Patents by Inventor Philippe Jolly

Philippe Jolly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220029996
    Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220030001
    Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220030032
    Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20210326322
    Abstract: A method of tracking changes in a network visualization software application includes creating, by a processor, a log table corresponding to an object table for an object in the software application; monitoring, by the processor, the object for a user action; determining, by the processor if the object has been acted upon by the user; and if the object has been acted upon by the user, then inserting, by the processor, a new row in the log table reflecting the action on the object.
    Type: Application
    Filed: July 23, 2020
    Publication date: October 21, 2021
    Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Daniel O'Lone, Roman Senyszyn, Ben Conner Llewelyn
  • Publication number: 20210326353
    Abstract: A method of deploying a solution in a network secured network environment using a network visualization software application is disclosed. The method includes receiving, by a processor, a user selected solution to deploy; queuing, by the processor, the solution to deploy; determining, by the processor, if the user desires to synchronize the solution; if the user desires to synchronize the solution, synchronizing, by the processor, the solution; and if the user does not desire to synchronize the solution, failing, by the processor the solution.
    Type: Application
    Filed: July 23, 2020
    Publication date: October 21, 2021
    Inventors: Jared Poetter, Michael C. Leap, Robert A. Johnson, Philippe Jolly, Richard W. Phelps, Michael J. Di Domenico, Diane Schaefer
  • Patent number: 11153348
    Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: October 19, 2021
    Assignee: Unisys Corporation
    Inventors: Michael Didomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Robert A. Johnson, Philippe Jolly, Jared Poetter
  • Patent number: 11063982
    Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: July 13, 2021
    Assignee: Unisys Corporation
    Inventors: Michael Di Domenico, Robert A. Johnson, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup
  • Patent number: 10979455
    Abstract: Methods and systems for defining a solution within an enterprise security management configuration server is disclosed. One method includes, based on network concordance data, grouping a plurality of nodes within an enterprise network into a plurality of profiles and identifying one or more channels among the plurality of profiles within a project of an enterprise security management configuration tool. The method also includes displaying the plurality of profiles in a configuration user interface, and automatically identifying one or more solutions among the plurality of profiles. The method further includes collapsing each of the one or more solutions into a single icon within the configuration user interface, each single icon representing a solution.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: April 13, 2021
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
  • Patent number: 10880332
    Abstract: Methods and systems for configuring security management settings within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and, based on the network concordance data, classifying each of the plurality of nodes based on an affinitization between the two or more nodes. The method also includes defining a profile for one or more nodes or grouped nodes, and defining one or more solutions within the enterprise security management configuration tool, the one or more solutions each including one or more nodes of the plurality of nodes. The method also includes receiving a deployment selection identifying at least one of the one or more solutions, and, in response to the deployment selection, generating a security settings file describing security settings for each of the one or more nodes.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: December 29, 2020
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
  • Patent number: 10841340
    Abstract: Methods and systems for configuring a security policy for an enterprise within an enterprise security management tool are disclosed. In some aspects, such systems receive a definition of at least one custom classification within a user interface of the enterprise security management configuration tool, including a name of a profile and network activity associated with one or more nodes to be included within the profile. Such systems also generate a security settings file to be applied within the enterprise, the security settings file including, for each profile, a common security policy to each of the nodes included in the profile. The profiles to which the security settings file is applied include the profile defined by the at least one custom classification.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: November 17, 2020
    Assignee: Unisys Corporation
    Inventors: Michael C. Leap, Michael Di Domenico, Richard W. Phelps, Philippe Jolly, Robert A. Johnson, Emily M. Shoup
  • Publication number: 20200244701
    Abstract: Methods and systems for configuring a common security policy for a plurality of nodes included within an enterprise network. Example methods can include grouping nodes within profiles based on IP address, in addition to concordance data. Additionally, nodes may be added to profiles based on a classification of the node being common to classifications of nodes within the profile. Still further, profiles may be grouped into a solution based at least in part on classification of the profile, in addition to grouping of profiles into solutions based on affinitization using concordance data. The methods described also include determining a common security policy to apply to each of the nodes within the profile.
    Type: Application
    Filed: January 25, 2019
    Publication date: July 30, 2020
    Inventors: MICHAEL DI DOMENICO, ROBERT A. JOHNSON, PHILIPPE JOLLY, MICHAEL C. LEAP, RICHARD W. PHELPS, EMILY M. SHOUP
  • Patent number: 10652280
    Abstract: Methods and systems for configuring a security topology in an enterprise security management configuration tool are disclosed. One method includes manipulating an icon representing one or more nodes in a configuration user interface of an enterprise security management configuration tool to associate the one or more nodes into a manual grouping of nodes in an enterprise network; and, after manipulating the icon, selecting, from a tool palette of the configuration user interface, an automatic association tool, the automatic association tool determining an association among a plurality of nodes into a plurality of automated logical groupings of nodes. In some cases, the manual grouping of nodes is different from the plurality of automated logical groupings, and the automatic association tool preserves the manual grouping of nodes.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: May 12, 2020
    Assignee: Unisys Corporation
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
  • Publication number: 20200067986
    Abstract: Methods and systems for providing integration between an enterprise security management configuration tool and third party network traffic software are disclosed. By defining a software interface through which configuration data for third party networking devices can be queried and configuration data accessed, the enterprise security management configuration tool can compare overall network traffic to the configuration provided by the third party networking software to assess an overall security level within an enterprise network.
    Type: Application
    Filed: July 23, 2019
    Publication date: February 27, 2020
    Inventors: MICHAEL DIDOMENICO, MICHAEL C. LEAP, EMILY M. SHOUP, RICHARD W. PHELPS, ROBERT A. JOHNSON, PHILIPPE JOLLY, JARED POETTER
  • Patent number: 10502405
    Abstract: An electrically conductive sandwich panel (10) supplies at least one electrical device to be pushed into the panel. The sandwich panel (10) has two electrically conductive layers (13, 15) insulated from each other and a layer (11) formed by a board (12, 14) insulated from said electrical layers. The board has two sheets (111, 112) of cardboard enclosing an electrically insulating material, such as plaster. Connectors are used to connect the electrically conductive layers to a power supply. The panel may be screw-fastened on a support by means of suitable screws and may be fitted with a suitable electrical device. A punch tool facilitates pushing the electrical device into the panel.
    Type: Grant
    Filed: May 20, 2016
    Date of Patent: December 10, 2019
    Assignee: PIXLUM
    Inventor: Philippe Jolly
  • Publication number: 20190342340
    Abstract: Methods and systems for configuring a security policy for an enterprise within an enterprise security management tool are disclosed. In some aspects, such systems receive a definition of at least one custom classification within a user interface of the enterprise security management configuration tool, including a name of a profile and network activity associated with one or more nodes to be included within the profile. Such systems also generate a security settings file to be applied within the enterprise, the security settings file including, for each profile, a common security policy to each of the nodes included in the profile. The profiles to which the security settings file is applied include the profile defined by the at least one custom classification.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 7, 2019
    Inventors: MICHAEL C. LEAP, MICHAEL DI DOMENICO, RICHARD W. PHELPS, PHILIPPE JOLLY, ROBERT A. JOHNSON, EMILY M. SHOUP
  • Patent number: 10158674
    Abstract: Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and receiving, in a configuration user interface, a selection of an affinitization level selected from a plurality of discrete affinitization levels, each of the discrete affinitization levels corresponding to a different extent to which nodes within an enterprise are grouped into profiles. The method also includes automatically grouping each of the plurality of nodes identified in the network concordance data into a plurality of profiles based on the selected affinitization level, and applying a common security policy to each of the nodes included in one of the plurality of profiles.
    Type: Grant
    Filed: April 24, 2017
    Date of Patent: December 18, 2018
    Assignee: UNISYS CORPORATION
    Inventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps
  • Publication number: 20180309788
    Abstract: Methods and systems for configuring security management settings within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and, based on the network concordance data, classifying each of the plurality of nodes based on an affinitization between the two or more nodes. The method also includes defining a profile for one or more nodes or grouped nodes, and defining one or more solutions within the enterprise security management configuration tool, the one or more solutions each including one or more nodes of the plurality of nodes. The method also includes receiving a deployment selection identifying at least one of the one or more solutions, and, in response to the deployment selection, generating a security settings file describing security settings for each of the one or more nodes.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: UNISYS CORPORATION
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps
  • Publication number: 20180309789
    Abstract: Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and receiving, in a configuration user interface, a selection of an affinitization level selected from a plurality of discrete affinitization levels, each of the discrete affinitization levels corresponding to a different extent to which nodes within an enterprise are grouped into profiles. The method also includes automatically grouping each of the plurality of nodes identified in the network concordance data into a plurality of profiles based on the selected affinitization level, and applying a common security policy to each of the nodes included in one of the plurality of profiles.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: UNISYS CORPORATION
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W Phelps
  • Publication number: 20180309791
    Abstract: Methods and systems for defining a solution within an enterprise security management configuration server is disclosed. One method includes, based on network concordance data, grouping a plurality of nodes within an enterprise network into a plurality of profiles and identifying one or more channels among the plurality of profiles within a project of an enterprise security management configuration tool. The method also includes displaying the plurality of profiles in a configuration user interface, and automatically identifying one or more solutions among the plurality of profiles. The method further includes collapsing each of the one or more solutions into a single icon within the configuration user interface, each single icon representing a solution.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: UNISYS CORPORATION
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps
  • Patent number: D924883
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: July 13, 2021
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, Michael J DiDomenico, Philippe Jolly, Michael C Leap, Richard W Phelps