Patents Assigned to Unisys
-
Publication number: 20150295956Abstract: The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide SIP signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers.Type: ApplicationFiled: November 12, 2014Publication date: October 15, 2015Applicant: Unisys CorporationInventors: Jon P Davis, Lynnette K Evans, Richard L Fuller, Gregory J Small, Scott S Preston
-
Publication number: 20150277861Abstract: A method for executing non-native instructions in a computing system having a processor configured to execute native instructions may include fetching a first non-native instruction from a plurality of non-native instructions; interpreting the first non-native instruction to generate a first instruction code; compiling the first instruction code to generate a first native instruction corresponding to the first non-native instruction; determining whether to execute the first instruction code or the generated first native instruction; and implementing a first virtual machine instruction corresponding to the first non-native instruction based, at least in part, on determining whether to execute the first instruction code or the first native instruction.Type: ApplicationFiled: December 30, 2013Publication date: October 1, 2015Applicant: Unisys CorporationInventors: ANDREW T. JENNINGS, Charles R. Caldarale, Kevin W. Harris, MAURICE MARKS
-
Patent number: 9141400Abstract: A guest disk may be setup through the assistance of a restore environment. A restore environment may be bundled with partitioning software, and the restore environment may be a small, lightweight Linux™ environment that is operating-system agnostic. The restore environment allows any operating system image file to be deployed on the guest disk. The guest disk may be created through the use of virtualization software and a guest operating system.Type: GrantFiled: July 18, 2013Date of Patent: September 22, 2015Assignee: Unisys CorporationInventors: Gregory K Deal, J. Troy Stepan, Maureen Connell
-
Publication number: 20150261952Abstract: A secure platform system and method for a host computing device. The system includes an ultraboot application that operates in the less privileged user memory and divides the host computing device into a resource management partition, at least one virtual service partition and at least one virtual guest partition. The virtual guest partition provides a virtualization environment for at least one guest operating system. The virtual service partition provides a virtualization environment for the basic operations of the virtualization system. The resource management partition maintains a resource database for use in managing the use of the host processor and the system resources. The virtual service partition is a secure virtualization platform (s-Platform) having at least one isolated secure partition for executing at least one secure application therein. The system also includes at least one monitor that operates in the most privileged system memory.Type: ApplicationFiled: November 13, 2014Publication date: September 17, 2015Applicant: Unisys CorporationInventors: Robert J. Sliwa, Michael J. DiDomenico, Brittney Burchett, William Deck
-
Publication number: 20150256680Abstract: The embodiments described herein recite a telephone communication system used for handling information such as messages, typically voice mail messages, and, more particularly, is directed to a system that provides distributed session initiation protocol (SIP) silos. Distributed SIP silos (DSS) is a Communications Application Platform (CAP) feature that maintains the site's call capacity even when a signaling server fails. DSS uses multiple non-redundant signaling servers to provide SIP signaling for the same set of media ports. Because there are multiple signaling servers providing signaling for the same set of ports, the failure of one signaling server only terminates the calls it was actively processing and once those calls have been cleaned up, all the available (non-suspended) ports in the configuration are available to the remaining signaling servers.Type: ApplicationFiled: November 12, 2014Publication date: September 10, 2015Applicant: Unisys CorporationInventors: Jon P. Davis, Lynnette K. Evans, Richard L. Fuller, Gregory J. Small, Scott S. Preston
-
Publication number: 20150244529Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244526Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Publication number: 20150244530Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244528Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes, Yuko Onishi, Raymond Campbell
-
Publication number: 20150244527Abstract: Systems and methods for enhanced security of media are provided. Media security may be enhanced by improving the setup of encryption and/or decryption, by improving the performance of encryption and/or decryption, or by improving both. The calls related to enhanced security of media from an application in an emulated environment to a security module in the operating system hosting the emulated environment may be combined to reduce the overhead of accessing a security module. An application handling secure shell (SSH) communications may execute multiple calls to a cryptographic module in the host operating system. Because many calls to the cryptographic module during SSH communications follow patterns, two or more related calls may be combined into a single combined call to the cryptographic module. For example, a call to generate a server-to-client key and a call to generate a client-to-server key may be combined into a single call.Type: ApplicationFiled: February 26, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Kevin Clayton, Peter Wilkes
-
Publication number: 20150242275Abstract: Tasks may be scheduled on more than one processor to allow the processors to operate at lower processor frequencies and processor supply voltages. Multiple processors executing tasks in parallel at lower frequencies and supply voltages may allow completion of the tasks by deadlines at lower power consumption than a single processor executing all tasks at high frequencies and supply voltages. Power efficiency of a computer system may be improved by using a combination of processors executing tasks using a combination of earliest deadline first (EDF), earliest deadline last (EDL), and round robin (RR) queue management methods.Type: ApplicationFiled: November 17, 2014Publication date: August 27, 2015Applicant: Unisys CorporationInventors: Chandan Hks, Sonika P. Reddy
