Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch
  

Red Hat Inc patents

Recent patent applications related to Red Hat Inc. Red Hat Inc is listed as an Agent/Assignee. Note: Red Hat Inc may have other listings under different names/spellings. We're not affiliated with Red Hat Inc, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "R" | Red Hat Inc-related inventors




Date Red Hat Inc patents (updated weekly) - BOOKMARK this page
10/19/17 new patent  Reducing memory inconsistencies between synchronized computing devices
10/19/17 new patent  Logical address space for storage resource pools
10/19/17 new patent  Matching resources associated with a virtual machine to offered resources
10/12/17Distributed remote execution
10/12/17Using a shared data store for peer discovery
10/05/17Providing an instruction notification for navigation
10/05/17Migrating lock data within a distributed file system
09/28/17Migration of network entities to a cloud infrastructure
09/21/17System, debugging of reactive applications
09/21/17Distributed deduplication using locality sensitive hashing
09/21/17Methods and using credentials to access computing resources
09/21/17Managed ldap entries
09/14/17Configuration of an application in a computing platform
09/14/17Correcting a volume chain after a volume creation failure is detected
09/07/17Obtaining application performance data for different performance events via a unified channel
09/07/17Method and system for dynamically updating data fields of buffers
08/31/17Quality of service in a distributed system
08/31/17Determining status of a host operation without accessing the host in a shared storage environment
08/31/17Adding or removing a storage provider in a unified storage manager
08/31/17Add-on image for a platform-as-a-service system
08/31/17Maintaining build secrets in a build container
08/31/17Hot deployment in a distributed cluster system
08/31/17Customizable virtual machine retirement in a management platform
08/31/17Systems and methods for configuration knowledge search
08/31/17Extending user interface of a web console
08/31/17Correlation-based monitoring and events for a unified storage manager
08/31/17Native snapshots in distributed file sytems
08/31/17Automated test planning using test case relevancy
08/31/17Cache block apparatus and methods
08/31/17File system quota versioning
08/31/17Detecting stale storage layouts without using client locks
08/31/17Granular data self-healing
08/31/17Snapshot management in distributed file systems
08/31/17Removable data volume management
08/31/17Granular entry self-healing
08/31/17Container clustering in a container-based architecture
08/31/17Accessing file systems in a virtual environment
08/31/17Securing delegated remote management with digital signature
08/31/17Efficient certificate revocation list processing
08/31/17Packet tunneling in a wireless network
08/31/17Managing computing infrastructure events having different event notification formats
08/31/17Centralized configuration data in a distributed file system
08/31/17Customizable event processing for third party infrastructure events
08/31/17Skeletal refresh for management platforms
08/31/17Granular permission assignment
08/31/17Network traffic capture analysis
08/31/17Routing traffic between networks governed by different versions of the internet protocol
08/31/17Access guards for multi-tenant logging
08/31/17Secure performance monitoring of remote application servers
08/31/17Syslog advertisements
08/24/17Size adjustable volumes for containers
08/24/17Batched commit in distributed transactions
08/24/17Failure recovery in shared storage operations
08/24/17Fault tolerant listener registration in the presence of node crashes in a data grid
08/24/17Multiple encryption keys for a virtual machine
08/17/17Automatically scaling up physical resources in a computing infrastructure
08/17/17Disassembly and reassembly of a tar archive
08/17/17Replication of data in a distributed file system using an arbiter
08/17/17Overlay-based file tagging using virtual file systems
08/17/17Thread coordination in a rule engine using a state machine
08/10/17Provisioning a device with multiple bit-size versions of a software component
08/10/17Hash-based mount point lookup in virtual file systems
08/10/17Deduplicated file system
08/10/17In-memory journaling
08/10/17Certificate based expiration of file system objects
Patent Packs
08/10/17Evaluating resource performance from misaligned cloud data
08/10/17Cloud-based service resource provisioning based on network characteristics
08/03/17Cache system with multiple cache unit states
08/03/17Multi-tenant enterprise application management
08/03/17Shared resource management
07/27/17Shared memory communication in software defined networking
07/27/17Chaining network functions to build complex datapaths
07/27/17Symmetric encryption key generation/distribution
07/27/17Secret store for oauth offline tokens
07/13/17System and using persistent memory to accelerate write performance
07/13/17Pre-registering memory regions for remote direct memory access in a distributed file system
07/13/17Exposing pre-registered memory regions for remote direct memory access in a distributed file system
07/13/17Building a hybrid reactive rule engine for relational and graph reasoning
07/06/17Setup of management system in a virtualization system
