loadpatents
Patent applications and USPTO patent grants for Schneider; James P..The latest application filed is for "string hashing using a random number generator".
Patent | Date |
---|---|
Image install of a network appliance Grant 11,113,045 - Schneider September 7, 2 | 2021-09-07 |
String hashing using a random number generator Grant 10,068,005 - Schneider September 4, 2 | 2018-09-04 |
Implementing aspects with callbacks in virtual machines Grant 9,910,688 - Schneider March 6, 2 | 2018-03-06 |
Sharing a secret via linear interpolation Grant 9,515,828 - Schneider December 6, 2 | 2016-12-06 |
Thwarting keyloggers using proxies Grant 9,270,644 - Schneider February 23, 2 | 2016-02-23 |
Provisioning network resources based on environment Grant 9,244,882 - Schneider January 26, 2 | 2016-01-26 |
Facilitating profiling of applications for efficient loading Grant 9,201,793 - Schneider December 1, 2 | 2015-12-01 |
Callbacks in virtual machines Grant 9,152,442 - Schneider October 6, 2 | 2015-10-06 |
Dynamic compiling and loading at runtime Grant 9,134,973 - Schneider September 15, 2 | 2015-09-15 |
Provisioning network resources by environment and network address Grant 9,094,301 - Schneider July 28, 2 | 2015-07-28 |
Proxy authentication Grant 8,966,594 - Schneider February 24, 2 | 2015-02-24 |
Managing password expiry Grant 8,959,618 - Schneider February 17, 2 | 2015-02-17 |
Automation of application deployment Grant 8,943,493 - Schneider January 27, 2 | 2015-01-27 |
String Hashing Using a Random Number Generator App 20140344285 - Schneider; James P. | 2014-11-20 |
Configuration interface manager Grant 8,881,172 - Schneider November 4, 2 | 2014-11-04 |
Securing inter-process communication Grant 8,863,151 - Schneider October 14, 2 | 2014-10-14 |
String hashing using a number generator Grant 8,812,570 - Schneider August 19, 2 | 2014-08-19 |
Migration of functionalities across systems Grant 8,813,069 - Schneider August 19, 2 | 2014-08-19 |
Thwarting Keyloggers Using Proxies App 20140230043 - Schneider; James P. | 2014-08-14 |
Extensive ciphertext feedback Grant 8,804,953 - Schneider August 12, 2 | 2014-08-12 |
Sharing A Secret Via Linear Interpolation App 20140198911 - Schneider; James P. | 2014-07-17 |
Generating pseudo random bits from polynomials Grant 8,781,117 - Schneider July 15, 2 | 2014-07-15 |
Certificate generation for a network appliance Grant 8,769,291 - Schneider , et al. July 1, 2 | 2014-07-01 |
Separating content from noisy context in template-based documents for search indexing Grant 8,732,137 - Schneider May 20, 2 | 2014-05-20 |
Thwarting keyloggers using proxies Grant 8,713,129 - Schneider April 29, 2 | 2014-04-29 |
Authenticated secret sharing Grant 8,713,329 - Schneider April 29, 2 | 2014-04-29 |
Automatic object instantiation Grant 8,707,257 - Schneider April 22, 2 | 2014-04-22 |
Automatic full install upgrade of a network appliance Grant 8,683,458 - Schneider March 25, 2 | 2014-03-25 |
Reverse network authentication for nonstandard threat profiles Grant 8,676,998 - Schneider March 18, 2 | 2014-03-18 |
Sharing a secret via linear interpolation Grant 8,675,877 - Schneider March 18, 2 | 2014-03-18 |
Sharing a secret with modular inverses Grant 8,638,926 - Schneider January 28, 2 | 2014-01-28 |
Automatically providing identity information for a network appliance Grant 8,621,027 - Schneider December 31, 2 | 2013-12-31 |
Extending a secret bit string to safeguard the secret Grant 8,615,084 - Schneider December 24, 2 | 2013-12-24 |
Distributed hosting of web application styles Grant 8,595,634 - Schneider , et al. November 26, 2 | 2013-11-26 |
Efficient object distribution Grant 8,589,592 - Schneider November 19, 2 | 2013-11-19 |
