Patents by Inventor James P. Schneider
James P. Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11113045Abstract: A method and apparatus for installing a network appliance. In one embodiment, the method includes copying an install image pertaining to the network appliance to an install staging area in a memory device of the network appliance, obtaining current installation object data from a server, and saving an up-to-date set of installation objects in the install staging area using the installation object data received from the server. The method may further include marking the install staging area as bootable, rebooting the network appliance, and installing from the install staging area onto the network appliance.Type: GrantFiled: September 14, 2012Date of Patent: September 7, 2021Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 10068005Abstract: String hashing using a random number generator is disclosed. A method of implementations includes dividing an input stream provided to a hashing module into a plurality of subsets of bits, wherein each subset comprises a same number of bits and wherein each of the subsets of bits comprises an overlapping subset, augmenting a subset of the subsets of bits with a constant, entangling, by a mixer of the hashing module, the subset by an output of a number generator, adding a result of the entangling to an accumulator of the hashing module, repeating the augmenting, the entangling, and the adding on at least a portion of a next sequential subset of the subset of bits, and when all of the subsets of bits have been processed, returning a value in the accumulator as a hash result value.Type: GrantFiled: August 1, 2014Date of Patent: September 4, 2018Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9910688Abstract: Implementing aspects via callback in a virtual machine, where an aspect weaver weaves the aspect with a module to provide primary and crosscutting functionality in the runtime execution of the module. The virtual machine has multiple modules that are part of an application implementing separation of concerns. Each of the multiple modules has a distinct functionality portion and a common functionality portion, common to all modules. The common functionality is referenced by the virtual machine via callback for the multiple modules. Aspect code is loaded as a callback that is applied to the multiple modules by the virtual machine. Loading the aspect code as a callback can implement the aspect at any point in the modules, including conditional statements, calls to methods of objects or classes, loops, any point in an exception handler, or to monitor changes in variables.Type: GrantFiled: November 28, 2008Date of Patent: March 6, 2018Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9515828Abstract: A method and system distributes shares of a secret among cooperating entities using linear interpolation. In one embodiment, a linear equation is formed using the secret and random elements. The linear equation represents a K-dimensional hyperplane, where K is the number of shares to reconstruct the secret. Shares of the secrets are created, with each share corresponding to a point on the secret hyperplane. The shares are then distributed to cooperating entities for secret sharing.Type: GrantFiled: March 17, 2014Date of Patent: December 6, 2016Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9270644Abstract: Techniques for using a proxy server are described herein. In response to a request received from a client for accessing a Web page provided from a remote Web server over a network, a proxy server retrieves the Web page from the remote Web server and presents the Web page to the client. The proxy server presents an input interface to the client to allow a user of the client to log into the proxy server without having to type at the client. The proxy server causes one or more keys in an input field of the Web page to be entered without a user having to type at the client. Thereafter, the proxy server intercepts traffic between the client and the remote Web server over the network.Type: GrantFiled: April 17, 2014Date of Patent: February 23, 2016Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9244882Abstract: A network appliance sends a configuration request to multiple different servers, each of which is associated with a different environment. A response is received from at least one server. Each received response includes configuration data that pertains to an environment associated with the server from which the response is received. The network appliance is then configured based on the configuration data included in the response to enable the network appliance to operate in the environment associated with the server from which the response originated.Type: GrantFiled: February 26, 2009Date of Patent: January 26, 2016Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9201793Abstract: Systems and methods to facilitate profiling of applications for efficient loading are described. A method may include identifying a page fault during execution of an application being loaded into memory. The page fault indicates that an application part to be currently executed has not been loaded in the memory yet. The method may further include collecting page fault data associated with the page fault, and causing the page fault data to be stored in a data store for use by a profiler.Type: GrantFiled: May 30, 2008Date of Patent: December 1, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9152442Abstract: The use of callback functions when executing intermediate instructions in a virtual machine is described. The virtual machine receives and evaluates intermediate instructions. The virtual machine evaluates the instructions based on a function table referencing definitions of the functions. A callback is loaded into the virtual machine platform, and a callback loader modifies the function table to cause a function in the table to point to the callback instead of the standard definition. Thus, when the intermediate code is evaluated, it is evaluated based on the modified functionality of the callback rather than the standard definition.Type: GrantFiled: August 29, 2008Date of Patent: October 6, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9134973Abstract: A compiler is loaded by a computing device using an evaluation function that is included in a program in a compiled form. The evaluation function causes the compiler to compile source code for the program, wherein the source code includes new instructions that are uncompiled, and wherein compiling the source code generates compiled code that includes the new instructions. The evaluation function loads the compiled code into memory, retrieves the new instructions, and executes the new instructions. The evaluation function may perform these operations during runtime of the program that includes the evaluation function.Type: GrantFiled: February 26, 2009Date of Patent: September 15, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 9094301Abstract: A method and apparatus for facilitating provisioning of network appliances based on different environments. A mapping server is provided to communicate with networked devices from different environments. The mapping server receives a request for a network address of a corresponding configuration server from one of the networked devices, determines a