Patents by Inventor Kelsey L. Bruso

Kelsey L. Bruso has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10735387
    Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. The enterprise is included within a community of interest. One method includes authenticating a bridge appliance with an authentication server associated with an enterprise having secure communications, and receiving a packet at the bridge appliance. The method also includes decrypting the packet to provide a decrypted packet in a case where the packet is encrypted according to a cryptographic key associated with the enterprise, and forwarding the decrypted packet to a remote computing device in communication with the bridge appliance. The method additionally includes, in a case where the packet is received from the remote computing device, encrypting the packet according to a cryptographic key associated with the enterprise, to provide an encrypted packet, and forwarding the encrypted packet to an endpoint within the enterprise.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: August 4, 2020
    Assignee: Unisys Corporation
    Inventors: Barry C. Andersen, Steven M. Wierdsma, Joshua M. Chamberland, Kevin Lui, Kelsey L. Bruso
  • Publication number: 20190020637
    Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. The enterprise is included within a community of interest. One method includes authenticating a bridge appliance with an authentication server associated with an enterprise having secure communications, and receiving a packet at the bridge appliance. The method also includes decrypting the packet to provide a decrypted packet in a case where the packet is encrypted according to a cryptographic key associated with the enterprise, and forwarding the decrypted packet to a remote computing device in communication with the bridge appliance. The method additionally includes, in a case where the packet is received from the remote computing device, encrypting the packet according to a cryptographic key associated with the enterprise, to provide an encrypted packet, and forwarding the encrypted packet to an endpoint within the enterprise.
    Type: Application
    Filed: May 11, 2018
    Publication date: January 17, 2019
    Inventors: BARRY C. ANDERSEN, STEVEN M. WIERDSMA, JOSHUA M. CHAMBERLAND, KEVIN LUI, KELSEY L. BRUSO
  • Publication number: 20170235790
    Abstract: An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish secondary semantic information; and establishing, by the processor, ontologies from the primary, secondary, and additional secondary semantic information.
    Type: Application
    Filed: September 8, 2016
    Publication date: August 17, 2017
    Applicant: Unisys Corporation
    Inventors: Kelsey L Bruso, James M Plasek
  • Publication number: 20170060571
    Abstract: A system and method for masking the complexity of developing software for a heterogeneous target execution environment may be established by configuring an integrated development environment to perform certain masking mechanisms. For example, the integrated development environment used to develop a background process may be used to create a background process-file on the target execution environment. The integrated development environment may further be configured to synchronously connect with an agent on the target execution environment, allowing the agent to initiate the background process using the integrated development environment user credentials. Additionally, the integrated development environment may be configured to monitor completion of the background process execution on the target execution environment, and to return the output from the background process after completion to the integrated development environment user.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Applicant: UNISYS CORPORATION
    Inventors: Kelsey L. Bruso, Eugene J. Gretter, Alan Hood
  • Patent number: 9576144
    Abstract: Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: February 21, 2017
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, Uday Datta Shet
  • Patent number: 9514325
    Abstract: Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage.
    Type: Grant
    Filed: September 15, 2014
    Date of Patent: December 6, 2016
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, Uday Datta Shet
  • Patent number: 9483289
    Abstract: Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure. The infrastructure operating system managing one or more services residing within an operating system image of a partition. The infrastructure operating system capable of providing a service of a first partition's operating system to a second partition's operating system when the second partition is in need of the service.
    Type: Grant
    Filed: December 17, 2013
    Date of Patent: November 1, 2016
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, Michael A Salsburg, Philip J Erickson
  • Publication number: 20160078244
    Abstract: Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key.
    Type: Application
    Filed: September 15, 2014
    Publication date: March 17, 2016
    Applicant: UNISYS CORPORATION
    Inventors: Kelsey L. Bruso, Uday Datta Shet
  • Publication number: 20160078243
    Abstract: Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage.
    Type: Application
    Filed: September 15, 2014
    Publication date: March 17, 2016
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Uday Datta Shet
  • Publication number: 20150169373
    Abstract: One embodiment of a computer-implemented method for managing computing resources may include determining, by a computer, target computing resources to be configured with a platform. A determination, by the computer, may be made as to whether the target computing resources includes a management agent for managing the platform. The computer may cause a management agent to be installed on the target computing resources if the target computing resources are determined to not include a management agent, otherwise, the computer may not cause a management agent to be installed on the target computing resources. The computer may instruct the management agent to commission the platform on the target computing resources.
    Type: Application
    Filed: December 10, 2014
    Publication date: June 18, 2015
    Applicant: Unisys Corporation
    Inventors: Michael A Salsburg, Nandish Jayaram Kopri, Kelsey L. Bruso
  • Publication number: 20150169342
    Abstract: One embodiment of a computer-implemented method for managing computing resources may include determining, by a computer, target computing resources to be configured with a platform. A determination, by the computer, may be made as to whether the target computing resources includes a management agent for managing the platform. The computer may cause a management agent to be installed on the target computing resources if the target computing resources are determined to not include a management agent, otherwise, the computer may not cause a management agent to be installed on the target computing resources. The computer may instruct the management agent to commission the platform on the target computing resources.
    Type: Application
    Filed: December 10, 2014
    Publication date: June 18, 2015
    Applicant: Unisys Corporation
    Inventors: Michael A. Salsburg, Kelsey L. Bruso
  • Publication number: 20150169372
    Abstract: Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure using a fabric manager. A fabric manager managing computing resources in one or more platforms and one or more partitions residing on the platform by monitoring each platform and partitions, and issuing instructions to a hypervisor or other management agent on a platform to execute one or more platform management commands, such as commission a new partition onto a platform.
    Type: Application
    Filed: December 10, 2014
    Publication date: June 18, 2015
    Applicant: Unisys Corporation
    Inventors: Michael A. Salsburg, Nandish Jayaram Kopri, Kelsey L. Bruso
  • Publication number: 20150143375
    Abstract: Interaction between isolated partitioned execution environments may be permitted through transmission of messages. A method for interaction between partitions may include may include receiving, by a processor, a request message comprising a request to execute a transaction application code; creating, by the processor, an isolated execution environment; starting, by the processor, an operating system in the isolated execution environment; and executing, by the processor, the transaction application code in the operating system.
    Type: Application
    Filed: November 18, 2013
    Publication date: May 21, 2015
    Applicant: UNISYS CORPORATION
    Inventors: Kelsey L. Bruso, Ronald G. Smith
  • Publication number: 20140310705
    Abstract: Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure. The infrastructure operating system managing one or more services residing within an operating system image of a partition. The infrastructure operating system capable of providing a service of a first partition's operating system to a second partition's operating system when the second partition is in need of the service.
    Type: Application
    Filed: December 17, 2013
    Publication date: October 16, 2014
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Michael A. Salsburg, Philip J. Erickson, Douglas M. Tolbert, Nandish Jayaram Kopri
  • Publication number: 20140310287
    Abstract: Disclosed herein is a method and a system for data storage and retrieval that is agnostic to the database models of any of the databases in embodiments of the common infrastructure. Data may be stored via one database, according to a corresponding model, and then stored such that the data may be retrieved by a second database with a different database model. The data is stored in key-value pairs, and is thus not stored according to any database model. However, metadata perspectives construct a set of retrieved data into a format expected by the database retrieving the set of data.
    Type: Application
    Filed: December 17, 2013
    Publication date: October 16, 2014
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Michael A. Salsburg, Philip J. Erickson, Douglas M. Tolbert, Nandish Jayaram Kopri
  • Publication number: 20140310706
    Abstract: Disclosed herein is a commodity infrastructure operating system that manages and implements the resources and services found in the heterogeneous components of the common infrastructure using a fabric manager. A fabric manager managing computing resources in one or more platforms and one or more partitions residing on the platform by monitoring each platform and partitions, and issuing instructions to a hypervisor or other management agent on a platform to execute one or more platform management commands, such as commission a new partition onto a platform.
    Type: Application
    Filed: December 17, 2013
    Publication date: October 16, 2014
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Michael A. Salsburg, Philip J. Erickson, Douglas M. Tolbert, Nandish Jayaram Kopri
  • Publication number: 20130325883
    Abstract: Values may be interchanged between computers with different computer architectures by implementing a transform function in a database serving the values to the computers. The transform function may convert a value for use on a computer with a different word length than the word length of the computer hosting the database. For example, the database may have 36-bit words, and a client may have 32-bit words. The transform function may operate without data loss and be capable of reversing the transform to enable round trips for data between the database and client.
    Type: Application
    Filed: June 1, 2012
    Publication date: December 5, 2013
    Inventors: Kelsey L. Bruso, James M. Plasek, Michael S. Jende
  • Publication number: 20130061305
    Abstract: An authentication system is enhanced by prompting an individual to perform a randomly-selected challenge action. For example, the individual may be requested to move the device in a particular motion, after entering a username/password combination. The randomly-selected challenge action verifies the individual is located at the device, which prevents automated attacks to steal the individual's identity. The challenge action improves security by preventing attackers from spoofing an individual's authentication information. The enhanced authentication system may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 7, 2013
    Inventors: Kelsey L. Bruso, Glen E. Newton
  • Publication number: 20130061304
    Abstract: An authentication system is enhanced by prompting an individual to perform a challenge action. For example, the individual may be requested to move the device in a particular motion, after entering a username/password combination. The challenge action is known only by the individual, such that an imposter, even with authentication information, does not know the challenge action. The challenge action improves security by preventing attackers from spoofing an individual's authentication information. The enhanced authentication system may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 7, 2013
    Inventors: Kelsey L. Bruso, Glen E. Newton
  • Publication number: 20120140993
    Abstract: Biometric authentication is enhanced by prompting an individual to perform an action challenge. For example, when an individual provides a facial picture for facial recognition to access secure data the individual may be prompted to provide a second picture of the individual performing an action. In one case, the individual is prompted to provide a second picture with an eye closed or an open mouth. The action challenge improves security by preventing attackers from spoofing an individual's biometric information. The enhanced biometric authentication may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information.
    Type: Application
    Filed: December 5, 2010
    Publication date: June 7, 2012
    Applicant: Unisys Corp.
    Inventors: Kelsey L. Bruso, Glen E. Newton