Patents Assigned to UNIQUESOFT, LLC
  • Patent number: 11029934
    Abstract: A method includes analyzing operational code to determine identifiers used within the operational code. The method further includes grouping like identifiers based a relational aspect of the identifiers. The method further includes, for one or more identifier groups, determining potential feature(s) of the identifier group(s). The method further includes testing the potential feature(s) based on a corresponding feature test suite to produce feedback regarding meaningfulness of the potential feature(s). The method further comprises, when the meaningfulness is above a threshold, adding the potential feature(s) to a feature set. The method further includes, when the meaningfulness is at or below the threshold, adjusting analysis parameter(s), grouping parameter(s), feature parameter(s), and/or testing parameter(s).
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: June 8, 2021
    Assignee: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Patent number: 10664243
    Abstract: A method begins by generating application system state transitions from inputted requirements and parameters. For a current implementation of generating application code, the method continues by entering a loop. The loop begins by generating a current intermediate result based on a previous implementation and in accordance with current application code development factors. The loop continues by generating at least one test case based on the one or more of the application system state transitions. The loop continues by testing the current intermediate result in accordance with the at least one test case. When the testing is unfavorable, the loop continues by modifying one or more of: the one or more of the plurality of application system state transitions, the one or more of the parameters, and the one or more implementation tools. The loop then continues by repeating the loop using the modified current application code development factors.
    Type: Grant
    Filed: September 20, 2017
    Date of Patent: May 26, 2020
    Assignee: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Publication number: 20190187973
    Abstract: A method includes analyzing operational code to determine identifiers used within the operational code. The method further includes grouping like identifiers based a relational aspect of the identifiers. The method further includes, for one or more identifier groups, determining potential feature(s) of the identifier group(s). The method further includes testing the potential feature(s) based on a corresponding feature test suite to produce feedback regarding meaningfulness of the potential feature(s). The method further comprises, when the meaningfulness is above a threshold, adding the potential feature(s) to a feature set. The method further includes, when the meaningfulness is at or below the threshold, adjusting analysis parameter(s), grouping parameter(s), feature parameter(s), and/or testing parameter(s).
    Type: Application
    Filed: December 10, 2018
    Publication date: June 20, 2019
    Applicant: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Patent number: 10275593
    Abstract: A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: April 30, 2019
    Assignee: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20180024815
    Abstract: A method begins by generating application system state transitions from inputted requirements and parameters. For a current implementation of generating application code, the method continues by entering a loop. The loop begins by generating a current intermediate result based on a previous implementation and in accordance with current application code development factors. The loop continues by generating at least one test case based on the one or more of the application system state transitions. The loop continues by testing the current intermediate result in accordance with the at least one test case. When the testing is unfavorable, the loop continues by modifying one or more of: the one or more of the plurality of application system state transitions, the one or more of the parameters, and the one or more implementation tools. The loop then continues by repeating the loop using the modified current application code development factors.
    Type: Application
    Filed: September 20, 2017
    Publication date: January 25, 2018
    Applicant: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Patent number: 9858046
    Abstract: An input/output module receives application requirements and parameters and a processing module implements production of application code. An architecture code level design phase produces code component architecture artifacts of at least a portion of the application code based on one or more of the application requirements, the parameters, or architecture phase feedback. A high-level design (HLD) phase to produce code HLD artifacts based on one or more of the code component architecture artifacts, the application requirements, the parameters, or HLD phase feedback. A low-level design (LLD) phase to produce code LLD artifacts based on one or more of the code component architecture artifacts, the code HLD artifacts, the application requirements, the parameters, or LLD phase feedback and an application code level development phase to produce code artifacts based on one or more of: the HLD artifacts, the LLD artifacts, the application requirements, the parameters, or code development phase feedback.
