Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

British Telecommunications Public Limited Company patents


Recent patent applications related to British Telecommunications Public Limited Company. British Telecommunications Public Limited Company is listed as an Agent/Assignee. Note: British Telecommunications Public Limited Company may have other listings under different names/spellings. We're not affiliated with British Telecommunications Public Limited Company, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "B" | British Telecommunications Public Limited Company-related inventors


 new patent  Operation of data network

The servers in a data network are monitored (16) and classified (290) according to the data flows to and from the servers, to identify servers with low usage, and programming instructions and data relating to those servers are retrieved and stored (32, 17) so that they may subsequently be retrieved (18) to replicate the server to which they relate.. . ... British Telecommunications Public Limited Company

 new patent  Network operation

A method of operating a communications network is disclosed. Modern communications networks produce vast amounts of network operational data which have the potential to provide a useful summary of the operational state of the network. ... British Telecommunications Public Limited Company

 new patent  Digital adsl regenerator device with adaptive data forwarding

Regenerator devices (30) for use with digital subscriber line (dsl) connections are disclosed which forward user data received in a modulated signal from one link (l1) of a dsl connection on to another link (l2) of the dsl connection. Such devices comprise a first transceiver module (302) which receives a modulated signal from the first link and demodulates it whereby to obtain user data, and a second transceiver module (306) which receives the user data obtained by the first transceiver module and transmits a modulated signal carrying it on to the other link. ... British Telecommunications Public Limited Company

 new patent  Controlled resource provisioning in distributed computing environments

A computer implemented method to provide allocation of one or more computing resources for a consumer computing component, each resource having a resource type and being provided by one or more resource providers, and the consumer having associated a quantity of tradeable value constraining an extent of resource consumption.. . ... British Telecommunications Public Limited Company

 new patent  Expendable access control

A computer implemented method of a resource provider for access control for a restricted resource in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components including a provider record associated with the resource provider, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; receiving a request from a resource consumer for access to the resource; communicating, to the resource consumer, an indication of a quantity of a cryptocurrency required for access to the resource; and in response to a determination that the required quantity of cryptocurrency is transferred to the provider record in the blockchain, the transfer being caused by a blockchain transaction including an identification of the role and the transaction being validated by a miner component, granting the consumer access to the resource in accordance with the role definition.. . ... British Telecommunications Public Limited Company

 new patent  Access control

A computer implemented method of access control for a restricted resource of a resource provider in a network connected computer system, wherein a blockchain data structure accessible via the network stores digitally signed records validated by network connected miner software components, the method including: identifying an access control role definition for access to the resource, the role including a specification of access permissions; defining a cryptocurrency for indicating authorization to access the resource, the cryptocurrency being formed of tradable units of value associated with records in the blockchain and wherein transfer of the cryptocurrency between records in the blockchain is validated by the miners; receiving a request from an authenticated resource consumer for authorization to access the resource; and submitting a blockchain transaction to the miner components to transfer a quantity of cryptocurrency to a consumer record in the blockchain, the transaction including an identification of the role, such that the consumer record identifies that the consumer is authorized to access the resource in accordance with the role definition.. . ... British Telecommunications Public Limited Company

Network function virtualization

An optimum configuration of resources in a network function virtualisation data network is identified by assembling candidate configurations of resources (243), each configuration being an arrangement of the resources into clusters selected such that each cluster provides one or more required services, (212, 213) and assessing the candidate configurations (step 400) to identify an optimum configuration, the assessment of each configuration including measurement of latency (195) in physical links between the resources and, for each candidate configuration, determination of the total latency between the resources within each cluster of the configuration, for a predicted level and pattern of traffic associated with the required service to be operated by each cluster.. . ... British Telecommunications Public Limited Company

Digital content provision

A collaborative recommender system which is based on an application of formal concept analysis is disclosed. A problem with collaborative recommender systems based on formal concept analysis is that the size of the concept lattices generated can be very large. ... British Telecommunications Public Limited Company

Negotiating quality of service for data flows

A method of allocating resources in a network for the transmission of a data flow is disclosed. The method involves receiving a query specifying one or more quality-of-service (qos) requirements for the data flow and identifying, based on the specified qos requirements, one or more qos models from a set of stored qos models, each qos model defining a class of service available in the network. ... British Telecommunications Public Limited Company

Network operation

A method of operating a communications network is disclosed. In order to manage a network, it is first necessary to establish the state the network is in. ... British Telecommunications Public Limited Company

Model management in a dynamic qos environment

The present invention provides a method of providing qos models for a communications network in which: data is obtained data describing a plurality of qos models, with each qos model containing at least one qos component specifying a characteristic of network traffic to be provided by the qos model; monitoring network traffic to obtain a plurality of indicators, each indicating a characteristic of the network traffic associated with one of the qos models; selecting, based on the indicators, a subset of the plurality of qos models; and providing data identifying the subset of qos models to a client device to enable the client device to send data over the network according to a selected one of the subset of qos models.. . ... British Telecommunications Public Limited Company

Real time index generation

A computer implemented method of real-time index generation of data in a data stream during data stream recording to an archive, the method including: receiving a byte of the data stream; and adding an entry for the byte of the data stream to a bitmap index of bytes, the bitmap index indicating, for each possible byte value, a location in the archive of each of occurrences and non-occurrences of the byte value by a sequence of bit values in the bitmap index, wherein the bitmap index includes a count of a number of occurrences for each byte value, wherein a plurality of run length encoding (rle) schemes are applied to sub-sequences of identical bit values for each byte value in the index, each rle scheme having a different encoding type identified by an encoding type indicator and indicating a bit value and a number of bits in a sub-sequence, and wherein a pair of rle encoded sub-sequences of indications of non-occurrence of a byte value implies a single indication of an occurrence of the byte value between the pair.. . ... British Telecommunications Public Limited Company

Low latency media streaming

Examples of the present invention provide a method of reducing the latency in streaming live media by a client from a server. The client uses manifest information to determine the “live edge” of the live media stream, where the live edge is represented by the segment from the media stream corresponding to the current time. ... British Telecommunications Public Limited Company

Identifying an attacked computing device

A computer implemented method to identify an attacked computing device in a system of network-connected computing devices providing a plurality of computing services, the method including receiving a first data structure including data modeling relationships between vulnerabilities of computing services in a first proper subset of the plurality of computing services and exploitation of such vulnerabilities to identify one or more series of exploits involved in a network attack; receiving a second data structure including data modeling the computing devices in the system including the network connections of each computing device; and comparing the first and second data structures to identify the attacked computing device as an intermediate device in communications between at least two computer services in any of the one or more series of exploits.. . ... British Telecommunications Public Limited Company

07/05/18 / #20180191635

Communications network

The present invention provides a method of operating a communications network such that routing models for the network can be constructed on the basis of parameters which are not directly related to the transmission performance of the network. Indirectly related parameters, such as resilience, cost or energy use, may be used to construct the routing models such that a request for a communication session may be based on a required indirect parameter value.. ... British Telecommunications Public Limited Company

07/05/18 / #20180191634

Quality of service management in a network

Method and systems for managing qos models for traffic flows in a network are described. In particular, the method includes storing the qos models and analysing at least one of the qos models to determine whether the qos model satisfies a suitability test. ... British Telecommunications Public Limited Company

07/05/18 / #20180191622

Modifying quality of service treatment for data flows

Modifying quality of service treatment for data flows a method of transmitting a data flow via a network is disclosed where the network supports transmission of data in accordance with a plurality of quality of service, qos, models. Prior to transmission of the data flow, a client system configures a first class of service for the data flow based on a first qos model, and a first portion of the data flow is transmitted through the network in accordance with the first class of service. ... British Telecommunications Public Limited Company

07/05/18 / #20180191621

Communications network

The present invention provides a method of operating a communications network such that the classes of service offered by a network operator will depend upon the underlying conditions in the network. A number of performance models, each of which is described by two vectors, is determined from historical network data. ... British Telecommunications Public Limited Company

07/05/18 / #20180191620

Local and demand driven qos models

The present invention provides a method comprising: receiving a plurality of queries, each query specifying one or more quality-of-service (qos) requirements for the transmission of a data flow in a network; determining a query prototype, the query prototype comprising at least one qos component value based on the one or more qos requirements; obtaining a plurality of items of route data, wherein each item of route data is associated with a corresponding route through the network and indicates a qos component of the corresponding route; comparing the route data with the query prototype to identify routes which match the query prototype; and in the event that a selected number of routes match the query prototype, responding to a further query by transmitting a query response comprising a new qos model based on the matching query prototype.. . ... British Telecommunications Public Limited Company

07/05/18 / #20180191619

Model management in a dynamic qos environment

The present invention provides a computer implemented method for allocating resources to quality of service, qos, models in a network, the method comprising: selecting a route in the network, wherein the route comprises a plurality of flows of network traffic; obtaining model-to-route mapping data identifying a plurality of qos models, wherein each qos model is used by at least one of the plurality of flows of network traffic; monitoring the plurality of flows of network traffic to determine a characteristic of each of the plurality of flows; and in the event that one of the qos models is withdrawn, reallocating resources of the selected route to flows of network traffic along that route, wherein the reallocation is based on at least one of: the qos model used by each of the flows of network traffic along that route; and the characteristic of each of the flows.. . ... British Telecommunications Public Limited Company

07/05/18 / #20180191606

Communications network

A method of operating a communications network, in which a primary learning process periodically determines which routes communications sessions are assigned to in order that the session can be carried with a requested qos. A secondary learning process is used, in between instances of the primary learning process to check that the qos constraints are still satisfied. ... British Telecommunications Public Limited Company

06/28/18 / #20180183670

Energy management in a network

A network management method is described for managing energy utilisation in a network comprising network elements that handle network traffic. The network elements are analysed to identify at least one candidate network element for energy usage reduction. ... British Telecommunications Public Limited Company

06/28/18 / #20180181642

Signal identification

A computer implemented method for identifying a signal in a sequence of numerical values, the method including: converting the sequence of numerical values into a vector sequence by converting each value in the sequence to a normalized vector representation; generating a vector field comprising the vector sequence as a multi-dimensional data structure such that vectors in the vector sequence are plotted in sequence in the vector field; modeling a simulated flow of particles through the vector field such that a flow of each particle is influenced by vectors in the vector field; generating one or more static representations of the particles, each representation being generated at a particular point in time; and performing feature detection on each of the one or more static representations to identify features in the representation corresponding to the signal.. . ... British Telecommunications Public Limited Company

06/21/18 / #20180173568

Resource provisioning in distributed computing environments

A computer implemented method to provide a resource to a virtualized software installation in a distributed computing environment, the method including: receiving a functional requirement for the software installation; determining an extent of the resource required to implement the functional requirement; identifying one or more resource providers in the distributed computing environment having availability of the required resource to the determined extent; and communicating an indication of the identified resource providers to the software installation in order that the resource can be provided to the software installation to the determined extent to provide the functional requirement.. . ... British Telecommunications Public Limited Company

05/03/18 / #20180124693

Interface selection in a wireless router

A wireless router having a wifi wireless network and including a small cell for routing lte cellular data to a mobile network core is configured to monitor connected mobile devices and determine whether each mobile device should be connect to the hub using wifi or lte in accordance with the current utilization of the wifi network and the current utilization of the lte small cell. The network identity information of the device's wifi interface and the device's lte interface is provided by an application operating on the mobile device.. ... British Telecommunications Public Limited Company

05/03/18 / #20180124630

Wlan-lte interface selection

A wireless router having a wifi wireless network and including a small cell for routing lte cellular data to a mobile network core is configured to monitor connected mobile devices and determine whether each mobile device should be connect to the hub using wifi or lte in accordance with the current utilization of the wifi network and the current utilization of the lte small cell. Since the small cell data traffic is encrypted in a data tunnel to the mobile network core, the network identity information of the device's wifi interface and the device's lte interface is determined by consulting an address mapping store in the cellular mobile network core.. ... British Telecommunications Public Limited Company

04/19/18 / #20180109998

Interface selection

A wireless router having a wifi wireless network and including a small cell for routing lte cellular data to a mobile network core is configured to monitor connected mobile devices and determine whether each mobile device should be connect to the hub using wifi or lte in accordance with the current utilization of the wifi network and the current utilization of the lte small cell. Since the small cell data traffic transmitted in a data tunnel to the mobile network core is accessible to the monitor, the network identity information of the device's wifi interface and the device's lte interface can be determined by consulting an address mapping store in the cellular mobile network core. ... British Telecommunications Public Limited Company

04/19/18 / #20180109974

Communications network

This disclosure relates to a method of controlling a customer premises equipment (cpe), and a cpe, in a cellular communications network, the cellular communications network having an overlapping coverage area with a wireless local access network, wlan, the method including: receiving data relating to the wlan and cellular communications networks; analyzing the received data; and configuring a downlink capacity of the cellular communications network based on the analysis of the received data.. . ... British Telecommunications Public Limited Company

04/19/18 / #20180109851

Content playback management

A server and method for terminating, at a target client device, playback of content provided from a server to the target client device. A target client device at which playback is to be terminated is identified. ... British Telecommunications Public Limited Company

04/12/18 / #20180103416

Cellular mobile device

In a cellular communications network having a radio access network of macrocells and small cells. A mobile device having a uicc/sim card is configured to change its displayed network name and functionality in accordance with whether the mobile device has connected to a macrocell or a small cell. ... British Telecommunications Public Limited Company

03/29/18 / #20180091648

Streamed communication

Methods, apparatus and systems are disclosed for managing digitally-streamed audio communication sessions between user devices (7a, 7b, 7c). The user devices are configured to send digitally-streamed data (21) indicative of received audio contributions from respective participants in a multiple-participant audio communication session to a multiple-participant audio communication session controller (30) for processing and onward streaming of data (22) indicative of the received audio contributions from the session controller (30) to one or more other user devices (7a, 7b, 7c) for conversion to audio representations for respective other participants of the received audio contributions. ... British Telecommunications Public Limited Company

03/29/18 / #20180091563

Streamed communication

Methods, apparatus and systems are disclosed for managing digitally-streamed audio communication sessions between user devices (7a, 7b, 7c). The user devices are configured to send digitally-streamed data (21) indicative of received audio contributions from respective participants in a multiple-participant audio communication session to a multiple-participant audio communication session controller (30) for processing and onward streaming of data (22) indicative of the received audio contributions from the session controller (30) to one or more other user devices (7a, 7b, 7c) for conversion to audio representations for respective other participants of the received audio contributions. ... British Telecommunications Public Limited Company

03/29/18 / #20180091531

Configuration parameters for virtual machines

A computer implemented method to generate a classification scheme for configuration parameters of virtual machines (vms) in a virtualized computing environment including: training a machine learning algorithm as a classifier based on a plurality of training data items, each training data item corresponding to a training vm and including a representation of parameters for a configuration of the training vm and a representation of characteristics of security attacks for the training vm; and generating a data structure for storing one or more relationships between vm configuration parameters and attack characteristics, wherein the data structure is generated by sampling the trained machine learning algorithm to identify the relationships.. . ... British Telecommunications Public Limited Company

03/29/18 / #20180091431

Processing data items in a communications network

Methods and apparatus are disclosed for processing data items received at a network element in a communications network. In particular, methods and apparatus are disclosed for processing data items such as packets received at a network element such as a router or other such packet-forwarding network element (20) from a source (1, 1′) and which are intended to be forwarded towards an intended receiver (2, 2′) in a communications network such as a network operating according to the internet protocol.. ... British Telecommunications Public Limited Company

03/29/18 / #20180091377

Network operation

A method of operating a communications network is disclosed. In order to manage a network, it is first necessary to establish the state the network is in. ... British Telecommunications Public Limited Company

03/22/18 / #20180083815

Method and apparatus for transmitting and receiving signals over two pairs of wires

A system (100), (200), (310), (320) for transmitting data between an upstream transceiver (100) and a downstream transceiver (200) via two pairs of wires (310), (320) extending between the transceivers. The system comprises: the upstream transceiver (100) which includes first (110) and second (120) transmitter portions; the downstream transceiver (200) which includes first (210) and second (220) receiver portions for receiving signals transmitted by the upstream transceiver in a differential mode; and the two pairs of wires (310), (320) extending between the transceivers, the wires forming a composite channel through which signals transmitted by the upstream transceiver travel before being received by the downstream transceiver, the composite channel including direct differential mode channels h11 and h22 between the first and second transmitter portions on the one hand and the first and second receiver portions respectively on the other hand, and indirect channels h21 and h12 between the first and second transmitter portions on the one hand and the second and first receiver portions respectively on the other hand. ... British Telecommunications Public Limited Company

03/15/18 / #20180077054

Mobile telecommunications routing

A telecommunications mobility management system is arranged to allocate a mobile unit to different switching routes for different classes of service, for example to allow services capable of operation over packet-switched and circuit-switched to be managed separately. Separate location updates are transmitted to a register, and flagged for selective retrieval by a routing function when an incoming connection request is made, the appropriate switch id being selected according to the class of service to which the connection request relates.. ... British Telecommunications Public Limited Company

03/15/18 / #20180077053

Mobile telecommunications routing

A telecommunications mobility management system is arranged to allocate a mobile unit to different switching routes for different classes of service, for example to allow services capable of operation over packet-switched and circuit-switched to be managed separately. Separate location updates are transmitted to a register, and flagged for selective retrieval by a routing function when an incoming connection request is made, the appropriate switch id being selected according to the class of service to which the connection request relates.. ... British Telecommunications Public Limited Company

03/15/18 / #20180075038

Anomaly detection by multi-level tolerance relations

A method for partitioning a plurality of entities each associated with a plurality of ordered sequences of events received by a computer system, the method including: defining a minimal directed acyclic graph data structure representing the sequences of events to define a plurality of categories of behavior of the entities; defining a threshold degree of similarity as an xmu number, the xmu number having cardinality that is able to vary across a normalized range; defining a relation for each entity including a degree of association of the entity with each of the categories; defining a cluster of entities as a set of entities comprising a first entity; comparing a relation for the first entity with a relation for a second entity to define a xmu jaccard similarity coefficient for the first and second entities; and responsive to the coefficient meeting the threshold degree of similarity, adding the second entity to the cluster.. . ... British Telecommunications Public Limited Company

03/01/18 / #20180063726

Wireless network configuration

In a wireless network formed of short range femtocells, each femtocell provides wireless connectivity to user equipment devices and the user equipment can move around the topographical range covered by the network by handing over to a neighboring femtocell. Due to the limited range of a femtocell, there will be coverage gaps. ... British Telecommunications Public Limited Company

03/01/18 / #20180062947

Diagnostic testing

Methods and apparatus are disclosed for diagnostic testing, and in particular to methods and apparatus for obtaining diagnostic test results in respect of network-reliant applications used by one or more devices (1, 1′) in a local user network (3), the one or more user-devices (1, 1′) being operable to communicate with a digital communications access network (5, 6, 8) via a network gateway device (2) having a control module associated therewith, and being operable to communicate with remote networked devices (7, 9) involved in said network-reliant applications via the access network. Preferred embodiments relate to methods and apparatus for triggering diagnostic testing procedures and obtaining test results indicative of the actual quality of experience (qoe) of one or more users of the applications being run on the user-devices (1, 1′) in the user network (3).. ... British Telecommunications Public Limited Company

03/01/18 / #20180062700

Method and apparatus for transmitting data in differential and phantom mode in vectoring dsl

A transmitter device 16 for transmitting data to a plurality of receiver devices 51, 52, 53, each of which is connected to the transmitter device via at least one respective pair of wires 21, 22, 23, each receiver device being operable to receive signals detected as a change over time in the potential difference across the local ends of each respective pair of wires extending between the receiver device and the transmitter device, the transmitter device being operable to transmit signals onto the wires extending between the transmitter device and the plurality of receiver devices in a plurality of different modes, over a plurality of different channels, the different modes including phantom and differential modes and the different channels including a first set of phantom channels, the transmitter comprising a phantom channel selector 1690 for selecting a second set of one or more phantom channels from the first set, the second set being a proper subset of the first set comprising one or more of the phantom channels of the first set, the selection being made in dependence upon the cross-talk coupling between the phantom channels of the first set and the reception of signals at each of the receivers detected as a change over time in the potential difference across the local ends of the respective pair of wires extending between the respective receiver device and the transmitter device; and a connector 1670 for connecting the selected phantom channels to the transmitter such that the transmitter is able to transmit signals from the transmitter onto the phantom channel or channels of the second set of phantom channels.. . ... British Telecommunications Public Limited Company

03/01/18 / #20180060582

Secure configuration in a virtualized computing environment

A computer implemented method to determine a configuration of a target virtual machine (vm) in a virtualized computing environment to protect against a security attack exhibiting a particular attack characteristic.. . ... British Telecommunications Public Limited Company

03/01/18 / #20180060581

Machine learning for attack mitigation in virtual machines

A computer implemented method to mitigate a security attack against a target virtual machine (vm) in a virtualized computing environment, the target vm having a target vm configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed.. . ... British Telecommunications Public Limited Company

03/01/18 / #20180060575

Efficient attack mitigation in a virtual machine

A computer implemented method to mitigate a security attack against a target virtual machine (vm) in a virtualized computing environment, the target vm having a target vm configuration including configuration parameters, and the security attack exhibiting a particular attack characteristic, is disclosed.. . ... British Telecommunications Public Limited Company

02/22/18 / #20180054840

Communications network

This disclosure provides a method for establishing a connection between a first and second base station, and a base station implementing the method, the method including: a first base station receiving an identifier for a second base station and an identifier for a second wireless networking module associated with the second base station; based on the identifiers for the second base station and the second wireless networking module, determining if a first wireless networking device associated with a first base station is communicatively connectable to the second wireless networking device associated with a second base station; and the first base station establishing a cellular connection with the second base station using the identifiers for the second base station and associated second wireless networking module.. . ... British Telecommunications Public Limited Company

02/22/18 / #20180054451

Security in virtualized computing environments

A computer implemented method to identify one or more parameters of a configuration of a target virtual machine (vm) in a virtualized computing environment used in a security attack against the target vm, the security attack exhibiting a particular attack characteristic, is disclosed.. . ... British Telecommunications Public Limited Company

02/22/18 / #20180053002

Attack assessment in a virtualized computing environment

A computer implemented method to determine whether a target virtual machine (vm) in a virtualized computing environment is susceptible to a security attack, the method comprising: training a machine learning algorithm as a classifier based on a plurality of training data items, each training data item corresponding to a training vm and including a representation of parameters for a configuration of the training vm and a representation of characteristics of security attacks for the training vm; generating a data structure for storing one or more relationships between vm configuration parameters and attack characteristics, wherein the data structure is generated by sampling the trained machine learning algorithm to identify the relationships; determining a set of configuration parameters for the target vm; and identifying attack characteristics in the data structure associated with configuration parameters of the target vm as characteristics of attacks to which the target vm is susceptible.. . ... British Telecommunications Public Limited Company

02/08/18 / #20180041980

Base station time synchronisation in a wireless network

The operation of base stations in a wireless network whose areas of coverage do not overlap are synchronized by taking timing values from mobile units that travel from one area of coverage to another. A base station receiving a timing value from a mobile unit entering its area of coverage adapts its timing value and that of any mobile units in its coverage area, including the newly-arrived mobile unit, to a become a value intermediate between its existing timing value and that indicated by the mobile unit. ... British Telecommunications Public Limited Company

02/01/18 / #20180034618

Method and apparatus for transmitting data from a transmitter device to a plurality of receiver devices

Apparatus for communicating data between a transmitter device 16 and a first 51 and a second 52 receiver device, the receiver devices being connected, in use, to the transmitter device via a first 21 and a second 22 pair of wires respectively. Each receiver device is operable to receive signals detected as a change over time in the potential difference across the local ends of each respective pair of wires extending between the respective receiver device and the transmitter device, and the transmitter device is operable to transmit signals onto the wires at the transmitter ends thereof in order to transmit signals via a direct differential mode to each respective receiver via its respective pair of wires. ... British Telecommunications Public Limited Company

01/25/18 / #20180027433

Restoration of network access

A wireless-enabled user terminal (7) is configured to detect the absence of a connection (3) between a wireless network router (1) and a core network (2). The terminal (7) uses data by which the router (1) is identified to emulate the router (1) and set up an alternative link (8, 9) to the network (2) so that other terminals (4, 5, 6) previously connecting to the network (2) through the router (1) can continue to connect to the network (2) through the terminal (7) and alternative link (8, 9) using the same network identities as they did through the router (1) until a connection (3) between the router (1) and network (2) is installed or restored.. ... British Telecommunications Public Limited Company

01/25/18 / #20180025166

Validating computer resource usage

A computer implemented method for validating use of a computing resource by a requester software component including: validating a characteristic of the requester; generating a first transaction defining criteria for consumption of the resource by the requester, the first transaction being encrypted with a private key from a public key/private key pair and being added as part of a block of transactions to a blockchain data structure; generating a subsequent encrypted transaction corresponding to a request of the requester to consume the resource, the subsequent transaction referring to the first transaction, wherein the subsequent transaction is validated by a transaction miner computing component from a plurality of miners by authenticating the transaction using the public key and verifying compliance with the criteria defined in each transaction.. . ... British Telecommunications Public Limited Company

12/14/17 / #20170359759

Cell reselection

An lte cellular network having management mobility servers (mmes), base stations (enodebs) and mobile user equipment (ue). The network supporting two groups of mobile device subscribers; subscribers of a macrocell network and subscribers of a small cell network. ... British Telecommunications Public Limited Company

12/07/17 / #20170351861

Malware detection in migrated virtual machines

A malware detection system to detect malware in a virtual machine (vm), the system including a profile generator adapted to generate a profile of a deployment of the vm, the profile including execution characteristics of the deployment; a vm package generator to generate a vm package including: a vm descriptor describing a particular deployment of the vm; and an image of the particular deployment, the image including a representation of data stored for the particular deployment of the vm; and a malware identifier adapted to identify malware in a deployment of the vm responsive to the identification of a difference between profiles of multiple different deployments of the vm.. . ... British Telecommunications Public Limited Company

12/07/17 / #20170351860

Malware detection

A malware detection system to detect malware in a client computer system includes a behavior profile generator adapted to generate a behavior profile specifying operational behaviors of a computer system indicative of the existence of malware in the computer system; an interface adapted to communicate the behavior profile to the client; and an identifier responsive to a message from the client that the behavior profile is exhibited by the client and adapted to identify a reaction instruction for performance by the client, wherein the interface is further adapted to communicate the reaction instruction to the client.. . ... British Telecommunications Public Limited Company

11/30/17 / #20170347298

Cellular handover

In a cellular communications network, user equipment connected to a base station, the active mode handover behavior of the base station for selecting handover targets is set to be different from idle mode reselection. The mme provides its enodebs with supplemental information about other plmns which can be considered for handover in accordance with dynamic criteria such as the time, location, subscriber group, etc to allow dynamic handover to other plmns in accordance with the commercial agreements.. ... British Telecommunications Public Limited Company

11/30/17 / #20170345610

Printed active device

A method of manufacturing an article with integral active electronic component comprising: using an additive manufacturing process to: a) form a non-electrically conductive substrate; b) form a non-electrically conductive perforated layer having an aperture; c) form electrically conductive anode and cathode elements spaced in the aperture; d) deposit a conductive electrical connection to each of the elements suitable for imparting an electrical potential difference between the elements; e) form a non-electrically conductive sealing layer atop the perforated layer so as to retain and seal the aperture in the perforated layer.. . ... British Telecommunications Public Limited Company

11/16/17 / #20170331681

Configuration of server apparatus

A small-form programmable pluggable device 80 is used to establish communication between a configurable “bare-metal” server 50 having no existing configuration software installed, and a provisioning server 60 capable of downloading software to the configurable server 50 to allow the configurable server 50 to be configured to perform a specific function. The pluggable device carries sufficient programming to access the required software 63 and deliver it to the configurable server 50. ... British Telecommunications Public Limited Company

11/09/17 / #20170324627

Diagnostic testing in networks

Methods and apparatus are disclosed for obtaining diagnostic test results in respect of network elements in a network, the test results being obtained from a population of probes associated with network elements. The method comprises receiving a first-stage set of probe reports comprising, in respect of probes in an initial subset, a test result and metadata, each test result indicating a state of the network element associated with the probe; identifying a specific subset of probes in the initial subset wherein the test results from the probes in the specific subset satisfy a predefined condition; determining a subsequent subset based on the metadata of the probes in the specific subset; and triggering the probes in the subsequent subset to provide a second-stage set of probe reports comprising test results indicating states of network elements associated with probes in the subsequent subset.. ... British Telecommunications Public Limited Company

11/09/17 / #20170324503

Communications network

A fixed communication network is disclosed in which a plurality of transmitters feed signals via tributary transmission lines of different lengths onto a shared network component. A timing reference signal is distributed to the transmitters. ... British Telecommunications Public Limited Company

11/09/17 / #20170324444

Communications network

An optical network is disclosed which includes an optical fiber shared by a plurality of transmitters using code division multiple access techniques. The transmitters are connected by tributary optical fibers to the shared optical fiber. ... British Telecommunications Public Limited Company

11/09/17 / #20170323113

Automated deployment and securitization of model-based composite applications

A computer implemented method of deploying a software application in a virtualized computing environment, comprising: receiving a description of the software application including an identification of a set of one or more application software resources; determining one or more types of security facility required for the set of application software resources and determining a security requirement for each of the determined types of security facility; selecting a security software resource for each of the determined types of security facility; determining a security configuration for each of the selected security software resources, the security configuration being based on a security requirement associated with a type of security facility for the security software resource; and generating a deployment specification for the software application specifying the application software resources and the security software resources for deployment of the application in the virtualized computing environment, each of the security software resources having associated the determined security configuration.. . ... British Telecommunications Public Limited Company

10/26/17 / #20170311333

Cellular communications network

This invention relates to a method in a cellular communications network having a plurality of base stations, and to a base station for said cellular communications network, wherein each base station is configured to use a frequency band of one of a hierarchy of spectrum levels, the method comprising: a first base station using a frequency band of a first spectrum level of the hierarchy of spectrum levels; determining an interference level in the network; determining whether the interference level indicates that the first base station's performance is sub-optimal; and, if so, the first base station reconfiguring to use a frequency band of a second spectrum level of the hierarchy of spectrum levels, the second spectrum level having a different number of frequency bands than the first spectrum level.. . ... British Telecommunications Public Limited Company

10/12/17 / #20170293612

Efficient pattern matching

A computer implemented method to generate a pattern matching machine to identify matches of a plurality of symbol patterns in a sequence of input symbols, wherein one or more of the symbol patterns includes a plurality of wildcard symbols.. . ... British Telecommunications Public Limited Company

10/05/17 / #20170288996

Network connectivity identification

Examples of the present invention present a method of determining the network connectivity technology being used in a network link. The method sends test packets from the router to an end device, such as a set-top box, and measures the latency in the received packets at the end device. ... British Telecommunications Public Limited Company

10/05/17 / #20170288871

Secure object access

A method of a security system to provide access by a requester to an encrypted data object stored in an object store, the requester being authenticated by the object store, the method comprising: receiving, from the object store: the encrypted object having associated an object identifier; and an identifier of the requester; deriving a first cryptographic key to decrypt the object; deriving a second cryptographic key; re-encrypting the object based on the second key and communicating the re-encrypted object to the requester; wherein each of the first and second keys are based on the object identifier, the requester identifier and a secret key portion generated by the security system, the secret key portion being different for each of the first and second keys, the method further comprising: in response to a second authentication of the requester by the security system, communicating the secret key portion for the second key to the requester.. . ... British Telecommunications Public Limited Company

10/05/17 / #20170288863

Secure virtualised data volumes

A method of securing a virtual data volume storing data in a first virtualized computing environment including: deriving a cryptographic key for encrypting the data, the key being derived from first and second parameters; and encrypting the data, wherein the first parameter is generated for association with the virtualized data volume, and the second parameter is generated based on at least one characteristic of a second virtualized computing environment.. . ... British Telecommunications Public Limited Company

10/05/17 / #20170286136

External feature provision for a cloud application registry

A computer implemented method to provide a software feature in a registry of software components for a first network attached computing environment, each software component in the registry having associated deployment information to assemble a software application to be executed by the first environment as a set of software components, and the software feature being provided in part by a second network attached computing environment external to the first environment, the method comprising: for a selected software component in the registry, determining compatibility of the software feature with the software component; and responsive to the determination, adapting a registry entry of the software component in the registry to indicate the availability of the software feature for the software component.. . ... British Telecommunications Public Limited Company

10/05/17 / #20170286083

External feature provision for cloud applications

A computer implemented method to execute a software application in a first network attached computing environment comprising: receiving a definition of the application, the definition identifying a set of software components and including configuration information for installing and executing the components in the first environment; installing and configuring the components in the first environment in accordance with the definition, wherein the definition further includes, for an identified component in the set, software agent information about a software agent that implements part of a software feature, the agent being provided by a second network attached computing environment external to and communicatively connected with the first environment, the second environment providing another part of the software feature, the method further comprising obtaining, installing and configuring the agent based on the agent information to provide part of the software feature for the application.. . ... British Telecommunications Public Limited Company

09/28/17 / #20170279634

Data communication

This disclosure includes a method, and a device for implementing the method, for creating a channel for transmitting data on a digital subscriber line (dsl) connection, the method comprising: method for creating a channel for transmitting data on a digital subscriber line (dsl) connection, the method comprising: defining a plurality of sets of tones, wherein each set of tones includes one or more tones used by a dsl connection; monitoring the transmission characteristics of each set of tones in the plurality of sets of tones; and creating a first channel for transmitting data on the dsl connection, including allocating a first set of tones of the plurality of sets of tones to the first channel based on the monitored transmission characteristics of the first set of tones and the transmission requirements of the first channel.. . ... British Telecommunications Public Limited Company

09/28/17 / #20170279523

Optical network fault identification

An optical network node capable of being powered, comprising—a reflector arranged to reflect an optical signal, and—a switch arranged to direct the optical signal to the reflector in dependence on whether the optical network node is powered.. . ... British Telecommunications Public Limited Company

09/28/17 / #20170278001

Improved pattern matching

A computer implemented method to determine whether a verification is to be performed of the satisfaction of one or more mapping conditions mapping a first state in a first pattern matching automaton to a second state in the first automaton, the verification being based on patterns matched by a second pattern matching automaton having states corresponding to wildcard symbols in the first automaton, the method comprising: associating, with the first state, a minimum number of patterns required to be matched by the second automaton to satisfy a mapping condition of the state; providing a pattern match counter in association with the second automaton, the counter being arranged to count a number of patterns matched by the second automaton; providing a verifier in association with the first automaton, the verifier being arranged to perform the verification, the verifier being responsive to the counter.. . ... British Telecommunications Public Limited Company

09/28/17 / #20170277811

Efficient conditional state mapping in a pattern matching automaton

A computer implemented method to determine the satisfaction of one or more mapping conditions conditionally mapping a first state in a first pattern matching automaton to a second state in the first automaton, each of the conditions being based on symbol patterns matched by a second pattern matching automaton having states corresponding to wildcard symbols in the first automaton, the method comprising: encoding the conditions in a condition tree data structure associated with the first state, the condition tree modeling sequences of symbol patterns for matching by the second automaton and corresponding to each of the conditions, wherein a node in the condition tree corresponding to a complete set of symbol patterns for a condition has associated an output symbol sequence to identify a pattern match by the first automaton.. . ... British Telecommunications Public Limited Company

09/21/17 / #20170272966

Interference detection

Wireless access point devices having wireless networks operating in accordance with 802.11b/g 2.4 ghz wi-fi can be affected by out-of-band interference caused by lte small cell devices such as macrocells and femtocells. The wireless access points detect such interference devices using a flow processor to monitor the characteristics of data flows of devices connected to the wireless access point to determine whether they are lte cells based on mac address matching or the termination of a flow at a known mobile network operator gateway. ... British Telecommunications Public Limited Company

09/21/17 / #20170272581

Reverse power feed system

A the network-side distribution point in a telecommunications network includes an input measurement function which monitors the total power delivered to the power combiner from the various customer premises, and an output measurement function which monitors the total power requirements of the components of the distribution point. The data from these monitoring functions are used by a power extraction control unit to control the combiner/extraction unit to draw power from the forward power feed to makes up any shortfall in the power required to operate the components. ... British Telecommunications Public Limited Company

09/21/17 / #20170272194

Interference detection

A management server for managing a population of wireless access point devices by detecting out-of-band interference to the operation of the wireless access point wi-fi networks caused by lte small cell devices such as macrocells and femtocells. A flow processor monitors the characteristics of data flows of devices connected to the wireless access point to determine whether they are lte cells based on mac address matching or the termination of a flow at a known mobile network operator gateway. ... British Telecommunications Public Limited Company

09/14/17 / #20170264665

Managing streamed communication

Methods, apparatus and systems are disclosed for managing streamed communication (such as video, audio, or audio-visual communication) between client devices and remote devices via a digital data communication network in situations where the data communication network comprises one or more routers operable to receive streamed data from one or more client devices and/or from one or more other routers, and to forward such streamed data to one or more remote devices and/or to one or more other routers such as to enable the client device and potentially-varying subsets of the one or more remote devices to participate in a communication session.. . ... British Telecommunications Public Limited Company

09/14/17 / #20170264492

Communication set up process

A communications terminal (10) is to be configured for operation of a new service or application by connection to a service provision platform (12) over a connection (11). In order to do this, an installation server (15) generates instructions to a user terminal (13) over a seperate link (14). ... British Telecommunications Public Limited Company

09/14/17 / #20170264487

Interference detection

A wireless access point device capable of detecting out-of-band interference to the operation of the wi-fi network caused by lte small cell devices such as macrocells and femtocells. A flow processor monitors the characteristics of data flows of devices connected to the wireless access point to determine whether they are lte cells based on mac address matching or the termination of a flow at a known mobile network operator gateway. ... British Telecommunications Public Limited Company

08/24/17 / #20170244446

Method and apparatus for transmitting and receiving signals over pairs of wires

A method of transmitting data from a transmitter device to a plurality of receiver devices each of which is connected to the transmitter device via a respective wire connection the method comprising transmitting a common signal onto all or both of the respective wire connections and using a multiple access technique to enable respective virtual data channels to be generated for transmitting data from the transmitter device to each of the receiver devices via its own respective virtual data channel.. . ... British Telecommunications Public Limited Company

08/17/17 / #20170237563

Controlled storage device access

A method for securely accessing a hardware storage device connected to a computer system, the hardware storage device having a unique hardware identifier and the computer system including a processor, the method comprising: an agent software component receiving the identifier of the storage device to authenticate the storage device, wherein the agent executes in an unrestricted mode of operation of the processor such that the agent is a trusted software component; in response to the authentication, the agent accessing a secure data key for encrypting and decrypting data on the storage device, wherein the data key is accessible only to trusted agents executing in the unrestricted mode of the processor such that software executing in a user mode of the processor stores and retrieves data on the storage device only via the agent.. . ... British Telecommunications Public Limited Company

08/10/17 / #20170230835

Small cell resource allocation

This disclosure provides a method of allocating a resource in a network of small cells, and a device for implementing the method, the method comprising: a first small cell detecting that its resource demand exceeds its resource allocation; the first small cell selecting a new resource that is being used by a second small cell; and the first small cell allocating the new resource to either the first or second small cell, wherein the probability the new resource is allocated to the first small cell is based on the first small cell's resource demand. . ... British Telecommunications Public Limited Company

08/03/17 / #20170223032

Malicious encrypted traffic inhibitor

A malicious encrypted traffic inhibitor connected to a computer network is disclosed. A method for inhibiting malicious encrypted network traffic communicated via a computer network also is disclosed.. ... British Telecommunications Public Limited Company

07/27/17 / #20170214791

Optimised broadband line testing

This invention relates to a method of managing a digital subscriber line, where an optimum point at which to trigger a line test on the dsl line is determined. The invention continuously measures the signal to noise (snr) margin on the dsl line, and compares the measurements to predetermined conditions based on snr margin characteristics associated with a population of good lines. ... British Telecommunications Public Limited Company

06/29/17 / #20170185825

Biometric identification

This invention relates to a method for face recognition and a device for implementing said method, the method comprising the steps of: displaying a point of interest on the screen such that a user adopts a gaze direction with respect to the screen; capturing an image of the user at the adopted gaze direction; and performing a face recognition algorithm on the image of the user, using an enrolment image classified by said gaze direction.. . ... British Telecommunications Public Limited Company

06/22/17 / #20170181059

Wireless internet access

A method of controlling wireless internet access is disclosed. A problem with conventional wireless internet access is that users of wireless internet access devices such as smartphones, tablets and laptop computers are often presented with an indication of the availability of an internet connection, but find when they try to use that connection that it is of a disappointing quality. ... British Telecommunications Public Limited Company

06/22/17 / #20170177729

Search engine and link-based ranking algorithm for the semantic web

A dataset ranking procedure for use in a hyperdata search engine is disclosed. A problem with known hyperdata search engines is they rank the datasets in a way that leads to prominence being given in search results to unimportant datasets. ... British Telecommunications Public Limited Company

06/08/17 / #20170161906

Biometric identification

This invention provides a method of face recognition and a device for implementing said method, the method comprising the steps of: (a) performing a face recognition algorithm on an image of a user to determine an identity of the user, the image having an illumination level; (b) determining if a reliability measurement of the identity of the user determined by the face recognition algorithm meets a threshold indicating reliable identification and, if the reliability measurement is below the threshold indicating reliable identification; (c) receiving a new image of the user, the new image having an adjusted illumination level; and (d) performing a further face recognition algorithm on the new image of the user to determine the identity of the user.. . ... British Telecommunications Public Limited Company

06/01/17 / #20170155547

Network diagnostic device

A diagnostic device for a communications network; the network comprising a customer communications network located at a customer location and connected by a customer communications link to a communications service provider network remote from the customer location. The device comprises a network monitoring interface arranged to monitor operation of the customer communications network; a processor arranged to detect faults in the operation of the customer communications network, a store for storing records of detected faults; a processor arranged to store records of detected faults in the store and to generate a report on a detected fault based on the stored records. ... British Telecommunications Public Limited Company

06/01/17 / #20170153925

Network

The present invention provides a method which can be used to optimise the delivery of series over communications networks. Tasks which need to executed within a short timescale and those which are not due to be executed for a long time are excluded from the optimisation process. ... British Telecommunications Public Limited Company

06/01/17 / #20170153818

Methods and apparatus for storing electronic documents

Methods and apparatus (10) are disclosed for storing electronic documents in a distributed electronic storage system comprising a plurality of electronic storage devices (16) together providing a total storage capacity, the system having a target number of copies in respect of each document stored therein; the method comprising: determining the current number of copies of a requested document stored in the system and increasing the number of copies of that document unless the number of copies of that document is already at or above the target number of copies in respect of that document; and otherwise selecting at least one other document the number of copies stored in the system of which is below the target number of copies in respect of that at least one other document, and increasing the number of copies of that at least one other document instead.. . ... British Telecommunications Public Limited Company

05/18/17 / #20170142649

Dynamic wireless network access point selection

Dynamic wireless network access point selection a mobile device having a processor, a memory and a wireless network interface, the processor executing an operating system including a network communication library for providing networking services via the wireless network interface and being further arranged to: receive capability information associated with each of plurality of wireless network access points accessible to the mobile device; identify, for a set of networked applications in execution on the mobile device, one or more applications having associated a wireless network capability requirement; and select an access point from the plurality of access points to provide network communication for the mobile device, the access point being selected based on the identified one or more applications and the received capability information, wherein network communication for applications executed by the mobile device having associated a wireless network capability requirement that is incompatible with a network capability of the selected access point are prevented from network communication by the network communication library.. . ... British Telecommunications Public Limited Company

05/18/17 / #20170142624

Mobile handover

A handover process for enabling a user terminal to transfer a connect to a network from a route by way of a source access node to a route by way of a target access node, where the nodes are controlled by different respective control systems is initiated by establishing a link between the terminal and the target node and a data forwarding tunnel between the access nodes to allow data transmitted over a link from the network to the source node to continue to be transmitted to the terminal. The backhaul connection is then re-routed by co-ordination between the access control systems. ... British Telecommunications Public Limited Company

05/18/17 / #20170142133

Ineffective network equipment identification

A computer system arranged to detect an ineffective network device in a set of network devices for a computer network as a device ineffective at identifying an attack in the network, the computer system including: an input unit to receive events generated by the set of network devices for each of a plurality of time periods, each event including an attribute belonging to a class of attributes; a processing system having at least one processor and being arranged to: evaluate a normalized representative value of the attribute as a score for each network device for each of the plurality of time periods based on the received events; evaluating a measure of similarity of scores for each of a plurality of pairs of devices in the set of network devices for one or more time windows, each time window comprising two or more of the time periods; and identify a network device having evaluated similarity measures meeting a predetermined threshold as ineffective network devices.. . ... British Telecommunications Public Limited Company

05/04/17 / #20170127147

Multicast streaming

The invention presents a method of generating a multicast stream for transporting video content such as live tv. First, the video content is encoded, and segmented into temporal chunks. ... British Telecommunications Public Limited Company

05/04/17 / #20170126899

Method and apparatus for allocating power levels to a transmission in a digital subscriber line network

Embodiments relate to a method, and a device for performing the method, for allocating power levels to a transmission in a dsl network, the method including: identifying a first and second geographical region as being associated with a subscriber line in the dsl network; defining a first spectral mask having a first set of power levels over a range of frequencies, wherein the first set of power levels are tailored according to a radio frequency, rf, environment of the first geographical region; defining a second spectral mask having a second set of power levels over the range of frequencies, wherein the second set of power levels are tailored according to an rf environment of the second geographical region; and constructing a transmit spectral mask for the subscriber line, the transmit spectral mask based on a combination of the first and second spectral masks, including, for each frequency in the range of frequencies, using the minimum power level for that frequency from the first and second spectral masks.. . ... British Telecommunications Public Limited Company

04/27/17 / #20170118350

Resource allocation in a digital communication network

Methods and apparatus are disclosed for allocating resources in a digital subscriber line network, the network comprising at least one lower-tier digital subscriber line carrying signals according to a first protocol between a transceiver device at a lower-tier network node and a subscriber transceiver device and further comprising at least one higher-tier digital subscriber line carrying signals according to a second protocol between a transceiver device at a higher-tier network node and a subscriber transceiver device, the first protocol permitting signals to be carried at frequencies in a range having a higher upper limit than the second protocol.. . ... British Telecommunications Public Limited Company

04/27/17 / #20170118263

Multicast streaming

The invention presents a method of providing feedback for receipt of a multicast video stream. The feedback mechanism allows the number of clients receiving over multicast to be determined, which can then be used to manage multicast delivery, including switching decisions between multicast and unicast. ... British Telecommunications Public Limited Company

04/27/17 / #20170118091

Home network monitor

In a system formed of user devices, a home access point routing device connected to an internet service provider, performance issues such as contention and interference on the home network can be determined. The home access point is arranged to monitor ip flow information for data sessions between user devices and remote servers over a wireless or powerline ethernet home network and performance issues are determined by the home access point or by a management server.. ... British Telecommunications Public Limited Company

04/20/17 / #20170111813

Network monitor

In a system of wireless access point routing devices each creating a wireless network, a management server monitors the performance of the wireless networks to identify performance degradation. Device interoperability issues are identified according to trends in poor performance of devices connected to the wireless networks.. ... British Telecommunications Public Limited Company

04/20/17 / #20170111807

Access point grouping based on performance and location

In a system of wireless access point routing devices each creating a wireless network, a management server monitors the performance of the wireless networks to identify performance degradation. Any wireless networks experiencing performance degradation are grouped by region to determine whether a common cause for the degradation is present.. ... British Telecommunications Public Limited Company

04/20/17 / #20170111437

Data retrieval

A route mapping process for identifies the suitability of data sources for satisfying data requests generated by user terminals (50, 51) by searching one or more user address databases for user addresses, and searching one or more data distribution network databases for addresses of data sources (52, 3), and generates for each user address a register (33) of one or more selected data source addresses, together with an order of precedence in which they should be used to fulfil data requests. This register is accessible by a content distribution server to identify a data source address to be communicated to a user address in response to a data request received from the user address. ... British Telecommunications Public Limited Company

04/20/17 / #20170111216

Dynamic line management system

A method and dynamic line management, dlm, system for controlling digital line subscriber, dsl, connections, comprising applying a first line profile to a dsl connection, the first line profile specifying a first virtual noise template for the dsl connection, wherein the first virtual noise template specifies a first set of frequency dependent virtual noise levels for the dsl connection; configuring a connection parameter (such as the data rate) of the dsl connection based on the first set of frequency dependent virtual noise levels; applying a second line profile to the dsl transceiver unit, the second line profile specifying a second virtual noise template for the dsl connection, wherein the second virtual noise template specifies a second set of frequency dependent virtual noise levels for the dsl connection; and reconfiguring the connection parameter for the dsl connection based on the second set of frequency dependent virtual noise levels.. . ... British Telecommunications Public Limited Company

04/06/17 / #20170099278

Dynamic identity checking

A selector apparatus to select one or more shared authentication facilities for a software service executing in a virtualized shared computing environment, the software service including an interface through which a user request to access a restricted resource of the service is receivable, the request having associated a user context defining one or more characteristics of the user, and the software service further having associated a plurality of authentication rules for the service, wherein each rule is associated with one or more user contexts and identifies one or more shared authentication facilities for the computing environment, the selector apparatus comprising: a launcher, responsive to a user request received via the interface, adapted to instantiate one or more authentication facilities in accordance with an authentication rule retrieved based on a user context for the received request, so as to generate one or more challenges for the user to authenticate the user, wherein the authentication rule further defines one or more parameters for the identified authentication facilities.. . ... British Telecommunications Public Limited Company

03/30/17 / #20170093920

User authentication

An authentication apparatus to authenticate a user requesting access to a restricted resource in a computer system comprising: an interface adapted to receive an indication of a user request to access the restricted resource, the request having associated a current user context defining one or more characteristics of the user; a receiver adapted to receive a user selected authentication scheme from a set of authentication schemes for the current user context; a comparator adapted to compare the user selected authentication scheme with a set of user-specific rules, each rule indicating one or more authentication schemes for a user context as preferred authentication schemes; an access controller adapted to permit access to the restricted resource based on the comparison so as to prevent access to the restricted resource when the rules indicate one or more authentication schemes other than the user selected authentication scheme are preferred for the current user context.. . ... British Telecommunications Public Limited Company

03/23/17 / #20170086181

Small cell resource allocation

The disclosure provides a method and small cell for allocating a resource block (rb) to a transmission between the small cell and a user equipment (ue) the method comprising generating a value using a quasi-random, low-discrepancy, number generator, associating the value with a rb and allocating the rb to a transmission between the small cell and the ue.. . ... British Telecommunications Public Limited Company

03/23/17 / #20170085719

Dynamic line management engine residing in the access network

The disclosure includes a method of controlling an access network including a plurality of digital subscriber line, dsl, connections, and an access network node for performing the method, wherein the method includes: receiving data relating to an event on a dsl connection, the data indicating a factor contributing to the event; and a dynamic line management, dlm, engine, residing in the access network, responding to the event, wherein the dlm engine response is dependent on the factor contributing to the event.. . ... British Telecommunications Public Limited Company

03/02/17 / #20170063929

Methods, apparatus and systems for processing service requests

Methods, apparatus and systems for processing digital content service requests from user devices (12) in a user network are disclosed. The method, performed by a control device (10), comprises receiving policy indications in respect of the user devices (12) indicating desired control policies to be implemented in respect of the user devices, and associating user device source identifiers with the user devices indicating a network location to which responses should be directed, the user device source identifier associated with a particular user device depending on the policy indication for that user device. ... British Telecommunications Public Limited Company

02/16/17 / #20170048784

Physical cell id allocation

A method and device are provided for allocating a physical cell id, pci, to a cell, the 5 cell being one of a plurality of cells (e.g. Femtocells) within a coverage area of a larger cell's (e.g. ... British Telecommunications Public Limited Company

02/09/17 / #20170041247

Wireless access gateway

A wireless network including a wireless access gateway (wag) and methods are provided for routing traffic between non-cellular and cellular networks. The wag interconnects at least one non-cellular network and at least one cellular network in an at least one-to-many relationship. ... British Telecommunications Public Limited Company

02/02/17 / #20170034204

Security protocol monitoring

Preventing unintentional communication of data over a network by monitoring an outbound memory buffer of a computer system, the outbound memory buffer storing outbound network messages, and in response to a detection of an outbound network message corresponding to a heartbeat response message, overwriting at least a portion of a payload of the heartbeat response message.. . ... British Telecommunications Public Limited Company

02/02/17 / #20170034197

Mitigating blockchain attack

A computer implemented method for detecting malicious events occurring with respect to a blockchain data structure comprising: defining a transaction creation profile according to which transactions can be generated and submitted to the blockchain; submitting a transaction to the blockchain, the transaction causing the generation of a profiler data structure in the blockchain including executable code to generate profile transactions to be submitted to the blockchain according to the transaction creation profile; monitoring the blockchain to identify profile transactions; and comparing identified profile transactions with the transaction creation profile to detect a deviation from the transaction creation profile, such detection corresponding to a malicious event occurring with respect to the blockchain.. . ... British Telecommunications Public Limited Company

02/02/17 / #20170032054

Improved pattern matching machine with mapping table

A computer implemented method for generating a pattern matching machine for identifying matches of a plurality of symbol patterns in a sequence of input symbols, the method comprising: providing a state machine of states and directed transitions between states corresponding to the plurality of patterns; applying an aho-corasick approach to identify one or more mappings between states in the event of a failure, of the state machine in a state and for an input symbol, to transition to a subsequent state based on the directed transitions of the state machine, characterised in that one of the symbol patterns includes a wildcard symbol, and a mapping for a state representing pattern symbols including the wildcard symbol is provided in a hash table referenced based on a key, the key being based on a unique identifier of the state and the input symbol to be received, by the pattern matching machine in use, to constitute the wildcard symbol.. . ... British Telecommunications Public Limited Company

01/26/17 / #20170026858

Sensor network

A loss of connection between a wireless access point and a network is reported to a network-based service platform by the wireless access point by automatically establishing wireless contact with a second wireless access point, and transmits a predetermined fault report message to a predetermined network platform address by way of the second wireless access point and the second network interface. Authentication credentials are stored in the access point allowing automatic access to the service platform without user intervention, to allow the report to be generated without user intervention. ... British Telecommunications Public Limited Company

01/26/17 / #20170026522

Digital subscriber line profile selection method and apparatus

An initial profile application apparatus (ipaa) is operable to apply an initial profile to a modem pair connection system, the modem pair connection system comprising a first modem, a corresponding second modem and a metallic wire connection, wherein the first and second modems are operable to establish a data connection between themselves over the metallic wire connection. The ipaa comprises: a receiver; an evaluator; a line database; a comparator; a determiner; and an applicator.. ... British Telecommunications Public Limited Company

01/26/17 / #20170026521

Data communication

A method for selection of a digital subscriber line (dsl) technology for use by a first dsl transceiver in transferring data over a communications line between the first dsl transceiver and a second dsl transceiver. For the selection, an indication of attenuation in the communications line between the dsl transceivers is obtained and a dsl technology for use by the first dsl transceiver is selected from a plurality of dsl technologies supported by the first dsl transceiver. ... British Telecommunications Public Limited Company

01/26/17 / #20170026257

Methods and apparatus for operating an access network

Methods and apparatus are disclosed for operating an access network including data connections (19) between end-user devices (12, 14, 16, 18) and an aggregation transceiver (20) at which connections (19) are aggregated for onward connection through the network. The method comprises, for each connection, obtaining connection data for each of a plurality of monitoring periods, each comprising shorter periods, the connection data comprising performance and user activity indications for each shorter period; monitoring the performance of the connection in order to estimate a measure of its performance during a particular monitoring period that discounts performance indications obtained in respect of shorter periods within that monitoring period when the user was inactive unless activity indications in respect of corresponding shorter periods within other monitoring periods indicate that such user inactivity is anomalous; and applying a profile to the connection that is dependent on the measure of performance of the data connection.. ... British Telecommunications Public Limited Company

01/26/17 / #20170026200

Communications network

A method of configuring a network element, for example an amplifier in a vdsl network. Configuration is transmitted to the amplifier using a common mode voltage signal so that there is no interference with the telephony or dsl signals.. ... British Telecommunications Public Limited Company

01/19/17 / #20170019851

User equipment battery consumption

A method, user equipment (ue) and basestation are provided, wherein the ue is configured to send battery status data to the basestation and, in response, the basestation is adapted to improve the quality of service for the ue.. . ... British Telecommunications Public Limited Company

01/19/17 / #20170019538

Data communication

A method of controlling a digital subscriber line (dsl) transceiver for use in transferring data over a dsl connection, the method comprising: monitoring operation of the dsl connection; detecting that the dsl connection is operating in a low power mode in which the signal power applied to the dsl connection by the dsl transceiver is at a first level below a power threshold value; increasing the signal power applied to the dsl connection to a second level above the power threshold value; recording data indicative of performance of the dsl connection with signal power applied to the dsl connection at the second level; and modifying dsl transceiver attributes based on the recorded data indicative of performance, to change operation of the dsl transceiver in transferring data over the dsl connection.. . ... British Telecommunications Public Limited Company

01/12/17 / #20170013546

Method and apparatus for determining a network search parameter in a mobile communications network

The present disclosure provides a method for more efficiently managing a mobile communications network by varying the frequency with which a mobile terminal searches for a home network.. . ... British Telecommunications Public Limited Company

01/12/17 / #20170013542

Method and apparatus for determining a network search parameter in a mobile communications network

The present disclosure provides a method for more efficiently managing a mobile communications network by varying the frequency with which a mobile terminal searches for a home network.. . ... British Telecommunications Public Limited Company

01/12/17 / #20170013000

Profiling for malicious encrypted network traffic identification

A malicious encrypted traffic detector connected to a computer network method for identifying malicious encrypted network traffic communicated via a computer network, the method comprising: a storage storing a plurality of network traffic window definitions, each window defining a different subset of network traffic for a network connection; an analyzer adapted to identify characteristics of a network connection to determine a protocol of a network connection; a network traffic recorder adapted to record a subset of network traffic corresponding to a window of network traffic; an entropy estimator adapted to evaluate an estimated measure of entropy for a portion of network traffic of a network connection recorded by the network traffic recorder; and a window selector adapted to identify and store a window as a portion of a network connection for which an estimated measure of entropy is most similar for a plurality of network connections, the identified window being stored in association with an identifier of a protocol determined by the analyzer and in association with an identifier of a malicious software component establishing the network connections for communication of malicious encrypted network traffic.. . ... British Telecommunications Public Limited Company

01/12/17 / #20170012965

Access control system

An access control system is provided to provide a core server to authenticate the permissions of users to access services provided by other operators. The provision of a single core server allows many-to-many access agreements to be mediated and maintained for effectively than by operating individual one-to-one access permissions. ... British Telecommunications Public Limited Company

01/12/17 / #20170011212

Access control for a resource

An access controller comprising: a data store storing: a challenge image including a user challenge; a mask image including a mask; a composite image generator to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image; and a display to display the dynamic composite image to a user; a user input receiver, wherein the access controller to grants access to the resource on receipt, via the user input receiver, of a correct response by a user to the challenge, wherein that the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image, and wherein the composite image is dynamic by the mask randomly moving in the composite image periodically.. . ... British Telecommunications Public Limited Company

01/05/17 / #20170006504

Method and corresponding wireless access point for adjusting data rate of secondary users

The disclosure relates to a dual network access point capable of establishing a home wireless network and a further secondary wireless network for a number of wireless devices. The first wireless network is a private home wlan while the second wireless network is a guest network or a hotspot network. ... British Telecommunications Public Limited Company

01/05/17 / #20170005859

Dynamic line management

This invention relates to a method of dynamic line management (dlm) for a digital subscriber line. A quality of experience (qoe) measure is calculated for the digital subscriber line, and the qoe is recorded with the respective dlm line profile and also the line synchronisation rate associated with the line profile. ... British Telecommunications Public Limited Company

01/05/17 / #20170005750

Smart dynamic line management

The invention describes a method of performing re-synchronisations on a dsl line to optimise the synchronisation rate of the line. The line is monitored over a period of time, and a stable snr margin is determined, below which the line is observed to lose synchronisation. ... British Telecommunications Public Limited Company








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with British Telecommunications Public Limited Company in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for British Telecommunications Public Limited Company with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###