Patents by Inventor Michael C. Leap
Michael C. Leap has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220029996Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030001Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030032Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20210326322Abstract: A method of tracking changes in a network visualization software application includes creating, by a processor, a log table corresponding to an object table for an object in the software application; monitoring, by the processor, the object for a user action; determining, by the processor if the object has been acted upon by the user; and if the object has been acted upon by the user, then inserting, by the processor, a new row in the log table reflecting the action on the object.Type: ApplicationFiled: July 23, 2020Publication date: October 21, 2021Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Daniel O'Lone, Roman Senyszyn, Ben Conner Llewelyn
-
Publication number: 20210326353Abstract: A method of deploying a solution in a network secured network environment using a network visualization software application is disclosed. The method includes receiving, by a processor, a user selected solution to deploy; queuing, by the processor, the solution to deploy; determining, by the processor, if the user desires to synchronize the solution; if the user desires to synchronize the solution, synchronizing, by the processor, the solution; and if the user does not desire to synchronize the solution, failing, by the processor the solution.Type: ApplicationFiled: July 23, 2020Publication date: October 21, 2021Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Diane Schaefer
-
Patent number: 11153348Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.Type: GrantFiled: July 23, 2019Date of Patent: October 19, 2021Assignee: Unisys CorporationInventors: Michael Didomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Robert A. Johnson, Philippe Jolly, Jared Poetter
-
Patent number: 11063982Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.Type: GrantFiled: January 25, 2019Date of Patent: July 13, 2021Assignee: Unisys CorporationInventors: Michael Di Domenico, Robert A. Johnson, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup
-
Patent number: 10979455Abstract: Methods and systems for defining a solution within an enterprise security management configuration server is disclosed. One method includes, based on network concordance data, grouping a plurality of nodes within an enterprise network into a plurality of profiles and identifying one or more channels among the plurality of profiles within a project of an enterprise security management configuration tool. The method also includes displaying the plurality of profiles in a configuration user interface, and automatically identifying one or more solutions among the plurality of profiles. The method further includes collapsing each of the one or more solutions into a single icon within the configuration user interface, each single icon representing a solution.Type: GrantFiled: April 24, 2017Date of Patent: April 13, 2021Assignee: Unisys CorporationInventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
-
Patent number: 10880332Abstract: Methods and systems for configuring security management settings within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and, based on the network concordance data, classifying each of the plurality of nodes based on an affinitization between the two or more nodes. The method also includes defining a profile for one or more nodes or grouped nodes, and defining one or more solutions within the enterprise security management configuration tool, the one or more solutions each including one or more nodes of the plurality of nodes. The method also includes receiving a deployment selection identifying at least one of the one or more solutions, and, in response to the deployment selection, generating a security settings file describing security settings for each of the one or more nodes.Type: GrantFiled: April 24, 2017Date of Patent: December 29, 2020Assignee: Unisys CorporationInventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
-
Patent number: 10841340Abstract: Methods and systems for configuring a security policy for an enterprise within an enterprise security management tool are disclosed. In some aspects, such systems receive a definition of at least one custom classification within a user interface of the enterprise security management configuration tool, including a name of a profile and network activity associated with one or more nodes to be included within the profile. Such systems also generate a security settings file to be applied within the enterprise, the security settings file including, for each profile, a common security policy to each of the nodes included in the profile. The profiles to which the security settings file is applied include the profile defined by the at least one custom classification.Type: GrantFiled: May 7, 2018Date of Patent: November 17, 2020Assignee: Unisys CorporationInventors: Michael C. Leap, Michael Di Domenico, Richard W. Phelps, Philippe Jolly, Robert A. Johnson, Emily M. Shoup
-
Patent number: 10750346Abstract: Methods and systems for providing an emergency incident response are described. Data is received from a plurality of heterogeneous data feeds each having a native format and including one or more publically-available data feeds. Event data is extracted from the received data, the event data representing one or more events from one or more of the plurality of heterogeneous data feeds, and the event data is translated from the native format into a standardized analysis format. Further, an existence and a priority level of at least one emergency incident contemporaneous with the event data and based at least in part on the event data is determined, the priority level being selected from among a plurality of predefined priority levels, and a graphical user interface including a message describing the at least one determined emergency incident is displayed.Type: GrantFiled: August 8, 2019Date of Patent: August 18, 2020Assignee: Unisys CorporationInventors: Michael J. Di Domenico, Edward T. Cavanagh, Dmitriy Yarmaliuk, Brittney Burchett, Michael C. Leap, Cody Finn
-
Publication number: 20200244701Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.Type: ApplicationFiled: January 25, 2019Publication date: July 30, 2020Inventors: MICHAEL DI DOMENICO, ROBERT A. JOHNSON, PHILIPPE JOLLY, MICHAEL C. LEAP, RICHARD W. PHELPS, EMILY M. SHOUP
-
Patent number: 10652280Abstract: Methods and systems for configuring a security topology in an enterprise security management configuration tool are disclosed. One method includes manipulating an icon representing one or more nodes in a configuration user interface of an enterprise security management configuration tool to associate the one or more nodes into a manual grouping of nodes in an enterprise network; and, after manipulating the icon, selecting, from a tool palette of the configuration user interface, an automatic association tool, the automatic association tool determining an association among a plurality of nodes into a plurality of automated logical groupings of nodes. In some cases, the manual grouping of nodes is different from the plurality of automated logical groupings, and the automatic association tool preserves the manual grouping of nodes.Type: GrantFiled: April 24, 2017Date of Patent: May 12, 2020Assignee: Unisys CorporationInventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
-
Patent number: 10638298Abstract: Methods and systems for determining public events are described. Data is received from a plurality of heterogeneous data feeds each having a native format. Event data objects are generated based on the received data, the event data objects each including at least a human readable message, an event time, and an event location. The human readable message of each of the event data objects is parsed into keywords, and the event data objects are grouped into one or more public events based on the keywords, time, location, and a sentiment based on the keywords. The public events are filtered based on a filter score, and the event data objects are clustered based on sentiment, location, and time. A density of the clustered event data objects is determined, and the validity of the public events is determined by a comparison of the density to a predetermined density threshold.Type: GrantFiled: August 8, 2019Date of Patent: April 28, 2020Assignee: Unisys CorporationInventors: Michael J. Di Domenico, Edward T. Cavanagh, Dmitriy Yarmaliuk, Brittney Burchett, Michael C. Leap
-
Publication number: 20200067986Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.Type: ApplicationFiled: July 23, 2019Publication date: February 27, 2020Inventors: MICHAEL DIDOMENICO, MICHAEL C. LEAP, EMILY M. SHOUP, RICHARD W. PHELPS, ROBERT A. JOHNSON, PHILIPPE JOLLY, JARED POETTER
-
Publication number: 20190342340Abstract: Methods and systems for configuring a security policy for an enterprise within an enterprise security management tool are disclosed. In some aspects, such systems receive a definition of at least one custom classification within a user interface of the enterprise security management configuration tool, including a name of a profile and network activity associated with one or more nodes to be included within the profile. Such systems also generate a security settings file to be applied within the enterprise, the security settings file including, for each profile, a common security policy to each of the nodes included in the profile. The profiles to which the security settings file is applied include the profile defined by the at least one custom classification.Type: ApplicationFiled: May 7, 2018Publication date: November 7, 2019Inventors: MICHAEL C. LEAP, MICHAEL DI DOMENICO, RICHARD W. PHELPS, PHILIPPE JOLLY, ROBERT A. JOHNSON, EMILY M. SHOUP
-
Patent number: 10158674Abstract: Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and receiving, in a configuration user interface, a selection of an affinitization level selected from a plurality of discrete affinitization levels, each of the discrete affinitization levels corresponding to a different extent to which nodes within an enterprise are grouped into profiles. The method also includes automatically grouping each of the plurality of nodes identified in the network concordance data into a plurality of profiles based on the selected affinitization level, and applying a common security policy to each of the nodes included in one of the plurality of profiles.Type: GrantFiled: April 24, 2017Date of Patent: December 18, 2018Assignee: UNISYS CORPORATIONInventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
-
Publication number: 20180309789Abstract: Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and receiving, in a configuration user interface, a selection of an affinitization level selected from a plurality of discrete affinitization levels, each of the discrete affinitization levels corresponding to a different extent to which nodes within an enterprise are grouped into profiles. The method also includes automatically grouping each of the plurality of nodes identified in the network concordance data into a plurality of profiles based on the selected affinitization level, and applying a common security policy to each of the nodes included in one of the plurality of profiles.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Applicant: UNISYS CORPORATIONInventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W Phelps
-
Publication number: 20180309788Abstract: Methods and systems for configuring security management settings within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and, based on the network concordance data, classifying each of the plurality of nodes based on an affinitization between the two or more nodes. The method also includes defining a profile for one or more nodes or grouped nodes, and defining one or more solutions within the enterprise security management configuration tool, the one or more solutions each including one or more nodes of the plurality of nodes. The method also includes receiving a deployment selection identifying at least one of the one or more solutions, and, in response to the deployment selection, generating a security settings file describing security settings for each of the one or more nodes.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Applicant: UNISYS CORPORATIONInventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps
-
Patent number: D924883Type: GrantFiled: May 5, 2017Date of Patent: July 13, 2021Assignee: Unisys CorporationInventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps