain the second mutual exclusion object, destroy the read event object and release the second mutual exclusion object.Type: GrantFiled: December 14, 2010Date of Patent: January 10, 2017Assignee: AppSense, LimitedInventors: Richard Pointon, Richard James Somerfield
-
Patent number: 9471549Abstract: Systems and methods are provided for displaying and manipulating the display of digital character strings where the length of the character string extends beyond the width of a desired output display. In response to a user request to display a character string, a client can generate a truncated representation of the character string using at least one truncation symbol when the character string extends beyond the width of an output display. A client can modify the display of the truncated representation of the character string in response to detecting a signal corresponding to a change in location of the truncation symbol. The signal can be detected from a touchscreen or input device. This allows a user to view any portion of a selected character string, including those portions that may be obscured by the truncation symbol.Type: GrantFiled: November 21, 2012Date of Patent: October 18, 2016Assignee: APPSENSE LIMITEDInventors: Paul Delivett, Richard James Somerfield, James Tupper
-
Patent number: 9355261Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.Type: GrantFiled: March 14, 2013Date of Patent: May 31, 2016Assignee: APPSENSE LIMITEDInventors: Travis Walton, Richard James Somerfield, Paul Delivett
-
Patent number: 8959657Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: AppSense LimitedInventors: Travis Walton, Paul Delivett, Richard James Somerfield
-
Publication number: 20140337495Abstract: Systems and methods are described for a web event framework. A computerized method includes receiving at a framework plugin an event from a web browser, wherein the framework plugin is coupled to the web browser, generating, by the framework plugin, a framework event based on the event, forwarding the framework event to a framework server coupled to the framework plugin, receiving at the framework server the framework event from the framework plugin, determining, at the framework server, a framework action based on the framework event and a framework policy, forwarding the framework action to the framework plugin, and executing the framework action by the framework plugin.Type: ApplicationFiled: May 13, 2013Publication date: November 13, 2014Applicant: APPSENSE LIMITEDInventors: Paul Keith BRANTON, James TUPPER, Richard James SOMERFIELD, Jonathan ROLLS
-
Publication number: 20140282820Abstract: The disclosed subject matter includes a method. The method includes determining, by a module running on a computer platform in communication with non-transitory computer readable medium having a plurality of security zones, whether an application instance is in a foreground of a user interface for the computer platform. The method further includes determining, by the module, an alert level associated with the application instance in the foreground of the user interface, wherein the alert level includes at least one of a restriction level and an access level. The method also includes providing the alert level to a user of the computer platform using a visual cue displayed on the user interface.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: APPSENSE LIMITEDInventors: Travis WALTON, Richard James SOMERFIELD, Paul DELIVETT
-
Publication number: 20140279873Abstract: Embodiments of the invention include a system, computer program product and computer-implemented method for synchronizing data files on a company computer and performing a process of determining whether a data file should be synchronized with the computer and a process of synchronizing the data file. These process may include the steps of receiving a request for the data file from a user computer; determining whether the data file is located in the computer memory; determining whether the file is stored in a remote computer memory; requesting the data file from the remote computer; and determining a rank for the data file retrieved from the remote computer based whether the data file is associated with a plurality of users accessing the computer.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventor: Richard James SOMERFIELD
-
Publication number: 20140281875Abstract: Techniques are disclosed for providing collaborative annotation of documents. In one embodiment, a computerized method is disclosed for providing collaborative annotation of documents that can include receiving, at a first computer, a first annotation from a first user for an original file; storing the first annotation to a first layer file; uploading the first layer file to a cloud storage server; receiving, at the first computer from the cloud storage server, a second layer file created by a second user; retrieving a second annotation from the second layer file; and concurrently displaying the original file together with the first annotation and the second annotation by overlaying the first annotation and the second annotation over the original file.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: APPSENSE LIMITEDInventors: Paul Keith BRANTON, Richard James SOMERFIELD, Antony WORKMAN
-
Publication number: 20140283107Abstract: The disclosed subject matter includes a method. The method includes identifying an attempt to access, by an application instance running in a user space of an operating system, a first security zone of a computer readable medium, where the first security zone is associated with a first security level. The method further includes determining whether a restriction level associated with the application instance is higher than the first security level, where the restriction level is a function of previous security zones that have been accessed by the application instance. When the restriction level associated with the application instance is higher than the first security level, the method would prevent the application instance from writing to the first security zone. When the restriction level associated with the application instance is not higher than the first security level, the method would authorize the application instance to access the first security zone.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Applicant: APPSENSE LIMITEDInventors: Travis WALTON, Paul DELIVETT, Richard James SOMERFIELD
-
