Patents Assigned to Unisys
-
Publication number: 20230315708Abstract: A processor-based method of updating a secondary index for a B-tree in a database in a DBMS to include subsequent changes that occurred during creation of the secondary index includes opening an audit trail and moving back in the audit trail to a captured system time; making the secondary index visible to the DBMS for INSERT, UPDATE and DELETE processing; reading a next committed set of database updates from the audit trail; creating a secondary index modification for each row on each audit trail update and applying it to the secondary index; clearing the captured system time from control information for the B-tree to indicate completion; and making the secondary index visible to the DBMS for all processing.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Applicant: Unisys CorporationInventors: Kelsey L Bruso, James M. Plasek
-
Publication number: 20230315712Abstract: A processor-based method of making a file containing a secondary index recoverable during processing of the secondary index includes: capturing a current system time as a captured system time and writing the captured system time to control information; finding writes to the file containing the secondary index; also writing the writes to an audit trail; using the captured system time in control information for the secondary index as a start time for recovery; determining if there is a primary key value in the control information; using a primary key value in the control information to traverse to a data page continuing the primary key value; placing a read-lock on the data page; creating a corresponding secondary index entry; and releasing the read-lock.Type: ApplicationFiled: March 31, 2022Publication date: October 5, 2023Applicant: Unisys CorporationInventors: Kelsey L Bruso, James M. Plasek
-
Patent number: 11729004Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.Type: GrantFiled: September 15, 2021Date of Patent: August 15, 2023Assignee: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk, Robert A Johnson
-
Publication number: 20230177033Abstract: A processor-based method of building and appending data structures in a multi-host environment includes creating and storing data into a first data structure having a first root node, a first right leaf node and a plurality of other leaf nodes and non-leaf nodes defining multiple hierarchical levels; allowing a search of the first data structure to proceed while creating a second data structure that includes a second root node, a second left leaf node and a plurality of leaf nodes and non-leaf nodes defining multiple hierarchical levels; receiving a command to append the second data structure to the first data structure during searching the first data structure; creating a global lock for all hosts in the multi-host environment to the first root node and the first right leaf node of the first data structure while allowing access to the plurality of other leaf nodes and non-leaf nodes of the first data structure; updating the first root node and the first right leaf node with information about the second dataType: ApplicationFiled: December 6, 2021Publication date: June 8, 2023Applicant: Unisys CorporationInventors: Kelsey L Bruso, James M. Plasek
-
Publication number: 20230177034Abstract: A processor-based method of grafting a scion data structure having a scion root page and scion left page to an understock data structure having an understock root page and an understock right page in a multi-host environment includes receiving a command to graft the scion data structure onto the understock data structure; preventing prefetching data belonging to the scion data structure into cache memory; locking the understock root page and the understock right page; grafting the scion data structure onto the right side of the understock data structure and not in the middle of the understock data structure; updating the understock root page to point to the scion root page and the understock right page to point to the scion left page; committing the update of the understock root page and the understock right page; releasing the lock to the understock root page and the understock right page; and sending updated copies of the understock root page and the understock right page to other hosts in a multi-host enviType: ApplicationFiled: December 6, 2021Publication date: June 8, 2023Applicant: Unisys CorporationInventors: Kelsey L Bruso, James M. Plasek
-
Publication number: 20230154187Abstract: A method of decomposing a lecture into events includes: processing a recorded video and segmenting the video into video, chat, audio and audio transcript; processing the video and dividing it into discreet events including lecture, green board text, white board text, and interaction with users; and storing the discreet events as a storyboard that identifies break points in the lecture. The storyboard and events can be used to create a composed lecture.Type: ApplicationFiled: November 12, 2021Publication date: May 18, 2023Applicant: Unisys CorporationInventors: Kelsey L Bruso, Mangesh Walsatwar, Ramkumar M., George S.
