Patents Assigned to Unisys
-
Publication number: 20220121666Abstract: A method of creating a trained database from a document corpus includes creating a tailored neural network for the document corpus by using sentences to create word-level association and sentence-level association; and applying action-trigger phrase sets, created front the document corpus independent of creating the tailored neural network, to the tailored neural network to create a trained database; wherein processing a query through the trained database, rather than the document corpus, increases the speed of processing the query and increases the accuracy of the result.Type: ApplicationFiled: September 19, 2021Publication date: April 21, 2022Applicant: Unisys CorporationInventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
-
Publication number: 20220121814Abstract: A method of parsing implicit tables within a document includes parsing, by a processor, a document to determine a pattern for a set of text that sets apart the information contained therein from the rest of the text; determining, by the processor, from the pattern of spacing, a first descriptive phrase and a second descriptive phrase; and assigning, by the processor, the first descriptive phrase as an action and the second descriptive phrase as a trigger.Type: ApplicationFiled: September 19, 2021Publication date: April 21, 2022Applicant: Unisys CorporationInventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
-
Patent number: 11300992Abstract: Methods and systems for implementing independent time in a hosted operating environment are disclosed. The hosted, or guest, operating environment, can be seeded with a guest time value by a guest operating environment manager that maintains a time delta between a host clock time and an enterprise time. The guest operating environment can subsequently manage its guest clock from the guest time value. If the guest operating environment is halted, the guest operating environment manager can manage correspondence between the host clock time and the enterprise time by periodically assessing divergence between actual and expected values of the host clock time.Type: GrantFiled: September 10, 2019Date of Patent: April 12, 2022Assignee: Unisys CorporationInventors: Robert F. Inforzato, Dwayne E. Ebersole, Daryl R. Smith, Grace W. Lin, Andrew Ward Beale, Loren C. Wilton
-
Publication number: 20220107795Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method further includes determining a code level supported by a processor executable at a computing system, the processor executable supporting a hosted computing environment. The method also includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution based on the code level supported by the processor executable. The method includes executing the machine-readable code within the hosted computing environment.Type: ApplicationFiled: October 5, 2020Publication date: April 7, 2022Applicant: Unisys CorporationInventors: Matthew Ward Miller, Andrew Ward Beale, Anthony Matyok
-
Patent number: 11243751Abstract: A proxy compiler may be used within a native execution environment to enable execution of non-native instructions from a non-native execution environment as if being performed within the native execution environment. In particular, the proxy compiler coordinates creation of a native executable that is uniquely tied to a particular non-native image at the creation time of the non-native image. This allows a trusted relationship between the native executable and the non-native image, while avoiding a requirement of compilation/translation of the non-native instructions for execution directly within the native execution environment.Type: GrantFiled: October 16, 2020Date of Patent: February 8, 2022Assignee: Unisys CorporationInventors: Andrew Ward Beale, Anthony P. Matyok, Clark C. Kogen, David Strong
-
Patent number: 11237809Abstract: Systems and methods for executing compiled code having parallel code fragments is provided. One method includes storing executable code having a plurality of parallel code fragments, each of the plurality of parallel code fragments representing alternative executable paths through a code stream. The method includes translating the executable code into machine-readable code executable by a processor of the computing system. Translating the executable code includes selecting a code fragment from among the plurality of parallel code fragments for execution to select features for inclusion in execution at a time of execution. The method includes executing the machine-readable code within the hosted computing environment.Type: GrantFiled: October 5, 2020Date of Patent: February 1, 2022Assignee: Unisys CorporationInventors: Matthew Miller, David Strong, Anthony Matyok
-
Publication number: 20220029996Abstract: A network model includes nodes, node property sets, authorization groups and authorization servers. The node property sets define how the nodes operate and authenticate. The nodes are member of the node property sets. The authorization groups are associated with the node property set. And, authorization servers are member of the authorization groups. In addition, a network model in a secure network environment has at least one community of interest. The network model includes at least one node being a member of a node property set that defines how the node operates and authenticates.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A.` Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030001Abstract: A method of creating secure endpoints on a network includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node using the property set ID to look up its authorization details in the property set. A method of creating secure endpoints on a secure network having at least one community of interest, includes registering by a node using a random selection algorithm to choose which server to register to; receiving by the node a property set ID of a property set that the node is a member of; and authorizing by the node through an authorization server using the property set ID to look up its authorization details in the property set; wherein the node and the authorization server are a member of the at least one community of interest.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. lnforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220030032Abstract: A generic endpoint package includes a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers. A method of using a generic endpoint package includes deploying the generic endpoint package having a generic node configuration, which can be used by all nodes within a network, containing consolidated configuration information regardless of the operating system, the generic node configuration including: node property sets; common information containing rules to apply to nodes while in service mode and prior to authorization; and registration information directing the node to a pre-defined registration servers.Type: ApplicationFiled: July 27, 2021Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Di Domenico, Philippe Jolly, Richard W. Phelps, Robert A. Johnson, Michael Saunders, Robert R. Buckwalter, Sarah K. Inforzato, Eugene J. Gretter, George Karian
