Patents by Inventor Steven L. Rajcan
Steven L. Rajcan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10776489Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.Type: GrantFiled: January 18, 2016Date of Patent: September 15, 2020Assignee: Unisys CorporationInventors: Steven L Rajcan, Matthew Mohr, Jim Trocki, Mark K Vallevand
-
Publication number: 20200252411Abstract: Methods and systems for monitoring network data packets within a secure network are described. One method includes receiving, at a consumer endpoint, a data packet from a second endpoint, the data packet being encrypted with an encryption key associated with a packet auditing community of interest and having a routing header appended thereto, the routing header identifying the consumer endpoint. The method includes decrypting the data packet using the encryption key associated with the packet auditing community of interest, and removing at least a portion of the routing header identifying the consumer endpoint from the decrypted data packet. The method also includes performing at least one packet auditing operation on the decrypted data packet.Type: ApplicationFiled: February 5, 2019Publication date: August 6, 2020Inventors: SARAH K. INFORZATO, LEMOINE D. KEIPER, III, JONATHAN P. DAVIS, KATHLEEN R. WILD, STEVEN L. RAJCAN, ZACHARY DREMANN, MICHAEL J. DIDOMENICO, JONATHAN E. SKILTON, COREY SCHOENFELD
-
Patent number: 10417428Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.Type: GrantFiled: January 18, 2016Date of Patent: September 17, 2019Assignee: Unisys CorporationInventors: Steven L. Rajcan, Matthew Mohr, Jim Trocki, Mark K. Vallevand
-
Publication number: 20190197242Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.Type: ApplicationFiled: January 18, 2016Publication date: June 27, 2019Applicant: Unisys CorporationInventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
-
Patent number: 9912663Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: GrantFiled: February 8, 2017Date of Patent: March 6, 2018Assignee: Unisys CorporationInventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Patent number: 9794225Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: GrantFiled: June 29, 2015Date of Patent: October 17, 2017Assignee: Unisys CorporationInventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Publication number: 20170237735Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. the method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: ApplicationFiled: February 8, 2017Publication date: August 17, 2017Applicant: Unisys CorporationInventors: Robert A. Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan, Ted Hinaman
-
Publication number: 20170169226Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.Type: ApplicationFiled: January 18, 2016Publication date: June 15, 2017Applicant: Unisys CorporationInventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
-
Publication number: 20170169227Abstract: Methods and systems for operating a remote desktop client from a computing system hosting a secure boot device. In some embodiments, a method comprises initiating execution of an operating system from the computing system hosting the secure boot device, the computing system communicatively connected within a secure enterprise network, the computing system being untrusted within the secure enterprise network and based on verification of received authentication credentials, booting an operating system from the secure boot device and establishing a secure communication tunnel with a service appliance.Type: ApplicationFiled: January 18, 2016Publication date: June 15, 2017Applicant: Unisys CorporationInventors: STEVEN L. RAJCAN, MATTHEW MOHR, JIM TROCKI, MARK K. VALLEVAND
-
Publication number: 20170169225Abstract: Methods and systems for switching between multiple languages of a remote desktop client operating on a secure boot device are disclosed. A method includes initiating an operating system from the secure boot device and receiving credentials including a user identification and a password. The method also includes booting, from the secure boot device, the operating system in a first language and receiving a selection of a second language different from the first language within a user interface of the operating system. The method further includes performing a desktop reset to execute the operating system in the second language.Type: ApplicationFiled: January 18, 2016Publication date: June 15, 2017Applicant: Unisys CorporationInventors: Steven L. Rajcan, Matthew Mohr, Jim Trocki, Mark K. Vallevand
-
Publication number: 20150382193Abstract: Methods and systems of communicating with secure endpoints included within a secured network from a mobile device external to the secured network is disclosed. The method includes initiating a VPN-based secure connection to a VPN appliance, and initializing a stealth-based service on the mobile device. The method further includes transmitting user credential information from the mobile device to a VDR broker via the VPN appliance, and receiving status information from the VDR broker identifying a VDR associated with the mobile device and providing a connected status. The method also includes communicating with one or more secure endpoints within the secured network via a VPN connection to the VDR via the VPN appliance and through the VDR to the one or more secure endpoints within a community of interest based on the user credential information transmitted to the VDR broker.Type: ApplicationFiled: June 29, 2015Publication date: December 31, 2015Applicant: UNISYS CORPORATIONInventors: Robert A Johnson, James Trocki, Mark K Vallevand, Steven L Rajcan
-
Publication number: 20110314022Abstract: In a KStore having a plurality of K nodes with count fields a method for updating count fields, receiving a particle to provide a received particle, updating selected node counts of the plurality of nodes counts in response to the received particle to provide first updated K node count fields, and saving selected K node count fields for later updating to provide second updated count fields are recited. The K nodes include elemental root nodes and the second updated K node count fields include elemental root nodes of the plurality of elemental root nodes. The second updated K node count fields include only elemental root nodes of the plurality of elemental root nodes. The first updated K node count fields include no elemental root nodes. The second updated K node count fields include K nodes pointed to by the Result pointers of the first updated K node count fields.Type: ApplicationFiled: June 8, 2006Publication date: December 22, 2011Applicant: Unisys CorporationInventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert R. Buckwalter
-
Patent number: 7689571Abstract: A method for optimizing the construction of a KStore includes providing a data set having a plurality of records with a plurality of fields, providing an optimization structure from a sample of the data set and analyzing the optimization structure to determine a field order for the records contained in the data set. A KStore is provided from the data set in accordance with the field order. The sample of the data set can include the entire data set, a random sample of the data set or a predetermined number of records from the data set. The data set has an initial order having earlier records and later records and the sample can include a plurality of the earlier records. The sample of the data set includes a user determined number of records from the data set. The optimization structure can be a KStore.Type: GrantFiled: March 24, 2006Date of Patent: March 30, 2010Assignee: Unisys CorporationInventors: Jane Campbell Mazzagatti, Timothy William Collins, Steven L. Rajcan
-
Patent number: 7676330Abstract: A method for processing KStore sensors for use by a KEngine in a KStore system to process a K includes providing a stream of particles, instantiating a KStore sensor structure, identifying particles to be included in a sensor set and processing said identified particles. The KStore sensor structure can provide a correspondence between a particle and a sensor K node. Furthermore, the KStore sensor structure can be a list of K nodes, an indexed array or a hash table.Type: GrantFiled: May 16, 2006Date of Patent: March 9, 2010Assignee: Unisys CorporationInventors: Jane Campbell Mazzagatti, Steven L. Rajcan
-
Patent number: 7418445Abstract: A method for recording information in an interlocking trees datastore having a plurality of K paths includes receiving an input particle and building a new K node in accordance with the received input particle. A K node is locked in accordance with the building of the new K node to provide a locked node. The locked node can be the Case node of the new K node. The Case bi-directional link between the locked Case node and the new K node is completed while the locked Case node is locked. A pointer is added to the new K node to an asCase list of the locked Case node. The locked node is locked only while adding the pointer to the new K node to the asCase list of the locked Case node. The locked node can also be a Result node of the new K node.Type: GrantFiled: July 20, 2005Date of Patent: August 26, 2008Assignee: Unisys CorporationInventors: Jane Campbell Mazzagatti, Jane Van Keuren Claar, Steven L. Rajcan
-
Patent number: 7409380Abstract: In learning for an interlocking trees datastore or KStore, the process is made more efficient by noting the (n-level) address within the KStore during the learning of each particle. In a pre-particle stream of data, which may be organized within or before the Learn Engine prior to this, “Marks” and “References” are inserted. Each Mark identifies where any number of References may start the learning process, enabling the avoidance of re-learning redundant data. Thus, in a field record data set, the redundant data fields (or even partial fields) can be skipped over and only the new data learned. The Marks and References are removed before processing into a particle stream. When particles are learned the K Engine returns the n-level address or pointer(s) which the Learn Engine uses to associate with the relevant Reference(s). The system can be implemented in hardware if desired to speed processing. No limit to the distribution or numbers of KStores, Learn Engines being used or K Engines being used is indicated.Type: GrantFiled: April 7, 2005Date of Patent: August 5, 2008Assignee: Unisys CorporationInventors: Jane Campbell Mazzagatti, Jane Van Keuren Claar, Timothy William Collins, Steven L. Rajcan
-
Patent number: 7389301Abstract: Aggregation of data in an interlocking trees datastore, especially when the interlocking datastore is a KStore is described. It details consolidating data into a summary or aggregation so that some particular desired analytic type of operation may easily be performed on the data. It uses a set of data constraints across the entire data set. This redefines the data set, which may be for example, individual receipts granular by week or month. When data is learned into a KStore, aggregation parameters may be collected and these parameters may be used to constrain the dataset recorded in K, and direct performance of an analytic on a particular a field value(s). Additional features and details are provided within.Type: GrantFiled: June 10, 2005Date of Patent: June 17, 2008Assignee: Unisys CorporationInventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert Buckwalter
-
Publication number: 20070288496Abstract: In a KStore having a plurality of K nodes with count fields a method for updating count fields, receiving a particle to provide a received particle, updating selected node counts of the plurality of nodes counts in response to the received particle to provide first updated K node count fields, and saving selected K node count fields for later updating to provide second updated count fields are recited. The K nodes include elemental root nodes and the second updated K node count fields include elemental root nodes of the plurality of elemental root nodes. The second updated K node count fields include only elemental root nodes of the plurality of elemental root nodes. The first updated K node count fields include no elemental root nodes. The second updated K node count fields include K nodes pointed to by the Result pointers of the first updated K node count fields.Type: ApplicationFiled: June 8, 2006Publication date: December 13, 2007Applicant: Unisys CorporationInventors: Jane Campbell Mazzagatti, Steven L. Rajcan, Robert R. Buckwalter
-
Patent number: 6157927Abstract: An interconnect for enabling a component in a transaction processing environment to request, as part of a global transaction under the control of a transaction manager that is not XATMI-compliant, a resource on a remote server outside of that environment that is under the control of an XATMI-compliant transaction manager, comprises a resource manager and a connection manager. The resource manager has a first interface that receives XATMI service requests from the component and a second interface that receives directives issued by the first transaction manager for the global transaction.Type: GrantFiled: April 22, 1998Date of Patent: December 5, 2000Assignee: Unisys CorporationInventors: Diane E. Schaefer, Steven L. Kayser, Steven L. Rajcan