Patent Pack (PDFs)
Research new robot inventions
Patent Pack (PDFs)
Research the latest gaming inventions
Patent Pack (PDFs)
Research new Social Network inventions
Patent Pack (PDFs)
Research new Drone inventions
Patent Pack (PDFs)
Research the latest Electric Vehicle inventions
Patent Pack (PDFs)
Research latest Smartphone inventions
Patent Pack (PDFs)
Research new robot inventions
Patent Pack (PDFs)
Research the latest gaming inventions
Patent Pack (PDFs)
Research new Social Network inventions
Patent Pack (PDFs)
Research new Drone inventions
Patent Pack (PDFs)
Research the latest Electric Vehicle inventions
Patent Pack (PDFs)
Research latest Smartphone inventions
Unisys Corporation |
Unisys Corp |
Unisys Corporation_20100121 |
System and implementing an efficient large system page invalidation
An apparatus includes a memory and a processor coupled to the memory. The processor is configured to perform the steps of: receiving a first head link for a page invalidation chain, the page invalidation chain including a plurality of page invalidation tables (PITs); receiving a second head link for an... Unisys Corp
Secured cloud storage broker with enhanced security
An apparatus includes a memory and a processor of a secured cloud storage broker (SCSB) coupled to the memory. The processor is configured to perform the steps of: receiving a request from a user to deposit data; confirming whether the user provides appropriate credentials; authenticating the request; generating a first... Unisys Corp
Systems and methods for implementing a multi-host record lock mechanism
A method includes determining, by a processor, whether a program check condition exists. The method further includes determining, by the processor, whether a lock descriptor of a lock in a file lock table satisfies an unlocking condition. The method further includes releasing, by the processor, the lock by setting the... Unisys Corp
Systems and methods for efficient access control
An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement... Unisys Corp
Systems and methods that include receiving a plurality of programs, wherein each of the plurality of programs performs at least one function. The systems and methods further include parsing the plurality of programs. The systems and methods further include generating control statements configured to create an executable file. The executable... Unisys Corp
Method and system for containerized internet of things (iot) devices
A method and system for containerized Internet of Things (IoT) devices. The method includes receiving by a computing platform IoT device sensor data. The method also includes receiving by the computing platform at least one container image script. The method also includes loading into the computing platform at least one... Unisys Corp
Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process are disclosed. Embodiments may include initiating a commissioning of a partition image. Embodiments may also include updating metadata associated with the commissioning of the partition image after each successfully executed step of... Unisys Corp
Apparatuses, systems, and methods that generate a model file with a plurality of components. In one embodiment, a method includes reading, by a processor, an input model file. The method includes extracting, by the processor, at least one input component from the input model file. The method includes generating, by... Unisys Corp
Systems and methods for implementing a multi-host record lock deadlock feedback mechanism
A method includes retrieving, by a processor, a first entry from a global wait list as a current waiting lock. The method further includes decreasing, by the processor, a deadlock timer of the current waiting lock. The method further includes determining, by the processor, whether the deadlock timer equals zero.... Unisys Corp
Single sign on system for secure networks
A client system may be configured to request a single sign on authentication, in which an identity certificate is provided by the client system and stored by a server system. The stored certificate may be used to later authenticate a secure connection between the client system and the server system,... Unisys Corp
A method includes receiving, at a processor, a timestamp as a start-point for extracting information from the storage tape. The method further includes determining, by the processor, a reel identification and a device type of a storage tape. The method further includes extracting the information, by the processor, from the... Unisys Corp
A method includes receiving, at a processor, an identification of a storage tape. The method further includes determining, at the processor, a start-point for extracting information from the storage tape. The method further includes extracting the information, by the processor, from the storage tape starting at the start-point. The method... Unisys Corp
Multifunction option virtualization for single root i/o virtualization
Methods and systems for supporting multifunction virtualization within SR-IOV in a multi-partition virtualization system are described. One method includes instantiating a physical function of an I/O interface device within an interconnect partition of a multi-partition virtualization system implemented at least in part on the computing device, and instantiating a plurality... Unisys Corp
Method and system for dark matter scanning
A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job... Unisys Corp
Systems and methods for managing interactive features associated with multimedia content
Methods and systems for managing interactive features associated with multimedia content are disclosed. One method includes applying a container to multimedia content using one or more computing systems, the container defining an interface through which metadata external to the multimedia content is linked with one or more portions of the... Unisys Corp
Systems and methods for deriving database semantic information using artificial intelligence
An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish... Unisys Corp
Enabling secure network mobile device communications
Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. the method further includes transmitting... Unisys Corp
Prefetching for computing airline routes
Airline route information may be pre-fetched and cached in a routings engine to improve response time of the routings engine to generate routes from an origin to a destination location. For example, a method may include receiving, at a routings engine from an airline reservation system, a request for first... Unisys Corp
Persistent guest and software-defined storage in computing fabric
A computing fabric includes one or more host computing platforms and a plurality of partitions instantiated across the one or more host computing platforms, each of the plurality of partitions allocated computing resources of the one or more host computing platforms. The computing fabric further includes a hypervisor installed on... Unisys Corp