Mechanism for generating pseudorandom number sequences Grant 8,588,412 - Schneider November 19, 2 | 2013-11-19 |
Security implementation within a browser Grant 8,589,671 - Schneider November 19, 2 | 2013-11-19 |
Peer-to-peer object distribution Grant 8,560,732 - Schneider October 15, 2 | 2013-10-15 |
Method and an apparatus to implement secure system call wrappers Grant 8,561,090 - Schneider October 15, 2 | 2013-10-15 |
Reverse VPN over SSH Grant 8,549,613 - Schneider October 1, 2 | 2013-10-01 |
Overriding images in user interfaces Grant 8,533,588 - Schneider , et al. September 10, 2 | 2013-09-10 |
Managing website blacklists Grant 8,533,227 - Schneider September 10, 2 | 2013-09-10 |
Sharing a secret using polynomials over polynomials Grant 8,520,854 - Schneider August 27, 2 | 2013-08-27 |
Calling functions as methods Grant 8,504,986 - Schneider August 6, 2 | 2013-08-06 |
Discontiguous object addressing Grant 8,489,840 - Schneider July 16, 2 | 2013-07-16 |
Per process virtual machines Grant 8,464,252 - Schneider June 11, 2 | 2013-06-11 |
Strengthened key schedule for arcfour Grant 8,437,472 - Schneider May 7, 2 | 2013-05-07 |
Image install of a network appliance Grant 8,418,164 - Schneider April 9, 2 | 2013-04-09 |
Block cipher using multiplication over a finite field of even characteristic Grant 8,416,947 - Schneider April 9, 2 | 2013-04-09 |
Setting a preliminary time on a network appliance using a message received from a server Grant 8,412,806 - Schneider April 2, 2 | 2013-04-02 |
Collecting account access statistics from information provided by presence of client certificates Grant 8,412,932 - Schneider April 2, 2 | 2013-04-02 |
Mechanism for chained output feedback encryption Grant 8,396,209 - Schneider March 12, 2 | 2013-03-12 |
Tunneling SSL over SSH Grant 8,380,873 - Schneider February 19, 2 | 2013-02-19 |
Sharing a secret via linear interpolation Grant 8,364,958 - Schneider January 29, 2 | 2013-01-29 |
Nonlinear feedback mode for block ciphers Grant 8,358,781 - Schneider January 22, 2 | 2013-01-22 |
Image Install Of A Network Appliance App 20130014098 - Schneider; James P. | 2013-01-10 |
Sharing a secret using polynomial division over GF(Q) Grant 8,345,861 - Schneider January 1, 2 | 2013-01-01 |
Adding client authentication to networked communications Grant 8,347,374 - Schneider January 1, 2 | 2013-01-01 |
Transparent configuration of a network appliance Grant 8,276,136 - Schneider September 25, 2 | 2012-09-25 |
Method for sharing secret information among cooperating parties Grant 8,243,933 - Schneider August 14, 2 | 2012-08-14 |
Verification of loadable objects Grant 8,239,878 - Schneider August 7, 2 | 2012-08-07 |
Memory management for prediction by partial matching context models Grant 8,217,810 - Schneider July 10, 2 | 2012-07-10 |
Tunneling Ssl Over Ssh App 20120158963 - Schneider; James P. | 2012-06-21 |
Setting a preliminary time on a network appliance using a digital certificate Grant 8,196,192 - Schneider June 5, 2 | 2012-06-05 |
Tunneling SSL over SSH Grant 8,190,771 - Schneider May 29, 2 | 2012-05-29 |
Provisioning a network appliance Grant 8,191,123 - Schneider , et al. May 29, 2 | 2012-05-29 |
Provisioning a network appliance Grant 8,191,122 - Schneider , et al. May 29, 2 | 2012-05-29 |
Aspect services Grant 8,180,854 - Schneider May 15, 2 | 2012-05-15 |
Methods for improving file system performance Grant 8,180,736 - Schneider May 15, 2 | 2012-05-15 |
Validating service components through data mining Grant 8,166,158 - Schneider , et al. April 24, 2 | 2012-04-24 |
Reducing memory required for prediction by partial matching models Grant 8,140,488 - Schneider March 20, 2 | 2012-03-20 |
Sorting cache objects based on access counters reset upon garbage collection Grant 8,112,588 - Schneider February 7, 2 | 2012-02-07 |