-
Publication number: 20220027156Abstract: Methods and systems described herein utilize a jump table in directly-addressable, near code, to facilitate improved execution of frequent calls to executable code from other workloads outside of the near code. By executing a directly-addressable call and jump instruction to access frequently-accessed executable code, indirect call instructions are avoided.Type: ApplicationFiled: July 21, 2020Publication date: January 27, 2022Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210406732Abstract: A method and system for forecasting resource utilization of an information technology system having a plurality of system components. The method includes classifying the plurality of system components based on at least one resource utilization metric. The method also includes determining at least one reference component in each class from among the components classified within the respective class. The method also includes building a representative machine learning model for each reference component in each class. The method also includes applying the representative machine learning model to all system components within the respective class. Applying the representative machine learning model to all system components within the respective class forecasts the resource utilization of all system components in the information technology system without building a machine learning model for each system component in the information technology system.Type: ApplicationFiled: February 17, 2021Publication date: December 30, 2021Applicant: unisys corporationInventors: Pavan Thatha, Ruma Mukherjee, Soma Kohli, Chiranjeev Joshi, Amanpreet Singh
-
Publication number: 20210358280Abstract: A computer implemented method of locating an asset with an RFID tracker within a secured zone includes receiving an UUID of the RFID tracker via a first RFID broadcast; determining a first signal strength of the first RFID broadcast; receiving the UUID of the RFID tracker via a second RFID broadcast; determining a second signal strength of the second RFID broadcast; receiving the UUID of the RFID tracker via a third RFID broadcast; determining a third signal strength of the third RFID broadcast; and determining a first location of the RFID tracker at a first time based on the first, second and third signal strengths. A computer implemented method of tracking an asset with an RFID tracker includes locating an asset; determining if the asset is in an allowed zone; if asset is in the allowed zone, repeating the steps of locating and determining; and if an asset is not in the allowed zone, sending a security alert.Type: ApplicationFiled: May 12, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Alex Dorrell, Moeez Ahmed
-
Publication number: 20210357254Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210357785Abstract: A production system and method for integrating machine learning models. The system includes a Model Development System having machine learning models, which perform predictions on input data received by the machine learning model. The system includes a Prediction System that receives an input message and generates prediction results based on predictions performed on input data from the received input message. The system includes at least one machine learning model adapter. The machine learning model adapter loads a corresponding machine learning model from the Model Development System, and provides input data to the loaded machine learning model, in which the input data is based on the input message received by the Prediction System. The machine learning model adapter also receives prediction value results from the loaded machine learning model based on predictions performed by the loaded machine learning model, and sends the prediction value results to the Prediction System.Type: ApplicationFiled: September 9, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Ruma Mukherjee, Kamisetty Yamini Preethi, Mohammed Shafi Tarafdar, Poopesh Kumar Thangavel
-
Publication number: 20210359995Abstract: An access control system includes an access control device and an authentication system. The access control device has an RFID reader for receiving RFID information and at least one other authentication device for receiving authentication information. The authorization system grants or denies access based on the RFID information and the authentication information. The access control device and authorization system are part of a same secure community of interest.Type: ApplicationFiled: May 12, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Alex Dorrell, Moeez Ahmed
-
Publication number: 20210357223Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210357240Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210357156Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210357267Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register files as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong
-
Publication number: 20210357225Abstract: A system and method for the dynamic, run-time configuration of logic core register files, and the provision of an associated execution context. The dynamic register tiles as well as the associated execution context information are software-defined so as to be virtually configured in random-access memory. This virtualization of both the processor execution context and register files enables the size, structure and performance to be specified at run-time and tailored to the specific processing, instructions and data associated with a given processor state or thread, thereby minimizing both the aggregate memory required and the context switching time. In addition, the disclosed system and method provides for processor virtualization which further enhances the flexibility and efficiency.Type: ApplicationFiled: May 15, 2020Publication date: November 18, 2021Applicant: Unisys CorporationInventors: Andrew Ward Beale, David Strong