Publication number: 20140258875Abstract: Systems, methods and media for providing multi-dimensional historical navigation controls are provided. One method includes recording, at a mobile device, a first navigation path associated with a data item accessed by a user using the mobile device and enabling a plurality of elements in the first navigation path by generating a plurality of active controls each corresponding to one of the plurality of elements. The method also includes displaying a UI control including the first navigation path that is presented using the enabled elements. The method further includes detecting a selection of one of the enabled elements of the first navigation path when the user selects the active control corresponding to the selected one of the enabled elements and navigating to the site associated with the selected one of the enabled elements by jumping to the site from a first site associated with any other one of the enabled elements.Type: ApplicationFiled: March 11, 2013Publication date: September 11, 2014Applicant: APPSENSE LIMITEDInventor: Richard James SOMERFIELD
-
Publication number: 20140250069Abstract: Systems and methods are provided for selectively synchronizing files. Data is received from a remote storage device indicative of a set of files stored on the remote storage device. A first file from the set of files is downloaded, but not a second file from the set of files. Both (a) the first file and (b) data indicative of the second file are stored in a database. A list of files stored in the database is displayed, the list including the first file and the second file.Type: ApplicationFiled: March 1, 2013Publication date: September 4, 2014Applicant: APPSENSE LIMITEDInventors: Karthik LAKSHMINARAYANAN, Joseph SAIB, Michael MILLS, Richard James SOMERFIELD
-
Publication number: 20140229431Abstract: Embodiments of the invention include a system and method for allowing a company or organization to synchronize data files between a company computer storage, such as a computer memory or a file server, and various user computers networked to the company computer. As such, the system provides a method for determining which data files are most likely to be needed by the user, and copying data files that are the most needed to the user computer. In the process of copying the files to the user computer, the system determines which data files are no longer needed on the user computer, and replaces the data files that are no longer needed on the user computer with new data files that the system has determined are more likely to be needed by the user.Type: ApplicationFiled: February 8, 2013Publication date: August 14, 2014Applicant: APPSENSE LIMITEDInventor: Richard James SOMERFIELD
-
Publication number: 20140195593Abstract: A method, system and medium for managing embedded content in documents are provided. The method, e.g., includes detecting, at a host device running a host application program, a user's action to initiate editing of content embedded in a document associated with the host application program and querying for the user's content management configuration to determine a target device having an interface suitable for editing the embedded content. If it is determined that the user's configuration specifies a device other than the host device as the target device, the method further includes sending a revision notification to the target device, wherein the notification includes a copy of, or a reference to, the document and receiving an update notification from the target device, wherein the update notification includes one of a copy of or a reference to a latest version of the document including the latest edits made to the embedded content.Type: ApplicationFiled: January 9, 2013Publication date: July 10, 2014Applicant: AppSense LimitedInventor: Richard James SOMERFIELD
-
Publication number: 20140188802Abstract: Systems and methods are described for providing pull and paste functionalities. A computerized method of pulling and pasting data among computing devices includes determining attributes of a first computing device, transmitting the attributes of the first computing device to a second computing device, receiving a pulling request for copying information from the first computing device to the second computing device, wherein the information resides on the first computing device, automatically processing the pulling request at the first computing device and automatically generating a response to the pulling request, and automatically sending the response to the pulling request back to the second computing device, wherein the response contains the information.Type: ApplicationFiled: December 31, 2012Publication date: July 3, 2014Applicant: APPSENSE LIMITEDInventors: Paul Keith BRANTON, James TUPPER, Richard James SOMERFIELD
-
Publication number: 20140176562Abstract: Systems and methods are provided for applying a localized software privacy screen over the display of specific applications, files, and/or other content on a computing device. In response to a user request, a computing device can open a window comprising a file or content in an associated application on its output display, determine whether a privacy screen should be applied to the user interface, and apply the privacy screen in a visual layer over the user interface if specified by the settings, rules, and/or permissions. The privacy screen can be user modifiable and can be made up of plurality of privacy lines that may be of any suitable orientation, thickness, spacing, and/or color and opaqueness that permits the user of the computing device to view the underlying window while preventing unauthorized onlookers from viewing the same.Type: ApplicationFiled: December 21, 2012Publication date: June 26, 2014Applicant: APPSENSE LIMITEDInventor: Richard James SOMERFIELD
-
Publication number: 20140165003Abstract: Systems and methods are disclosed for a slide-in menu that provides extended actions for grid layouts on touch screen devices. The slide-in menu provides a signposted visual interface object for user interaction with an application that is discoverable and usable and that provides several selectable options for touch-screen users, while requiring minimal screen real estate and retaining touch target sizes for individual screen controls that is appropriate for touch screen users. The slide-in menu may be augmented with an additional plurality of menu options and with a “more” button that displays the additional plurality of menu options.Type: ApplicationFiled: December 12, 2012Publication date: June 12, 2014Applicant: APPSENSE LIMITEDInventors: Paul Keith BRANTON, Andrew LEA, Richard James SOMERFIELD