scispace - formally typeset
Search or ask a question
Author

James P. Schneider

Bio: James P. Schneider is an academic researcher from Red Hat. The author has contributed to research in topics: Message authentication code & Shamir's Secret Sharing. The author has an hindex of 24, co-authored 187 publications receiving 2148 citations.

Papers published on a yearly basis

Papers
More filters
Patent
James P. Schneider1
31 Aug 2007
TL;DR: In this article, a method and apparatus for upgrading a network appliance is presented, which includes determining that an upgrade of the network appliance needed using versioning information of the appliance and upgrade versioning, and determining, based on upgrade criteria, whether the appliance should be upgraded using a full install image.
Abstract: A method and apparatus for upgrading a network appliance. In one embodiment, the method includes determining that an upgrade of the network appliance is needed using versioning information of the network appliance and upgrade versioning information, and determining, based on upgrade criteria, whether the network appliance should be upgraded using a full install image. If the network appliance should be upgraded using the full install image, the full install image is downloaded to the network appliance.

159 citations

Patent
James P. Schneider1
30 Nov 2009
TL;DR: In this article, a hashed value is computed from an encrypted password value and a displayed code value from a hardware token at a client, based on a username, a context identifier, and a password.
Abstract: A hashed value is computed from an encrypted password value and a displayed code value from a hardware token at a client. The encrypted password value is based on a username, a context identifier, and a password. The client provides the username and the hashed value to a server. The encrypted password value associated with the username is retrieved at the server. An expected hashed value is computed at the server. The client is validated based on a comparison of the hashed value and the expected hashed value.

90 citations

Patent
James P. Schneider1
28 Feb 2008
TL;DR: In this paper, a nonlinear substitution is performed on at least a portion of the data, wherein the substitution is achieved by multiplying the portion of data by one of the sub-keys over a finite field of even characteristic, modulo a fixed primitive polynomial.
Abstract: An input block of data and a key that includes multiple sub-keys are received by a block cipher. A nonlinear substitution is performed on at least a portion of the data, wherein the nonlinear substitution is achieved by multiplying the portion of the data by one of the sub-keys over a finite field of even characteristic, modulo a fixed primitive polynomial. An output block of ciphertext is then generated.

69 citations

Patent
James P. Schneider1
29 Aug 2008
TL;DR: In this article, the authors propose a method and apparatus for an system and process for sharing a secret over an unsecured channel in conjunction with an authentication system, where a client computes a message authentication code based on a hashed password value and a first random string received from the server.
Abstract: A method and apparatus for an system and process for sharing a secret over an unsecured channel in conjunction with an authentication system. A client computes a message authentication code based on a hashed password value and a first random string received from the server. The client sends a response to the server that includes authentication data including a second random string. Both the client and server concatenate the first random string, second random string and username. Theses values are processed to generate as a shared master secret to further generate shared secrets or keys to establish a secured communication channel between the client and server. The secured communication can be based on stateless messaging where the decryption key associated with the message is identified by the message authentication code, which is placed within the message.

57 citations

Patent
James P. Schneider1
27 Feb 2009
TL;DR: In this article, a subset of an application programming interface (API) is exposed to the virtual machine enabling the process to interface with the operating system kernel via the subset of the API.
Abstract: A system and method for isolating processes executing within a computing device. A process is loaded into a virtual machine operating under the control of a hypervisor communicatively interfaced with an operating system kernel. A subset of an application programming interface (API) is exposed to the virtual machine enabling the process to interface with the operating system kernel via the subset of the API. The process is then executed in the virtual machine.

56 citations


Cited by
More filters
Patent
14 Jun 2016
TL;DR: Newness and distinctiveness is claimed in the features of ornamentation as shown inside the broken line circle in the accompanying representation as discussed by the authors, which is the basis for the representation presented in this paper.
Abstract: Newness and distinctiveness is claimed in the features of ornamentation as shown inside the broken line circle in the accompanying representation.

1,500 citations

Patent
10 May 2012
TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

680 citations

Patent
16 Oct 2015
TL;DR: In this paper, the authors describe a system that receives, by a feed point of a dielectric antenna, electromagnetic waves from a core coupled to the feed point without an electrical return path, and radiates a wireless signal responsive to the electromagnetic waves being received at the aperture.
Abstract: Aspects of the subject disclosure may include, for example, receiving, by a feed point of a dielectric antenna, electromagnetic waves from a dielectric core coupled to the feed point without an electrical return path, where at least a portion of the dielectric antenna comprises a conductive surface, directing, by the feed point, the electromagnetic waves to a proximal portion of the dielectric antenna, and radiating, via an aperture of the dielectric antenna, a wireless signal responsive to the electromagnetic waves being received at the aperture. Other embodiments are disclosed.

330 citations

Patent
17 May 2016
TL;DR: In this paper, a distributed antenna and backhaul system provide network connectivity for a small cell deployment using high-bandwidth, millimeter-wave communications and existing power line infrastructure, rather than building new structures, and installing additional fiber and cable.
Abstract: A distributed antenna and backhaul system provide network connectivity for a small cell deployment. Rather than building new structures, and installing additional fiber and cable, embodiments described herein disclose using high-bandwidth, millimeter-wave communications and existing power line infrastructure. Above ground backhaul connections via power lines and line-of-sight millimeter-wave band signals as well as underground backhaul connections via buried electrical conduits can provide connectivity to the distributed base stations. An overhead millimeter-wave system can also be used to provide backhaul connectivity. Modules can be placed onto existing infrastructure, such as streetlights and utility poles, and the modules can contain base stations and antennas to transmit the millimeter-waves to and from other modules.

298 citations

Patent
07 Jun 2016
TL;DR: In this article, a distributed antenna system is provided that frequency shifts the output of one or more microcells to a 60 GHz or higher frequency range for transmission to a set of distributed antennas.
Abstract: A distributed antenna system is provided that frequency shifts the output of one or more microcells to a 60 GHz or higher frequency range for transmission to a set of distributed antennas. The cellular band outputs of these microcell base station devices are used to modulate a 60 GHz (or higher) carrier wave, yielding a group of subcarriers on the 60 GHz carrier wave. This group will then be transmitted in the air via analog microwave RF unit, after which it can be repeated or radiated to the surrounding area. The repeaters amplify the signal and resend it on the air again toward the next repeater. In places where a microcell is required, the 60 GHz signal is shifted in frequency back to its original frequency (e.g., the 1.9 GHz cellular band) and radiated locally to nearby mobile devices.

296 citations