Stateless challenge-response protocol Grant 8,112,629 - Schneider February 7, 2 | 2012-02-07 |
System comprising a proxy server including a rules engine, a remote application server, and an aspect server for executing aspect services remotely Grant 8,103,607 - Schneider January 24, 2 | 2012-01-24 |
Data compression using an arbitrary-sized dictionary Grant 8,090,027 - Schneider January 3, 2 | 2012-01-03 |
Sharing a secret using polynomials Grant 8,077,862 - Schneider December 13, 2 | 2011-12-13 |
Mechanism for transport-safe codings for cryptographic use Grant 8,077,868 - Schneider December 13, 2 | 2011-12-13 |
Embedding a secret in a bit string for safeguarding the secret Grant 8,068,606 - Schneider November 29, 2 | 2011-11-29 |
Federated indexing from hashed primary key slices Grant 8,037,076 - Schneider October 11, 2 | 2011-10-11 |
Federated document search by keywords Grant 8,032,550 - Schneider October 4, 2 | 2011-10-04 |
Searching documents for successive hashed keywords Grant 8,032,551 - Schneider October 4, 2 | 2011-10-04 |
Sharing a secret using hyperplanes over GF(2.sup.m) Grant 7,995,764 - Schneider August 9, 2 | 2011-08-09 |
Sharing a secret using hyperplanes over GF(q) Grant 7,995,765 - Schneider August 9, 2 | 2011-08-09 |
Disabling remote logins without passwords Grant 7,987,357 - Schneider July 26, 2 | 2011-07-26 |
Stream cipher using multiplication over a finite field of even characteristic Grant 7,945,049 - Schneider May 17, 2 | 2011-05-17 |
Unattended upgrade for a network appliance Grant 7,937,699 - Schneider May 3, 2 | 2011-05-03 |
Tunneling Ssl Over Ssh App 20110087801 - Schneider; James P. | 2011-04-14 |
Hybrid data encryption Grant 7,925,009 - Schneider April 12, 2 | 2011-04-12 |
Compact encoding of arbitrary length binary objects Grant 7,895,347 - Schneider February 22, 2 | 2011-02-22 |
Management of large dynamic tables Grant 7,885,967 - Schneider February 8, 2 | 2011-02-08 |
Using distributed aspects to reorder online application workflows Grant 7,881,304 - Schneider February 1, 2 | 2011-02-01 |
Consolidation of matching memory pages Grant 7,877,570 - Schneider January 25, 2 | 2011-01-25 |
Tunneling SSL over SSH Grant 7,877,507 - Schneider January 25, 2 | 2011-01-25 |
Data management interface with configurable plugins that determines whether to monitor for configuration data Grant 7,856,517 - Schneider , et al. December 21, 2 | 2010-12-21 |
Mechanism for String Hashing Using a Random Number Generator App 20100306294 - Schneider; James P. | 2010-12-02 |
Method And An Apparatus To Migrate Functionalities Across Systems App 20100306769 - Schneider; James P. | 2010-12-02 |
Mechanism for Separating Content from Noisy Context in Template-Based Documents for Search Indexing App 20100306217 - Schneider; James P. | 2010-12-02 |
Federated Indexing from Hashed Primary Key Slices App 20100287171 - Schneider; James P. | 2010-11-11 |
Federated Document Search by Keywords App 20100287172 - Schneider; James P. | 2010-11-11 |
Searching Documents for Successive Hashed Keywords App 20100287173 - Schneider; James P. | 2010-11-11 |
Adaptive entropy coding compression output formats Grant 7,821,426 - Schneider October 26, 2 | 2010-10-26 |
Alternative encoding for LZSS output Grant 7,817,069 - Schneider October 19, 2 | 2010-10-19 |
Reducing Memory Required For Prediction By Partial Matching Models App 20100228703 - Schneider; James P. | 2010-09-09 |
Efficient Coding Of Integers In Non-power-of-two Ranges App 20100219993 - Schneider; James P. | 2010-09-02 |
Security Implementation Within A Browser App 20100223456 - Schneider; James P. | 2010-09-02 |
Per Process Virtual Machines App 20100223613 - Schneider; James P. | 2010-09-02 |
Strengthened Key Schedule For Arcfour App 20100220855 - Schneider; James P. | 2010-09-02 |
