Patents by Inventor James P. Schneider

James P. Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8533588
    Abstract: A method for overriding images in user interfaces using web application styling sheets may include creating a first style sheet defining a first image. The first style sheet allows customization of the first image by referencing the first image using a background attribute and a first location. A second style sheet defines a second image using a background attribute and a second location. The method may further include creating a web page with a link to the first style sheet and a link to the second style sheet, and sending the web page to a client for presentation, where the second image overrides the first image when the web page is presented to a user.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: September 10, 2013
    Assignee: Red Hat, Inc.
    Inventors: James P. Schneider, Marshall Smith
  • Patent number: 8533227
    Abstract: A method and system for managing website blacklists to control website access of a user. In one embodiment, a client queries a database regarding a location of a website before the client fetches a resource from the website. The database includes a list of websites based on which access by the client is controlled. If the location of the website in the query exists in the database, the client displays a warning dialog and receives a user input. The client determines whether to continue fetching the resource based on the user input to the warning dialog.
    Type: Grant
    Filed: May 14, 2008
    Date of Patent: September 10, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8520854
    Abstract: A method and system distributes N shares of a secret among cooperating entities by representing the secret as a secret polynomial, and forming a splitting polynomial with the secret polynomial as one or more of the coefficients. In one embodiment, the method represents the secret as a secret polynomial over GF(q), where q is a prime number or a power of a prime number. A splitting polynomial of degree (K?1) over GF(qm) is constructed, where K is the number of shares to reconstruct the secret and m is a positive integer. The coefficients of the splitting polynomial are formed with the secret polynomial and random information. The method further evaluates the splitting polynomial at N points with arithmetic defined on GF(qm) to generate the N shares of the secret.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: August 27, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8504986
    Abstract: A method and apparatus for converting a method call to a function call. In one embodiment, the method comprises receiving an argument list from a function that has been called by a subroutine call. The method further comprises determining whether the subroutine call is a method call from the argument list. In response to a determination that the subroutine call is the method call, the method comprises converting the method call into a function call.
    Type: Grant
    Filed: January 23, 2008
    Date of Patent: August 6, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8489840
    Abstract: Some embodiments of discontiguous object addressing have been presented. In one embodiment, a set of objects, each having one or more properties, are stored in a memory of a computer system. The memory is divided into chunks. The properties of at least one of the objects are stored in discontiguous chunks of the memory. Furthermore, a processor in the computer system may independently access the individual properties in the discontiguous chunks of memory.
    Type: Grant
    Filed: February 26, 2009
    Date of Patent: July 16, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8464252
    Abstract: A system and method for isolating processes executing within a computing device. A process is loaded into a virtual machine operating under the control of a hypervisor communicatively interfaced with an operating system kernel. A subset of an application programming interface (API) is exposed to the virtual machine enabling the process to interface with the operating system kernel via the subset of the API. The process is then executed in the virtual machine.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: June 11, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8437472
    Abstract: Some embodiments of a method and an apparatus to strengthen key schedule for arcfour have been presented. In one embodiment, an S array of a predetermined size is initialized. The S array is usable in a key generating process of arcfour encryption. The key generation process is extended to generate keys, which are substantially random and substantially unbiased. Using the keys generated, a stream cipher performs arcfour encryption on plaintext data to output ciphertext data.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: May 7, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8418164
    Abstract: A method and apparatus for installing a network appliance. In one embodiment, the method includes copying an install image pertaining to the network appliance to an install staging area in a memory device of the network appliance, obtaining current installation object data from a server, and saving an up-to-date set of installation objects in the install staging area using the installation object data received from the server. The method may further include marking the install staging area as bootable, rebooting the network appliance, and installing from the install staging area onto the network appliance.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: April 9, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8416947
    Abstract: An input block of data and a key that includes multiple sub-keys are received by a block cipher. A nonlinear substitution is performed on at least a portion of the data, wherein the nonlinear substitution is achieved by multiplying the portion of the data by one of the sub-keys over a finite field of even characteristic, modulo a fixed primitive polynomial. An output block of ciphertext is then generated.
    Type: Grant
    Filed: February 21, 2008
    Date of Patent: April 9, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8412932
    Abstract: A method and system for collecting account access statistics from information provided by client certificates. In one embodiment, the method comprises requesting client certificates from remote terminals that request to access a computing resource. The method further comprises updating the account access statistics based on information provided by presence or absence of the client certificates and contents of the client certificates for the client certificates that are present.
    Type: Grant
    Filed: February 28, 2008
    Date of Patent: April 2, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8412806
    Abstract: A method and system for setting a time on a network appliance. The method may include attempting to establish a secure connection with a backend server using a certificate issued for a network appliance, and determining that an attempt to establish a secure connection has failed. The method may further include soliciting a response from one or more predefined servers, extracting time data from one or more responses received from the predefined server, and updating the time on the network appliance using the time data extracted from the received responses.
