Patents Assigned to Unisys
-
Patent number: 9332319Abstract: Methods and systems for converting speech to text are disclosed. One method includes analyzing multimedia content to determine the presence of closed captioning data. The method includes, upon detecting closed captioning data, indexing the closed captioning data as associated with the multimedia content. The method also includes, upon failure to detect closed captioning data in the multimedia content, extracting audio data from multimedia content, the audio data including speech data, performing a plurality of speech to text conversions on the speech data to create a plurality of transcripts of the speech data, selecting text from one or more of the plurality of transcripts to form an amalgamated transcript, and indexing the amalgamated transcript as associated with the multimedia content.Type: GrantFiled: September 27, 2010Date of Patent: May 3, 2016Assignee: Unisys CorporationInventors: Johney Tsai, Matthew Miller, David Strong
-
Patent number: 9330380Abstract: The present disclosure discloses methods and systems for managing one or more recurrencies. The method includes defining one or more recurrency tasks, each task having associated recurrency parameters. The method further includes identifying a recurrency period wherein the one or more recurrency tasks are disaggregated into individual scheduled events over the span of the recurrency period. Thereafter, a user-defined exclusionary schedule is applied to the disaggregated set of events. Subsequently, the edited recurrent tasks are output in a pre-defined file format.Type: GrantFiled: December 29, 2011Date of Patent: May 3, 2016Assignee: Unisys CorporationInventor: Brice Richard Ballesteros
-
Patent number: 9329883Abstract: Systems and methods for tracing an emulated execution order of non-native instructions based on natively executing code on a computing system having a native instruction set architecture are provided. One method includes, during emulated execution of non-native program code, maintaining a jump history in the computing system, the jump history including a listing of non-native jump instructions for which execution is emulated in the computing system. The method includes, for each of the non-native jump instructions included in the jump history, accessing non-native program code including the non-native instructions to determine one or more non-native instructions executed between the non-native jump instruction and a last-executed non-native jump instruction, and aggregating the non-native jump instruction and the one or more non-native instructions into an instruction trace.Type: GrantFiled: October 28, 2013Date of Patent: May 3, 2016Assignee: Unisys CorporationInventor: Thomas Nowatzki
-
Publication number: 20160110664Abstract: Software may be used to organize controls in an organization from multiple groups within the organization to determine a level of compliance with specified principles. A method for determining compliance may include receiving a list of controls; receiving a plurality of point of focus identifications, wherein each point of focus of the plurality of point of focus identifications correspond to a control of the list of controls; and determining a compliance score for a plurality of principles based, at least in part, on the received points of focus.Type: ApplicationFiled: October 21, 2014Publication date: April 21, 2016Applicant: Unisys CorporationInventors: Michelle Marks, Yasemin Agatan
-
Patent number: 9317703Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: GrantFiled: February 26, 2014Date of Patent: April 19, 2016Assignee: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Patent number: 9319285Abstract: Application performance in cloud-based virtualized environments may be improved by migrating partitions executing within the cloud between servers. When an application spans multiple related partitions spread out on different servers within the cloud, related partitions may be migrated to the same server or nearby servers to reduce input/output (I/O) delay in communications between the related partitions. A method for improving performance may include analyzing a network traffic log to identify related partitions. Then, communications costs may be calculated for the related partitions and a partition selected for migration to a new location in the cloud.Type: GrantFiled: December 11, 2012Date of Patent: April 19, 2016Assignee: Unisys CorporationInventors: Nandish Kopri, Dharmesh Kakadia
-
Patent number: 9311117Abstract: Systems and methods are disclosed herein to a method for providing a system name of a computer system, comprises generating a system ID key based on a system type of the computer system using an external key generator module; installing the system ID key on the computer system in an active operating state by extracting the system name from the system ID key; updating operating system structures for immediate use of the system name; writing a machine name index into halt/load parameters that are implemented by the computer system for subsequent restarts of the computer system after suspending the computer system, wherein the machine name index identifies a location of the system name in a system registry; and writing the system name into the system registry from the system ID key.Type: GrantFiled: December 10, 2012Date of Patent: April 12, 2016Assignee: Unisys CorporationInventor: Philip M Hoffman
-
Publication number: 20160098454Abstract: Systems and methods for evaluating analytic queries comprising disjunctive Boolean expressions are described. A method may include receiving an analytic query comprising a first disjunctive Boolean expression. The method may further include transforming the analytic query to obtain a transformed analytic query comprising at least one nondisjunctive Boolean expression and at least a second disjunctive Boolean expression. The method may also include evaluating the transformed analytic query, wherein complete evaluation of the at least one nondisjunctive Boolean expressions and the at least a second disjunctive Boolean expressions yields the same results as evaluation of the first disjunctive Boolean expression.Type: ApplicationFiled: October 7, 2014Publication date: April 7, 2016Applicant: Unisys CorporationInventors: James M. Plasek, Jennifer J. Smith
-
Publication number: 20160087798Abstract: Hash values for a message may be computed by a receiving computer as portions of the message are received. In one embodiment, an intermediate hash value is computed for a portion of the message and a new intermediate hash value computed for each received portion of the message based on a previous intermediate hash value and the contents of the new received portion. When all portions of the message have been received, the final calculated intermediate hash value is the hash value for the entire message. In one embodiment, such a method of calculating a hash value may be based on the SHA-256 hash algorithm or other known or later developed hash algorithms. In one embodiment, the hash calculation for portions of received messages may be applied to keyed-hashing for message authentication (HMAC).Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Applicant: Unisys CorporationInventor: Raymond Campbell
-
Patent number: 9294443Abstract: A system and method of managing secure integration of a cloud-based computing resource with a private domain are disclosed. One system includes a hybrid cloud arrangement including a plurality of virtual machines, the plurality of virtual machines including at least a first virtual machine within the private domain and a second virtual machine within a public cloud. The system also includes a virtual data relay within the private domain and associated with the second virtual machine. The virtual data relay includes a private domain interface used to establish a secure communication link according to a first security protocol with each virtual machine within the private domain that is a member of a community of interest, the virtual data relay assigned a community of interest key used by the private domain interface and defining the community of interest of which the second virtual machine is a member.Type: GrantFiled: September 2, 2014Date of Patent: March 22, 2016Assignee: Unisys CorporationInventors: Robert A Johnson, Mark S Brandt, Christopher A Byrd, Kathy Y Jaing
-
Publication number: 20160078243Abstract: Systems and methods for establishing a secure file system are disclosed, in which system endpoints such as files and directories in a file system are protected using a security appliance. The security appliance protects each endpoint in the file system from unauthorized access by making those endpoints invisible to unauthorized users. The security appliance organizes users and endpoints into various communities of interest (COI). A user COI groups users such that all users associated with that particular COI have authorization to view the same one or more endpoints located in file storage.Type: ApplicationFiled: September 15, 2014Publication date: March 17, 2016Applicant: Unisys CorporationInventors: Kelsey L. Bruso, Uday Datta Shet
-
Publication number: 20160077937Abstract: A fabric computer method and system for recovering fabric computer node function. The fabric computer method includes monitoring a processing environment operating on a first Processor and Memory node within the fabric computer complex, detecting a failure of the first Processor and Memory node, and transferring the processing environment from the first Processor and Memory node to a second Processor and Memory node within the fabric computer complex in response to the detection of a failure of the first Processor and Memory node. The fabric computer system includes a first Processor and Memory node, a second Processor and Memory node coupled to the first Processor and Memory node, at least one input/output (I/O) and Networking node coupled to the first and second Processor and Memory nodes, and a fabric manager coupled to the first and second Processor and Memory nodes and the at least one I/O and Networking node.Type: ApplicationFiled: September 16, 2014Publication date: March 17, 2016Applicant: Unisys CorporationInventors: Robert F. Inforzato, Richard E. Blyler, Andrew F. Sanderson, Steven E. Clarke, Dwayne E. Ebersole, Steven L. Forbes, Andrew Ward Beale, Craig F. Russ, Craig R. Church, Derek W. Paul
-
Publication number: 20160070541Abstract: A system modeler may provide a framework for the development of business applications using object oriented concepts. The system modeler may also be configured to convert business suite solutions. For example, a system modeler may be configured to retrieve, by a processor, a model database comprising presentation information and layout information associated with a client application, wherein the presentation information and layout information associated with the client application are stored in the model database. Additionally, the system modeler may be configured to convert, by the processor, the retrieved model database to a software framework model and one or more client application projects, wherein the software framework model and the one or more client application projects are generated based, at least in part, on the retrieved model database, and wherein the presentation information and layout information associated with the client application are stored in the one or more client application projects.Type: ApplicationFiled: May 5, 2015Publication date: March 10, 2016Applicant: Unisys CorporationInventors: Andrew Hei Yin Lee, Grantley McCauley, John V Papachristos, Fred Heida
-
Patent number: 9262185Abstract: A dynamic document template having static data, dynamic data, and/or procedural statements may be called by an application on a server. The dynamic document template is separate from the application program and is processed to form an interim script, which is then executed by a host computer system. The script generates document records in HTML or XML format that are output to a document. The data and procedural statements in the dynamic document template may be distinguished through interpreting mark-up language surrounding the data and procedural statements. The dynamic document templates execute in a separate namespace from the application and preserve the state of data in the application. A given application may call more than one dynamic document template to generate different portions of the output document. Additionally, the dynamic document templates may be replaced with new templates without affecting the application.Type: GrantFiled: November 22, 2010Date of Patent: February 16, 2016Assignee: Unisys CorporationInventors: Michael J. Hill, John C. Horton
-
Publication number: 20160034382Abstract: A method for testing a computer application includes identifying components of a version of the application, said components including one or more components that are one of new and modified, generating a keyword matrix of the identified application components. A search is performed in a test script repository with respect to components listed as at least one of the first and second dimensions of the matrix. The keyword matrix is populated with test case identification numbers in the search result. Based on the populated keyword matrix, one or more of (a) gaps in test case coverage for the version of the application, and (b) one or more test cases covering the version of the application are identified.Type: ApplicationFiled: March 30, 2015Publication date: February 4, 2016Applicant: Unisys CorporationInventors: Vivek Kumar, Sahana Shankar
-
Publication number: 20160027075Abstract: Systems and methods for performing all-in spot rate pricing with a logistics management system are provided. Embodiments may include receiving, via an interface that includes spot rate information, an instruction to produce a spot rate for an air waybill that includes a transportation charge and a plurality of other charges. Embodiments may also include calculating the spot rate that includes the transportation charge and the plurality of other charges to obtain a calculated all-in spot rate. Some embodiments may further include outputting an air waybill that is generated to include at least the calculated all-in spot rate.Type: ApplicationFiled: July 23, 2014Publication date: January 28, 2016Applicant: Unisys CorporationInventors: Susan M. Dohm, William A. Loebertmann, Stepanie Kirkham, Kenneth L. Hoffman
-
Publication number: 20160004625Abstract: A method for selection of test scripts for testing a computer application. The method comprises selecting for each of one or more object types corresponding to the computer application, one or more first test scripts that cover all objects in the application corresponding to the one or more object types, executing the one or more first test scripts to test functionality of the objects corresponding to the one or more object types, assigning a test script a failed status in response to a test script error. The method further includes determining whether the test script error occurred due to an error in functionality of an object, selecting one or more second test scripts that refer to the object associated with the error in functionality of the object, and assigning the failed status to the one or more second test scripts without execution of the one or more second test scripts.Type: ApplicationFiled: December 8, 2014Publication date: January 7, 2016Applicant: Unisys CorporationInventor: Sunil Mallaraju Gugri
-
Publication number: 20160004628Abstract: Computer implemented methods are provided for executing one or more test scripts in parallel across a plurality of web browsers. Such methods include receiving, by a server, a plurality of testing selections, the plurality of testing selections indicating one or more test scripts from a test script repository and identifying a plurality of web browsers to execute the one or more test scripts on one or more client machines; transmitting, by the server, to each of the one or more client machines instructions to launch the plurality of web browsers; distributing, by the server, one or more test scripts to each respective web browser on each of the one or more client machines, the plurality of web browsers executing the one or more test scripts transmitted by the server from the test script repository; and receiving, by the server, from the one or more client machines one or more results of executing the one or more test scripts by each of the plurality of web browsers of the respective client machine.Type: ApplicationFiled: December 8, 2014Publication date: January 7, 2016Applicant: Unisys CorporationInventor: Sunil Mallaraju Gugri
-
Publication number: 20150381597Abstract: Methods and systems for managing a secure enterprise are disclosed. One method includes initiating a management service at a server within the secure enterprise, the management service including a web interface providing administrative access to configuration settings associated with the secure enterprise, the management service initializing a secure communications protocol and managing access to a credential store, the credential store including a plurality of credentials defining communities of interest within the secure enterprise, each of the communities of interest defining a collection of authenticated endpoints having common access and usage rights. The method includes initiating an object management service at the server defining an interface to a configuration database, and accessing the configuration database to obtain data defining a configuration of the enterprise according to a configuration profile.Type: ApplicationFiled: April 16, 2015Publication date: December 31, 2015Applicant: Unisys CorporationInventors: Robert A Johnson, David S Dodgson, Daniel Keiser, Jawahar Bharatia
-
Publication number: 20150378782Abstract: Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. In particular, realtime tasks may be scheduled on idle processors without context switching an existing executing tasks. For example, a method of executing tasks on a plurality of processors may include receiving a new task with an earlier deadline than an executing task; determining whether an idle processor is available; and when an idle processor is available, executing the new task on the idle processor.Type: ApplicationFiled: November 17, 2014Publication date: December 31, 2015Applicant: Unisys CorporationInventors: Chandan Hks, Sonika P. Reddy