Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Unisys Corporation
Unisys Corp
Unisys Corporation_20100121

Unisys Corp patents


Recent patent applications related to Unisys Corp. Unisys Corp is listed as an Agent/Assignee. Note: Unisys Corp may have other listings under different names/spellings. We're not affiliated with Unisys Corp, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "U" | Unisys Corp-related inventors


System and implementing an efficient large system page invalidation

An apparatus includes a memory and a processor coupled to the memory. The processor is configured to perform the steps of: receiving a first head link for a page invalidation chain, the page invalidation chain including a plurality of page invalidation tables (PITs); receiving a second head link for an... Unisys Corp

Secured cloud storage broker with enhanced security

An apparatus includes a memory and a processor of a secured cloud storage broker (SCSB) coupled to the memory. The processor is configured to perform the steps of: receiving a request from a user to deposit data; confirming whether the user provides appropriate credentials; authenticating the request; generating a first... Unisys Corp

Systems and methods for implementing a multi-host record lock mechanism

A method includes determining, by a processor, whether a program check condition exists. The method further includes determining, by the processor, whether a lock descriptor of a lock in a file lock table satisfies an unlocking condition. The method further includes releasing, by the processor, the lock by setting the... Unisys Corp

Systems and methods for efficient access control

An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement... Unisys Corp

Runstream generator

Systems and methods that include receiving a plurality of programs, wherein each of the plurality of programs performs at least one function. The systems and methods further include parsing the plurality of programs. The systems and methods further include generating control statements configured to create an executable file. The executable... Unisys Corp

Method and system for containerized internet of things (iot) devices

A method and system for containerized Internet of Things (IoT) devices. The method includes receiving by a computing platform IoT device sensor data. The method also includes receiving by the computing platform at least one container image script. The method also includes loading into the computing platform at least one... Unisys Corp

Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process

Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process are disclosed. Embodiments may include initiating a commissioning of a partition image. Embodiments may also include updating metadata associated with the commissioning of the partition image after each successfully executed step of... Unisys Corp

Model file generator

Apparatuses, systems, and methods that generate a model file with a plurality of components. In one embodiment, a method includes reading, by a processor, an input model file. The method includes extracting, by the processor, at least one input component from the input model file. The method includes generating, by... Unisys Corp

Systems and methods for implementing a multi-host record lock deadlock feedback mechanism

A method includes retrieving, by a processor, a first entry from a global wait list as a current waiting lock. The method further includes decreasing, by the processor, a deadlock timer of the current waiting lock. The method further includes determining, by the processor, whether the deadlock timer equals zero.... Unisys Corp

Single sign on system for secure networks

A client system may be configured to request a single sign on authentication, in which an identity certificate is provided by the client system and stored by a server system. The stored certificate may be used to later authenticate a secure connection between the client system and the server system,... Unisys Corp

Extraction of audit trails

A method includes receiving, at a processor, a timestamp as a start-point for extracting information from the storage tape. The method further includes determining, by the processor, a reel identification and a device type of a storage tape. The method further includes extracting the information, by the processor, from the... Unisys Corp

Extraction of audit trails

A method includes receiving, at a processor, an identification of a storage tape. The method further includes determining, at the processor, a start-point for extracting information from the storage tape. The method further includes extracting the information, by the processor, from the storage tape starting at the start-point. The method... Unisys Corp

Multifunction option virtualization for single root i/o virtualization

Methods and systems for supporting multifunction virtualization within SR-IOV in a multi-partition virtualization system are described. One method includes instantiating a physical function of an I/O interface device within an interconnect partition of a multi-partition virtualization system implemented at least in part on the computing device, and instantiating a plurality... Unisys Corp

Method and system for dark matter scanning

A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job... Unisys Corp

Systems and methods for managing interactive features associated with multimedia content

Methods and systems for managing interactive features associated with multimedia content are disclosed. One method includes applying a container to multimedia content using one or more computing systems, the container defining an interface through which metadata external to the multimedia content is linked with one or more portions of the... Unisys Corp

Systems and methods for deriving database semantic information using artificial intelligence

An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish... Unisys Corp

Enabling secure network mobile device communications

Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. the method further includes transmitting... Unisys Corp

Prefetching for computing airline routes

Airline route information may be pre-fetched and cached in a routings engine to improve response time of the routings engine to generate routes from an origin to a destination location. For example, a method may include receiving, at a routings engine from an airline reservation system, a request for first... Unisys Corp

Persistent guest and software-defined storage in computing fabric

A computing fabric includes one or more host computing platforms and a plurality of partitions instantiated across the one or more host computing platforms, each of the plurality of partitions allocated computing resources of the one or more host computing platforms. The computing fabric further includes a hypervisor installed on... Unisys Corp

Hypervisor-enforced self encrypting memory in computing fabric

Methods and systems for securing memory within a computing fabric are disclosed. One method includes allocating memory of one or more host computing systems in the computing fabric to a partition, the partition included among a plurality of partitions, the computing fabric including a hypervisor installed on the one or... Unisys Corp

Capturing and comparing database performances across platforms

Apparatuses, systems, and methods that compare performance indications across platforms. In one embodiment, a method includes importing, by an processor, an audit trail of a host platform. The method includes executing, by the processor, instructions of a replay engine. The method includes executing, by the processor, instructions of a capture... Unisys Corp

Secure remote access for secured enterprise communications

Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a VPN appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an... Unisys Corp

Enhanced message control banks

A server system may be configured to access a first contiguous portion of memory for a first activity of a plurality of activities, and to transfer data associated with the first activity into the first contiguous portion of memory. The first contiguous portion of memory may be placed in a... Unisys Corp

Systems and methods for dynamically configuring a network switch for monitoring

Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an IP address associated with a network switch. Embodiments may also include probing the network switch based, at least in part, on the received IP address to obtain first information regarding the network... Unisys Corp

Methods and systems for providing and controlling cryptographic secure communications terminal operable in a plurality of languages

Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the... Unisys Corp

Methods and systems for providing and controlling cryptographic secure communications terminal operable to provide a plurality of desktop environments

Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the... Unisys Corp

Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments

Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the... Unisys Corp

Secure cloud drive

A SCD includes a processor configured to establish operating functions of the SCD. The SCD further includes a computer-readable medium including a setup volume and a storage volume. The setup volume is configured to store information that is decrypted. The storage volume is configured to store information that is encrypted.... Unisys Corp

System and adaptive control and annotation interface

Disclosed is an adaptive control and annotation GUI that simplifies user interfaces for activating a plurality of user input options, reduces data entry labor overhead, and improves the ability of the computer to display information and interact with the user. This may he accomplished by folding multiple user objectives into... Unisys Corp

Method and system for protecting data using steganography

A method and apparatus for embedding a data message in a carrier object using steganography. The method provides a secret key and determines an indicator channel from a plurality of color channels in the carrier object, wherein the indicator channel is the color channel in the carrier object that has... Unisys Corp

Systems and methods for establishing a vlan on a computing system irrespective of the computer networking technology utilized by the computing system

Systems and methods for establishing a ULAN or a subinterface on a computing system using a single configuration statement are disclosed. Embodiments may include modifying a configuration statement that configures a MC coupled to the computing system to include a new field which indicates if a VLAN should be created... Unisys Corp

Systems and methods for qr code validation

Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a QR code. This permits validation of the printed document by scanning the... Unisys Corp

Device expected state monitoring and remediation

A system and method for monitoring and correcting device operating states during steady-state operations may be automated. The operating states for devices operating in a steady-state environment may be monitored. Any operating device that is set to operate in an unexpected operating state may be automatically changed to its expected... Unisys Corp

Device expected state monitoring and remediation

In a disaster recovery context, device operation states can he automatically changed from their expected operating states for steady-state operation as soon as a disaster recovery event is triggered. Every operating device with a first expected operating state for steady-state operation may be automatically changed to a second expected operating... Unisys Corp

04/13/17 / #20170104716

Systems and methods for configuring an ipv4 process without associating the ipv4 process with an ip loopback address

Systems and methods configuring a process that uses IPv4 communication without associating the IPv4 process with an IP loopback address are disclosed. Embodiments may include receiving a message to configure an IPv4 process. Embodiments may also include determining if a configuration parameter associated with the received message is set to... Unisys Corp

04/06/17 / #20170097878

Configuring logging in non-emulated environment using commands and configuration in emulated environment

Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and... Unisys Corp

04/06/17 / #20170099206

Systems and methods for adaptive router failover in linux-based computing systems

Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to... Unisys Corp

04/06/17 / #20170099267

Systems and methods for pkcs #8 private file key support

A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (PKCS). Compatibility with PKCS #8 format may enable the communications platform to... Unisys Corp

03/02/17 / #20170060571

System and masking complexity in a heterogeneous development environment

A system and method for masking the complexity of developing software for a heterogeneous target execution environment may be established by configuring an integrated development environment to perform certain masking mechanisms. For example, the integrated development environment used to develop a background process may be used to create a background... Unisys Corp

02/23/17 / #20170052998

System and efficient database transactions

A system and method for processing database transactions wherein the need for a DBMS server to convert data provided by the client from a text format to the raw storage format of the database is eliminated, thereby increasing the efficiency of the DBMS.... Unisys Corp

02/23/17 / #20170053238

Systems and methods for improving the monitoring of vitals data associated with healthcare cargo in transit

Systems and methods for improving the monitoring of vitals data associated with healthcare cargo in transit are disclosed. Embodiments may include identifying the presence of healthcare cargo based, at least in part, on at least one of a product code and special handling code associated with the healthcare cargo. Embodiments... Unisys Corp

02/16/17 / #20170046145

Systems and methods for dynamically installing a program's dependent modules before program execution

Systems and methods for dynamically installing a program's dependent software modules before program execution are disclosed. Embodiments may include extracting, from a file that includes at least a program to be executed on the computing system and one or more software modules on which the program depends for execution, the... Unisys Corp

02/16/17 / #20170048219

Systems and methods for modifying access credentials using impersonation in computer systems

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp

02/16/17 / #20170048220

Systems and methods for authenticating credentials when establishing secure communication connection sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp

02/16/17 / #20170048326

Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning... Unisys Corp

01/26/17 / #20170024128

Secure migratable architecture having improved performance features

Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp

01/26/17 / #20170024129

Memory management within secure migratable architecture

Methods and systems for executing virtualized processes on a computing system are disclosed, including techniques for memory management when executing such processes. One method includes allocating a portion of memory to a process hosted by an operating system of a computing system having a first computing architecture, the process comprising... Unisys Corp

01/26/17 / #20170024130

Secure migratable architecture having security features

Methods and systems for implementing a secure migratable architecture are disclosed. One method includes, upon initiating execution of a process, allocating a portion of a memory for use by the process during execution, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp

01/26/17 / #20170024131

Secure migratable architecture having improved performance features

Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different... Unisys Corp

01/19/17 / #20170019416

Method and system for dark matter scanning

A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job... Unisys Corp

01/12/17 / #20170011213

Cloud-based active password manager

Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which... Unisys Corp

01/12/17 / #20170011214

Cloud-based active password manager

Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. The users can set a pre-determined frequency at which... Unisys Corp








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Unisys Corp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Unisys Corp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###