Patents by Inventor Gery Ducatel
Gery Ducatel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240073207Abstract: A computer implemented method for authenticating a user, the method including receiving an authentication request from a first computer system, the authentication request including an indication of an identity of the user to be authenticated; receiving one or more authentication factors for verifying the identity of the user, the one or more authentication factors including at least one authentication factor obtained from a second computer system associated with the user having the indicated identity; receiving an auxiliary authentication factor, the auxiliary authentication factor comprising data for verifying that the second computer system is currently in the possession of the user having the indicated identity; and verifying the identity of the user based on the one or more authentication factors and the auxiliary authentication factor.Type: ApplicationFiled: November 25, 2021Publication date: February 29, 2024Inventors: Gabriele GELARDI, Max SMITH-CREASEY, Gery DUCATEL
-
Publication number: 20230239304Abstract: A method of configuring a user device. The method includes sending, from the user device to a node of a distributed ledger network (DLN), the node configured to store a distributed ledger of the DLN, a request for characteristic data indicative of a characteristic associated with a service provider, receiving, at the user device, a response from the node of the DLN in response to the request, and configuring a functionality of the user device accessible to the service provider, based at least in part on the response from the node of the DLN. Further aspects relate to a data processing system, a network, and a method of operating a network.Type: ApplicationFiled: June 15, 2021Publication date: July 27, 2023Inventors: Gery DUCATEL, Mamun ABU-TAIR, Zhan CUI, Joseph RAFFERTY, Hanif ULLAH, Aftab ALI, Philip MORROW
-
Publication number: 20230239154Abstract: A method for facilitating secure communication between a user device and a network device. Encrypted data from a user device is received at the network device. The encrypted data is encrypted based on first physiological data captured by a first sensor of the user device. The first physiological data is representative of a physiological characteristic of a user of the user device. A second sensor of the network device captures second physiological data representative of the physiological characteristic of the user. A common key for encrypting further data transferred between the user device and the network device is determined, based on the encrypted data and the second physiological data. Further aspects relate to other methods for facilitating secure communication between a user and network device, a network, and a method of operating a network.Type: ApplicationFiled: June 15, 2021Publication date: July 27, 2023Inventors: Aftab ALI, Gery DUCATEL, Zhan CUI, Mamun ABU-TAIR, Joseph RAFFERTY, Hanif ULLAH, Philip MORROW
-
Publication number: 20230189003Abstract: A method of pairing a user device with a remote system. The user device communicates with an intermediary device via a secure communication channel to cause a secret key generated by the remote system to be received by the user device, from the intermediary device. The secret key is thereby assigned to the user device. The user device establishes communication with the remote system to pair the user device with the remote system using the secret key, such that data sent from the user device to the remote system is encrypted using the secret key and data received by the user device from the remote system is decrypted using the secret key.Type: ApplicationFiled: May 14, 2021Publication date: June 15, 2023Inventors: Gabriele GELARDI, Gery DUCATEL, Zhan CUI
-
Publication number: 20220376902Abstract: There is provided a computer implemented method for accessing a resource at a computing device, as well as for controlling access to a resource by a computing device. The computing device receives a policy indicating a set of conditions under which access to the resource is permitted, determines whether each of the conditions are initially present based on an output of one or more sensors of the device, and monitors the one or more sensors to detect a change in the presence of one or more of the conditions. In response to detecting the change in the presence of one or more of the conditions, the computing device determines whether each of the conditions are present. In response to determining that each of the conditions is present, access to the resource is enabled. If at least one of the conditions is not present, access to the resource is prevented.Type: ApplicationFiled: September 11, 2020Publication date: November 24, 2022Inventors: Ali SAJJAD, Gery DUCATEL, Gabriele GELARDI
-
Publication number: 20220261466Abstract: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.Type: ApplicationFiled: June 16, 2020Publication date: August 18, 2022Inventors: Gabriele GELARDI, Ali Sajjad, Gery DUCATEL
-
Patent number: 11347876Abstract: A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorization to access the resource, the cryptocurrency being formed of tradeable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorization to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification ofType: GrantFiled: July 20, 2016Date of Patent: May 31, 2022Assignee: British Telecommunications Public Limited CompanyInventors: Gery Ducatel, Theo Dimitrakos, Joshua Daniel
-
Publication number: 20220164422Abstract: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credeType: ApplicationFiled: February 28, 2020Publication date: May 26, 2022Inventors: Gabriele GELARDI, Gery DUCATEL
-
Publication number: 20220156351Abstract: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.Type: ApplicationFiled: February 28, 2020Publication date: May 19, 2022Inventors: Gabriele GELARDI, Gery DUCATEL
-
Publication number: 20220100829Abstract: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a first machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant. The method further including, in response to a determination that a subsequent behavior is classified as non-compliant, accessing a second machine learning classifier trained based on at least one prior behavior of the user using the device where the prior behavior is classified as non-compliant by the first classifier.Type: ApplicationFiled: February 28, 2020Publication date: March 31, 2022Inventors: Gabriele GELARDI, Gery DUCATEL
-
Patent number: 11153091Abstract: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.Type: GrantFiled: March 3, 2017Date of Patent: October 19, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel, Mohammad Zoualfaghari
-
Patent number: 11146589Abstract: A computer implemented method for access control for a consumer accessing a restricted resource in a network connected computer system, the method including receiving a continuous sequence of data records relating to use, by the consumer, of the restricted resource, the resource being accessed by the consumer over an access network; continuously comparing the data records with an access control policy for the restricted resource; in response to a determination that the behavior is non-compliant with respect to the policy, generating and communicating a shared secret to the consumer, the shared secret being communicated via a communications channel other than the access network; receiving a response to a challenge from the user via the access network; and notifying the computer system that access to the resource by the consumer should be precluded based on a comparison of the response to the challenge and the shared-secret.Type: GrantFiled: March 26, 2018Date of Patent: October 12, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel
-
Patent number: 11023248Abstract: A computer implemented method to execute a software application in a network attached computing environment, the application being defined by a set of required software services to constitute the application, the required services being selected from services indicated in a component registry, the method including recording a block to a blockchain data structure, the new block identifying at least a subset of the set of required services; receiving one or more further blocks from the blockchain data structure, each of the further blocks referencing a service provider for providing one or more of the required services; and selecting one or more service providers identified in the blockchain and defining a specification for an application assembler component to assemble the software application, the specification identifying selected service providers.Type: GrantFiled: March 3, 2017Date of Patent: June 1, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel
-
Patent number: 10956614Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer accType: GrantFiled: July 20, 2016Date of Patent: March 23, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel, Theo Dimitrakos
-
Patent number: 10951708Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results inType: GrantFiled: March 5, 2019Date of Patent: March 16, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel
-
Patent number: 10891383Abstract: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.Type: GrantFiled: February 10, 2016Date of Patent: January 12, 2021Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Theo Dimitrakos, Gery Ducatel
-
Publication number: 20200409719Abstract: A computer implemented method to execute a software application in a network attached computing environment, the application being defined by a set of required software services to constitute the application, the required services being selected from services indicated in a component registry, the method including recording a block to a blockchain data structure, the new block identifying at least a subset of the set of required services; receiving one or more further blocks from the blockchain data structure, each of the further blocks referencing a service provider for providing one or more of the required services; and selecting one or more service providers identified in the blockchain and defining a specification for an application assembler component to assemble the software application, the specification identifying selected service providers.Type: ApplicationFiled: March 3, 2017Publication date: December 31, 2020Applicant: British Telecommunications Public Limited CompanyInventors: Joshua DANIEL, Gery DUCATEL
-
Patent number: 10853750Abstract: A computer implemented method to provide allocation of one or more computing resources for a consumer computing component, each resource having a resource type and being provided by one or more resource providers, and the consumer having associated a quantity of tradeable value constraining an extent of resource consumption.Type: GrantFiled: July 20, 2016Date of Patent: December 1, 2020Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Gery Ducatel, Theo Dimitrakos
-
Publication number: 20200295941Abstract: A computer implemented method for code distribution by a base station to a target device via a network, the distribution being made via one or more distribution servers arranged between the base station and the target device on the network, is disclosed.Type: ApplicationFiled: March 3, 2017Publication date: September 17, 2020Applicant: British Telecommunications Public Limited CompanyInventors: Joshua DANIEL, Gery DUCATEL, Mohammad ZOUALFAGHARI
-
Patent number: 10769292Abstract: Computer implemented methods for access control for a restricted resource in a computer system and related methods train a hierarchical temporal memory and use cryptocurrency allocations and blockchain records to determine whether resource consumers are authorized or unauthorized to access the restricted resource.Type: GrantFiled: March 29, 2018Date of Patent: September 8, 2020Assignee: British Telecommunications Public Limited CompanyInventors: Joshua Daniel, Xiaofeng Du, Gery Ducatel