Search

Bob T O'Hara

age ~95

from San Jose, CA

Also known as:
  • Bob T B Hara
  • Robert T O'Hara
  • Bobby T O'Hara

Bob O'Hara Phones & Addresses

  • San Jose, CA

Resumes

Bob O'Hara Photo 1

Bob Carol O'hara

view source
Bob O'Hara Photo 2

Bob O'hara

view source
Bob O'Hara Photo 3

Bob O'hara

view source
Bob O'Hara Photo 4

Bob O'hara

view source
Bob O'Hara Photo 5

Bob O'hara

view source
Bob O'Hara Photo 6

Bob O'hara

view source

Us Patents

  • Method And System For Improving Throughput Over Wireless Local Area Networks With A Dynamic Contention Window

    view source
  • US Patent:
    6965942, Nov 15, 2005
  • Filed:
    Jan 12, 2001
  • Appl. No.:
    09/759389
  • Inventors:
    Albert Young - Cupertino CA, US
    BoFu Chen - Fremont CA, US
    Bob O'Hara - Santa Clara CA, US
    Seema Nayek - San Jose CA, US
    Tim Schardt - San Jose CA, US
  • Assignee:
    3Com Corporation - Santa Clara CA
  • International Classification:
    G06F015/16
    H04L012/43
  • US Classification:
    709232, 709224, 709230, 370447, 370458, 370461
  • Abstract:
    A method and system for increasing the overall network throughput over a wireless local area network (WLAN). Specifically, in one embodiment of the present invention, the dynamic selection of an initial value for a contention window in the Distributed Coordinated Function (DCF) mode is determined according to the load conditions over the WLAN in a method and system. Stations and access points within a WLAN monitor conditions within the network to establish an initial value for the contention window, also called a minimum contention window value, which is lower than that set by the IEEE 802. 11 communication standard. Some factors to consider in determining the load conditions include but are not limited to the following: number of transmissions; number of receptions; and number of collisions.
  • Method And System For Improving Throughput Over Wireless Local Area Networks With Mode Switching

    view source
  • US Patent:
    6990116, Jan 24, 2006
  • Filed:
    Jan 12, 2001
  • Appl. No.:
    09/759770
  • Inventors:
    Albert Young - Cupertino CA, US
    BoFu Chen - Fremont CA, US
    Bob O'Hara - Santa Clara CA, US
    Seema Nayek - San Jose CA, US
    Tim Schardt - San Jose CA, US
  • Assignee:
    3Com Corporation - Santa Clara CA
  • International Classification:
    H04L 12/413
  • US Classification:
    370445, 370338, 370462
  • Abstract:
    A method and system for increasing the overall network throughput over a wireless local area network (WLAN). Specifically, in one embodiment of the present invention, the dynamic switching between the Distributed Coordination Function (DCF) and Point Coordination Function IEEE 802. 11 access modes is determined according to the load conditions over the WLAN in a method and system. Stations and access points within a WLAN monitor conditions within the network to determine which access mechanism is most optimum for the current load conditions. Some factors to consider in determining the load conditions include but are not limited to the number of transmissions, number of receptions, and number of collisions.
  • Protected Mutual Authentication Over An Unsecured Wireless Communication Channel

    view source
  • US Patent:
    7024690, Apr 4, 2006
  • Filed:
    Apr 28, 2000
  • Appl. No.:
    09/561088
  • Inventors:
    Albert Young - Cupertino CA, US
    Bob O'Hara - Santa Clara CA, US
    Danny M. Nessett - Fremont CA, US
    Joe Tsai - Saratoga CA, US
    BoFu Chen - Fremont CA, US
  • Assignee:
    3Com Corporation - Santa Clara CA
  • International Classification:
    H04L 9/00
    H04K 1/00
  • US Classification:
    726 5, 713176, 380270, 726 14
  • Abstract:
    A process for mutual authentication of users and networks over an unsecured wireless communication channel. In one embodiment, sensitive information (e. g. , passwords) is not communicated over the unsecured channel. Rather, hashed representations of user identifiers, passwords, etc. , and randomly generated numbers are communicated between the client and the network during the log-in process. The representations may be encrypted with a one-way hash function such that it is not computationally feasible for an eavesdropper to decrypt. In one embodiment, the representation may be generated based on the user identifier, password and/or MAC address of a wireless LAN card.
  • Using A Key Lease In A Secondary Authentication Protocol After A Primary Authentication Protocol Has Been Performed

    view source
  • US Patent:
    6920559, Jul 19, 2005
  • Filed:
    Apr 28, 2000
  • Appl. No.:
    09/561416
  • Inventors:
    Danny M. Nessett - Fremont CA, US
    Albert Young - Cupertino CA, US
    Bob O'Hara - Santa Clara CA, US
    Joe Tsai - Saratoga CA, US
    BoFu Chen - Fremont CA, US
  • Assignee:
    3Com Corporation - Santa Clara CA
  • International Classification:
    H04L009/00
  • US Classification:
    713168, 713155, 713158, 713171, 380247
  • Abstract:
    The present invention provides a method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed. In one embodiment, the primary authentication protocol comprises a strong, secure, computationally complex authentication protocol. Moreover, the secondary authentication protocol comprises a less complex (compared to the primary authentication protocol) and less secure (compared to the primary authentication protocol) authentication protocol which can be performed in a length of time that is shorter than a length of time required to perform the primary authentication protocol. In one embodiment, a wireless client electronic system (WC) completes the primary authentication protocol with a wireless network access point electronic system of a wireless network (AP). When the WC is required to authenticate with another AP, the WC authenticates itself with another AP by using the secondary authentication protocol. However, the WC is required to periodically complete the primary authentication protocol, guarding against the possibility that the secondary authentication protocol may be exploited by an unauthorized intruder to attack the wireless network.

Youtube

Bob O'Hara - Pecha Kucha - Yestermorrow 30th ...

As part of the Yestermorrow Design/Build School's 30 Anniversary, 14 p...

  • Category:
    Education
  • Uploaded:
    17 Jun, 2010
  • Duration:
    6m 59s

Scarlett O'hara Interview w/ Robert Herrera

Robert Herrera interviews Scarlett O'hara while on the Brodeo Tour 201...

  • Category:
    Music
  • Uploaded:
    17 Jan, 2011
  • Duration:
    4m

Bob Royal #18 O'Hara WR Class of 09'

Bob Royal #18 O'Hara WR Class of 09'

  • Category:
    Sports
  • Uploaded:
    20 Dec, 2008
  • Duration:
    4m 49s

Branden O'Hara #44 of Bob Jones High School 2...

Branden O'Hara #44 Bob Jones High School Madison, AL Coach: Kevin Rose...

  • Category:
    Sports
  • Uploaded:
    16 Feb, 2010
  • Duration:
    4m 37s

Scarlett O'hara - Welcome To The Brodeo [Live]

Scarlett O'hara live video while on the Brodeo Tour 2011 at Chain Reac...

  • Category:
    Music
  • Uploaded:
    10 Feb, 2011
  • Duration:
    2m 44s

Lee vs. O'Hara Scene - Enter the Dragon Movie...

Lee (Bruce Lee) soundly defeats O'Hara (Robert Wall) in a tournament f...

  • Category:
    Film & Animation
  • Uploaded:
    27 May, 2011
  • Duration:
    2m 43s

Enter The Dragon - Fight With O'Hara

Bruce Lee owns it up.

  • Category:
    Entertainment
  • Uploaded:
    19 Sep, 2007
  • Duration:
    3m 43s

Baddest Fight Scenes EVER! - Enter the Dragon...

By "baddest" we mean the BEST fight scenes EVER! Enter the Dragon - (1...

  • Category:
    Entertainment
  • Uploaded:
    10 Jun, 2008
  • Duration:
    4m 7s

Flickr

Googleplus

Bob O'Hara Photo 15

Bob O'hara

Bob O'Hara Photo 16

Bob O'hara

Bob O'Hara Photo 17

Bob O'hara

Bob O'Hara Photo 18

Bob O'hara

Bob O'Hara Photo 19

Bob O'hara


Get Report for Bob T O'Hara from San Jose, CA, age ~95
Control profile