06/29/17Allocating storage in a distributed storage system
Patent Packs
06/22/17Enforcing consistency of file to storage node mapping
06/15/17Data integrity checking in a distributed filesystem using object versioning
06/15/17Timestamp alignment across a plurality of computing devices
06/08/17Secure remote kernel module signing
06/01/17Distributed transactions on mobile devices via a messaging service provided by a mobile network operator
05/25/17Active representation of a composite application
05/25/17Source to image transformation pipeline for a platform-as-a-service system
05/25/17Pci slot hot-addition deferral for multi-function devices
05/25/17Allocating file system metadata to storage nodes of distributed file system
05/25/17Maintaining secure clustered software with a container-based architecture
05/25/17Network bound decryption with offline encryption
05/25/17Providing link aggregation and high availability through network virtualization layer
05/25/17Cross-domain single login
05/18/17Recreating a computing environment using tags and snapshots
05/18/17Virtual machine malware scanning
05/18/17Filesystem i/o scheduler
05/11/17Enabling single sign-on authentication for accessing protected network services
05/11/17Selection of a mesh access point in a wireless mesh network
05/04/17Service implementation based debugger for service oriented architecture projects
05/04/17System, debugging of reactive applications
05/04/17Enabling resource access for secure application containers
04/27/17Systems and methods for set membership matching
04/27/17Multithreaded memory manager to de-allocate memory objects using private freelists
04/27/17Restricting access by services deployed on an application server
04/20/17Scheduling multi-phase computing jobs
04/13/17Deduplicated file system
04/13/17Monitoring cloud computing environments
04/06/17Quality of service tagging for computing jobs
04/06/17Custom object paths for object storage management
03/30/17Distributed system test automation framework
Social Network Patent Pack
03/30/17Debugger write interceptor
03/30/17Scsi command jammer
03/16/17Identifying application usage roles for devices provided to virtual machines
03/16/17Providing centralized message notification
03/16/17System and flexible holding storage during messaging
03/09/17Updating software utilizing domain name system (dns)
03/09/17Multi-factor simple password exponential key exchange (speke) authentication
03/02/17Pluggable knowledge types in a rule engine
03/02/17Determining state of virtual router instance
02/16/17Isolating network resources in a virtualized environment
Patent Packs
02/16/17Mobile device camera display projection
02/09/17Asymmetric distributed cache with data chains
02/09/17Non-repudiation of broadcast messaging
02/09/17Unified system for authentication and authorization
01/26/17Configuration of a computer system for real-time response from a virtual machine
01/12/17Creating a digital certificate for a service using a local certificate authority
01/05/17Hybrid security batch processing in a cloud environment
01/05/17Data reduction in a system
12/01/16Dynamic thread pool management
12/01/16Management of contextual information for data
12/01/16Provisioning cloud resources
11/24/16User interface state saving and restoration
11/17/16Universal database driver
11/17/16Mechanisms for reproducing storage system metadata inconsistencies in a test environment
11/03/16Distributed resource contention detection and handling
10/27/16Kerberos preauthentication with j-pake
10/13/16Detecting events in cloud computing environments and performing actions upon occurrence of the events
09/29/16Non-intrusive storage of garbage collector-specific management data
09/29/16Dynamic data partitioning extension
09/29/16Mobile device user authentication for accessing protected network resources
09/22/16Container and image scanning for a platform-as-a-service system
09/22/16Generating application build options in cloud computing environment
09/15/16Managing storage block of a data volume
09/08/16Password authentication
09/08/16Determining consistencies in staged replication data for data migration in cloud based networks
09/08/16Cloud provider selection
09/01/16Data communication in a distributed data grid
09/01/16Visual representation of network-discovered components
09/01/16Peer to peer volume extension in a shared storage environment
09/01/16Optimized extended context management for virtual machines
Patent Packs
09/01/16Dirty page tracking of guest-uncached memory
09/01/16Management of inter-dependent configurations of virtual machines in a cloud
09/01/16Finding objects in a key-based data structure by their approximate location
09/01/16Incorporating external data into a database schema
09/01/16Database query processing
09/01/16System and distributed revision control
09/01/16Database query optimization
09/01/16Grid topology change in a distributed data grid when iterating on the contents of the data grid
09/01/16Data hub architecture to provide actionable data from remote sensor feeds
09/01/16System and data synchronization using revision control
09/01/16Storing entries as ordered linked lists
09/01/16Employing dependency graph in software build projects
09/01/16Non-repudiable atomic commit
09/01/16Host network analyzer
09/01/16Resource-centric authorization schemes