-
Patent number: 9110727Abstract: Systems and methods are disclosed herein to automatically replicate virtual machine image (VM) files on secondary VM computing devices, from a primary VM computing device. The secondary VM computing devices are automatically selected by constantly reviewing the operating parameter values (e.g., cost of resources, power consumption, etc.) of a number of secondary VM computing devices available of storing VM image replicas. The replica of the primary VM image is stored in the secondary VM computing devices in geographically disparate cloud locations. The primary VM image is automatically broken into constituent data blocks stored in an active index, which is compared against a stale index of data blocks. When an update is detected in the primary VM image, the comparison of indices will indicate that there is new data. Only the new data is used to update the secondary VM images, thereby reducing network traffic and latency issues.Type: GrantFiled: December 2, 2010Date of Patent: August 18, 2015Assignee: Unisys CorporationInventors: Scott L. Brock, Sumit Kumar Bose, Ronald Leaton Skeoch
-
Patent number: 9111265Abstract: One or more transactions, and their audited update actions, operating on a database may be identified by a step ID. The step ID may include a first set of bits identifying a time the step was created. The step ID may also include a second set of bits uniquely identifying a step created at a certain time from other step created at the same time. The first set of bits may be generated from a coordinated universal time (UTC) that does not change with local seasons, such as daylight saving time.Type: GrantFiled: March 1, 2013Date of Patent: August 18, 2015Assignee: Unisys CorporationInventors: Ellen L. Sorenson, Jane Muccio
-
Patent number: 9094460Abstract: A fast send method may be selectively implemented for certain data packets received from an application for transmission through a network interface. When the fast send method is triggered for a data packet, the application requesting transmission of the data packet may be provided a completion notice nearly immediately after the data packet is received. The fast send method may be used for data packets similar to previously-transmitted data packets for which the information in the data packet is already vetted. For example, a data packet with a similar source address, destination address, source port, destination port, application identifier, and/or activity identifier may have already been vetted. A socket table may be maintained listing previously-transmitted data packets and an instruction for handling additional data packets similar to the data packet entered in the socket table.Type: GrantFiled: September 6, 2012Date of Patent: July 28, 2015Assignee: Unisys CorporationInventors: Mark V. Deisinger, Allyn Smith, John A. Peters
-
Publication number: 20150186166Abstract: Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Unisys CorporationInventors: Andrew T. Jennings, Charles R. Caldarale, Gregory Heimann, Maurice Marks, Kevin Harris
-
Publication number: 20150186167Abstract: Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Unisys CorporationInventors: Andrew T. Jennings, Charles R. Caldarale, Maurice Marks, Kevin Harris
-
Publication number: 20150186169Abstract: Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Unisys CorporationInventors: Andrew T. Jennings, Charles R. Caldarale, Maurice Marks, Kevin Harris
-
Publication number: 20150186168Abstract: Systems and methods for executing non-native instructions in a computing system having a processor configured to execute native instructions are provided. A dynamic translator uses instruction code translation in parallel with just-in-time (JIT) compilation to execute the non-native instructions. Non-native instructions may be interpreted to generate instruction codes, which may be stored in a shadow memory. During a subsequent scheduling of a non-native instruction for execution, the corresponding instruction code may be retrieved from the shadow memory and executed, thereby avoiding reinterpreting the non-native instruction. In addition, the JIT compiler may compile instruction codes to generate native instructions, which may be made available for execution, further speeding up the execution process.Type: ApplicationFiled: December 30, 2013Publication date: July 2, 2015Applicant: Unisys CorporationInventors: Andrew T. Jennings, Charles R. Caldarale, Gregory Heimann, Maurice Marks, Kevin Harris
-
Publication number: 20150169373Abstract: One embodiment of a computer-implemented method for managing computing resources may include determining, by a computer, target computing resources to be configured with a platform. A determination, by the computer, may be made as to whether the target computing resources includes a management agent for managing the platform. The computer may cause a management agent to be installed on the target computing resources if the target computing resources are determined to not include a management agent, otherwise, the computer may not cause a management agent to be installed on the target computing resources. The computer may instruct the management agent to commission the platform on the target computing resources.Type: ApplicationFiled: December 10, 2014Publication date: June 18, 2015Applicant: Unisys CorporationInventors: Michael A Salsburg, Nandish Jayaram Kopri, Kelsey L. Bruso
-
Publication number: 20150169342Abstract: One embodiment of a computer-implemented method for managing computing resources may include determining, by a computer, target computing resources to be configured with a platform. A determination, by the computer, may be made as to whether the target computing resources includes a management agent for managing the platform. The computer may cause a management agent to be installed on the target computing resources if the target computing resources are determined to not include a management agent, otherwise, the computer may not cause a management agent to be installed on the target computing resources. The computer may instruct the management agent to commission the platform on the target computing resources.Type: ApplicationFiled: December 10, 2014Publication date: June 18, 2015Applicant: Unisys CorporationInventors: Michael A. Salsburg, Kelsey L. Bruso