Patents by Inventor James Paul Schneider
James Paul Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9053197Abstract: An apparatus and a method for suggesting a web site is described. In one embodiment, a user at a client enters a web address. A suggestion server receives the web address and generates one or more suggested web addresses for the user based on an analysis of captured aggregate online users behavior in relation to the web address. The suggestion server stores and organizes results of the analysis of the captured aggregate online users behavior. The results includes a list of two or more substantially related and relevant web addresses. The suggestion server compares the web address with the results of the analysis to generate the one or more suggested web addresses. The one or more suggested web addresses are sent to the client.Type: GrantFiled: November 26, 2008Date of Patent: June 9, 2015Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Publication number: 20150074077Abstract: A search engine tracks search queries from a user received at the search engine to generate a search query history. A prediction engine compares the search query history from the user with search query histories from other users on the search engine. A predicted search query for the user that the user is predicted to use to perform a next search in relation to other possible searches is generated in view of the comparison. Search query histories of the other users with greater similarities to the search query history of the user have a greater computation weight in generating the predicted search query than the search query histories of the other users with fewer similarities to the search query history of the user.Type: ApplicationFiled: November 13, 2014Publication date: March 12, 2015Inventor: James Paul Schneider
-
Patent number: 8958554Abstract: A process and system for enciphering and deciphering Unicode characters that is compatible with scripting languages such as JAVASCRIPT®, JSCRIPT® and VBSCRIPT®. The process and system can encipher each character individually and maintain the size of the character. The enciphered character is deciphered at the application layer at the client to provide endpoint security.Type: GrantFiled: November 30, 2009Date of Patent: February 17, 2015Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8954462Abstract: A system and method for suggesting search terms is described. The method includes receiving a search term from a client at a first time and generating one or more suggested search terms to the client based on the analysis of elapsed time data between the first time and a prior time of receiving a prior search terms. The method further includes sending the suggested search terms to the client.Type: GrantFiled: February 26, 2009Date of Patent: February 10, 2015Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8924553Abstract: An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web application of a server. A Message Authentication Code (MAC) value is formed based on the user identifier token, the request identifier token, and the timestamp using a secret key of the web application. The form is sent with the MAC value and the time stamp to a client. A completed form comprising a returned MAC value and a returned timestamp is received from the client. The completed form is validated at the server based on the returned MAC value and the returned timestamp.Type: GrantFiled: August 31, 2009Date of Patent: December 30, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8904521Abstract: Cross-site request forgeries (“XSRF”) can be prevented using a client-side plugin on a client computer. The client computer accesses a content provided by a third party host via a network and generates a request to a web application as directed by the content. The client-side plugin determines whether the request is associated with suspicious activities based on the content, a source of the request and a list of approved hosts associated with the target host. In response to a determination that the request is associated with suspicious activities, the plugin removes authentication credentials from the request and sends the request to the web application.Type: GrantFiled: November 30, 2009Date of Patent: December 2, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8892590Abstract: A method and apparatus for predicting search queries for a user on a search-based system is described. A search engine tracks search queries from a user received at the search engine. A prediction engine compares a search query history from the user with search query histories from other users on the search engine. The search query histories are stored in a storage device of the search-based system. A prediction of a search query for the user is generated based on the comparison. Search query histories from other users having greater similarities with the search query history from the user have a greater computation weight than search query histories from other users with less similarities with the search query history from the user.Type: GrantFiled: May 31, 2010Date of Patent: November 18, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8849944Abstract: Some embodiments of a multi-use application proxy have been presented. In one embodiment, an application proxy is executed as an intermediary a set of applications. The application proxy performs multiple functions between the set of applications. For example, the application proxy aggregates interactions between the applications and a client in one embodiment.Type: GrantFiled: November 27, 2007Date of Patent: September 30, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8812858Abstract: In one embodiment, a mechanism for broadcast stenography of data communications is disclosed. In one embodiment, a method includes creating a plurality of messages for transmission to one or more recipients, the plurality of messages including one or more real messages intended for one or more of the recipients and one or more bogus messages intended for none of the recipients. The method further includes for each intended recipient of the one or more real message, calculating a message authentication code (MAC) based on the message and a shared secret key kept between a broadcaster of the plurality of messages and the intended recipient, and for each of the plurality of messages, creating a plurality of unique pseudo-MACs that have an identical format to a real MAC.Type: GrantFiled: February 29, 2008Date of Patent: August 19, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8775457Abstract: An apparatus and a method for searching one or more documents for several different strings is described. A finite state machine receives and processes one or more search strings with a tail-first search. A matching string machine forms states based on the characters in the search string with at least one state accepting a match. The states are annotated with a pattern that indicates what the state has matched and can match. Each position within the pattern is either a character that has been matched at that point or an indicator that it is unknown.Type: GrantFiled: May 31, 2010Date of Patent: July 8, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8775818Abstract: An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web application of a server. A Message Authentication Code (MAC) value is formed based on the user identifier token, the request identifier token, and the timestamp using a secret key of the web application. Names of the form elements are enciphered. Fake form elements can also be added to the dynamic form. The entire page also can be enciphered. The dynamic form is sent with the MAC value and the time stamp to a client. A completed form comprising a returned MAC value and a returned timestamp is received from the client. The completed form is validated at the server based on the returned MAC value and the returned timestamp.Type: GrantFiled: November 30, 2009Date of Patent: July 8, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Publication number: 20140136848Abstract: A method and apparatus for providing an automated key distribution to enable communication between two networked devices. A monitoring device receives a request from a network device to send a certificate using a second secure connection prior to an expiration of a timeout period, wherein the second secure connection was created using a known port in response to determining that a request to create a first secure connection was rejected. The monitoring device sends the certificate to the network device using the second secure connection, and establishes the first secure connection with the network device in response to the network device receiving the public key of the monitoring device from a server system by using the certificate.Type: ApplicationFiled: January 17, 2014Publication date: May 15, 2014Applicant: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8707042Abstract: An apparatus and a method for generating a secure cipher key over an insecure channel. In one embodiment, a set of polynomials is generated and shared between a first party and a second party over the insecure channel. The first party generates a first random exponent for its private cipher key. The second party generates a second random exponent for its private cipher key. The first party operates on the set of polynomials with the first random exponent and sends the results to the second party. The second party operates on the set of polynomials with the second random exponent and sends the results to the first party. A shared cipher key is computed based on the exchanged operation results.Type: GrantFiled: August 28, 2008Date of Patent: April 22, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8694798Abstract: A method and apparatus for generating multiple keys for a set of archives or portions of a set of archives. The process includes receiving a passphrase from a user and an indicator of a set of archives to be modified or created. An archive key generation process can be based on a random value generation, an algorithm for generating keys with specific characteristics, an indexing scheme, a progressive enciphering scheme or a shared secret scheme. The generated keys are enciphered using an enciphering algorithm in combination with the passphrase. The archive keys are stored with the archives in their enciphered form. Other intermediate key information is also stored with the archive to enable deciphering of the set of archives using the passphrase as needed.Type: GrantFiled: May 22, 2008Date of Patent: April 8, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8667305Abstract: An apparatus and a method for encrypting a username is described. In one embodiment, a hashed username is encrypted with an encryption function. An input size of the encryption function matches an output size of the encryption function. The password associated with the hashed username is replaced with a function of the encrypted username. The function includes a linear combination operator of the password and the encrypted username. The encrypted username is then swapped with the replaced password. The encryption, replacement, and the swapping are iterated for at least two rounds using a different key with each iteration.Type: GrantFiled: August 28, 2008Date of Patent: March 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8667568Abstract: An apparatus and a method for storing an encrypted username and password. In one embodiment, a username is encrypted. A password associated with the username is encrypted. A user identifier associated with the username is encrypted. The encrypted username, the encrypted password, and the user identifier are stored in one or more database.Type: GrantFiled: May 29, 2008Date of Patent: March 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8660268Abstract: A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input into the hash function to generate a pseudo-random number. The state information that is part of the input can be any number of prior generated pseudo-random numbers. The authentication allows for synchronization of the client and server by exchanging state information. The authentication is not dependent on any absolute time and consequently the client and servers are not required to maintain a reliable shared time base.Type: GrantFiled: April 29, 2008Date of Patent: February 25, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8645696Abstract: An apparatus and a method for authenticating a secure communication is described. A server receives a request from a client for an original SSL certificate. The server embeds a message in a common name (CN) of a new SSL certificate directing the client to another server. The client is transparently reconfigured and establishes a secure communication with the other server using the new SSL certificate.Type: GrantFiled: November 26, 2008Date of Patent: February 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8646104Abstract: A broadcast stateless protocol by which a client broadcasts a request to a server group is described. In one embodiment, the client broadcasts the request to a server group. A tamper-evident challenge including the request is received from any one server of the server group. A response to the tamper-evident challenge is broadcast to any one server of the server group, the response including the request. A result to the request is received upon any one server of the server group verifying the response being valid and the request being unmodified.Type: GrantFiled: February 27, 2008Date of Patent: February 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider
-
Patent number: 8645839Abstract: An apparatus and a method for an online desktop distribution is described. In one embodiment, an online desktop operates on a client with an online desktop distributor having an operating system with one or more kernels compiled for usermode. A server coupled to the client stores and uploads a user profile setting to the client to configure the online desktop on the client based on a user login on the online desktop. The online desktop can be booted from the client with the online desktop distributor or run as a hosted operating system in usermode under a default operating system of the client.Type: GrantFiled: February 26, 2008Date of Patent: February 4, 2014Assignee: Red Hat, Inc.Inventor: James Paul Schneider