Patents Assigned to Unisys Corporation
  • Publication number: 20180309789
    Abstract: Methods and systems for assigning security settings to one or more nodes within an enterprise network are disclosed. One method includes receiving network concordance data at an enterprise security management configuration tool from a plurality of nodes within an enterprise network, and receiving, in a configuration user interface, a selection of an affinitization level selected from a plurality of discrete affinitization levels, each of the discrete affinitization levels corresponding to a different extent to which nodes within an enterprise are grouped into profiles. The method also includes automatically grouping each of the plurality of nodes identified in the network concordance data into a plurality of profiles based on the selected affinitization level, and applying a common security policy to each of the nodes included in one of the plurality of profiles.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: UNISYS CORPORATION
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W Phelps
  • Publication number: 20180309790
    Abstract: Methods and systems for configuring a security topology in an enterprise security management configuration tool are disclosed. One method includes manipulating an icon representing one or more nodes in a configuration user interface of an enterprise security management configuration tool to associate the one or more nodes into a manual grouping of nodes in an enterprise network; and, after manipulating the icon, selecting, from a tool palette of the configuration user interface, an automatic association tool, the automatic association tool determining an association among a plurality of nodes into a plurality of automated logical groupings of nodes. In some cases, the manual grouping of nodes is different from the plurality of automated logical groupings, and the automatic association tool preserves the manual grouping of nodes.
    Type: Application
    Filed: April 24, 2017
    Publication date: October 25, 2018
    Applicant: UNISYS CORPORATION
    Inventors: Robert A. Johnson, Michael J. DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps
  • Patent number: 10110683
    Abstract: Systems and methods for improving the handing of communications between network applications in a computer system with connectivity services interfaces that seamlessly handle the communications in an easy-to-use, secure, message-oriented environment are disclosed. Embodiments of systems and methods for maintaining ownership of sessions by applications, and for avoiding the orphaning of communication sessions when activities are terminated are also disclosed. Also disclosed are embodiments of systems and methods for accessing data using authentication credentials different than the authentication credentials associated with a user that is requesting access to the data. Embodiments of systems and methods for authenticating credentials for establishing a secure communication connection between applications executing on different platforms are also disclosed.
    Type: Grant
    Filed: August 11, 2015
    Date of Patent: October 23, 2018
    Assignee: Unisys Corporation
    Inventors: Allyn D Smith, Steven R Hallquist, William O Pollnow
  • Patent number: 10108479
    Abstract: A system and method for monitoring and correcting device operating states during steady-state operations may be automated. The operating states for devices operating in a steady-state environment may be monitored. Any operating device that is set to operate in an unexpected operating state may be automatically changed to its expected operating state. The operator may then be warned of any incorrect state assignment through a console message that cannot be ignored by the operator.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: October 23, 2018
    Assignee: Unisys Corporation
    Inventor: James R Malnati
  • Patent number: 10083086
    Abstract: Systems and methods for automatically resuming commissioning of a partition image after a halt in the commissioning process are disclosed. Embodiments may include initiating a commissioning of a partition image. Embodiments may also include updating metadata associated with the commissioning of the partition image after each successfully executed step of the commissioning process. Embodiments may further include identifying a halt in the commissioning process and resuming, after the halt has been identified, the commissioning process from the last successfully executed step of the commissioning process stored in the metadata during the most recent update of the metadata.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: September 25, 2018
    Assignee: Unisys Corporation
    Inventor: Manoharan Govindarajan Earurnthavadi
  • Patent number: 10057370
    Abstract: Devices may be grouped into teams by a team identifier configured for each device. Within the team, one device may be selected as a control device for handling requests made to the team. A team address is assigned to the team for directing communications from the client. The control device parses messages addressed to the team address and forwards requests to slave devices in the team. The control device may perform load balancing of the slave devices when directed messages to the slave devices. Device teams may be used to assign dynamic licenses to the clients.
