Patents by Inventor Stephen W. NEVILLE

Stephen W. NEVILLE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9800509
    Abstract: Telecommunication networks are under stress due to rapid traffic increase cause mostly by large file transfers. Disclosed herein is a cross-layer transport protocol specifically designed to efficiently handle large transactions. Traffic generated from large transactions is shaped into a periodic succession of fixed-size data frames. Each transaction can then be scheduled for transmission using a two-way reservation protocol. Exemplary results show that the proposed approach is capable of significantly improving goodput and end-to-end delay relative to TCP, improving efficiency of bandwidth utilization by over 40%.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: October 24, 2017
    Assignee: UVic Industry Partnerships Inc.
    Inventors: Ilijc Albanese, Thomas E. Darcie, Sudhakar Ganti, Stephen W. Neville, Yagiz O. Yazir
  • Patent number: 9137138
    Abstract: A method for a first network to receive a packet from a second network is provided, including a router at the first network receiving the packet from the second network, the packet addressed to a client reachable through the first network; the router inspecting the packet for a nonrepudiable marking provided by the second network; if the nonrepudiable marking is present and matches the packet, adding an indicator pointing to the second network in the packet; adding a second nonrepudiable marking to the packet, and transmitting the packet to a destination; and otherwise, dropping the packet.
    Type: Grant
    Filed: November 28, 2008
    Date of Patent: September 15, 2015
    Inventors: Stephen W. Neville, Michael Horie
  • Publication number: 20150236957
    Abstract: Telecommunication networks are under stress due to rapid traffic increase cause mostly by large file transfers. Disclosed herein is a cross-layer transport protocol specifically designed to efficiently handle large transactions. Traffic generated from large transactions is shaped into a periodic succession of fixed-size data frames. Each transaction can then be scheduled for transmission using a two-way reservation protocol. Exemplary results show that the proposed approach is capable of significantly improving goodput and end-to-end delay relative to TCP, improving efficiency of bandwidth utilization by over 40%.
    Type: Application
    Filed: February 20, 2015
    Publication date: August 20, 2015
    Applicant: UVic Industry Partnerships Inc.
    Inventors: Ilijc Albanese, Thomas E. Darcie, Sudhakar Ganti, Stephen W. Neville, Yagiz O. Yazir
  • Patent number: 8768854
    Abstract: A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction.
    Type: Grant
    Filed: January 12, 2010
    Date of Patent: July 1, 2014
    Inventors: Stephen W. Neville, Michael Horie
  • Publication number: 20110276496
    Abstract: A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction.
    Type: Application
    Filed: January 12, 2010
    Publication date: November 10, 2011
    Inventors: Stephen W. Neville, Michael Horie
  • Publication number: 20100138539
    Abstract: A method for a first network to receive a packet from a second network is provided, including a router at the first network receiving the packet from the second network, the packet addressed to a client reachable through the first network; the router inspecting the packet for a nonrepudiable marking provided by the second network; if the nonrepudiable marking is present and matches the packet, adding an indicator pointing to the second network in the packet; adding a second nonrepudiable marking to the packet, and transmitting the packet to a destination; and otherwise, dropping the packet.
    Type: Application
    Filed: November 28, 2008
    Publication date: June 3, 2010
    Applicant: UNIVERSITY OF VICTORIA INNOVATION AND DEVELOPMENT CORPORATION
    Inventors: Stephen W. NEVILLE, Michael HORIE