Patents by Inventor Neil R.T. Horman
Neil R.T. Horman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9785529Abstract: Some embodiments of a system and a method to notify applications of lost computing resources have been presented. For instance, a processing device running on a client machine can monitor a computing resource used by an application, which also runs on the client machine. If the computing resource is lost, then the processing device can notify the application of the loss and provides details about the lost computing resource to the application so that the application can take appropriate action in response to the loss.Type: GrantFiled: February 26, 2010Date of Patent: October 10, 2017Assignee: Red Hat, Inc.Inventors: Jeffrey T. Layton, Eric L. Paris, Neil R. T. Horman
-
Patent number: 9503392Abstract: A method and system for securely provisioning a host, the method including determining, by a provisioning system, a physical path from the host in a cloud to the provisioning system, wherein the physical path includes static mapping for a device between the host and the provisioning system. The provisioning system receives a request to provision a virtual machine on a guest host in a cloud, and sends installation information for the virtual machine via the determined physical path.Type: GrantFiled: February 14, 2013Date of Patent: November 22, 2016Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, James A. Laska
-
Patent number: 9268621Abstract: A computing device identifies a data packet received at a computing device. The computing device allocates memory having a fixed size to store the network data packet. A latency reducer identifies a free space in the memory allocation, the free space comprising a difference between the fixed size of the memory allocation and a size of the network data packet. The latency reducer creates a socket buffer list for the network data packet in the free space, the socket buffer list comprising a plurality of entries to serve as socket queue objects for a plurality of applications.Type: GrantFiled: November 2, 2011Date of Patent: February 23, 2016Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, Eric L. Paris, Jeffrey T. Layton
-
Patent number: 9158690Abstract: A method and system for sending data in a file system that uses cryptographic signatures to protect data integrity. A computer system calculates a signature based on the content of a page of a memory. The memory is shared by processes that run on the computer system. The computer system write-protects the page while the page is used for calculation of the signature. When a first process attempts to modify the page, a page fault is triggered. In response to the page fault, the content of the page in memory is copied to a new page in the memory. The new page is accessible by the processes. Access to the page by the first process is redirected to the new page. Subsequent to the page fault, access to the page by the second process is also redirected to the new page.Type: GrantFiled: July 10, 2013Date of Patent: October 13, 2015Assignee: Red Hat, Inc.Inventors: Jeffrey T. Layton, Neil R. T. Horman, Eric L. Paris, Josef M. Bacik
-
Patent number: 9038075Abstract: A system and a method are disclosed for batch execution of system calls in an operating system. In one implementation, a processing device configures a system call batching buffer table in a user space of an operating system, the system call batching buffer table including a plurality of system call units, associates a system call number with the system call batching buffer table, and issues a trap instruction to a kernel of the operating system to execute at least one of the plurality of system call units, the trap instruction including the system call number.Type: GrantFiled: November 26, 2012Date of Patent: May 19, 2015Assignee: Red Hat, Inc.Inventor: Neil R. T. Horman
-
Patent number: 8954697Abstract: A system configures page tables to cause an operating system to copy original page data in a data store when any one of the application processes makes a first write request for the original page data. The system detects a page fault from a memory management unit receiving a first write request from one of the application processes and creates the copy in physical memory to allow the application process to modify the page data copy. The other application processes have read access to the original page data. The system replaces the original page data in the data store with the page data copy in response to receiving a first synchronization request from the application process and updates a page table for one of the other application processes to configure access to the replaced page data in response to receiving a second synchronization request from the one other application process.Type: GrantFiled: August 5, 2010Date of Patent: February 10, 2015Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, Eric L. Paris, Jeffrey T. Layton
-
Patent number: 8862930Abstract: A computing system stores actual memory usage data in a user memory space. The actual memory usage data represents memory usage of a plurality of device drivers that are loaded by a first kernel. The computing system generates an estimate of memory space to be reserved for a second kernel based on the actual memory usage data for the plurality of device drivers that are loaded by the first kernel and reserves memory space for the second kernel using the estimate.Type: GrantFiled: November 24, 2010Date of Patent: October 14, 2014Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, Vivek Goyal
