Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Unisys Corporation patents


Recent patent applications related to Unisys Corporation. Unisys Corporation is listed as an Agent/Assignee. Note: Unisys Corporation may have other listings under different names/spellings. We're not affiliated with Unisys Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "U" | Unisys Corporation-related inventors


System and method for implementing an efficient large system page invalidation

An apparatus includes a memory and a processor coupled to the memory. The processor is configured to perform the steps of: receiving a first head link for a page invalidation chain, the page invalidation chain including a plurality of page invalidation tables (pits); receiving a second head link for an active real page table (rpt) chain, the active rpt chain including a plurality of rpts; accessing a pit, wherein the pit includes a first data structure and a second data structure; invalidating the one or more rpts, whereas the one or more rpts are invalidated simultaneously in a batch; and releasing the one or more rpts to a free rpt chain, the free rpt chain includes a plurality of released rpts.. ... Unisys Corporation

Secured cloud storage broker with enhanced security

An apparatus includes a memory and a processor of a secured cloud storage broker (scsb) coupled to the memory. The processor is configured to perform the steps of: receiving a request from a user to deposit data; confirming whether the user provides appropriate credentials; authenticating the request; generating a first unique combination of an internet storage provider id, a subscription account, a storage location, a storage account, and a file directory; generating a second unique combination of a file id, an encryption algorithm, and a key; encrypting the data using the encryption algorithm and the key; and sending the encrypted data to the file directory for storage.. ... Unisys Corporation

Systems and methods for efficient access control

An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. ... Unisys Corporation

Systems and methods for implementing a multi-host record lock mechanism

A method includes determining, by a processor, whether a program check condition exists. The method further includes determining, by the processor, whether a lock descriptor of a lock in a file lock table satisfies an unlocking condition. ... Unisys Corporation

Runstream generator

Systems and methods that include receiving a plurality of programs, wherein each of the plurality of programs performs at least one function. The systems and methods further include parsing the plurality of programs. ... Unisys Corporation

Single sign on system for secure networks

A client system may be configured to request a single sign on authentication, in which an identity certificate is provided by the client system and stored by a server system. The stored certificate may be used to later authenticate a secure connection between the client system and the server system, after validating that the user represented by the certificate is a legitimate registered user of the server. ... Unisys Corporation

Systems and methods for implementing a multi-host record lock deadlock feedback mechanism

A method includes retrieving, by a processor, a first entry from a global wait list as a current waiting lock. The method further includes decreasing, by the processor, a deadlock timer of the current waiting lock. ... Unisys Corporation

Model file generator

Apparatuses, systems, and methods that generate a model file with a plurality of components. In one embodiment, a method includes reading, by a processor, an input model file. ... Unisys Corporation

Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process

Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process are disclosed. Embodiments may include initiating a commissioning of a partition image. ... Unisys Corporation

Multifunction option virtualization for single root i/o virtualization

Methods and systems for supporting multifunction virtualization within sr-iov in a multi-partition virtualization system are described. One method includes instantiating a physical function of an i/o interface device within an interconnect partition of a multi-partition virtualization system implemented at least in part on the computing device, and instantiating a plurality of virtual functions within a guest partition of the multi-partition virtualization system, each of the plurality of virtual functions associated with a physical function. ... Unisys Corporation

Method and system for dark matter scanning

A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job for the target scanning agent, building a scanning job command based on the scanning job, sending the scanning job command to the target scanning agent, receiving scanning job results from the target agent, parsing through the received scanning job results for identifying information of hosts in the network computing system detected during the scanning job, determining which detected hosts are known hosts and which detected hosts are unknown hosts based on the identifying information, and comparing the identifying information of the unknown hosts to reference identifying information to determine which of the unknown hosts are dark matter.. ... Unisys Corporation

Systems and methods for managing interactive features associated with multimedia content

Methods and systems for managing interactive features associated with multimedia content are disclosed. One method includes applying a container to multimedia content using one or more computing systems, the container defining an interface through which metadata external to the multimedia content is linked with one or more portions of the multimedia content. ... Unisys Corporation

Enabling secure network mobile device communications

Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a vpn-based secure connection to a vpn appliance, and initializing a stealth-based service on the mobile device. ... Unisys Corporation

Systems and methods for deriving database semantic information using artificial intelligence

An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish secondary semantic information; and establishing, by the processor, ontologies from the primary, secondary, and additional secondary semantic information.. . ... Unisys Corporation

08/10/17 / #20170228424

Prefetching for computing airline routes

Airline route information may be pre-fetched and cached in a routings engine to improve response time of the routings engine to generate routes from an origin to a destination location. For example, a method may include receiving, at a routings engine from an airline reservation system, a request for first airline routes between an origin and a destination based on specified route parameters; storing, by the routings engine, the request in a historical record of requests; fetching, by the routings engine, first airline routes matching the origin, the destination, and the specified route parameters; and pre-fetching, by the routings engine, second airline routes based, at least in part, on the historical record of requests.. ... Unisys Corporation

07/20/17 / #20170208038

Secure remote access for secured enterprise communications

Methods and systems for securing communications with an enterprise from a remote computing system are disclosed. One method includes initiating a secured connection with a vpn appliance associated with an enterprise using service credentials maintained in a secure applet installed on a remote computing device, and initiating communication with an authentication server within an enterprise via the secured connection. ... Unisys Corporation

07/20/17 / #20170206230

Capturing and comparing database performances across platforms

Apparatuses, systems, and methods that compare performance indications across platforms. In one embodiment, a method includes importing, by an processor, an audit trail of a host platform. ... Unisys Corporation

07/20/17 / #20170206175

Hypervisor-enforced self encrypting memory in computing fabric

Methods and systems for securing memory within a computing fabric are disclosed. One method includes allocating memory of one or more host computing systems in the computing fabric to a partition, the partition included among a plurality of partitions, the computing fabric including a hypervisor installed on the one or more host computing platforms and managing interactions among the plurality of partitions. ... Unisys Corporation

07/20/17 / #20170206104

Persistent guest and software-defined storage in computing fabric

A computing fabric includes one or more host computing platforms and a plurality of partitions instantiated across the one or more host computing platforms, each of the plurality of partitions allocated computing resources of the one or more host computing platforms. The computing fabric further includes a hypervisor installed on the one or more host computing platforms and managing interactions among the plurality of partitions. ... Unisys Corporation

07/13/17 / #20170199701

Enhanced message control banks

A server system may be configured to access a first contiguous portion of memory for a first activity of a plurality of activities, and to transfer data associated with the first activity into the first contiguous portion of memory. The first contiguous portion of memory may be placed in a memory repository to make the first contiguous portion of memory available for access by at least a second activity of the plurality of activities, and an identifier may be assigned to the first contiguous portion of memory placed in the memory repository. ... Unisys Corporation

07/06/17 / #20170195170

Systems and methods for dynamically configuring a network switch for monitoring

Systems and methods for dynamically configuring a network switch for monitoring are disclosed. Embodiments may include receiving an ip address associated with a network switch. ... Unisys Corporation

06/15/17 / #20170169227

Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments

Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance. ... Unisys Corporation

06/15/17 / #20170169226

Methods and systems for providing and controlling cryptographic secure communications terminal operable to provide a plurality of desktop environments

Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. ... Unisys Corporation

06/15/17 / #20170169225

Methods and systems for providing and controlling cryptographic secure communications terminal operable in a plurality of languages

Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. ... Unisys Corporation

06/08/17 / #20170161210

Secure cloud drive

A scd includes a processor configured to establish operating functions of the scd. The scd further includes a computer-readable medium including a setup volume and a storage volume. ... Unisys Corporation

06/01/17 / #20170154396

Method and system for protecting data using steganography

A method and apparatus for embedding a data message in a carrier object using steganography. The method provides a secret key and determines an indicator channel from a plurality of color channels in the carrier object, wherein the indicator channel is the color channel in the carrier object that has a maximum number of different pixel values in the carrier object. ... Unisys Corporation

06/01/17 / #20170153771

System and method for adaptive control and annotation interface

Disclosed is an adaptive control and annotation gui that simplifies user interfaces for activating a plurality of user input options, reduces data entry labor overhead, and improves the ability of the computer to display information and interact with the user. This may he accomplished by folding multiple user objectives into concise natural visual-logical representations and actions with self-evident and predictable behavioral rules, reducing the number of user options displayed to the user, providing a plurality of user options, reducing the number of user actions required within a user interaction, simplifying the orientation and display of user options, customizing appearances of user options displayed to be more intuitive to the user, coupling different types of data, customizing the display of user options so the displayed user options are more relevant to the task and workflow being performed by the user, or updating multiple auxiliary information displays within the computer in response to user actions.. ... Unisys Corporation

05/11/17 / #20170134167

Systems and methods for qr code validation

Embodiments described herein combine both glyph technologies and cryptography technologies by encrypting data with a private key of an entity tasked with issuing controlled documents, and then converting the resulting encryption as a visual glyph, such as a qr code. This permits validation of the printed document by scanning the qr code using a smartphone and decrypting using the issuing entity's public key. ... Unisys Corporation

04/13/17 / #20170104716

Systems and methods for configuring an ipv4 process without associating the ipv4 process with an ip loopback address

Systems and methods configuring a process that uses ipv4 communication without associating the ipv4 process with an ip loopback address are disclosed. Embodiments may include receiving a message to configure an ipv4 process. ... Unisys Corporation

04/13/17 / #20170102987

Device expected state monitoring and remediation

In a disaster recovery context, device operation states can he automatically changed from their expected operating states for steady-state operation as soon as a disaster recovery event is triggered. Every operating device with a first expected operating state for steady-state operation may be automatically changed to a second expected operating state when a disaster recovery event is triggered. ... Unisys Corporation

04/13/17 / #20170102953

Device expected state monitoring and remediation

A system and method for monitoring and correcting device operating states during steady-state operations may be automated. The operating states for devices operating in a steady-state environment may be monitored. ... Unisys Corporation

04/06/17 / #20170099267

Systems and methods for pkcs #8 private file key support

A communications platform may provide asymmetric cryptography using rsa and/or dsa algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (pkcs). ... Unisys Corporation

04/06/17 / #20170099206

Systems and methods for adaptive router failover in linux-based computing systems

Systems and methods for adaptive router failover in linux-based computing systems are disclosed. Embodiments may include configuring a linux-based computing system to have access to at least a first router and a second router. ... Unisys Corporation

04/06/17 / #20170097878

Configuring logging in non-emulated environment using commands and configuration in emulated environment

Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. ... Unisys Corporation

03/02/17 / #20170060571

System and method for masking complexity in a heterogeneous development environment

A system and method for masking the complexity of developing software for a heterogeneous target execution environment may be established by configuring an integrated development environment to perform certain masking mechanisms. For example, the integrated development environment used to develop a background process may be used to create a background process-file on the target execution environment. ... Unisys Corporation

02/23/17 / #20170053238

Systems and methods for improving the monitoring of vitals data associated with healthcare cargo in transit

Systems and methods for improving the monitoring of vitals data associated with healthcare cargo in transit are disclosed. Embodiments may include identifying the presence of healthcare cargo based, at least in part, on at least one of a product code and special handling code associated with the healthcare cargo. ... Unisys Corporation

02/23/17 / #20170052998

System and method for efficient database transactions

A system and method for processing database transactions wherein the need for a dbms server to convert data provided by the client from a text format to the raw storage format of the database is eliminated, thereby increasing the efficiency of the dbms.. . ... Unisys Corporation

02/16/17 / #20170048326

Systems and methods for maintaining ownership of and avoiding orphaning of communication sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed. ... Unisys Corporation

02/16/17 / #20170048220

Systems and methods for authenticating credentials when establishing secure communication connection sessions

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed. ... Unisys Corporation

02/16/17 / #20170048219

Systems and methods for modifying access credentials using impersonation in computer systems

Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed. ... Unisys Corporation

02/16/17 / #20170046145

Systems and methods for dynamically installing a program's dependent modules before program execution

Systems and methods for dynamically installing a program's dependent software modules before program execution are disclosed. Embodiments may include extracting, from a file that includes at least a program to be executed on the computing system and one or more software modules on which the program depends for execution, the one or more software modules on which the program depends for execution. ... Unisys Corporation

01/26/17 / #20170024131

Secure migratable architecture having improved performance features

Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different from a first computing architecture of a computing system on which the process is executed. ... Unisys Corporation

01/26/17 / #20170024130

Secure migratable architecture having security features

Methods and systems for implementing a secure migratable architecture are disclosed. One method includes, upon initiating execution of a process, allocating a portion of a memory for use by the process during execution, the process including a firmware environment representing a virtual computing system having a second computing architecture different from a first computing architecture of a computing system on which the process is executed. ... Unisys Corporation

01/26/17 / #20170024129

Memory management within secure migratable architecture

Methods and systems for executing virtualized processes on a computing system are disclosed, including techniques for memory management when executing such processes. One method includes allocating a portion of memory to a process hosted by an operating system of a computing system having a first computing architecture, the process comprising a firmware environment implementing a second computing architecture different from the first computing architecture, the first computing architecture applying virtual addressing to the portion of memory. ... Unisys Corporation

01/26/17 / #20170024128

Secure migratable architecture having improved performance features

Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different from a first computing architecture of a computing system on which the process is executed. ... Unisys Corporation

01/19/17 / #20170019416

Method and system for dark matter scanning

A method and system for scanning a computing system network for dark matter computing systems and computing devices. The method includes establishing a communication link between a master server and at least one target scanning agent that has at least one network computing system coupled thereto, creating a scanning job for the target scanning agent, building a scanning job command based on the scanning job, sending the scanning job command to the target scanning agent, receiving scanning job results from the target agent, parsing through the received scanning job results for identifying information of hosts in the network computing system detected during the scanning job, determining which detected hosts are known hosts and which detected hosts are unknown hosts based on the identifying information, and comparing the identifying information of the unknown hosts to reference identifying information to determine which of the unknown hosts are dark matter.. ... Unisys Corporation

01/12/17 / #20170011214

Cloud-based active password manager

Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. ... Unisys Corporation

01/12/17 / #20170011213

Cloud-based active password manager

Methods and systems for periodically generating and managing passwords for one or more websites of users are disclosed. The users are provided with the ability to automatically replace their old passwords with new passwords for their one or more website accounts. ... Unisys Corporation








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Unisys Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Unisys Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###