BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Sajjad, Ali
El-Moussa, Fadi
Abrégé
The present disclosure relates to securing computers against threats found in adjuncts to communications, such as links in and attachments to emails. It provides an internet gateway for connecting a computer network to the internet, the internet gateway comprising: a traffic monitor configured to monitor outgoing communications from the computer network; a scanner configured to scan incoming communications to the computer network in response to detection, by the traffic monitor, of communication to a suspicious destination; and a sandbox manager configured to, in response to identification, by the scanner, of a suspicious adjunct to an incoming communication, launch a sandbox container on the internet gateway and open the suspicious adjunct in that sandbox container, wherein the suspicious adjunct is only passed on to its recipient communication client if analysis of behaviour elicited by opening it in the sandbox container indicates that it is benign.
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Clarke, Freddy
Abrégé
An apparatus for climbing a structure, the apparatus comprising a/an: ascent mechanism for elevating the apparatus up the structure; arresting mechanism for actuation between a: first position in which the arresting mechanism is engaged to the structure so as to impede descent of the apparatus; and second position in which the arresting mechanism is disengaged from the structure so as to allow ascent of the apparatus; urging mechanism for urging the arresting mechanism into the first position; retention mechanism configured to work against the urging mechanism and for retaining the arresting mechanism in the second position; power supply configured to power both the ascent mechanism and the retention mechanism, such that: when powered by the power supply and the ascent mechanism is activated, the retention mechanism is configured to retain the arresting mechanism in the second position and the ascent mechanism is operable to ascend the structure; and when unpowered, the retention mechanism is caused to release the arresting mechanism, thereby causing the urging mechanism to actuate the arresting mechanism into the first position, and the ascent mechanism is deactivated.
B62D 57/02 - Véhicules caractérisés par des moyens de propulsion ou de prise avec le sol autres que les roues ou les chenilles, seuls ou en complément aux roues ou aux chenilles avec moyens de propulsion en prise avec le sol, p. ex. par jambes mécaniques
3.
APPARATUS AND METHOD FOR FASTENING A GUIDE AT AN ELEVATED DEPLOYMENT SITE
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Morsman, Trevor
Novakovic, Violeta
Nottage, Martin
Abrégé
This invention provides apparatus, and a method using the apparatus, for fastening a guide at an elevated deployment site. The apparatus comprises a guide housing configured as a receptacle to receive the guide therein, the guide housing comprises a closed rear face and an open front face, the closed rear face defining a plane; and an elongate element access configured to enable, when the guide is received in the guide housing: passage of a first section of an elongate element through a first opening of the passageway of the guide in a direction that intersects the plane of the closed rear face, and passage of a second section of the elongate element through a second opening of the passageway of the guide, wherein: the guide housing is attachable to a device having an elevatable component, and when a tensioning force is applied between the first and second sections of the elongate element, the first section of the elongate element experiences the tensioning force in the direction that intersects the plane of the closed rear face such that the elongate element exerts a force on the guide towards the closed rear face of the guide housing.
H02G 1/04 - Méthodes ou appareils spécialement adaptés à l'installation, entretien, réparation, ou démontage des câbles ou lignes électriques pour lignes ou câbles aériens pour les monter ou les tendre
H02G 7/05 - Dispositifs ou dispositions pour suspendre les lignes ou câbles électriques
4.
A TELECOMMUNICATIONS NETWORK COMPRISING A RYDBERG-ATOM BASED EM SIGNAL RECEIVER
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Burton, Fraser
Gilks, Daniel
Abrégé
This invention provides a telecommunications network comprising a device and at least one network node. The device comprises a Rydberg-atom based Electromagnetic (EM) signal receiver and an uplink telecommunications interface. The Rydberg-atom based EM signal receiver may be configured in a first Rydberg state for reception at a first frequency. The device may send a request for data via the uplink telecommunications interface. Responsive thereto, the at least one network node may send a first configuration signal at the first frequency to the Rydberg-atom based EM signal receiver, the configuration signal identifying configuration parameters for the Rydberg-atom based EM signal receiver so as to configure the Rydberg-atom based EM signal receiver to a second Rydberg state for reception at a reserved frequency such that a data signal at the reserved frequency causes a detectable change in the Rydberg-atom based EM signal receiver in the second Rydberg state.
H04B 10/118 - Dispositions spécifiques à la transmission en espace libre, c.-à-d. dans l’air ou le vide spécialement adaptées aux communications par satellite
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Chouhan, Pushpinder
Cui, Zhan
Selvam, Muthupavithran
Abrégé
An authentication method for authenticating a first device in a network of devices, the method comprising: performing an authentication procedure to attempt to authenticate the first device; determining that the authentication procedure has failed to authenticate the first device; determining that a second device is connected to the first device; requesting authentication of the first device by the second device; receiving an authentication response from the second device; and if the second device verifies the first device in response to receiving the authentication response, authenticating the first device.
G06F 21/40 - Authentification de l’utilisateur sous réserve d’un quorum, c.-à-d. avec l’intervention nécessaire d’au moins deux responsables de la sécurité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Walczak, Nicholas
Abrégé
A computer-implemented method comprising selecting a shortlist of candidate wireless network access nodes most likely to serve a target wireless communication device at a target location from a longlist of candidate wireless network access nodes, by iteratively: (i) moving a closest candidate wireless network access node, which is the candidate wireless network access node of the longlist closest to the target location, from the longlist to the shortlist; and (ii) deleting from the longlist any other candidate wireless network access nodes located within a shadow sector which encompasses that closest candidate wireless network access node, the shadow sector being a sector of a circle centred on the target location and encompassing all of the candidate wireless network access nodes on the longlist.
H04W 36/00 - Dispositions pour le transfert ou la resélection
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p. ex. des données de vitesse
7.
OBTAINING A CHARACTERISTIC RESPONSE FROM A COMMUNICATIONS NETWORK DEVICE
British Telecommunications Public Limited Company (Royaume‑Uni)
Inventeur(s)
White, Catherine
Abrégé
A method of obtaining a characteristic response from a communications network device in a communications network environment comprises accepting, at the communications network device, a challenge signal. Coupling all or part of the challenge signal or all or part of a transformation of the challenge signal in the form of radiation into one or more physical network channel media of the communication network. Allowing radiation to scatter between the physical communication channel media and a physically unclonable function PUF; and obtaining a response to the challenge by measuring scattered radiation from at least the PUF.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beddus, Simon
Mchugh, Daniel
Neild, Ian
Abrégé
A computer-implemented method of configuring a network to provide network coverage for a mobile entity undertaking a mission is provided. The method comprises: receiving a mission definition file for the mobile entity, the mission definition file indicating a route along which the mobile entity will travel when undertaking the mission and a schedule for the mission; identifying a set of network nodes of the network for providing coverage to the mobile entity during the mission, each network node being associated with a respective portion of the route over which it is to provide network coverage to the mobile entity; determining a set of beam-forming configurations for one or more, or all, of the network nodes based on the mission definition file, each beam-forming configuration being associated with a respective network node and indicating a sequence of beam patterns for providing network coverage to the mobile entity as it travels along the respective portion of the route to be covered by that network node; and configuring the one or more, or all, of the network nodes according to the respective beam-forming configuration associated with that node to cause each network node to form a beam according to the sequence of beam patterns while the mobile entity travels along the respective portion of the route covered by that network node.
H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04W 16/28 - Structures des cellules utilisant l'orientation du faisceau
9.
SCALABLE, CONTEXT-BASED ANONYMISATION OF SENSOR DATA
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Smith-Creasey, Max
Roscoe, Jonathan
Abrégé
A computer-implemented method of obfuscating user sensor data is provided. The method comprises collecting sensor data from one or more sensors of one or more user devices, assessing the user's current behaviour from the sensor data, and determining that an obfuscation period is required. The method further comprises generating obfuscated sensor data for the one or more sensors, different to the collected sensor data, during the obfuscation period, and providing the obfuscated sensor data to the one or more programs on the one or more user devices. During the obfuscation period, the obfuscated sensor data is provided to the one or more programs on the one or more user devices includes one or both of a phased-in period at the beginning of the obfuscation period during which the obfuscated data initially matches the collected sensor data, and deviates from the collected sensor data, and a phased-return period at the end of the obfuscation period during which the obfuscated data returns to match the collected sensor data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Conway, Anthony
Di Cairano-Gilfedder, Carla
Abrégé
An automated equipment installation verification system to automatically verify correctness of installation actions of an operative installing an item of equipment, the system comprising: a logic unit (804) that executes a rule engine to apply at least one rule to a measure of correctness of each of a plurality of physical acts performed by the operative according to a sequence of stepwise actions to be performed by the operative in the installation of the equipment to determine a degree of correctness of an installation of the equipment, each measure of correctness being determined by a classifier trained to determine a degree of correctness of a respective act based on sensor data corresponding to the act.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Poustie, Alistair
Abrégé
A method (200) of operating a fibre optic telecommunications network (100), said network comprising a/an: spine fibre (120); pair of feeder fibres (150); retroreflector (160) arranged on each of the feeder fibres; optical coupler (140) configured to split the spine fibre into the pair of feeder fibres; optical source (110) connected to the spine fibre and configured to transmit a coherent optical signal through the spine fibre to each of the retroreflectors, via the optical coupler and the pair of feeder fibres, said optical signal having a coherence length equal to or greater than distances between: the optical coupler and each of the retroreflectors, along the respective feeder fibre; and each of the retroreflectors, along the pair of feeder fibres and via the optical coupler; and optical detector (170) connected to the spine fibre; the method comprising the steps of: transmitting, by the optical source, the optical signal to the retroreflectors (210); monitoring, at the optical detector, for a reflection of the transmitted optical signal from at least one of the retroreflectors (220); and in response to detecting that the reflection is: absent, determining that the spine fibre and/or both of the feeder fibres comprise a fault (260-2); present and not comprising an interference pattern, determining that one, but not the other, of the feeder fibres comprises a fault (260-1); and present and comprises an interference pattern, determining that the spine fibre and both the feeder fibres are intact (240-1).
H04B 10/071 - Dispositions pour la surveillance ou le test de systèmes de transmissionDispositions pour la mesure des défauts de systèmes de transmission utilisant un signal réfléchi, p. ex. utilisant des réflectomètres optiques temporels [OTDR]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Conway, Anthony Stephen
Di Cairano-Gilfedder, Carla
San Cayo Villar, Nurla
Leon Garza, Hugo
Abrégé
An automated equipment installation verification system to automatically verify correctness of each of a sequence of installation steps for the installation of an item of equipment, the system comprising: a data store that stores a digital model of the equipment at each step of a stepwise installation process; a logic unit that executes a comparator to compare a representation of the equipment indicating a configuration of the equipment with the digital model of the equipment at a current step in the stepwise installation process to generate a degree of conformity of the equipment at the current step; and a communications interface that communicates the degree of conformity to an operative.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
G09B 25/02 - Modèles à usages non prévus dans , p. ex. dispositif en vraie grandeur pour la démonstration de procédés industrielsModèles à usages non prévus dans , p. ex. dispositif en vraie grandeur pour la démonstration de machines
British Telecommunications Public Limited Company (Royaume‑Uni)
Inventeur(s)
White, Catherine
Abrégé
A physically unclonable function (PUF) configured to receive a challenge signal and produce a response signal dependent on the challenge signal in response thereto; wherein: the PUF comprises a photonic crystal structure of plural dimensionality which is configured to: be illuminated by an optical input signal which is, or is derived from, the challenge signal; and responsive thereto, produce an optical output signal dependent on the optical input signal's interaction with the photonic crystal structure, wherein the response signal is, or is derived from, the optical output signal.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Craigie, Roland
Pilgrim, Luke
Trimby, Martin
Abrégé
A computer implemented video image processing method is described, which comprises receiving a sequence of video images of a scene, and receiving one or more supplementary media items. Objects of interest within the received video images are identified, and a spatial portion of each received video image is selected to generate a reframed image. The reframing is carried out in dependence on a size and/or position for the received supplementary media items, and a size and/or position of at least one of the identified objects of interest. The spatial portion for each video image is selected to include one or more of the identified objects of interest in that video image. A display image is then rendered, the display image including the reframed image and the supplementary media items. In this way, the images in the video sequence are each reframed in a manner which preserves visibility of the objects of interest while permitting display of the supplementary media items.
H04N 21/431 - Génération d'interfaces visuellesRendu de contenu ou données additionnelles
H04N 21/4402 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé impliquant des opérations de reformatage de signaux vidéo pour la redistribution domestique, le stockage ou l'affichage en temps réel
H04N 21/44 - Traitement de flux élémentaires vidéo, p. ex. raccordement d'un clip vidéo récupéré d'un stockage local avec un flux vidéo en entrée ou rendu de scènes selon des graphes de scène du flux vidéo codé
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Bicknell, John
Masterson, Elena
Abrégé
A computer implemented image processing method is described, which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion For one or more of the problem hues, the method defines an original colour group, the original colour group including the problem hue and related hues within a colour range of the problem hue. The method adjusts the hues of the original colour group(s) to generate a corresponding adjusted colour group. Then, when video images are received, the method replaces pixels within each video image having a hue corresponding to the original colour group(s) with the adjusted hue of the corresponding adjusted colour group(s). In this way, problem colours can be identified for a viewer with colour vision deficiency, and those particular colours (and variants thereof) can be adjusted to be more distinguishable for the colour deficient viewer, while leaving other colours unchanged to minimise the visual impact for other viewers.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Nilsson, Michael
Appleyby, Stephen
Turnbull, Rory
Stevens, Timothy
Abrégé
Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segment received over multicast and if necessary, which stored segment to delete from the cache.
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04L 65/75 - Gestion des paquets du réseau multimédia
H04L 65/1045 - Mandataires, p. ex. pour le protocole d'initiation de session [SIP]
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abrégé
Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segments received over multicast and if necessary, which stored segment to delete from the cache, taking into account the relative timings of when segments are received over multicast and when unicast requests are received.
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04L 65/75 - Gestion des paquets du réseau multimédia
H04L 65/1045 - Mandataires, p. ex. pour le protocole d'initiation de session [SIP]
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
H04L 67/5682 - Politiques ou règles de mise à jour, de suppression ou de remplacement des données stockées
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Bowman, Tom
Beard, Alfie
Abrégé
A computer-implemented method of providing video data from one or more mobile entities to an operator of the one or more mobile entities is provided. The method obtains video data comprising one or more video streams, each video stream being captured by a respective video camera attached to a respective mobile entity and comprising a plurality of sequentially ordered frames. The method processes each of the video streams using a machine learning model trained to identify one or more significant frames. The method initiates provision of at least some of the video data to the operator, the provision of the significant frames being prioritised over the provision of other frames of the video data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining an m x n matrix representation of an image sequence of one or more images to which the overlay graphic is to be applied; obtaining a q x r matrix representation of the overlay graphic, wherein q ≤ m, r ≤ n, and q.r < m.n; initiating a process to convolve the matrix representation of the image sequence with the matrix representation of the overlay graphic; and selecting the overlay graphic placement location in dependence on one or more convolution entries generated by that process.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Masterson, Elena
Bicknell, John
Abrégé
A computer implemented image processing method is described which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining the two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion. For one or more of the problem hues, a colour group is defined, the colour group including the problem hue and related hues within a colour range of the problem hue. Subsequently, when video images are received, for one or more of the colour groups, one or more regions in a received image having a hue corresponding to that colour group are identified, and a pattern is applied to those regions. In this way, patterns are applied only to regions of the image having a hue within a defined colour group containing a problem hue. As a result, the part of the image formerly represented only by the problem colour is now represented by a pattern, which is easily discernible by a colour-blind viewer. Regions of the image which do not contain a problem hue are not patterned in this way, and so the majority of the image remains unchanged.
G09G 5/00 - Dispositions ou circuits de commande de l'affichage communs à l'affichage utilisant des tubes à rayons cathodiques et à l'affichage utilisant d'autres moyens de visualisation
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of selecting an overlay graphic placement location for display of an overlay graphic on a display device over an image sequence originating from a camera, the method comprising: obtaining overlay graphic data; obtaining object data indicating proximity of any objects in the image sequence to the camera at the time the image sequence was recorded; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, the placement scores being determined in dependence on proximity data derived from the object data; and selecting the overlay graphic placement location in dependence on the placement scores.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining object data indicating the location of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, wherein the process is terminated when a placement score above a predetermined stopping threshold value is found; and selecting the overlay graphic placement location in dependence on the placement scores such that, when a placement score above the predetermined stopping threshold value is found, the current candidate graphic location is selected to be the overlay graphic placement location.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining initial object data indicating locations of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; predicting subsequent object data in dependence on the initial object data; initiating a process to determine a placement score, based on the overlay graphic data and the initial and subsequent object data, for each of a plurality of candidate graphic locations; and selecting the overlay graphic placement location in dependence on the placement scores.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abrégé
A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional role is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. Abductive role reasoning is used to improve accuracy of functional role assignments. 1 to be published with the abstract
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Noppen, Johannes
Johns, Jack
Ziolkowski, Adam
Abrégé
A method reduces architectural coupling in source code. A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role. A plurality of concepts of a domain of the source code are available. An occurrence of the functional marker is identified in the graph representing the source code. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The assigned functional roles are matched to the concepts. An architectural coupling of different functional roles within a single node of the graph is identified using the assigned functional roles and matched concepts. The architectural coupling is reduced by transforming the source code.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Glynn, F. Joseph
Batagurki, Rajesh Vasant
Abrégé
A method of operating a telephony system, the system including a client server to access a conferencing server for establishing a conference call, connect a plurality of terminals to the conferencing server; and communicate with a UE so as to receive a call from the UE;, the method including, by the client server, detecting initiation of a call between the UE and a given one of the plurality of terminals; identifying the UE and the given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to the non-conference call; receiving, from the conferencing server, access information for accessing the requested conference call; and distributing the access information to each of the plurality of terminals, thereby permitting any of the terminals to access the conference call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abrégé
A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional rose is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abrégé
Source code from a legacy code base is represented using a graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role is accessed. An occurrence of the functional marker in the graph representing the source code is found. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. For the source code from the legacy code base corresponding to the nodes with the assigned functional roles, an automated tool triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. The functional marker is a design pattern which makes it possible to assign functional roles associated with the design pattern.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Noppen, Johannes
Abu-Tair, Mamun
Ali, Aftab
Mcclean, Sally
Ziolkowski, Adam
Johns, Jack
Abrégé
An adaptive quality assessor assesses quality of source code, taking into account feedback from software engineers. A modification to source code of a software system is detected. A plurality of metrics are selected from source code metrics available for the source code, the selection being at least in response to feedback about the modification to the source code. A score is computed comprising a weighted combination of the selected plurality of metrics. An automated action on a consuming process is triggered in response to the computed score, such as to control integration of the modified source code into the software system or to prioritize tasks in a queue.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Johns, Jack
Noppen, Johannes
Ziolkowski, Adam
Abrégé
A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A domain model of a domain related to the legacy code base is computed, the domain model comprising a plurality of concepts and relationships between the concepts. A node of the graph matching one of the concepts is identified. A functional role of model is assigned to the identified node. The knowledge of the assigned functional role is used to trigger any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Glynn, F. Joseph
Batagurki, Rajesh
Abrégé
A method (300, 400) of operating a telephony system (100), said system comprising a: client server (170), configured to: access a conferencing server (140) for establishing a conference call; connect a plurality of terminals (180) to the conferencing server; and communicate with a UE (160) so as to receive a call from the UE; the method comprising the steps of, by the client server: detecting initiation of a call between the UE and a given one of the plurality of terminals (320, 420); identifying the UE and said given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to said non-conference call (330-2, 430); receiving, from the conferencing server, access information for accessing the requested conference call (340, 440); and distributing the access information to each of the plurality of terminals (360, 460), thereby permitting any of said terminals to access the conference call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Bayart, Damien
Free, Michael
Abrégé
Various examples relate to a method for grounding responses from a Large Language Model (LLM). The LLM is prompted using a prompt that has been augmented using information retrieved from a knowledge base and a response is received from the LLM. Entities are extracted from the response and from the information retrieved from the knowledge base. A grounding service checks the response is grounded with respect to the knowledge base by checking the types and values of critical entities extracted from the response match the types and values of critical entities extracted from the information retrieved from the knowledge base.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Free, Michael
Bayart, Damien
Abrégé
A prompt is received from an end user device, the prompt being for prompting a large language model, LLM. A RAG engine queries a knowledge base using a query formed from the prompt, to obtain search results. The search results are filtered to exclude information in a store of information known by the LLM. A retrieval augmented generation, RAG, prompt is formed from the received prompt and the filtered search results. The RAG prompt is sent to the LLM and a response is received from the LLM. The response is sent to a user interface or used to control a communications network.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Kiss, Stephanie
Taylor, Paul
Yearling, David
Abrégé
A call management tool is described comprising a memory and a processor. The memory stores instructions which when executed by the processor implements a method of establishing a call via a communications network between an end user communications device and an agent, extracting metadata from the call, constructing a prompt using the metadata, sending the prompt to a large language model (LLM) and receiving a response to the prompt from the large language model, and triggering a next action using the response, where the next action manages the call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Kiss, Stephanie
Taylor, Paul
Yearling, David
Abrégé
A computer implemented method is defined. The method comprises receiving an image of an environment; providing the image to a trained multi-modal large language model trained to identify one or more objects within the image and a position of each of the one or more objects within the image and output text identifying the one or more objects and the positions of the one or more objects; receiving from the multi-modal large language model the output text; forming a record of the environment using the output text of the multi-modal large language model, wherein the record of the environment comprises an identification of the one or more objects in the environment and the position of the one or more objects in the environment; and querying the record to determine an identity and/or a position of an object of the one or more objects.
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
G06V 20/52 - Activités de surveillance ou de suivi, p. ex. pour la reconnaissance d’objets suspects
G06V 20/70 - Étiquetage du contenu de scène, p. ex. en tirant des représentations syntaxiques ou sémantiques
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Kiss, Stephanie
Yearling, David
Taylor, Paul
Abrégé
Some examples of training a large language model (LLM) to detect an anomaly comprise receiving a plurality of modalities of training data, each modality of training data comprising a different data type. The training data comprises labels indicating a presence of an anomaly. Each modality of training data is transformed with a respective transformation to obtain respective vector embeddings. The respective vector embeddings of the training data are input into a pretrained LLM. Weights of the pre-trained LLM are fine-tuned using the training data via supervised learning such that the pre-trained LLM is able to detect anomalies in multi-modal data.
H04L 41/06 - Gestion des fautes, des événements, des alarmes ou des notifications
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Khan, Kashaf
Abrégé
Some examples of a method and apparatus are described, including: for each of a plurality of time instants, receiving operation data, wherein the operation data comprises a current configuration of an operation and an output of the operation, where the operation is computer- implemented functionality for managing a communications network or for managing a service deployed in a communications network; determining a performance label associated with the output of the operation; generating behaviour data comprising the operation data and the performance label; and storing the behaviour data in a behaviour repository. The method comprises simulating the operation using the stored behaviour data; and triggering change to the configuration of the operation in response to output of the simulation.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/0859 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau en conservant l'historique des différentes générations de configuration ou en revenant aux versions de configuration précédentes
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Pena Rios, Anasol
Conway, Anthony
Zhao, Zi-Chuan
Clark, Adrian
Abrégé
A computer implemented method, comprising: acquiring a plurality of images of a first scene captured from different viewing positions; training a 3D implicit neural representation model for the scene using the acquired images; wherein the training comprises rendering an image from the 3D model of the scene, the image being rendered as if captured from a first viewing position, comparing the rendered image with one of the acquired images taken from the first viewing position, and adjusting one or more parameters of the model in dependence on a result of the comparison; and the training further comprises rendering a 2D spatial image bearing 3D information, the 2D spatial image being rendered as if captured from a second viewing position, and adjusting one or more parameters of the model in dependence on the 2D spatial image.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Thurlow, Ian
Abrégé
A computer-implemented method of maintaining a deployed sensor unit is provided. The method receives (410) a raw sensor data stream from the deployed sensor unit (210). The method further receives (420) a set of calibration measurements associated with the deployed sensor unit, the set of calibration measurements being taken by a mobile reference sensor unit (220) whilst in proximity to the deployed sensor unit during a calibration period. The method determines (430) a drift of the deployed sensor unit based on the raw sensor data and the set of calibration measurements. The method further determines (440) whether the deployed sensor unit should be replaced based, at least in part, on the determined drift. The method schedules (460) a replacement of the deployed sensor unit in response to determining that the deployed sensor unit should be replaced and schedules (450) a further calibration of the deployed sensor unit in response to determining that the deployed sensor unit should not be replaced. The further calibration is to be undertaken by a mobile reference sensor unit whilst in proximity to the deployed sensor unit during a further calibration period to take a further set of calibration measurements.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Gilks, Daniel
Davey, Steven
Abrégé
This invention provides a device, and a method of manufacturing said device, the device comprising: a container containing an atomic vapour; and a Photonic Integrated Circuit, PIC, positioned inside the container, the PIC comprising: a substrate comprising a surface and a first optical path, wherein the substrate defines a first opening extending from the surface of the substrate to a first section of the first optical path, the first opening being exposed to the atomic vapour of the container such that the first section of the first optical path passes across the first opening through the atomic vapour.
G04F 5/14 - Appareils pour la production d'intervalles de temps prédéterminés, utilisés comme étalons utilisant des horloges atomiques
G01C 19/62 - Gyromètres à résonance magnétique nucléaire ou électronique avec pompage optique
G01R 33/26 - Dispositions ou appareils pour la mesure des grandeurs magnétiques faisant intervenir la résonance magnétique pour la mesure de la direction ou de l'intensité de champs magnétiques ou de flux magnétiques utilisant le pompage optique
H03L 7/26 - Commande automatique de fréquence ou de phaseSynchronisation utilisant comme référence de fréquence les niveaux d'énergie de molécules, d'atomes ou de particules subatomiques
G02B 6/12 - Guides de lumièreDétails de structure de dispositions comprenant des guides de lumière et d'autres éléments optiques, p. ex. des moyens de couplage du type guide d'ondes optiques du genre à circuit intégré
41.
A TELECOMMUNICATIONS SYSTEM AND A METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Mckay, Alistair
Mazloumian, Gregory
Smith, Paul
Abrégé
A Method Of Operating The Telecommunications System A method (400) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; and communicate with a User Equipment (110), UE, over a wireless local connection (180-1); communicating, from the CN, to the UE, over the wireless local connection, the eSIM profile (420); receiving, at the CTN, from the UE using the eSIM profile, a/an: request for a service plan; identifier of the communicated eSIM profile; and unique identifier associated with the UE, other than the identifier of the eSIM profile (430); determining, at the CTN, the UE to be (440): eligible to receive the service plan in response to identifying, as stored in the CTN, an absence of an association between the unique identifier and prior provision of the requested service plan by the CTN; and ineligible to receive the service plan in response to identifying, as stored in the CTN, an association between the unique identifier and prior provision of the requested service plan; and in response to determining that the UE is: eligible, the CTN permitting the identified eSIM profile to access to the requested service plan (460); and not eligible, the CTN preventing the identified eSIM profile from accessing to the requested service plan (450). Further methods and systems are disclosed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Chouhan, Pushpinder
Cui, Zhan
Abrégé
Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception decoys to deploy in response to the network intrusion, and deploying the one or more deception decoys in response to the intrusion.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Khanam, Zeba
Umeh, Ikenna
Hercock, Robert
Claireaux, Leah
Abrégé
The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising: a hash table, referred to herein as an 'embedding hash table', consisting of one or more buckets, wherein: for each bucket of the embedding hash table, a corresponding key is a vector embedding of an entity name; and each bucket of the embedding hash table stores an entity type label associated with the corresponding entity name; and a data substructure storing all of the keys to the embedding hash table.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Mckay, Alistair
Smith, Paul
Mazloumian, Gregory
Abrégé
A Telecommunications System And A Method Of Operating The Telecommunications System A method (500) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; communicate with the CTN; and communicate with a User Equipment (110), UE, using a wireless local connection (180-1); receiving, at the CN, from the UE, and over the wireless local connection, context data associated with the UE, in which said context data is indicative of a state of the UE and/or comprises user data (520); communicating, by the CN to the CTN: an identifier of the stored eSIM profile; a request for a service plan for the identified eSIM profile; and the received context data (530); and configuring, at the CTN, the requested service plan for the identified eSIM profile in dependence upon the context data (540).
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 8/20 - Transfert de données utilisateur ou abonné
H04W 8/26 - Adressage ou numérotation de réseau pour support de mobilité
H04W 8/22 - Traitement ou transfert des données du terminal, p. ex. statut ou capacités physiques
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Chouhan, Pushpinder
El-Moussa, Fadi
Abrégé
Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception breadcrumbs to deploy in response to the network intrusion, and deploying the one or more deception breadcrumbs in response to the intrusion.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Umeh, Ikenna
Khanam, Zeba
Hercock, Robert
Abrégé
The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising a hash table consisting of one or more buckets, referred to herein as a 'vector hash table', wherein: each bucket of the vector hash table stores a string comprising one or more aliases for a respective entity, referred to herein as an 'alias string'; and for each bucket, a corresponding key is a vector embedding of that alias string.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Herwono, Ian
El-Moussa, Fadi
Abrégé
An example computer-implemented method of data obfuscation is defined. The computer- implemented method comprises monitoring network traffic from one or more IoT devices in a computing environment; generating an obfuscation schedule based on the monitored network traffic, the obfuscation schedule specifying a transmission time and one or more parameters for each of a plurality of decoy data packets to be transmitted according to the obfuscation schedule transmission times and parameters for a plurality of decoy data packets; and transmitting the decoy data packets according to the obfuscation schedule.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of simulating the propagation of malware in a network is provided. The method comprises accessing a model of the network, where the model comprising a plurality of computer nodes and where each computer node of the plurality of computer nodes is connected to at least one edge of a plurality of edges. Each edge of the plurality of edges connects a pair of computer nodes of the plurality of computer nodes. The method further comprises initiating an outbreak of the malware in the model at a predetermined source computer node of the plurality of computer nodes, and propagating the malware through the model of the network from the source computer node over a plurality of step-times. The propagation is determined based on a rate of transmission per step-time for each edge, and each step-time of the plurality of step-times corresponds to a temporal point that is universal across the network, such that at each step-time the malware propagation through the network occurs simultaneously for each edge of the plurality of edges according to the rate of transmission per step-time for each edge.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Chouhan, Pushpinder
Beard, Alfie
Abrégé
The disclosed technology relates to a computer-implemented method of training an intrusion response system, IRS. The method comprises receiving a plurality of rules for responding to cyber-attacks. The method generates additional rules by applying a data augmentation technique to the plurality of rules and provides the plurality of rules and the additional rules as training data to the IRS. Some examples of the method detect a potential threat that matches at least one of the rules in the plurality of rules and additional rules with the IRS, subsequent to training the IRS with the training data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Hercock, Robert
Abrégé
Some examples of for training a neural network, wherein the neural network comprises a plurality of interconnected neurons, comprise receiving input data at a first neural network unit of the neural network and processing the input data using the first neural network unit to produce an output, a neural network unit comprising one or more of the neurons. Assign a first frequency to the first neural network unit and assign a second frequency associated to the second neural network unit. A difference value between the first frequency and the second frequency is determined and is used as an attention mechanism by, scaling the output of the first neural network unit in relation to the determined difference.
BRITISH TELECOMMUNICATIONS public limited company (Royaume‑Uni)
Inventeur(s)
Burton, Fraser
Menchetti, Marco
Bussey, Liam
Lees, Amelia
Abrégé
This invention provides an electromagnetic field detector, a system comprising the electromagnetic field detector, and a method of operating an electromagnetic field detector, the electromagnetic field detector comprising a first optical signal interface configured to receive, from one or more remote optical sources, a first optical signal; an electromagnetic field transmitter configured to transmit a local oscillator electromagnetic field generated from the first optical signal, the electromagnetic field transmitter comprising: a photocurrent generator configured to generate a photocurrent from the first optical signal; and an antenna interface configured to supply the photocurrent to an antenna to transmit the local oscillator electromagnetic field; a second optical signal interface configured to receive, from the one or more remote optical sources, a probe optical signal and a coupling optical signal; and a transmission medium configured to be excited by the probe optical signal and further excited by the coupling optical signal, wherein the probe optical signal has a probe frequency set to excite electrons of the transmission medium to a first excited state and the coupling optical signal has a coupling frequency set to excite electrons of the transmission medium to a predetermined Rydberg state so as to induce an Electromagnetic Induced Transparency, EIT, effect, wherein the transmission medium is further configured to receive a phase-modulated electromagnetic field from a remote transmitter and the local oscillator electromagnetic field such that the combination of the phase-modulated electromagnetic field and the local oscillator electromagnetic field causes a change in the probe optical signal from which a phase state of the phase-modulated electromagnetic field can be detected.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Lord, Andrew
White, Catherine
Abrégé
There is herein described an alignment system for aligning an optical transmitter and optical receiver for transmission of an optical beam therebetween over free space, the alignment system comprising a plurality of sub-receivers and an adjustment system, where the plurality of sub-receivers are arranged to receive the optical beam from the optical receiver and are spaced apart in a direction perpendicular to the longitudinal axis of the optical beam, where the plurality of sub-receivers are adapted to provide an indication of a characteristic of the optical beam received at the plurality of sub-receivers to the adjustment system, where the adjustment system is adapted to use the indication to determine an adjustment to the relative orientations of the optical receiver and the optical transmitter and where the adjustment system is adapted to output the determined adjustment.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Turnbull, Rory
Nilsson, Michael
Stevens, Timothy
Appleby, Stephen
Abrégé
Described are methods of managing content delivery to a client device, where a proxy server services unicast requests for content segments by joining a multicast channel carrying those content segments. An alternative content segment is provided to the proxy server in advance of the proxy server joining the multicast channel. Then, should a requested content segment not have been received over multicast and stored at the proxy server, for example when first joining a multicast channel, the proxy server can respond to the request with the stored alternative content segment. The alternative content segment can carry, for example, a simple video clip or static image such as a broadcaster logo or programme details, associated with the multicast channel. Thus, there is no need for the proxy server to make a unicast request for any content segment it has yet to receive over the appropriate multicast channel.
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/75 - Gestion des paquets du réseau multimédia
H04L 65/1045 - Mandataires, p. ex. pour le protocole d'initiation de session [SIP]
H04L 67/568 - Stockage temporaire des données à un stade intermédiaire, p. ex. par mise en antémémoire
H04L 67/5681 - Pré-extraction ou pré-livraison de données en fonction des caractéristiques du réseau
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Arum, Steve
Mackenzie, Richard
Abrégé
This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: one or more gateways; a plurality of Reconfigurable Intelligent Surfaces, RISs; and a plurality of non-terrestrial access points; the method comprising the steps of: detecting a trigger to develop a connection in the wireless telecommunications network; obtaining data identifying a requirement for a performance parameter of the connection; obtaining data for a first candidate connection comprising at least two inter-non-terrestrial access point connections via a respective RIS of the plurality of RIS, the data identifying a first value of the performance parameter for the first candidate connection; comparing the first value of the performance parameter for the first candidate connection to the requirement for the performance parameter of the connection; and based on the comparison, developing the connection.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Arum, Steve
Mackenzie, Richard
Abrégé
This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: a plurality of Reconfigurable Intelligent Surfaces, RISs, each RIS comprising a plurality of reflecting elements, each reflecting element of the plurality of reflecting elements of each RIS being a member of either a first set of utilised reflecting elements that are configured for reflecting a signal in the wireless telecommunications network or a second set of available reflecting elements; a plurality of non-terrestrial access points, wherein a first inter-non-terrestrial access point connection is communicated via a first RIS of the plurality of RISs; and one or more gateways configured to provide a feeder link to at least one non-terrestrial access point of the plurality of non-terrestrial access points; the method comprising the steps of: determining a subarray availability of the first RIS as a function of a number of reflecting elements in a second set of available reflecting elements of the first RIS; determining a subarray availability of a second RIS of the plurality of RISs as a function of a number of reflecting elements in a second set of available reflecting elements of the second RIS; and reconfiguring the wireless telecommunications network based on the determined subarray availabilities of the first and second RIS.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Horsley, Ian
Rafel Porti, Albert
Reid, Andrew
Abrégé
A method (400) of operating a fibre optic telecommunications network (100), said network comprising a/an: Optical Line Terminal (110), OLT, configured for Time-Division Multiplexing, TDM, communication; optical switch (120), connected to the OLT and arranged at a junction of a first branch (140-2-1) and a second branch (140-2-2), different to the first branch, of the fibre optic telecommunications network, and configured to switch between, at least, a: first state (260-1), in which the OLT is connected, via the optical switch, to the first branch instead of the second branch; and second state (260-2), in which the OLT is connected, via the optical switch, to the second branch instead of the first branch; first ONU set (130-1), comprising at least one ONU, connected to the optical switch via the first branch; second ONU set (130-2), comprising at least one ONU, connected to the optical switch via the second branch; scheduler (220) for scheduling switching of the optical switch between the first state and the second state according to a schedule, wherein said scheduler is co-ordinated with a TDM timetable for communication between the OLT and each of the first ONU set and the second ONU set using TDM; the method comprising the steps of: providing the optical switch in one of the first state and the second state, thereby facilitating communication between the OLT and the first ONU set or the second ONU set, respectively (410); subsequently determining, using the scheduler, an upcoming time to switch the optical switch from the state in which said switch is provided to the other one of the first state and second state, so as to cause routing between the OLT and the other of the first ONU set and the second ONU set in coordination with the TDM timetable (420); and instructing, at the determined upcoming time, and subsequently causing, the optical switch to switch to said other state (440).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Di Cairano-Gilfedder, Carla
Conway, Anthony
Abrégé
A digital twin system is provided for controlling a computing system including multiple hardware and software entities. The digital twin system comprises: a digital twin comprising a virtual model of the computing system including the multiple hardware and software entities and their environment. The virtual model incorporates three-dimensional physical dimensions of the hardware, the virtual model being configured to emulate the behaviour of the computing system. The digital twin system further comprises a communications interface for performing bi-directional communications with the computing system. The communications include receipt of real-time information regarding performance of the computing system and sensed conditions of the computing system and its environment. The digital twin system also comprises a machine learning system trained on (i) historical and real-time performance data; and (ii) historical and real-time sensed data of the computing system and its environment. The digital twin system further comprises an orchestrator configured to use the digital twin and the trained machine learning system in conjunction with the received real-time performance data and sensed data for the computing system and its environment to determine at least one action for the computing system and its environment that supports one or more selected system management objectives. The orchestrator is further configured to transmit a command over the bi-directional link to the computing system to perform the at least one action.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
H04L 41/0823 - Réglages de configuration caractérisés par les objectifs d’un changement de paramètres, p. ex. l’optimisation de la configuration pour améliorer la fiabilité
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Novakovic, Violeta
Morsman, Trevor
Smith, Mark
Abrégé
A method of removing a core of an armoured cable is described. Within a footway box, a cable is located entering the footway box from an end user premises, the cable having a core surrounded by armouring wires, the armouring wires held between an inner sheath and an outer sheath of the cable. An exposed end of the core is attached to a winch in the footway box by threading the exposed end of the core through an aperture in a body of the winch and attaching the exposed end of the core to a spool of the winch. The aperture being sized and shaped such that the outer sheath and armouring wires abut or are held by the body of the winch in use, when the spool is rotated, to pull the core from the end user premises onto the spool thereby leaving the outer sheath, armouring wires and inner sheath in situ.
H01B 15/00 - Appareils ou procédés de récupération du matériau de câbles
B23D 25/14 - Machines ou agencements pour le cisaillage de produits bruts se déplaçant autrement que dans la direction de la coupe dans lesquelles les dimensions des produits obtenus sont sans importance, p. ex. pour faire des copeaux
G02B 6/50 - Installation souterraine ou sous l'eauInstallation à travers des tubes, des conduits ou des canalisations
H02G 1/12 - Méthodes ou appareils spécialement adaptés à l'installation, entretien, réparation, ou démontage des câbles ou lignes électriques pour supprimer l'isolant ou l'armature des câbles, p. ex. de leur extrémité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abrégé
The present invention provides a method of controlling the delivery rate of content to a client device to influence the quality level at which the client device requests subsequent content segments. The aim is to influence the client device so that it requests content segments at a consistent adaptive bit rate (ABR) level, where that level is one at which many client devices are requesting content segments. The result is that requests are more concentrated around a subset of the available ABR levels. This enables a more efficient and widespread use of any subsequent multicast.
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/752 - Gestion des paquets du réseau multimédia en adaptant les médias aux capacités du réseau
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Georgalas, Nektarios
Wallwork, Matthew
Cristina, Claudia
Abrégé
A computer implemented method of detecting anomalous behaviour within an environment is provided. The environment is monitored by a plurality of sensors providing a plurality of data feeds. Each data feed provides a respective data series representing a respective physical property of the environment over time. The method of detects an occurrence of an event within the environment and identifies a type of that event. The method identifies a plurality of normally correlated data feeds from the plurality of data feeds for the type of the event. The method determines a respective degree of correlation between the respective data series provided by each of the normally correlated data feeds for the occurrence of the event. The method determines a classification of the behaviour within the environment based on the determined degree(s) of correlation, the classification indicating whether the behaviour is normal or anomalous for the environment. Also provided is a method of training an anomaly detector for detecting anomalous behaviour within such an environment, as well as associated computer systems, computer programs, computer-readable data carriers and data carrier signals for performing such methods.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Mehran, Farhad
Abrégé
Examples exploit the processing capabilities of the available access points in a wireless telecommunications network operating in dual connectivity operation to enhance the data rate and fairness among the users. The wireless telecommunications network may include a first access point, or master node, connected to a plurality of further access points, or secondary nodes. The master node discovers which of the secondary access nodes has the processing capabilities and available processing capacity to handle NOMA transmissions. The master node can then coordinate the connection of a selected group of users to one of the secondary nodes that can support NOMA. The processing capabilities and available processing capacity to handle NOMA transmissions can be communicated by the secondary nodes to the master node actively, for example in a periodic manner, or reactively, for example as a result of a request for such information from the master node.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Kalidass, Sri Harish
Roscoe, Jonathan
Selvam, Muthupavithran
Abrégé
A system to verify the correctness of equipment installation configured to perform the steps of: accessing a digital model of the equipment; receiving a representation of the equipment indicating a configuration of the equipment, Accessing installation-specific metadata associated with the installation of the equipment; Predicting at least one behaviour of the equipment based on metadata associated with installation of the equipment; Accessing service information comprising at least one measured behaviour of the equipment; Comparing the representation with the model to determine a first degree of conformity of the equipment with the model of the equipment; if the first degree of conformity is within a first threshold degree of conformity, comparing the at least one predicted behaviour with the at least one measured behaviour to determine a second degree of conformity of the equipment with the service information; and if the second degree of conformity is within a threshold second degree of conformity, verifying to an operator that the equipment is correctly installed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of simulating a propagation of a malware through a set of computer systems, the method comprising: identifying a plurality of first simulated computer systems infected with a simulated malware; for each of the first simulated computer systems, infecting a number of neighbouring second simulated computer systems, the number being zero or an integer; and determining a value of a reproduction number, R0, based on the total number of second simulated computer systems and the number of first simulated computer systems.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
White, Catherine
Wallwork, Matthew
Abrégé
Computer implemented methods. systems and programs of transmitting data from a source node to a destination node through a network via a plurality of intermediate nodes are provided. The method splits the data into a plurality of shares using a secret sharing algorithm. The method determines a respective route through the network to the destination node for each of the plurality of shares. Each route comprises a plurality of intermediate nodes via which that share is to be transmitted. At least two of the routes are different from each other. At least a first intermediate node of each route is common to the other routes. The method constructs a plurality of datagrams for conveying the plurality of shares through the network along their respective routes. Each datagram is intended for processing by a respective intermediate node and is encrypted with a key associated with that intermediate node. Each datagram comprises a payload and routing information for instructing the respective intermediate node to forward data contained in the payload for conveying one or more of the shares along their respective routes towards the destination node. The portion of the respective routes of the one or more shares prior to the respective intermediate node are common to each other. Each datagram other than an initial datagram intended for the first intermediate node is encapsulated within the payload of a preceding datagram intended for a preceding intermediate node on the respective routes of the one or more shares. The payload of at least one of the datagrams comprises a plurality of encapsulated datagrams. The routing information of the at least one of the datagrams instructs the respective intermediate node to transmit the plurality of encapsulated datagrams on to different respective intermediate nodes in the network. The method transmits the initial datagram to the first intermediate node.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Horsley, Ian
Bally, Stephanie
Abrégé
An enclosure (120) for routing a fibre optic cable (190) for a telecommunications network (100), the enclosure comprising a/an: routing member (310) for receiving and routing a fibre optic cable (190) within the enclosure; securing structure (180) for securing the fibre optic cable within the routing member; grating (240) for generating a Mechanically Induced Filter, MIF, in the fibre optic cable; urging member (180) configured to urge the grating against the fibre optic cable thereby to generate the MIF within said fibre optic cable; translation mechanism (230) configured to translate the urging member and the securing structure between: a first arrangement, in which the grating is urged against the fibre optic cable when said fibre optic cable is routed in the routing member, and in which the securing structure secures the fibre optic cable; and a second arrangement, in which the grating is not urged against the fibre optic cable when said fibre optic cable is routed in the routing member, the MIF thereby being absent from the fibre optic cable (540-2), and the fibre optic cable is unsecured by the securing structure.
G02B 6/44 - Structures mécaniques pour assurer la résistance à la traction et la protection externe des fibres, p. ex. câbles de transmission optique
G01M 11/00 - Test des appareils optiquesTest des structures ou des ouvrages par des méthodes optiques, non prévu ailleurs
H04B 10/071 - Dispositions pour la surveillance ou le test de systèmes de transmissionDispositions pour la mesure des défauts de systèmes de transmission utilisant un signal réfléchi, p. ex. utilisant des réflectomètres optiques temporels [OTDR]
66.
A METHOD OF DEPLOYING AN OPTICAL FIBRE CABLE IN A TELECOMMUNICATIONS NETWORK
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Novakovic, Violeta
Morsman, Trevor
Hubert, Malcolm
Abrégé
This invention provides a method of deploying an optical fibre cable in a telecommunications network, the optical fibre cable being configured to connect a first optical fibre interface unit in the telecommunications network and a second optical fibre interface unit in a dwelling, the method comprising the steps of: positioning an optical fibre subduct connector on an optical fibre duct so as to align an aperture in the optical fibre subduct connector with an aperture in the optical fibre duct; connecting an optical fibre subduct with an optical fibre subduct connection interface of the optical fibre subduct connector such that any overlap of the optical fibre subduct and optical fibre subduct connection interface extends up to and not exceeding the aperture of the optical fibre duct, the optical fibre subduct connection interface being configured to resist disconnection of the optical fibre subduct and optical fibre subduct connection interface, wherein the optical fibre subduct connection interface comprises a first section and a second section and the optical fibre subduct and the optical fibre subduct connection interface are connected such that, once the optical fibre subduct connector is positioned on the optical fibre duct, in the first section, the optical fibre subduct and optical fibre duct are parallel or substantially parallel and, in the second section, an angle between the optical fibre subduct and the optical fibre duct is less than 45 degrees; and deploying an optical fibre cable between the first optical fibre interface unit in the telecommunications network and the second optical fibre interface unit in the dwelling by routing the optical fibre cable through optical fibre duct, the optical fibre subduct connector, and the optical fibre subduct.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Gunning, Paul
Rawlinson, John
Challinor, Simon
Abrégé
There is herein described a method of active queue management for use in a telecommunications system comprising a Customer Premises Equipment (CPE) and a network access point, the network access point being adapted to transmit one or more data packets to the CPE, wherein the CPE comprises a plurality of packet queues, each of the plurality of packet queues being capable of holding data packets received from the network access point, the method comprising transmitting queue management information from the CPE to the network access point, where the queue management information enables the determination of a most suitable one of the plurality of packet queues for receiving a data packet, determining, using the transmitted queue management information, the most suitable one of the plurality of packet queues for receiving a data packet to be transmitted from the network access point to the CPE.
H04L 47/283 - Commande de fluxCommande de la congestion par rapport à des considérations temporelles en réponse à des retards de traitement, p. ex. causés par une gigue ou un temps d'aller-retour [RTT]
H04L 47/30 - Commande de fluxCommande de la congestion en combinaison avec des informations sur l'occupation de mémoires tampon à chaque extrémité ou aux nœuds de transit
H04L 47/625 - Ordonnancement des files d’attente caractérisé par des critères d’ordonnancement pour des créneaux de service ou des commandes de service
H04L 47/6295 - Ordonnancement des files d’attente caractérisé par des critères d’ordonnancement par utilisation de plusieurs files d’attente pour chaque cas particulier de qualité de service, de connexion, de flux ou de priorité
H04L 47/70 - Contrôle d'admissionAllocation des ressources
H04L 49/9005 - Dispositions de mémoires tampon en utilisant une allocation dynamique de l'espace des mémoires tampon
68.
ELECTRIC VEHICLES PLATFORM FOR NEW CHARGE INFRASTRUCTURE RISK, TACTICAL, AND OPERATIONAL PLANNING
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Liret, Anne
Pena Rios, Anasol
El-Moussa, Fadi
Kern, Mathias
Chimatapu, Ravikiran
Abrégé
A method of monitoring and managing a network of charger modules for electric vehicles, EVs, is provided. The method comprises receiving charger module network data regarding the location of a plurality of charger modules in the network of charger modules, and receiving EV data from a plurality of EVs currently travelling in the region of the network of charger modules. The method further comprises generating a digital twin of the network of charger modules and EVs based on the charger module network data and the EV data, and monitoring, by the digital twin, the utilisation of the plurality of charger modules by the plurality of EVs. The method further comprises generating one or more predictions based on the monitoring of the utilisation of the plurality of charger modules by the plurality of EVs, and simulating, by the digital twin, the network of charger modules in one or more scenarios based on the generated one or more predictions. A report is then generated based on the simulations and outputted to a management entity.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Khan, Kashaf
Burns, Julian
White, Melvyn
Abrégé
A system for managing resources in a machine learning environment comprising one or more machine learning applications, the system comprising a machine learning application API; a workflow module of the machine learning environment; a generative machine learning model, a first resource controller configured to intercept traffic going to and from the workflow module and configured to perform flow control operations on the intercepted traffic in accordance with a first flow configuration; a second resource controller configured to intercept traffic going to and from the generative machine learning model and configured to perform flow control operations on the intercepted traffic in accordance with a second flow configuration; and a controller manager in communication with the first resource controller and the second resource controller, the controller manager configured to determine the first flow configuration for the first resource controller and the second flow configuration for the second resource controller.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Thurlow, Ian
Davies, Nicholas
Hawksworth, Luke
Abrégé
A computer-implemented method of monitoring the health of a subject within an environment using a plurality of sensors is provided. The method detects an occurrence of a health event for the subject based on data from at least one of the plurality of sensors. The method collects data relating to the health event from one or more of the plurality of sensors based on the occurrence of the health event and a type of the health event. The method provides data relating to the health event to a user.
G16H 50/20 - TIC spécialement adaptées au diagnostic médical, à la simulation médicale ou à l’extraction de données médicalesTIC spécialement adaptées à la détection, au suivi ou à la modélisation d’épidémies ou de pandémies pour le diagnostic assisté par ordinateur, p. ex. basé sur des systèmes experts médicaux
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
El-Moussa, Fadi
Azvine, Behnam
Abrégé
A computer-implemented security method comprising: generating a plurality of partial clones of a malware file, each partial clone reflecting a different aspect of the malware file; causing trial deployment of one or more security services on a software-defined network (SDN); causing each of the plurality of partial clones to be run on a respective host; causing resulting traffic to be routed over the SDN, via one or more network elements on which the security services are deployed; causing performance of each of the security services with respect to each of the plurality of partial clones to be monitored to produce a respective plurality of security service performance measures for each of the security services; and causing operational deployment of a selected one or more of the security services on a network, in dependence on the one or more pluralities of security service performance measures.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Healing, Alexander
Abrégé
A computer-implemented method of simulating the propagation of malware in a network is provided. The method comprises accessing a model of the network, where the model comprises a plurality of computer nodes and where each computer node of the plurality of computer nodes is connected to at least one edge of a plurality of edges. Each edge of the plurality of edges connects a pair of computer nodes of the plurality of computer nodes. The method further comprises initiating an outbreak of the malware in the model at a predetermined source computer node of the plurality of computer nodes, and propagating the malware through the model of the network from the source computer node. The propagation is determined based on a rate of transmission, where the rate of transmission is based upon a contact rate for each edge of the plurality of edges, and the contact rate for each edge of the plurality of edges is based upon the network traffic passing between the computer nodes connected by that edge over a predetermined time period.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Thurlow, Ian
Neild, Ian
Abrégé
A method, an unmanned mobile entity and a computer program are provided for evaluating a performance of a first sensor unit which is arranged to measure a physical property of its environment at a location. An unmanned mobile entity transports a reference sensor unit to the location and the reference sensor unit is arranged to measure the physical property at the location. The performance of the first sensor unit is evaluated based on a comparison of the measurements of the first and reference sensor units.
G01D 18/00 - Test ou étalonnage des appareils ou des dispositions prévus dans les groupes
B64U 40/00 - Dispositions mécaniques embarquées pour régler les surfaces de commande ou les rotorsDispositions mécaniques embarquées pour régler en vol la configuration de base
B64U 101/00 - Véhicules aériens sans pilote spécialement adaptés à des utilisations ou à des applications spécifiques
G01D 11/30 - Supports spécialement adaptés à un instrumentSupports spécialement adaptés à un ensemble d'instruments
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Herwono, Ian
El-Moussa, Fadi
Booth, Luke
Abrégé
A computer implemented security method security method is described, for detecting attacks on a system or network. The method comprises defining a sequence of attack tactics, each attack tactic representing a generalisation of a set of attack techniques, associating one or more attack detection rules with each of the attack techniques, detecting attack events based on the attack detection rules, correlating the detected attack events with the attack tactics based on the attack technique associated with the attack detection rule used to detect the attack events, linking the detected attack events based on one or more criteria, and identifying one or more paths of attack techniques through the sequence in dependence on the linked attack events. The identified paths of attack techniques represent kill chains. The present technique makes it possible to identify new kill chains of known techniques, as well as making it possible to identify high-risk kill chains.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Hercock, Robert
Abrégé
To construct a neural network for image processing or other tasks, a population of software hox genomes is generated, each software hox genome encoding a neural network and comprising, for each of a plurality of zones of a neural network, a hox gene and at least one norm gene, where the norm gene encodes the zone and the hox gene controls at least one of: a quantity of instances of the zone in the neural network, a position of the zone in the neural network, a gradient of weights in the zone, a depth of nested zones within the zone, an amount of bias to be applied to weights in the zone. An evolutionary algorithm is applied to the population of software hox genomes where a fitness function of the evolutionary algorithm comprises a performance of a neural network encoded by a software hox genome on the image processing or other task.
G06N 3/082 - Méthodes d'apprentissage modifiant l’architecture, p. ex. par ajout, suppression ou mise sous silence de nœuds ou de connexions
G06N 3/086 - Méthodes d'apprentissage en utilisant les algorithmes évolutionnaires, p. ex. les algorithmes génétiques ou la programmation génétique
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abrégé
Described are methods of managing content delivery in a network with a population of proxies, each proxy having one or more connected clients. The methods determine which content segments to transmit on a multicast channel by taking into consideration the requests for content segments by the clients. More particularly, the methods describe an approach that allows the skipping of specific segments that have been requested by client devices to a more recent segment for transmission over the multicast channel, so that the multicast channel can be brought closer to the live edge of the content quickly.
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04L 65/1045 - Mandataires, p. ex. pour le protocole d'initiation de session [SIP]
H04L 65/65 - Protocoles de diffusion en flux de paquets multimédias, p. ex. protocole de transport en temps réel [RTP] ou protocole de commande en temps réel [RTCP]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Beard, Alfie
Bowman, Tom
Abrégé
A computer-implemented method of simulating a propagation of a malware through a set of computer systems, the method comprising: identifying a simulated computer system infected with a simulated malware; determining a first signature of the simulated malware; determining that a mutation condition for the simulated malware has been met; and in response to determining that the mutation period has been met, changing the first signature of the simulated malware to a second signature.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Pena Rios, Anasol
Conway, Anthony
Zia, Muhammad, Saad
Anjum, Ashiq
Abrégé
A digital twin is described for controlling entities such as software defined communications networks. Sensor data is observed from an entity and input to a digital twin of the entity, the digital twin comprising at least one learning block, and at least one physics block encoding a rule. The sensor data is processed through the learning block and the physics block such that the data follows a path through the digital twin through the blocks and along one or more connections between the blocks to generate an output. Automated control of the entity may be triggered in dependence on the generated output.
G05B 17/00 - Systèmes impliquant l'usage de modèles ou de simulateurs desdits systèmes
B60W 40/00 - Calcul ou estimation des paramètres de fonctionnement pour les systèmes d'aide à la conduite de véhicules routiers qui ne sont pas liés à la commande d'un sous-ensemble particulier
G05B 17/02 - Systèmes impliquant l'usage de modèles ou de simulateurs desdits systèmes électriques
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abrégé
Described are methods of managing content delivery in a network with a population of proxies, each proxy having one or more connected clients. The methods determine which content segments to transmit on a multicast channel by taking into consideration the requests for content segments by the clients. More particularly, a count is maintained of the number of times a content segment has been requested by a client device immediately after that client device has requested the content segment that has most recently been transmitted on the multicast channel. A content segment with a high value of this count is one that has been requested by many client devices immediately after the one most recently transmitted on the multicast channel and is therefore a good candidate to transmit next on the multicast channel.
H04L 65/611 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour la multidiffusion ou la diffusion
H04L 65/612 - Diffusion en flux de paquets multimédias pour la prise en charge des services de diffusion par flux unidirectionnel, p. ex. radio sur Internet pour monodiffusion [unicast]
H04L 65/1045 - Mandataires, p. ex. pour le protocole d'initiation de session [SIP]
H04L 65/65 - Protocoles de diffusion en flux de paquets multimédias, p. ex. protocole de transport en temps réel [RTP] ou protocole de commande en temps réel [RTCP]
80.
DISTRIBUTED SOFTWARE AGENTS FOR MANAGING A DECENTRALISED PEER-TO-PEER STORAGE NETWORK
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abrégé
A method of managing a decentralised repository of stored digital units of information, the decentralised repository comprised of a plurality of inter-acting peer-to-peer computing systems, comprising steps of: (a) loading a software agent on each of a plurality of peer-to-peer computing systems, the software agents making up a network of distributed software agents; (b) using the network of distributed software agents to manage the decentralized repository of stored digital units of information; wherein at least one of (i) software agent code for at least one of the software agents, and (ii) a cryptographic digest of such software agent code, is stored in at least one block in the decentralised repository.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Zhang, Yangyishi
Al Rawi, Anas
Abrégé
A computer-implemented method for determining a transmit precoding operation to apply to a signal to be transmitted through a wireless channel via beamforming wherein the signal u is represented by a vector, u, is described. The method comprises obtaining an inverse channel matrix, G wherein the inverse channel matrix, G, is an inverse of a channel matrix, H, wherein the channel matrix, H, is a matrix representation of the wireless channel. The method further comprises determining a vector, b, that approximately minimizes a square of a norm of a result of applying the inverse channel matrix G to the sum of the vector representing the signal, u, and the vector, b, wherein the entries of the vector, b, are integers and determining the vector b.
H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04B 7/0456 - Sélection de matrices de pré-codage ou de livres de codes, p. ex. utilisant des matrices pour pondérer des antennes
British Telecommunications Public Limited Company (Royaume‑Uni)
Inventeur(s)
Lord, Andrew
Abrégé
There is herein disclosed an apparatus for performing quantum key distribution, the apparatus comprising a plurality of connected functional components which, in use, co-operate to perform quantum key distribution, wherein one or more of the plurality of functional components are functionally disconnectable from, and re-connectable to, the remainder of the plurality of functional components.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abrégé
A method of managing storage units representing digital assets in a decentralised repository arranged in a peer-to-peer network comprising a plurality of peer computing systems, comprising steps of: selecting at least one storage unit hosted on a first peer computing system, where the selecting is carried out using selection criteria rules encoded in software; performing a cryptographic processing function taking as inputs information related to a current version of a first storage unit and information related to the selected at least one storage unit to generate a result as an output of the cryptographic processing function, where the first storage unit is hosted on a second peer computing system; and storing the result into a new version of the first storage unit.
H04L 9/06 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité l'appareil de chiffrement utilisant des registres à décalage ou des mémoires pour le codage par blocs, p. ex. système DES
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Scahill, Francis
Ringland, Simon
Abrégé
Described are methods for managing the transmission of group addressed packets (such as broadcast and multicast packets) in a wireless local area network, where two or more access points share a coverage area but are not themselves in direct communication range of each other. The method determines this set of access points, and assigns a unique delay value to each of the set of access points. The respective delay values are then used by each access point to delay transmission of the group addressed packets. As a result, transmission of group addressed packets at the same time is avoided for these access points that share a coverage area but are not in direct communication with each other.
H04W 72/30 - Gestion des ressources des services de diffusion
H04W 4/06 - Répartition sélective de services de diffusion, p. ex. service de diffusion/multidiffusion multimédiaServices à des groupes d’utilisateursServices d’appel sélectif unidirectionnel
H04W 74/0816 - Accès non planifié, p. ex. ALOHA utilisant une détection de porteuse, p. ex. accès multiple par détection de porteuse [CSMA] avec évitement de collision
85.
A TELECOMMUNICATIONS SYSTEM AND A METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
El-Moussa, Fadi
Reeves, Andrew
Abrégé
A method (200) of operating a telecommunications system (100), said system comprising a/an: client device (110); set of servers (130) for providing a service to the client device; and authentication server (120) for generating an authentication ticket for provision of the service by the set of servers to the client device; the method comprising the steps of: generating at the authentication server: a set of encrypted levels of service (220), said set comprising at least two different levels of service, each of said levels: comprising a performance requirement; and being encrypted with a corresponding encryption key from a set of encryption keys; and an authentication ticket, for the client device and service, said ticket comprising the set of encrypted levels of service; communicating, to the set of servers; the authentication ticket (230); and performing a process comprising the steps of: communicating, to the set of servers, an encryption key, from the set of encryption keys, not yet having been communicated to the set of servers (240); processing, by the set of servers, the authentication ticket using said communicated encryption key, thereby to retrieve the performance requirement within the corresponding level of service (250); determining, by the set of servers, whether to provide the service in accordance, at least, with the retrieved performance requirement (250); and subsequent to said determining, identifying that provision of the service according to, at least, the retrieved performance requirement is (260): rejected by the set of servers (260-1), in response to which subsequently reiterating the process (240); or accepted by at least one of the servers (260-2), in response to which subsequently selecting one of said servers to provide the service according to, at least, the retrieved performance requirement (280).
H04L 67/1008 - Sélection du serveur pour la répartition de charge basée sur les paramètres des serveurs, p. ex. la mémoire disponible ou la charge de travail
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Hercock, Robert
White, Catherine
Abrégé
A method of exchanging quantum information between a photon and a micro/nano scale resonant structure is provided. The method comprises providing the resonant structure (15) in an optical waveguide (10). The method further comprises passing a photon (18) through the resonant structure in the optical waveguide. The method also comprises applying a driving signal (17) to the resonant structure to cause phonic oscillation of the resonant structure and to modulate a wavelength of the photon such that the passing the photon through the resonant structure results in an exchange of quantum information between the photon and a quantum state in a phonon of the resonant structure.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Herwono, Ian
El-Moussa, Fadi
Abrégé
A computer-implemented method for monitoring a computer network is provided, the method comprising: storing a first attack graph, the attack graph comprising a plurality of nodes each representing an event that may occur within the computer network; storing one or more predetermined variation properties of one or more of the events represented by the nodes, the variation properties being indicative of possible changes to the nodes within the first attack graph; determining a plurality of possible alternative sequences of the nodes in the first attack graph based on the variation properties; generating a plurality of additional attack graphs, each of the additional attack graphs comprising a plurality of the nodes of the first attack graph arranged in one of the possible sequences; and monitoring events within the network to detect a set of events occurring in a sequence that corresponds to one of the additional attack graphs to identify a potential security attack. A computer system including at least one processor and memory storing computer program code configured to perform the said method, and a computer program or computer readable medium comprising instructions that when executed by a computer system cause the computer system to perform the said method are also provided.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Wallwork, Matthew
Cristina, Claudia
Georgalas, Nektarios
Abrégé
A system, method and computer program for monitoring a subject are provided. The system comprises one or more sensors configured to collect data relating to the subject. The system further comprises a query pattern store configured to store one or more query patterns. Each query pattern is associated with a respective data processor for generating summary data based on the data, the summary data conveying less information about the subject than the data. The system further comprises a query processor configured to: receive a query regarding the subject from a user of the system; identify a query pattern that matches the query; determine whether the user is permitted to make queries matching that query pattern; and in response to determining that the user is permitted, provide a response to the query, the response comprising summary data generated using the respective data processor for that query pattern.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
White, Catherine
Roscoe, Jonathan
Hercock, Robert
Abrégé
A method of storing storage units representing digital assets into a decentralised repository arranged in a peer-to-peer network comprising a plurality of peer computing systems, to create an archive of the digital assets, comprising steps of, for each new storage unit being submitted to the archive by a submitting peer computer system: determining a specific quantity of stored existing storage units, each of which the new storage unit is to be cryptographically linked to, where the existing storage units have been previously submitted to the archive; selecting specific ones of all of the existing storage units up to the received specific quantity of stored existing storage units, where the selection has been made from existing storage units stored by specific ones of the peer computing systems; performing cryptographic processing by taking as inputs to such cryptographic processing, the selected specific existing storage units and the new storage unit, and obtaining a result of such cryptographic processing; adding the result into the new storage unit; and distributing the new storage unit to a plurality of peer computing systems, thereby adding the new storage unit to the decentralised repository.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
90.
Method of operating a wireless telecommunications network
British Telecommunications Public Limited Company (Royaume‑Uni)
Inventeur(s)
Neild, Ian
Reeves, Andrew
Abrégé
A method (400) of operating a wireless telecommunications network (100), said network comprising a plurality of User Equipment (110), UEs, a Wireless Access Point (120), WAP, and a Wireless Local Area Network (140), WLAN, provided by means of the WAP, the method comprising the steps of: associating, against each of the plurality of UEs, an item of information and a unique character slot for the item of information (410); compiling each item of information into a string, wherein said items of information are arranged according to each associated character slot (420); broadcasting, by means of the WAP, a network identifier for the WLAN, said network identifier comprising the compiled string (430); identifying, by means of each of the UEs, the broadcast network identifier (440); retrieving, by means of each UE, the character slot for the associated UE; and using, by means of each UE, the retrieved character slot so as to extract the associated item of information from the identified network identifier.
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
91.
METHOD OF OPERATING A WIRELESS TELECOMMUNICATIONS NETWORK
British Telecommunications Public Limited Company (Royaume‑Uni)
Inventeur(s)
Neild, Ian
Reeves, Andrew
Abrégé
A method of operating a wireless telecommunications network, said network comprising a plurality of User Equipment devices, UEs, a Wireless Access Point, WAP, and a Wireless Local Area Network, WLAN, provided by means of the WAP, the method comprising the steps of: associating, against each of the plurality of UEs, an item of information and a unique timeslot; determining a current time, and from said determination identifying, from the associated timeslots, a timeslot within which the current time coincides; broadcasting, by means of the WAP, for the WLAN, a network identifier comprising the item of information associated with the identified timeslot; identifying, by means of each of the UEs, the broadcast network identifier; and subsequently processing, by means of the UE associated with the identified timeslot, the identified network identifier, such that said UE derives the item of information allocated to said UE.
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 72/0446 - Ressources du domaine temporel, p. ex. créneaux ou trames
H04W 84/12 - Réseaux locaux sans fil [WLAN Wireless Local Area Network]
BRITISH TELECOMMUNICATIONS public limited company (Royaume‑Uni)
Inventeur(s)
Arokkiam, Jerome
Ringland, Simon
Abrégé
This invention provides a method of operating a wireless local area network, the wireless local area network including a user device, a wireless access point and a wireless repeater, wherein the wireless repeater is configured to virtualise a Media Access Control, MAC, address of the user device when the user device is connected to the wireless repeater, the method comprising the steps of: obtaining data including a first plurality of records, wherein each record of the first plurality of records relates to the user device and includes a MAC address and a signal strength value; obtaining data including a second plurality of records, wherein each record of the second plurality of records includes a Basic Service Set Identifier, BSSID, and a signal strength value; for each MAC address in the first plurality of records: identifying a record of the second plurality of records having a BSSID that sufficiently matches the MAC address by determining a similarity between an Organisationally Unique Identifier, OUI, of the BSSID and the OUI of the MAC address, determining that a difference between the signal strength value associated with the identified record of the second plurality of records and the signal strength value associated with the MAC address of the first plurality of records is within a threshold, assigning a first hop repeater identifier to each record of the first plurality of records having the MAC address based on the BSSID of the identified record of the second plurality of records; and causing a reconfiguration in the wireless local area network based on the first hop repeater identifier.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Hao, Mo
Dai, Linglong
Zhu, Jieao
Wan, Zhongzhichao
Mackenzie, Richard
Abrégé
A method of encoding a concatenated polar code is provided, including evaluating channel reliabilities; selecting channels based on each channel's relative reliability; constructing a polar code of information bits arranged with a front and a rear; attaching additional cyclic redundancy checking (CRC) bits to the rear of the information bits; inserting parity bits at proper locations to yield a bit string; feeding the bit string into a polar encoder; and obtaining a codeword. A successive cancellation list and bit flipping decoding method for concatenated polar code also is provided, including initializing a LLR of the codeword; screening paths; performing a CRC check on the screened paths and if the CRC check is not met; determining, in response to the CRC check not being met, at least one most unreliable bit based on a revised critical set (RCS); reversing a previous decision if the most unreliable bit was previously selected; and restarting the decoding method.
H03M 13/29 - Codage, décodage ou conversion de code pour détecter ou corriger des erreursHypothèses de base sur la théorie du codageLimites de codageMéthodes d'évaluation de la probabilité d'erreurModèles de canauxSimulation ou test des codes combinant plusieurs codes ou structures de codes, p. ex. codes de produits, codes de produits généralisés, codes concaténés, codes interne et externe
H03M 13/11 - Détection d'erreurs ou correction d'erreurs transmises par redondance dans la représentation des données, c.-à-d. mots de code contenant plus de chiffres que les mots source utilisant un codage par blocs, c.-à-d. un nombre prédéterminé de bits de contrôle ajouté à un nombre prédéterminé de bits d'information utilisant plusieurs bits de parité
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Arokkiam, Jerome
Ringland, Simon
Abrégé
This invention provides a method of operating a wireless local area network, the wireless local area network including a user device, a wireless access point and a wireless repeater, wherein the wireless repeater is configured to virtualise a Media Access Control, MAC, address of the user device when the user device is connected to the wireless repeater by changing the Organisationally Unique Identifier, OUI, of the MAC address, the method comprising the steps of: obtaining data including a plurality of records, wherein each record of the plurality of records relates to the user device and includes a MAC address and a device label of the user device, wherein at least one record of the plurality of records includes a MAC address that has been virtualised by the wireless repeater; processing each record of the plurality of records by: determining that the MAC address of the processed record is a local MAC address, and, if so, identifying another record of the plurality of records that is uniquely associated with the user device based on the MAC address of the processed record by determining a Network Interface Controller, NIC, value of the MAC address of the processed record, determining that the determined NIC value is uniquely associated with a device label in the plurality of records, and identifying another record of the plurality of records having the associated device label, and assigning a unique identifier to the processed record based on the MAC address of the identified other record of the plurality of records; analysing the plurality of records having the unique device identifier; and causing a reconfiguration in the wireless local area network based on the analysis.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Khan, Kashaf
Turner, Benjamin
Abrégé
Methods, system, and apparatus are disclosed for machine learning model monitoring in which the model is trained by a training process based on training data to model an approximation of a function such that, in use, the model generates output data for given input data. In one aspect, a computer-implemented method is disclosed comprising the steps of; triggering retraining of the model by a first logic component, responsive to monitoring output generated by the model, wherein the first logic component is defined based on a configuration including a definition of an acceptable measure of effectiveness of the model and one or more characteristics of the first logic component and triggering adjustment of the first logic component by a second logic component, responsive to monitoring a consistency of input data to the model, the adjustment including adjusting the configuration.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Burton, Fraser
Walker, Aaron
Hubert, Malcolm
Abrégé
This invention provides device comprising: a transceiver configured to receive downlink signals and to transmit uplink signals, wherein the downlink signal has a first signal property and the uplink signal has a second signal property; a protective structure at least partially surrounding the transceiver; a first transmissive Reconfigurable Intelligent Surface, RIS, at least partially supported by the protective structure; and a second transmissive RIS at least partially supported by the protective structure, wherein: the downlink and uplink signals each pass through the protective structure, the first transmissive RIS and the second transmissive RIS, the protective structure is electromagnetically transparent, and the first transmissive RIS is configured to apply a downlink configuration to reconfigure the downlink signals having the first signal property communicated with the transceiver and the second transmissive RIS is configured to apply an uplink configuration to reconfigure the uplink signals having the second signal property communicated with the transceiver.
H01Q 1/42 - Enveloppes non intimement mécaniquement associées avec les éléments rayonnants, p. ex. radome
H01Q 3/44 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier les caractéristiques électriques ou magnétiques des dispositifs de réflexion, de réfraction ou de diffraction associés à l'élément rayonnant
H01Q 1/24 - SupportsMoyens de montage par association structurale avec d'autres équipements ou objets avec appareil récepteur
97.
A DEVICE COMPRISING AN ANTENNA AND PROTECTIVE ENCLOSURE
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Burton, Fraser
Walker, Aaron
Hubert, Malcolm
Abrégé
This invention provides device comprising: an antenna configured to receive signals in a first set of timeslots of a plurality of timeslots and further configured to transmit signals in a second set of timeslots of the plurality of timeslots; a first reflective Reconfigurable Intelligent Surface, RIS, configured to reconfigure reflected signals communicated with the antenna, wherein the first reflective RIS has a first configuration to reconfigure reflected signals in the first set of timeslots of the plurality of timeslots and a second configuration to reconfigure reflected signals in the second set of timeslots of the plurality of timeslots; and a protective structure at least partially surrounding the antenna and the first reflective RIS.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Burton, Fraser
Hubert, Malcolm
Walker, Aaron
Abrégé
This invention provides a device comprising: a transceiver configured to receive signals in a first set of timeslots of a plurality of timeslots and further configured to transmit signals in a second set of timeslots of the plurality of timeslots; a protective structure at least partially surrounding the transceiver; and a first transmissive Reconfigurable Intelligent Surface, RIS, at least partially supported by the protective structure and configured to reconfigure signals communicated with the transceiver passing through the first transmissive RIS, wherein the first transmissive RIS is configured to apply a first configuration to reconfigure signals passing through the first transmissive RIS in the first set of timeslots of the plurality of timeslots and is further configured to apply a second configuration to reconfigure signals passing through the first transmissive RIS in the second set of timeslots of the plurality of timeslots.
H01Q 1/42 - Enveloppes non intimement mécaniquement associées avec les éléments rayonnants, p. ex. radome
H01Q 3/44 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier les caractéristiques électriques ou magnétiques des dispositifs de réflexion, de réfraction ou de diffraction associés à l'élément rayonnant
H01Q 15/00 - Dispositifs pour la réflexion, la réfraction, la diffraction ou la polarisation des ondes rayonnées par une antenne, p. ex. dispositifs quasi optiques
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Sani, Sadiq
Abrégé
A computer implemented method for detecting anomalous behaviour within a system is provided. The method generates an autoencoder for detecting anomalous behaviour within the system. The method also generates a classifier for predicting a classification of behaviour within the system. An input to the classifier comprises an output from one or more internal layers of the autoencoder. The method jointly trains the autoencoder and the classifier using a set of training data comprising a plurality of sample inputs that represent normal behaviour within the system and a plurality of sample inputs that represent anomalous behaviour within the system. The training is based on an output from a joint loss function that is configured to combine any reconstruction loss from the autoencoder with any prediction error from the classifier. The joint loss function is further configured to negate any reconstruction loss of the autoencoder in response to the sample input representing anomalous behaviour within the system. The trained autoencoder is used to classify a behaviour of the system as being normal or anomalous.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (Royaume‑Uni)
Inventeur(s)
Bull, Nicola
Abrégé
A method for monitoring a network can include determining whether there is a performance issue in respect of streamed communication carried via a first network connection between a first customer premise equipment (CPE) in a local area network (LAN) and one or more remote entities outside the LAN, wherein the determination is based on data from the streamed communication. In response to determining that there is a performance issue in respect of the streamed communication carried via the first network connection, it is determined whether there is a performance issue in respect of the first network connection. In response to determining that there is a performance issue in respect of the first network connection, a monitoring process is triggered to determine whether there is a performance issue in respect of other network connections connecting to a set of other CPEs, in respective other LANs, so as to define a cluster of CPEs exhibiting performance issues in respect of their network connections, the cluster being for identifying a candidate cause of the performance issue in respect of the streamed communication.
H04L 43/0811 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant la connectivité
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente