Search

Dmitri V Pal

from Chelmsford, MA
Age ~54

Dmitri Pal Phones & Addresses

  • Chelmsford, MA
  • 450 Plum Creek Dr, Wheeling, IL 60090 (847) 215-2088
  • 450 Plum Creek Dr APT 105, Wheeling, IL 60090
  • 45 Pinewood Dr, Framingham, MA 01701 (508) 877-9277
  • 9 Victoria Gdn, Framingham, MA 01701 (508) 877-9277
  • 9A Victoria Gdn, Framingham, MA 01701
  • Waltham, MA

Work

Company: Red hat Aug 2010 Address: Westford MA Position: Sr. engineering manager

Education

Degree: MS School / High School: Московский Государственный Институт Радиотехники, Электроники и Автоматики (Технический Университет) (МИРЭА) 1988 to 1994 Specialities: Applied Mathematics

Skills

Software Development • Cloud Computing • Security • Integration • Linux • System Architecture • Software Engineering • Open Source • Unix • Computer Security • Identity Management • Agile Methodologies • Enterprise Software • Architecture • Product Management • Virtualization • Ldap • Red Hat Linux • Shell Scripting • Distributed Systems • Perl • Scalability • Jboss Application Server • Sql • Redhat • C • Solaris • Pki • Bash • Apache • Scrum • High Availability • Open Source Software • Sdlc • Java Enterprise Edition • Strategic Planning • Cryptography • Tcp/Ip • Architectures • Software Development Life Cycle • Rhel • Requirements Analysis • Ssl • Soa • Cross Functional Team Leadership • Hiring • Process Development • Optimization • Agile

Languages

Russian

Industries

Computer Software

Resumes

Resumes

Dmitri Pal Photo 1

Director Of Software Engineering

View page
Location:
45 Pinewood Dr, Framingham, MA 01701
Industry:
Computer Software
Work:
Red Hat - Westford MA since Aug 2010
Sr. Engineering Manager

SKOP Festivals, INC. - Greater Boston Area Jul 2011 - Aug 2012
Manager (hobby)

Red Hat - Westford MA Mar 2008 - Aug 2010
Project Manager

RSA, The Security Division of EMC. Apr 2006 - Jan 2008
Product Manager

RSA Security Inc. Jun 2004 - Apr 2006
Project Manager
Education:
Московский Государственный Институт Радиотехники, Электроники и Автоматики (Технический Университет) (МИРЭА) 1988 - 1994
MS, Applied Mathematics
Skills:
Software Development
Cloud Computing
Security
Integration
Linux
System Architecture
Software Engineering
Open Source
Unix
Computer Security
Identity Management
Agile Methodologies
Enterprise Software
Architecture
Product Management
Virtualization
Ldap
Red Hat Linux
Shell Scripting
Distributed Systems
Perl
Scalability
Jboss Application Server
Sql
Redhat
C
Solaris
Pki
Bash
Apache
Scrum
High Availability
Open Source Software
Sdlc
Java Enterprise Edition
Strategic Planning
Cryptography
Tcp/Ip
Architectures
Software Development Life Cycle
Rhel
Requirements Analysis
Ssl
Soa
Cross Functional Team Leadership
Hiring
Process Development
Optimization
Agile
Languages:
Russian

Business Records

Name / Title
Company / Classification
Phones & Addresses
Dmitri Pal
President, Principal
SKOP FESTIVALS, INC
Nonclassifiable Establishments
45 Pinewood Dr, Framingham, MA 01701

Publications

Us Patents

Providing A Trusted Environment For Provisioning A Virtual Machine

View page
US Patent:
20100242038, Sep 23, 2010
Filed:
Mar 19, 2009
Appl. No.:
12/407211
Inventors:
Daniel P. Berrange - Wimbledon, GB
Dmitri Pal - Framingham MA, US
Simo S. Sorce - New York NY, US
International Classification:
G06F 9/455
H04L 9/32
US Classification:
718 1, 726 5, 726 10
Abstract:
In one embodiment, a mechanism for providing a trusted environment for provisioning a virtual machine is disclosed. In one embodiment, a method includes beginning an initialization process of a virtual machine (VM) hosted by a VM host server, obtaining by the VM as part of the initialization process a one-time password from the VM host server, the one-time password provided to the VM host server from a management server that created the one-time password, and authenticating the VM with an identity server using the one-time password.

Event Logging Application Programming Interface (Api)

View page
US Patent:
20110113436, May 12, 2011
Filed:
Nov 12, 2009
Appl. No.:
12/616938
Inventors:
Dmitri V. Pal - Framingham MA, US
Stephen J. Gallagher - Methuen MA, US
John R. Dennis - Westford MA, US
Assignee:
Red Hat, Inc. - Raleigh NC
International Classification:
G06F 9/54
US Classification:
719328
Abstract:
An event logging interface on a computer system is used to record an event when an application hosted by the computer system encounters the event. The event logging interface receives data pertaining to an event from the application. Using the event logging interface, the computer system determines a logical target of the event, and determines one or more physical destinations referenced by the logical target. The data is then dispatched to one of the physical destinations.

Securely And Automatically Connecting Virtual Machines In A Public Cloud To Corporate Resource

View page
US Patent:
20120233678, Sep 13, 2012
Filed:
Mar 10, 2011
Appl. No.:
13/045061
Inventors:
Dmitri V. Pal - Framingham MA, US
Assignee:
Red Hat, Inc. - Raleigh NC
International Classification:
H04L 9/32
G06F 21/00
US Classification:
726 7
Abstract:
A method and system for securely and automatically connecting a virtual machine in a public cloud to corporate resources. A cloud computing system is coupled to an enterprise computing system via a network. The enterprise computing system includes a management server, an authentication server and a virtual private network (VPN) server. A cloud engine runs on the management server. The cloud engine starts an exchange with the authentication server that leads to a state in which both parties know a one-time password (OTP) and an identifier (ID) of a virtual machine (VM) hosted by the cloud computing system. The cloud engine sends the OTP and the ID to the VM. The VPN server then receives credentials from the VM. If the credentials are successfully authenticated against the OTP and the ID, a secure connection is established between the enterprise computing system and the VM.

Integrating Sudo Rules With Entities Represented In An Ldap Directory

View page
US Patent:
20130024907, Jan 24, 2013
Filed:
Jul 20, 2011
Appl. No.:
13/187455
Inventors:
Dmitri V. Pal - Framingham MA, US
Sumit Bose - Falbensee, DE
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
A method and apparatus for integrating Sudo rules into a Lightweight Directory Access Protocol (LDAP) repository. An LDAP directory server receives a request to add a sudo rule to the LDAP repository. The sudo rule defines at least one sudo command and one or more entities associated with the execution of the sudo command. The LDAP directory server creates an LDAP entry for the sudo rule, and links in the LDAP entry of the sudo rule an LDAP entry of the sudo command and LDAP entries of the entities associated with the execution of the sudo command.

Password Authentication

View page
US Patent:
20130227677, Aug 29, 2013
Filed:
Feb 29, 2012
Appl. No.:
13/408747
Inventors:
Dmitri V. Pal - Framingham MA, US
Stephen J. Gallagher - Methuen MA, US
Assignee:
RED HAT, INC. - Raleigh NC
International Classification:
G06F 21/00
US Classification:
726 19
Abstract:
A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and the network connection status of the computing system is determined. If the computing system is offline, the user password and the OTP are stored in memory and the user is granted a first level of access to the computing system. Upon detecting that the network connection status of the computing system has changed to online, the user password and the OTP are provided to an authentication server for authentication. If the authentication of the user password and the OTP is successful, the user is granted a second level of access to the computing system, the second level of access being higher than the first level of access.

Offline Authentication

View page
US Patent:
20130247165, Sep 19, 2013
Filed:
Mar 16, 2012
Appl. No.:
13/422903
Inventors:
Dmitri V. Pal - Framingham MA, US
Assignee:
RED HAT, INC. - Raleigh NC
International Classification:
G06F 21/00
US Classification:
726 10, 726 5
Abstract:
A computer system determines whether the computer system is able to access an authentication server. If the computer system is able to access the authentication server, the computer system requesting a first set of credentials from a user. If the first set of credentials is valid, the computer system assigns the user a first role for performing operations on the computer system based on the first set of credentials. If the computer system is unable to access the authentication server, the computer system requests another set of credentials from the user. If the other set of credentials is valid, the computer system assigns the user another role for performing operations on the computer system based on the other set of credentials.

System And Method Providing Disconnected Authentication

View page
US Patent:
20050166263, Jul 28, 2005
Filed:
Sep 10, 2004
Appl. No.:
10/938422
Inventors:
Andrew Nanopoulos - Wakefield MA, US
Karl Ackerman - Boston MA, US
Piers Bowness - Westford MA, US
William Duane - Westford MA, US
Markus Jakobsson - Bloomington IN, US
Burt Kaliski - Wellesley MA, US
Dmitri Pal - Framingham MA, US
Shane Rice - Boston MA, US
Ronald Rivest - Arlington MA, US
International Classification:
H04K001/00
US Classification:
726007000, 726019000, 713183000
Abstract:
In a system for disconnected authentication, verification records corresponding to given authentication token outputs over a predetermined period of time, sequence of events, and/or set of challenges are downloaded to a verifier. The records include encrypted or hashed information for the given authentication token outputs. In one embodiment using time intervals, for each time interval, token output data, a salt value, and a pepper value, are hashed and compared with the verification record for the time interval. After a successful comparison, a user can access the computer. A PIN value can also be provided as an input the hash function. A portion of the hash function output can be used as a key to decrypt an encrypted (Windows) password, or other sensitive information.

Containers On Demand

View page
US Patent:
20220244976, Aug 4, 2022
Filed:
Feb 3, 2021
Appl. No.:
17/166902
Inventors:
- Raleigh NC, US
Dmitri Pal - Chelmsford MA, US
International Classification:
G06F 9/455
H04L 29/08
H04L 29/06
Abstract:
A method includes receiving, from a client device, a request to initiate an action on a target system. The method further includes determining, in view of a container registry, that the action is permissive. The method further includes receiving an authorized container corresponding to the action. The method further includes performing, by a processing device, the action in view of the container.
Dmitri V Pal from Chelmsford, MA, age ~54 Get Report