Patents by Inventor Desmond Joseph O'CONNOR

Desmond Joseph O'CONNOR has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11736944
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Grant
    Filed: May 25, 2022
    Date of Patent: August 22, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Publication number: 20230247429
    Abstract: Systems, methods, and computer-readable media are disclosed for facilitating bi-directional edge proxy-to-edge proxy communications across an enterprise firewall in 5G service-based architecture. In one aspect, a method includes receiving a subscription request from a user device to operate on a visited private network; determining that the user device is associated with a home network; and establishing a communication protocol between a security edge protection proxy of the visited private network and a security edge protection proxy of the home network, wherein the communication protocol enables bi-directional exchange of roaming signals between the visited private network and the home network while user device is operating on the visited private network.
    Type: Application
    Filed: June 22, 2022
    Publication date: August 3, 2023
    Inventors: Mark Grayson, Timothy P. Stammers, Desmond Joseph O'Connor
  • Publication number: 20230034500
    Abstract: The present technology is directed to providing enhanced capacity for tenants in a neutral host network (NHN) via multi-connectivity such as dual connectivity or carrier aggregation. The present technology can identify, at a small cell gateway, signaling traffic passing from an access network to a respective core network of an NHN operating at mid-band frequencies and add an interface between the small cell gateway of the NHN and a base station of a tenant network operating at low-band frequencies to establish dual connectivity. Furthermore, the present technology can establish a radio resource control (RRC) connection in a primary cell residing in a macro network operating at low-band frequencies and add, at a fronthaul gateway, one or more secondary cells in a small cell network operating at mid-band frequencies to enable carrier aggregation of the one or more secondary cells with the primary cell the small cell network.
    Type: Application
    Filed: August 16, 2021
    Publication date: February 2, 2023
    Inventors: Humberto Jose La Roche, John T. Chapman, Desmond Joseph O'Connor
  • Publication number: 20230021642
    Abstract: Presented herein are techniques associated with replicating an OpenRoaming™ policy federation in a Third Generation Partnership Project (3GPP) network environment. For example, techniques herein provide a roaming policy federation architecture for a 3GPP network environment.
    Type: Application
    Filed: September 28, 2022
    Publication date: January 26, 2023
    Inventors: Mark Grayson, Timothy Peter Stammers, Desmond Joseph O'Connor, Bart A. Brinckman
  • Publication number: 20220286856
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Application
    Filed: May 25, 2022
    Publication date: September 8, 2022
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Patent number: 11350279
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Grant
    Filed: May 4, 2020
    Date of Patent: May 31, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Patent number: 10848958
    Abstract: Profile prioritization in a roaming consortium environment may be provided. First, a client device may initiate a network discovery with a network device. Next, the client device may receive in response to initiating the network discovery, a response. The response may comprise an organization identifier and a plurality of response access identifiers corresponding to the organization identifier. A one of the plurality of response access identifiers may be labeled as preferred. Then the client device may determine to access the network based on the organization identifier. The client device may then select, from a plurality of profiles, a profile for accessing the network. The selected profile may have a profile access identifier corresponding to the one of the plurality of response access identifiers labeled as preferred.
    Type: Grant
    Filed: October 15, 2018
    Date of Patent: November 24, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Mark Grayson, Bart A. Brinckman, Jerome Henry, Desmond Joseph O'Connor, Simon Dyke
  • Publication number: 20200267555
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Application
    Filed: May 4, 2020
    Publication date: August 20, 2020
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Patent number: 10673651
    Abstract: In accordance with various implementations, a method is performed at a gateway with one or more processors, non-transitory memory, and a data interface. The method includes: obtaining a request to instantiate a tunnel for data from a guest service provider (GSP) to a user device that traverses an operator network; determining whether the request satisfies tunneling criteria, where the tunneling criteria at least includes a first criterion associated with intrinsic information associated with the operator network and a second criterion associated with extrinsic information that characterizes network resources of the network operator based on a relationship between the operator network and the GSP; instantiating the tunnel in response to determining that the request satisfies the tunneling criteria, where instantiating the tunnel includes the gateway transmitting tunnel instructions to other nodes of the operator network; and routing the data through the tunnel to transmit the data to the user device.
    Type: Grant
    Filed: January 31, 2019
    Date of Patent: June 2, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Humberto Jose La Roche, Desmond Joseph O'Connor
  • Patent number: 10673649
    Abstract: In accordance with various implementations, a method is performed at a gateway with one or more processors, non-transitory memory, and a data interface. The method includes: obtaining a request to instantiate a tunnel for data from a guest service provider (GSP) to a user device that traverses an operator network; determining whether the request satisfies tunneling criteria, where the tunneling criteria at least includes a first criterion associated with intrinsic information associated with the operator network and a second criterion associated with extrinsic information that characterizes network resources of the network operator based on a relationship between the operator network and the GSP; instantiating the tunnel in response to determining that the request satisfies the tunneling criteria, where instantiating the tunnel includes the gateway transmitting tunnel instructions to other nodes of the operator network; and routing the data through the tunnel to transmit the data to the user device.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: June 2, 2020
    Assignee: Cisco Technology, Inc.
    Inventors: Humberto Jose La Roche, Desmond Joseph O'Connor
  • Patent number: 10667135
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Grant
    Filed: January 11, 2018
    Date of Patent: May 26, 2020
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Publication number: 20200120481
    Abstract: Profile prioritization in a roaming consortium environment may be provided. First, a client device may initiate a network discovery with a network device. Next, the client device may receive in response to initiating the network discovery, a response. The response may comprise an organization identifier and a plurality of response access identifiers corresponding to the organization identifier. A one of the plurality of response access identifiers may be labeled as preferred. Then the client device may determine to access the network based on the organization identifier. The client device may then select, from a plurality of profiles, a profile for accessing the network. The selected profile may have a profile access identifier corresponding to the one of the plurality of response access identifiers labeled as preferred.
    Type: Application
    Filed: October 15, 2018
    Publication date: April 16, 2020
    Applicant: Cisco Technology, Inc.
    Inventors: Mark Grayson, Bart A. Brinckman, Jerome Henry, Desmond Joseph O'Connor, Simon Dyke
  • Publication number: 20190215692
    Abstract: In one embodiment, a method for providing access to wireless networks may include receiving, by a wireless network access provider from a user device, a request to access a wireless network. The method may include obtaining data representing a policy applicable to the access request, sending the access request, augmented with the policy, to an identity provider associated with the user and having no pre-existing relationship with the access provider, and receiving, from the identity provider, an access request response indicating whether or not the policy is met. The method may include communicating, to the wireless device, an indication that the access request has been accepted, if the policy is met, or an indication that the access request has been rejected, if the policy is not met. The access provider and identity provider may be members of an identity and access federation that communicate over a dynamically established secure connection.
    Type: Application
    Filed: January 11, 2018
    Publication date: July 11, 2019
    Inventors: Mark Grayson, Desmond Joseph O'Connor, Malcolm Muir Smith, Bart Brinckman
  • Publication number: 20190165970
    Abstract: In accordance with various implementations, a method is performed at a gateway with one or more processors, non-transitory memory, and a data interface. The method includes: obtaining a request to instantiate a tunnel for data from a guest service provider (GSP) to a user device that traverses an operator network; determining whether the request satisfies tunneling criteria, where the tunneling criteria at least includes a first criterion associated with intrinsic information associated with the operator network and a second criterion associated with extrinsic information that characterizes network resources of the network operator based on a relationship between the operator network and the GSP; instantiating the tunnel in response to determining that the request satisfies the tunneling criteria, where instantiating the tunnel includes the gateway transmitting tunnel instructions to other nodes of the operator network; and routing the data through the tunnel to transmit the data to the user device.
    Type: Application
    Filed: January 31, 2019
    Publication date: May 30, 2019
    Inventors: Humberto Jose La Roche, Desmond Joseph O'Connor
  • Publication number: 20190123935
    Abstract: In accordance with various implementations, a method is performed at a gateway with one or more processors, non-transitory memory, and a data interface. The method includes: obtaining a request to instantiate a tunnel for data from a guest service provider (GSP) to a user device that traverses an operator network; determining whether the request satisfies tunneling criteria, where the tunneling criteria at least includes a first criterion associated with intrinsic information associated with the operator network and a second criterion associated with extrinsic information that characterizes network resources of the network operator based on a relationship between the operator network and the GSP; instantiating the tunnel in response to determining that the request satisfies the tunneling criteria, where instantiating the tunnel includes the gateway transmitting tunnel instructions to other nodes of the operator network; and routing the data through the tunnel to transmit the data to the user device.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Humberto Jose LA ROCHE, Desmond Joseph O'CONNOR