Patents by Inventor Richard Joseph Evenden
Richard Joseph Evenden has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10892965Abstract: In a network of data devices having routing functions, a controller within the network core is arranged to monitor the status and capabalities of each data device and to check for the availability of network functions which alter the capabilities of the data devices. The controller changes the configuration of the data devices to gain the new functionality, or alters the routing behavior so that certain control data packets are forwarded to a function processor which performs processing on behalf of the data devices in a proxy manner. The function processor provides virtual functions to the data devices.Type: GrantFiled: September 30, 2014Date of Patent: January 12, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Simon Patrick Alexander Ringland, Francis James Scahill, Richard Joseph Evenden
-
Patent number: 10111159Abstract: A wireless communications device has network interfaces for accessing cellular data networks and Wi-Fi wireless local area networks. Wi-Fi offload allows data traffic to be moved away from the cellular network to the Wi-Fi network. To avoid any existing data sessions being broken during offload, Proxy Mobile IP (PMIP) must be supported by a Wi-Fi access point and associated Mobile Access Gateway. Before Wi-Fi association and authentication, the wireless communication device scans the surrounding area for access points and determines which of the access points supports PMIP before selecting one for association.Type: GrantFiled: March 27, 2013Date of Patent: October 23, 2018Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Francis James Scahill, Richard Joseph Evenden, Barbara Orlandi
-
Patent number: 9912673Abstract: In a hotspot Wi-Fi network, users can access the Internet from a variety of access points. The users' credentials are centrally authenticated within the network core to ensure they are allowed on the hotspot network. To improve security and provide selective access, a further authenticator function in the network manages access to private and/or restricted network resources.Type: GrantFiled: December 31, 2013Date of Patent: March 6, 2018Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Richard Joseph Evenden, Francis James Scahill, Simon Patrick Alexander Ringland
-
Patent number: 9853899Abstract: Embodiments provide a traffic control system for WLAN access points. The traffic control system works in dependence on a first input-user priority (supplied by an authentication server). This allows different service levels to be provided to different classes of customer. In addition, the traffic control system polices and/or shapes traffic based on a second input—a modulation rate detector, which measures the modulation rate at which each connected client is sending its traffic, and uses it to indirectly cause fairer use of the available air interface capacity (e.g. by causing TCP streams to back off when they detect packet loss). Finally, for some embodiments where public Wi-Fi is being delivered through private Wi-Fi access points, the traffic control system is to manage the air interface utilization split between public and private WiFi users, to ensure that private users do not have their Wi-Fi air interface network capacity unduly impaired by public users.Type: GrantFiled: March 27, 2014Date of Patent: December 26, 2017Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANYInventors: Simon Patrick Alexander Ringland, Francis James Scahill, Richard Joseph Evenden
-
Patent number: 9603021Abstract: A public wireless access point network includes authorized access points sharing the same SSID and connected to a network core which implements centralized authentication so that wireless client devices can roam between authorized access points. Each authorized access point is adapted to detect the presence of unauthorized rogue access points posing as authorized access points. The authorized access points inspect data packets received from wireless client devices which have roamed into range and from the addressing information in the MAC layer and IP layer can determine whether the wireless device has previously connected to a rogue access point. If such a determination is made, the user of the device is alerted that their confidential information may have been compromised.Type: GrantFiled: November 30, 2012Date of Patent: March 21, 2017Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Francis James Scahill, Richard Joseph Evenden
-
Publication number: 20160241452Abstract: In a network of data devices having routing functions, a controller within the network core is arranged to monitor the status and capabalities of each data device and to check for the availability of network functions which alter the capabilities of the data devices. The controller changes the configuration of the data devices to gain the new functionality, or alters the routing behavior so that certain control data packets are forwarded to a function processor which performs processing on behalf of the data devices in a proxy manner. The function processor provides virtual functions to the data devices.Type: ApplicationFiled: September 30, 2014Publication date: August 18, 2016Inventors: Simon Patrick Alexander RINGLAND, Francis James Scahill, Richard Joseph Evenden
-
Publication number: 20160043953Abstract: Embodiments provide a traffic control system for WLAN access points. The traffic control system works in dependence on a first input-user priority (supplied by an authentication server). This allows different service levels to be provided to different classes of customer. In addition, the traffic control system polices and/or shapes traffic based on a second input—a modulation rate detector, which measures the modulation rate at which each connected client is sending its traffic, and uses it to indirectly cause fairer use of the available air interface capacity (e.g. by causing TCP streams to back off when they detect packet loss). Finally, for some embodiments where public Wi-Fi is being delivered through private Wi-Fi access points, the traffic control system is to manage the air interface utilization split between public and private WiFi users, to ensure that private users do not have their Wi-Fi air interface network capacity unduly impaired by public users.Type: ApplicationFiled: March 27, 2014Publication date: February 11, 2016Inventors: Simon Patrick Alexander Ringland, Francis James Scahill, Richard Joseph Evenden
-
Publication number: 20150373029Abstract: In a hotspot Wi-Fi network, users can access the Internet from a variety of access points. The users' credentials are centrally authenticated within the network core to ensure they are allowed on the hotspot network. To improve security and provide selective access, a further authenticator function in the network manages access to private and/or restricted network resources.Type: ApplicationFiled: December 31, 2013Publication date: December 24, 2015Inventors: Richard Joseph EVENDEN, Francis James SCAHILL, Simon Patrick Alexander RINGLAND
-
Publication number: 20150078359Abstract: A wireless communications device has network interfaces for accessing cellular data networks and Wi-Fi wireless local area networks. Wi-Fi offload allows data traffic to be moved away from the cellular network to the Wi-Fi network. To avoid any existing data sessions being broken during offload, Proxy Mobile IP (PMIP) must be supported by a Wi-Fi access point and associated Mobile Access Gateway. After Wi-Fi association and authentication, the wireless communication device probes the access point and MAG to determine whether PMIP is supported.Type: ApplicationFiled: March 27, 2013Publication date: March 19, 2015Inventors: Francis James Scahill, Richard Joseph Evenden, Barbara Orlandi
-
Publication number: 20150063331Abstract: A wireless communications device has network interfaces for accessing cellular data networks and Wi-Fi wireless local area networks. Wi-Fi offload allows data traffic to be moved away from the cellular network to the Wi-Fi network. To avoid any existing data sessions being broken during offload, Proxy Mobile IP (PMIP) must be supported by a Wi-Fi access point and associated Mobile Access Gateway. Before Wi-Fi association and authentication, the wireless communication device scans the surrounding area for access points and determines which of the access points supports PMIP before selecting one for association.Type: ApplicationFiled: March 27, 2013Publication date: March 5, 2015Inventors: Francis James Scahill, Richard Joseph Evenden, Barbara Orlandi
-
Publication number: 20140325615Abstract: A public wireless access point network includes authorised access points sharing the same SSID and connected to a network core which implements centralised authentication so that wireless client devices can roam between authorised access points. Each authorised access point is adapted to detect the presence of unauthorised rogue access points posing as authorised access points. The authorised access points inspect data packets received from wireless client devices which have roamed into range and from the addressing information in the MAC layer and IP layer can determine whether the wireless device has previously connected to a rogue access point. If such a determination is made, the user of the device is alerted that their confidential information may have been compromised.Type: ApplicationFiled: November 30, 2012Publication date: October 30, 2014Inventors: Francis James Scahill, Richard Joseph Evenden
-
Publication number: 20110289563Abstract: A method and system for service provision, comprising: a web browser (4) in a first communications device (e.g. a personal computer) (2) running a script (8) that is from a remote source (e.g. a remote web server) (30); sending, from the first communications device (2) to a second communications device (e.g. a smart phone) (16), a service request for a service required by the script (8) running on the web browser (4); sending a user authorisation request from the second communications device (16) to the first communications device (2); the first communications device (2) obtaining authorisation from a user (12); sending a user authorisation from the first communications device (2) to the second communications device (16); and the second communications device (16) providing the requested service only if the user authorisation is received.Type: ApplicationFiled: February 1, 2010Publication date: November 24, 2011Inventors: Richard Joseph Evenden, Francis J. Scahill