BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Thurlow, Ian
Neild, Ian
Abstract
A method, an unmanned mobile entity and a computer program are provided for evaluating a performance of a first sensor unit which is arranged to measure a physical property of its environment at a location. An unmanned mobile entity transports a reference sensor unit to the location and the reference sensor unit is arranged to measure the physical property at the location. The performance of the first sensor unit is evaluated based on a comparison of the measurements of the first and reference sensor units.
G01D 18/00 - Testing or calibrating apparatus or arrangements provided for in groups
B64U 40/00 - On-board mechanical arrangements for adjusting control surfaces or rotorsOn-board mechanical arrangements for in-flight adjustment of the base configuration
B64U 101/00 - UAVs specially adapted for particular uses or applications
G01D 11/30 - Supports specially adapted for an instrumentSupports specially adapted for a set of instruments
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
El-Moussa, Fadi
Azvine, Behnam
Abstract
A computer-implemented security method comprising: generating a plurality of partial clones of a malware file, each partial clone reflecting a different aspect of the malware file; causing trial deployment of one or more security services on a software-defined network (SDN); causing each of the plurality of partial clones to be run on a respective host; causing resulting traffic to be routed over the SDN, via one or more network elements on which the security services are deployed; causing performance of each of the security services with respect to each of the plurality of partial clones to be monitored to produce a respective plurality of security service performance measures for each of the security services; and causing operational deployment of a selected one or more of the security services on a network, in dependence on the one or more pluralities of security service performance measures.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Healing, Alexander
Abstract
A computer-implemented method of simulating the propagation of malware in a network is provided. The method comprises accessing a model of the network, where the model comprises a plurality of computer nodes and where each computer node of the plurality of computer nodes is connected to at least one edge of a plurality of edges. Each edge of the plurality of edges connects a pair of computer nodes of the plurality of computer nodes. The method further comprises initiating an outbreak of the malware in the model at a predetermined source computer node of the plurality of computer nodes, and propagating the malware through the model of the network from the source computer node. The propagation is determined based on a rate of transmission, where the rate of transmission is based upon a contact rate for each edge of the plurality of edges, and the contact rate for each edge of the plurality of edges is based upon the network traffic passing between the computer nodes connected by that edge over a predetermined time period.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Herwono, Ian
El-Moussa, Fadi
Booth, Luke
Abstract
A computer implemented security method security method is described, for detecting attacks on a system or network. The method comprises defining a sequence of attack tactics, each attack tactic representing a generalisation of a set of attack techniques, associating one or more attack detection rules with each of the attack techniques, detecting attack events based on the attack detection rules, correlating the detected attack events with the attack tactics based on the attack technique associated with the attack detection rule used to detect the attack events, linking the detected attack events based on one or more criteria, and identifying one or more paths of attack techniques through the sequence in dependence on the linked attack events. The identified paths of attack techniques represent kill chains. The present technique makes it possible to identify new kill chains of known techniques, as well as making it possible to identify high-risk kill chains.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
To construct a neural network for image processing or other tasks, a population of software hox genomes is generated, each software hox genome encoding a neural network and comprising, for each of a plurality of zones of a neural network, a hox gene and at least one norm gene, where the norm gene encodes the zone and the hox gene controls at least one of: a quantity of instances of the zone in the neural network, a position of the zone in the neural network, a gradient of weights in the zone, a depth of nested zones within the zone, an amount of bias to be applied to weights in the zone. An evolutionary algorithm is applied to the population of software hox genomes where a fitness function of the evolutionary algorithm comprises a performance of a neural network encoded by a software hox genome on the image processing or other task.
G06N 3/082 - Learning methods modifying the architecture, e.g. adding, deleting or silencing nodes or connections
G06N 3/086 - Learning methods using evolutionary algorithms, e.g. genetic algorithms or genetic programming
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
Described are methods of managing content delivery in a network with a population of proxies, each proxy having one or more connected clients. The methods determine which content segments to transmit on a multicast channel by taking into consideration the requests for content segments by the clients. More particularly, the methods describe an approach that allows the skipping of specific segments that have been requested by client devices to a more recent segment for transmission over the multicast channel, so that the multicast channel can be brought closer to the live edge of the content quickly.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of simulating a propagation of a malware through a set of computer systems, the method comprising: identifying a simulated computer system infected with a simulated malware; determining a first signature of the simulated malware; determining that a mutation condition for the simulated malware has been met; and in response to determining that the mutation period has been met, changing the first signature of the simulated malware to a second signature.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Pena Rios, Anasol
Conway, Anthony
Zia, Muhammad, Saad
Anjum, Ashiq
Abstract
A digital twin is described for controlling entities such as software defined communications networks. Sensor data is observed from an entity and input to a digital twin of the entity, the digital twin comprising at least one learning block, and at least one physics block encoding a rule. The sensor data is processed through the learning block and the physics block such that the data follows a path through the digital twin through the blocks and along one or more connections between the blocks to generate an output. Automated control of the entity may be triggered in dependence on the generated output.
G05B 17/00 - Systems involving the use of models or simulators of said systems
B60W 40/00 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit
G05B 17/02 - Systems involving the use of models or simulators of said systems electric
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
Described are methods of managing content delivery in a network with a population of proxies, each proxy having one or more connected clients. The methods determine which content segments to transmit on a multicast channel by taking into consideration the requests for content segments by the clients. More particularly, a count is maintained of the number of times a content segment has been requested by a client device immediately after that client device has requested the content segment that has most recently been transmitted on the multicast channel. A content segment with a high value of this count is one that has been requested by many client devices immediately after the one most recently transmitted on the multicast channel and is therefore a good candidate to transmit next on the multicast channel.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abstract
A method of managing a decentralised repository of stored digital units of information, the decentralised repository comprised of a plurality of inter-acting peer-to-peer computing systems, comprising steps of: (a) loading a software agent on each of a plurality of peer-to-peer computing systems, the software agents making up a network of distributed software agents; (b) using the network of distributed software agents to manage the decentralized repository of stored digital units of information; wherein at least one of (i) software agent code for at least one of the software agents, and (ii) a cryptographic digest of such software agent code, is stored in at least one block in the decentralised repository.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Zhang, Yangyishi
Al Rawi, Anas
Abstract
A computer-implemented method for determining a transmit precoding operation to apply to a signal to be transmitted through a wireless channel via beamforming wherein the signal u is represented by a vector, u, is described. The method comprises obtaining an inverse channel matrix, G wherein the inverse channel matrix, G, is an inverse of a channel matrix, H, wherein the channel matrix, H, is a matrix representation of the wireless channel. The method further comprises determining a vector, b, that approximately minimizes a square of a norm of a result of applying the inverse channel matrix G to the sum of the vector representing the signal, u, and the vector, b, wherein the entries of the vector, b, are integers and determining the vector b.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Lord, Andrew
Abstract
There is herein disclosed an apparatus for performing quantum key distribution, the apparatus comprising a plurality of connected functional components which, in use, co-operate to perform quantum key distribution, wherein one or more of the plurality of functional components are functionally disconnectable from, and re-connectable to, the remainder of the plurality of functional components.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abstract
A method of managing storage units representing digital assets in a decentralised repository arranged in a peer-to-peer network comprising a plurality of peer computing systems, comprising steps of: selecting at least one storage unit hosted on a first peer computing system, where the selecting is carried out using selection criteria rules encoded in software; performing a cryptographic processing function taking as inputs information related to a current version of a first storage unit and information related to the selected at least one storage unit to generate a result as an output of the cryptographic processing function, where the first storage unit is hosted on a second peer computing system; and storing the result into a new version of the first storage unit.
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Scahill, Francis
Ringland, Simon
Abstract
Described are methods for managing the transmission of group addressed packets (such as broadcast and multicast packets) in a wireless local area network, where two or more access points share a coverage area but are not themselves in direct communication range of each other. The method determines this set of access points, and assigns a unique delay value to each of the set of access points. The respective delay values are then used by each access point to delay transmission of the group addressed packets. As a result, transmission of group addressed packets at the same time is avoided for these access points that share a coverage area but are not in direct communication with each other.
H04W 72/30 - Resource management for broadcast services
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04W 74/0816 - Non-scheduled access, e.g. ALOHA using carrier sensing, e.g. carrier sense multiple access [CSMA] with collision avoidance
15.