-
Publication number: 20230087132Abstract: A method of creating action-trigger phrase sets includes receiving a document from a corpus of documents; processing text from the document; and creating an action-trigger phrase set from the text.Type: ApplicationFiled: September 19, 2021Publication date: March 23, 2023Applicant: Unisys CorporationInventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
-
Patent number: 11593079Abstract: A system and method for the storage within one or more virtual execution context registers private code representative of processes or other information requiring an enhanced degree of security. The storage of the private code can be performed as a function of the type of code or in response to one or more markers embedded within the code. The time-variant nature of the virtual execution context registers affords a high degree of inherent security for the private code data stored within.Type: GrantFiled: March 8, 2021Date of Patent: February 28, 2023Assignee: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20230034682Abstract: A method of improving a visual instruction during running of a visual instruction sequence includes playing a visual instruction sequence to a user from a point-of-view of the user; monitoring the user for user data related to the visual instruction sequence; using the user data to improve the visual instruction sequence; generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user. A system for improving a visual instruction during running of a visual instruction sequence includes a computer device for playing a visual instruction sequence to a user from a point-of-view of the user, monitoring the user for user data related to the visual instruction sequence, using the user data to improve the visual instruction sequence, generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user.Type: ApplicationFiled: August 2, 2021Publication date: February 2, 2023Applicant: Unisys CorporationInventors: Kelsey L. Bruso, James M. Plasek
-
Publication number: 20230036101Abstract: A method of creating an instruction database includes searching various information sources for instruction information related to a user task; searching various information sources for safety information related to the user task; extracting the instruction information and safety information and saving the instruction information and safety information in the instruction database; and receiving user comments and saving the comments in the instruction database. A system for creating an instruction database includes a computer device for searching various information sources for instruction information related to a user task, searching various information sources for safety information related to the user task, extracting the instruction information and safety information and saving the instruction information and safety information in the instruction database and receiving user comments and saving the comments in the instruction database.Type: ApplicationFiled: August 2, 2021Publication date: February 2, 2023Applicant: Unisys CorporationInventors: Kelsey L. Bruso, James M. Plasek
-
Publication number: 20230031572Abstract: A computer it implemented method of training a user to perform a task includes receiving task data from a user device; identifying a task associated with the task data; querying a knowledgebase for data associated with the task; generating an AR pattern for training the user to perform the task; and transmitting the AR pattern to the user device. An augmented reality training system includes a computer device connected to a user device having a video camera. The computer device receives the video data from the video camera and identifies a task from the digital video data. A knowledgebase is connected to the computer device. The knowledgebase contains resources related to the task. The system identifies a task to be performed, queries the knowledgebase for resources and creates an augmented reality pattern with an avatar from the resources for training a user.Type: ApplicationFiled: August 2, 2021Publication date: February 2, 2023Applicant: Unisys CorporatrionInventors: Kelsey L Bruso, James M. Plasek
-
Publication number: 20220393884Abstract: Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith Kk, Robert A. Johnson
-
Publication number: 20220394028Abstract: Systems and method for flexible authentication of IoT devices that can accommodate non-IP environments are disclosed. One system includes a plurality of devices, with each device including a universal authentication agent and a verification certificate, wherein each verification certificate includes a proof that is recorded on an entry on a distributed ledger. The verification certificate proof is shared with one or more devices which verify the proof with the entry. A universal authentication service is configured with the universal authentication agent of at least one device to connect the at least one device with the distributed ledger.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B. Patil, Amith KK, Robert A. Johnson
-
