Patents Assigned to Unisys
  • Publication number: 20250124366
    Abstract: Relational routing data tables are converted into graphs comprising nodes and vertices. The nodes can include origins and destinations associated with routes, while the vertices represent route parameters. Route segments can then be mapped from the graphs. For an origin-destination input, a set of shortest parameterized paths among the route segments is identified. These shortest parameterized paths includes route segments weighted over a range of route parameters. Within a solution domain, an optimal solution can be generated by filtering the shortest parameterized path based on a set of one or more selected parameters to generate an optimal solution. A classical threshold determines whether the optimal solution is generated using a classical computing process or a quantum computing process.
    Type: Application
    Filed: October 15, 2024
    Publication date: April 17, 2025
    Applicant: Unisys Corporation
    Inventor: Dastgeer SHAIKH
  • Patent number: 12235823
    Abstract: A processor-based method of making a file containing a secondary index recoverable during processing of the secondary index includes: capturing a current system time as a captured system time and writing the captured system time to control information; finding writes to the file containing the secondary index; also writing the writes to an audit trail; using the captured system time in control information for the secondary index as a start time for recovery; determining if there is a primary key value in the control information; using a primary key value in the control information to traverse to a data page continuing the primary key value; placing a read-lock on the data page; creating a corresponding secondary index entry; and releasing the read-lock.
    Type: Grant
    Filed: March 31, 2022
    Date of Patent: February 25, 2025
    Assignee: Unisys Corporation
    Inventors: Kelsey L. Bruso, James M. Plasek
  • Publication number: 20250045392
    Abstract: A processor-based method for securing files through a persistent signature includes selecting file contents; selecting a file header associated with the file contents; selecting a private key, a certificate identifier and a hash algorithm identifier; creating an encrypted hash of the file contents and file header using the hash algorithm and private key; and creating a persistent, independent signature for the file contents and file header that identifies the certificate identifier, hash algorithm identifier, and the encrypted hash value.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 6, 2025
    Applicant: Unisys Corporation
    Inventor: Michael T. Kain
  • Publication number: 20250047482
    Abstract: A method of verifying a file includes selecting a file and header, extracting a signature; retrieving a public key associated with the signature; decrypting an encrypted hash to get a clear text value; creating a new hash value; and determining if the clear text value matches the new hash value and if a matched is detected, verifying the signature, and if a match is not detected failing the verification.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 6, 2025
    Applicant: Unisys Corporation
    Inventor: Michael T. Kain
  • Patent number: 12124563
    Abstract: Virtual machines in a network may be isolated by encrypting transmissions between the virtual machines with keys possessed only by an intended recipient. Within a network, the virtual machines may be logically organized into a number of community-of-interest (COI) groups. Each COI may use an encryption key to secure communications within the COI, such that only other virtual machines in the COI may decrypt the message. Remote devices may gain access to virtual machines in a network through a virtual device relay. The virtual device relay receives data from the remote device, such as a tablet or cellular phone, and forwards the data to one of the virtual machines, when the virtual device relay shares a COI with the destination virtual machine.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: October 22, 2024
    Assignee: Unisys Corporation
    Inventors: Ralph Farina, Ted Hinaman, Robert A. Johnson, Steven Rajcan, James Trocki, Mark Vallevand
  • Patent number: 12079650
    Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.
    Type: Grant
    Filed: May 15, 2020
    Date of Patent: September 3, 2024
    Assignee: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Patent number: 12073218
    Abstract: A system and method for the storage, within one or more virtual execution context registers, tracing information indicative of process/code flow within a processor system. This stored information can include a time stamp, information indicative of where the instruction pointer of the system was pointing prior to any process discontinuity, information indicative of where the instruction pointer of the system was pointing after any process discontinuity, and the number of times a specific instruction or sub-process is executed during a particular process. The data collected and stored can be utilized within such a system for the identification and analysis of processing hot-spots.
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: August 27, 2024
    Assignee: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Patent number: 12047351
    Abstract: A host computing device for use in a network architecture having at least one client computing device or network, at least one server computing device or network and a gateway coupled between the at least one client computing device or network and the at least one server computing device or network. The host computing device includes at least one application container and at least one sidecar container coupled to the application container. The sidecar container provides supporting features to the application container. The sidecar container is a virtual private network (VPN) sidecar that performs at least one sidecar function on behalf of the application container.
    Type: Grant
    Filed: March 23, 2021
    Date of Patent: July 23, 2024
    Assignee: Unisys Corporation
    Inventors: Sanket Panchamia, Amith K K, H P Pranaav, Kanupriya Pandey
  • Patent number: 12032984
    Abstract: A system and method for virtual processor customization based upon the particular workload placed upon the virtual processor by one or more execution contexts within a given program or process. The customization serves to optimize the virtual processor architecture based upon a determination as to the size and/or type or virtual execution registers optimally suited for supporting a given execution context. This results in a time-variant processor architecture comprised of a virtual processor base and a virtual execution context.
    Type: Grant
    Filed: March 8, 2021
    Date of Patent: July 9, 2024
    Assignee: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Patent number: 11977650
    Abstract: An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions, The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: May 7, 2024
    Assignee: Unisys Corporation
    Inventor: Adam Gallagher
  • Patent number: 11836130
    Abstract: The present invention provides for employing SQL to introduce blockchain technologies into a relational database, and thereby leverage the inherent tamper-resistant properties of blockchain, without the need to completely rewrite existing or legacy relational database software. The invention creates a relational database inside of a blockchain and uses a conventional SQL interface for standard database operations. This reduces the burden of introducing blockchain technologies, while providing the benefits of the intrinsic security and verification features of blockchain technology. The invention provides a rich historical record of every transaction thereby greatly reducing, if not eliminating, the relational database's susceptibility to tampering. This allows for temporal queries on arbitrary records within the database and the generation of reports and audits for any point in the history of the database.
    Type: Grant
    Filed: October 10, 2019
    Date of Patent: December 5, 2023
    Assignee: Unisys Corporation
    Inventors: Devon Andrew Beckett, James David Fletcher, Max Hirsch, Vidya Mudalagiri Venkatesha, Alex George
  • Publication number: 20230353384
    Abstract: A processor-based method for verifying a secured file, directory, or meta-data, comprising: extracting a persistent, independent signature for a secured file, directory, or meta-data from a directory signature file, the signature identifying a certificate identifier, a hash algorithm identifier, and an encrypted hash value for that secured file, directory, or meta-data; retrieving a public key corresponding to the certificate identifier; decrypting the encrypted hash using the public key and a decryption tool, resulting in a clear text hash value; creating a new hash value for the secured file, directory, or meta-data, the hash creation corresponding to the hash algorithm identifier; and verifying the signature when the new hash value for the secured file, directory, or meta-data matches the unencrypted hash value from the persistent, independent signature for the secured file, directory, or meta-data,
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
  • Publication number: 20230353373
    Abstract: A processor-based method for creating a persistent directory signature file, comprising: selecting a private key, a certificate identifier and a hash algorithm identifier for the directory signature file; concatenating one or more persistent, independent signatures wherein a persistent independent signature includes a file name, sub-directory indicator, or meta-data indicator, and a certificate identifier, and a hash identifier, and an encrypted hash; creating an encrypted hash of the one or more concatenated signatures using the hash algorithm and private key chosen for the directory signature file; and concatenating the encrypted hash of the one or more concatenated signatures with the concatenated signatures and the certificate identifier, and hash algorithm identifier chosen for the directory signature file to create a persistent, independent signature for the directory signature file.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L Bruso, Brian A. Wegleitner, Michael T. Kain
  • Publication number: 20230350953
    Abstract: A processor-based method for securing meta-data through a persistent signature, comprising: identifying meta-data for a file; selecting a private key, a certificate identifier and a hash algorithm identifier for the meta-data; creating an encrypted hash of the meta-data using the hash algorithm and private key; and creating a persistent, independent signature for the meta-data that identifies the meta-data, certificate identifier, hash algorithm identifier, and the encrypted hash value for the meta-data.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
  • Publication number: 20230353377
    Abstract: A processor-based method for securing files through a persistent signature includes: selecting a file of any file type; selecting a private key, a certificate identifier and a hash algorithm identifier for the file; creating an encrypted hash of the file using the hash algorithm and private key for the file; and creating a persistent, independent signature for each selected file that identifies the file, certificate identifier, hash algorithm identifier, and the encrypted hash value for the file.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
  • Publication number: 20230353372
    Abstract: A processor-based method for securing directories through a persistent signature, comprising: selecting a directory; selecting a private key, a certificate identifier and a hash algorithm identifier for each selected directory; creating an encrypted hash of the directory using the hash algorithm and private key; and creating a persistent, independent signature for the directory that identifies the directory, certificate identifier, hash algorithm identifier, and the encrypted hash value for that directory.
    Type: Application
    Filed: May 2, 2022
    Publication date: November 2, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, Brian A. Wegleitner, Michael T. Kain
  • Patent number: 11798251
    Abstract: Methods and systems for implementing an object identification system equipped to reduce the number of service calls for remote object identification lookups are disclosed. The object identification management server works to reduce the number of object identification requests, which overall improves the process of quickly and accurately providing object identifications when needed and without unnecessarily wasting computing resources. The object identification server can subsequently manage the number of identification requests by setting a tunable threshold, which allows a system to operate more efficiently and allocate computing resources accordingly.
    Type: Grant
    Filed: October 9, 2020
    Date of Patent: October 24, 2023
    Assignee: Unisys Corporation
    Inventors: James Plasek, Mark Rosno, Shardul Patil, Hayden Donze, Max Hirsch
  • Publication number: 20230315705
    Abstract: A processor-based method of creating a secondary index includes creating an empty secondary index; capturing the current system time; cloning the database to create a cloned database; writing to a file a secondary index column value and a primary key column value from rows in the cloned database that meet search criteria; populate the secondary index using sorted data; writing, periodically, a row number being processed from the file to control information for the B-tree; and clearing the row number.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L Bruso, James M. Plasek
  • Publication number: 20230315712
    Abstract: A processor-based method of making a file containing a secondary index recoverable during processing of the secondary index includes: capturing a current system time as a captured system time and writing the captured system time to control information; finding writes to the file containing the secondary index; also writing the writes to an audit trail; using the captured system time in control information for the secondary index as a start time for recovery; determining if there is a primary key value in the control information; using a primary key value in the control information to traverse to a data page continuing the primary key value; placing a read-lock on the data page; creating a corresponding secondary index entry; and releasing the read-lock.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L Bruso, James M. Plasek
  • Publication number: 20230315707
    Abstract: A processor-based method of creating a secondary index for a B-tree in a database includes creating an empty secondary index; traversing the B-tree to find the left most data page to begin processing; capturing the current system time; placing a read-lock on the data page; retrieving a first primary key value for the data page; writing the first primary key value to a control information for the B-tree; creating a secondary index entry and writing it into the secondary index; and releasing the read-lock.
    Type: Application
    Filed: March 31, 2022
    Publication date: October 5, 2023
    Applicant: Unisys Corporation
    Inventors: Kelsey L Bruso, James M. PIasek