Hypervisor-enforced self encrypting memory in computing fabric
Methods and systems for securing memory within a computing fabric are disclosed. One method includes allocating memory of one or more host computing systems in the computing fabric to a partition, the partition included among a plurality of partitions, the computing fabric including a hypervisor installed on the one or... Unisys Corp
Capturing and comparing database performances across platforms
Apparatuses, systems, and methods that compare performance indications across platforms. In one embodiment, a method includes importing, by an processor, an audit trail of a host platform. The method includes executing, by the processor, instructions of a replay engine. The method includes executing, by the processor, instructions of a capture... Unisys Corp
Secure remote access for secured enterprise communications
Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an... Unisys Corp
Enhanced message control banks
A server system may be configured to access a first contiguous portion of memory for a first activity of a plurality of activities, and to transfer data associated with the first activity into the first contiguous portion of memory. The first contiguous portion of memory may be placed in a... Unisys Corp
Systems and methods for dynamically configuring a network switch for monitoring
Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network... Unisys Corp
Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the... Unisys Corp
Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the... Unisys Corp
Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the... Unisys Corp
A SCD includes a processor configured to establish operating functions of the SCD. The SCD further includes a computer-readable medium including a setup volume and a storage volume. The setup volume is configured to store information that is decrypted. The storage volume is configured to store information that is encrypted.... Unisys Corp
System and adaptive control and annotation interface
Disclosed is an adaptive control and annotation GUI that simplifies user interfaces for activating a plurality of user input options, reduces data entry labor overhead, and improves the ability of the computer to display information and interact with the user. This may he accomplished by folding multiple user objectives into... Unisys Corp
Method and system for protecting data using steganography
A method and apparatus for embedding a data message in a carrier object using steganography. The method provides a secret key and determines an indicator channel from a plurality of color channels in the carrier object, wherein the indicator channel is the color channel in the carrier object that has... Unisys Corp
Systems and methods for establishing a ULAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a MC coupled to the computing system to include a new field which indicates if a VLAN should be created... Unisys Corp
Systems and methods for qr code validation
Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the... Unisys Corp
Device expected state monitoring and remediation
A system and method for monitoring and correcting device operating states during steady-state operations may be automated. The operating states for devices operating in a steady-state environment may be monitored. Any operating device that is set to operate in an unexpected operating state may be automatically changed to its expected... Unisys Corp
Device expected state monitoring and remediation
In a disaster recovery context, device operation states can he automatically changed from their expected operating states for steady-state operation as soon as a disaster recovery event is triggered. Every operating device with a first expected operating state for steady-state operation may be automatically changed to a second expected operating... Unisys Corp
Systems and methods configuring a process that uses IPv4 communication without associating the IPv4 process with an IP loopback address are disclosed. Embodiments may include receiving a message to configure an IPv4 process. Embodiments may also include determining if a configuration parameter associated with the received message is set to... Unisys Corp
Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and... Unisys Corp
Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to... Unisys Corp
A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (PKCS). Compatibility with PKCS #8 format may enable the communications platform to... Unisys Corp
A system and method for masking the complexity of developing software for a heterogeneous target execution environment may be established by configuring an integrated development environment to perform certain masking mechanisms. For example, the integrated development environment used to develop a background process may be used to create a background... Unisys Corp
A system and method for processing database transactions wherein the need for a DBMS server to convert data provided by the client from a text format to the raw storage format of the database is eliminated, thereby increasing the efficiency of the DBMS.... Unisys Corp
Systems and methods for improving the monitoring of vitals data associated with healthcare cargo in transit are disclosed. Embodiments may include identifying the presence of healthcare cargo based, at least in part, on at least one of a product code and special handling code associated with the healthcare cargo. Embodiments... Unisys Corp
Systems and methods for dynamically installing a program's dependent software modules before program execution are disclosed. Embodiments may include extracting, from a file that includes at least a program to be executed on the computing system and one or more software modules on which the program depends for execution, the... Unisys Corp
Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp
Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp
Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp
Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp
Methods and systems for executing virtualized processes on a computing system are disclosed, including techniques for memory management when executing such processes. One method includes allocating a portion of memory to a process hosted by an operating system of a computing system having a first computing architecture, the process comprising... Unisys Corp
Methods and systems for implementing a secure migratable architecture are disclosed. One method includes, upon initiating execution of a process, allocating a portion of a memory for use by the process during execution, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp
Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp
A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job... Unisys Corp
Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which... Unisys Corp
Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which... Unisys Corp