Patents by Inventor James R. Heit

James R. Heit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210073104
    Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.
    Type: Application
    Filed: November 20, 2020
    Publication date: March 11, 2021
    Inventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
  • Patent number: 10846195
    Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: November 24, 2020
    Assignee: Unisys Corporation
    Inventors: James R Heit, Robert L Bergerson, Jason C Schultz, John A Peters
  • Patent number: 10498624
    Abstract: Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the first router. Embodiments may also include identifying a failure in the first router and, in response to identification of the failure in the first router, automatically switching use of the first router and second router by the Linux-based computing system. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the second router after switching the use of the first router and second router by the Linux-based computing system.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: December 3, 2019
    Assignee: Unisys Corporation
    Inventors: James R Heit, Robert L Bergerson, Jason C Schultz, John A Peters
  • Patent number: 10425395
    Abstract: A client system may be configured to request a single sign on authentication, in which an identity certificate is provided by the client system and stored by a server system. The stored certificate may be used to later authenticate a secure connection between the client system and the server system, after validating that the user represented by the certificate is a legitimate registered user of the server. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: September 24, 2019
    Assignee: Unisys Corporation
    Inventors: Glen E Newton, Robert L Bergerson, James R Heit, Steven R Hallquist
  • Patent number: 9912750
    Abstract: A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: March 6, 2018
    Assignee: Unisys Corporation
    Inventors: Jason C Schultz, John A Peters, Robert Bergerson, James R Heit
  • Publication number: 20170310660
    Abstract: A client system may be configured to request a single sign on authentication, in which an identity certificate is provided by the client system and stored by a server system. The stored certificate may be used to later authenticate a secure connection between the client system and the server system, after validating that the user represented by the certificate is a legitimate registered user of the server. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection.
    Type: Application
    Filed: April 25, 2016
    Publication date: October 26, 2017
    Applicant: Unisys Corporation
    Inventors: Glen E Newton, Robert L Bergerson, James R Heit, Steven R Hallquist
  • Patent number: 9774516
    Abstract: A traceroute command may be used to diagnose a computer network or provide additional information regarding a computer network. A traceroute command may be provided to applications executing within a virtualized environment by allowing commands to be passed from the virtualized environment to a host operating system through a network interface. The traceroute command may be executed by the host operating system, and network information returned to the application in the virtualized environment.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: September 26, 2017
    Assignee: Unisys Corporation
    Inventors: William O. Pollnow, Allyn Smith, James R. Heit, Dennis Stroik
  • Publication number: 20170097878
    Abstract: Methods and systems for logging data in a computing system are disclosed. The methods and systems include receiving a first request to create log data of an activity of the computing system. The methods and systems further include acquiring information about the activity of the computing system. The methods and systems further include creating the log data of the activity of the computing system. The methods and systems further include retrieving stored log data.
    Type: Application
    Filed: October 5, 2015
    Publication date: April 6, 2017
    Applicant: UNISYS CORPORATION
    Inventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
  • Publication number: 20170099206
    Abstract: Systems and methods for adaptive router failover in Linux-based computing systems are disclosed. Embodiments may include configuring a Linux-based computing system to have access to at least a first router and a second router. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the first router. Embodiments may also include identifying a failure in the first router and, in response to identification of the failure in the first router, automatically switching use of the first router and second router by the Linux-based computing system. Embodiments may further include transmitting one or more data packets from the Linux-based computing system to another computing system via the second router after switching the use of the first router and second router by the Linux-based computing system.
    Type: Application
    Filed: October 5, 2015
    Publication date: April 6, 2017
    Applicant: UNISYS CORPORATION
    Inventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
  • Publication number: 20170099267
    Abstract: A communications platform may provide asymmetric cryptography using RSA and/or DSA algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (PKCS). Compatibility with PKCS #8 format may enable the communications platform to receive and decrypt encrypted private key files from another communications platform.
    Type: Application
    Filed: October 1, 2015
    Publication date: April 6, 2017
    Applicant: Unisys Corporation
    Inventors: James R. Heit, Robert L. Bergerson, Jason C. Schultz, John A. Peters
  • Publication number: 20170046145
    Abstract: Systems and methods for dynamically installing a program's dependent software modules before program execution are disclosed. Embodiments may include extracting, from a file that includes at least a program to be executed on the computing system and one or more software modules on which the program depends for execution, the one or more software modules on which the program depends for execution. Embodiments may also include installing the one or more software modules on the computing system after the one or more software modules have been extracted. Embodiments may further include loading and executing the program after the one or more software modules have been installed on the computing system.
    Type: Application
    Filed: August 13, 2015
    Publication date: February 16, 2017
    Applicant: UNISYS CORPORATION
    Inventors: Jason C. Schultz, John A. Peters, Robert L. Bergerson, James R. Heit
  • Patent number: 9380047
    Abstract: A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis.
    Type: Grant
    Filed: June 19, 2013
    Date of Patent: June 28, 2016
    Assignee: Unisys Corporation
    Inventors: Jason C. Schultz, James R. Heit, Robert L. Bergerson
  • Publication number: 20160028819
    Abstract: A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack.
    Type: Application
    Filed: July 25, 2014
    Publication date: January 28, 2016
    Applicant: UNISYS CORPORATION
    Inventors: Jason C. Schultz, John A. Peters, Robert Bergerson, James R. Heit
  • Publication number: 20140380421
    Abstract: A server system may be configured to receive a request for a connection from a client application. The server system may also be configured to determine if the client application is permitted to connect with the server. The connection with the client application may be prohibited if the server determines that the client application is not permitted to connect with the server. A secure connection with the client application may be permitted if the server determines that the client application is permitted to connect with the server. The secure connection may be established with the security protocol settings specified by a process on the server or shared security protocol settings specified by on a server system-wide basis.
    Type: Application
    Filed: June 19, 2013
    Publication date: December 25, 2014
    Applicant: Unisys Corporation
    Inventors: Jason C. Schultz, James R. Heit, Robert L. Bergerson
  • Publication number: 20140325232
    Abstract: A client system may be configured to request a certificate from a server system and store the certificate locally. The stored certificate may be used to later authenticate a secure connection between the client system and the server system. The secure connection validated by the stored certificate may be, for example, a secure sockets layer/transport layer security (SSL/TLS) connection.
    Type: Application
    Filed: April 30, 2013
    Publication date: October 30, 2014
    Applicant: Unisys Corporation
    Inventors: Jason C. Schultz, James R. Heit, Robert L. Bergerson
  • Publication number: 20140068054
    Abstract: A traceroute command may be used to diagnose a computer network or provide additional information regarding a computer network. A traceroute command may be provided to applications executing within a virtualized environment by allowing commands to be passed from the virtualized environment to a host operating system through a network interface. The traceroute command may be executed by the host operating system, and network information returned to the application in the virtualized environment.
    Type: Application
    Filed: September 6, 2012
    Publication date: March 6, 2014
    Inventors: William O. Pollnow, Allyn Smith, James R. Heit, Dennis Stroik
  • Patent number: 8042156
    Abstract: Techniques are described for mapping an emulated SSL implementation to, for example, OpenSSL.
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: October 18, 2011
    Assignee: Unisys Corporation
    Inventors: Robert L. Bergerson, James R. Heit, John A. Peters, Jason C. Schultz
  • Patent number: 8032742
    Abstract: This application generally describes techniques for dynamically updating trusted certificates and CRLs, generally referred to herein as certificate information. That is, techniques are described for updating trusted certificates and CRLs without terminating existing communication sessions. An exemplary method includes the steps of receiving an initial configuration that includes a trusted certificate authority, receiving certificate information that includes a certificate revocation list (CRL) and a first certificate from the trusted certificate authority, storing the certificate information in the configuration, initiating a communication session for an application, receiving an update to the certificate information, and updating the configuration to reflect the update to the certificate information without terminating the communication session.
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: October 4, 2011
    Assignee: Unisys Corporation
    Inventors: Robert L. Bergerson, James R. Heit, Jason C. Schultz
  • Publication number: 20100146588
    Abstract: Techniques are described for mapping an emulated SSL implementation to, for example, OpenSSL.
    Type: Application
    Filed: December 5, 2008
    Publication date: June 10, 2010
    Inventors: Robert L. Bergerson, James R. Heit, John A. Peters, Jason C. Schultz
  • Publication number: 20100146250
    Abstract: This application generally describes techniques for dynamically updating trusted certificates and CRLs, generally referred to herein as certificate information. That is, techniques are described for updating trusted certificates and CRLs without terminating existing communication sessions. An exemplary method includes the steps of receiving an initial configuration that includes a trusted certificate authority, receiving certificate information that includes a certificate revocation list (CRL) and a first certificate from the trusted certificate authority, storing the certificate information in the configuration, initiating a communication session for an application, receiving an update to the certificate information, and updating the configuration to reflect the update to the certificate information without terminating the communication session.
    Type: Application
    Filed: December 5, 2008
    Publication date: June 10, 2010
    Inventors: Robert L. Bergerson, James R. Heit, Jason C. Schultz