Method And Apparatus For Thwarting Keyloggers Using Proxies App 20100223358 - Schneider; James P. | 2010-09-02 |
Provisioning Network Resources Based On Environment App 20100217841 - Schneider; James P. | 2010-08-26 |
Method And An Apparatus To Implement Secure System Call Wrappers App 20100218201 - Schneider; James P. | 2010-08-26 |
Isolating Processes Using Aspects App 20100218261 - Schneider; James P. | 2010-08-26 |
Discontiguous Object Addressing App 20100217947 - Schneider; James P. | 2010-08-26 |
Authenticated Secret Sharing App 20100217986 - Schneider; James P. | 2010-08-26 |
Method for sharing secret information among cooperating parties App 20100217978 - Schneider; James P. | 2010-08-26 |
Method And An Apparatus To Improve Locality Of References For Objects App 20100217938 - Schneider; James P. | 2010-08-26 |
Dynamic Compiling And Loading At Runtime App 20100218174 - Schneider; James P. | 2010-08-26 |
Sharing A Secret With Modular Inverses App 20100215172 - Schneider; James P. | 2010-08-26 |
Efficient coding of integers in non-power-of-two ranges Grant 7,773,000 - Schneider August 10, 2 | 2010-08-10 |
Table management for LZW with fixed-size tables Grant 7,764,201 - Schneider July 27, 2 | 2010-07-27 |
Lossless data compression with separated index values and literal values in output stream Grant 7,764,202 - Schneider July 27, 2 | 2010-07-27 |
Data structure management for lossless data compression Grant 7,750,826 - Schneider July 6, 2 | 2010-07-06 |
Nonlinear feedback mode for block ciphers App 20100135486 - Schneider; James P. | 2010-06-03 |
Implementing Aspects With Callbacks In Virtual Machines App 20100138815 - Schneider; James P. | 2010-06-03 |
Table Management For Lzw With Fixed-size Tables App 20100127900 - Schneider; James P. | 2010-05-27 |
Data Structure Management For Lossless Data Compression App 20100127901 - Schneider; James P. | 2010-05-27 |
Lossless Data Compression With Separated Index Values And Literal Values In Output Stream App 20100127902 - Schneider; James P. | 2010-05-27 |
Automation Of Application Deployment App 20100125840 - Schneider; James P. | 2010-05-20 |
Extensive Ciphertext Feedback App 20100124328 - Schneider; James P. | 2010-05-20 |
Mechanism for coding a non-increasing sequence of values Grant 7,719,448 - Schneider May 18, 2 | 2010-05-18 |
Method and system for data management interface with intelligent plugins that determine whether to perform the requested data operation received from an application Grant 7,716,399 - Schneider , et al. May 11, 2 | 2010-05-11 |
Page oriented memory management Grant 7,716,448 - Schneider May 11, 2 | 2010-05-11 |
Page oriented memory management Grant 7,711,921 - Schneider May 4, 2 | 2010-05-04 |
Callbacks In Virtual Machines App 20100058338 - Schneider; James P. | 2010-03-04 |
File System With Flexible Inode Structures App 20100057755 - Schneider; James P. | 2010-03-04 |
SHARING A SECRET USING HYPERPLANES OVER GF(2m) App 20100054474 - Schneider; James P. | 2010-03-04 |
SHARING A SECRET USING HYPERPLANES OVER GF(q) App 20100054457 - Schneider; James P. | 2010-03-04 |
Sharing A Secret Via Linear Interpolation App 20100054458 - Schneider; James P. | 2010-03-04 |
Sharing A Secret Using Polynomials Over Polynomials App 20100054480 - Schneider; James P. | 2010-03-04 |
Sharing A Secret Via Linear Interpolation App 20100054470 - Schneider; James P. | 2010-03-04 |
Methods For Improving File System Performance App 20100057791 - Schneider; James P. | 2010-03-04 |
Memory Management For Prediction By Partial Matching Context Models App 20100058348 - Schneider; James P. | 2010-03-04 |
Sharing A Secret Using Polynomial Division Over Gf(q) App 20100046739 - Schneider; James P. | 2010-02-25 |