A TELECOMMUNICATIONS SYSTEM AND A METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
El-Moussa, Fadi
Reeves, Andrew
Abstract
A method (200) of operating a telecommunications system (100), said system comprising a/an: client device (110); set of servers (130) for providing a service to the client device; and authentication server (120) for generating an authentication ticket for provision of the service by the set of servers to the client device; the method comprising the steps of: generating at the authentication server: a set of encrypted levels of service (220), said set comprising at least two different levels of service, each of said levels: comprising a performance requirement; and being encrypted with a corresponding encryption key from a set of encryption keys; and an authentication ticket, for the client device and service, said ticket comprising the set of encrypted levels of service; communicating, to the set of servers; the authentication ticket (230); and performing a process comprising the steps of: communicating, to the set of servers, an encryption key, from the set of encryption keys, not yet having been communicated to the set of servers (240); processing, by the set of servers, the authentication ticket using said communicated encryption key, thereby to retrieve the performance requirement within the corresponding level of service (250); determining, by the set of servers, whether to provide the service in accordance, at least, with the retrieved performance requirement (250); and subsequent to said determining, identifying that provision of the service according to, at least, the retrieved performance requirement is (260): rejected by the set of servers (260-1), in response to which subsequently reiterating the process (240); or accepted by at least one of the servers (260-2), in response to which subsequently selecting one of said servers to provide the service according to, at least, the retrieved performance requirement (280).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
White, Catherine
Abstract
A method of exchanging quantum information between a photon and a micro/nano scale resonant structure is provided. The method comprises providing the resonant structure (15) in an optical waveguide (10). The method further comprises passing a photon (18) through the resonant structure in the optical waveguide. The method also comprises applying a driving signal (17) to the resonant structure to cause phonic oscillation of the resonant structure and to modulate a wavelength of the photon such that the passing the photon through the resonant structure results in an exchange of quantum information between the photon and a quantum state in a phonon of the resonant structure.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Herwono, Ian
El-Moussa, Fadi
Abstract
A computer-implemented method for monitoring a computer network is provided, the method comprising: storing a first attack graph, the attack graph comprising a plurality of nodes each representing an event that may occur within the computer network; storing one or more predetermined variation properties of one or more of the events represented by the nodes, the variation properties being indicative of possible changes to the nodes within the first attack graph; determining a plurality of possible alternative sequences of the nodes in the first attack graph based on the variation properties; generating a plurality of additional attack graphs, each of the additional attack graphs comprising a plurality of the nodes of the first attack graph arranged in one of the possible sequences; and monitoring events within the network to detect a set of events occurring in a sequence that corresponds to one of the additional attack graphs to identify a potential security attack. A computer system including at least one processor and memory storing computer program code configured to perform the said method, and a computer program or computer readable medium comprising instructions that when executed by a computer system cause the computer system to perform the said method are also provided.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Wallwork, Matthew
Cristina, Claudia
Georgalas, Nektarios
Abstract
A system, method and computer program for monitoring a subject are provided. The system comprises one or more sensors configured to collect data relating to the subject. The system further comprises a query pattern store configured to store one or more query patterns. Each query pattern is associated with a respective data processor for generating summary data based on the data, the summary data conveying less information about the subject than the data. The system further comprises a query processor configured to: receive a query regarding the subject from a user of the system; identify a query pattern that matches the query; determine whether the user is permitted to make queries matching that query pattern; and in response to determining that the user is permitted, provide a response to the query, the response comprising summary data generated using the respective data processor for that query pattern.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abstract
A method of storing storage units representing digital assets into a decentralised repository arranged in a peer-to-peer network comprising a plurality of peer computing systems, to create an archive of the digital assets, comprising steps of, for each new storage unit being submitted to the archive by a submitting peer computer system: determining a specific quantity of stored existing storage units, each of which the new storage unit is to be cryptographically linked to, where the existing storage units have been previously submitted to the archive; selecting specific ones of all of the existing storage units up to the received specific quantity of stored existing storage units, where the selection has been made from existing storage units stored by specific ones of the peer computing systems; performing cryptographic processing by taking as inputs to such cryptographic processing, the selected specific existing storage units and the new storage unit, and obtaining a result of such cryptographic processing; adding the result into the new storage unit; and distributing the new storage unit to a plurality of peer computing systems, thereby adding the new storage unit to the decentralised repository.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
20.
Method of operating a wireless telecommunications network
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Neild, Ian
Reeves, Andrew
Abstract
A method (400) of operating a wireless telecommunications network (100), said network comprising a plurality of User Equipment (110), UEs, a Wireless Access Point (120), WAP, and a Wireless Local Area Network (140), WLAN, provided by means of the WAP, the method comprising the steps of: associating, against each of the plurality of UEs, an item of information and a unique character slot for the item of information (410); compiling each item of information into a string, wherein said items of information are arranged according to each associated character slot (420); broadcasting, by means of the WAP, a network identifier for the WLAN, said network identifier comprising the compiled string (430); identifying, by means of each of the UEs, the broadcast network identifier (440); retrieving, by means of each UE, the character slot for the associated UE; and using, by means of each UE, the retrieved character slot so as to extract the associated item of information from the identified network identifier.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Neild, Ian
Reeves, Andrew
Abstract
A method of operating a wireless telecommunications network, said network comprising a plurality of User Equipment devices, UEs, a Wireless Access Point, WAP, and a Wireless Local Area Network, WLAN, provided by means of the WAP, the method comprising the steps of: associating, against each of the plurality of UEs, an item of information and a unique timeslot; determining a current time, and from said determination identifying, from the associated timeslots, a timeslot within which the current time coincides; broadcasting, by means of the WAP, for the WLAN, a network identifier comprising the item of information associated with the identified timeslot; identifying, by means of each of the UEs, the broadcast network identifier; and subsequently processing, by means of the UE associated with the identified timeslot, the identified network identifier, such that said UE derives the item of information allocated to said UE.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arokkiam, Jerome
Ringland, Simon
Abstract
This invention provides a method of operating a wireless local area network, the wireless local area network including a user device, a wireless access point and a wireless repeater, wherein the wireless repeater is configured to virtualise a Media Access Control, MAC, address of the user device when the user device is connected to the wireless repeater, the method comprising the steps of: obtaining data including a first plurality of records, wherein each record of the first plurality of records relates to the user device and includes a MAC address and a signal strength value; obtaining data including a second plurality of records, wherein each record of the second plurality of records includes a Basic Service Set Identifier, BSSID, and a signal strength value; for each MAC address in the first plurality of records: identifying a record of the second plurality of records having a BSSID that sufficiently matches the MAC address by determining a similarity between an Organisationally Unique Identifier, OUI, of the BSSID and the OUI of the MAC address, determining that a difference between the signal strength value associated with the identified record of the second plurality of records and the signal strength value associated with the MAC address of the first plurality of records is within a threshold, assigning a first hop repeater identifier to each record of the first plurality of records having the MAC address based on the BSSID of the identified record of the second plurality of records; and causing a reconfiguration in the wireless local area network based on the first hop repeater identifier.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hao, Mo
Dai, Linglong
Zhu, Jieao
Wan, Zhongzhichao
Mackenzie, Richard
Abstract
A method of encoding a concatenated polar code is provided, including evaluating channel reliabilities; selecting channels based on each channel's relative reliability; constructing a polar code of information bits arranged with a front and a rear; attaching additional cyclic redundancy checking (CRC) bits to the rear of the information bits; inserting parity bits at proper locations to yield a bit string; feeding the bit string into a polar encoder; and obtaining a codeword. A successive cancellation list and bit flipping decoding method for concatenated polar code also is provided, including initializing a LLR of the codeword; screening paths; performing a CRC check on the screened paths and if the CRC check is not met; determining, in response to the CRC check not being met, at least one most unreliable bit based on a revised critical set (RCS); reversing a previous decision if the most unreliable bit was previously selected; and restarting the decoding method.
H03M 13/29 - Coding, decoding or code conversion, for error detection or error correctionCoding theory basic assumptionsCoding boundsError probability evaluation methodsChannel modelsSimulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
H03M 13/11 - Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arokkiam, Jerome
Ringland, Simon
Abstract
This invention provides a method of operating a wireless local area network, the wireless local area network including a user device, a wireless access point and a wireless repeater, wherein the wireless repeater is configured to virtualise a Media Access Control, MAC, address of the user device when the user device is connected to the wireless repeater by changing the Organisationally Unique Identifier, OUI, of the MAC address, the method comprising the steps of: obtaining data including a plurality of records, wherein each record of the plurality of records relates to the user device and includes a MAC address and a device label of the user device, wherein at least one record of the plurality of records includes a MAC address that has been virtualised by the wireless repeater; processing each record of the plurality of records by: determining that the MAC address of the processed record is a local MAC address, and, if so, identifying another record of the plurality of records that is uniquely associated with the user device based on the MAC address of the processed record by determining a Network Interface Controller, NIC, value of the MAC address of the processed record, determining that the determined NIC value is uniquely associated with a device label in the plurality of records, and identifying another record of the plurality of records having the associated device label, and assigning a unique identifier to the processed record based on the MAC address of the identified other record of the plurality of records; analysing the plurality of records having the unique device identifier; and causing a reconfiguration in the wireless local area network based on the analysis.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khan, Kashaf
Turner, Benjamin
Abstract
Methods, system, and apparatus are disclosed for machine learning model monitoring in which the model is trained by a training process based on training data to model an approximation of a function such that, in use, the model generates output data for given input data. In one aspect, a computer-implemented method is disclosed comprising the steps of; triggering retraining of the model by a first logic component, responsive to monitoring output generated by the model, wherein the first logic component is defined based on a configuration including a definition of an acceptable measure of effectiveness of the model and one or more characteristics of the first logic component and triggering adjustment of the first logic component by a second logic component, responsive to monitoring a consistency of input data to the model, the adjustment including adjusting the configuration.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Burton, Fraser
Walker, Aaron
Hubert, Malcolm
Abstract
This invention provides device comprising: a transceiver configured to receive downlink signals and to transmit uplink signals, wherein the downlink signal has a first signal property and the uplink signal has a second signal property; a protective structure at least partially surrounding the transceiver; a first transmissive Reconfigurable Intelligent Surface, RIS, at least partially supported by the protective structure; and a second transmissive RIS at least partially supported by the protective structure, wherein: the downlink and uplink signals each pass through the protective structure, the first transmissive RIS and the second transmissive RIS, the protective structure is electromagnetically transparent, and the first transmissive RIS is configured to apply a downlink configuration to reconfigure the downlink signals having the first signal property communicated with the transceiver and the second transmissive RIS is configured to apply an uplink configuration to reconfigure the uplink signals having the second signal property communicated with the transceiver.
