Patents by Inventor Ted Hinaman
Ted Hinaman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12124563Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: GrantFiled: June 3, 2021Date of Patent: October 22, 2024Assignee: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Publication number: 20210294891Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: ApplicationFiled: June 3, 2021Publication date: September 23, 2021Inventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 11030305Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: GrantFiled: October 31, 2012Date of Patent: June 8, 2021Assignee: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 10454890Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: GrantFiled: September 30, 2013Date of Patent: October 22, 2019Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Patent number: 10454931Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection. The method also includes receiving specific credentials from the authentication server, terminating the secured connection with the VPN appliance, and initiating a second secured connection with the VPN appliance using the specific credentials, the specific credentials providing access to one or more computing devices within the enterprise being within a same community of interest as the remote computing device and obfuscating one or more other computing systems within the enterprise excluded from the community of interest.Type: GrantFiled: January 20, 2016Date of Patent: October 22, 2019Assignee: UNISYS CORPORATIONInventors: Ted Hinaman, Steven J Rajcan, Matthew Mohr, William Gunn, Sarah K Inforzato, Robert A Johnson, Gregory J Small, David S Dodgson
-
Publication number: 20180212927Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: ApplicationFiled: September 30, 2013Publication date: July 26, 2018Inventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Patent number: 9912663Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: GrantFiled: February 8, 2017Date of Patent: March 6, 2018Assignee: Unisys CorporationInventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Publication number: 20170344739Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: ApplicationFiled: October 31, 2012Publication date: November 30, 2017Applicant: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 9817968Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: GrantFiled: October 31, 2012Date of Patent: November 14, 2017Assignee: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Patent number: 9794225Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: GrantFiled: June 29, 2015Date of Patent: October 17, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Publication number: 20170237735Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. the method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: ApplicationFiled: February 8, 2017Publication date: August 17, 2017Applicant: Unisys CorporationInventors: Robert A. Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Patent number: 9716589Abstract: A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.Type: GrantFiled: September 30, 2013Date of Patent: July 25, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Publication number: 20170208038Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection. The method also includes receiving specific credentials from the authentication server, terminating the secured connection with the VPN appliance, and initiating a second secured connection with the VPN appliance using the specific credentials, the specific credentials providing access to one or more computing devices within the enterprise being within a same community of interest as the remote computing device and obfuscating one or more other computing systems within the enterprise excluded from the community of interest.Type: ApplicationFiled: January 20, 2016Publication date: July 20, 2017Applicant: Unisys CorporationInventors: Ted Hinaman, Steven J. Rajcan, Matthew Mohr, William Gunn, Sarah K. Inforzato, Robert A. Johnson, Gregory J. Small, David S. Dodgson
-
Patent number: 9596077Abstract: A method and system for establishing secure communications between endpoints includes transmitting a first message including a token having one or more entries each corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint. The method includes receiving a second message including a second authorization token including one or more entries, each entry corresponding to a community of interest associated with a second user and including an encryption key and a validation key associated with the second endpoint. The method includes, for each community of interest associated with both users, decrypting an associated entry in the second authorization token to obtain the encryption key and validation key associated with the second endpoint.Type: GrantFiled: September 30, 2013Date of Patent: March 14, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Patent number: 9525666Abstract: An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a computing system including a programmable circuit operatively connected to a memory and a communication interface, the communication interface configured to send and receive data packets via a data communications network. The endpoint also includes a filter defined in the memory of the computing system, the filter configured to define one or more access lists, each access list defining a group of access permissions for a community of interest. The community of interest includes one or more users, and an access list from among the one or more access lists defines a set of clear text access permissions associated with a community of interest. The endpoint also includes a driver executable by the programmable circuit, the driver configured to cooperate with the communication interface to send and receive data packets via the data communications network.Type: GrantFiled: May 11, 2011Date of Patent: December 20, 2016Assignee: Unisys CorporationInventors: Sarah K. Inforzato, Ted Hinaman, Robert A. Johnson
-
Publication number: 20160344547Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.Type: ApplicationFiled: October 31, 2012Publication date: November 24, 2016Applicant: Unisys CorporationInventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
-
Publication number: 20160156594Abstract: An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a computing system including a programmable circuit operatively connected to a memory and a communication interface, the communication interface configured to send and receive data packets via a data communications network. The endpoint also includes a filter defined in the memory of the computing system, the filter configured to define one or more access lists, each access list defining a group of access permissions for a community of interest. The community of interest includes one or more users, and an access list from among the one or more access lists defines a set of clear text access permissions associated with a community of interest. The endpoint also includes a driver executable by the programmable circuit, the driver configured to cooperate with the communication interface to send and receive data packets via the data communications network.Type: ApplicationFiled: May 11, 2011Publication date: June 2, 2016Inventors: Sarah K. Inforzato, Ted Hinaman, Robert A. Johnson
-
Publication number: 20150095649Abstract: A method and system for establishing secure communications between endpoints includes transmitting a first message including a token having one or more entries each corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint. The method includes receiving a second message including a second authorization token including one or more entries, each entry corresponding to a community of interest associated with a second user and including an encryption key and a validation key associated with the second endpoint. The method includes, for each community of interest associated with both users, decrypting an associated entry in the second authorization token to obtain the encryption key and validation key associated with the second endpoint.Type: ApplicationFiled: September 30, 2013Publication date: April 2, 2015Applicant: Unisys CorporationInventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Publication number: 20140317720Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: ApplicationFiled: September 30, 2013Publication date: October 23, 2014Inventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Publication number: 20140317405Abstract: A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.Type: ApplicationFiled: September 30, 2013Publication date: October 23, 2014Applicant: Unisys CorporationInventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman