1
Aaron D Hanson, Emil Sturniolo, Anatoly Menn, Erik D Olson, Joseph T Savarese: Method and apparatus for providing mobile and other intermittent connectivity in a computing environment. Netmotion Wireless, Nixon & Vanderhye P C, August 11, 2009: US07574208 (151 worldwide citation)

A seamless solution transparently addresses the characteristics of nomadic systems, and enables existing network applications to run reliably in mobile environments. A Mobility Management Server coupled to the mobile network maintains the state of each of any number of Mobile End Systems and handles ...


2
Emil Sturniolo, Aaron Stavens, Joseph Savarese: Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments. Netmotion Wireless, Nixon & Vanderhye PC, February 1, 2011: US07882247 (73 worldwide citation)

Method and apparatus including a mobility server enables secure connectivity using standards-based Virtual Private Network (VPN) IPSEC algorithms in a mobile and intermittently connected computing environment. Transitions between and among networks occur seamlessly—with a mobility server being effec ...


3
Joseph T Savarese, Erik Olson, Michael Snyder, David Thompson, Emil Sturniolo: High performance digital communications resiliency in a roamable virtual private network. Netmotion Wireless, Nixon & Vanderhye P C, September 25, 2012: US08276035 (15 worldwide citation)

There is a class of applications that favor expediency of the communications over reliability. Counter-intuitively, the reliability aspect of a protocol may cause sub-optimal performance when considering this special class of applications in some environments. To resolve this performance issue, the ...


4
Anthony C Fascenda, Emil Sturniolo: System and method of per-packet keying. Koolspan, Hunton & Williams, March 22, 2011: US07913085 (6 worldwide citation)

A method of per-packet keying for encrypting and decrypting data transferred between two or more parties, each party having knowledge of a shared key that allows a per-packet key to differ for each packet is provided. Avoiding the use of a static session key during encryption offers several advantag ...


5
William J Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware, Anthony Fascenda: Hiding ciphertext using a linguistics algorithm with dictionaries. PROTECTED MOBILITY, Nixon & Vanderhye P C, October 13, 2015: US09160719 (3 worldwide citation)

Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate ...


6
William J Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware: User interface systems and methods for secure message oriented communications. PROTECTED MOBILTY, Nixon & Vanderhye P C, March 21, 2017: US09602277 (3 worldwide citation)

A convenient, easy to use ubiquitous secure communications capability can automatically encrypt and decrypt messages without requiring any special intermediating security component such as gateways, proxy servers or the like. Trusted/secure applications for the mobile workforce can significantly imp ...


7
William J Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware: Systems and methods using one time pads during the exchange of cryptographic material. Protected Mobility, Nixon & Vanderhye P C, December 30, 2014: US08924706 (2 worldwide citation)

A solution that enables the exchange of information in a secure manner over an insecure text messaging infrastructure provides part of the exchange as cryptographic material to be used to secure subsequent communications. The exchange of the cryptographic material is protected from malicious and nef ...


8
Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware: System for and method of remote secure backup. KOOLSPAN, Hunton & Williams, May 10, 2016: US09338005 (2 worldwide citation)

Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.


9
Anthony Fascenda, Emil Sturniolo: System for and method of auto-registration with cryptographic modules. KOOLSPAN, Hunton & Williams, January 29, 2013: US08364978 (2 worldwide citation)

A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module ...


10
Emil Sturniolo, Aaron Stavens, Joseph T Savarese: Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments. Nixon & Vanderhye PC, September 25, 2003: US20030182431-A1 (2 worldwide citation)

Method and apparatus for enabling secure connectivity using standards-based Virtual Private Network (VPN) IPSEC algorithms in a mobile and intermittently connected computing environment enhance the current standards based algorithms by allowing migratory devices to automatically (re)establish securi ...