network identifier of this networked devices based on the request, and searches a mapping table for the network address of the corresponding configuration server using the network identifier of the networked device. The mapping server then provides the network address of the corresponding configuration server to the networked device.Type: GrantFiled: May 30, 2008Date of Patent: July 28, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8966594Abstract: A first application that is hosted by a first machine receives a login request from a user. The first application requests authentication verification from a second application that is hosted by a second machine. The first application authenticates the user if the user was authenticated by the second application, wherein the user can be authenticated by both the first application and the second application after having provided authentication credentials to one of the first application or the second application.Type: GrantFiled: February 4, 2008Date of Patent: February 24, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8959618Abstract: A method and apparatus for managing the expiration of a password. In one embodiment, the method comprises determining whether a behavior anomaly associated with an account has occurred. In response to a determination that the behavior anomaly has occurred, the method expires a password associated with the account and forces the password be changed the next time the password is presented for accessing the account.Type: GrantFiled: February 5, 2008Date of Patent: February 17, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8943493Abstract: Some embodiments of automating application deployment have been presented. In one embodiment, a production repository is created in a federated source code management system to accept software from only a single committer. The production repository is coupled to a set of repositories. Platform management infrastructure monitors the production repository for changes to the software. Further, the platform management infrastructure may automatically push the changes to one or more repositories affected.Type: GrantFiled: November 18, 2008Date of Patent: January 27, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Publication number: 20140344285Abstract: String hashing using a random number generator is disclosed. A method of implementations includes dividing an input stream provided to a hashing module into a plurality of subsets of bits, wherein each subset comprises a same number of bits and wherein each of the subsets of bits comprises an overlapping subset, augmenting a subset of the subsets of bits with a constant, entangling, by a mixer of the hashing module, the subset by an output of a number generator, adding a result of the entangling to an accumulator of the hashing module, repeating the augmenting, the entangling, and the adding on at least a portion of a next sequential subset of the subset of bits, and when all of the subsets of bits have been processed, returning a value in the accumulator as a hash result value.Type: ApplicationFiled: August 1, 2014Publication date: November 20, 2014Inventor: James P. Schneider
-
Patent number: 8881172Abstract: A method and system for managing configuration interfaces. In one embodiment, a system includes a user interface for receiving a user login, causing a configuration process to be invoked, and receiving user input for managing the configuration process. A log file is used to store log file information in response to the received user input for managing the configuration process. The log file can be used by a process monitor to determine if there is any recent user activity. The process monitor can determine whether the log file has been changed in response to the received user input during a specific time interval. In response to a determination that the log file has not been changed in response to the received user input during the specific time interval, the process monitor can terminate the configuration process.Type: GrantFiled: February 4, 2008Date of Patent: November 4, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8863151Abstract: A request to post a message to a destination is intercepted in an operating environment in which processes communicate via message queues. Message content and requester information associated with the request is evaluated to determine whether the message is to be posted. The message is posted to a message queue of the destination if the message is to be posted.Type: GrantFiled: August 15, 2007Date of Patent: October 14, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8813069Abstract: Some embodiments of a method and an apparatus to migrate functionalities across systems have been presented. In one embodiment, a system call from an application running on a first system is detected. The first system has a first version of an operating system, but the system call requires a functionality that is not available in the first version of the operating system. The functionality is available in a second version of the operating system running on a second system. Therefore, the system call is reflected from the first system to the second system.Type: GrantFiled: May 29, 2009Date of Patent: August 19, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8812570Abstract: In one embodiment, a mechanism for string hashing using a random number generator is disclosed. In one embodiment, a method includes dividing an input stream provided to a hashing module into a plurality of subsets of ānā bits, entangling, by a mixer of the hashing module, one of the subsets of ānā bits by a next sequential output of a pseudo-random number generator (PRNG), adding a product of the entangling to an accumulator of the hashing module, repeating the entangling and adding until all subsets of the plurality of subsets have been processed, and returning a value in the accumulator as a hash result value.Type: GrantFiled: May 28, 2009Date of Patent: August 19, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Publication number: 20140230043Abstract: Techniques for using a proxy server are described herein. In response to a request received from a client for accessing a Web page provided from a remote Web server over a network, a proxy server retrieves the Web page from the remote Web server and presents the Web page to the client. The proxy server presents an input interface to the client to allow a user of the client to log into the proxy server without having to type at the client. The proxy server causes one or more keys in an input field of the Web page to be entered without a user having to type at the client. Thereafter, the proxy server intercepts traffic between the client and the remote Web server over the network.Type: ApplicationFiled: April 17, 2014Publication date: August 14, 2014Applicant: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8804953Abstract: Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of the block cipher. The method may further include pre-processing a current plaintext block based on the stream of bits and the number of ciphertext blocks in the output stream of the block cipher. Then the block cipher may encipher the pre-processed block to generate a current ciphertext block.Type: GrantFiled: November 18, 2008Date of Patent: August 12, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider