Patents Assigned to Unisys Corporation
  • Publication number: 20220283807
    Abstract: A system and method for the storage, within one or more virtual execution context registers, execution tracing information indicative of process/code flow within a processor system. This stored information can include a time stamp, information indicative of where the instruction pointer of the system was pointing prior to any process discontinuity, information indicative of where the instruction pointer of the system was pointing after any process discontinuity, and the number of times a specific instruction or sub-process is executed during a particular process. The data collected and stored can be utilized within such a system for the identification and analysis of code interrupts and profile-guided optimization.
    Type: Application
    Filed: March 8, 2021
    Publication date: September 8, 2022
    Applicant: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Publication number: 20220283838
    Abstract: A system and method for virtual processor customization based upon the particular workload placed upon the virtual processor by one or more execution contexts within a given program or process. The customization serves to optimize the virtual processor architecture based upon a determination as to the size and/or type or virtual execution registers optimally suited for supporting a given execution context. This results in a time-variant processor architecture which not only provides optimized computational attributes, but also affords a high degree of inherent process security.
    Type: Application
    Filed: March 8, 2021
    Publication date: September 8, 2022
    Applicant: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Publication number: 20220283808
    Abstract: A system and method for the storage, within one or more virtual execution context registers, tracing information indicative of process/code flow within a processor system. This stored information can include a time stamp, information indicative of where the instruction pointer of the system was pointing prior to any process discontinuity, information indicative of where the instruction pointer of the system was pointing after any process discontinuity, and the number of times a specific instruction or sub-process is executed during a particular process. The data collected and stored can be utilized within such a system for the identification and analysis of processing hot-spots.
    Type: Application
    Filed: March 8, 2021
    Publication date: September 8, 2022
    Applicant: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Publication number: 20220283817
    Abstract: A system and method for virtual processor customization based upon the particular workload placed upon the virtual processor by one or more execution contexts within a given program or process. The customization serves to optimize the virtual processor architecture based upon a determination as to the size and/or type or virtual execution registers optimally suited for supporting a given execution context. This results in a time-variant processor architecture comprised of a virtual processor base and a virtual execution context.
    Type: Application
    Filed: March 8, 2021
    Publication date: September 8, 2022
    Applicant: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Publication number: 20220247725
    Abstract: A host computing device for use in a network architecture having at least one client computing device or network, at least one server computing device or network and a gateway coupled between the at least one client computing device or network and the at least one server computing device or network. The host computing device includes at least one application container and at least one sidecar container coupled to the application container. The sidecar container provides supporting features to the application container. The sidecar container is a virtual private network (VPN) sidecar that performs at least one sidecar function on behalf of the application container.
    Type: Application
    Filed: March 23, 2021
    Publication date: August 4, 2022
    Applicant: Unisys Corporation
    Inventors: Sanket Panchamia, Amith K K, H P Pranaav, Kanupriya Pandey
  • Publication number: 20220245898
    Abstract: A computer implemented method of training a user to perform a task includes receiving task data from a user device; identifying a task associated with the task data; querying a knowledgebase for data associated with the task; generating an AR pattern for training the user to perform the task; and transmitting the AR pattern to the user device. An augmented reality training system includes a computer device connected to a user device having a video camera. The computer device receives the video data from the video camera and identifies a task from the digital video data. A knowledgebase is connected to the computer device. The knowledgebase contains resources related to the task. The system identifies a task to be performed, queries the knowledgebase for resources and creates an augmented reality pattern with an avatar from the resources for training a user.
    Type: Application
    Filed: February 2, 2021
    Publication date: August 4, 2022
    Applicant: Unisys Corporation
    Inventors: Kelsey L. Bruso, James M. Plasek
  • Patent number: 11386084
    Abstract: An artificially intelligent method includes the steps of monitoring, by a processor, information sources to identify primary semantic information; capturing, by the processor, the primary semantic information; reformatting, by the processor, the primary semantic information according to a predetermined format; analyzing, by the processor, the primary semantic information to establish secondary semantic information; and establishing, by the processor, ontologies from the primary, secondary, and additional secondary semantic information.
    Type: Grant
    Filed: September 8, 2016
    Date of Patent: July 12, 2022
    Assignee: Unisys Corporation
    Inventors: Kelsey L Bruso, James M Plasek
  • Patent number: 11386213
    Abstract: An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.
