Patents by Inventor Gery Ducatel

Gery Ducatel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200053082
    Abstract: A computer implemented method for access control for a consumer accessing a restricted resource in a network connected computer system, the method: including receiving a continuous sequence of data records relating to use, by the consumer, of the restricted resource, the resource being accessed by the consumer over an access network; continuously comparing the data records with an access control policy for the restricted resource; in response to a determination that the behavior is non-compliant with respect to the policy, generating and communicating a shared secret to the consumer, the shared secret being communicated via a communications channel other than the access network; receiving a response to a challenge from the user via the access network; and notifying the computer system that access to the resource by the consumer should be precluded based on a comparison of the response to the challenge and the shared-secret.
    Type: Application
    Filed: March 26, 2018
    Publication date: February 13, 2020
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel
  • Patent number: 10534913
    Abstract: Disclosed herein is a computer implemented method for receiving code distributed by a base station at a target device via a network, the distribution being made to one or more destination devices including the target device via one or more distribution servers arranged between the base station and the one or more devices on the network, wherein the base station maintains a first blockchain data structure storing one or more blocks and having a state determined by a most recently committed block in the first blockchain.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: January 14, 2020
    Assignee: British Telecommunications Public Limited Company
    Inventors: Joshua Daniel, Gery Ducatel, Mohammad Zoualfaghari
  • Publication number: 20190340361
    Abstract: Disclosed herein is a computer implemented method for receiving code distributed by a base station at a target device via a network, the distribution being made to one or more destination devices including the target device via one or more distribution servers arranged between the base station and the one or more devices on the network, wherein the base station maintains a first blockchain data structure storing one or more blocks and having a state determined by a most recently committed block in the first blockchain.
    Type: Application
    Filed: March 3, 2017
    Publication date: November 7, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL, Mohammad ZOUALFAGHARI
  • Publication number: 20190273781
    Abstract: A computer implemented method of a network connected data storage system, the method including receiving, via the network, and storing a data set including a plurality of data items encrypted using an index-based searchable encryption scheme, wherein the searchable encryption scheme has associated a server index and a client index; receiving, via the network, and storing a set of hashed information for each of a plurality of queries of the data set, each item of hashed information including a hash of a query and a hash of an expected result of executing the query using the server index; receiving, via the network, a query from a data requester to retrieve a set of data items from the data store and a hash of an expected result of executing the received query using the server index; generating a result of the received query for the data set based on the server index; and responsive to a comparison of a hash of the generated result, the received hash of the expected result, and the hashes of expected results in
    Type: Application
    Filed: March 5, 2019
    Publication date: September 5, 2019
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL
  • Publication number: 20180285585
    Abstract: A computer implemented method for access control for a restricted resource in a computer system is disclosed. A related computer system is also disclosed.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 4, 2018
    Inventors: Joshua DANIEL, Xiaofeng DU, Gery DUCATEL
  • Publication number: 20180225469
    Abstract: A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer acc
    Type: Application
    Filed: July 20, 2016
    Publication date: August 9, 2018
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL, Theo DIMITRAKOS
  • Publication number: 20180225611
    Abstract: A computer implemented method to provide allocation of one or more computing resources for a consumer computing component, each resource having a resource type and being provided by one or more resource providers, and the consumer having associated a quantity of tradeable value constraining an extent of resource consumption.
    Type: Application
    Filed: July 20, 2016
    Publication date: August 9, 2018
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Gery DUCATEL, Theo DIMITRAKOS
  • Publication number: 20180225466
    Abstract: A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorization to access the resource, the cryptocurrency being formed of tradable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorization to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of t
    Type: Application
    Filed: July 20, 2016
    Publication date: August 9, 2018
    Applicant: British Telecommunications Public Limited Company
    Inventors: Gery DUCATEL, Theo DIMITRAKOS, Joshua DANIEL
  • Publication number: 20180025166
    Abstract: A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.
    Type: Application
    Filed: February 10, 2016
    Publication date: January 25, 2018
    Applicant: British Telecommunications Public Limited Company
    Inventors: Joshua DANIEL, Theo DIMITRAKOS, Gery DUCATEL
  • Patent number: 9807106
    Abstract: A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: October 31, 2017
    Assignee: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    Inventors: Joshua Daniel, Gery Ducatel, Theo Dimitrakos
  • Publication number: 20170286083
    Abstract: A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.
    Type: Application
    Filed: August 27, 2015
    Publication date: October 5, 2017
    Applicant: British Telecommunications Public Limited Company
    Inventors: Theo DIMITRAKOS, Joshua DANIEL, Fadi EL-MOUSSA, Gery DUCATEL
  • Publication number: 20170286136
    Abstract: A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.
    Type: Application
    Filed: August 27, 2015
    Publication date: October 5, 2017
    Applicant: British Telecommunications Public Limited Company
    Inventors: Theo DIMITRAKOS, Joshua DANIEL, Fadi EL-MOUSSA, Gery DUCATEL
  • Publication number: 20170034197
    Abstract: A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.
    Type: Application
    Filed: July 29, 2016
    Publication date: February 2, 2017
    Inventors: Joshua DANIEL, Gery DUCATEL, Theo DIMITRAKOS
  • Publication number: 20100049762
    Abstract: An electronic document retrieval system is disclosed. It has particular utility to World-Wide Web searching. In contrast to conventional search engines, when providing supplementary results in addition to primary results, the system enables the supplementary results to include links to documents in web-sites other than the web-site to which the primary result belongs. In this way, a user is able to find the page most relevant to his query more rapidly than has hitherto been possible.
    Type: Application
    Filed: March 26, 2008
    Publication date: February 25, 2010
    Inventors: Zhan Cui, Nader Azarmi, Gery Ducatel
  • Publication number: 20070214154
    Abstract: A data repository stores data items with associated metadata values (21, 22 . . . 27), together with associated relatedness values (212, 217, 227) etc, defined between each pair of metadata values. In order to retrieve data, a ‘most relevant’ metadata value (21) is identified and data items associated with that metadata value are retrieved first. Other data items are ranked according to the relatedness value (217) of their associated metadata value (27) to the selected metadata value (21).
    Type: Application
    Filed: June 10, 2005
    Publication date: September 13, 2007
    Inventors: Gery Ducatel, Benham Azvine