Patents by Inventor Patrick Deziel

Patrick Deziel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220300405
    Abstract: A method for testing commits from a third-party product into a dependent product includes receiving a first commit from a third-party product; waiting for additional commits from the third-party product; receiving a second commit from the third-party product; testing the first and second commit using a pre-trained learning model; determining if the first commit is problematic, and if the first commit is problematic, sending the first commit for review before implementation; and determining if the second commit is problematic, and if the second commit is problematic, sending the second commit for review before implementation. Accumulating the first and second commits for testing at once reduces system resources.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Applicant: Unisys Corporation
    Inventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
  • Publication number: 20220300275
    Abstract: A method for creating a learning model that evaluates risks of applying commits in a third-party product to a dependent product is disclosed. The method includes collecting data on past commits; training the learning model using the collected data; and using the learning model to determine if future commits are problematic.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Applicant: Unisys Corporation
    Inventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L Bruso
  • Publication number: 20220300261
    Abstract: A method of determining if a commit is problematic includes determining a complexity of the commit; determining an author of the commit; determining an experience of the author; determining a component affected by the commit; and assigning a risk value to the commit based on the complexity, the author, the experience of the author and the component affected.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Applicant: Unisys Corporation
    Inventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
  • Publication number: 20220300404
    Abstract: A method for creating a learning model that evaluates risks of applying commits in a third-party product to a dependent product is disclosed. The method includes collecting data on past commits; training the learning model using the collected data; and using the learning model to determine if future commits are problematic.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Applicant: Unisys Corporation
    Inventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
  • Publication number: 20220300406
    Abstract: A method for alerting a community to potential problematic commits includes receiving a commit submitted by an author in a project; testing the commit using a pre-trained learning model; and determining if the commit is problematic, and if the commit is problematic, sending a report in the project outlining the level of risk of implementing the commit and a reason for the level or risk. Users of the project will be alerted to potential risk of particular commits.
    Type: Application
    Filed: March 16, 2021
    Publication date: September 22, 2022
    Applicant: Unisys Corporation
    Inventors: Patrick Deziel, James M. Plasek, Rami Reddy Nelluru, Kelsey L. Bruso
  • Publication number: 20220121666
    Abstract: A method of creating a trained database from a document corpus includes creating a tailored neural network for the document corpus by using sentences to create word-level association and sentence-level association; and applying action-trigger phrase sets, created front the document corpus independent of creating the tailored neural network, to the tailored neural network to create a trained database; wherein processing a query through the trained database, rather than the document corpus, increases the speed of processing the query and increases the accuracy of the result.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Publication number: 20220121814
    Abstract: A method of parsing implicit tables within a document includes parsing, by a processor, a document to determine a pattern for a set of text that sets apart the information contained therein from the rest of the text; determining, by the processor, from the pattern of spacing, a first descriptive phrase and a second descriptive phrase; and assigning, by the processor, the first descriptive phrase as an action and the second descriptive phrase as a trigger.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Publication number: 20220121694
    Abstract: An approach to information retrieval is contemplated for facilitating semantic search and response over a large domain of technical documents is disclosed. First, the grammar and morphology of the statements and instructions expressed in the technical documents is used to filter training data to extract the text that is most information-rich, that is the text that contains domain-specific jargon, in context. This training data is then vectorized and fed as input to an SBERT neural network model that learns an embedding of related words and terms in the text, i.e. the relationship between a given set of words contained in a user's query and the instructions from the technical documentation text most likely to assist in the user's operations. There are two parsing tasks. The first is to select a minimal sample of sentences from the document corpus that capture the domain-specific terminology (jargon). The result is set of sentences used to train BERT and SBERT.
    Type: Application
    Filed: September 19, 2021
    Publication date: April 21, 2022
    Applicant: Unisys Corporation
    Inventors: Mark Rosno, Patrick Deziel, Christopher Korzenowski, Rebecca Bilbro, Kelsey L. Bruso, Robert Malek
  • Publication number: 20220027454
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of authenticating and authorizing a user in an emulated computing environment is disclosed. The method includes receiving a request by a user operating on a guest operating system and having user credentials to invoke a process in a secure sandbox on a host operating system; searching a pool of credentials for the user credentials in the host operating system; associating the user credentials with the process such that all services running on a guest operating system have the same credentials as a host operating system; and after the process has completed, returning the user credentials to the pool.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein
  • Publication number: 20220027485
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. According to one embodiment, a method of allowing root file access includes receiving a request from a guest operating system to have root file access in a host operating system; determining, by the host operating system, if the request is asking for information relevant to the guest operating system itself, and if the request is asking for information that has the same credentials as the request; and if the information is relevant to the guest operating system itself and the information has the same credentials as the request, then providing a secure path to the relevant root file system on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechterlein
  • Publication number: 20220027458
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of compiling and executing a new program in a secure sandbox. The method includes receiving, by a host operating system, a request from a guest operating system to invoke an execution environment in a secure sandbox on a host operating system; and execute the execution environment in the secure sandbox. The user can use the execution environment in the secure sand box from a guest operating system to compile and execute the new program on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechterlein
  • Publication number: 20220027179
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of creating a guest-native executable includes receiving, by a host operating system, a call from a guest operating system to construct an executable from a guest-native source; creating an ecosystem for the guest-native source in a secure sandbox running on a host operating system; receiving the guest-native source; and executing the guest-native source in the ecosystem on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein
  • Publication number: 20220027220
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of invoking a native process as a called procedure, the method including receiving, by a host operating system, a request to invoke a native process as a called procedure form a guest operating system; loading the native process executable into a secure sandbox running on the host operating system; and transforming data from the native process into a representation appropriate for the called the procedure in the host operating environment.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Malthew Nuechterlein
  • Publication number: 20220027178
    Abstract: The present disclosure relates generally to computer architecture and infrastructure for guest operating systems executing on a host operating system. A method of allowing command sessions in a guest operating system includes receiving, by a host operating system, a request to invoke a command session by a guest operating system; receiving, by the host operating system, a request to invoke a bash interceptor; and loading bash code into a secure sandbox on the host operating system.
    Type: Application
    Filed: July 25, 2020
    Publication date: January 27, 2022
    Inventors: Charles Caldarale, Patrick Deziel, Tim Dick, Kevin Harris, Matthew Nuechtertein