Embedding A Secret In A Larger Polynomial App 20100046740 - Schneider; James P. | 2010-02-25 |
Mechanism for chained output feedback encryption App 20090323927 - Schneider; James P. | 2009-12-31 |
Adaptive Entropy Coding Compression Output Formats App 20090322570 - Schneider; James P. | 2009-12-31 |
Mechanism for transport-safe codings for cryptographic use App 20090323938 - Schneider; James P. | 2009-12-31 |
Extending A Secret Bit String To Safeguard The Secret App 20090323958 - Schneider; James P. | 2009-12-31 |
Distributing data across different backing data stores Grant 7,631,019 - Schneider , et al. December 8, 2 | 2009-12-08 |
Image install of a network appliance App 20090300603 - Schneider; James P. | 2009-12-03 |
Reverse VPN over SSH App 20090300721 - Schneider; James P. | 2009-12-03 |
Systems and methods for facilitating profiling of applications for efficient loading App 20090300267 - Schneider; James P. | 2009-12-03 |
Aspect Services App 20090300099 - Schneider; James P. | 2009-12-03 |
Using Distributed Aspects to Reorder Online Application Workflows App 20090300138 - Schneider; James P. | 2009-12-03 |
Management Of Large Dynamic Tables App 20090299966 - Schneider; James P. | 2009-12-03 |
Provisioning network resources by environment and network address App 20090300024 - Schneider; James P. | 2009-12-03 |
Rules Engine For Aspect Services App 20090299938 - Schneider; James P. | 2009-12-03 |
Mechanism for coding a non-increasing sequence of values App 20090289820 - Schneider; James P. | 2009-11-26 |
Mechanism for generating pseudorandom number sequences App 20090292752 - Schneider; James P. | 2009-11-26 |
Managing Website Blacklists App 20090287705 - Schneider; James P. | 2009-11-19 |
Difference coding adaptive context model Grant 7,612,693 - Schneider November 3, 2 | 2009-11-03 |
Bidirectional context model for adaptive compression Grant 7,612,692 - Schneider November 3, 2 | 2009-11-03 |
Efficient coding of small integer sets Grant 7,612,694 - Schneider November 3, 2 | 2009-11-03 |
Adaptive entropy coding compression output formats Grant 7,605,721 - Schneider October 20, 2 | 2009-10-20 |
Tunneling SSL over SSH App 20090222578 - Schneider; James P. | 2009-09-03 |
Collecting Account Access Statistics from Information Provided by Presence of Client Certificates App 20090222901 - Schneider; James P. | 2009-09-03 |
Stream cipher using multiplication over a finite field of even characteristic App 20090220083 - Schneider; James P. | 2009-09-03 |
Compact encoding of non-repeating sequences Grant 7,583,208 - Schneider September 1, 2 | 2009-09-01 |
Block cipher using multiplication over a finite field of even characteristic App 20090214024 - Schneider; James P. | 2009-08-27 |
Bidirectional context model for adaptive compression App 20090212981 - Schneider; James P. | 2009-08-27 |
Difference coding adaptive context model App 20090212982 - Schneider; James P. | 2009-08-27 |
Peer-to-peer object distribution App 20090210484 - Schneider; James P. | 2009-08-20 |
Managing Password Expiry App 20090199294 - Schneider; James P. | 2009-08-06 |
Validating service components through data mining App 20090198760 - Schneider; James P. ;   et al. | 2009-08-06 |
Configuration Interface Manager App 20090199212 - Schneider; James P. | 2009-08-06 |
Proxy authentication App 20090199276 - Schneider; James P. | 2009-08-06 |
Calling Functions As Methods App 20090187885 - Schneider; James P. | 2009-07-23 |
Compression ratio of adaptive compression algorithms Grant 7,564,383 - Schneider July 21, 2 | 2009-07-21 |
Transparent configuration of a network appliance App 20090150522 - Schneider; James P. | 2009-06-11 |
Efficient object distribution App 20090150474 - Schneider; James P. | 2009-06-11 |
Overriding images in user interfaces App 20090144613 - Schneider; James P. ;   et al. | 2009-06-04 |
Automatic full install upgrade of a network appliance App 20090144722 - Schneider; James P. | 2009-06-04 |
Setting a preliminary time on a network appliance using a message received from a server App 20090144399 - Schneider; James P. | 2009-06-04 |
Adaptive Entropy Coding Compression Output Formats App 20090140894 - Schneider; James P. | 2009-06-04 |
Compression Ratio Of Adaptive Compression Algorithms App 20090140893 - Schneider; James P. | 2009-06-04 |
Distributed hosting of web application styles App 20090144640 - Schneider; James P. ;   et al. | 2009-06-04 |
Reverse Network Authentication For Nonstandard Threat Profiles App 20090144436 - Schneider; James P. | 2009-06-04 |
Provisioning a network appliance App 20090138946 - Schneider; James P. ;   et al. | 2009-05-28 |
Disabling Remote Logins Without Passwords App 20090138703 - Schneider; James P. | 2009-05-28 |
Provisioning a network appliance App 20090138947 - Schneider; James P. ;   et al. | 2009-05-28 |
Automatic Object Instantiation App 20090138894 - Schneider; James P. | 2009-05-28 |
Sharing a secret using polynomials App 20090136024 - Schneider; James P. | 2009-05-28 |
Heuristic modeling of adaptive compression escape sequence Grant 7,538,697 - Schneider May 26, 2 | 2009-05-26 |
Automatically providing identity information for a network appliance App 20090132681 - Schneider; James P. | 2009-05-21 |
Adding Client Authentication To Networked Communications App 20090133113 - Schneider; James P. | 2009-05-21 |
Alternative Encoding For Lzss Output App 20090121906 - Schneider; James P. | 2009-05-14 |
Stateless challenge-response protocol App 20090113559 - Schneider; James P. | 2009-04-30 |
Setting a preliminary time on a network appliance using a digital certificate App 20090100512 - Schneider; James P. | 2009-04-16 |
Adaptive entropy coding compression with multi-level context escapes Grant 7,518,538 - Schneider April 14, 2 | 2009-04-14 |
Embedding a secret in a bit string for safeguarding the secret App 20090060175 - Schneider; James P. | 2009-03-05 |
Method and an apparatus to generate pseudo random bits from polynomials App 20090060179 - Schneider; James P. | 2009-03-05 |
Unattended upgrade for a network appliance App 20090064127 - Schneider; James P. | 2009-03-05 |
Data compression using an arbitrary-sized dictionary App 20090060047 - Schneider; James P. | 2009-03-05 |
Consolidation of matching memory pages App 20090049271 - Schneider; James P. | 2009-02-19 |
Alternative Encoding For Lzss Output App 20090045991 - Schneider; James P. | 2009-02-19 |
Securing inter-process communication App 20090049454 - Schneider; James P. | 2009-02-19 |
Alternative encoding for LZSS output Grant 7,492,290 - Schneider February 17, 2 | 2009-02-17 |
Certificate generation for a network appliance App 20090031410 - Schneider; James P. ;   et al. | 2009-01-29 |
Compact encoding of arbitrary length binary objects App 20090028266 - Schneider; James P. | 2009-01-29 |
Distributing data across different backing data stores App 20080301123 - Schneider; James P. ;   et al. | 2008-12-04 |
Verification of loadable objects App 20080301712 - Schneider; James P. | 2008-12-04 |
Hybrid data encryption App 20080292096 - Schneider; James P. | 2008-11-27 |
Data management interface with configurable plugins App 20080295074 - Schneider; James P. ;   et al. | 2008-11-27 |
Data management interface with plugins App 20080294854 - Schneider; James P. ;   et al. | 2008-11-27 |
Page oriented memory management App 20080209153 - Schneider; James P. | 2008-08-28 |
Page oriented memory management App 20080209154 - Schneider; James P. | 2008-08-28 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.