    Type: Grant
    Filed: September 6, 2012
    Date of Patent: August 21, 2018
    Assignee: UNISYS CORPORATION
    Inventor: Eric T. Obligacion
  • Patent number: 10044755
    Abstract: A system for configuring a plurality of security devices is provided. The system is configured to automatically generate one or more policy definition files and use the files to integrally control security configurations for a plurality of security devices in one or more networks. The system includes a security control module and one or more policy agent modules. The security control module converts security parameters to the one or more security policy definition files. The policy agent modules receive the security policy definition files and extract a plurality of policy configuration parameters from the security policy definition file. The plurality of policy configuration parameters is passed to the associated security devices. The security control module maintains communication with other components in the system, such as a checking module and a reporting module.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: August 7, 2018
    Assignee: Unisys Corporation
    Inventor: Gaurang Kanaiyalal Pandya
  • Patent number: 10007429
    Abstract: Database performance may be improved by creating additional backups from an existing backup, rather than the original database or audit log source. A second backup may be created from a first backup by copying the files from the first backup to the second backup. The replication from a first backup to a second backup with modification of the file history information allows identical backups to exist on different types of storage devices, including virtual storage devices. Continue functionality may be implemented during a move function to restart replication at a new starting point while retaining the existing move set. Tape-type-override functionality may be implemented during the replication to replace the tape type for the backups with another compatible type while retaining the original type for history file entries, tape trailers, and messages.
    Type: Grant
    Filed: February 24, 2015
    Date of Patent: June 26, 2018
    Assignee: Unisys Corporation
    Inventor: Ellen L Sorenson
  • Patent number: 10007807
    Abstract: Methods and systems for managing I/O requests in a secure storage appliance are disclosed. One method includes receiving a plurality of I/O requests at the secure storage appliance, each I/O request associated with a block of data and a volume, each volume associated with a plurality of shares stored on a plurality of physical storage devices. The method further includes storing a plurality of blocks of data in buffers of the secure storage appliance, each of the blocks of data associated with one or more of the plurality of I/O requests. The method also includes associating a state with each of the blocks of data, the state selected from a plurality of states associated with processing of an I/O request.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: June 26, 2018
    Assignee: Unisys Corporation
    Inventors: Scott Summers, Albert French
  • Patent number: 10008132
    Abstract: A method and apparatus for embedding a data message in a carrier object using steganography. The method provides a secret key and determines an indicator channel from a plurality of color channels in the carrier object, wherein the indicator channel is the color channel in the carrier object that has a maximum number of different pixel values in the carrier object. The method generates a sorted indicator channel value array based on the channel values and the frequency of occurrence of each value of the indicator channel in the carrier object. For each indicator channel value in the sorted indicator channel value array, the method iterates through the carrier object to determine the pixel in the carrier object whose indicator channel value is the same as the current indicator channel value in the sorted indicator channel value array.
    Type: Grant
    Filed: September 14, 2016
    Date of Patent: June 26, 2018
    Assignee: Unisys Corporation
    Inventors: Anand Ankit, Rajnish Chandra
  • Patent number: 9965192
    Abstract: Methods and systems for implementing a secure migratable architecture having improved performance features over existing virtualization systems are disclosed. One method includes allocating a portion of a memory for use by a process, the process including a firmware environment representing a virtual computing system having a second computing architecture different from a first computing architecture of a computing system on which the process is executed. The method includes associating area descriptors with each of a plurality of memory areas within the portion of the memory used by the process, and receiving a request within the firmware environment to store data within a first memory area of the plurality of memory areas, the first memory area defined by a first area descriptor of the area descriptors, the request being associated with a plurality of memory addresses within the first memory area.
    Type: Grant
    Filed: February 19, 2016
    Date of Patent: May 8, 2018
    Assignee: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Patent number: 9946740
    Abstract: A solution for maintaining the operation of a server and allowing the transfer of data from client devices to a database without locking the database during an audit and pack process is realized that reduces the amount of time lost due to backup file storage transfer. When a file is backed up to a first storage trail through the audit process, the trail may eventually become filled to capacity. Upon the first storage trail filling to capacity, a pack process is initiated, and a backup storage trail is created to store the data during this process. Upon completion of the pack process, the data from the backup storage trail is transferred to another active storage trail.
    Type: Grant
    Filed: March 24, 2015
    Date of Patent: April 17, 2018
    Assignee: Unisys Corporation
    Inventors: Rajeev Athani, Manjunatha Nanjundappa, Rajesh Sidappa Kuri
  • Patent number: 9942110
    Abstract: Monitoring of storage systems, including virtual tape libraries (VTLs), may be performed with automated systems. Automated monitoring may be performed through an SSH connection to a storage manager for the storage system. For example, a method may include initiating, by a monitoring server, an SSH connection to a storage manager; issuing commands, by the monitoring server, through the SSH connection to monitor a storage device coupled to the storage manager; receiving, by the monitoring server, responses to the issued commands through the SSH connection; matching, by the monitoring server, the responses to automation rules; and executing, by the monitoring server, commands based on the matched automation rules.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: April 10, 2018
    Assignee: Unisys Corporation
    Inventors: James R Malnati, Robert J Jamieson
  • Publication number: 20180081805
    Abstract: An apparatus includes a memory and a processor coupled to the memory. The processor is configured to perform the steps of: receiving a first head link for a page invalidation chain, the page invalidation chain including a plurality of page invalidation tables (PITs); receiving a second head link for an active real page table (RPT) chain, the active RPT chain including a plurality of RPTs; accessing a PIT, wherein the PIT includes a first data structure and a second data structure; invalidating the one or more RPTs, whereas the one or more RPTs are invalidated simultaneously in a batch; and releasing the one or more RPTs to a free RPT chain, the free RPT chain includes a plurality of released RPTs.
    Type: Application
    Filed: September 22, 2016
    Publication date: March 22, 2018
    Applicant: Unisys Corporation
    Inventors: DAVID W SCHROTH, KERRY M LANGSFORD, MAX J HEIMER, MICHAEL J RIESCHL
  • Patent number: 9916479
    Abstract: A Universal Serial Bus (USB) dock for connecting a USB data storage device to a computing network. The USB dock includes a chassis for coupling the USB dock to the computing network, at least one panel coupled to the chassis, and at least one USB port coupled to at least one of the panels. The USB port indicates when a USB data storage device is connected to the USB port. The USB dock includes an operating system for booting the USB dock, for creating a table associated with the connected USB data storage device and for initiating an antivirus scan of the connected USB data storage device. If the antivirus scan detects a virus on the connected USB data storage device, an option of removing the virus from the connected USB data storage device is provided. If the detected virus is not removed from the connected USB data storage device, the USB port to which the USB data storage device is connected is disabled, thereby preventing the virus from entering the computing network.
    Type: Grant
    Filed: September 29, 2015
    Date of Patent: March 13, 2018
    Assignee: UNISYS CORPORATION
    Inventors: Lakshmi Krishna Jois, Ranjith Menon PV
  • Patent number: 9912663
    Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.
    Type: Grant
    Filed: February 8, 2017
    Date of Patent: March 6, 2018
    Assignee: Unisys Corporation
    Inventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
  • Patent number: 9910647
    Abstract: A method and apparatus for allowing for field size calculation and color coding display options usable in an emulated integrated development environment (IDE). A user may be able to quickly and accurately calculate the field size of variables in a code structure, irrespective of the length of the structure or the number of variables selected. The user may also be able to match the variables with their redefinitions accurately and easily when required. A user may also be able to easily identify the names of sections, paragraphs, referenced variables, and unreferenced variables visually in a code editor. The users may also be able to assign colors of his choice to the sections, paragraphs, referenced variables, and unreferenced variables.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: March 6, 2018
    Assignee: Unisys Corporation
    Inventors: Gaurav Ahuja, Anand Prakash, Swetha Shetty
  • Patent number: 9912750
    Abstract: A method and apparatus for high-speed data path selection for network transfer using IP addresses is disclosed. The method may include configuring an IP address for a non-RDMA data transfer or an RDMA high speed data transfer. An application executing in an emulated environment may transfer data using the same function calls for both non-RDMA data transfer or an RDMA high speed data transfer. This reduces changes to the application to allow RDMA transfers. A non-emulated interface determines whether the IP address is flagged as an RDMA address. If so, the data is transferred via an RDMA data path. If the IP address is not flagged as an RDMA address, the data is transferred via a non-RDMA data path through a traditional network stack.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: March 6, 2018
    Assignee: Unisys Corporation
    Inventors: Jason C Schultz, John A Peters, Robert Bergerson, James R Heit
  • Publication number: 20180046586
    Abstract: An apparatus includes a memory and a processor of a secured cloud storage broker (SCSB) coupled to the memory. The processor is configured to perform the steps of: receiving a request from a user to deposit data; confirming whether the user provides appropriate credentials; authenticating the request; generating a first unique combination of an internet storage provider ID, a subscription account, a storage location, a storage account, and a file directory; generating a second unique combination of a file ID, an encryption algorithm, and a key; encrypting the data using the encryption algorithm and the key; and sending the encrypted data to the file directory for storage.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Applicant: Unisys Corporation
    Inventor: Prithvi B. Venkatesh
  • Publication number: 20170364693
    Abstract: An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.
    Type: Application
    Filed: June 21, 2016
    Publication date: December 21, 2017
    Applicant: Unisys Corporation
    Inventor: Adam Gallagher