Patents by Inventor John J. Eckersberg, II

John J. Eckersberg, II has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9112682
    Abstract: Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer/transport security layer (SSL/TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc.
    Type: Grant
    Filed: March 15, 2011
    Date of Patent: August 18, 2015
    Assignee: Red Hat, Inc.
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P. Radez
  • Patent number: 8949951
    Abstract: Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: February 3, 2015
    Assignee: Red Hat, Inc.
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P Radez
  • Patent number: 8635671
    Abstract: In accordance with some aspects of the present disclosure, a method is disclosed that can include receiving, by a security delegate module, a set of user authentication credentials by an application running a first instance in a network for a user; determining, by the security delegate module, a type of the application; and selecting, by the security delegate module, a security service based on the set of user authentication credentials and the type of application.
    Type: Grant
    Filed: May 31, 2011
    Date of Patent: January 21, 2014
    Assignee: Red Hat, Inc.
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P. Radez
  • Publication number: 20120311671
    Abstract: In accordance with some aspects of the present disclosure, a method is disclosed that can include receiving, by a security delegate module, a set of user authentication credentials by an application running a first instance in a network for a user; determining, by the security delegate module, a type of the application; and selecting, by the security delegate module, a security service based on the set of user authentication credentials and the type of application.
    Type: Application
    Filed: May 31, 2011
    Publication date: December 6, 2012
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P. Radez
  • Publication number: 20120240212
    Abstract: Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer/transport security layer (SSL/TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc.
    Type: Application
    Filed: March 15, 2011
    Publication date: September 20, 2012
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel P. Radez
  • Publication number: 20120227095
    Abstract: Embodiments of the present teachings relate to systems and methods for generating modular security delegates for applications. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured. Each machine can include a plurality of application instances and an authentication delegate. In addition, each network environment can include a communication interface to security services. The applications can include logic that indicates what security delegate to use for a given set of user authentication credentials. The logic can be configured to determine the appropriate authentication delegate using various methods. The authentication delegates can receive a set of user authentication credentials from application instances and determine whether the set of user authentication credentials are valid. Each authentication delegate corresponds to one and only one type of authentication mechanism.
    Type: Application
    Filed: March 4, 2011
    Publication date: September 6, 2012
    Inventors: Thomas Alexander Wood, John J. Eckersberg, II, Daniel Radez