Patents by Inventor Fadi El-Moussa

Fadi El-Moussa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12137119
    Abstract: A method of detecting blockchain miner code executing in a web browser including receiving a profile for the browser identifying typical resource consumption by the browser in use; responsive to a detection of a deviation of the resource consumption by the browser from the profile, intercepting a communication with the browser including a cryptographic nonce, training a plurality of classifiers based on generated training examples, each training example being generated by applying a hashing algorithm to the nonce such that each classifier is trained with training examples generated using a different hashing algorithm; intercepting one or more second communications with the browser, each of the second communications including a hash value; executing at least a subset of the classifiers based on the hash value of each of the second communications; and identifying malicious miner code executing in the browser.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: November 5, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: George Kallos, Fadi El-Moussa
  • Publication number: 20240333493
    Abstract: A method comprising, at a processor-controlled device, obtaining encrypted data comprising an encrypted data portion, obtaining an identifier indicative of a characteristic associated with the processor-controlled device, and performing a decryption process. The decryption process comprises decrypting the encrypted data portion to generate a decrypted data portion, and generating decrypted data comprising the decrypted data portion and an identifying portion based on the identifier.
    Type: Application
    Filed: June 29, 2022
    Publication date: October 3, 2024
    Inventors: Fadi EL-MOUSSA, Daniel BASTOS
  • Patent number: 12093395
    Abstract: A computer implemented method of improved security of an application for deployment to a virtualized computing environment, the method including receiving configuration information for the application; accessing a set of configuration descriptors for a known security attack, each descriptor encoding at least a portion of an application configuration so as to identify one or more descriptors matching at least part of the configuration information, each descriptor in the set having a probability that the security attack will occur in a deployed application having a configuration consistent with the descriptor; evaluating a risk score for a risk of occurrence of the security attack, the risk score evaluated from the probabilities associated with the identified descriptors; identifying a set of compatible alternative configurations for the application; evaluating a risk score for a risk of occurrence of the security attack for each alternative configuration; selecting an alternative configuration having a risk sc
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: September 17, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventor: Fadi El-Moussa
  • Patent number: 12008102
    Abstract: A computer implemented method for determining a plurality of data sources providing seed parameters for generation of an encryption key by a ransomware algorithm, the method including exposing a target computer system to the ransomware algorithm; monitoring application programming interface (API) calls made to an operating system of the target computer system to identify a set of API calls for retrieving data about one or more hardware components of the target computer system, the data about the hardware components being determined to constitute the seed parameters.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: June 11, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, George Kallos
  • Publication number: 20240169047
    Abstract: The authentication of a user across multiple devices includes the generation of authentication related data during an authentication process of a first device. The authentication process relating to a user's use of a second device is conducted in dependence on the authentication data generated during the authentication process of the first device. The authentication data may include the authentication readings that have been authenticated by the first device, a trust in the user, a location of the user, a proximity of the user to the device in use and a network device, and a time elapsed since the authentication process occurred on the first device. Beneficially, basing the authentication of a second device on the authentication process of a first device allows a trust in the user to be transferred.
    Type: Application
    Filed: February 16, 2022
    Publication date: May 23, 2024
    Inventors: Max SMITH-CREASEY, Fadi EL-MOUSSA
  • Publication number: 20240171654
    Abstract: Method of Operating a Telecommunications Network A computer-implemented method (200) of operating a telecommunications network (100), the telecommunications network comprising a client device (110) and a server (140), wherein the server and the client device are connected via an access point (120), the method comprising the steps of: receiving a service request from the client device, said service request requesting a service from the server (310); identifying client device characteristic information associated with the client device (340); identifying service requirement information associated with the requested service (330); comparing the identified client device characteristic information with the identified service requirement information so as to determine if the client device information complies with the service requirement information (350); and in response to said comparison: permitting the server to provide the requested service in accordance with the service request if the client device informatio
    Type: Application
    Filed: February 22, 2022
    Publication date: May 23, 2024
    Inventors: Simon BEDDUS, Claudia CRISTINA, Fadi EL-MOUSSA
  • Publication number: 20240146754
    Abstract: A method includes, at a processor-controlled device of a network, identifying a first portion of a data transmission transmitted via the network that is indicative of an anomaly. A second, different, portion of the data transmission including personal data is identified. The data transmission is modified to generate a modified data transmission, the modifying the data transmission comprising selectively anonymizing one or more portions of the data transmission such that at least the second portion of the data transmission is anonymized. The modified data transmission is sent to a remote system for identification of whether the first portion of the data transmission is indicative of malicious behavior.
    Type: Application
    Filed: June 21, 2022
    Publication date: May 2, 2024
    Inventors: Daniel BASTOS, Fadi EL-MOUSSA
  • Patent number: 11973757
    Abstract: A security system in a network connected computing device, the device executing a software component that receives information stored in a matrix barcode, the information including a reference to a resource accessible via the network, the system including: a service bar that blocks the software component from accessing services of the computing device; and a logic unit that determines services of the computing device needed by the software component to access the resource, wherein the service bar is adapted to, responsive to a verification of permission of the software component to access the determined services, unblock the software component in order that the software component can access the resource and accesses the determined services.
    Type: Grant
    Filed: February 23, 2016
    Date of Patent: April 30, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventor: Fadi El-Moussa
  • Publication number: 20240102828
    Abstract: A device identification method, a device identification system and a device prediction component. The method can include determining, based on first power consumption data indicative of a first power consumption associated with a premises within a first time period, a predicted identity of an active device at the premises within a second time period subsequent to the first time period. A detected identity of the active device at the premises within the second time period is determined, based on second power consumption data indicative of a second power consumption associated with the premises within the second time period. A determined identity of the active device at the premises within the second time period is determined, based on at least one of the predicted identity and the detected identity.
    Type: Application
    Filed: November 27, 2021
    Publication date: March 28, 2024
    Inventors: Giulio GIACONI, Fadi EL-MOUSSA
  • Patent number: 11924327
    Abstract: Systems and methods of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret including splitting the message into a number of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least a hash value for the block, a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating the blocks and the encoded indications to the receiver, the blocks being communicated in an order different to the proper order so as to obfuscate the message, such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: March 5, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Fabio Giubilo
  • Patent number: 11860994
    Abstract: A computer implemented method to detect anomalous behavior of a software container having a software application executing therein, the method including receiving a sparse data representation of each of a: first set of container network traffic records; a first set of application traffic records; and a first set of container resource records, and training an hierarchical temporal memory (HTM) for each first set, wherein the container network traffic records correspond to network traffic communicated with the container, the application traffic records correspond to network traffic communicated with the software application, and the container resource records correspond to the use of computer resources by the container; receiving a sparse data representation of each of a: second set of container network traffic records; a second set of application traffic records; and a second set of container resource records; executing the trained HTMs based on each respective second set to determine a degree of recognition o
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: January 2, 2024
    Assignee: British Telecommunications Public Limited Company
    Inventors: Xiaofeng Du, Fadi El-Moussa
  • Patent number: 11785029
    Abstract: A computer implemented security method operable with a communications network in a vehicle, the network communicatively connecting devices including sensors and actuators in the vehicle such that information provided by sensors and states of actuators are determinable by data communicated via the network, the method including defining a Markov decision process model for the vehicle, the model specifying states of the vehicle and actions constituting transitions between states, wherein a state of the vehicle is indicated by information provided by one or more sensors and a state of one or more actuators, and an action corresponds to a change in the information provided by one or more sensors and/or a change to a state of one or more actuators, each action having associated a probability of occurrence; determining, by accessing data communicated via the network, a current state of the vehicle in the model; accessing data communicated via the network; responsive to the accessed data indicating an action to chang
    Type: Grant
    Filed: March 4, 2019
    Date of Patent: October 10, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Karl Smith
  • Patent number: 11775653
    Abstract: A computer implemented method to determine a security configuration for a target virtual machine (VM) in a virtualized computing environment, the method including training a machine learning algorithm to determine a vector of security vulnerabilities for the target VM based on a vector of configuration characteristics for the target VM, the machine learning algorithm being trained using training examples each including a configuration for a training VM and an associated vulnerability vector based on an observed security occurrence at the training VM, wherein each training example further includes an identification of one of set of security configurations for the training VM; selecting at least a subset of the set of security configurations and, for each security configuration in the subset, executing the machine learning algorithm with the vector of configuration characteristics for the target VM and an identification of the security configuration, so as to generate a set of vulnerability vectors including a
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: October 3, 2023
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Mark Shackleton, Fadi El-Moussa
  • Publication number: 20230297671
    Abstract: A computer-implemented method of automatically securing a computer system or network against a suspect binary file (SBF) by, in response to detection of the SBF, initiating an automatic defence strategy comprising an action known to mitigate a known threat posed by a closest known malicious binary file (KMBF). The method further includes identifying the closest KMBF from a plurality of KMBFs by comparing an SBF branch map generated in respect of the SBF with respective KMBF branch maps generated in respect of each of the plurality of KMBFs, the SBF and KMBF branch maps being generated by breaking each of the respective binary files down into a respective sequence of blocks and determining how each block of the sequence branches to one or more other blocks of the sequence. Further aspects of the present disclosure relate to corresponding data processing systems, computer programs, computer-readable data carriers and data carrier signals.
    Type: Application
    Filed: June 10, 2021
    Publication date: September 21, 2023
    Inventor: Fadi EL-MOUSSA
  • Patent number: 11763005
    Abstract: A computer implemented method to generate training data for a machine learning algorithm for determining security vulnerabilities of a virtual machine (VM) in a virtualized computing environment is disclosed. The machine learning algorithm determines the vulnerabilities based on a vector of configuration characteristics for the VM.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: September 19, 2023
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Mark Shackleton, Fadi El-Moussa
  • Publication number: 20230289442
    Abstract: One aspect of the present disclosure provides a computer-implemented method of automatically securing a computer system or network against a suspect binary file (SBF) by, in response to detection of the SBF, initiating an automatic defence strategy. The automatic defence strategy includes a first action known to mitigate a known threat posed by a known malicious binary file (KMBF); and a further action predicted to mitigate a predicted threat posed by a discrepant function present in the SBF but not the KMBF. Further aspects of the present disclosure relate to corresponding data processing systems, computer programs, computer-readable data carriers and data carrier signals.
    Type: Application
    Filed: June 10, 2021
    Publication date: September 14, 2023
    Inventor: Fadi EL-MOUSSA
  • Publication number: 20230274000
    Abstract: A computer-implemented method of automatically securing a computer system or network against a suspect binary file (SBF) by, in response to detection of the SBF, initiating an automatic defence strategy comprising an action known to mitigate a known threat posed by a closest known malicious binary file (KMBF). The method further includes identifying the closest KMBF by comparing an SBF application programming interface (API) profile generated in respect of the SBF with respective KMBF API profiles generated in respect of each of a plurality of KMBFs, the SBF and KMBF API profiles being generated by: identifying any API calls in the respective binary file; and assigning each of said identified API calls to one of a plurality of API call categories defined by one or more actions known to be effective in mitigating one or more possible threats posed by the respective API call category.
    Type: Application
    Filed: June 10, 2021
    Publication date: August 31, 2023
    Inventor: Fadi EL-MOUSSA
  • Patent number: 11677757
    Abstract: A method for identifying malicious encrypted network traffic associated with a malware software component communicating via a network, the method including, for the malware, a portion of network traffic including a plurality of contiguous bytes occurring at a predefined offset in a network communication of the malware; extracting the defined portion of network traffic for each of a plurality of disparate encrypted network connections for the malware; training an autoencoder based on each extracted portion of network traffic, wherein the autoencoder includes: a set of input units each for representing information from a byte of an extracted portion; output units each for storing an output of the autoencoder; and a set of hidden units smaller in number than the set of input units and each interconnecting all input and all output units with weighted interconnections, such that the autoencoder is trainable to provide an approximated reconstruction of values of the input units at the output units; selecting a set
    Type: Grant
    Filed: March 26, 2018
    Date of Patent: June 13, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, George Kallos
  • Patent number: 11664981
    Abstract: A computer implemented method of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret, the method including splitting the message into a plurality of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating a hash value for each message block, each hash value being generated on the basis of at least a content of the block and the secret; generating, for each block, an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least the hash value for the block and a position of the block in the proper order; communicating the blocks to the receiver in an order different to the proper order so as to obfuscate the message; and communicating the encoded indications to the receiver such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: May 30, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventors: Fadi El-Moussa, Fabio Giubilo
  • Patent number: 11658996
    Abstract: A computer implemented method to detect a data breach in a network-connected computing system, the method including storing, at a trusted secure computing device, at least a portion of network traffic communicated with the computer system; the computing device generating a copy of data distributed across a network; the computing device identifying information about the network attack stored in the copy of the data; the computing device generating a signature for the network attack based on the information about the network attack, the signature including rules for identifying the network attack in network traffic; and identifying an occurrence of the network attack in the stored network traffic based on the signature.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: May 23, 2023
    Assignee: British Telecommunications Public Limited Company
    Inventor: Fadi El-Moussa