    Type: Grant
    Filed: June 21, 2016
    Date of Patent: July 12, 2022
    Assignee: Unisys Corporation
    Inventor: Adam Gallagher
  • Publication number: 20220121666
    Abstract: A method of creating a trained database from a document corpus includes creating a tailored neural network for the document corpus by using sentences to create word-level association and sentence-level association; and applying action-trigger phrase sets, created front the document corpus independent of creating the tailored neural network, to the tailored neural network to create a trained database; wherein processing a query through the trained database, rather than the document corpus, increases the speed of processing the query and increases the accuracy of the result.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Publication number: 20220121694
    Abstract: An approach to information retrieval is contemplated for facilitating semantic search and response over a large domain of technical documents is disclosed. First, the grammar and morphology of the statements and instructions expressed in the technical documents is used to filter training data to extract the text that is most information-rich, that is the text that contains domain-specific jargon, in context. This training data is then vectorized and fed as input to an SBERT neural network model that learns an embedding of related words and terms in the text, i.e. the relationship between a given set of words contained in a user's query and the instructions from the technical documentation text most likely to assist in the user's operations. There are two parsing tasks. The first is to select a minimal sample of sentences from the document corpus that capture the domain-specific terminology (jargon). The result is set of sentences used to train BERT and SBERT.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Publication number: 20220121814
    Abstract: A method of parsing implicit tables within a document includes parsing, by a processor, a document to determine a pattern for a set of text that sets apart the information contained therein from the rest of the text; determining, by the processor, from the pattern of spacing, a first descriptive phrase and a second descriptive phrase; and assigning, by the processor, the first descriptive phrase as an action and the second descriptive phrase as a trigger.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Patent number: 11300992
    Abstract: Methods and systems for implementing independent time in a hosted operating environment are disclosed. The hosted, or guest, operating environment, can be seeded with a guest time value by a guest operating environment manager that maintains a time delta between a host clock time and an enterprise time. The guest operating environment can subsequently manage its guest clock from the guest time value. If the guest operating environment is halted, the guest operating environment manager can manage correspondence between the host clock time and the enterprise time by periodically assessing divergence between actual and expected values of the host clock time.
    Type: Grant
    Filed: September 10, 2019
    Date of Patent: April 12, 2022
    Assignee: Unisys Corporation
    Inventors: Robert F. Inforzato, Dwayne E. Ebersole, Daryl R. Smith, Grace W. Lin, Andrew Ward Beale, Loren C. Wilton
  • Publication number: 20220107795
    Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method further includes determining a code level supported by a processor executable at a computing system, the processor executable supporting a hosted computing environment. The method also includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution based on the code level supported by the processor executable. The method includes executing the machine-readable code within the hosted computing environment.
    Type: Application
    Filed: October 5, 2020
    Publication date: April 7, 2022
    Applicant: Unisys Corporation
    Inventors: Matthew Ward Miller, Andrew Ward Beale, Anthony Matyok
  • Patent number: 11243751
    Abstract: A proxy compiler may be used within a native execution environment to enable execution of non-native instructions from a non-native execution environment as if being performed within the native execution environment. In particular, the proxy compiler coordinates creation of a native executable that is uniquely tied to a particular non-native image at the creation time of the non-native image. This allows a trusted relationship between the native executable and the non-native image, while avoiding a requirement of compilation/translation of the non-native instructions for execution directly within the native execution environment.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: February 8, 2022
    Assignee: Unisys Corporation
    Inventors: Andrew Ward Beale, Anthony P. Matyok, Clark C. Kogen, David Strong
  • Patent number: 11237809
    Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution to select features for inclusion in execution at a time of execution. The method includes executing the machine-readable code within the hosted computing environment.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: February 1, 2022
    Assignee: Unisys Corporation
    Inventors: Matthew Miller, David Strong, Anthony Matyok
  • Publication number: 20220030001
    Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220027156
    Abstract: Methods and systems described herein utilize a jump table in directly-addressable, near code, to facilitate improved execution of frequent calls to executable code from other workloads outside of the near code. By executing a directly-addressable call and jump instruction to access frequently-accessed executable code, indirect call instructions are avoided.
    Type: Application
    Filed: July 21, 2020
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Andrew Ward Beale, David Strong
  • Publication number: 20220030032
    Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20220029996
    Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.
    Type: Application
    Filed: July 27, 2021
    Publication date: January 27, 2022
    Applicant: Unisys Corporation
    Inventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
  • Publication number: 20210406732
    Abstract: A method and system for forecasting resource utilization of an information technology system having a plurality of system components. The method includes classifying the plurality of system components based on at least one resource utilization metric. The method also includes determining at least one reference component in each class from among the components classified within the respective class. The method also includes building a representative machine learning model for each reference component in each class. The method also includes applying the representative machine learning model to all system components within the respective class. Applying the representative machine learning model to all system components within the respective class forecasts the resource utilization of all system components in the information technology system without building a machine learning model for each system component in the information technology system.
    Type: Application
    Filed: February 17, 2021
    Publication date: December 30, 2021
    Applicant: unisys corporation
    Inventors: Pavan Thatha, Ruma Mukherjee, Soma Kohli, Chiranjeev Joshi, Amanpreet Singh