BT Group plc

United Kingdom

Back to Profile

1-100 of 2,676 for BT Group plc and 4 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 2,597
        Trademark 79
Jurisdiction
        World 1,493
        United States 1,114
        Europe 64
        Canada 5
Owner / Subsidiary
British Telecommunications Public Limited Company 2,636
EE Limited 31
Orange Personal Communications Services Limited 6
BT Americas Inc. 4
E&E Ltd. 1
Date
New (last 4 weeks) 12
2026 March (MTD) 8
2026 February 4
2026 January 12
2025 December 7
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 346
H04L 12/24 - Arrangements for maintenance or administration 152
H04L 12/26 - Monitoring arrangements; Testing arrangements 147
H04L 9/40 - Network security protocols 129
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 122
See more
NICE Class
38 - Telecommunications services 72
09 - Scientific and electric apparatus and instruments 67
42 - Scientific, technological and industrial services, research and design 57
35 - Advertising and business services 49
41 - Education, entertainment, sporting and cultural services 39
See more
Status
Pending 158
Registered / In Force 2,518
  1     2     3     ...     27        Next Page

1.

VECTOR CLUSTERING ALGORITHM

      
Application Number EP2025074409
Publication Number 2026/047055
Status In Force
Filing Date 2025-08-27
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Khanam, Zeba
  • Hercock, Robert

Abstract

A computer-implemented method of clustering a plurality of vectors, the computer- implemented method comprising: sorting the plurality of vectors by cosine distance from an origin vector to generate an ordered circular list; and dividing the ordered circular list into a plurality of ordered list fragments, each ordered list fragment consisting of one or more vectors, thereby generating a solution in which the one or more vectors constituting each of the plurality of ordered list fragments are assigned to a respective one of a corresponding plurality of vector clusters.

IPC Classes  ?

  • G06F 18/232 - Non-hierarchical techniques
  • G06N 20/00 - Machine learning
  • H04L 41/08 - Configuration management of networks or network elements
  • G06F 18/23211 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with adaptive number of clusters

2.

DETECTION OF NEW CYBER ATTACK VARIANTS

      
Application Number EP2025074227
Publication Number 2026/046966
Status In Force
Filing Date 2025-08-26
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kalidass, Sri Harish
  • Zia, Muhammad Fahad
  • El-Moussa, Fadi

Abstract

A computer-implemented method of operating a cyber-attack detection machine learning, 'ML', model, the computer-implemented method comprising: obtaining one or more detections of cyber-attacks output from the ML model, each such detection: being based on an input network metadata record, and having an associated confidence level; determining that one or more of the detections are associated with confidence levels below a predetermined confidence threshold; obtaining a network metadata feature set characteristic of each of one or more known categories of cyber-attack; determining that one of the detections associated with confidence levels below the predetermined confidence threshold was based on an input network metadata record whose features correspond to the network metadata feature set characteristic of one of the known categories of cyber-attack; labelling that input network metadata record as a new variant of that known category of cyber-attack; and using that labelled input network metadata record as training data to retrain the ML model.

IPC Classes  ?

3.

LONG-TERM CYBER ATTACK VARIANT PREDICTION

      
Application Number EP2025074226
Publication Number 2026/046965
Status In Force
Filing Date 2025-08-26
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kalidass, Sri Harish
  • Zia, Muhammad Fahad
  • El-Moussa, Fadi

Abstract

A computer-implemented method of generating training data for a cyber-attack detection machine learning, 'ML', model, the computer-implemented method comprising: obtaining a network metadata feature set characteristic of each of one or more known categories of cyber-attack; and generating predicted network metadata representing a plurality of predicted variants of each of the one or more known categories of cyber-attack, based on the respective network metadata feature set.

IPC Classes  ?

4.

ELECTROMAGNETIC FIELD DETECTOR

      
Application Number EP2025073020
Publication Number 2026/046714
Status In Force
Filing Date 2025-08-11
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Sun, Qiushuo
  • Singh, Alok
  • Gilks, Daniel

Abstract

An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) from a source (175); and a plurality of waveguides (105) for the RAEM-FD, wherein each of the plurality of waveguides is: configured to permit propagation of the EM field therethrough to the RAEM-FD; arranged around the RAEM-FD; and orientated towards a different direction.

IPC Classes  ?

  • G01R 29/08 - Measuring electromagnetic field characteristics

5.

ELECTROMAGNETIC FIELD DETECTOR

      
Application Number EP2025073029
Publication Number 2026/046716
Status In Force
Filing Date 2025-08-11
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Sun, Qiushuo
  • Gilks, Daniel
  • Singh, Alok

Abstract

An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) from a source (175); reorientable waveguide (105) configured to permit propagation of the EM field therethrough; and reorientation mechanism (180) engaged to the reorientable waveguide and configured to reorientate the waveguide between a/an: aligned position (240-1), in which the reorientable waveguide is aligned between the source and the RAEM-FD thereby to permit propagation of the EM field to the RAEM-FD; and misaligned position (240-2) in which the reorientable waveguide is misaligned with the source and the RAEM-FD.

IPC Classes  ?

  • G01R 29/08 - Measuring electromagnetic field characteristics

6.

ITERATIVE VECTOR CLUSTERING ALGORITHM

      
Application Number EP2025074408
Publication Number 2026/047054
Status In Force
Filing Date 2025-08-27
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Khanam, Zeba
  • Hercock, Robert

Abstract

A computer-implemented method of iteratively clustering a plurality of vectors, the computer-implemented method comprising generating a candidate solution based on a current solution by reassigning an outermost vector of a selected cluster to a cluster of a plurality of vector clusters containing a vector of the plurality of vector clusters other than the selected cluster with the shortest distance from that outermost vector.

IPC Classes  ?

  • G06F 18/232 - Non-hierarchical techniques
  • G06N 20/00 - Machine learning
  • H04L 41/08 - Configuration management of networks or network elements
  • G06F 18/213 - Feature extraction, e.g. by transforming the feature spaceSummarisationMappings, e.g. subspace methods
  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play

7.

VEHICLE NAVIGATION

      
Application Number EP2025074233
Publication Number 2026/046971
Status In Force
Filing Date 2025-08-26
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Wiseman, Richard
  • Neild, Ian

Abstract

A computer-implemented method of navigating a vehicle on a journey from a start location to an end location is provided. The method receives a plurality of measurements of a property of a positioning signal within a geographical region to be traversed by the vehicle during the journey. The method generates one or more predictions of the property of the positioning signal within the geographical region based on at least some of the plurality of measurements. Each prediction indicates a predicted value of the property of the positioning signal at a respective location within the geographical region at a time that the journey is to take place. The method determines, based on the one or more predictions, at least one location within the geographical region at which the positioning signal is predicted to be lost during the journey. The method prevents a loss of the positioning signal by causing the vehicle to avoid the at least one location.

IPC Classes  ?

  • G01C 21/20 - Instruments for performing navigational calculations
  • G01C 21/34 - Route searchingRoute guidance
  • G01S 19/39 - Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
  • G06N 20/00 - Machine learning

8.

POWER CONTROL METHOD

      
Application Number EP2025074458
Publication Number 2026/047088
Status In Force
Filing Date 2025-08-28
Publication Date 2026-03-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Morsman, Adam

Abstract

There is herein described, a computer-implemented method for causing an action to be performed in relation to a device external to the computer, the method comprising periodically scanning a database to obtain timing information, from which a date and/or time at which the action is to be performed is derivable, at the date and/or time at which the action is to be performed, obtaining (i) an identifier, from which an identity of the device is derivable; and (ii) action information, from which an action that is to be performed in relation to the device is derivable; and using the obtained identifier and action information to cause the action to be performed in relation to the device.

IPC Classes  ?

  • G06F 1/3203 - Power management, i.e. event-based initiation of a power-saving mode
  • G06F 1/3246 - Power saving characterised by the action undertaken by software initiated power-off
  • G06F 1/3228 - Monitoring task completion, e.g. by use of idle timers, stop commands or wait commands

9.

INTRUSION PREVENTION SYSTEM

      
Application Number 19103366
Status Pending
Filing Date 2023-08-03
First Publication Date 2026-02-19
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor
  • Zia, Syed Muhammad Unsub
  • Memon, Jamshed
  • Abu-Tair, Mamun
  • Rafferty, Joseph
  • Georgalas, Nektarios

Abstract

An intrusion prevention system, computer-implemented method, computer system and computer program for protecting a network are provided. The system comprises one or more intrusion detection systems. The system further comprises a packet analyser for routing packets within the network that are received from another work. The packet analyser is configured to: receive a packet destined for a computer system within the network; extract one or more features relating to the packet; use a classification model to determine whether the packet is malicious based on the extracted features; prevent delivery of the packet to the computer system in response to determining that the packet is malicious; and deliver the packet to at least one of the intrusion detection systems in the absence of a determination that the packet is malicious. The one or more intrusion detection systems are configured to provide a notification to the packet analyser of any packets that they determine to be malicious. The packet analyser is further configured to train the classification model based on the notification from the one or more intrusion detection systems.

IPC Classes  ?

10.

3D RECONSTRUCTION OF A TARGET

      
Application Number 19102085
Status Pending
Filing Date 2023-07-20
First Publication Date 2026-02-12
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Zhao, Zi-Chuan
  • Pena-Rios, Anasol
  • Clark, Adrian
  • Conway, Anthony

Abstract

A computer-implemented method for 3D reconstruction of a target is provided, comprising obtaining an initial global reconstruction of the target in a 3D space, inferred by a global machine learning model; providing, to a user, an initial visualisation of the target based on the reconstruction; receiving, from the user, at least one indication of at least one point of interest in the visualisation; resampling at least one first subsection of the target based on the at least one point of interest to obtain local data, wherein the local data is associated with the subsection based on spatial information that associates the local data with a point in 3D space; inputting the resampled local data and spatial information into a local feature machine learning model to obtain at least one 3D reconstruction of the target, wherein the local feature machine learning model has been trained to output a target reconstruction from local data of resampled subsections, and wherein the 3D coordinate system of the local 3D reconstruction aligns with the global 3D reconstruction; and merging the global 3D reconstruction with the local 3D reconstruction. A corresponding computer system and computer readable medium may also be provided.

IPC Classes  ?

  • G06T 17/00 - 3D modelling for computer graphics
  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks

11.

CONTENT DELIVERY - SERVER PUSH METHOD AND SYSTEM

      
Application Number EP2025070188
Publication Number 2026/027235
Status In Force
Filing Date 2025-07-15
Publication Date 2026-02-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Nilsson, Michael
  • Appleby, Stephen
  • Turnbull, Rory
  • Stevens, Timothy
  • Farrow, Paul
  • Roper, Ivan

Abstract

Described are methods of delivering a sequence of content segments from a content server to a client device in a server push system, where content segments comprise a first (e.g. header) component and a second (e.g. content payload) component. Where possible, a multicast server is used to deliver at least some of these segments (the content payload components) over a multicast channel, which can be received by edge servers. A unicast root proxy receives the sequence of content segments pushed by the content server to a client device over unicast, and determines whether any given segment has been made available to the edge server over multicast. If not, then the unicast root proxy can transmit the entire content segment over unicast to the edge server, which transmits it onto the client device. If the edge server does have the content segment (the payload component), then the unicast root proxy can send only the header component to the edge server over unicast. The edge server can regenerate the sequence of content segments using the data received over unicast and data received over multicast, and send the regenerated sequence of content segments onto the client device over unicast.

IPC Classes  ?

  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 67/56 - Provisioning of proxy services
  • H04N 21/6405 - Multicasting
  • H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
  • H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/75 - Media network packet handling

12.

IMPROVED ACOUSTIC SENSING METHOD

      
Application Number EP2025071764
Publication Number 2026/027519
Status In Force
Filing Date 2025-07-29
Publication Date 2026-02-05
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Parkin, Neil

Abstract

There is herein described a method of acoustic sensing, the method comprising performing a preliminary process, the preliminary process comprising determining a round trip duration of a preliminary optical pulse that is transmitted into a head end of an optical fibre, is scattered at a remote end of the fibre and then returns to the head end and using the determined round trip duration to determine a maximum pulse repetition frequency, performing a sensing process comprising transmitting a plurality of optical sensing pulses into the head end of the optical fibre at a frequency that does not exceed the determined maximum pulse repetition frequency and detecting the transmitted plurality of optical sensing pulses after having been scattered by the optical fibre, wherein the maximum pulse repetition frequency corresponds to a frequency at which each of the plurality of optical sensing pulses returns to the head end of the optical fibre at the same time as its immediately-subsequent one of the plurality of optical sensing pulses is transmitted into the head end of the optical fibre.

IPC Classes  ?

  • G01H 9/00 - Measuring mechanical vibrations or ultrasonic, sonic or infrasonic waves by using radiation-sensitive means, e.g. optical means
  • H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]

13.

RIS-ASSISTED WIRELESS COMMUNICATIONS

      
Application Number 19350704
Status Pending
Filing Date 2025-10-06
First Publication Date 2026-01-29
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Dai, Linglong
  • Su, Ruochen
  • Tan, Jingbo
  • Hao, Mo
  • Mackenzie, Richard

Abstract

A reflective surface for directing wireless communications signals that includes plurality of independently reconfigurable elements disposed irregularly on the surface is disclosed. A method of controlling a communication channel of a wireless communication system that includes the reflective surface having an irregular element arrangement is also disclosed.

IPC Classes  ?

  • H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
  • H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting
  • H04B 7/145 - Passive relay systems

14.

ERRONEOUS HAND ACTION PREVENTION

      
Application Number EP2025071137
Publication Number 2026/022204
Status In Force
Filing Date 2025-07-23
Publication Date 2026-01-29
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Pena Rios, Anasol
  • Leon Garza, Hugo
  • Hagras, Hani

Abstract

A computer-implemented method for providing real-time feedback to a user performing a task, the method comprising: receiving hand-tracking data of a user performing a task in an environment, wherein the user's hand interacts with at least one object; hierarchically classifying, using a fuzzy logic rule-based system, at least one hand gesture and/or hand position within a predefined area of the environment; based on the classified at least one hand gesture and/or hand position, determining feedback for transmission to the user.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06N 7/02 - Computing arrangements based on specific mathematical models using fuzzy logic

15.

A VAPOUR CONTAINMENT STRUCTURE

      
Application Number EP2025066358
Publication Number 2026/021741
Status In Force
Filing Date 2025-06-12
Publication Date 2026-01-29
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Winter, Samuel
  • Gilks, Daniel
  • Mosley, Peter
  • Jones, Kristina

Abstract

This invention provides a vapour containment structure comprising: a first vapour containment structure segment; a second vapour containment structure segment; a first connector comprising: a first portion defining an interior passageway extending between a first interface and a second interface, wherein the first interface of the first portion of the first connector is configured to connect with the first vapour containment structure segment and the second interface is configured to connect with the second vapour containment structure segment, wherein an optical path passes from the first vapour containment structure segment to the second vapour containment structure segment via the interior passageway of the first portion of the first connector, and a second portion defining an interior passageway, the interior passageway of the second portion of the first connector being connected to the interior passageway of the first portion of the first connector at a junction between the first and second interfaces of the first portion of the first connector, wherein a major axis of the first portion of the first connector is offset to a major axis of the second portion of the first connector; and a first vapour reservoir connected to the first portion of the first connector via the second portion of the first connector such that the first vapour reservoir is in fluidic communication with the first and a second vapour containment structure segments via the interior passageway of the first portion of the first connector and the interior passageway of the second portion of the first connector.

IPC Classes  ?