    Type: Grant
    Filed: November 14, 2007
    Date of Patent: April 2, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8396209
    Abstract: In one embodiment, a mechanism for chained output feedback encryption is disclosed. In one embodiment, a method includes generating a keystream at a block cipher encryption module with inputs of a key and the result of an exclusive-or (XOR) operation on two or more previous keystream outputs, and producing ciphertext by combining the generated keystream with plaintext.
    Type: Grant
    Filed: May 23, 2008
    Date of Patent: March 12, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8380873
    Abstract: A system and method for enabling single-socket server applications to receive information via multiple ports. In one embodiment, a system includes a network tunnel configured to receive traffic at a first port of an application server and to communicate the received traffic to a second port of the application server. The system further includes a single-socket application, coupled to the second port of the application server, to monitor for incoming traffic at the second port, and to receive the traffic destined for the first port and communicated to the second port via the network tunnel.
    Type: Grant
    Filed: February 24, 2012
    Date of Patent: February 19, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8364958
    Abstract: A method and system calculates shares and sub-shares of a secret for distribution among cooperating entities. In one embodiment, the method creates shares of the secret, with each share containing a point on a K-dimensional secret hyperplane that embeds the secret, where K is the number of shares to reconstruct the secret. The method further constructs sub-shares for the shares. The sub-shares of a share define a set of secondary K-dimensional hyperplanes that intersect at the point contained in the share. The sub-shares are distributed to a plurality of cooperating entities for secret sharing.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: January 29, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8358781
    Abstract: Plain text, a secret key and a primitive polynomial that defines a finite field of even characteristic are received. The plain text is divided into a plurality of plain text blocks. For each plain text block of the plurality of plain text blocks other than a first plain text block, the plain text block is multiplied by a preceding cipher text block over the finite field of even characteristic, modulo the primitive polynomial, to generate an intermediate block, wherein the preceding cipher text block was generated from a preceding plain text block. Each intermediate block is processed by a block cipher using the secret key to generate a subsequent cipher text block. The block cipher operates in a nonlinear feedback mode of operation.
    Type: Grant
    Filed: November 30, 2008
    Date of Patent: January 22, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Publication number: 20130014098
    Abstract: A method and apparatus for installing a network appliance. In one embodiment, the method includes copying an install image pertaining to the network appliance to an install staging area in a memory device of the network appliance, obtaining current installation object data from a server, and saving an up-to-date set of installation objects in the install staging area using the installation object data received from the server. The method may further include marking the install staging area as bootable, rebooting the network appliance, and installing from the install staging area onto the network appliance.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8345861
    Abstract: A method and system for distributing a secret are described. In one embodiment, the secret is represented by a secret polynomial of degree d over GF(q) constructed with a prime or a power of a prime. The secret polynomial is then embedded into an extension polynomial of degree m that is greater than d. The extension polynomial is divided by n coprime divisor polynomials over GF(q), using arithmetic defined for polynomials over GF(q), to generate n shares of the secret. Each share includes one of the divisor polynomials and a corresponding remainder. These n shares are distributed among a plurality of cooperating entities for secret sharing.
    Type: Grant
    Filed: August 22, 2008
    Date of Patent: January 1, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8347374
    Abstract: A pass-through agent receives a request from a client and authenticates the client before forwarding the request to a target server that lacks client authentication capability. The target server is configured to accept requests from the pass-through agent, and may be configured to reject requests that do not come from the pass-through agent.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: January 1, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8276136
    Abstract: A method and apparatus for configuring a remotely available service. In one embodiment, the method includes downloading configuration data for the remotely available service while running a current instance of the service, and invoking a new instance of the service without causing a current instance of the service to terminate. The method may further include causing the current instance of the service to continue performing designated operations until the new instance completes initialization using the configuration data and is able to perform the designated operations.
    Type: Grant
    Filed: December 11, 2007
    Date of Patent: September 25, 2012
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8243933
    Abstract: A method and system for distributing a secret to a plurality of computing systems. In one embodiment, the method determines the number (n) of shares to generate and a threshold number (k) of the shares from which the secret can be reconstructed. The method further chooses n coprime random bit strings in any one of general rings as moduli, the general rings including one or more non-integer rings. The secret is then embedded in a bit string which is at least one bit longer than the product of any k?1 moduli and at least one bit shorter than the product of any k moduli. The method further computes shares of the bit string for distribution to n computing systems, each share including one of the moduli and a corresponding remainder.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: August 14, 2012
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider