Patents by Inventor Sarah K. Inforzato
Sarah K. Inforzato has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220030032Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220029996Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20210014197Abstract: In a cryptographically-segmented network, a server establishes a cryptographically-segmented communication channel for use by authorized endpoints in an operationally-deployed configuration. In response to a received endpoint-isolation command to isolate a first endpoint, the server de-authorizes the first endpoint from the channel of the operationally-deployed configuration. In response to the de-authorization, the server issues a configuration instruction to the first endpoint to join a first cryptographically-segmented isolation communication channel that is communicatively coupled with at least one monitoring endpoint configured to monitor operation of the first endpoint via the first cryptographically-segmented isolation communication channel.Type: ApplicationFiled: July 12, 2019Publication date: January 14, 2021Applicant: Unisys CorporationInventors: Andrew F. Sanderson, Albert L. French, Sarah K. Inforzato, Lemoine D. Keiper, III
-
Publication number: 20200252411Abstract: Methods and systems for monitoring network data packets within a secure network are described. One method includes receiving, at a consumer endpoint, a data packet from a second endpoint, the data packet being encrypted with an encryption key associated with a packet auditing community of interest and having a routing header appended thereto, the routing header identifying the consumer endpoint. The method includes decrypting the data packet using the encryption key associated with the packet auditing community of interest, and removing at least a portion of the routing header identifying the consumer endpoint from the decrypted data packet. The method also includes performing at least one packet auditing operation on the decrypted data packet.Type: ApplicationFiled: February 5, 2019Publication date: August 6, 2020Inventors: SARAH K. INFORZATO, LEMOINE D. KEIPER, III, JONATHAN P. DAVIS, KATHLEEN R. WILD, STEVEN L. RAJCAN, ZACHARY DREMANN, MICHAEL J. DIDOMENICO, JONATHAN E. SKILTON, COREY SCHOENFELD
-
Patent number: 10454890Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: GrantFiled: September 30, 2013Date of Patent: October 22, 2019Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Patent number: 10454931Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection. The method also includes receiving specific credentials from the authentication server, terminating the secured connection with the VPN appliance, and initiating a second secured connection with the VPN appliance using the specific credentials, the specific credentials providing access to one or more computing devices within the enterprise being within a same community of interest as the remote computing device and obfuscating one or more other computing systems within the enterprise excluded from the community of interest.Type: GrantFiled: January 20, 2016Date of Patent: October 22, 2019Assignee: UNISYS CORPORATIONInventors: Ted Hinaman, Steven J Rajcan, Matthew Mohr, William Gunn, Sarah K Inforzato, Robert A Johnson, Gregory J Small, David S Dodgson
-
Publication number: 20190097968Abstract: A method of communicatively connecting first and second endpoints across a NAT and/or PAT router to form an IPSec encrypted tunnel is disclosed. A message is received by the first endpoint from the second endpoint. The message includes an encrypted portion including a source port, a destination port, a source IP address, and a destination IP address. It is determined whether a table entry exists for the message. If Yes, it is determined by the first endpoint whether a NAT router and/or a PAT router is between the first endpoint and the second endpoint based, at least in part, on the table entry and the encrypted portion of the message. If Yes, an IPSec encrypted tunnel is created using IPSec transport mode for further communications between the first and second endpoints. An apparatus and a computer program product are also disclosed.Type: ApplicationFiled: September 28, 2017Publication date: March 28, 2019Applicant: Unisys CorporationInventors: Sarah K. Inforzato, Gregory J. Small, Robert A. Johnson, Barry C. Andersen, Kathleen Wild
-
Publication number: 20180212927Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: ApplicationFiled: September 30, 2013Publication date: July 26, 2018Inventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Patent number: 9794237Abstract: A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token. The method further includes, in the pending state, receiving from the second endpoint a second message including a second authorization token at the first endpoint. The method includes, based on the receipt of the second message, entering an open state and initializing a tunnel between the first and second endpoints using an IPsec-based secured connection. The method also includes, upon termination of the tunnel due to a termination or timeout message issued by at least one of the first and second endpoints, entering a closed state.Type: GrantFiled: June 29, 2015Date of Patent: October 17, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, Sarah K Inforzato
-
Patent number: 9716589Abstract: A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.Type: GrantFiled: September 30, 2013Date of Patent: July 25, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Publication number: 20170208038Abstract: Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection. The method also includes receiving specific credentials from the authentication server, terminating the secured connection with the VPN appliance, and initiating a second secured connection with the VPN appliance using the specific credentials, the specific credentials providing access to one or more computing devices within the enterprise being within a same community of interest as the remote computing device and obfuscating one or more other computing systems within the enterprise excluded from the community of interest.Type: ApplicationFiled: January 20, 2016Publication date: July 20, 2017Applicant: Unisys CorporationInventors: Ted Hinaman, Steven J. Rajcan, Matthew Mohr, William Gunn, Sarah K. Inforzato, Robert A. Johnson, Gregory J. Small, David S. Dodgson
-
Patent number: 9596077Abstract: A method and system for establishing secure communications between endpoints includes transmitting a first message including a token having one or more entries each corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint. The method includes receiving a second message including a second authorization token including one or more entries, each entry corresponding to a community of interest associated with a second user and including an encryption key and a validation key associated with the second endpoint. The method includes, for each community of interest associated with both users, decrypting an associated entry in the second authorization token to obtain the encryption key and validation key associated with the second endpoint.Type: GrantFiled: September 30, 2013Date of Patent: March 14, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, Kathleen Wild, Sarah K Inforzato, Ted Hinaman
-
Publication number: 20160380984Abstract: A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token. The method further includes, in the pending state, receiving from the second endpoint a second message including a second authorization token at the first endpoint. The method includes, based on the receipt of the second message, entering an open state and initializing a tunnel between the first and second endpoints using an IPsec-based secured connection. The method also includes, upon termination of the tunnel due to a termination or timeout message issued by at least one of the first and second endpoints, entering a closed state.Type: ApplicationFiled: June 29, 2015Publication date: December 29, 2016Applicant: UNISYS CORPORATIONInventors: Robert A. Johnson, Sarah K. Inforzato
-
Patent number: 9525666Abstract: An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a computing system including a programmable circuit operatively connected to a memory and a communication interface, the communication interface configured to send and receive data packets via a data communications network. The endpoint also includes a filter defined in the memory of the computing system, the filter configured to define one or more access lists, each access list defining a group of access permissions for a community of interest. The community of interest includes one or more users, and an access list from among the one or more access lists defines a set of clear text access permissions associated with a community of interest. The endpoint also includes a driver executable by the programmable circuit, the driver configured to cooperate with the communication interface to send and receive data packets via the data communications network.Type: GrantFiled: May 11, 2011Date of Patent: December 20, 2016Assignee: Unisys CorporationInventors: Sarah K. Inforzato, Ted Hinaman, Robert A. Johnson
-
Publication number: 20160156594Abstract: An endpoint, method, and authorization server are disclosed which can be used to allow concurrent secure and clear text communication. An endpoint includes a computing system including a programmable circuit operatively connected to a memory and a communication interface, the communication interface configured to send and receive data packets via a data communications network. The endpoint also includes a filter defined in the memory of the computing system, the filter configured to define one or more access lists, each access list defining a group of access permissions for a community of interest. The community of interest includes one or more users, and an access list from among the one or more access lists defines a set of clear text access permissions associated with a community of interest. The endpoint also includes a driver executable by the programmable circuit, the driver configured to cooperate with the communication interface to send and receive data packets via the data communications network.Type: ApplicationFiled: May 11, 2011Publication date: June 2, 2016Inventors: Sarah K. Inforzato, Ted Hinaman, Robert A. Johnson
-
Publication number: 20150381567Abstract: A gateway computing system includes a memory storing cleartext gateway software and a programmable circuit communicatively connected to the memory. The programmable circuit is configured to execute computer-executable instructions including the cleartext gateway software. Execution of the cleartext gateway software by the programmable circuit causes the gateway computing system to instantiate at the gateway computing system a virtual device router including a cleartext interface configured to send and receive data packets from a cleartext endpoint and a secured interface configured to exchange data packets with one or more secured endpoints within a secured enterprise network, and load the virtual device router with community of interest material from an authentication server, the community of interest material associated with one or more communities of interest configured to allow access to the cleartext endpoint.Type: ApplicationFiled: June 29, 2015Publication date: December 31, 2015Applicant: UNISYS CORPORATIONInventors: Robert A. Johnson, Sarah K. Inforzato
-
Publication number: 20150095649Abstract: A method and system for establishing secure communications between endpoints includes transmitting a first message including a token having one or more entries each corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint. The method includes receiving a second message including a second authorization token including one or more entries, each entry corresponding to a community of interest associated with a second user and including an encryption key and a validation key associated with the second endpoint. The method includes, for each community of interest associated with both users, decrypting an associated entry in the second authorization token to obtain the encryption key and validation key associated with the second endpoint.Type: ApplicationFiled: September 30, 2013Publication date: April 2, 2015Applicant: Unisys CorporationInventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Publication number: 20140317720Abstract: Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.Type: ApplicationFiled: September 30, 2013Publication date: October 23, 2014Inventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Publication number: 20140317405Abstract: A secure communications arrangement including an endpoint is disclosed. The endpoint includes a computing system. The computing system includes a user level services component and a kernel level callout driver interfaced to the user level services component and configured to establish an IPsec tunnel with a remote endpoint. The computing system also includes a filter engine storing one or more filters defining endpoints authorized to communicate with the endpoint via the IPsec tunnel. The computing system also includes a second kernel level driver configured to establish a secure tunnel using a second security protocol different from IPsec.Type: ApplicationFiled: September 30, 2013Publication date: October 23, 2014Applicant: Unisys CorporationInventors: Robert A. Johnson, Kathleen Wild, Sarah K. Inforzato, Ted Hinaman
-
Patent number: 8312117Abstract: A distributed computer system comprises an enterprise server and a network server. The distributed computer system utilizes a distributed transmission control protocol (TCP) to establish an off-loaded dialog through the network server. If the off-loaded dialog is interrupted by, e.g., failure of the hosting network server, dialog recovery is performed to move the off-loaded dialog.Type: GrantFiled: November 15, 2001Date of Patent: November 13, 2012Assignee: Unisys CorporationInventors: Margaret Ann Magnotta, Anthony Narisi, Lois Bridgham Coyne, Michelle Marie Salvado, Susan Mary Jennion, Sarah K. Inforzato