Patents by Inventor Simon A Beddus
Simon A Beddus has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11657145Abstract: A containerisation orchestrator (26) is controlled by an analysis system (20, 21, 22) which assesses an application and a device for compatibility to have a candidate application installed on the device using the orchestrator. The analysis includes an assessment of the vulnerability of the installed application to failure or malicious attack, and a risk assessment of the consequences of such an event. The candidate containerised configuration (20) for the application is also assessed for compatibilities and vulnerabilities.Type: GrantFiled: October 25, 2018Date of Patent: May 23, 2023Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Claudia Cristina, Simon Beddus, Fadi El-Moussa
-
Publication number: 20230129367Abstract: A computer-implemented method of analysing anomalous network traffic in a telecommunications network, said telecommunications network comprising a plurality of network entities (120, 110) and a security analyser (130-3), wherein the method comprises the steps of: receiving at the security analyser a network communication from a first network entity; identifying the first network entity; by means of the security analyser: analysing the network communication and/or a performance of the first network entity thereby to identify the network communication as an anomalous communication (310); in response to identifying the network communication as an anomalous communication, communicating an instruction to the identified first network entity to respond with origin information regarding the anomalous communication, wherein the origin information identifies a preceding network entity from which the anomalous communication was directly received by the first network entity (320, 330); and commencing with the preceding nType: ApplicationFiled: March 5, 2021Publication date: April 27, 2023Inventors: Claudia CRISTINA, Simon BEDDUS, Fadi EL-MOUSSA
-
Patent number: 11620145Abstract: Containerised computing processes are generated by an orchestration processor interpreting user commands and user profile data to build a deployment specification specifying functions to be run by a containerised process, using a shell script run on a host virtualisation container. External events such as security threats and computing resource overloads can be used to generate the virtualised process, allowing vulnerability detection, and apply countermeasures such as deployment or migration of containers during attacks to lesser prone infrastructure, and allows the orchestration of non-container tools to provide security and resilience.Type: GrantFiled: May 11, 2018Date of Patent: April 4, 2023Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Simon Beddus, Claudia Cristina, Fadi El-Moussa
-
Patent number: 11595408Abstract: A web server operating in a container has resource and network limits applied to add an extra layer of security to the web server. If a monitor detects that the container's resource usage is approaching one or more of these limits, which may be indicative of a DDoS attack, (step 210) or identifies traffic sources exhibiting suspicious behaviour, such as frequently repeated requests from the same address, or from a related set of addresses, a restrictor function caps the resources allowed by the original Webserver container to allow it to recover from buffer overflow and protect servers running in other containers from overwhelming any shared resources. A duplicator function starts up replica containers with the same resource limits to take overflow traffic, and a load balancing function then directs incoming traffic to these overflow containers etc.Type: GrantFiled: May 11, 2018Date of Patent: February 28, 2023Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Simon Beddus, Claudia Cristina, Fadi El-Moussa
-
Patent number: 11283607Abstract: Actuators and sensors in an intelligent system are controlled by setting encryption types and key lengths to individual applications based on the type of device and application being run. A server system (1) running in a communications gateway, selects an encryption policy for one or more devices under its control. This selection is controlled by an analysis function (11) using data relating to the type of device (13), and the applications to be run on the device (14), to generate an appropriate encryption policy (12) which can be deployed to the device (37). Controlling the analysis and deployment in a gateway device allows co-ordination between devices, and reduces processor time in the devices. An agent is sent to the device alongside the encryption policy data, to control the device according to the encryption policy.Type: GrantFiled: April 25, 2019Date of Patent: March 22, 2022Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Claudia Cristina, Fadi El-Moussa, Simon Beddus
-
Patent number: 11206260Abstract: An intermediate data transmission device arranges for mutual authentication between itself and a remote terminal to allow data to be exchanged between the remote terminal and a server through the device. The server sends first and second key codes to the intermediate device, the key codes both being derived from a shared secret known to the server and remote terminal but not to the intermediate device. In response to a challenge from the intermediate device the remote terminal uses the shared secret to generate a duplicate of the first key code and transmits the duplicate to the intermediate device. The intermediate device compares the first key code and the duplicate of the first key code received respectively from the server and the remote terminal to verify the authenticity of the remote terminal.Type: GrantFiled: January 5, 2017Date of Patent: December 21, 2021Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Simon Beddus, Paul Deans
-
Publication number: 20210258151Abstract: Actuators and sensors in an intelligent system are controlled by setting encryption types and key lengths to individual applications based on the type of device and application being run. A server system 1 running in a communications gateway, selects an encryption policy for one or more devices under its control. This selection is controlled by an analysis function 11 using data relating to the type of device 13, and the applications to be run on the device 14, to generate an appropriate encryption policy 12 which can be deployed to the device (37). Controlling the analysis and deployment in a gateway device allows co-ordination between devices, and reduces processor time in the devices. An agent is sent to the device alongside the encryption policy data, to control the device according to the encryption policy.Type: ApplicationFiled: April 25, 2019Publication date: August 19, 2021Inventors: Claudia CRISTINA, Fadi EL-MOUSSA, Simon BEDDUS
-
Publication number: 20210157927Abstract: Network-based applications and virtualized components are deployed according to a security analysis of the infrastructure to be used and applications to be run on it. A specification of requirements (201) is analysed (211), together with potential devices (212) and network nodes (213), to determine an appropriate level of security to be applied, and a deployment specification of applications, services, security countermeasures, and networks is prepared that will satisfy the customer requirement and with known characteristics and vulnerabilities of the services. This analysis is used to generate a deployment specification (22), and finally the actual control of an orchestrator (23) to deliver the service. The deployed system can be continually monitored to ensure that the service continues to operate within requirements. Should an incident such as a network attack or failure occur the system is re-analysed against the original requirements and re-configured or repaired.Type: ApplicationFiled: April 25, 2019Publication date: May 27, 2021Inventors: Simon BEDDUS, Claudia CRISTINA, Fadi EL-MOUSSA
-
Publication number: 20200265134Abstract: A containerisation orchestrator (26) is controlled by an analysis system (20, 21, 22) which assesses an application and a device for compatibility to have a candidate application installed on the device using the orchestrator. The analysis includes an assessment of the vulnerability of the installed application to failure or malicious attack, and a risk assessment of the consequences of such an event. The candidate containerised configuration (20) for the application is also assessed for compatibilities and vulnerabilities.Type: ApplicationFiled: October 25, 2018Publication date: August 20, 2020Inventors: Claudia CRISTINA, Simon BEDDUS, Fadi EL-MOUSSA
-
Publication number: 20200195665Abstract: A web server operating in a container has resource and network limits applied to add an extra layer of security to the web server. If a monitor detects that the container's resource usage is approaching one or more of these limits, which may be indicative of a DDoS attack, (step 210) or identifies traffic sources exhibiting suspicious behaviour, such as frequently repeated requests from the same address, or from a related set of addresses, a restrictor function caps the resources allowed by the original Webserver container to allow it to recover from buffer overflow and protect servers running in other containers from overwhelming any shared resources. A duplicator function starts up replica containers with the same resource limits to take overflow traffic, and a load balancing function then directs incoming traffic to these overflow containers etc.Type: ApplicationFiled: May 11, 2018Publication date: June 18, 2020Inventors: Simon BEDDUS, Claudia CRISTINA, Fadi EL-MOUSSA
-
Patent number: 10685344Abstract: A method for controlling payment in a communications system including the steps of providing a service accessing a service provider from the or one user device, selecting a product for purchase from the service provider, the service agent receiving a request for payment from the service provider via a payment operator and the service agent issuing a payment authorisation to a payment provider via the payment operator. The service agent is installable in a variety of user devices and provides a uniform interface to the payment system from a plurality of the user devices. The service agent may also provide a uniform interface to an ordering system from a plurality of the user devices.Type: GrantFiled: July 13, 2006Date of Patent: June 16, 2020Assignee: BRITISH TLECOMMUNICATIONS PLCInventors: Huina Chua, Simon A Beddus, David Roxburgh
-
Publication number: 20200183716Abstract: Containerised computing processes are generated by an orchestration processor interpreting user commands and user profile data to build a deployment specification specifying functions to be run by a containerised process, using a shell script run on a host virtualisation container. External events such as security threats and computing resource overloads can be used to generate the virtualised process, allowing vulnerability detection, and apply countermeasures such as deployment or migration of containers during attacks to lesser prone infrastructure, and allows the orchestration of non-container tools to provide security and resilience.Type: ApplicationFiled: May 11, 2018Publication date: June 11, 2020Inventors: Simon BEDDUS, Claudia CRISTINA, Fadi EL-MOUSSA
-
Publication number: 20190014114Abstract: An intermediate data transmission device arranges for mutual authentication between itself and a remote terminal (4) to allow data to be exchanged between the remote terminal (4) and a server (1) through the device. The server (1) sends first and second key codes (CK, RK) to the intermediate device (step 105), the key codes both being derived from a shared secret known to the server and remote terminal but not to the intermediate device. In response to a challenge (107) from the intermediate device the remote terminal (4) uses the shared secret to generate a duplicate (CK*) of the first key code and transmits the duplicate to the intermediate device (step 109). The intermediate device compares the first key code and the duplicate of the first key code (CK, CK*) received respectively from the server (1) and the remote terminal (4) to verify the authenticity of the remote terminal (4).Type: ApplicationFiled: January 5, 2017Publication date: January 10, 2019Inventors: Simon BEDDUS, Paul DEANS
-
Patent number: 8935386Abstract: A method of determining the topology of at least part of a network comprising the steps of: monitoring traffic to and/or from a plurality of computers in the network; storing information relating to the monitored traffic for each of the plurality of computers, the information including an identifier of a requested service; selecting a first computer of the plurality of computers; reading the stored information related to the first computer and identifying, using the stored identifier of the requested service, at least one traffic flow to or from the first computer that corresponds to the requested service; using the stored information to identify the destination or origin of the identified traffic flow for the first computer, which traffic flow information includes the identifier of the requested service; using the identified destination or origin to identify one or more computers that are immediately upstream or downstream of the first computer, and determining a topology based on the identified one or moreType: GrantFiled: March 25, 2010Date of Patent: January 13, 2015Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: Michael R Hosking, Simon A Beddus, Gary L Bruce
-
Patent number: 8666940Abstract: A client server system uses a client subsystem, a server subsystem and an interconnecting data network. The client subsystem client application initiates a secure connection over the network with the server subsystem which includes a server application cooperating with the client application to complete a secure connection with the client application and which transmits output data over such a connection in response to requests for service by the client application. The server subsystem additionally generates a notification, in response to detecting an event in the absence of a secure connection between the server and the client, and transmits the notification to the notification server which forwards the notification over the interconnecting network to the client application.Type: GrantFiled: March 23, 2005Date of Patent: March 4, 2014Assignee: BRITISH TELECOMMUNICATIONS public limited companyInventors: David Roxburgh, Simon A Beddus, Patrick B Farley, Michael R Hosking
-
Publication number: 20120023230Abstract: A method of determining the topology of at least part of a network comprising the steps of: monitoring traffic to and/or from a plurality of computers in the network; storing information relating to the monitored traffic for each of the plurality of computers, the information including an identifier of a requested service; selecting a first computer of the plurality of computers; reading the stored information related to the first computer and identifying, using the stored identifier of the requested service, at least one traffic flow to or from the first computer that corresponds to the requested service; using the stored information to identify the destination or origin of the identified traffic flow for the first computer, which traffic flow information includes the identifier of the requested service; using the identified destination or origin to identify one or more computers that are immediately upstream or downstream of the first computer, and determining a topology based on the identified one or moreType: ApplicationFiled: March 25, 2010Publication date: January 26, 2012Inventors: Michael R. Hosking, Simon A. Beddus, Gary L. Bruce
-
Patent number: 8082318Abstract: A method and system for controlling service requests from a client to a server involves intercepting and controlling the transmission of service requests from the client to the server. The service requests are queued at the client and the transmission of the queued service requests are delayed to smooth the frequency of service requests transmitted to the server.Type: GrantFiled: August 30, 2002Date of Patent: December 20, 2011Assignee: British Telecommunications PLCInventors: Michael R Hosking, Simon A Beddus, Patrick B Farley, David Roxburgh
-
Publication number: 20110040585Abstract: A system for providing tickets to a user terminal (4), comprising a network interface (6) for communicating with the user terminals (4), a ticketing module (5) and a application interface to enable a number of ticket issuers and service providers to access the ticketing module.Type: ApplicationFiled: March 11, 2009Publication date: February 17, 2011Inventors: David Roxburgh, Simon A. Beddus, Michael R. Hosking
-
Publication number: 20090172077Abstract: Apparatus for delivering a message to a user comprising means for communicating with service providers and means for communicating with device agents operating on respective user devices, wherein the service provider communicating means is configured to receive a request to communicate with a specified user and to selectively output a message for the user to said device agent communicating means and wherein the device agent communicating means is configured to maintain a list of connected device agents, to receive said message and to transmit said message to a selected device agent dependent upon a routing policy for said user.Type: ApplicationFiled: November 23, 2006Publication date: July 2, 2009Inventors: David Roxburgh, Matthew W. Capp, Simon A. Beddus, Michael R. Hosking
-
Publication number: 20080201266Abstract: A method for controlling payment in a communications system including the steps of providing a service accessing a service provider from the or one user device, selecting a product for purchase from the service provider, the service agent receiving a request for payment from the service provider via a payment operator and the service agent issuing a payment authorisation to a payment provider via the payment operator. The service agent is installable in a variety of user devices and provides a uniform interface to the payment system from a plurality of the user devices. The service agent may also provide a uniform interface to an ordering system from a plurality of the user devices.Type: ApplicationFiled: July 13, 2006Publication date: August 21, 2008Inventors: Huina Chua, Simon A Beddus, David Roxburgh