Patents by Inventor Steven L. Rajcan

Steven L. Rajcan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10776489
    Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.
    Type: Grant
    Filed: January 18, 2016
    Date of Patent: September 15, 2020
    Assignee: Unisys Corporation
    Inventors: Steven L Rajcan, Matthew Mohr, Jim Trocki, Mark K Vallevand
  • Publication number: 20200252411
    Abstract: Methods and systems for monitoring network data packets within a secure network are described. One method includes receiving, at a consumer endpoint, a data packet from a second endpoint, the data packet being encrypted with an encryption key associated with a packet auditing community of interest and having a routing header appended thereto, the routing header identifying the consumer endpoint. The method includes decrypting the data packet using the encryption key associated with the packet auditing community of interest, and removing at least a portion of the routing header identifying the consumer endpoint from the decrypted data packet. The method also includes performing at least one packet auditing operation on the decrypted data packet.
    Type: Application
    Filed: February 5, 2019
    Publication date: August 6, 2020
    Inventors: SARAH K. INFORZATO, LEMOINE D. KEIPER, III, JONATHAN P. DAVIS, KATHLEEN R. WILD, STEVEN L. RAJCAN, ZACHARY DREMANN, MICHAEL J. DIDOMENICO, JONATHAN E. SKILTON, COREY SCHOENFELD
  • Patent number: 10417428
    Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.
    Type: Grant
    Filed: January 18, 2016
    Date of Patent: September 17, 2019
    Assignee: Unisys Corporation
    Inventors: Steven L. Rajcan, Matthew Mohr, Jim Trocki, Mark K. Vallevand
  • Publication number: 20190197242
    Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.
    Type: Application
    Filed: January 18, 2016
    Publication date: June 27, 2019
    Applicant: Unisys Corporation
    Inventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
  • Patent number: 9912663
    Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: March 6, 2018
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
  • Patent number: 9794225
    Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.
    Type: Grant
    Filed: June 29, 2015
    Date of Patent: October 17, 2017
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
  • Publication number: 20170237735
    Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. the method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.
    Type: Application
    Filed: February 8, 2017
    Publication date: August 17, 2017
    Applicant: Unisys Corporation
    Inventors: Robert A. Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
  • Publication number: 20170169227
    Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.
    Type: Application
    Filed: January 18, 2016
    Publication date: June 15, 2017
    Applicant: Unisys Corporation
    Inventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
  • Publication number: 20170169226
    Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.
    Type: Application
    Filed: January 18, 2016
    Publication date: June 15, 2017
    Applicant: Unisys Corporation
    Inventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
  • Publication number: 20170169225
    Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.
    Type: Application
    Filed: January 18, 2016
    Publication date: June 15, 2017
    Applicant: Unisys Corporation
    Inventors: Steven L. Rajcan, Matthew Mohr, Jim Trocki, Mark K. Vallevand
  • Publication number: 20150382193
    Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 31, 2015
    Applicant: UNISYS CORPORATION
    Inventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan
  • Publication number: 20110314022
    Abstract: In a KStore having a plurality of K nodes with count fields a method for updating count fields, receiving a particle to provide a received particle, updating selected node counts of the plurality of nodes counts in response to the received particle to provide first updated K node count fields, and saving selected K node count fields for later updating to provide second updated count fields are recited. The K nodes include elemental root nodes and the second updated K node count fields include elemental root nodes of the plurality of elemental root nodes. The second updated K node count fields include only elemental root nodes of the plurality of elemental root nodes. The first updated K node count fields include no elemental root nodes. The second updated K node count fields include K nodes pointed to by the Result pointers of the first updated K node count fields.
    Type: Application
    Filed: June 8, 2006
    Publication date: December 22, 2011
    Applicant: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert R. Buckwalter
  • Patent number: 7689571
    Abstract: A method for optimizing the construction of a KStore includes providing a data set having a plurality of records with a plurality of fields, providing an optimization structure from a sample of the data set and analyzing the optimization structure to determine a field order for the records contained in the data set. A KStore is provided from the data set in accordance with the field order. The sample of the data set can include the entire data set, a random sample of the data set or a predetermined number of records from the data set. The data set has an initial order having earlier records and later records and the sample can include a plurality of the earlier records. The sample of the data set includes a user determined number of records from the data set. The optimization structure can be a KStore.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: March 30, 2010
    Assignee: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Timothy William Collins, Steven L. Rajcan
  • Patent number: 7676330
    Abstract: A method for processing KStore sensors for use by a KEngine in a KStore system to process a K includes providing a stream of particles, instantiating a KStore sensor structure, identifying particles to be included in a sensor set and processing said identified particles. The KStore sensor structure can provide a correspondence between a particle and a sensor K node. Furthermore, the KStore sensor structure can be a list of K nodes, an indexed array or a hash table.
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: March 9, 2010
    Assignee: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Steven L. Rajcan
  • Patent number: 7418445
    Abstract: A method for recording information in an interlocking trees datastore having a plurality of K paths includes receiving an input particle and building a new K node in accordance with the received input particle. A K node is locked in accordance with the building of the new K node to provide a locked node. The locked node can be the Case node of the new K node. The Case bi-directional link between the locked Case node and the new K node is completed while the locked Case node is locked. A pointer is added to the new K node to an asCase list of the locked Case node. The locked node is locked only while adding the pointer to the new K node to the asCase list of the locked Case node. The locked node can also be a Result node of the new K node.
    Type: Grant
    Filed: July 20, 2005
    Date of Patent: August 26, 2008
    Assignee: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Jane Van Keuren Claar, Steven L. Rajcan
  • Patent number: 7409380
    Abstract: In learning for an interlocking trees datastore or KStore, the process is made more efficient by noting the (n-level) address within the KStore during the learning of each particle. In a pre-particle stream of data, which may be organized within or before the Learn Engine prior to this, “Marks” and “References” are inserted. Each Mark identifies where any number of References may start the learning process, enabling the avoidance of re-learning redundant data. Thus, in a field record data set, the redundant data fields (or even partial fields) can be skipped over and only the new data learned. The Marks and References are removed before processing into a particle stream. When particles are learned the K Engine returns the n-level address or pointer(s) which the Learn Engine uses to associate with the relevant Reference(s). The system can be implemented in hardware if desired to speed processing. No limit to the distribution or numbers of KStores, Learn Engines being used or K Engines being used is indicated.
    Type: Grant
    Filed: April 7, 2005
    Date of Patent: August 5, 2008
    Assignee: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Jane Van Keuren Claar, Timothy William Collins, Steven L. Rajcan
  • Patent number: 7389301
    Abstract: Aggregation of data in an interlocking trees datastore, especially when the interlocking datastore is a KStore is described. It details consolidating data into a summary or aggregation so that some particular desired analytic type of operation may easily be performed on the data. It uses a set of data constraints across the entire data set. This redefines the data set, which may be for example, individual receipts granular by week or month. When data is learned into a KStore, aggregation parameters may be collected and these parameters may be used to constrain the dataset recorded in K, and direct performance of an analytic on a particular a field value(s). Additional features and details are provided within.
    Type: Grant
    Filed: June 10, 2005
    Date of Patent: June 17, 2008
    Assignee: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert Buckwalter
  • Publication number: 20070288496
    Abstract: In a KStore having a plurality of K nodes with count fields a method for updating count fields, receiving a particle to provide a received particle, updating selected node counts of the plurality of nodes counts in response to the received particle to provide first updated K node count fields, and saving selected K node count fields for later updating to provide second updated count fields are recited. The K nodes include elemental root nodes and the second updated K node count fields include elemental root nodes of the plurality of elemental root nodes. The second updated K node count fields include only elemental root nodes of the plurality of elemental root nodes. The first updated K node count fields include no elemental root nodes. The second updated K node count fields include K nodes pointed to by the Result pointers of the first updated K node count fields.
    Type: Application
    Filed: June 8, 2006
    Publication date: December 13, 2007
    Applicant: Unisys Corporation
    Inventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert R. Buckwalter
  • Patent number: 6157927
    Abstract: An interconnect for enabling a component in a transaction processing environment to request, as part of a global transaction under the control of a transaction manager that is not XATMI-compliant, a resource on a remote server outside of that environment that is under the control of an XATMI-compliant transaction manager, comprises a resource manager and a connection manager. The resource manager has a first interface that receives XATMI service requests from the component and a second interface that receives directives issued by the first transaction manager for the global transaction.
    Type: Grant
    Filed: April 22, 1998
    Date of Patent: December 5, 2000
    Assignee: Unisys Corporation
    Inventors: Diane E. Schaefer, Steven L. Kayser, Steven L. Rajcan