08/25/16Duplicating a task sequence from a graphical user interface interaction for a development application in view of trace data
08/25/16Contract based builder
08/25/16Generic semantic configuration service
08/25/16Applying configuration alignment in build projects
08/25/16Detecting an interrupted operation associated with a virtual machine
Social Network Patent Pack
08/25/16Status indicator for a merge operation associated with a virtual machine
08/25/16Service implementation based debugger for service oriented architecture projects
08/25/16Using script description to encode conditional statements
08/25/16Source code unit testing using an indexing tool
08/25/16Adaptive optimization of second level cache
08/25/16Creating federated data source connectors
08/25/16Container host discovery
08/18/16Copy-offload on a device stack
08/18/16Generating command line interface using application programming interface specification
08/18/16System and entity generation
08/18/16Object creation based on copying objects corresponding to similar entities
08/18/16Integration of intentional noise into a communication channel to simulate activity
08/18/16Workflow-based push notifications
08/11/16Dynamic asynchronous communication management
08/11/16Complex event processing using pseudo-clock
08/11/16Peer to peer volume merge and delete in a shared storage environment
08/11/16Maintaining relative references when unlinking volumes from a volume chain
08/11/16Idempotent mode of executing commands triggered by complex event processing
08/11/16Transaction log for audit purposes
08/11/16Data virtualization for workflows
Social Network Patent Pack
08/11/16Key establishment and management protocol optimizations in view of channel reliability
08/04/16Multiple recipient message encryption
08/04/16Obtaining incremental updates from a database using a partial query
08/04/16Secure shell (ssh) proxy for a platform-as-a-service system
07/28/16Source to image framework for a platform-as-a-service system
07/28/16Automated container migration in a platform-as-a-service system
07/28/16Pro-active self-healing in a distributed file system
07/28/16Simulated control of a third-party database
07/28/16Operating system consistency and malware protection
07/28/16Security policy management
07/28/16Cache data validation
07/21/16Determining task scores reflective of memory access statistics in numa systems
07/21/16Reconfiguring virtual machines
07/21/16Distributed transaction with dynamic form
07/21/16Distributed transaction with dynamic form
07/21/16Using a pkcs module for opening multiple databases
07/14/16Resource closing
07/14/16Commit-one-phase distributed transactions with multiple starting participants
07/14/16System and inspection of system state during testing
07/14/16Media compression in a digital device
07/14/16Query union and split
07/07/16Using domain name system security extensions in a mixed-mode environment
06/30/16Providing random data to a guest operating system
06/23/16Building file system images using cached logical volume snapshots
06/23/16Automatic switch to debugging mode
06/16/16Providing an instruction notification for navigation
06/16/16Time related points of interest for navigation system
06/16/16Tagging non-upstream source code
06/16/16Searching data based on entities related to the data
06/16/16Creating a digital certificate for a service using a local certificate authority having temporary signing authority
Social Network Patent Pack
06/09/16Time based touch screen input recognition
06/09/16Creation of a binding based on a description associated with a server
05/26/16Caching policies for solid state disks
05/26/16Source code management for a multi-tenant platform-as-a-service (paas) system
05/26/16Metadata-based class loading using a content repository
05/26/16Hot-swapping storage pool backend functional modules
05/26/16Modification of context saving functions
05/26/16Wake-up ordering of processing streams using sequential identifiers
05/26/16Multisource semantic partitioning
05/26/16Federation optimization using ordered queues
05/26/16Subscriber identity module (sim) selection in multi-sim communication devices
05/26/16Utilizing access control data structures for sharing computing resources
05/26/16Downloadable cartridges for a multi-tenant platform-as-a-service (paas) system
05/19/16File classification in a distributed file system
05/19/16File lookup in a distributed file system
05/19/16Replication with adustable consistency levels
05/19/16Pattern-based object serving
05/12/16Method and system for updating firmware
05/12/16Viewable suggestions for federation engine
05/12/16Native federation view suggestion
05/05/16Fault tolerant listener registration in the presence of node crashes in a data grid
05/05/16Dual overlay query processing
05/05/16Registering data modification listener in a data-grid
05/05/16Proactive query migration to prevent failures
05/05/16Non-blocking listener registration in the presence of data grid nodes joining the cluster
04/21/16Application migration in a process virtual machine environment
04/14/16Transaction compensation for single phase resources
04/07/16Activity management tool
04/07/16Execution of a method at a cluster of nodes







ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Red Hat Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Red Hat Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###




';