1
Radia J Perlman, Stephen R Hanna: Methods and systems for establishing a shared secret using an authentication token. Sun Microsystems, Finnegan Henderson Farabow Garrett & Dunner L, January 9, 2001: US06173400 (129 worldwide citation)

A method and system for establishing a shared secret between a plurality of devices using an authentication token. An authentication token is used to establish a shared secret between a local device and a remote device to provide user authentication, data encryption, and integrity protection. The au ...


2
Miriam C Kadansky, Stephen R Hanna: Method and apparatus for multicast indication of group key change. Sun Microsystems, Squire Sanders & Dempsey, September 25, 2001: US06295361 (118 worldwide citation)

A method and apparatus to allow a key manager node in a network to initiate the process of changing a group key for all nodes in a multicasting group. In the described embodiment, the key manager node initiates changing the group key by setting an indicator in a multicast packet. The indicator indic ...


3
Dah Ming Chiu, Miriam C Kadansky, Stephen R Hanna, Stephen A Hurst, Joseph S Wesley, Philip M Rosenzweig, Radia J Perlman: Multiple ACK windows providing congestion control in reliable multicast protocol. Sun Microsystems, Cesari and McKenna, January 7, 2003: US06505253 (117 worldwide citation)

A multicast repair tree is established, the repair tree having one sender station and a plurality of repair head stations. A repair head station has an affiliated group of member stations. A repair head station retransmits a lost message to its affiliated group of member stations upon receipt from a ...


4
Radia J Perlman, Stephen R Hanna: Method and system for providing limited access privileges with an untrusted terminal. Sun Microsystems, Finnegan Henderson Farabow Garrett & Dunner L, January 21, 2003: US06510523 (112 worldwide citation)

A method and system for providing limited access privileges with an untrusted terminal allows a user to perform privileged operations between the untrusted terminal and a remote terminal in a controlled manner. The user can establish a secure communications channel between the untrusted terminal and ...


5
Stephen R Hanna, David C Douglas, Yassir K Elley, Radia J Perlman, Sean J Mullan, Anne H Anderson: Replacing an email attachment with an address specifying where the attachment is stored. Sun Microsystems, Park Vaughan & Fleming, May 30, 2006: US07054905 (110 worldwide citation)

One embodiment of the present invention provides a system that replaces an attachment to an email message with a reference to a location where the attachment is stored. Upon receiving the email message, the system examines the email message to determine if the email message includes an attachment. I ...


6
Stephen R Hanna, Radia J Perlman: Method and apparatus for using non-secure file servers for secure information storage. Sun Microsystems, Chapin IP Law, Barry W Chapin Esq, February 13, 2007: US07178021 (95 worldwide citation)

A method and apparatus for utilizing a non-secure file server for storing and sharing data securely only among clients and groups authorized to read and modify the data. A first client that desires to store data on the file server encrypts the data with a first encryption key having an associated fi ...


7
Radia Joy Perlman, Stephen R Hanna: Authentication system and process. Sun Microsystems, Cesari and McKenna, May 8, 2001: US06230266 (93 worldwide citation)

An authentication method and process are provided. One aspect of the process of the present invention includes authorizing a first on-line revocation server (OLRS) to provide information concerning certificates issued by a certificate authority (CA) that have been revoked. If the first OLRS is compr ...


8
Dah Ming Chiu, Miriam C Kadansky, Stephen R Hanna, Stephen A Hurst, Joseph S Wesley, Philip M Rosenzweig, Radia J Perlman: Detecting congestion by comparing successive loss of packets in windows to provide congestion control in reliable multicast protocol. Sun Microsystems, Cesari and McKenna, February 25, 2003: US06526022 (76 worldwide citation)

A method of detecting congestion in a computer network uses a receiving station which determines a first number of messages missing in a first acknowledgment window. The station then determines a second number of messages missing in a subsequent acknowledgement window. The station then measures cong ...


9
Miriam C Kadansky, Dah Ming Chiu, Stephen R Hanna, Stephen A Hurst, Joseph S Wesley, Philip M Rosenzweig, Radia J Perlman: DYNAMIC OPTIMIZATION FOR RECEIVERS USING DISTANCE BETWEEN A REPAIR HEAD AND A MEMBER STATION IN A REPAIR GROUP FOR RECEIVERS HAVING A CLOSELY KNIT TOPOLOGICAL ARRANGEMENT TO LOCATE REPAIR HEADS NEAR THE MEMBER STATIONS WHICH THEY SERVE IN TREE BASED REPAIR IN RELIABLE MULTICAST PROTOCOL. Sun Microsystems, Cesari and McKenna, January 14, 2003: US06507562 (75 worldwide citation)

Receiver stations located close together in a computer network dynamically form a multicast repair tree by a plurality of receiver stations choosing a repair head station from among the closely located receiver stations. A receiver station calculates its distance from a repair head station by subtra ...


10
Joseph S Wesley, Dah Ming Chiu, Miriam C Kadansky, Joseph E Provino, Stephen R Hanna: Method and system for measuring reception characteristics in a multicast data distribution group. Sun Microsystems, Weingarten Schurgin Gagnebin & Lebovici, February 17, 2004: US06693907 (60 worldwide citation)

A method and system for accurately measuring the reception characteristics of receivers in a multicast data distribution group having a sending node and a plurality of receivers. The multicast group is organized as a repair tree in which selected nodes of the multicast group comprise repair nodes fo ...