  • G04F 5/14 - Apparatus for producing preselected time intervals for use as timing standards using atomic clocks
  • G01C 19/62 - Electronic or nuclear magnetic resonance gyrometers with optical pumping
  • G01N 21/03 - Cuvette constructions
  • G01R 33/26 - Arrangements or instruments for measuring magnetic variables involving magnetic resonance for measuring direction or magnitude of magnetic fields or magnetic flux using optical pumping
  • G02B 6/02 - Optical fibres with cladding
  • G02B 6/032 - Optical fibres with cladding with non-solid core or cladding
  • H03L 7/26 - Automatic control of frequency or phaseSynchronisation using energy levels of molecules, atoms, or subatomic particles as a frequency reference
  • G01N 21/31 - Investigating relative effect of material at wavelengths characteristic of specific elements or molecules, e.g. atomic absorption spectrometry
  • G02B 6/10 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type
  • H01S 3/30 - Lasers, i.e. devices using stimulated emission of electromagnetic radiation in the infrared, visible or ultraviolet wave range using scattering effects, e.g. stimulated Brillouin or Raman effects

16.

IMPROVED QKD COMPONENTS

      
Application Number 18881989
Status Pending
Filing Date 2023-06-13
First Publication Date 2026-01-15
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor Lord, Andrew

Abstract

There is herein disclosed an apparatus for performing quantum key distribution, the apparatus comprising a plurality of connected functional components which, in use, co-operate to perform quantum key distribution, wherein one or more of the plurality of functional components is provisioned in a module, the module being relocatable relative to the remainder of the plurality of functional components.

IPC Classes  ?

17.

A NETWORK NODE

      
Application Number 19103398
Status Pending
Filing Date 2023-07-11
First Publication Date 2026-01-08
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor
  • Menchetti, Marco
  • Bussey, Liam
  • Burton, Fraser

Abstract

This invention provides a network node comprising: an optical fibre interface configured to receive, from one or more remote optical sources, a first optical signal, a second optical signal and a third optical signal, wherein the first, second and third optical signals each have a respective wavelength within an optical fibre transmission band being one of the O-band, E-band, S-band, C-band, L-band, and U/XL-band; one or more wavelength converters configured to convert the wavelength of one or more of the first optical signal, second optical signal and third optical signal; and a Rydberg-atom based transmission medium configured to be excited by the first optical signal, second optical signal and third optical signal, following wavelength conversion of one or more of the first optical signal, second optical signal and third optical signal, such that electrons of the Rydberg-atom based transmission medium are excited to a predetermined Rydberg state.

IPC Classes  ?

  • H04B 10/2575 - Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
  • G01R 29/08 - Measuring electromagnetic field characteristics
  • H04B 10/67 - Optical arrangements in the receiver

18.

ELECTROMAGNETIC FIELD DETECTOR

      
Application Number 19127913
Status Pending
Filing Date 2023-10-04
First Publication Date 2026-01-08
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor
  • Lees, Amelia
  • Gilks, Daniel

Abstract

This invention provides a Rydberg-atom based electromagnetic field detector array comprising a plurality of Rydberg-atom based electromagnetic field detectors, wherein each Rydberg-atom based electromagnetic field detector is divided into a plurality of units, each unit of the plurality of units being either: a variable transparency unit configured to vary its transparency by the Electromagnetically Induced Transparency, EIT, effect and further vary its transparency in response to an incident electromagnetic field, or a separator unit, wherein a sequence of one or more variable transparency units and one or more separator units of the plurality of units for a Rydberg-atom based electromagnetic field detector uniquely identifies that Rydberg-atom based electromagnetic field detector in the Rydberg-atom based electromagnetic field detector array.

IPC Classes  ?

  • G01R 29/08 - Measuring electromagnetic field characteristics

19.

MULTICAST CACHING METHOD

      
Application Number EP2025064345
Publication Number 2026/002499
Status In Force
Filing Date 2025-05-23
Publication Date 2026-01-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Nilsson, Michael
  • Appleby, Stephen
  • Stevens, Timothy
  • Turnbull, Rory

Abstract

Described are improved methods of managing content delivery to a client device by a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, delivery of segments over multicast and managing the cache that stores received multicast segments need to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to optimise multicast delivery and associated cache management.

IPC Classes  ?