    Type: Grant
    Filed: June 22, 2015
    Date of Patent: January 2, 2018
    Assignee: UNIQUESOFT, LLC
    Inventors: Thomas Weigert, Francis Joseph Weil
  • Patent number: 9778916
    Abstract: A method begins by generating application system state transitions from inputted requirements and parameters. For a current implementation of generating application code, the method continues by entering a loop. The loop begins by generating a current intermediate result based on a previous implementation and in accordance with current application code development factors. The loop continues by generating at least one test case based on the one or more of the application system state transitions. The loop continues by testing the current intermediate result in accordance with the at least one test case. When the testing is unfavorable, the loop continues by modifying one or more of: the one or more of the plurality of application system state transitions, the one or more of the parameters, and the one or more implementation tools. The loop then continues by repeating the loop using the modified current application code development factors.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: October 3, 2017
    Assignee: UNIQUESOFT, LLC
    Inventor: Thomas J. Weigert
  • Patent number: 9361456
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines when to change a program of the computing device. When the program is to be changed, the security control module accesses a library of programs that includes a plurality of versions of the program and selects one of the plurality of versions of the program. The security control module then updates an active program list to include the selected version of the program. When the program is evoked, the central processing resource uses the selected version of the program such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of the malicious software.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: June 7, 2016
    Assignee: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20150286469
    Abstract: A method for execution by a processing module begins with receiving application requirements and parameters. The method continues by generating application code based on the application requirements, the parameters, and the feedback. For a current implementation of the application code, the method continues by entering a loop that begins by selecting an implementation tool in accordance with implementation constraints and a previous implementation result. The loop continues by generating a current implementation result based on an application of the implementation tool, one or more of the application requirements, one or more of the parameters, and the previous implementation. The loop continues by receiving current feedback regarding the current implementation result. The loop continues by determining whether the current implementation result is at a desired level of correctness based on the current feedback.
    Type: Application
    Filed: June 22, 2015
    Publication date: October 8, 2015
    Applicant: UNIQUESOFT, LLC
    Inventors: Thomas Weigert, Francis Joseph Weil
  • Patent number: 9104862
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module is operable to determine to change at least a portion of a program of the computing device. When the program, or portion thereof, is to be changed, the security control module sends a request to a software generation module for a new version of the program, or portion thereof. The security control module then receives the new version of the program, or portion thereof, and replaces, within the memory, the program, or portion thereof, with the new version of the program, or portion thereof. When the program is evoked, the central processing resource uses the new version of the program, or portion thereof, such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of malicious software.
    Type: Grant
    Filed: April 1, 2013
    Date of Patent: August 11, 2015
    Assignee: UniqueSoft, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Patent number: 9063673
    Abstract: A method for execution by a processing module begins with receiving application requirements and parameters. The method continues by generating application code based on the application requirements, the parameters, and the feedback. For a current implementation of the application code, the method continues by entering a loop that begins by selecting an implementation tool in accordance with implementation constraints and a previous implementation result. The loop continues by generating a current implementation result based on an application of the implementation tool, one or more of the application requirements, one or more of the parameters, and the previous implementation. The loop continues by receiving current feedback regarding the current implementation result. The loop continues by determining whether the current implementation result is at a desired level of correctness based on the current feedback.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: June 23, 2015
    Assignee: UniqueSoft, LLC
    Inventors: Thomas Weigert, Francis Joseph Weil
  • Patent number: 8972948
    Abstract: A method for execution by a processing module begins by receiving inputted requirements and parameters. The method continues by generating application requirements based on the inputted requirements, the parameters, and verification feedback. For one or more application requirements, the method continues by determining whether the generating of the one or more application requirements is consistent with valid system states and correctness criteria to produce one or more verification results. For the one or more application requirements, the method continues by comparing the one or more verification results with one or more verification thresholds to produce the verification feedback.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: March 3, 2015
    Assignee: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Patent number: 8972928
    Abstract: A system includes a requirements unit, an implementation unit, and a testing unit. The requirements unit generates application requirements from inputted requirements and parameters and output them in accordance with a system communication protocol. The implementation unit generates application code based on the application requirements, the parameters, and feedback and outputs the application code in accordance with the system communication protocol. The testing unit tests the application code based on the application requirements and the parameters to produce the feedback.
