Patents by Inventor Charles Caldarale

Charles Caldarale has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220027454
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of authenticating and authorizing a user in an emulated computing environment is disclosed. The method includes receiving a request by a user operating on a guest operating system and having user credentials to invoke a process in a secure sandbox on a host operating system; searching a pool of credentials for the user credentials in the host operating system; associating the user credentials with the process such that all services running on a guest operating system have the same credentials as a host operating system; and after the process has completed, returning the user credentials to the pool.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein
  • Publication number: 20220027178
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of allowing command sessions in a guest operating system includes receiving, by a host operating system, a request to invoke a command session by a guest operating system; receiving, by the host operating system, a request to invoke a bash interceptor; and loading bash code into a secure sandbox on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein
  • Publication number: 20220027485
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. According to one embodiment, a method of allowing root file access includes receiving a request from a guest operating system to have root file access in a host operating system; determining, by the host operating system, if the request is asking for information relevant to the guest operating system itself, and if the request is asking for information that has the same credentials as the request; and if the information is relevant to the guest operating system itself and the information has the same credentials as the request, then providing a secure path to the relevant root file system on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechterlein
  • Publication number: 20220027220
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of invoking a native process as a called procedure, the method including receiving, by a host operating system, a request to invoke a native process as a called procedure form a guest operating system; loading the native process executable into a secure sandbox running on the host operating system; and transforming data from the native process into a representation appropriate for the called the procedure in the host operating environment.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Malthew Nuechterlein
  • Publication number: 20220027458
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of compiling and executing a new program in a secure sandbox. The method includes receiving, by a host operating system, a request from a guest operating system to invoke an execution environment in a secure sandbox on a host operating system; and execute the execution environment in the secure sandbox. The user can use the execution environment in the secure sand box from a guest operating system to compile and execute the new program on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechterlein
  • Publication number: 20220027457
    Abstract: The present disclosure elates generally to a computer architecture and infrastructure for guest operating systems executing on a host operating system. More particularly, it relates to methods and systems for allowing a guest operating system to control the resources of a commodity server system. A method of allowing a guest operating system to control and manage computer resources includes receiving, by a host operating system, a call from a guest operating system to control and manage computer resources; creating, by the host operating system, a secure sandbox executing on the host operating system; and creating, by the host operating system, a secure tunnel between the secure sandbox and the guest operating system, the secure tunnel having loopback networking. The secure sandbox is controlled and managed by the guest operating system but executing on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Dezlel, Tim Dick, Kevin Harris, Matthew Nuechterlein
  • Publication number: 20220027179
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of creating a guest-native executable includes receiving, by a host operating system, a call from a guest operating system to construct an executable from a guest-native source; creating an ecosystem for the guest-native source in a secure sandbox running on a host operating system; receiving the guest-native source; and executing the guest-native source in the ecosystem on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein
  • Patent number: 9542167
    Abstract: Systems and methods for monitoring performance of virtualized instructions are provided. One method includes, during emulated execution of non-native program code including non-native instructions, maintaining a program flow history in a computing system representing a flow of program execution of the non-native program code. The program flow history includes a listing of non-native jump instructions for which execution is emulated in the computing system. The method also includes capturing one or more statistics regarding performance in native execution of the non-native program code on the computing system. The method further includes correlating the one or more statistics to the program flow history to determine performance of the computing system in executing one or more non-native instructions between each of the non-native jump instructions.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: January 10, 2017
    Assignee: Unisys Corporation
    Inventors: Thomas Nowatzki, Charles Caldarale
  • Publication number: 20150121353
    Abstract: Systems and methods for monitoring performance of virtualized instructions are provided. One method includes, during emulated execution of non-native program code including non-native instructions, maintaining a program flow history in a computing system representing a flow of program execution of the non-native program code. The program flow history includes a listing of non-native jump instructions for which execution is emulated in the computing system. The method also includes capturing one or more statistics regarding performance in native execution of the non-native program code on the computing system. The method further includes correlating the one or more statistics to the program flow history to determine performance of the computing system in executing one or more non-native instructions between each of the non-native jump instructions.
    Type: Application
    Filed: October 28, 2013
    Publication date: April 30, 2015
    Inventors: Thomas Nowatzki, Charles Caldarale
  • Publication number: 20050091239
    Abstract: In a computer system a system of exchanging tokens for queue banks is created that permits a requestor to directly specify which queue bank is wanted. Only the desired queue bank is withdrawn from a queue bank repository to accomplish this and no sorting or FIFO handling of queue banks is needed. The system uses a schema similar to a coat check room, where the requestor is given a token when the requestor wants to deposit a queue bank into the queue bank repository. The queue bank repository returns the queue bank when the token is returned by the requester. In its most efficient form, two machine-level instructions handle the entire operation, a withdraw instruction and a deposit instruction.
    Type: Application
    Filed: October 26, 2004
    Publication date: April 28, 2005
    Inventors: Wayne Ward, David Johnson, David Johnson, Charles Caldarale