Patents Assigned to British Telecommunications public limited company
  • Publication number: 20200305073
    Abstract: If a cellular base station detects that it is about to shut down, either because no mobile terminals are within range, or because of a loss of power, for example because a user has deliberately switched it off, it first broadcasts a report that is about to shut down. This broadcast signal is picked up by the neighboring cells and used to update their neighbor lists, thus avoiding a false alarm which would otherwise be generated by the neighbors and transmitted to a centralized Operation Administration and Maintenance system when the shut-down cell fails to be detected on the next sampling cycle. The neighbors can then retain the shut-down base station in the neighbor list.
    Type: Application
    Filed: February 24, 2017
    Publication date: September 24, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventor: Dalia ABOUELMAATI
  • Publication number: 20200301922
    Abstract: A computer implemented method of data access to data stored in one or more data stores includes receiving a request to retrieve data from the one or more data stores; extracting characteristics of the request to classify the request according to a request classification; identifying a model for execution of one or more queries to one or more data stores; executing the one or more queries according to the model to formulate a response to the request, wherein the model for execution is identified based on a class of the request and includes an identification of one or more data stores to which the one or more queries are to be directed to formulate the response; and monitoring execution of one or more queries for a class of request and revising the model in accordance with predetermined criteria.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 24, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Alexander HEALING, Paul FAGAN, Michael TURNER
  • Publication number: 20200302078
    Abstract: A computer implemented method to identify a malicious database request including receiving a database query for retrieving data from a database; classifying the received query based on query instructions contained in the query to identify a class of query for the query, the class of query having associated attributes defining expected characteristics of queries of the class when executed by the database; monitoring characteristics of the received query executed to retrieve data from the database; and responsive to a determination that the monitored characteristics deviate from the expected characteristics, identifying the query as malicious.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 24, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Paul FAGAN, Nigel BELL
  • Publication number: 20200302052
    Abstract: A computer implemented method to identify a computer security threat based on communication via a computer network includes receiving a definition of acceptable network communication characteristics for each of a plurality of communication protocols; receiving a first set of security events for the communication, each security event including network communication characteristics for the communication; for each security event in the first set of security events: a) identifying a communication protocol associated with the event; b) detecting deviations of network communication characteristics of the event from the acceptable network communication characteristics for the identified communication protocol; and c) generating a record of each deviation identifying a communication characteristic for which the deviation is detected, so as to generate a set of one or more records of deviation for the first set of security events; and storing the set of records of deviation as a security threat identifier for identify
    Type: Application
    Filed: March 3, 2017
    Publication date: September 24, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Fadi EL-MOUSSA, Ian HERWONO
  • Publication number: 20200296120
    Abstract: A computer implemented method to identify a computer security threat based on communication of a network connected device via a computer network including receiving a plurality of blocks of network traffic from the device, each block including a sequence of network traffic data items being identifiable by a position in the sequence of the block; identifying a subset of positions occurring in every block for which a degree of variability of values of data items in each position of the subset meets a predetermined threshold; and generating executable code for performing a plurality of processing operations based on the identified subset of positions, the executable code consuming a determinate quantity of computing resources when executed for the received network traffic.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 17, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Karl SMITH, Fadi EL-MOUSSA
  • Publication number: 20200295941
    Abstract: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 17, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL, Mohammad ZOUALFAGHARI
  • Publication number: 20200296121
    Abstract: A computer implemented method to identify a computer security threat based on communication via a computer network including receiving a definition of acceptable network communication characteristics for each of a plurality of communication protocols; receiving a set of security events for the communication, each security event including network communication characteristics for the communication; for each security event in the set of security events: a) identifying a communication protocol associated with the event; b) detecting deviations of network communication characteristics of the event from the acceptable network communication characteristics for the identified communication protocol; and c) generating a record of each deviation identifying a communication characteristic for which the deviation is detected, and identifying a computer security threat for the communication based on the records generated for the set of security events.
    Type: Application
    Filed: March 3, 2017
    Publication date: September 17, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Fadi EL-MOUSSA, Ian HERWONO
  • Patent number: 10778700
    Abstract: A method for identifying malicious encrypted network traffic communicated via a network between a first and second computer system, the method including: monitoring network traffic over the network to detect a network connection as a new network connection; identifying characteristics of the network connection to determine a protocol of the network connection; retrieving a definition of a portion of network traffic for a network connection based on the determined protocol; evaluating Fourier transform coefficient values for each of a plurality of bytes in a portion of network traffic of the new network connection based on the retrieved definition; and comparing the evaluated coefficient values with a dictionary of one or more reference sets of coefficients, each of the one or more reference sets of coefficients being associated with a portion of network traffic of a malicious encrypted network connection, so as to determine if malicious encrypted network traffic is communicated over the network connection.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: September 15, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Ben Azvine, Fadi El-Moussa, George Kallos
  • Patent number: 10776427
    Abstract: A computer implemented method to determine the satisfaction of one or more mapping conditions conditionally mapping a first state in a first pattern matching automaton to a second state in the first automaton, each of the conditions being based on symbol patterns matched by a second pattern matching automaton having states corresponding to wildcard symbols in the first automaton, the method comprising: encoding the conditions in a condition tree data structure associated with the first state, the condition tree modeling sequences of symbol patterns for matching by the second automaton and corresponding to each of the conditions, wherein a node in the condition tree corresponding to a complete set of symbol patterns for a condition has associated an output symbol sequence to identify a pattern match by the first automaton.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: September 15, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventor: James Mistry
  • Patent number: 10769292
    Abstract: Computer implemented methods for access control for a restricted resource in a computer system and related methods train a hierarchical temporal memory and use cryptocurrency allocations and blockchain records to determine whether resource consumers are authorized or unauthorized to access the restricted resource.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: September 8, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Xiaofeng Du, Gery Ducatel
  • Patent number: 10771110
    Abstract: An aggregation device is arranged to receive a plurality of lines each of which is connected to a user premises and wherein one of the user premises is a multi-terminating-point enabled premises and includes a splitter device connected to the line and at least two distinct terminating points each of which is connected to the splitter device via an in-premises connection and is operable to terminate a two part connection between the respective terminating point and the aggregation device via the splitter device, and the aggregation device includes a transmitter portion, a memory, determination means, and selection means.
    Type: Grant
    Filed: November 7, 2017
    Date of Patent: September 8, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Ian Horsley, Trevor Linney, Leslie Humphrey, Anas Al Rawi
  • Patent number: 10772020
    Abstract: This disclosure relates to a method of operating a management node in a cellular telecommunications network, the cellular telecommunications network further including a User Equipment (UE) and a first and second base station, wherein the UE is connected to the first base station by a first connection and to the second base station by a second connection, and the first and second connection relate to a first and second subscription, respectively, the method including detecting a first home network identifier of the first connection; detecting a first network operator identifier of the first base station; determining that a first home network identifier of the first connection is different to the first network operator identifier of the first base station; determining a preferred partner network associated with the first home network identifier; and initiating a transfer of the first connection to the preferred partner network.
    Type: Grant
    Filed: February 20, 2018
    Date of Patent: September 8, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Maria Cuevas Ramirez, Ruth Brown
  • Patent number: 10771298
    Abstract: At a mobile terminal: communicating with a serving base station over multicast; receiving a first multicast signal from the serving base station and a second signal from a second base station; determining an indication of the length of a first cyclic prefix of the first multicast signal and an indication of the length of a second cyclic prefix of the second signal; and where the mobile terminal determines that the lengths of the first and second cyclic prefixes are different, initiating a switch in communication between the mobile terminal and the serving base station to unicast. In complementary fashion, at a base station serving a mobile terminal over multicast; sending to the mobile terminal a multicast signal comprising a first cyclic prefix with a first length; receiving from the mobile terminal an indication that the mobile terminal has detected a second cyclic prefix with a second length and switching communicating with the mobile terminal from multicast to unicast.
    Type: Grant
    Filed: June 19, 2017
    Date of Patent: September 8, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Zaid Al-Daher, Richard Mackenzie, Michael Fitch
  • Patent number: 10771483
    Abstract: A computer implemented method to identify an attacked computing device in a system of network-connected computing devices providing a plurality of computing services, the method including receiving a first data structure including data modeling relationships between vulnerabilities of computing services in a first proper subset of the plurality of computing services and exploitation of such vulnerabilities to identify one or more series of exploits involved in a network attack; receiving a second data structure including data modeling the computing devices in the system including the network connections of each computing device; and comparing the first and second data structures to identify the attacked computing device as an intermediate device in communications between at least two computer services in any of the one or more series of exploits.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: September 8, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Theo Dimitrakos
  • Patent number: 10754680
    Abstract: A computer implemented method of instantiating an encrypted disk image for a virtualized computer system includes providing a software component executing in a first virtual machine for instantiation in a first hypervisor, the software component invoking a second hypervisor within the first virtual machine; and providing a basic input output system (BIOS) for the second hypervisor, the BIOS being configured to decrypt and load the encrypted disk image to instantiate the virtualized computer system as a second virtual machine in the second hypervisor, and wherein the software component is further configured to migrate the second virtual machine at a runtime of the second virtual machine to the first hypervisor so as to provide a wholly encrypted disk image for the second virtual machine executing in the first hypervisor.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: August 25, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Theo Dimitrakos
  • Patent number: 10754879
    Abstract: A computer implemented method for identifying a signal in a sequence of numerical values, the method including: converting the sequence of numerical values into a vector sequence by converting each value in the sequence to a normalized vector representation; generating a vector field comprising the vector sequence as a multi-dimensional data structure such that vectors in the vector sequence are plotted in sequence in the vector field; modeling a simulated flow of particles through the vector field such that a flow of each particle is influenced by vectors in the vector field; generating one or more static representations of the particles, each representation being generated at a particular point in time; and performing feature detection on each of the one or more static representations to identify features in the representation corresponding to the signal.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: August 25, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventor: Robert Ghanea-Hercock
  • Patent number: 10757629
    Abstract: A method of performing network handover between wireless local area network devices for a mobile device connected to a voice service via a secure data tunnel to a packet data gateway of a cellular network including determining that a quality of a connection to a current wireless local area network is below a threshold value; determining that a handover target network is available; establishing connectivity with the target handover network; suppressing a connection to a base station of the cellular network; sending a new network address of the mobile device to the packet gateway using a set of credentials relating to the secure data tunnel so as to change an endpoint of the secure data tunnel to the new network address.
    Type: Grant
    Filed: March 27, 2017
    Date of Patent: August 25, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventor: Francisco Jose Faus Gregori
  • Patent number: 10747886
    Abstract: A computer implemented method to determine whether a target virtual machine (VM) in a virtualized computing environment is susceptible to a security attack, the method comprising: training a machine learning algorithm as a classifier based on a plurality of training data items, each training data item corresponding to a training VM and including a representation of parameters for a configuration of the training VM and a representation of characteristics of security attacks for the training VM; generating a data structure for storing one or more relationships between VM configuration parameters and attack characteristics, wherein the data structure is generated by sampling the trained machine learning algorithm to identify the relationships; determining a set of configuration parameters for the target VM; and identifying attack characteristics in the data structure associated with configuration parameters of the target VM as characteristics of attacks to which the target VM is susceptible.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: August 18, 2020
    Assignee: British Telecommunication Public Limited Company
    Inventors: Fadi El-Moussa, Ian Herwono
  • Publication number: 20200257814
    Abstract: A computer implemented method of providing whole disk encryption for a virtualized computer system including providing a hypervisor having a data store and instantiating a disk image of the virtualized computer system as a first virtual machine (VM) having a virtual disk from which an operating system of the first VM can be booted; instantiating a second VM in the hypervisor including a software component executing therein, wherein the data store is a shared data store accessible by both the first and second VMs, the method further comprising: the software component accessing the first VM using privileged credentials to install a software agent in the first VM and to replicate the virtual disk of the first VM in the hypervisor data store as a duplicate disk, wherein the software agent is adapted to encrypt data written to, and decrypt data read from, the disk of the first VM at a runtime of the first VM; and the software component encrypting the duplicate disk and unmounting the copied disk and mounting the e
    Type: Application
    Filed: January 26, 2017
    Publication date: August 13, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Fadi EL-MOUSSA, Theo DIMITRAKOS
  • Patent number: 10733296
    Abstract: A computer implemented method of detecting malicious code in a software application executing with a runtime environment in a computer system, the method including: receiving a definition of one or more runtime exception trigger conditions, each trigger condition defining criteria for the runtime environment to enter a software exception state and having associated a definition of a resulting state of the runtime environment having entered the exception state; monitoring the runtime environment to detect the satisfaction of a detected trigger condition by the runtime environment and, in response to a determination that the runtime environment fails to enter a resulting state associated with the detected trigger condition, identifying the software application as including malicious code.
    Type: Grant
    Filed: December 22, 2016
    Date of Patent: August 4, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventor: Fadi El-Moussa