Patents by Inventor Saar Gillai

Saar Gillai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140237247
    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.
    Type: Application
    Filed: April 28, 2014
    Publication date: August 21, 2014
    Inventors: Nancy C. Winget, Hao Zhou, Mark Krischer, Joseph Salowey, Jeremy Stieglitz, Saar Gillai, Padmanabha Jakkahalli
  • Patent number: 8346875
    Abstract: Embodiments of ranking emails within an email system are disclosed. One method of ranking emails within an email system includes monitoring actions of a plurality of email users of the email system, and ranking a plurality of emails sent or received by at least one of the email users based on the monitored actions of the plurality of email users.
    Type: Grant
    Filed: October 3, 2008
    Date of Patent: January 1, 2013
    Inventors: Saar Gillai, Jonathan Davar, Tanuj Mohan
  • Patent number: 8340054
    Abstract: An apparatus and method of a wireless network timing transmission of multiple BSSID beacons is disclosed. One method includes a method of a wireless access node within a wireless mesh network timing transmission of multiple BSSID beacons. The method includes the access node identifying multiple personalities of the wireless mesh network, wherein a separate MAC address corresponding with each of the personalities. The access node assigns a beacon type for each of the personalities. During each transmission frame, the access node consecutively transmits a plurality of the beacon types, wherein the different beacon types are consecutively spaced during transmission by a predetermined period. The predetermined period is substantially less than a time duration of each transmission frame.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: December 25, 2012
    Assignee: Tropos Networks, Inc.
    Inventors: Frederick Dean, Devabhaktuni Srikrishna, Saar Gillai
  • Patent number: 8134961
    Abstract: A methods and apparatuses of adaptively capping data throughput of client devices associated with a wireless network are disclosed. One method includes monitoring an air-time per bit efficiency of each client device associated with the wireless network. A data throughput cap for each client device is adaptively determined based on the air-time per bit efficiency of the client device.
    Type: Grant
    Filed: April 17, 2011
    Date of Patent: March 13, 2012
    Assignee: Tropos Networks, Inc.
    Inventors: Cyrus Behroozi, Frederick Dean, Ramanagopal Vogety, Huizhao Wang, Mukesh Gupta, Saar Gillai
  • Publication number: 20110243110
    Abstract: An apparatus and method of a wireless network timing transmission of multiple BSSID beacons is disclosed. One method includes a method of a wireless access node within a wireless mesh network timing transmission of multiple BSSID beacons. The method includes the access node identifying multiple personalities of the wireless mesh network, wherein a separate MAC address corresponding with each of the personalities. The access node assigns a beacon type for each of the personalities. During each transmission frame, the access node consecutively transmits a plurality of the beacon types, wherein the different beacon types are consecutively spaced during transmission by a predetermined period. The predetermined period is substantially less than a time duration of each transmission frame.
    Type: Application
    Filed: June 14, 2011
    Publication date: October 6, 2011
    Applicant: TROPOS NETWORKS, INC.
    Inventors: Frederick Dean, Devabhaktuni Srikrishna, Saar Gillai
  • Publication number: 20110188402
    Abstract: A methods and apparatuses of adaptively capping data throughput of client devices associated with a wireless network are disclosed. One method includes monitoring an air-time per bit efficiency of each client device associated with the wireless network. A data throughput cap for each client device is adaptively determined based on the air-time per bit efficiency of the client device.
    Type: Application
    Filed: April 17, 2011
    Publication date: August 4, 2011
    Applicant: TROPOS NETWORKS, INC.
    Inventors: Cyrus Behroozi, Frederick Dean, Ramanagopal Vogety, Huizhao Wang, Mukesh Gupta, Saar Gillai
  • Patent number: 7983225
    Abstract: An apparatus and method of a wireless network timing transmission of multiple BSSID beacons is disclosed. The method includes identifying multiple personalities of the wireless network, wherein a separate MAC address corresponding with each of the personalities. A beacon type is assigned for each of the personalities. During each transmission interval, a plurality of the beacon types are consecutively transmitted, wherein the different beacon types are consecutively spaced during transmission by a predetermined inter-frame spacing, wherein the predetermined inter-frame spacing is substantially less than an air-time duration of each transmission interval.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: July 19, 2011
    Assignee: Tropos Networks, Inc.
    Inventors: Frederick Dean, Devabhaktuni Srikrishna, Saar Gillai
  • Publication number: 20090094340
    Abstract: Embodiments of ranking emails within an email system are disclosed. One method of ranking emails within an email system includes monitoring actions of a plurality of email users of the email system, and ranking a plurality of emails sent or received by at least one of the email users based on the monitored actions of the plurality of email users.
    Type: Application
    Filed: October 3, 2008
    Publication date: April 9, 2009
    Inventors: Saar Gillai, Jonathan Davar, Tanuj Mohan
  • Publication number: 20080240055
    Abstract: An apparatus and method of a wireless network timing transmission of multiple BSSID beacons is disclosed. The method includes identifying multiple personalities of the wireless network, wherein a separate MAC address corresponding with each of the personalities. A beacon type is assigned for each of the personalities. During each transmission interval, a plurality of the beacon types are consecutively transmitted, wherein the different beacon types are consecutively spaced during transmission by a predetermined inter-frame spacing, wherein the predetermined inter-frame spacing is substantially less than an air-time duration of each transmission interval.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Inventors: Frederick Dean, Devabhaktuni Srikrishna, Saar Gillai
  • Publication number: 20050120213
    Abstract: System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may be suitably configured to achieve mutual authentication by using a shared secret to establish a tunnel used to protect weaker authentication methods (e.g. user names and passwords). The shared secret, referred to in this embodiment as the protected access credential may be advantageously used to mutually authenticate a server and a peer upon securing a tunnel for communication via a network. The present system and method disclosed and claimed herein, in one aspect thereof, comprises the steps of 1) providing a communication implementation between a first and a second party; 2) provisioning a secure credential between the first and the second party; and 3) establishing a secure tunnel between the first and the second party using the secure credential.
    Type: Application
    Filed: December 1, 2003
    Publication date: June 2, 2005
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Winget, Hao Zhou, Mark Krischer, Joseph Salowey, Jeremy Stieglitz, Saar Gillai, Padmanabha Jakkahalli