Patents Assigned to Unisys Corp.
-
Publication number: 20130097276Abstract: A sensor network may be coupled to a cloud computing system for improved reliability, flexibility, and functionality. The sensor network may communicate with the cloud computing system through a coordinator gateway device through a wireless network. Data recording and data processing is offloaded from the individual sensors to the cloud computing system, which has significantly better reliability and processing capability and is not restricted by battery life. The recorded and processed data residing on the cloud computing system may be viewed, manipulated and modified through a client device displaying an application, web page, and/or application program interface (API).Type: ApplicationFiled: October 13, 2011Publication date: April 18, 2013Applicant: Unisys Corp.Inventor: Bharath Sridhar
-
Publication number: 20130060732Abstract: Altering tables in a database system may be difficult because the tables may only be altered when all connection to the tables have been released. A free resources parameter may be set on in a management system for the database system to specify that resources should be attempted to be released. Connections to the database may be closed earlier that conventionally closed. For example, connections that are idle may be released. Once the connections have been released the database may be altered and the free resources parameter turned off. The free resources parameter notifies the database system of a pending alteration and allows the database to gracefully close connections to provide an opportunity for the alteration to occur.Type: ApplicationFiled: September 7, 2011Publication date: March 7, 2013Applicant: Unisys Corp.Inventors: James M. Plasek, Michael S. Jende, Ronald H. Manzhuber, Jennifer J. Smith
-
Publication number: 20130060795Abstract: Performance of database systems may be improved by reducing the processing performed with each database query. For example, when a database query, such as a SQL statement, is executed with a first set of values, the query may be stored as a prepared statement and parsed and optimized as a section. When a similar database query is executed with a new set of values the section may be re-executed with the new set of values without re-parsing or re-optimizing the prepared statement. A similar database query may continue to be executed with new sets of values until the section is invalid because of an alteration to the table definitions of the database schema.Type: ApplicationFiled: September 7, 2011Publication date: March 7, 2013Applicant: Unisys Corp.Inventors: James M. Plasek, Michael S. Jende, Ronald H. Menzhuber, Jennifer J. Smith
-
Publication number: 20120215714Abstract: Electronic processing of the paper air waybills improves the speed and reduces the cost of providing air waybills. Enhanced services available for e-freight air waybills include automatic locking of the air waybills and automatic export quality assurance. E-freight air waybills may be identified by special handling codes such as e-Freight Air Waybill with Paper Document (EAP) and e-Freight Air Waybill without Paper Document (EAW). Additionally, an air waybill history may be created for the e-freight air waybills. The history may include freight waybill (FWB) messages and freight negative acknowledgement (FNA) messages related to the e-freight air waybill.Type: ApplicationFiled: February 23, 2011Publication date: August 23, 2012Applicant: Unisys Corp.Inventors: William Loebertmann, JoAnn Jancik
-
Publication number: 20120140993Abstract: Biometric authentication is enhanced by prompting an individual to perform an action challenge. For example, when an individual provides a facial picture for facial recognition to access secure data the individual may be prompted to provide a second picture of the individual performing an action. In one case, the individual is prompted to provide a second picture with an eye closed or an open mouth. The action challenge improves security by preventing attackers from spoofing an individual's biometric information. The enhanced biometric authentication may be used on mobile devices, such as mobile phones and laptop computers, to provide access to secure data, such as bank account information.Type: ApplicationFiled: December 5, 2010Publication date: June 7, 2012Applicant: Unisys Corp.Inventors: Kelsey L. Bruso, Glen E. Newton
-
Publication number: 20120143927Abstract: An in-memory document model may be created from a markup language document while parsing the markup language document. The model includes small fixed-size memory structures allocated from a single larger memory pool. The model stores the data contained in the markup language document and the hierarchical relationship between the data items in the markup language document. Thus, random access to the markup language document is achieved without further access to the document and without the overhead of language-specific object construction. When an object-oriented computer program instance references the document model, a language-specific object may be constructed from the model including a pointer to an element of the model. The document model may be created when parsing extensible markup language (XML) documents.Type: ApplicationFiled: December 5, 2010Publication date: June 7, 2012Applicant: Unisys Corp.Inventors: Michael J. Hill, John C. Horton
-
Publication number: 20120143912Abstract: Legacy database engines may be extended through the use of callback extension handlers on the client. For example, regular expression matching and arbitrary user-functions may be implemented in a legacy database engine without replacing the engine. A pattern string may be provided to the legacy database engine by a client with a pattern matching prefix. When the legacy database engine encounters the prefix, the database engine executes a callback to the client with a value from the database for pattern matching. The client performs the pattern matching through, for example, regular expressions, and returns a match status to the database engine. The process may be repeated for several rows of a table in the database and a dataset compiled by the database engine and returned to the client.Type: ApplicationFiled: December 5, 2010Publication date: June 7, 2012Applicant: Unisys Corp.Inventors: John C. Horton, Michael J. Hill
-
Publication number: 20120131439Abstract: A dynamic document template having static data, dynamic data, and/or procedural statements may be called by an application on a server. The dynamic document template is separate from the application program and is processed to form an interim script, which is then executed by a host computer system. The script generates document records in HTML or XML format that are output to a document. The data and procedural statements in the dynamic document template may be distinguished through interpreting mark-up language surrounding the data and procedural statements. The dynamic document templates execute in a separate namespace from the application and preserve the state of data in the application. A given application may call more than one dynamic document template to generate different portions of the output document. Additionally, the dynamic document templates may be replaced with new templates without affecting the application.Type: ApplicationFiled: November 22, 2010Publication date: May 24, 2012Applicant: Unisys Corp.Inventors: Michael J. Hill, John C. Horton
-
Publication number: 20120110575Abstract: A soft partitioning system for allowing multiple virtual system environments to execute on a single platform may include I/O service partitions (IOSPs). The IOSPs operating in a separate virtual memory space on the platform and service disk and network requests from multiple guests. The IOSPs provide translation from virtual addresses to physical addresses such that from the point of view of the guest the virtual addresses used by the guest appear to be physical addresses. The IOSP may be implemented in a Linux kernel. The address space of the IOSP may be extended to include DMA memory sections such that the Linux kernel does not include all of the guest's memory. The IOSP may operate on hardware that does or does not support virtualization technology for directed I/O.Type: ApplicationFiled: November 29, 2010Publication date: May 3, 2012Applicant: Unisys Corp.Inventors: William L. Weber, III, David A. Kershner, John A. Landis, William P. Jordan
-
Publication number: 20120110297Abstract: A soft partitioning system for allowing multiple virtual system environments to execute on a single platform may include I/O service partitions (IOSPs). The IOSPs operating in a separate virtual memory space on the platform and service disk and network requests from multiple guests. The IOSPs provide translation from virtual addresses to physical addresses such that from the point of view of the guest the virtual addresses used by the guest appear to be physical addresses. The IOSP may be implemented in a Linux kernel. The address space of the IOSP may be extended to include DMA memory sections such that the Linux kernel does not include all of the guest's memory. The IOSP may operate on hardware that does or does not support virtualization technology for directed I/O.Type: ApplicationFiled: November 29, 2010Publication date: May 3, 2012Applicant: Unisys Corp.Inventor: David A. Kershner
-
Publication number: 20120110026Abstract: A table may be stored in a data structure and accessed by two scripts from different platforms. For example, a table of inputs from a web form may be stored with a first script for execution on a first platform. The table may be accessible to the first script when executing on the first platform and accessible to a second script when executing on a second platform. According to one embodiment, the first script may be a business information server (BIS) script and the second script may be a JavaScript. The dual compatibility table allows the web form inputs to be accessed by multiple scripts having different requirements.Type: ApplicationFiled: October 28, 2010Publication date: May 3, 2012Applicant: Unisys Corp.Inventors: J. Mark Brassil, John C. Horton, Michael J. Hill
-
Publication number: 20120102368Abstract: Error information may be made quickly and easily accessible to an administrator by logging communications attempts in the operating system of a server. When the interface processor resides outside of the operating system, the interface processor may provide indications to the operating system of communications attempts. Specifically, the interface processor may provide message packets to the pass-through communications processor of the operating system when SSL/TLS communications attempts fail to establish secure communications sessions. The message packets may include information useful for diagnosing errors in SSL/TLS communication failures such as errors in the creation and management of certificates, certificate trust, private and public keys, and/or cipher suites. The communications logs in the operating system may be reviewed and/or analyzed by an administrator with a log trace analysis application.Type: ApplicationFiled: October 21, 2010Publication date: April 26, 2012Applicant: Unisys Corp.Inventors: James Heit, Robert Bergerson, John Peters, Jason Schultz
-
Publication number: 20120102085Abstract: A resource adapter may include an inbound connection from an information server and an outbound connection to the information server. A resource adapter of the application server may listen for request messages on the inbound connection. Session beans in an enterprise container of the application server containing the resource adapter performs tasks requested in the request messages. Response messages are transmitted by the resource adapter through the outbound connection to the application server. The session beans may perform calculations for the information server or access data for the information server. The request messages may be generated by a JavaScript executing in the information server.Type: ApplicationFiled: October 22, 2010Publication date: April 26, 2012Applicant: Unisys Corp.Inventor: Eugene Joseph Gretter
-
Publication number: 20120078833Abstract: Business rules may be defined for camera placement in a video surveillance system, such as a system monitoring an airport. The business rules may be logical rules having an if-then format. For example, the if portion of the business rule may include a category, a surveillance area, and a business case for a proposed location. The then portion of the business rule may specify a recommendation to install an additional security camera in the video surveillance system at the proposed location. The recommendation may be calculated using a spreadsheet. The business rules provide justification for recommending a new camera placement and provide sound reasoning to assist in decision making when considering new camera locations in a video surveillance system.Type: ApplicationFiled: November 5, 2010Publication date: March 29, 2012Applicant: Unisys Corp.Inventor: Jeffrey R. Johnson
-
Publication number: 20120072638Abstract: Trapping and/or processing of read/write accesses to hardware devices represented to the host through a memory mapped space may be performed without knowledge of the processor's instruction set or semantics of the processor's instructions. A single step routine may be executed to recognize page faults occurring from read/write accesses to emulated memory pages and causing the guest to retry the operation on a single step buffer. The hypervisor may perform post-operation processing on the single step buffer after the guest retries and completes the read or write access. For example, on a read request, the single step routine may place the guest value in the single step buffer for reading by the guest on a retry operation. On a write request, the single step routine may direct the guest to retry the write operation into the single step buffer.Type: ApplicationFiled: September 16, 2010Publication date: March 22, 2012Applicant: Unisys Corp.Inventors: J. Alan Grubb, John Landis, Bryan Thompson, James R. Hunter
-
Publication number: 20110206243Abstract: An identification system for authenticating individuals may include enrolling an individual's iris images into a database for late comparison during an identification process. A security attendant may enroll the individual with a mobile device having an iris camera, which captures the individual's iris images. The attendant may also insert biographical information and a face image of the individual. When the individual may be authenticating by walking through a pedestrian lane having an iris camera identification system. The system captures the individual's iris images and compares them to previously enrolled iris images. A nearby security attendant may be alerted to individuals proceeding through a pedestrian lane who have not been previously enrolled.Type: ApplicationFiled: September 22, 2010Publication date: August 25, 2011Applicant: Unisys Corp.Inventor: Steven E. Vlcan
-
Publication number: 20100038848Abstract: An automated document processing apparatus comprising a detector; a plurality of pockets; and a pocket selector gate assembly which causes a document being processed by the apparatus to be routed to one of the plurality of pockets based on information read from the document by the detector, the route of the document being determined by the position of a pocket selector gate, the pocket selector gate position being controlled by a motor which is mechanically coupled to the pocket selector gate, the mechanical coupling being such that, when the pocket selector gate is in a first position, the pocket selector gate is locked in place even after the motor has been deenergized. The mechanical coupling may be achieved by way of a link arm and pin, the pin mating with the link arm and engaging a mating slot of the pocket selector gate.Type: ApplicationFiled: August 18, 2008Publication date: February 18, 2010Applicant: Unisys Corp.Inventors: David B. Tratar, Johan P. Bakker, Paul J. McCarthy, Michael J. Kiplinger, Thomas J. Shelton
-
Patent number: 6760719Abstract: Heterogeneous data at a plurality of remote nodes is accessed automatically in parallel at high speed from a user site using a simple script request containing a data source object name wherein the heterogeneous data is treated as a single data source object, the script further containing at least one method to be performed on the data source object. Respective agent processes at the user site and at the remote nodes automatically generate descriptor files containing metadata corresponding to the data source object. The user site agent breaks the user-generated script into new scripts appropriate for execution at the remote nodes. A messenger process transmits the new scripts to the appropriate remote nodes where respective agent processes respond to automatically access the appropriate data and execute specified methods upon it.Type: GrantFiled: September 24, 1999Date of Patent: July 6, 2004Assignee: Unisys Corp.Inventors: Charles Albin Hanson, Thomas Winston Johnson, Carol Jean O'Hara, Koon-yui Poon, Roger Anthony Redding
-
Patent number: 6625663Abstract: A computer-implemented method for streaming object models with a plurality of versioned states. The method comprises the steps of streaming out each versioned state for each nonderived classifier-level feature; streaming out each versioned state of each unowned object within the model; streaming out versioned state of each owned object not yet streamed out; streaming out the versioned state of each link not represented by a reference; and streaming out a version graph using normal XMI.Type: GrantFiled: March 23, 2000Date of Patent: September 23, 2003Assignee: Unisys Corp.Inventor: Donald Edward Baisley
-
Patent number: 6415275Abstract: A method for processing rules using a model resident within a persistent storage means of a computer system executing a repository program. The method includes the steps of storing in the persistent storage means the model, which comprises a set of rules and a set of facts defining event states. Both of these are stored as objects. The set of rules and set of facts comprise an object-oriented representation of the model. Next, a set of commands representing an extensible inference engine are loaded as meta objects into the persistent storage. The method accepts as inputs events, which represent alterations in the set of facts and determines which of the rules is associated with the alterations in the set of facts. The most salient one of the rules determined in the preceding step is then selected and executed.Type: GrantFiled: August 5, 1999Date of Patent: July 2, 2002Assignee: Unisys Corp.Inventor: Karl Theodore Zahn