H01Q 1/42 - Housings not intimately mechanically associated with radiating elements, e.g. radome
H01Q 3/44 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the electric or magnetic characteristics of reflecting, refracting, or diffracting devices associated with the radiating element
H01Q 1/24 - SupportsMounting means by structural association with other equipment or articles with receiving set
27.
A DEVICE COMPRISING AN ANTENNA AND PROTECTIVE ENCLOSURE
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Burton, Fraser
Walker, Aaron
Hubert, Malcolm
Abstract
This invention provides device comprising: an antenna configured to receive signals in a first set of timeslots of a plurality of timeslots and further configured to transmit signals in a second set of timeslots of the plurality of timeslots; a first reflective Reconfigurable Intelligent Surface, RIS, configured to reconfigure reflected signals communicated with the antenna, wherein the first reflective RIS has a first configuration to reconfigure reflected signals in the first set of timeslots of the plurality of timeslots and a second configuration to reconfigure reflected signals in the second set of timeslots of the plurality of timeslots; and a protective structure at least partially surrounding the antenna and the first reflective RIS.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Burton, Fraser
Hubert, Malcolm
Walker, Aaron
Abstract
This invention provides a device comprising: a transceiver configured to receive signals in a first set of timeslots of a plurality of timeslots and further configured to transmit signals in a second set of timeslots of the plurality of timeslots; a protective structure at least partially surrounding the transceiver; and a first transmissive Reconfigurable Intelligent Surface, RIS, at least partially supported by the protective structure and configured to reconfigure signals communicated with the transceiver passing through the first transmissive RIS, wherein the first transmissive RIS is configured to apply a first configuration to reconfigure signals passing through the first transmissive RIS in the first set of timeslots of the plurality of timeslots and is further configured to apply a second configuration to reconfigure signals passing through the first transmissive RIS in the second set of timeslots of the plurality of timeslots.
H01Q 1/42 - Housings not intimately mechanically associated with radiating elements, e.g. radome
H01Q 3/44 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the electric or magnetic characteristics of reflecting, refracting, or diffracting devices associated with the radiating element
H01Q 15/00 - Devices for reflection, refraction, diffraction or polarisation of waves radiated from an antenna, e.g. quasi-optical devices
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sani, Sadiq
Abstract
A computer implemented method for detecting anomalous behaviour within a system is provided. The method generates an autoencoder for detecting anomalous behaviour within the system. The method also generates a classifier for predicting a classification of behaviour within the system. An input to the classifier comprises an output from one or more internal layers of the autoencoder. The method jointly trains the autoencoder and the classifier using a set of training data comprising a plurality of sample inputs that represent normal behaviour within the system and a plurality of sample inputs that represent anomalous behaviour within the system. The training is based on an output from a joint loss function that is configured to combine any reconstruction loss from the autoencoder with any prediction error from the classifier. The joint loss function is further configured to negate any reconstruction loss of the autoencoder in response to the sample input representing anomalous behaviour within the system. The trained autoencoder is used to classify a behaviour of the system as being normal or anomalous.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Bull, Nicola
Abstract
A method for monitoring a network can include determining whether there is a performance issue in respect of streamed communication carried via a first network connection between a first customer premise equipment (CPE) in a local area network (LAN) and one or more remote entities outside the LAN, wherein the determination is based on data from the streamed communication. In response to determining that there is a performance issue in respect of the streamed communication carried via the first network connection, it is determined whether there is a performance issue in respect of the first network connection. In response to determining that there is a performance issue in respect of the first network connection, a monitoring process is triggered to determine whether there is a performance issue in respect of other network connections connecting to a set of other CPEs, in respective other LANs, so as to define a cluster of CPEs exhibiting performance issues in respect of their network connections, the cluster being for identifying a candidate cause of the performance issue in respect of the streamed communication.
H04L 43/0811 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
A 3D printed antenna device comprising a cavity connected between an anode and a cathode and configured to resonate at a predetermined frequency and power to generate an output feed; and an antenna element configured to receive the output feed from the cavity.
H01Q 3/34 - Arrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the relative phase or relative amplitude of energisation between two or more active radiating elementsArrangements for changing or varying the orientation or the shape of the directional pattern of the waves radiated from an antenna or antenna system varying the distribution of energy across a radiating aperture varying the phase by electrical means
B33Y 80/00 - Products made by additive manufacturing
H01Q 1/36 - Structural form of radiating elements, e.g. cone, spiral, umbrella
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lord, Andrew
Abstract
There is herein described a method of performing Quantum Key Distribution (QKD), the method comprising generating a first quantum key by performing QKD between a first quantum transmitter at a first quantum node and a quantum receiver at a second quantum node, generating a second quantum key by performing QKD between the quantum receiver at the second quantum node and a second quantum transmitter at a third quantum node, encrypting data using the second quantum key, transmitting the encrypted data from the second quantum node to the third quantum node, wherein the data comprises, the first quantum key; and/or data received at the second quantum node from the first quantum node.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Tukmanov, Anvar
Shojaeifard, Arman
Abstract
This disclosure provides a method of operating a transmitting node in a wireless telecommunications network, wherein the transmitting node is configured to transmit data to a first receiving node, the method including determining that a first spatial path count for transmissions between the transmitting node and first receiving node satisfies a first Signal to Interference plus Noise Ratio (SINR) threshold and a first capacity threshold; and causing the transmitting node to use the determined first spatial path count in transmissions to the first receiving node.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Azvine, Behnam
Sajjad, Ali
Abstract
An aspect of the disclosure relates to a computer-implemented method of operating a software-defined network, the method comprising: initialising a plurality of paths through a data plane for traffic associated with a category of applications and/or services; selecting one of the plurality of paths to be an initial operational path; routing traffic associated with the category of applications and/or services via the initial operational path; subsequently obtaining data indicating that a trigger event has occurred; and responsive thereto: selecting a different one of the plurality of paths to be a replacement operational path; and routing traffic associated with the category of applications and/or services via the replacement operational path. Further aspects relate to a data processing system, a computer program, a computer-readable data carrier, and a data carrier signal.
H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arokkiam, Jerome
Abstract
This disclosure provides a method of analyzing a wireless local area network, the wireless local area network including a plurality of devices wherein at least one device of the plurality of devices is configured to change its Media Access Control (MAC) address, the method including obtaining training data including a plurality of records, wherein each record of the plurality of records relates to a device of the plurality of devices, the training data specifying, for each record: a MAC address, and a set of performance metrics; training a machine learning model, based on the obtained training data, to output a MAC address based on the set of performance metrics; obtaining further data including a plurality of records, wherein each record of the plurality of records relates to a device of the plurality of devices and includes a set of performance metrics; determining a MAC address for each record of the further data by inputting the set of performance metrics of the further data to the trained machine learning model; and analyzing the set of performance metrics for a plurality of records of the further data having the same determined MAC address.
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/085 - Retrieval of network configurationTracking network configuration history
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Poustie, Alistair
Abstract
A semiconductor laser (100) comprising: a first grating (170-1) for providing optical feedback for lasing, in which the first grating is configured to produce laser light at a set of wavelengths over a first set of temperatures; a second grating (170-2) for providing optical feedback for lasing, in which the second grating is configured to produce laser light at the same set of wavelengths over a second set of temperatures that is different to the first set of temperatures; a temperature sensor (130) for sensing temperature of the semiconductor laser; a controller (120), in communication with the temperature sensor, configured to operate the semiconductor laser so as to output a laser beam (180) within the set of wavelengths, said laser beam being produced by the: first grating when the temperature sensor senses a temperature within the first set of temperatures; and second grating when the temperature sensor senses a temperature within the second set of temperatures.
H01S 5/068 - Stabilisation of laser output parameters
H01S 5/06 - Arrangements for controlling the laser output parameters, e.g. by operating on the active medium
H01S 5/12 - Construction or shape of the optical resonator the resonator having a periodic structure, e.g. in distributed feedback [DFB] lasers
H01S 5/40 - Arrangement of two or more semiconductor lasers, not provided for in groups
H04B 10/00 - Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
H01S 5/02251 - Out-coupling of light using optical fibres
H01S 5/02255 - Out-coupling of light using beam deflecting elements
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Roscoe, Jonathan
Abstract
A computer-implemented method of training a multi-agent system for influencing the operation of a physical system to achieve an overriding objective relating to an intended state of the physical system is provided. The method comprises performing a respective reinforcement learning process for each of a plurality of heterogeneous intelligent agents that comprise the multi-agent system. The reinforcement learning process for each agent is conducted within a respective environment that provides a representation of the physical system. Each agent is trained to achieve a respective objective within their respective environment by carrying out one or more actions selected from a respective set of available actions for that agent. The training for each agent is based on a respective reward that is determined by the respective reinforcement learning process for each of the training steps. The reinforcement learning processes are performed such that each training step is completed across all of the reinforcement learning processes before the next training step is undertaken. The method further comprises, for each training step: determining the respective reward for each of the intelligent agents after the actions of all of the intelligent agents for that training step have taken place. The respective reward is based on: a state of that agent's respective environment in relation to the respective objective for that agent; and a state of the physical system in relation to the overriding objective.
G06N 3/098 - Distributed learning, e.g. federated learning
G06N 3/006 - Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Reeves, Andrew
Neild, Ian
Zoualfaghari, Mohammadhossein
Abstract
A method of operating a wireless telecommunications network, said network comprising a plurality of User Equipment devices, UEs, a Wireless Access Point, WAP, and a Wireless Local Area Network, WLAN, provided by means of the WAP, the method comprising the steps of: allocating, to each of the plurality of UEs, an item of information; encoding, by code-division multiplexing, the allocated items of information, thereby to output a signal string; assigning to the WLAN a network identifier, wherein said network identifier is derived from the output signal string; broadcasting, by means of the WAP, the assigned network identifier; retrieving, by means of each of the UEs, the signal string from the broadcast network identifier; and subsequently performing, by each of the UEs, code-division demultiplexing upon the retrieved signal string, each given UE thereby outputting the item of information allocated to that given UE. Methods of operating the UE and WAP are also described, as well as the wireless telecommunications network, UE and the WAP.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arokkiam, Jerome
Ringland, Simon
Scahill, Francis
Abstract
This disclosure provides a method of analyzing a wireless local area network, the wireless local area network including a plurality of devices wherein at least one device of the plurality of devices is configured to change its Media Access Control (MAC) address, the method including obtaining data including a plurality of records, wherein each record of the plurality of records relates to a device of the plurality of devices and includes: a device label, a MAC address, and a set of performance metrics; for each device label in the plurality of records, determining a uniqueness value for that device label based on a count of records in the plurality of records having that device label; processing each record of the plurality of records so as to assign a unique identifier to the record by determining that the MAC address of the record is a local MAC address and that the uniqueness value of the device label satisfies a uniqueness threshold; and analyzing the set of performance metrics for a plurality of records having the same unique identifier.
H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mehran, Farhad
Abstract
This disclosure provides a method in a wireless telecommunications network having an access point and a User Equipment (UE), wherein communications between the access point and the UE utilise Non-Orthogonal Multiple Access (NOMA) and a position of the UE is used by the access point in communications to the UE, the method including obtaining data indicative of one or more properties of the UE; determining a new position reporting rate for the UE based on the one or more properties; and causing the UE to vary its position reporting rate so as to use the new position reporting rate.
H04W 52/28 - TPC being performed according to specific parameters using user profile, e.g. mobile speed, priority or network state, e.g. standby, idle or non-transmission
H04W 52/26 - TPC being performed according to specific parameters using transmission rate or quality of service QoS [Quality of Service]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Bussey, Liam
Lees, Amelia
Burton, Fraser
Menchetti, Marco
Whitley, Timothy
Abstract
This invention provides a method of detecting a photon in a first frequency range, the method comprising the steps of: exciting a first transmission medium by a first probe signal at a first probe frequency, wherein the first probe signal excites electrons of the first transmission medium from a ground state of the first transmission medium to a first excited state of the first transmission medium; exciting the first transmission medium by a first coupling signal at a first coupling frequency, wherein the first coupling signal overlaps with the first probe signal in the first transmission medium and excites electrons of the first transmission medium to a predetermined excited state of the first transmission medium such that a first photon in the first frequency range and having a first polarisation incident upon the first transmission medium excites an electron in the predetermined excited state of the first transmission medium to a further excited state of the first transmission medium, wherein a first photon in a second frequency range is emitted as part of a subsequent deexcitation of the electron from the further excited state of the first transmission medium; detecting the first photon in the first frequency range and having the first polarisation by detecting the first photon in the second frequency range; exciting a second transmission medium by a second probe signal at a second probe frequency, wherein the second probe signal excites electrons of the second transmission medium from a ground state of the second transmission medium to a first excited state of the second transmission medium; exciting the second transmission medium by a second coupling signal at a second coupling frequency, wherein the second coupling signal overlaps with the second probe signal in the second transmission medium and excites electrons of the second transmission medium to a predetermined excited state of the second transmission medium such that a second photon in the first frequency range incident upon the second transmission medium and having a second polarisation excites an electron in the predetermined excited state of the second transmission medium to a further excited state of the second transmission medium, wherein a second photon in the second frequency range is emitted as part of a subsequent deexcitation of the electron in the further excited state of the second transmission medium; and detecting the second photon in the first frequency range having the second polarisation by detecting the second photon in the second frequency range. This invention also provides a detector and system for implementing said method.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Di Cairano-Gilfedder, Carla
Conway, Anthony
Leon Garza, Hugo
San Cayo Villar, Nuria
Free, Michael
Abstract
A system to verify the correctness of equipment installation configured to perform the steps of: accessing a digital model of the equipment; receiving a representation of the equipment indicating a configuration of the equipment, Accessing installation-specific metadata associated with the installation of the equipment; Predicting at least one behaviour of the equipment based on metadata associated with installation of the equipment; Accessing service information comprising at least one measured behaviour of the equipment; Comparing the representation with the model to determine a first degree of conformity of the equipment with the model of the equipment; if the first degree of conformity is within a first threshold degree of conformity, comparing the at least one predicted behaviour with the at least one measured behaviour to determine a second degree of conformity of the equipment with the service information; and if the second degree of conformity is within a threshold second degree of conformity, verifying to an operator that the equipment is correctly installed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Di Cairano-Gilfedder, Carla
Conway, Anthony
Leon Garza, Hugo
San Cayo Villar, Nuria
Free, Michael
Abstract
An automated equipment installation verification system to automatically train a model for detecting installed equipment, the system comprising the steps of: accessing a digital model of the equipment; receiving a representation of the equipment indicating a configuration and/or status of the equipment; predicting at least one behaviour of the equipment based on the representation; accessing service information comprising at least one measured or inferred behaviour of the equipment; comparing the representation with the model to determine a first degree of conformity of the representation of the equipment with the model of the equipment; if the first degree of conformity is within a first threshold degree of conformity, comparing the at least one predicted behaviour with the at least one measured or inferred behaviour to determine a second degree of conformity of the representation with the service information; and if the second degree of conformity is within a threshold second degree of conformity, outputting the representation to a data store as training data for detecting the installed equipment.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
A computer system for generating and updating a dynamic knowledge graph, comprising: a data ingest layer configured to obtain a data set; and an agent module configured to: A. generate an initial plurality of nodes representative of the data set, each node having metadata associated therewith; B. associate an agent with each of the initial plurality of nodes, each such agent being configured to automatically establish one or more links between the node with which that agent is associated and one or more other nodes; and C. cause the agents to run to generate an initial knowledge graph comprising the initial plurality of nodes interlinked by an initial set of edges.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sajjad, Ali
Zia, Syed
Memon, Jamshed
Abu-Tair, Mamun
Abstract
Attestation method for verifying the integrity of an attester device by an attestation proxy (AP): sending a trusted platform module (TPM) quote request message directly to a virtual TPM (vTPM) uniquely associated with the attester device, to prompt the vTPM to: produce a set of platform configuration register (PCR) values based on measurements requested and received by the vTPM directly from the attester device, then send a TPM quote comprising the set of PCR values directly to the AP; the attestation method further comprising the AP: receiving the TPM quote; sending the TPM quote to a remote relying party (RP) to prompt the RP to: verify the TPM quote is as expected, then return a remote attestation indicator to the AP; receiving the remote attestation indicator; and producing an attestation result based on the remote attestation indicator, wherein the attestation result is negative when the remote attestation indicator is negative.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mehran, Farhad
Abstract
This disclosure provides a method of managing users in a wireless telecommunications network having a first access point and a second access point, wherein the first access point communicates with a first set of users using Non-Orthogonal Multiple Access (NOMA) and the second access point communicates with a second set of users using NOMA, the method including obtaining data indicating Inter-User-Interference (I U I) for users of the first access point; obtaining data indicating IUI for users of the second access point; and based on the IUI for users of the first access point and the IUI for users of the second access point, identifying one or more users to transfer between the first and second access point; and causing a transfer of the one or more users identified for transfer.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
Smith-Creasey, Max
Martins Andrade, Tiago
Abstract
A method, computer system and computer program are provided for validating a secure authentication token for accessing an application. The method captures a user gesture provided by a user as an authentication token and analyses the gesture to evaluate a measure of complexity of the gesture. Responsive to a determination that the measure of complexity does not meet a minimum measure of complexity, repeating the capturing and analysing steps until the gesture meets the defined measure of complexity. Then the user is requested to repeat the approved gesture and the repeated gesture is captured, and it is determined if the repeated gesture meets defined requirements for repeatability. Responsive to a determination that the repeated gesture does not meet the requirements for repeatability, the method is repeated; and, responsive to a determination that the repeated gesture does meet the requirements for repeatability, the gesture is validated as a secure authentication token.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Martins Andrade, Tiago
Roscoe, Jonathan
Smith-Creasey, Max
Abstract
A method, computer system and computer program are provided for achieving a secure authentication token for accessing an application. The method captures a user gesture provided by a user as an authentication token and analyses the gesture to evaluate a measure of complexity of the gesture. Responsive to a determination that the measure of complexity does not meet a minimum measure of complexity, an amendment is determined and proposed to the gesture to increase a complexity of the gesture. The capturing and analysing steps are repeated, and, responsive to a determination that the gesture meets the minimum measure of complexity, the gesture is approved as a secure authentication token.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
A computer system for dynamically updating a knowledge graph, the system comprising: an ingest layer configured to obtain further data; and an update module configured to: I-a. update the metadata associated with one or more of a plurality of nodes in the knowledge graph based on the further data, and/or I-b. generate one or more further nodes based on the further data; then II. generate an updated knowledge graph comprising an updated set of edges by forming and/or dissolving links between nodes in dependence on metadata associated with the nodes, wherein: a propensity of the update module to form edges between nodes depends on dynamically configurable connection an/or decay parameters; wherein the ingest layer and update module are configured to iteratively repeat respectively obtaining further data and performing steps I-a to II until a termination criterion is met.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
GILKS, Daniel (United Kingdom)
Inventor
Sun, Qiushuo
Singh, Alok
Abstract
This invention provides a device for a wireless telecommunications network, a system comprising the device and a method of operating the device, the wireless telecommunications network comprising: a Rydberg-atom based electromagnetic field detector; and an electromagnetic signal generator, the electromagnetic signal generator being configured to output a plurality of optical signals, each having a distinct frequency, wherein the electromagnetic signal generator comprises a stabilising module configured to stabilise each optical signal of the plurality of optical signals to their respective frequency; the device comprising: a receiver configured to receive, from the signal generator: a first optical signal having a first frequency for use in the Rydberg-atom based electromagnetic field detector, and a reference signal, the reference signal having been derived from two optical signals of a plurality of optical signals output by the electromagnetic signal generator, the reference signal having a reference frequency; and a frequency controller module configured to receive the reference signal and adjust the frequency of the first optical signal, wherein the frequency adjustment of the first optical signal is derived from the reference frequency of the reference signal.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Fang, Feiyu
Kekempanos, Lykourgos
Gilks, Daniel
Abstract
Presented is a method of detecting a loop length change in a digital subscriber line. An Uncalibrated Echo Response (UER) trace is obtained from the digital subscriber line by running a Single Ended Line Test (SELT). A historical (baseline) UER trace from the same line is retrieved. A line that has experienced a small change in loop length will have the same overall shape, but be compressed or stretched in the frequency domain. Thus, to detect such a change, a comparison between the two traces is made to determine if the difference between the two traces is less than a threshold but non-zero. Then a range of scale factors are applied in the frequency domain on either one of the traces, before determining which of the scale factors results in the lowest difference between the unscaled and scaled traces. The determined scale factor is above a certain threshold, then the line is determined to have had a loop length change. The value of the scale factor can be used to determine the amount the length has changed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Cuevas Ramirez, Maria
Abstract
A method (200) of operating a telecommunications network (100), said telecommunications network comprising a cellular telecommunications network (100-1) and a non-cellular telecommunications network (100-2), wherein both of said networks are accessible to a User Equipment (110), UE, the method comprising the steps of: establishing a network connection between the UE and the cellular telecommunications network via the non-cellular telecommunications network (210); obtaining, by means of the cellular telecommunications network, a: unique cellular subscriber identity associated with the UE and for accessing the cellular telecommunications network; and network address associated with the UE and for use with the non-cellular telecommunications network for the network connection (220); generating an identifier for identifying the UE to the non-cellular telecommunications network (230); generating, by means of the cellular telecommunications network, a mapping between the: identifier; unique cellular subscriber identity; and the network address; and receiving, at the non-cellular telecommunications network, based on the generated mapping, the identifier in association with the network address (240).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Magalhaes Marques, Pedro
Abstract
The present disclosure relates to reinforcement learning (RL) agents, for example for cybersecurity and network management applications. Proposed herein is an RL computer system comprising one or more processor modules configured to perform a task by enacting a series of actions on a graph-based environment, each action being defined by a series of two or more sub-actions, the RL computer system comprising a corresponding series of RL sub-agents, each RL sub-agent being configured to perform a respective sub-action of the series of sub-actions; wherein: the series of RL sub-agents have been individually trained by assignment of sub-rewards to respective sub-agents of the series; and a sub-graph filter sub-agent of the series of RL sub-agents is configured to configure a sub-graph filter to apply a selected one of a plurality of filter techniques to select a sub-graph from a graph represented in the graph-based environment.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
HAO, Mo (China)
Inventor
Dai, Linglong
Xu, Zhuo
Wan, Zhongzhichao
Mackenzie, Richard Thomas
Hao, Mo
Zhang, Yangyishi
Abstract
This invention provides a method of beam training in a wireless telecommunications network, and a device for implementing said method, the wireless telecommunications network comprising a transmitter, a Reconfigurable Intelligent Surface, RIS, and a receiver, the method comprising the steps of: iteratively, obtaining a plurality of reflecting beamforming configurations for the RIS, each reflecting beamforming configuration defining a multi-location reflection beam covering a set of locations, causing configuration of the RIS according to each reflecting beamforming configuration so as to reflect signals from the transmitter according to each multi-location reflection beam, obtaining data indicating a received power of each multi-location reflection beam at the receiver, and identifying a candidate multi-location reflection beam of the multi-location reflection beams based on the power of the multi-location reflection beam at the receiver, so as to identify a plurality of candidate multi-location reflection beams; identifying a location that is a member of each candidate multi-location reflection beam of the identified plurality of candidate multi-location reflection beams; generating a reflecting beamforming configuration for the RIS based on the identified location; and causing configuration of the RIS according to the generated reflecting beamforming configuration.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Parkin, Neil
Fleming, Lauren
Abstract
A method (300) of operating a fibre optic network (100), said network comprising: a terminal laser for transmitting a first optical signal having a first pulse width; an Optical Time-Domain Reflectometer (120), OTDR, for measuring the first optical signal thereby to perform diagnostics upon the fibre optic telecommunications network; at least one Optical Network Unit (160), ONU; an optical signal generator (170), arranged between the OTDR and the at least one ONU, and comprising: a photosensor (230) for sensing the first optical signal from the terminal laser; and a light source (270) for transmitting a second optical signal to the at least one ONU, the second optical signal having a second pulse width; the method comprising the steps of: transmitting, by means of the terminal laser, the first optical signal to the optical signal generator (310); detecting, by means of the photosensor, the first optical signal (330); transmitting, in response to said detecting, and by means of the light source, the second optical signal to the at least one ONU (340), wherein the second pulse width is shorter than the first pulse width.
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
HAO, Mo (China)
Inventor
Dai, Linglong
Xu, Zhuo
Wan, Zhongzhichao
Mackenzie, Richard
Hao, Mo
Yangyishi, Zhang
Abstract
This invention provides a method of beam training in a wireless telecommunications network, and a device for implementing said method, the wireless telecommunications network comprising a transmitter, a Reconfigurable Intelligent Surface, RIS, and a receiver, the method comprising the steps of: iteratively, obtaining a plurality of reflecting beamforming configurations for the RIS, each reflecting beamforming configuration defining a multi-location reflection beam covering a set of locations, causing configuration of the RIS according to each reflecting beamforming configuration so as to reflect signals from the transmitter according to each multi-location reflection beam, obtaining data indicating a received power of each multi-location reflection beam at the receiver, and identifying a candidate multi-location reflection beam of the multi-location reflection beams based on the power of the multi-location reflection beam at the receiver, so as to identify a plurality of candidate multi-location reflection beams; identifying a location that is a member of each candidate multi-location reflection beam of the identified plurality of candidate multi-location reflection beams; generating a reflecting beamforming configuration for the RIS based on the identified location; and causing configuration of the RIS according to the generated reflecting beamforming configuration.
H04B 7/04 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
Described are methods of managing content delivery in a network with a population of proxies, each proxy having one or more connected clients. The methods determine which content segments to transmit on a multicast channel by taking into consideration the requests for content segments by the clients. More particularly, information relating to requests for segments by one or more clients received from one or more proxies is used to maintain a count of the number of requests made for each given segment. Then a given segment is triggered for transmission over multicast when the count of the number of requests for that given segment reaches or exceeds a predetermined threshold.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Turnbull, Rory
Roper, Ivan
Appleby, Stephen
Stevens, Timothy
Nilsson, Michael
Abstract
A home gateway device comprising a processor and a memory storing a domain name algorithm which receives as input an identifier associated with the home gateway device and which computes a domain name as a function of the identifier, is described. The memory stores instructions that when executed by the processor, cause the processor to configure a local DNS in the home gateway device to resolve the domain name to an edge server associated with the home gateway device.
H04L 61/3015 - Name registration, generation or assignment
H04L 61/4511 - Network directoriesName-to-address mapping using standardised directoriesNetwork directoriesName-to-address mapping using standardised directory access protocols using domain name system [DNS]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sajjad, Ali
Zia, Syed
Memon, Jamshed
Abu-Tair, Mamun
Abstract
A method comprising an attestation proxy (AP): sending a trusted platform module (TPM) quote request message directly to a virtual TPM (vTPM) uniquely associated with an attester device, to prompt the vTPM to: produce a set of platform configuration register (PCR) values based on measurements requested and received by the vTPM directly from the attester device, then send a TPM quote comprising the set of PCR values directly to the AP; the attestation method further comprising the AP: receiving the TPM quote; retrieving, from a local copy of a distributed ledger (DL), a latest set of PCR values recorded for the attester device; comparing that set of PCR values retrieved from the local copy of the DL with the set of PCR values received in the TPM quote to generate a local attestation indicator; and producing an attestation result based on the local attestation indicator.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
El-Moussa, Fadi
Abstract
A method for monitoring or validating device compliance of the attributes of a device on a network, the method including providing a first tree data structure including compliance data associated with a network; performing a comparison of the first tree data structure with a second tree data structure comprising attribute data associated with an electronic device to compare the compliance data with the attribute data; and determining, based on the comparison, whether the electronic device is compliant with the network.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
El-Moussa, Fadi
Abstract
A method for monitoring or validating compliance of the attributes of a device (709) on a network (703), the method including: obtaining, from a distributed ledger technology (701), a first tree data structure including compliance data associated with a network-(703), and a second tree data structure comprising attribute data associated with an electronic device (709); comparing the first tree data structure (705) with the second tree data structure to compare the compliance data with the attribute data; and determining, based on the comparison, whether the electronic device (709) is compliant with the network (703).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Gower, Andrew
Rennison, Jonathan
Craigie, Roland
Abstract
A method of streaming video content, the video content comprising a captured image of a field of view of a camera, the method comprising determining Cartesian co-ordinates of a point of interest in the field of view in a Cartesian co-ordinate system of the camera, converting the determined Cartesian co-ordinates from the Cartesian co-ordinate system to a spherical co-ordinate system of the camera to produce spherical co-ordinates of the point of interest, the spherical co-ordinates being suitable for use in orientating the captured image for display on a display device.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Andrade, Tiago
Pena-Rios, Anasol
Smith-Creasey, Max
Bahceci, Ozkan
Abstract
User personality traits classification for adaptive virtual environments in non-linear story paths A method of providing adaptive training to a user in a training environment is provided. The method comprises generating, by a machine learning agent, a training scenario for a user, wherein the training scenario is generated based on a personality biometric profile and one or more personality characteristics of the user. The user is trained in a training session using the training scenario wherein, during the training session, the machine learning agent modifies the training scenario in real time based on user behavioural data that reflects the user's behaviour in the training session.
G09B 7/04 - Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by the student characterised by modifying the teaching programme in response to a wrong answer, e.g. repeating the question, supplying a further explanation
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
A method of managing content delivery to a client device by a proxy, where the content is made up of a sequence of segments. The proxy starts off by receiving content requests from the client device over unicast, and fulfilling those requests by forwarding them to a content server, and receiving that content over unicast before forwarding onto the client device. The proxy then determines that a multicast channel should be joined to more efficiently receive the content. However, the multicast channel is likely to be ahead of the available unicast data. Therefore, a multicast join command is delayed until the proxy has taken steps to obtain subsequent content by unicast faster than that content is being requested by the client device, so that the obtained content has caught up with the content available on the multicast channel. The proxy can do so by requesting some of this content from the re-transmission server in advance of it being requested by the client device, and some from the content server in response to requests from the client device. Only when the requested content has caught up with the multicast channel does the proxy take action to join the multicast channel.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Cristina, Claudia
Wallwork, Matthew
Bayakly, Fadi
Wilks, David
Beddus, Simon
Abstract
A computer implemented methods, computer systems and computer programs are provided for deploying a service to edge compute nodes located at the edge of a radio access network that are dispersed throughout a geographical area and for accessing the service from the same. The method for deploying the service receives a travel plan for a mobile entity, the travel plan indicating a route for an intended journey by the mobile entity through the geographical area. The method further selects at least one edge compute node in the network for providing the service to the mobile entity during the intended journey. The at least one edge compute node is selected based, at least in part on a geographical proximity of the at least one edge compute node to the route. The method further deploys a respective instance of the service to each of the at least one edge compute nodes so that it is accessible by the mobile entity while undertaking the intended journey. The method further provides a communications plan to the mobile entity, the communications plan indicating how the at least one instance of the service can be accessed during the intended journey.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
Martins Andrade, Tiago
Baxandall, Oliver
Abstract
A method for processing data performed by one or more processors, the method comprising: receiving input data that comprises a plurality of elements, each element comprising a plurality of attributes; and generating geometric data based on the input data by determining locations in a space for elements of the plurality of elements based on attributes of the elements and generating geometries in the space for the elements at the respective determined locations, wherein determining locations in the space for elements based on attributes of the elements comprises performing clustering on the elements based on attributes of the elements. The method may further comprise generating Geographic Information System, GIS, data by encoding the generated geometric data in a GIS format.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
El-Moussa, Fadi
Abstract
A method of recording a network path in a network that includes a plurality of nodes is provided. The network path includes a source node, a destination node, and one or more intermediate nodes. The method includes receiving, at an intermediate node, a transaction, the transaction including a first cryptographic object and signatures of at least a subset of any preceding intermediate nodes in the network path; generating, by the intermediate node, a second cryptographic object based on the first cryptographic object; updating, by the intermediate node, the transaction with a signature of the intermediate node and with the second cryptographic object; and sending, from the intermediate node, the transaction to a succeeding node in the network path. Each cryptographic object allows the transaction to be verified up to the node that generated that cryptographic object. Nodes and a system for implementing the method are also provided.
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Abu-Tair, Mamun
Herwono, Ian
Perry, Philip
Abstract
A computer-implemented method for detecting control plane intrusions in a communications network, comprising: accessing a list of pre-defined traffic signatures, each traffic signature representing a non-malicious control plane network traffic pattern; monitoring network traffic within the control plane; comparing the monitored network traffic to the list of pre-defined traffic signatures to determine whether the monitored network traffic matches any signatures in the list of pre-defined traffic signatures; responsive to determining that the monitored network traffic does not match any signatures in the list of pre-defined traffic signatures, classifying the monitored network traffic as a potential security risk.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Poustie, Alistair
Horsley, Ian
Abstract
An apparatus (170) for use in performing diagnostics upon a fibre optic cable (180) in a fibre optic network (100), said apparatus comprising: a reflector (240); a dichroic filter (220) configured to output, from input light transmitted through the fibre optic cable: a reflected component; and a transmitted component; an optical switch (230), arranged to receive the transmitted component and to interface with the reflector, and configured to perform switching between optically connecting and disconnecting the reflector to and from the transmitted component; and a photovoltaic, PV, power supply (250), arranged to receive the reflected component, and electrically connected with the optical switch, thereby to generate power from the reflected component and to power the switching of the optical switch. There is also provided a fibre optic network (100) and a method (300) of operating said network.
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Gilks, Daniel
Burton, Fraser
Abstract
This invention provides a Rydberg-atom based electromagnetic field receiver for a wireless telecommunications network, the electromagnetic field receiver comprising a plurality of coupling laser with one being in active state and the other ones being in preparation state, allowing a fast switching between an active laser and a prepared laser in order to provide a fast frequency hopping scheme.
G01R 29/08 - Measuring electromagnetic field characteristics
H04B 1/00 - Details of transmission systems, not covered by a single one of groups Details of transmission systems not characterised by the medium used for transmission
H04B 1/713 - Spread spectrum techniques using frequency hopping
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Andrade, Tiago
Pena-Rios, Anasol
Smith-Creasey, Max
Bahceci, Ozkan
Abstract
A method for providing adaptive training to a user is provided. The method comprises receiving user biometric data from a plurality of user devices, and generating a personality biometric profile based on the user biometric data, where the personality biometric profile comprises one or more personality characteristics of the user based on the user biometric data. A training scenario is generated for the user based on the user biometric profile, and the user is trained using the generated training scenario in a training session, wherein user behavioural data is collected in real time during the training session. The user biometric profile is updated based on the collected user behavioural data, and the training scenario is updated for the user subsequent to the training session based on the updated user profile.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lorimer, Andrew
Wilson, Christopher
Wood, Nigel
Abstract
A computer implemented method for deploying a composite software application including a plurality of software components, the method comprising: accessing a classifier trained to classify characteristics of one or more consuming entities to a class identifying a set of software components and a configuration for at least a subset of the identified components; generating the composite software application using a default set of software components each having a default configuration for deployment to a consumer of the generated software component; receiving characteristics for the consumer; determining a set of software components and a configuration for at least a subset of the determined components by executing the classifier based on the received characteristics; and adjusting the composite software application for deployment to the consumer based on the determined set of software components and configurations.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sanmoogan, Timothy
Parekh, Arjun
Reid, Rebecca
Abstract
This disclosure provides a method of configuring a first access point in a wireless telecommunications network, the first access point being one of a first plurality of access points, the method including obtaining time-series performance data for each access point of the first plurality of access points; determining a similarity value between the time-series performance data of each access point of the first plurality of access points and the time-series performance data of each other access point of the first plurality of access points using a dynamic time warping technique; based on the similarity values, identifying a first plurality of clusters of the first plurality of access points, the first access point being a member of a first cluster of the first plurality of clusters; identifying a configuration for the first access point based on its association with the first cluster; and causing the identified configuration of the first access point.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Dowe, William
Abstract
A wall-mounting apparatus (100) for a telecommunications device (110), said apparatus comprising: a first plate (120-1), for fixing to a wall, comprising: a first engagement formation (130-1); a first locking formation (140-1); and a keyed opening (150); a second plate (120-2), for coupling to, or forming a part of, the telecommunications device, the second plate comprising: a second engagement formation (130-2), complementary to the first engagement formation, so as to slot together with the second engagement formation, thereby to engage the first and second plates together; and a second locking formation (140-2), complementary to the first locking formation, for fixedly locking the second plate to the first plate when engaged together; wherein, in use, the first and/or second locking formation/s is/are accessible through the keyed opening so as to actuate said formation/s thereby to unlock the first and second plates.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Cristina, Claudia
Bayakly, Fadi
Wallwork, Matthew
Beddus, Simon
Wilks, David
Abstract
A communications module for a vehicle is provided, the vehicle comprising: one or more transceivers configured to provide one or more communication channels for communicating with an external network; a communication interface for communicatively coupling the communications module to one or more onboard systems of the vehicle; a router configured to route network traffic between the one or more onboard systems and the external network via the one or more transceivers; a traffic analyser configured to: split the network traffic into a plurality of streams based on a type of data being conveyed by the network traffic; and classify each of the plurality of streams with a respective classification that indicates the respective type of data being conveyed by the network traffic belonging to that stream. The router is configured to route the network traffic associated with each stream based, at least in part, on the respective classification for each stream. A remote system for use with the said vehicle communications module is also provided, the remote system comprising an input for receiving an intended journey plan for the vehicle; one or more inputs for receiving network status information for one or more networks through which the intended journey passes; a policy determination unit configured to determine a policy that specifies one or more network parameters to which the vehicle communications module must conform to ensure that a stream, transmitted by the vehicle communications module and having a predetermined classification, meets a predetermined quality of service level; one or more transceivers configured to provide one or more communication channels for communicating the policy to the communications module.
H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
H04L 45/302 - Route determination based on requested QoS
H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Zia, Muhammad Fahad
Kalidass, Sri Harish
Abstract
A method comprising accessing network traffic data collected from a node in a core of a communications network; computing an encoding of the network traffic data by processing the network traffic data using an adversarially trained encoder; concatenating the encoding with the network traffic data to form an input; classifying the input as benign or anomalous; and in response to a classification of anomalous, triggering a security action.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Zhang, Yangyishi
Burton, Fraser
Abstract
This invention provides a method of configuring a Reconfigurable Holographic Surface, RHS, in a wireless telecommunications network, a device for implementing said method, and a system comprising said device, the wireless telecommunications network comprising a communication channel between the RHS and a receiver, the method comprising the steps of: obtaining data indicating a plurality of channel states, each channel state of the plurality of channel states representing one or more properties of the communication channel at a particular time instance being one of a group comprising a historical time instance and a current time instance; predicting a future channel state based on the obtained plurality of channel states, the future channel state representing the communication channel at a future time instance; causing the RHS to be configured based on the future channel state
H04B 7/04 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Martins Andrade, Tiago
Healing, Alexander
Abstract
A computer-implemented method for use in configuring a collaborative virtual reality (VR) system. The method comprises obtaining first and second environmental data representative of at least one characteristic of a first and second environment associated with a first and second VR system of the collaborative VR system, respectively. First and second capability data representative of a display capability of the first and second VR system for displaying VR content, respectively, is obtained. A common virtual workspace of a VR environment for display of collaborative VR content by both the first VR system and the second VR system is determined, based on the first and second environmental data and the first and second capability data. A first and second layout of at least one display element of the collaborative VR content within the common virtual workspace is determined, for use by the first and second VR system, respectively.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
Pell, Robert
Abstract
A computer implemented method of deploying a cyber defence deception strategy in a computer network, the method comprising: receiving a list of network devices in the computer network that require deception; receiving at least one deception constraint; generating a plurality of candidate deception strategies based on the list of network devices and the at least one deception constraint; calculating a deception effectiveness score for each candidate deception strategy; selecting an optimal deception strategy from the plurality of candidate deception strategies based on the calculated deception effectiveness scores; and deploying the optimal deception strategy in the computer network.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
An optical computing device is described which has a plurality of light sources, each light source arranged to generate a photon stream, whereby the plurality of photon streams together represent a data input to be processed. There is a plurality of modulators, each modulator arranged to modulate a photon stream received from one of the light sources, each modulator producing a caustic wavefront. The modulators are positioned relative to one another such that there is interference between the caustic wavefronts. A controller controls the modulators in order to control the interference between the caustic wavefronts such that there is computation of the data input. An output stage outputs light resulting from the interference between the caustic wavefronts, the output light representing the result of optical computation of the data input.
G06E 3/00 - Devices not provided for in group , e.g. for processing analogue or hybrid data
G02F 1/13 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulatingNon-linear optics for the control of the intensity, phase, polarisation or colour based on liquid crystals, e.g. single liquid crystal display cells
G06N 3/067 - Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using optical means
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Reeves, Andrew
Georgalas, Nektarios
Abstract
A data access control system is provided together with methods, computer systems and computer programs for processing transactions to be recorded in a distributed ledger that is shared amongst a plurality of computing nodes and for controlling access to data recorded in the distributed ledger. The system comprises a policy store comprising one or more policies for controlling access to at least some of the data recorded in a distributed ledger that is shared amongst a plurality of computing nodes, each policy comprising one or more constraints on accessing the data. The system further comprises a key store for storing cryptographic keys. The system further comprises a transaction processor configured to: receive a transaction from one of the computing nodes: encrypt a payload of the transaction using a secret key to generate an encrypted transaction for recording in the distributed ledger; and store the secret key in the key store in association with an indication of the encrypted transaction. The system further comprises a data access module configured to: receive a request for access to the pay load of the encrypted transaction from one of the computing nodes: determine whether the constraints specified by the one or more policies on accessing data contained in the payload are satisfied; and in response to determining that the constraints are satisfied: retrieve the secret key from the key store; and use the secret key to provide access to the data for the computing node.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Wright, Ruth
Abstract
A beacon device transmits a challenge message to each of one or more responder devices over a respective direct communication link, inviting each responder device to prove the existence of its respective direct communication link by transmitting to a respective recipient device, distinct from the beacon device, a respective response message indicating knowledge of contents of the challenge message. A predetermined time period after its transmission of the challenge message, the beacon device transmits a confirmation message indicating knowledge of the contents of the challenge message to a message store. A validation device then compares contents of each response message which preceded the confirmation message in time, if any, to contents of the confirmation message and infers therefrom which of the respective responder devices, if any, received the challenge message over the respective direct communication link.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
Azvine, Behnam
Abstract
A computer-implemented method (200) for monitoring security of a credential-based protected computing system (130), said method comprising the steps of: identifying a protected computing system requiring credentials so as to access said protected computing system (210); generating a unique set of credentials for accessing the protected computing system (220); registering an account for the protected computing system using the unique set of credentials; storing, in a database, a mapping between the: protected computing system; account; and registered set of credentials; monitoring for publication of the unique set of credentials (230); detecting publication of the registered unique set of credentials; and determining, in response to said detecting, a breach of the protected computing system associated with the registered unique set of credentials (250).
G06F 21/55 - Detecting local intrusion or implementing counter-measures
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sani, Sadiq
Abstract
A computer implemented method, computer system and computer program for protecting a network are provided. The method trains a classifier to classify activity within the network. The method retrains the classifier using an active learning technique by: determining a respective level of uncertainty of the classifier in classifying each sample in a set of sample data; identifying a subset of the sample data, the subset including a plurality of samples from the set for which the respective level of uncertainty is highest; randomly selecting a number of samples from the subset, wherein the number of samples is less than a size of the subset; labelling the selected samples by querying an oracle; and using training data including the labelled samples to retrain the classifier. The method uses the retrained classifier to classify activity within the network and determines whether to take action to protect the network based on the classification of the activity.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Conway, Anthony
Glover, Timothy
Hyde, David
Davies, Timothy
Gaffney, Samuel
Gizicky, Peter
Abstract
A method for determining resilient routing in a network comprising a plurality of nodes and a plurality of links between the nodes, the plurality of nodes and the plurality of links arranged in two or more Shared Risk Groups, SRGs, the plurality of nodes comprising exactly one source node and one or more destination nodes, is disclosed. The method comprises determining a first initial graph of the network; determining a second initial graph of the network; and iteratively adjusting the first initial graph and/or the second initial graph, by selecting a graph operation from a list of graph operations and applying the graph operation, so as to generate a first final graph and a second final graph such that, for each destination node, a path from the source node to the destination node in the first final graph and a path from the source node to the destination node in the second final graph comprise a minimum number of nodes and links within the same SRG. Each graph comprises all of the nodes of the network and comprises edges along a subset of the links of the network such that, for each graph, there is exactly one path from the source node to any other node. A corresponding computing system, non-transitory medium, and network are provided.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lord, Andrew
Abstract
There is herein disclosed a quantum transmission apparatus for Quantum Key Distribution (QKD), comprising: a plurality of components, wherein in use, the plurality of transmission components co-operate to perform QKD, wherein one or more of the plurality of transmission components is functionally disconnectable from, and functionally re-connectable to, a remainder of the plurality of transmission components, for performing QKD, the plurality of transmission components comprising: a first quantum transmitter, adapted to prepare a first photon for QKD transmission; a second quantum transmitter, adapted to prepare a second photon for QKD transmission; and a multiplexer for multiplexing the first photon and the second photon onto a quantum output channel.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lord, Andrew
Abstract
There is herein disclosed a quantum transmission apparatus for Quantum Key Distribution (QKD), comprising: a first quantum transmitter and a second quantum transmitter, wherein, in use, the first quantum transmitter prepares a first photon for QKD transmission and the second quantum transmitter prepares a second photon for QKD transmission; a multiplexer for multiplexing the first photon and the second photon onto a quantum output channel using wavelength-division multiplexing; and a transmission processing apparatus, wherein, in use, the transmission processing apparatus: performs processing in relation to generating a quantum key associated with the first photon; and performs processing in relation to generating a quantum key associated with the second photon.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Diaz Sendra, Salvador
Abstract
This invention provides a method of operating a User Equipment, UE, in a cellular telecommunications network, the cellular telecommunications network implementing a plurality of network slices, the method comprising the steps of: determining a UE-specific probability of usage of each network slice of each network slice of the plurality of network slices based on an analysis of uplink data traffic; receiving a region-specific probability of usage of each network slice of the plurality of network slices, the region-specific probability of usage of each network slice being specific to a region in which the UE is positioned; modifying a network slice cell reselection priority for one or more network slices of the plurality of network slices based on the region-specific probability of usage of each network slice and further based on the UE-specific probability of usage of each network slice; and performing a cell reselection procedure based on the modified network slice cell reselection priority. This invention also provides a method of operating a device in a cellular telecommunications network, the cellular telecommunications network implementing a plurality of network slices, the method comprising the steps of: determining a region-specific probability of usage of each network slice of the plurality of network slices, the region-specific probability of usage of each network slice being specific to a region; and transmitting the region-specific probability of usage of each network slice to at least one UE in the region, wherein the region-specific probability of usage of each network slice is based on an analysis of one or more of a group comprising: downlink data traffic for a plurality of users in the region; a capability of the network slice in the region; subscription data of the plurality of users in the region; and a roaming agreement between network operators covering the region.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
Hercock, Robert
Abstract
A computer implemented method for detecting an occurrence of an event indicated by a set of data records, the event being associated with an event type, can include receiving a plurality of sets of training data records, each training data record having associated a geospatial indication, wherein the training data records in each set relate to an occurrence of an event of the event type; generating a training bitmap to represent each set of training data records in the plurality of sets, the bitmap defining a representation of a geospatial region including the locations identified by geospatial indications of training data records in the set, and the bitmap including identifications of each training data record in the set mapped into the geospatial region of the bitmap; training an image classifier based on each training bitmap such that the trained classifier is operable to classify an input bitmap as indicating an event of the event type.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06T 3/40 - Scaling of whole images or parts thereof, e.g. expanding or contracting
G06V 20/40 - ScenesScene-specific elements in video content
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
90.
EFFICIENT VECTOR COMPARISON FOR EVENT IDENTIFICATION
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
Hercock, Robert
Smith-Creasey, Max
Abstract
A computer implemented method for detecting the existence of a condition indicated by a signature vector sequence of events in an input vector sequence of events, each of the signature and input vector sequences being constituted by an ordered sequence of vectors, can include converting the signature vector sequence into an signature ordered numerical sequence in which each vector in the signature vector sequence is converted to a number indicative of a magnitude of the vector such that the signature numerical sequence is a sequence of magnitudes in the order of the signature vector sequence; converting the input vector sequence into an input ordered numerical sequence in which each vector in the input vector sequence is converted to a number indicative of a magnitude of the vector such that the input numerical sequence is a sequence of magnitudes in the order of the input vector sequence; and determining a degree of similarity of the signature numerical sequence and the input numerical sequence to detect the existence of the condition indicated by the input numerical sequence.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Roscoe, Jonathan
Hercock, Robert
Abstract
A computer implemented method for detecting the existence of a condition indicated by data represented by a set of input graph data structures can include receiving at least a pair of training graph data structures of nodes and edges wherein each node indicates one or more characteristics of an event and each edge indicates an association between events, and wherein at least a subset of nodes and edges in each training graph relate to the existence of the condition, identifying an association between at least one pair of nodes in which each node of a pair occurs in a disparate training graph and at least one of the pair of nodes relates to the existence of the condition, and generating an edge between the pair of nodes so as to generate a composite training graph including at least a pair of the training graph data structures; extracting a proper subgraph of the composite training graph including at least one of the at least one pair of nodes, such that the proper subgraph indicates the existence of the condition including nodes and edges from each of the pair of graphs for comparison with the set of input graphs to identify an indication of the existence of the condition by the input graphs.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Fisk, Christopher
Harris, Matthew
Hunter, Ian
Woods, Stephen
Martin, Peter
Abstract
A rotary dispenser (100) for unwinding a telecommunications cable (115) from a drum (110), the rotary dispenser comprising: a rotating portion (125) for supporting the drum and for permitting rotation of the drum about an axis of rotation; a fixed portion (120) supporting the rotating portion and configured to remain static relative to the rotating portion; a locating member (135) for centring the drum about the axis of rotation; a cable guide (145), coupled to the fixed portion, for receiving the telecommunications cable from the drum when the drum is mounted on the rotary dispenser and configured to support movement of the telecommunications cable through the cable guide as the rotating portion and the drum are rotated with the rotating portion; and an urging member for urging the cable guide away from the rotating portion so as to tension the telecommunications cable in use.
B65H 57/18 - Guides for filamentary materialsSupports therefor mounted to facilitate unwinding of material from packages
B65H 59/06 - Adjusting or controlling tension in filamentary material, e.g. for preventing snarlingApplications of tension indicators by regulating delivery of material from supply package by devices acting on material leaving the package
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Stevens, Timothy
Turnbull, Rory
Abstract
A method of managing content delivery to a client device via a proxy is described. The proxy starts off by receiving content requests from the client device over unicast, and fulfils those requests by forwarding them to a content server, and receiving that content before forwarding onto the client device. The proxy then determines that it may be possible to join a multicast channel to more efficiently receive the required content. However, before joining the multicast channel, the proxy determines whether joining the multicast channel might result in the client device receiving content in a manner that would cause the client device to change the quality level of the content segments being requested. The proxy can do this by first obtaining segment requested by the client device from the unicast server over unicast. The proxy also requests timing information from the multicast server to determine a time at which the same segment will complete delivery over multicast. The proxy then delivers the segment received from the unicast server by the determined multicast delivery time.
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hussain, Tazar
Beard, Alfie
Abstract
A computer-implemented method comprising: obtaining activity data indicative of an anomalous activity within a computer system; processing the activity data to generate confidence data representative of a set of confidence values, each confidence value representative of a confidence that the anomalous activity comprises a respective type of activity; and determining, based on at least the confidence data, mitigating action to take to mitigate the anomalous activity. Further examples relate to a computer system configured to implement an intrusion detection system and an intrusion response system, and to a computer-implemented method of calibrating a system comprising a machine learning model trained to generate output uncalibrated confidence data representative of a set of output uncalibrated confidence values.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mackenzie, Richard
Abstract
This invention provides a method of reconfiguring a wireless telecommunications network, and a data processing apparatus for carrying out said method, the method comprising the steps of: obtaining data indicating a reconfiguration to be made to the network; determining a plurality of transitions to implement the reconfiguration of the network, wherein it is determined, for each transition of the plurality of transitions: a change in the network to partly implement the reconfiguration, an amount of resource usage as a result of the change, and that the amount of resource usage is less than a resource usage threshold, wherein a rate of change of a first transition of the plurality of transitions is different to a rate of change of a second transition of the plurality of transitions; and causing implementation of the determined plurality of transitions.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Townend, David
Hubert, Malcolm
Abstract
This invention provides a method of operating a controller for controlling a performance test in one or more access networks, wherein a first access network of the one or more access networks includes a first access node, a first plurality of network nodes and a first communications medium, and each network node of the first plurality of network nodes is connected to the first access node by the first communications medium such that the first communications medium is shared by the first plurality of nodes, the method comprising the steps of: obtaining data identifying the first communications medium of a first network node of the first plurality of network nodes; determining that a count of concurrent performance tests of the first communications medium is less than a first threshold; and in response to the determination, causing initiation of a first performance test of the first communications medium in which the first network node is a participant of the first performance test. This invention further provides a method of operating a network node of a first plurality of network nodes in a first access network, the first access network including a first access node and a first communications medium, and each network node of the first plurality of network nodes is connected to the first access node by the first communications medium such that the first communications medium is shared by the first plurality of nodes, the method comprising the steps of: sending a performance test request message to a controller, the performance test request message identifying the first communications medium; and receiving a performance test response message from the controller; and in response to receiving the performance test response message, participating in the first performance test.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Magalhaes Marques, Pedro
Beard, Alfie
Abstract
The present disclosure provides methods of responding to a malware infection, one method comprising: receiving a graph representing a computer network infected with malware, wherein nodes of the graph represent devices of the computer network and edges of the graph represent connections between the devices; identifying a plurality of actions for responding to the malware; for each action of the plurality of actions: generating an updated graph by simulating the action and subsequent propagation of the malware in the computer network; and determining a health score for the computer network based on the updated graph, wherein calculating the health score comprises determining a contribution value for each node of the updated graph; identifying and selecting the action of the plurality of actions in dependence of the health score; and performing the identified action on the computer network.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Allan, Brahim
Nilsson, Michael
Abstract
A computer implemented method is provided for managing the delivery rate of media content to a client device (200) by a network element (212) over a network, the method comprising the steps of: determining a classification of first media content delivered to and output by the client device (200); determining a tolerance profile to apply at the client device (200) dependent on the classification of the first media content, the tolerance profile being indicative of a media transmission quality acceptable to a user of the client device (200); and delivering the first media content to the client device (200) at a rate dependent on the determined tolerance profile.
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
H04N 21/6373 - Control signals issued by the client directed to the server or network components for rate control
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lord, Andrew
Abstract
A method of performing Quantum Key Distribution can include quantum transmission in a first basis state and in a second basis state being non-orthogonal to the first basis state, from a quantum transmission apparatus to a quantum receiving apparatus over two pairs of optical channels, wherein transmitting in the first basis state includes, at a first time slot, transmitting a photon over a first channel of the first pair and transmitting no photon over a second channel of the first pair, and, at a subsequent time slot, transmitting a photon over the first channel of the first pair, and transmitting a photon over the second channel of the first pair, wherein transmission in the second basis state includes transmitting a first portion of a probability distribution of a photon from the quantum transmission apparatus to the quantum receiving apparatus; and transmitting a second portion of a probability distribution of the photon from the quantum transmission apparatus to the quantum receiving apparatus.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Wright, Ruth
Abstract
A beacon device including directional transmission means transmits a challenge message in a first predetermined direction to each of one or more responder devices over a respective direct radio communication link, to invite the responder devices to each transmit a respective response message indicating knowledge of contents of the challenge message. The beacon device transmits one or more directed repetitions of the challenge message in one or more respective further predetermined directions such that data relating to the location of each of the responder devices can be inferred from timings of each response message with respect to times the challenge message and the directed repetitions of the challenge message were transmitted. The beacon device either engages in or eschews subsequent two-way communication with each of the one or more responder devices over the respective direct radio communication link, in dependence on the existence and timing of a respective response message.