Patents by Inventor David Zeuthen

David Zeuthen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11537752
    Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: December 27, 2022
    Assignee: Red Hat, Inc.
    Inventor: David Zeuthen
  • Patent number: 10992482
    Abstract: Methods, systems, and apparatus, including computer-readable media, for verified boot and key rotation. In some implementations, a device extracts a public key from a secure data storage area of the device. The device extracts a first certificate for an intermediate key and a second certificate for a signing key, the first certificate and the second certificate being extracted from a system image. The device verifies a signature of the first certificate using the public key. After verifying the signature of the first certificate, the device verifies the second certificate using a public key in the first certificate. In response to verifying the second certificate, the device loads the system image during a boot process of the device.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: April 27, 2021
    Assignee: Google LLC
    Inventors: Alejandro Martin Deymonnaz, Darren David Krahn, David Zeuthen
  • Publication number: 20200089901
    Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
    Type: Application
    Filed: November 18, 2019
    Publication date: March 19, 2020
    Inventor: David Zeuthen
  • Patent number: 10482286
    Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. In view of the request, it is determined whether the client application is authorized to access the trusted application in view of an authorization policy. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: November 19, 2019
    Assignee: Red Hat, Inc.
    Inventor: David Zeuthen
  • Publication number: 20180198629
    Abstract: Methods, systems, and apparatus, including computer-readable media, for verified boot and key rotation. In some implementations, a device extracts a public key from a secure data storage area of the device. The device extracts a first certificate for an intermediate key and a second certificate for a signing key, the first certificate and the second certificate being extracted from a system image. The device verifies a signature of the first certificate using the public key. After verifying the signature of the first certificate, the device verifies the second certificate using a public key in the first certificate. In response to verifying the second certificate, the device loads the system image during a boot process of the device.
    Type: Application
    Filed: December 14, 2017
    Publication date: July 12, 2018
    Inventors: Alejandro Martin Deymonnaz, Darren David Krahn, David Zeuthen
  • Publication number: 20170039380
    Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. In view of the request, it is determined whether the client application is authorized to access the trusted application in view of an authorization policy. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.
    Type: Application
    Filed: October 21, 2016
    Publication date: February 9, 2017
    Inventor: David Zeuthen
  • Patent number: 9479509
    Abstract: A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: October 25, 2016
    Assignee: Red Hat, Inc.
    Inventor: David Zeuthen
  • Patent number: 9355282
    Abstract: A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in first application windows of the first display server and the second display server provides an unsecure environment for data presented in second application windows of the second display server. The processing device receives at least one user command to copy data from one of the first application windows of the first display server to one of the second application windows of the second display server. The processing device prompts a user to perform an authentication upon receiving the at least one user command. In response to the user successfully performing the authentication, data is copied from said one of the first application windows to said one of the second application windows.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: May 31, 2016
    Assignee: Red Hat, Inc.
    Inventors: Kristian H. Kristensen, David Zeuthen
  • Patent number: 8694615
    Abstract: A hostname configuration unit associates a display hostname with a regular hostname of a host, where the regular hostname identifies the host and the display hostname identifies a service associated with the host, where the service is provided by a client application. The hostname configuration unit further associates a graphical representation with the display hostname. A hostname query unit is configured to provide the client application the regular hostname, the display hostname, and the graphical representation in response to a request for hostname data received from the client application. The regular hostname, the display hostname, and the graphical representation are used by the client application to advertise a service to allow a remote node to access the advertised service of the application over a network.
    Type: Grant
    Filed: November 5, 2009
    Date of Patent: April 8, 2014
    Assignee: Red Hat, Inc.
    Inventor: David Zeuthen
  • Publication number: 20110239125
    Abstract: A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in first application windows of the first display server and the second display server provides an unsecure environment for data presented in second application windows of the second display server. The processing device receives at least one user command to copy data from one of the first application windows of the first display server to one of the second application windows of the second display server. The processing device prompts a user to perform an authentication upon receiving the at least one user command. In response to the user successfully performing the authentication, data is copied from said one of the first application windows to said one of the second application windows.
    Type: Application
    Filed: March 24, 2010
    Publication date: September 29, 2011
    Inventors: Kristian H. Kristensen, David Zeuthen
  • Publication number: 20110113484
    Abstract: A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.
    Type: Application
    Filed: November 6, 2009
    Publication date: May 12, 2011
    Applicant: RED HAT, INC.
    Inventor: David Zeuthen
  • Publication number: 20110107224
    Abstract: A hostname configuration unit associates a display hostname with a regular hostname of a host, where the regular hostname identifies the host and the display hostname identifies a service associated with the host, where the service is provided by a client application. The hostname configuration unit further associates a graphical representation with the display hostname. A hostname query unit is configured to provide the client application the regular hostname, the display hostname, and the graphical representation in response to a request for hostname data received from the client application. The regular hostname, the display hostname, and the graphical representation are used by the client application to advertise a service to allow a remote node to access the advertised service of the application over a network.
    Type: Application
    Filed: November 5, 2009
    Publication date: May 5, 2011
    Applicant: RED HAT, INC.
    Inventor: David Zeuthen