Publication number: 20220393883Abstract: Methods and systems for direct, machine-to-machine authentication through a trusted chain of ownership are disclosed. One method includes receiving, at a first device from a second device, a request for a certificate proof. The method also includes transmitting, to the second device, and in response to the request, the certificate proof from the first device, an entry of the proof being recorded on a distributed ledger. The certificate proof is useable by the second device to authenticate the first device based on a comparison of the proof and the entry on the distributed ledger, thereby establishing trust with the first device at the second device.Type: ApplicationFiled: September 15, 2021Publication date: December 8, 2022Applicant: Unisys CorporationInventors: Sanket Panchamia, Akshvir Singh Soni, Kanupriya Pandey, Mehdi Entezari, Amith KK, Sachin B Patil, Robert A. Johnson
-
Patent number: 11509650Abstract: Methods and systems for mapping a sharable resource using a one-time password are disclosed. An identifier included in a set of provided credentials uniquely associates the one-time password with an executable within a computing environment that hosts the sharable resource. When credentials are received in association with a mapping request, it is determined whether a supplied username corresponds to a user authorized to access the sharable resource and whether a representation of a supplied password received in association with the mapping request matches a representation of the one-time password. Validating the mapping request provides access to the sharable resource.Type: GrantFiled: February 5, 2020Date of Patent: November 22, 2022Assignee: Unisys CorporationInventors: Andrew Ward Beale, Anthony P. Matyok, Clark C. Kogen, David Strong
-
Patent number: 11494170Abstract: A proxy compiler may be used within a native execution environment to enable execution of non-native instructions from a non-native execution environment as if being performed within the native execution environment. In particular, the proxy compiler coordinates creation of a native executable that is uniquely tied to a particular non-native image at the time of creation of the non-native image. This allows a trusted relationship between the native executable and the non-native image, while avoiding a requirement of compilation/translation of the non-native instructions for execution directly within the native execution environment.Type: GrantFiled: October 16, 2020Date of Patent: November 8, 2022Assignee: Unisys CorporationInventors: Andrew Ward Beale, Anthony P. Matyok, Clark C. Kogen, David Strong
-
Publication number: 20220350813Abstract: Systems and methods for implementing a federated database system are presented herein. One or more source databases may store changed data to a target database. Each update of a record in a source database can result in an audit log entry written with the before and after image, a timestamp, and an identifier for the log entry. Using the audit log, the database implementation herein can consolidate updates to any record for a batching event to be processed in an Extract, Transform, and Load (ETL) process for export of updates to the target database.Type: ApplicationFiled: April 29, 2021Publication date: November 3, 2022Applicant: Unisys CorporationInventor: John Lesley Ticehurst
-
Patent number: 11477104Abstract: Data channels of a computer system may be remotely monitored to detect data channel degradation. A monitoring agent on a client may execute script commands on the remote computer system to monitor input/output (I/O) rates of a set of channels. The monitoring agent may compute an average data rate of the data channels and compare the I/O rate of each channel to the average. When the I/O rate of a channel falls below the average by at least a threshold amount, an alert may be generated to indicate to an administrator a possible failure with the data channel.Type: GrantFiled: August 25, 2020Date of Patent: October 18, 2022Assignee: Unisys CorporationInventor: James R Malnati
-
Publication number: 20220309173Abstract: A method for obtaining access to database files in a computing system includes receiving, at an operating system, a first call from a database management system requesting access to a database file; creating, by the operating system, a data expanse file; and allowing the database management system to request views of data in the data expanse file by using an instruction processor and a view instruction. A computer program product may include a non-transitory computer-readable medium comprising instructions which, when executed by a processor of a computing system, cause the processor to perform the following actions: receiving, at an operating system, a first call from a database management system requesting access to a database file; creating, by the operating system, a data expanse file; and allowing the database management system to request views of data in the data expanse file by using an instruction processor and a view instruction.Type: ApplicationFiled: March 12, 2021Publication date: September 29, 2022Applicant: Unisys CorporationInventors: Michael J. Rieschl, David Schroth, Matthew Trautman, Charles R. Caldarale
-
Publication number: 20220300261Abstract: A method of determining if a commit is problematic includes determining a complexity of the commit; determining an author of the commit; determining an experience of the author; determining a component affected by the commit; and assigning a risk value to the commit based on the complexity, the author, the experience of the author and the component affected.Type: ApplicationFiled: March 16, 2021Publication date: September 22, 2022Applicant: Unisys CorporationInventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso