Patents Assigned to British Telecommunications
  • Patent number: 10505721
    Abstract: A method of securing a virtual data volume storing data in a first virtualized computing environment including: deriving a cryptographic key for encrypting the data, the key being derived from first and second parameters; and encrypting the data, wherein the first parameter is generated for association with the virtualized data volume, and the second parameter is generated based on at least one characteristic of a second virtualized computing environment.
    Type: Grant
    Filed: September 22, 2015
    Date of Patent: December 10, 2019
    Assignee: British Telecommunications Public Limited Company
    Inventors: Theo Dimitrakos, Ali Sajjad
  • Patent number: 10505652
    Abstract: This invention relates to methods and systems for estimating offset, skew and drift. Embodiments of the invention relate to methods and systems which allow these relationships between a slave clock and a master clock to be estimated based on the exchange of timestamped messages between the master and the slave. Further embodiments of the invention set out uses of these estimates to synchronize a local clock in a slave to a master and to steer the slave clock to stay aligned to the master clock when the master clock is temporarily unavailable or the communication path between slave and master is temporarily unavailable.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: December 10, 2019
    Assignees: Khalifa University of Science and Technology, British Telecommunications PLC, Emirates Telecommunications Corporation
    Inventor: James Aweya
  • Patent number: 10498390
    Abstract: A method and device are provided for allocating resources in a DSL network, comprising the steps of a first-tier DSL network element receiving a resource requirement of a second-tier DSL subscriber line, the first-tier DSL network element determining a resource requirement of a first-tier DSL subscriber line, and the first-tier DSL network element allocating resources to the first-tier DSL subscriber line based on the resource requirements of the first and second tier DSL subscriber lines.
    Type: Grant
    Filed: February 18, 2015
    Date of Patent: December 3, 2019
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Peter Sharples, Trevor Linney
  • Publication number: 20190363963
    Abstract: A method of determining the bandwidth of a link carrying a plurality of data streams between a plurality of sources and a plurality of destinations in a network, the method including sending data packets from a first data stream over the link from one source to one destination at a first transmission rate, and measuring an associated first packet loss rate; sending further data packets from the first data stream over the link from the one source to the one destination at a second transmission rate, and measuring an associated second packet loss rate; and determining the bandwidth of the link in dependence on the first and second packet loss rates and the first and second transmission rates.
    Type: Application
    Filed: December 13, 2017
    Publication date: November 28, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Michael Nilsson, Stephen Appleby, Yousif Humeida
  • Publication number: 20190364598
    Abstract: Methods and apparatus are disclosed for controlling wireless communication between a first wireless access point and one or more user devices, the first access point having an interface for communication with the user devices on one or more wireless communication channels in a predetermined frequency range, and also being configured to communicate with one or more other wireless access points. The access points each have a radar detector operable to detect possible radar signals within the frequency range, and are configured to provide information indicative of whether or not possible radar signals have been detected. The first access point receives communications relating to information provided by the other access points, and starts or stops wireless communications with its user devices on a particular channel based on whether or not it has detected possible radar signals together with whether or not the other wireless access points have detected possible radar signals.
    Type: Application
    Filed: February 5, 2018
    Publication date: November 28, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Simon Ringland, Francis Scahill
  • Publication number: 20190363900
    Abstract: A network node for use in a hybrid fiber-copper access network, wherein the node includes DSL and reverse-power feed functionality. The node has a substantially cylindrical shape such that it receives an input metallic cable at a first end, an output metallic cable at a second end and an optical fiber cable which is received at a point along the body of the node.
    Type: Application
    Filed: December 21, 2017
    Publication date: November 28, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Leslie Humphrey, Ian Horsley, Ian Cooper, Trevor Linney, Trevor Morsman
  • Publication number: 20190364311
    Abstract: A method of delivering media content over a network, the media content including a plurality of temporal segments, wherein each temporal segment comprises a plurality of data packets, the method including: selecting an initial size of a first congestion window; delivering the plurality of data packets of a first segment using the first congestion window, the initial size of the first congestion window being used to control the size of the first congestion window for the duration of the first segment delivery; measuring the packet loss during the delivery of the first segment; determining an initial size of a second congestion window in dependence on the measured packet loss for the first segment; and delivering a second segment using the second congestion window, the initial size of the second congestion window being used to control the size of the second congestion window for the duration of the second segment delivery.
    Type: Application
    Filed: December 13, 2017
    Publication date: November 28, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Michael Nilsson, Stephen Appleby, Yousif Humeida
  • Publication number: 20190364480
    Abstract: This disclosure relates to a method of operating a cellular telecommunications network, and to a first base station and a UE for implementing the method, the method including receiving data from an external sensor indicating a first change in a propagation environment between the UE and the base station; and, in response, reconfiguring a connectivity property for the UE.
    Type: Application
    Filed: December 13, 2017
    Publication date: November 28, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Farhad Mehran, Richard Mackenzie, Anvar Tukmanov, Michael Fitch, Keith Briggs
  • Patent number: 10491350
    Abstract: A mobile terminal in a wireless communications system estimates channel characteristics from transmissions of a base station comprising reference symbols arranged in a first density and distribution. In the event of an impairment in accuracy of channel estimation, the mobile terminal first applies a checking function to determine whether a base station identity conflict is present. If such a conflict is detected, it transmits a report to the base station to initiate a network channel reallocation process to remove the conflict. If no conflict is detected, the base station is instructed to initiate a function to change the density and distribution of the reference symbols. This allows a dynamic system to distinguish between different causes of poor channel quality, allowing adaptation of the transmissions of the base stations in a manner appropriate to the cause identified.
    Type: Grant
    Filed: February 9, 2017
    Date of Patent: November 26, 2019
    Assignee: British Telecommunications Public Limited Company
    Inventors: Michael Robert Fitch, Richard Thomas Mackenzie
  • Publication number: 20190356691
    Abstract: A computer implemented method to detect a data breach in a network-connected computing system, the method including storing, at a trusted secure computing device, at least a portion of network traffic communicated with the computer system; the computing device generating a copy of data distributed across a network; the computing device identifying information about the network attack stored in the copy of the data; the computing device generating a signature for the network attack based on the information about the network attack, the signature including rules for identifying the network attack in network traffic; and identifying an occurrence of the network attack in the stored network traffic based on the signature.
    Type: Application
    Filed: December 19, 2017
    Publication date: November 21, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventor: Fadi El-Moussa
  • Patent number: 10484402
    Abstract: A computer implemented method to identify one or more parameters of a configuration of a target virtual machine (VM) in a virtualized computing environment used in a security attack against the target VM, the security attack exhibiting a particular attack characteristic, is disclosed.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: November 19, 2019
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Fadi El-Moussa, Ian Herwono
  • Patent number: 10484440
    Abstract: There are described methods and systems for distributing content in a network, in particular a multicast network. One method includes delivering content from a source to a destination in a content delivery network. A request for an item of content is received and a first multicast stream is identified or established, the first multicast stream comprising a first copy of the content. At least one second multicast stream is also identified or established, the second stream comprising a second copy of the content. The second copy of the content is time-shifted by a time, M, from corresponding portions of the first copy of the content. The content is then delivered to the destination using both the first and the second multicast streams.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: November 19, 2019
    Assignee: BRITISH TELECOMMUNICATIONS public limited company
    Inventors: Vidhyalakshmi Karthikeyan, Detlef Nauck
  • Patent number: 10483074
    Abstract: A method of manufacturing an article with integral active electronic component uses an additive manufacturing process to: a) form a non-electrically conductive substrate; b) form a non-electrically conductive perforated layer having an aperture; c) form electrically conductive anode and cathode elements spaced in the aperture; d) deposit a conductive electrical connection to each of the elements suitable for imparting an electrical potential difference between the elements; e) form a non-electrically conductive sealing layer atop the perforated layer so as to retain and seal the aperture in the perforated layer.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: November 19, 2019
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventor: Robert Ghanea-Hercock
  • Patent number: 10482245
    Abstract: A computer implemented method to determine a configuration of a target virtual machine (VM) in a virtualized computing environment to protect against a security attack exhibiting a particular attack characteristic.
    Type: Grant
    Filed: August 15, 2017
    Date of Patent: November 19, 2019
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Fadi El-Moussa, Ian Herwono
  • Publication number: 20190347414
    Abstract: A computer implemented method of detecting malicious code in a software application executing with a runtime environment in a computer system, the method including: parsing software code corresponding to at least a subset of the runtime environment to identify one or more occurrences of a programmatic dispatch of a software exception; recording, for each identified occurrence, execution state information leading to the exception as a runtime exception trigger condition for the exception; and defining, for each identified occurrence, a resulting state based on the software code for recording in association with the execution state information, wherein the execution state information and associated resulting state definition permit the detection of anomalies in the execution of the runtime environment to detect malicious applications executing with the runtime environment.
    Type: Application
    Filed: December 22, 2016
    Publication date: November 14, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventor: Fadi EL-MOUSSA
  • Publication number: 20190342591
    Abstract: A method of delivering a video sequence in a network, the sequence including a plurality of temporal segments encoded at a plurality of qualities, the method including storing a dataset indicating the relative size of segments of the video stream; computing in dependence on that dataset a time schedule for delivery of the segments, the time schedule indicating a target delivery time for each segment sufficient to deliver all the segments in the sequence in time for decoding and being independent of the encoded quality of each segment; for each segment: setting one or more transmission parameters for the segment in dependence on the target delivery time for the segment and the relative size of the segment; and delivering the segment over the network using the one or more transmission parameters.
    Type: Application
    Filed: December 13, 2017
    Publication date: November 7, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Michael Nilsson, Yousif Humeida, Stephen Appleby
  • Publication number: 20190342799
    Abstract: A method and a base station for a mobile communications network. The base station includes a first transceiver configured to communicate over radio signals with a plurality of mobile terminals, in which the first transceiver configured to: transmit a first signal to serve a mobile terminal over multicast; receive from the mobile terminal information derived from the signal quality of a second signal received at the mobile terminal from a second transceiver; and receive from the mobile terminal further information on the quality of the first signal received at the mobile terminal from the first transceiver and on the quality of a third signal received at the mobile terminal from a third transceiver.
    Type: Application
    Filed: June 23, 2017
    Publication date: November 7, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Richard MACKENZIE, Zaid AL-DAHER, Michael FITCH
  • Publication number: 20190340361
    Abstract: Disclosed herein is a computer implemented method for receiving code distributed by a base station at a target device via a network, the distribution being made to one or more destination devices including the target device via one or more distribution servers arranged between the base station and the one or more devices on the network, wherein the base station maintains a first blockchain data structure storing one or more blocks and having a state determined by a most recently committed block in the first blockchain.
    Type: Application
    Filed: March 3, 2017
    Publication date: November 7, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL, Mohammad ZOUALFAGHARI
  • Patent number: 10469507
    Abstract: A malicious encrypted traffic detector connected to a computer network, the detector comprising: a Shannon entropy estimator; an entropy comparator; a store storing a reference measure of Shannon entropy of a portion of network traffic of a malicious encrypted network connection, wherein the estimator is adapted to estimate a measure of entropy for a corresponding portion of network traffic communicated over the computer network, and the entropy comparator is adapted to compare the estimated measure of entropy with the reference measure so as to determine if malicious encrypted network traffic is communicated over the network connection.
    Type: Grant
    Filed: February 17, 2015
    Date of Patent: November 5, 2019
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, George Kallos, Ben Azvine
  • Patent number: 10469393
    Abstract: The invention includes a network node, and a method of controlling the network node in a data packet network, wherein the method comprising the steps of: receiving a first data packet from a first external network node; analysing the first data packet to determine if it is of a class of service deemed to be queuable or unqueuable; and, if it is queuable, sending the first data packet to a second external node via an intermediate node, wherein the first data packet is reclassified to be of the unqueuable class of service such that the intermediate node should not forward the first data packet to the second external network node if a packet queue exists at the intermediate node.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: November 5, 2019
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Robert Briscoe, Philip Eardley