Patents by Inventor Dmitri Pal
Dmitri Pal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12131173Abstract: A method includes receiving, from a client device, a request to initiate an action on a target system. The method further includes determining, in view of a container registry, that the action is permissive. The method further includes receiving an authorized container corresponding to the action. The method further includes performing, by a processing device, the action in view of the container.Type: GrantFiled: February 3, 2021Date of Patent: October 29, 2024Assignee: Red Hat, Inc.Inventor: Dmitri Pal
-
Patent number: 11886860Abstract: The technology disclosed herein enables a processor to receive, at a distribution unit, a first content request from a distribution electronic control unit (ECU) associated with a vehicle, wherein the first content request reflects one or more filtering criteria, determine whether a content item that satisfies the filtering criteria is stored on a storage device of the distribution unit, responsive to determining that the content item that satisfies the filtering criteria is not stored on the storage device of the distribution unit: send, to a managed content delivery service, a second content request, wherein the second content request includes the filtering criteria, and receive, from the managed content delivery service, the content item that satisfies the filtering criteria, and send the content item that satisfies the filtering criteria to the distribution ECU associated with the vehicle.Type: GrantFiled: September 27, 2021Date of Patent: January 30, 2024Assignee: Red Hat, Inc.Inventor: Dmitri Pal
-
Patent number: 11741221Abstract: The technology disclosed herein enables a computing device to use a trusted execution environment in an untrusted device to distribute executable image data (e.g., network bootable image) to a set of one or more computing devices. An example method may include: establishing, by a processor, the trusted execution environment in a first computing device, wherein the trusted execution environment comprises an encrypted memory area; loading executable code into the trusted execution environment, wherein the executable code controls access to protected content and wherein the protected content comprises executable image data; and causing the executable code to execute in the trusted execution environment to analyze data of a second computing device and to provide the second computing device access to the protected content.Type: GrantFiled: July 29, 2020Date of Patent: August 29, 2023Assignee: Red Hat, Inc.Inventors: Michael Hingston McLaughlin Bursell, Dmitri Pal
-
Publication number: 20230098599Abstract: The technology disclosed herein enables a processor to receive, at a distribution unit, a first content request from a distribution electronic control unit (ECU) associated with a vehicle, wherein the first content request reflects one or more filtering criteria, determine whether a content item that satisfies the filtering criteria is stored on a storage device of the distribution unit, responsive to determining that the content item that satisfies the filtering criteria is not stored on the storage device of the distribution unit: send, to a managed content delivery service, a second content request, wherein the second content request includes the filtering criteria, and receive, from the managed content delivery service, the content item that satisfies the filtering criteria, and send the content item that satisfies the filtering criteria to the distribution ECU associated with the vehicle.Type: ApplicationFiled: September 27, 2021Publication date: March 30, 2023Inventor: Dmitri Pal
-
Publication number: 20220244976Abstract: A method includes receiving, from a client device, a request to initiate an action on a target system. The method further includes determining, in view of a container registry, that the action is permissive. The method further includes receiving an authorized container corresponding to the action. The method further includes performing, by a processing device, the action in view of the container.Type: ApplicationFiled: February 3, 2021Publication date: August 4, 2022Inventor: Dmitri Pal
-
Publication number: 20220035904Abstract: The technology disclosed herein enables a computing device to use a trusted execution environment in an untrusted device to distribute executable image data (e.g., network bootable image) to a set of one or more computing devices. An example method may include: establishing, by a processor, the trusted execution environment in a first computing device, wherein the trusted execution environment comprises an encrypted memory area; loading executable code into the trusted execution environment, wherein the executable code controls access to protected content and wherein the protected content comprises executable image data; and causing the executable code to execute in the trusted execution environment to analyze data of a second computing device and to provide the second computing device access to the protected content.Type: ApplicationFiled: July 29, 2020Publication date: February 3, 2022Inventors: Michael Hingston McLaughlin Bursell, Dmitri Pal
-
Patent number: 10257699Abstract: A method for user authentication for accessing protected applications by computing devices includes receiving, by a processor of a mobile computing device, a first authentication token. The method further includes transmitting an authentication request using the first authentication token. The method further includes receiving, in response to the authentication request, a second authentication token. The method further includes transmitting a resource access token request using the second authentication token. The method further includes receiving, in response to the resource access token request, a resource access token. The method further includes transmitting a computing resource access request using the resource access token.Type: GrantFiled: June 10, 2016Date of Patent: April 9, 2019Assignee: Red Hat, Inc.Inventor: Dmitri Pal
-
Patent number: 9608981Abstract: Systems and methods for strong user authentication for accessing protected networks. An example method may include: transmitting, by a processing device, an authentication request to an authentication server; receiving an access granting token from the authentication server; transmitting, to a nonce server, a nonce request using the access granting token; receiving a cryptographic nonce from the nonce server; and transmitting, to a virtual private network (VPN) server, a VPN connection request using the cryptographic nonce.Type: GrantFiled: December 11, 2013Date of Patent: March 28, 2017Assignee: Red Hat, Inc.Inventor: Dmitri Pal
-
Patent number: 9553855Abstract: Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication data may be stored in a file. The file may be encrypted and a key to the encrypted file may be generated. The encrypted file may be stored in a user space and the key may be stored in a kernel space. The key may be retrieved from the kernel space and applied to the encrypted file in the user space to decode the encrypted file and subsequently access the authentication credentials stored in the encrypted file.Type: GrantFiled: February 14, 2014Date of Patent: January 24, 2017Assignee: Red Hat, Inc.Inventors: Dmitri Pal, Rob Crittenden
-
Publication number: 20160286400Abstract: A method for user authentication for accessing protected applications by computing devices includes receiving, by a processor of a mobile computing device, a first authentication token. The method further includes transmitting an authentication request using the first authentication token. The method further includes receiving, in response to the authentication request, a second authentication token. The method further includes transmitting a resource access token request using the second authentication token. The method further includes receiving, in response to the resource access token request, a resource access token. The method further includes transmitting a computing resource access request using the resource access token.Type: ApplicationFiled: June 10, 2016Publication date: September 29, 2016Inventor: Dmitri Pal
-
Patent number: 9369282Abstract: Systems and methods for strong user authentication for accessing protected applications by mobile computing devices. An example method may comprise: receiving, by a mobile computing device, a cryptographic nonce via a first communication interface; transmitting, via a second communication interface, an authentication request using the cryptographic nonce, to an authentication server via an HTTP proxy server; receiving a resource access token from the authentication server; and transmitting a computing resource access request using the resource access token.Type: GrantFiled: January 29, 2014Date of Patent: June 14, 2016Assignee: Red Hat, Inc.Inventor: Dmitri Pal
-
Publication number: 20150237025Abstract: Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication data may be stored in a file. The file may be encrypted and a key to the encrypted file may be generated. The encrypted file may be stored in a user space and the key may be stored in a kernel space. The key may be retrieved from the kernel space and applied to the encrypted file in the user space to decode the encrypted file and subsequently access the authentication credentials stored in the encrypted file.Type: ApplicationFiled: February 14, 2014Publication date: August 20, 2015Applicant: Red Hat, Inc.Inventors: Dmitri Pal, Rob Crittenden
-
Publication number: 20150215128Abstract: Systems and methods for strong user authentication for accessing protected applications by mobile computing devices. An example method may comprise: receiving, by a mobile computing device, a cryptographic nonce via a first communication interface; transmitting, via a second communication interface, an authentication request using the cryptographic nonce, to an authentication server via an HTTP proxy server; receiving a resource access token from the authentication server; and transmitting a computing resource access request using the resource access token.Type: ApplicationFiled: January 29, 2014Publication date: July 30, 2015Applicant: Red Hat, Inc.Inventor: Dmitri Pal
-
Publication number: 20150163222Abstract: Systems and methods for strong user authentication for accessing protected networks. An example method may comprise: transmitting, by a processing device, an authentication request to an authentication server; receiving an access granting token from the authentication server; transmitting, to a nonce server, a nonce request using the access granting token; receiving a cryptographic nonce from the nonce server; and transmitting, to a virtual private network (VPN) server, a VPN connection request using the cryptographic nonce.Type: ApplicationFiled: December 11, 2013Publication date: June 11, 2015Applicant: Red Hat, Inc.Inventor: Dmitri Pal
-
Patent number: 8966276Abstract: In a system for disconnected authentication, verification records corresponding to given authentication token outputs over a predetermined period of time, sequence of events, and/or set of challenges are downloaded to a verifier. The records include encrypted or hashed information for the given authentication token outputs. In one embodiment using time intervals, for each time interval, token output data, a salt value, and a pepper value, are hashed and compared with the verification record for the time interval. After a successful comparison, a user can access the computer. A PIN value can also be provided as an input the hash function. A portion of the hash function output can be used as a key to decrypt an encrypted (Windows) password, or other sensitive information.Type: GrantFiled: September 10, 2004Date of Patent: February 24, 2015Assignee: EMC CorporationInventors: Andrew Nanopoulos, Karl Ackerman, Piers Bowness, William Duane, Markus Jakobsson, Burt Kaliski, Dmitri Pal, Shane D. Rice, Ronald L. Rivest
-
Patent number: 8959510Abstract: In one embodiment, a mechanism for providing a trusted environment for provisioning a virtual machine is disclosed. In one embodiment, a method includes beginning an initialization process of a virtual machine (VM) hosted by a VM host server, obtaining by the VM as part of the initialization process a one-time password from the VM host server, the one-time password provided to the VM host server from a management server that created the one-time password, and authenticating the VM with an identity server using the one-time password.Type: GrantFiled: March 19, 2009Date of Patent: February 17, 2015Assignee: Red Hat, Inc.Inventors: Daniel P. Berrange, Dmitri Pal, Simo S. Sorce
-
Publication number: 20100242038Abstract: In one embodiment, a mechanism for providing a trusted environment for provisioning a virtual machine is disclosed. In one embodiment, a method includes beginning an initialization process of a virtual machine (VM) hosted by a VM host server, obtaining by the VM as part of the initialization process a one-time password from the VM host server, the one-time password provided to the VM host server from a management server that created the one-time password, and authenticating the VM with an identity server using the one-time password.Type: ApplicationFiled: March 19, 2009Publication date: September 23, 2010Inventors: Daniel P. Berrange, Dmitri Pal, Simo S. Sorce
-
Publication number: 20050166263Abstract: In a system for disconnected authentication, verification records corresponding to given authentication token outputs over a predetermined period of time, sequence of events, and/or set of challenges are downloaded to a verifier. The records include encrypted or hashed information for the given authentication token outputs. In one embodiment using time intervals, for each time interval, token output data, a salt value, and a pepper value, are hashed and compared with the verification record for the time interval. After a successful comparison, a user can access the computer. A PIN value can also be provided as an input the hash function. A portion of the hash function output can be used as a key to decrypt an encrypted (Windows) password, or other sensitive information.Type: ApplicationFiled: September 10, 2004Publication date: July 28, 2005Inventors: Andrew Nanopoulos, Karl Ackerman, Piers Bowness, William Duane, Markus Jakobsson, Burt Kaliski, Dmitri Pal, Shane Rice, Ronald Rivest