-
Patent number: 8832811Abstract: In response to a request received at an authentication server from a client to enter a network, the authentication server transmits a network access control (NAC) request to the client using a NAC protocol. The NAC request includes an identifier (ID) identifying a trusted platform (TP) credential that represents integrity of at least a portion of software and hardware configurations of the client. In response to a NAC response from the client, the authentication server compares the first TP credential with a second TP credential stored in a storage associated with the authentication server. The authentication server allows the client to enter the network if the first and second TP credentials are matched; otherwise, the client is prevented from entering the network.Type: GrantFiled: August 27, 2010Date of Patent: September 9, 2014Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, Eric L. Paris
-
Publication number: 20140229620Abstract: A method and system for securely provisioning a host, the method including determining, by a provisioning system, a physical path from the host in a cloud to the provisioning system, wherein the physical path includes static mapping for a device between the host and the provisioning system. The provisioning system receives a request to provision a virtual machine on a guest host in a cloud, and sends installation information for the virtual machine via the determined physical path.Type: ApplicationFiled: February 14, 2013Publication date: August 14, 2014Applicant: RED HAT, INC.Inventors: Neil R. T. Horman, James A. Laska
-
Publication number: 20140149781Abstract: A system and a method are disclosed for batch execution of system calls in an operating system. In one implementation, a processing device configures a system call batching buffer table in a user space of an operating system, the system call batching buffer table including a plurality of system call units, associates a system call number with the system call batching buffer table, and issues a trap instruction to a kernel of the operating system to execute at least one of the plurality of system call units, the trap instruction including the system call number.Type: ApplicationFiled: November 26, 2012Publication date: May 29, 2014Applicant: RED HAT, INC.Inventor: Neil R. T. Horman
-
Patent number: 8677115Abstract: A request is received from a client for accessing a resource provided in a network, the request including credential data representing system integrity of at least one component running on the client. In response to the request, one or more credential identifiers identifying the credential data is transmitted to a management server that provisioned the client. Credential reference data is received from the management server based on the one or more credential identifiers. The client is authenticated based on a comparison of the credential data received from the client and credential reference data received from the management server.Type: GrantFiled: December 9, 2010Date of Patent: March 18, 2014Assignee: Red Hat, Inc.Inventors: Eric L. Paris, Neil R. T. Horman
-
Publication number: 20130297881Abstract: A method and system for sending data in a file system that uses cryptographic signatures to protect data integrity. A computer system calculates a signature based on the content of a page of a memory. The memory is shared by processes that run on the computer system. The computer system write-protects the page while the page is used for calculation of the signature. When a first process attempts to modify the page, a page fault is triggered. In response to the page fault, the content of the page in memory is copied to a new page in the memory. The new page is accessible by the processes. Access to the page by the first process is redirected to the new page. Subsequent to the page fault, access to the page by the second process is also redirected to the new page.Type: ApplicationFiled: July 10, 2013Publication date: November 7, 2013Inventors: Jeffrey T. Layton, Neil R.T. Horman, Eric L. Paris, Josef M. Bacik
-
Patent number: 8549609Abstract: A host rule mapping module in a firewall server may receive an update notification from a name server. The update notification may indicate a change to an address associated with a host name of a host machine. In response to receiving the update notification, the host rule mapping module may request a record corresponding to the host name identified in the update notification. The host rule mapping module may receive a contents of the record in response to the request from the name server, and update a firewall rule corresponding to the address identified in the update notification to include the contents of the record.Type: GrantFiled: May 31, 2011Date of Patent: October 1, 2013Assignee: Red Hat, Inc.Inventors: Neil R. T. Horman, Eric L. Paris
-