    Type: Grant
    Filed: August 30, 2011
    Date of Patent: March 3, 2015
    Assignee: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Publication number: 20140298453
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module determines when to change a program of the computing device. When the program is to be changed, the security control module accesses a library of programs that includes a plurality of versions of the program and selects one of the plurality of versions of the program. The security control module then updates an active program list to include the selected version of the program. When the program is evoked, the central processing resource uses the selected version of the program such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of the malicious software.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT,LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20140298454
    Abstract: A computing device includes central processing resources, memory, a network interface, and a security control module. The security control module determines when to change operation of a program of the computing device. When the operation of the program is to be changed, the security control module identifies a first processing resource of the central processing resources that is currently assigned to execute the program and selects a second processing resource of the central processing resources for subsequent execution the program. The security control module then ascertains first execution settings of the program as used by the first processing resource and facilitates conversion of the first execution settings into second execution settings for the second processing resource. The security control module then de-assigns the first processing resource from executing the program and assigns the second processing resource to execute the program.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Publication number: 20140298452
    Abstract: A computing device includes a central processing resource, memory, a network interface, and a security control module. The security control module is operable to determine to change at least a portion of a program of the computing device. When the program, or portion thereof, is to be changed, the security control module sends a request to a software generation module for a new version of the program, or portion thereof. The security control module then receives the new version of the program, or portion thereof, and replaces, within the memory, the program, or portion thereof, with the new version of the program, or portion thereof. When the program is evoked, the central processing resource uses the new version of the program, or portion thereof, such that execution of the program is changed, which changes internal operation of the computing device thereby reducing adverse impact of malicious software.
    Type: Application
    Filed: April 1, 2013
    Publication date: October 2, 2014
    Applicant: UNIQUESOFT, LLC
    Inventors: Terrence Ming Swee Heng, Walter Lee Davis
  • Patent number: 8640106
    Abstract: A testing unit includes an input/output module and a processing module. The input/output module receives application requirements and parameters. The processing module generates a set of test cases based on the application requirements and the parameters; adjusts at least some of the set of test cases based on a code generation progression to produce targeted progression test cases; and tests a developing application code based on the targeted progression test cases, wherein the code generation progression indicates a level of development of the developing application code.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: January 28, 2014
    Assignee: UniqueSoft, LLC
    Inventor: Thomas J. Weigert
  • Publication number: 20130055213
    Abstract: A testing unit includes an input/output module and a processing module. The input/output module receives application requirements and parameters. The processing module generates a set of test cases based on the application requirements and the parameters; adjusts at least some of the set of test cases based on a code generation progression to produce targeted progression test cases; and tests a developing application code based on the targeted progression test cases, wherein the code generation progression indicates a level of development of the developing application code.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: UniqueSoft, LLC
    Inventor: THOMAS WEIGERT
  • Publication number: 20130055194
    Abstract: A method for execution by a processing module begins with receiving application requirements and parameters. The method continues by generating application code based on the application requirements, the parameters, and the feedback. For a current implementation of the application code, the method continues by entering a loop that begins by selecting an implementation tool in accordance with implementation constraints and a previous implementation result. The loop continues by generating a current implementation result based on an application of the implementation tool, one or more of the application requirements, one or more of the parameters, and the previous implementation. The loop continues by receiving current feedback regarding the current implementation result. The loop continues by determining whether the current implementation result is at a desired level of correctness based on the current feedback.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: UNIQUESOFT, LLC
    Inventors: THOMAS WEIGERT, FRANCIS Joseph WEIL
  • Publication number: 20130055195
    Abstract: A method begins by generating application system state transitions from inputted requirements and parameters. For a current implementation of generating application code, the method continues by entering a loop. The loop begins by generating a current intermediate result based on a previous implementation and in accordance with current application code development factors. The loop continues by generating at least one test case based on the one or more of the application system state transitions. The loop continues by testing the current intermediate result in accordance with the at least one test case. When the testing is unfavorable, the loop continues by modifying one or more of: the one or more of the plurality of application system state transitions, the one or more of the parameters, and the one or more implementation tools. The loop then continues by repeating the loop using the modified current application code development factors.
    Type: Application
    Filed: August 31, 2011
    Publication date: February 28, 2013
    Applicant: UNIQUESOFT, LLC
    Inventor: THOMAS J. WEIGERT