Patent | Date |
---|
Protection of secret client data in a multiple client data deduplication environment Grant 11,436,345 - Perlman , et al. September 6, 2 | 2022-09-06 |
Ensuring data authenticity using notary as a service Grant 11,435,907 - Saad , et al. September 6, 2 | 2022-09-06 |
Key Management And Key Policies For Data Encryption In A Storage Appliance App 20220239478 - Pocas; Jamie ;   et al. | 2022-07-28 |
Maintaining Retention Policies In A Block Storage, Multi-client Dedup Domain App 20220237148 - Perlman; Radia J. ;   et al. | 2022-07-28 |
Secure Password Log In On Insecure Devices App 20220239699 - Rothschild; Seth Jacob ;   et al. | 2022-07-28 |
Secure, Low-cost, Privacy-preserving Biometric Card App 20220237623 - Perlman; Radia J. ;   et al. | 2022-07-28 |
Efficient and secure distributed ledger maintenance Grant 11,374,769 - Perlman , et al. June 28, 2 | 2022-06-28 |
Client-side Compression App 20220171555 - PONNUSWAMY; Senthil ;   et al. | 2022-06-02 |
Client-side encryption supporting deduplication across single or multiple tenants in a storage system Grant 11,128,460 - Perlman , et al. September 21, 2 | 2021-09-21 |
Protection Of Secret Client Data In A Multiple Client Data Deduplication Environment App 20210271763 - Perlman; Radia J. ;   et al. | 2021-09-02 |
Preventing malicious lockout of user accounts Grant 11,042,629 - Perlman , et al. June 22, 2 | 2021-06-22 |
Trust domain secure enclaves in cloud infrastructure Grant 11,019,033 - Perlman , et al. May 25, 2 | 2021-05-25 |
Deduplication of client encrypted data Grant 11,018,859 - Perlman , et al. May 25, 2 | 2021-05-25 |
Ensuring Data Authenticity Using Notary As A Service App 20200409571 - Saad; Yossef ;   et al. | 2020-12-31 |
Efficient And Secure Distributed Ledger Maintenance App 20200351104 - Perlman; Radia J. ;   et al. | 2020-11-05 |
Client-side user authentication control based on stored history of incorrect passwords Grant 10,819,700 - Perlman October 27, 2 | 2020-10-27 |
Computer system employing challenge/response protocol with detection of non-unique incorrect responses Grant 10,764,068 - Perlman , et al. Sep | 2020-09-01 |
Efficient and secure distributed ledger maintenance Grant 10,756,904 - Perlman , et al. A | 2020-08-25 |
Deduplication Of Client Encrypted Data App 20200213109 - Perlman; Radia J. ;   et al. | 2020-07-02 |
Client-side Encryption Supporting Deduplication Across Single Or Multiple Tenants In A Storage System App 20200177382 - Perlman; Radia J. ;   et al. | 2020-06-04 |
Preventing Malicious Lockout Of User Accounts App 20200110871 - Perlman; Radia J. ;   et al. | 2020-04-09 |
Incremental data validation Grant 10,394,646 - Kaufman , et al. A | 2019-08-27 |
Computer System Employing Challenge/response Protocol With Detection Of Non-unique Incorrect Responses App 20190238346 - Perlman; Radia J. ;   et al. | 2019-08-01 |
Method and apparatus for defending against denial of service attacks Grant 8,635,284 - Tripathi , et al. January 21, 2 | 2014-01-21 |
Fast computation of one-way hash sequences Grant 8,538,014 - Perlman September 17, 2 | 2013-09-17 |
Parameterizable cryptography Grant 8,488,782 - Perlman July 16, 2 | 2013-07-16 |
Nearly-stateless key escrow service Grant 8,315,395 - Perlman November 20, 2 | 2012-11-20 |
Method and apparatus for accessing an encrypted file system using non-local keys Grant 8,200,964 - Perlman , et al. June 12, 2 | 2012-06-12 |
Dynamic defense of network attacks Grant 8,006,285 - Perlman August 23, 2 | 2011-08-23 |
Parameterizable Cryptography App 20110093721 - Perlman; Radia J. | 2011-04-21 |
Method and apparatus for using secret keys to make data permanently unreadable Grant 7,874,010 - Perlman January 18, 2 | 2011-01-18 |
Method And Apparatus For Assuring Enhanced Security App 20100329460 - Perlman; Radia J. | 2010-12-30 |
Scalable file system configured to make files permanently unreadable Grant 7,814,318 - Perlman , et al. October 12, 2 | 2010-10-12 |
Method and apparatus for securely forgetting secrets Grant 7,770,213 - Perlman , et al. August 3, 2 | 2010-08-03 |
Router based defense against denial of service attacks using dynamic feedback from attacked host Grant 7,760,722 - Tripathi , et al. July 20, 2 | 2010-07-20 |
Nearly-stateless Key Escrow Service App 20100142713 - Perlman; Radia J. | 2010-06-10 |
Method and apparatus for maintaining ephemeral keys in limited space Grant 7,660,423 - Perlman February 9, 2 | 2010-02-09 |
Key Management Using Derived Keys App 20090296926 - Perlman; Radia J. | 2009-12-03 |
Fast Computation Of One-way Hash Sequences App 20090279692 - Perlman; Radia J. | 2009-11-12 |
Efficiently managing keys to make data permanently unreadable Grant 7,596,696 - Perlman September 29, 2 | 2009-09-29 |
Automatic Data Revocation To Facilitate Security For A Portable Computing Device App 20090019293 - Perlman; Radia J. | 2009-01-15 |
Ephemeral decryption utilizing binding functions Grant 7,409,545 - Perlman August 5, 2 | 2008-08-05 |
System using routing bridges to transparently interconnect multiple network links to form a single virtual network link Grant 7,398,322 - Perlman July 8, 2 | 2008-07-08 |
Method and apparatus for providing a key distribution center without storing long-term server secrets Grant 7,395,549 - Perlman , et al. July 1, 2 | 2008-07-01 |
Method and apparatus for accessing an encrypted file system using non-local keys App 20080123858 - Perlman; Radia J. ;   et al. | 2008-05-29 |
Blinded encryption and decryption Grant 7,363,499 - Perlman April 22, 2 | 2008-04-22 |
Method and apparatus for preventing spanning tree loops during traffic overload conditions Grant 7,339,900 - Perlman March 4, 2 | 2008-03-04 |
Method and apparatus for maintaining ephemeral keys in limited space App 20080016352 - Perlman; Radia J. | 2008-01-17 |
Method and apparatus for securely forgetting secrets App 20070245410 - Perlman; Radia J. ;   et al. | 2007-10-18 |
Router-assisted DDoS protection by tunneling replicas App 20070147376 - Perlman; Radia J. ;   et al. | 2007-06-28 |
Method and system for proving membership in a nested group using chains of credentials Grant 7,213,262 - Elley , et al. May 1, 2 | 2007-05-01 |
Method and apparatus for using non-secure file servers for secure information storage Grant 7,178,021 - Hanna , et al. February 13, 2 | 2007-02-13 |
Efficient system and method of node and link insertion for deadlock-free routing on arbitrary topologies Grant 7,152,113 - Reynders , et al. December 19, 2 | 2006-12-19 |
Calculation of layered routes in a distributed manner Grant 7,096,251 - Chiu , et al. August 22, 2 | 2006-08-22 |
Trust ratings in group credentials Grant 7,085,925 - Hanna , et al. August 1, 2 | 2006-08-01 |
Method and apparatus for facilitating instant failover during packet routing Grant 7,068,595 - Perlman , et al. June 27, 2 | 2006-06-27 |
Replacing an email attachment with an address specifying where the attachment is stored Grant 7,054,905 - Hanna , et al. May 30, 2 | 2006-05-30 |
Secure ephemeral decryptability Grant 7,016,499 - Perlman March 21, 2 | 2006-03-21 |
Data authentication system employing encrypted integrity blocks Grant 6,996,712 - Perlman , et al. February 7, 2 | 2006-02-07 |
System and method for deadlock-free routing on arbitrary network topologies Grant 6,992,988 - Reynders , et al. January 31, 2 | 2006-01-31 |
Method and apparatus for facilitating use of a pre-shared secret key with identity hiding Grant 6,975,729 - Perlman December 13, 2 | 2005-12-13 |
Method and apparatus for sending encrypted electronic mail through a distribution list exploder Grant 6,912,656 - Perlman , et al. June 28, 2 | 2005-06-28 |
Autoconfiguring IP routers Grant 6,912,205 - Perlman , et al. June 28, 2 | 2005-06-28 |
Dynamic LAN boundaries Grant 6,901,076 - Perlman , et al. May 31, 2 | 2005-05-31 |
Automatic selection of unique node identifiers in a distributed routing environment Grant 6,898,187 - Perlman , et al. May 24, 2 | 2005-05-24 |
Method and system for dynamic issuance of group certificates Grant 6,883,100 - Elley , et al. April 19, 2 | 2005-04-19 |
Method and apparatus for preventing spanning tree loops during traffic overload conditions App 20050068903 - Perlman, Radia J. | 2005-03-31 |
Blinded encryption and decryption App 20050066174 - Perlman, Radia J. | 2005-03-24 |
Ephemeral decryption utilizing blinding functions App 20050066175 - Perlman, Radia J. | 2005-03-24 |
Method and apparatus for presenting anonymous group names Grant 6,801,998 - Hanna , et al. October 5, 2 | 2004-10-05 |
Method and apparatus for accessing parameters embedded in object indentifiers App 20040193614 - Perlman, Radia J. | 2004-09-30 |
Defferrable processing option for fast path forwarding Grant 6,788,680 - Perlman , et al. September 7, 2 | 2004-09-07 |
Coordinating loop-free forwarding table updates Grant 6,768,740 - Perlman , et al. July 27, 2 | 2004-07-27 |
Method and apparatus for using ranking to select repair nodes in formation of a dynamic tree for multicast repair Grant 6,757,843 - Wesley , et al. June 29, 2 | 2004-06-29 |
Use of beacon message in a network for classifying and discarding messages Grant 6,658,004 - Kadansky , et al. December 2, 2 | 2003-12-02 |
Mechanism and method to achieve group-wise perfect backward secrecy App 20030206637 - Caronni, Germano ;   et al. | 2003-11-06 |
Content screening with end-to-end encryption Grant 6,636,838 - Perlman , et al. October 21, 2 | 2003-10-21 |
Efficient system and method of node and link insertion for deadlock-free routing on arbitrary topologies App 20030172180 - Reynders, John V. ;   et al. | 2003-09-11 |
Calculation of layered routes in a distributed manner App 20030140165 - Chiu, Dah Ming ;   et al. | 2003-07-24 |
System and method for facilitating operator authentication App 20030115154 - Anderson, Anne H. ;   et al. | 2003-06-19 |
Content screening with end-to-end encryption prior to reaching a destination Grant 6,560,705 - Perlman , et al. May 6, 2 | 2003-05-06 |
Content screening with end-to-end encryption within a firewall Grant 6,546,486 - Perlman , et al. April 8, 2 | 2003-04-08 |
System and method for deadlock-free routing on arbitrary network topologies App 20030043756 - Reynders, John V. ;   et al. | 2003-03-06 |
Detecting congestion by comparing successive loss of packets in windows to provide congestion control in reliable multicast protocol Grant 6,526,022 - Chiu , et al. February 25, 2 | 2003-02-25 |
Method and apparatus for longest prefix address lookup Grant 6,526,055 - Perlman , et al. February 25, 2 | 2003-02-25 |
Method and system for providing limited access privileges with an untrusted terminal Grant 6,510,523 - Perlman , et al. January 21, 2 | 2003-01-21 |
Dynamic Optimization For Receivers Using Distance Between A Repair Head And A Member Station In A Repair Group For Receivers Having A Closely Knit Topological Arrangement To Locate Repair Heads Near The Member Stations Which They Serve In Tree Based Repair In Reliable Multicast Protocol Grant 6,507,562 - Kadansky , et al. January 14, 2 | 2003-01-14 |
Multiple ACK windows providing congestion control in reliable multicast protocol Grant 6,505,253 - Chiu , et al. January 7, 2 | 2003-01-07 |
Secure ephemeral decryptability App 20020191797 - Perlman, Radia J. | 2002-12-19 |
Method and apparatus for facilitating instant failover during packet routing App 20020150043 - Perlman, Radia J. ;   et al. | 2002-10-17 |
System and method for shortening certificate chains App 20020147905 - Perlman, Radia J. | 2002-10-10 |
Trust ratings in group credentials App 20020144149 - Hanna, Stephen R. ;   et al. | 2002-10-03 |
Autoconfiguring IP routers App 20020101873 - Perlman, Radia J. ;   et al. | 2002-08-01 |
Efficient revocation of registration authorities App 20020099668 - Perlman, Radia J. | 2002-07-25 |
Dynamic LAN boundaries App 20020093968 - Perlman, Radia J. ;   et al. | 2002-07-18 |
Automatic selection of unique node identifiers in a distributed routing environment App 20020093967 - Perlman, Radia J. ;   et al. | 2002-07-18 |
Method and apparatus for using digital signatures to filter packets in a network Grant 6,389,532 - Gupta , et al. May 14, 2 | 2002-05-14 |
Ephemeral decryptability Grant 6,363,480 - Perlman March 26, 2 | 2002-03-26 |
Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority Grant 6,275,859 - Wesley , et al. August 14, 2 | 2001-08-14 |
Signed group criteria Grant 6,263,434 - Hanna , et al. July 17, 2 | 2001-07-17 |
Method and apparatus using ranking to select repair nodes in formation of a dynamic tree for multicast repair Grant 6,185,698 - Wesley , et al. February 6, 2 | 2001-02-06 |
Methods and systems for establishing a shared secret using an authentication token Grant 6,173,400 - Perlman , et al. January 9, 2 | 2001-01-09 |
System and method for organizing devices in a network into a tree using suitability values Grant 6,134,599 - Chiu , et al. October 17, 2 | 2000-10-17 |
Efficient message distribution to subsets of large computer networks using multicast for near nodes and unicast for far nodes Grant 6,131,123 - Hurst , et al. October 10, 2 | 2000-10-10 |
Repair TTL computation and correction mechanism to perform localized repairs in a multicast data distribution setup/framework Grant 6,104,695 - Wesley , et al. August 15, 2 | 2000-08-15 |
Network addressing arrangement for backward compatible routing of an expanded address space Grant 6,094,525 - Perlman , et al. July 25, 2 | 2000-07-25 |
Method and apparatus for determining a longest matching prefix from a dictionary of prefixes Grant 5,983,223 - Perlman November 9, 1 | 1999-11-09 |
Many to few group address translation through a network bridge Grant 5,956,335 - Backes , et al. September 21, 1 | 1999-09-21 |
Method and apparatus for implementing partial and complete optional key escrow Grant 5,901,227 - Perlman May 4, 1 | 1999-05-04 |
Internetwork address mapping gateway Grant 5,856,974 - Gervais , et al. January 5, 1 | 1999-01-05 |
System for acknowledging availability of neighbor node using data packet containing data that is ordinarily fowarded to neighbor node Grant 5,805,818 - Perlman , et al. September 8, 1 | 1998-09-08 |
Method and apparatus for determining characteristics of a path Grant 5,781,534 - Perlman , et al. July 14, 1 | 1998-07-14 |
Mechanism for efficiently synchronizing information over a network Grant 5,742,820 - Perlman , et al. April 21, 1 | 1998-04-21 |
Certificate revocation performance optimization Grant 5,687,235 - Perlman , et al. November 11, 1 | 1997-11-11 |
Method and apparatus for synchronizing data transmission with on-demand links of a network Grant 5,596,574 - Perlman , et al. January 21, 1 | 1997-01-21 |
Method of neighbor discovery over a multiaccess nonbroadcast medium Grant 5,574,860 - Perlman , et al. November 12, 1 | 1996-11-12 |
Method for supporting foreign protocols across backbone network by combining and transmitting list of destinations that support second protocol in first and second areas to the third area Grant 5,557,745 - Perlman , et al. September 17, 1 | 1996-09-17 |
Virtual circuit manager for multicast messaging Grant 5,511,168 - Perlman , et al. April 23, 1 | 1996-04-23 |
Router using multiple hop redirect messages to enable bridge like data forwarding Grant 5,500,860 - Perlman , et al. March 19, 1 | 1996-03-19 |
Message encryption using a hash function Grant 5,483,598 - Kaufman , et al. January 9, 1 | 1996-01-09 |
Method of deriving a per-message signature for a DSS or El Gamal encryption system Grant 5,475,763 - Kaufman , et al. December 12, 1 | 1995-12-12 |
Robust packet routing over a distributed network containing malicious failures Grant 5,455,865 - Perlman October 3, 1 | 1995-10-03 |
Encapsulation of an address within a forwarded frame in a computer communications system Grant 5,434,864 - Perlman , et al. July 18, 1 | 1995-07-18 |
Method and apparatus for selective interleaving in a cell-switched network Grant 5,434,855 - Perlman , et al. July 18, 1 | 1995-07-18 |
Many to few group address translation through a network bridge Grant 5,428,615 - Backes , et al. June 27, 1 | 1995-06-27 |
Router using remote address resolution to enable bridge like data forwarding Grant 5,420,862 - Perlman May 30, 1 | 1995-05-30 |
Architecture for maintaining the sequence of packet cells transmitted over a multicast, cell-switched network Grant 5,418,781 - Kaufman , et al. May 23, 1 | 1995-05-23 |
Detecting LAN number misconfiguration Grant 5,400,333 - Perlman March 21, 1 | 1995-03-21 |
Automatically configuring LAN numbers Grant 5,398,242 - Perlman March 14, 1 | 1995-03-14 |
Secure method of neighbor discovery over a multiaccess medium Grant 5,351,295 - Perlman , et al. September 27, 1 | 1994-09-27 |
Automatically configuring parallel bridge numbers Grant 5,327,424 - Perlman July 5, 1 | 1994-07-05 |
Selecting optimal routes in source routing bridging without exponential flooding of explorer packets Grant 5,323,394 - Perlman June 21, 1 | 1994-06-21 |
Multicast address in a local area network where the local area network has inadequate multicast addressing capability Grant 5,321,693 - Perlman June 14, 1 | 1994-06-14 |
Method of merging networks across a common backbone network Grant 5,313,465 - Perlman , et al. May 17, 1 | 1994-05-17 |
Bridge-like internet protocol router Grant 5,309,437 - Perlman , et al. May 3, 1 | 1994-05-03 |
Method of issuance and revocation of certificates of authenticity used in public key networks and other systems Grant 5,261,002 - Perlman , et al. November 9, 1 | 1993-11-09 |
Multiple protocol routing Grant 5,251,205 - Callon , et al. October 5, 1 | 1993-10-05 |
Method and apparatus for distance vector routing on datagram point-to-point links Grant 5,243,592 - Perlman , et al. September 7, 1 | 1993-09-07 |
Utilization of redundant links in bridged networks Grant 5,150,360 - Perlman , et al. September 22, 1 | 1992-09-22 |
Updating link state information in networks Grant 5,128,926 - Perlman , et al. July 7, 1 | 1992-07-07 |
Reliable broadcast of information in a wide area network Grant 5,086,428 - Perlman , et al. February 4, 1 | 1992-02-04 |