Patent number: 8490207Abstract: A method and system for sending data in a file system that uses cryptographic signatures to protect data integrity. A computer system calculates a signature based on the content of a page of a memory. The memory is shared by processes that run on the computer system. The computer system write-protects the page while the page is used for calculation of the signature. When a first process attempts to modify the page, a page fault is triggered. In response to the page fault, the content of the page in memory is copied to a new page in the memory. The new page is accessible by the processes. Access to the page by the first process is redirected to the new page. Subsequent to the page fault, access to the page by the second process is also redirected to the new page.Type: GrantFiled: May 31, 2011Date of Patent: July 16, 2013Assignee: Red Hat, Inc.Inventors: Jeffrey T. Layton, Neil R. T. Horman, Eric L. Paris, Josef M. Bacik
-
Publication number: 20130110968Abstract: A computing device identifies a data packet received at a computing device. The computing device allocates memory having a fixed size to store the network data packet. A latency reducer identifies a free space in the memory allocation, the free space comprising a difference between the fixed size of the memory allocation and a size of the network data packet. The latency reducer creates a socket buffer list for the network data packet in the free space, the socket buffer list comprising a plurality of entries to serve as socket queue objects for a plurality of applications.Type: ApplicationFiled: November 2, 2011Publication date: May 2, 2013Inventors: Neil R.T. Horman, Eric L. Paris, Jeffrey T. Layton
-
Publication number: 20130054857Abstract: A computing device receives a first data packet at a network interface card. The network interface card asserts a hard interrupt request on a first processing device based on a interrupt affinity value. A latency reduction module consults a data structure to identify a second processing device and schedules a soft interrupt request for the first data packet on the second processing device. The latency reduction module determines if an affinity threshold is met, and if the affinity threshold is met, updates the interrupt affinity value to reflect the second processing device.Type: ApplicationFiled: August 25, 2011Publication date: February 28, 2013Inventors: Neil R.T Horman, Eric L. Paris, Jeffrey T. Layton
-
Publication number: 20120311336Abstract: A method and system for sending data in a file system that uses cryptographic signatures to protect data integrity. A computer system calculates a signature based on the content of a page of a memory. The memory is shared by processes that run on the computer system. The computer system write-protects the page while the page is used for calculation of the signature. When a first process attempts to modify the page, a page fault is triggered. In response to the page fault, the content of the page in memory is copied to a new page in the memory. The new page is accessible by the processes. Access to the page by the first process is redirected to the new page. Subsequent to the page fault, access to the page by the second process is also redirected to the new page.Type: ApplicationFiled: May 31, 2011Publication date: December 6, 2012Inventors: Jeffrey T. Layton, Neil R.T. Horman, Eric L. Paris, Josef M. Bacik
-
Publication number: 20120311693Abstract: A host rule mapping module in a firewall server may receive an update notification from a name server. The update notification may indicate a change to an address associated with a host name of a host machine. In response to receiving the update notification, the host rule mapping module may request a record corresponding to the host name identified in the update notification. The host rule mapping module may receive a contents of the record in response to the request from the name server, and update a firewall rule corresponding to the address identified in the update notification to include the contents of the record.Type: ApplicationFiled: May 31, 2011Publication date: December 6, 2012Inventors: Neil R. T. Horman, Eric L. Paris
-
Publication number: 20120151206Abstract: A request is received from a client for accessing a resource provided in a network, the request including credential data representing system integrity of at least one component running on the client. In response to the request, one or more credential identifiers identifying the credential data is transmitted to a management server that provisioned the client. Credential reference data is received from the management server based on the one or more credential identifiers. The client is authenticated based on a comparison of the credential data received from the client and credential reference data received from the management server.Type: ApplicationFiled: December 9, 2010Publication date: June 14, 2012Applicant: RED HAT, INC.Inventors: Eric L. Paris, Neil R. T. Horman
-
Publication number: 20120131380Abstract: A computing system stores actual memory usage data in a user memory space. The actual memory usage data represents memory usage of a plurality of device drivers that are loaded by a first kernel. The computing system generates an estimate of memory space to be reserved for a second kernel based on the actual memory usage data for the plurality of device drivers that are loaded by the first kernel and reserves memory space for the second kernel using the estimate.Type: ApplicationFiled: November 24, 2010Publication date: May 24, 2012Inventors: Neil R.T. Horman, Vivek Goyal