Patents by Inventor Richard Andrew Oak

Richard Andrew Oak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9325669
    Abstract: Methods, apparatus, and programs for a computer for network security content checking: in particular ones which simplify the critical element of a content checker so it can be trusted and implemented in logic.
    Type: Grant
    Filed: May 19, 2011
    Date of Patent: April 26, 2016
    Assignee: QINETIQ LIMITED
    Inventors: Simon Robert Wiseman, Richard Andrew Oak
  • Patent number: 8885828
    Abstract: This invention relates to an optical star network in which different communities of users, such as different businesses, are provided through use of quantum key distribution (QKD). At least one QKD device is located at the central hub of the star network and communicates with QKD devices at the endpoints to establish a separate quantum key, i.e. a cryptographic key established by QKD, with each endpoint. A separate key manager is provided for each different community and each key manager is arranged to use the appropriate quantum keys for endpoints within that community to deliver the same community key to each endpoint. This community key can be used by for encrypting network traffic between members of the same community with security. Traffic passing through the network switch is encrypted, but the community keys are not delivered via the switch and hence the switch an error in the switch does not compromise security.
    Type: Grant
    Filed: January 23, 2009
    Date of Patent: November 11, 2014
    Assignee: Qinetiq Limited
    Inventors: Simon Robert Wiseman, Brian Sinclair Lowans, Richard Andrew Oak
  • Publication number: 20130073843
    Abstract: Methods, apparatus, and programs for a computer for network security content checking: in particular ones which simplify the critical element of a content checker so it can be trusted and implemented in logic.
    Type: Application
    Filed: May 19, 2011
    Publication date: March 21, 2013
    Applicant: QINETIQ LIMITED
    Inventors: Simon Robert Wiseman, Richard Andrew Oak
  • Publication number: 20100329459
    Abstract: This invention relates to an optical star network in which different communities of users, such as different businesses, are provided through use of quantum key distribution (QKD). At least one QKD device is located at the central hub of the star network and communicates with QKD devices at the endpoints to establish a separate quantum key, i.e. a cryptographic key established by QKD, with each endpoint. A separate key manager is provided for each different community and each key manager is arranged to use the appropriate quantum keys for endpoints within that community to deliver the same community key to each endpoint. This community key can be used by for encrypting network traffic between members of the same community with security. Traffic passing through the network switch is encrypted, but the community keys are not delivered via the switch and hence the switch an error in the switch does not compromise security.
    Type: Application
    Filed: January 23, 2009
    Publication date: December 30, 2010
    Applicant: QINETIQ LIMITED
    Inventors: Simon Robert Wiseman, Brian Sinclair Lowans, Richard Andrew Oak
  • Publication number: 20090282484
    Abstract: Method and apparatus for mitigating the effects of security threat involving malicious code concealed in computer files (for example computer viruses, etc.). The method operates by inserting additional strings of arbitrary length within computer files of known type which may contain such security threats. The strings are chosen to have no substantial effect on the files in normal operation, but potentially disrupt attack code located in the file. Inserted sequences may incorporate a character sequence which, if interpreted as code, halts execution of that program. Alternatively, or in addition, character sequences may be deleted or reordered provided that they have no effect on normal interpretation of the file. As a result, the effect of malicious code operating successfully as intended by an attacker may be mitigated. The methods do not require prior knowledge of the nature of a specific threat and so provide threat mitigation for previously unidentified threats.
    Type: Application
    Filed: April 12, 2007
    Publication date: November 12, 2009
    Applicant: QINETIQ LIMITED
    Inventors: Simon Robert Wiseman, Richard Andrew Oak