  • H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/75 - Media network packet handling
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics
  • H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data

20.

NETWORK PROTECTION

      
Application Number EP2025067319
Publication Number 2026/002804
Status In Force
Filing Date 2025-06-19
Publication Date 2026-01-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Rezaeifar, Zeinab
  • Cruciani, Federico
  • Nugent, Christopher
  • Sani, Sadiq
  • Beard, Alfie

Abstract

A computer-implemented method of protecting a network is provided. The method receives security alert data from one or more intrusion detection systems. The security alert data comprises a plurality of security alerts relating to the network. The method generates a plurality of similarity matrices from the security alert data. Each similarity matrix is generated using a different respective similarity function and indicates a respective similarity between each of the security alerts according to that similarity function. The method generates one or more attack graphs from the plurality of similarity matrices. Each attack graph represents a respective set of security alerts, wherein a similarity between each of the security alerts in the set, according to at least one of the similarity matrices, is above a predefined threshold. The method causes one or more predetermined actions to be taken with respect to the network to mitigate a respective attack represented by each of the attack graphs.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 9/40 - Network security protocols

21.

LOCAL FAULT PREDICTOR

      
Application Number EP2025067759
Publication Number 2026/002998
Status In Force
Filing Date 2025-06-24
Publication Date 2026-01-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Di Cairano-Gilfedder, Carla
  • Conway, Anthony

Abstract

A method comprising the steps: (a) applying a first detector to equipment; (b) applying a second detector to at least one external element; (c) obtaining a performance measurement associated with the equipment at time of installation; (d) obtaining data associated with the environment in which the equipment is being installed; (e) obtaining historical fault data associated with the equipment and/or environment; (f) inputting, to a machine learning model, at least some of the data and/or information, obtained in steps (a)-(e); (g) outputting, from the machine learning model, a faulty installation likelihood predictor and, based on the faulty installation likelihood predictor, determining an overall confidence level for the installed equipment; (h) if the overall confidence level is below a predetermined threshold, recommending a corrective action; and (i) repeating steps (a), (b), (f), (g) and (h) until the overall confidence level is above a second predetermined threshold.

IPC Classes  ?

22.

HIERARCHICAL FAULT PREDICTOR

      
Application Number EP2025067760
Publication Number 2026/002999
Status In Force
Filing Date 2025-06-24
Publication Date 2026-01-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Di Cairano-Gilfedder, Carla
  • Conway, Anthony

Abstract

A method comprising: (a) obtaining a hierarchy of two or more devices in a network, wherein the hierarchy describes connectivity of the two or more devices and/or describes relationship between the two or more devices; (b) obtaining a first detector's output of each of the two or more devices at a time of installation; (c) obtaining a second detector's output of an external element of the two of more devices at the time of installation; (d) obtaining performance measurement(s) of each of the two or more devices at the time of installation; (e) obtaining environmental information of each of the two or more devices at the time and/or a location of installation; (f) obtaining historical fault data associated with the network, device(s) and/or environment; (g) obtaining network performance metrics associated with the network; (h) inputting, to a machine learning model, at least some of the data, metrics and/or information, obtained in steps (a)-(g); (i) outputting, from the machine learning model, a faulty installation likelihood predictor configured to apply an overall confidence level to the installed equipment; (j) if the overall confidence level is below a first predetermined threshold, recommending a corrective action until the overall confidence level is above a second predetermined threshold.

IPC Classes  ?

  • H04L 41/0677 - Localisation of faults
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]

23.

A VAPOUR CONTAINMENT STRUCTURE

      
Application Number EP2025063554
Publication Number 2026/002470
Status In Force
Filing Date 2025-05-16
Publication Date 2026-01-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Winter, Samuel
  • Gilks, Daniel
  • Mosley, Peter
  • Jones, Kristina

Abstract

This invention provides a vapour containment structure, a system comprising the vapour containment structure, and a method of operating the system, the vapour containment structure comprising: an elongate section defining an interior passageway, the elongate section having a major axis; a first optical access window permitting passage of an optical path into the elongate section and along the interior passageway of the elongate section; and a first sealable section further defining an interior passageway, the first sealable section having a major axis, wherein: the interior passageway of the first sealable section comprises a port for receiving vapour, the interior passageway of the first sealable section joins the interior passageway of the elongate section permitting fluidic communication between the interior passageway of the first sealable section and the interior passageway of the elongate section, the major axis of the first sealable section is offset from the major axis of the elongate section, and the first sealable section comprises a sealing point along its length that, when sealed, prevents fluidic communication into the interior passageway of the first sealable section.

IPC Classes  ?

  • G01N 21/03 - Cuvette constructions
  • G01N 21/31 - Investigating relative effect of material at wavelengths characteristic of specific elements or molecules, e.g. atomic absorption spectrometry
  • G01N 21/41 - RefractivityPhase-affecting properties, e.g. optical path length
  • G01N 21/64 - FluorescencePhosphorescence
  • G01N 21/59 - Transmissivity

24.

METHOD OF OPERATING A TELECOMMUNICATIONS NETWORK

      
Application Number 19247976
Status Pending
Filing Date 2025-06-24
First Publication Date 2026-01-01
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor
  • Lalovic, Milan
  • Kumar, Parveen

Abstract

A method (300) of operating a cellular telecommunications system (100), said system comprising User Equipment (105), UE, and a cellular private network (110-2), and the method comprising the steps of: storing, at the UE and at the private network, a: Static IDentifier, SID; and first Network IDentifier, NID, for uniquely identifying the private network to the UE, wherein the first NID comprises the SID; by the private network: broadcasting the first NID; modifying the first NID into a second, different, NID for uniquely identifying the private network (350), wherein the second NID is unfamiliar to the UE for the purposes of permitting the UE to request a connection to the private network on the basis of the second NID, and in which the second NID comprises: the SID, wherein the SID remains unchanged as between the first and second NIDs; and a Variable IDentifier, VID, consisting of at least one character that is different to a corresponding portion of the first NID; and subsequently broadcasting the second NID instead of the first NID, thereby instead to identify the private network using the second NID; by the UE: detecting the broadcast second NID (360); determining, using the SID, that the detected second NID comprises the SID (330-2); and requesting, in response to determining that the broadcast second NID comprises the SID, attachment to the private network using the SID, despite the second NID being unfamiliar to the UE (330-1).

IPC Classes  ?

  • H04W 12/03 - Protecting confidentiality, e.g. by encryption
  • H04W 48/10 - Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
  • H04W 76/10 - Connection setup

25.

METHODS AND SYSTEMS FOR INTRUSION DETECTION

      
Application Number GB2024051483
Publication Number 2025/257514
Status In Force
Filing Date 2024-06-10
Publication Date 2025-12-18
Owner
  • KHALIFA UNIVERSITY OF SCIENCE AND TECHNOLOGY (United Arab Emirates)
  • BRITISH TELECOMMUNICATIONS PLC (United Kingdom)
  • EMIRATES TELECOMMUNICATIONS GROUP COMPANY PJSC (United Arab Emirates)
Inventor
  • Asal, Rasool
  • Yoo, Paul D.

Abstract

This invention relates to methods and systems for intrusion detection. An embodiment provides a system for detecting an attempted intrusion into a networked device, the system including: a sensor module arranged to read and monitor network traffic to and from the device and produce event data based on the network traffic; a detection module arranged to assess the event data using an anomaly-based classifier to classify the event as an attempted intrusion or not and to generate an alert if the event is classified as an attempted intrusion. The detection module is further arranged to: use an auto-encoder to process the event data to construct features in a latent representation; and determine features in the latent representation which deviate from a normal condition by more than a predetermined threshold. Processing of the intrusion detection may be distributed across networked devices to reduce the computational power required, making the methods and systems suited to use in IoT devices.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 3/088 - Non-supervised learning, e.g. competitive learning

26.

METHOD OF OPERATING A TELECOMMUNICATIONS NETWORK

      
Application Number 18879927
Status Pending
Filing Date 2023-05-09
First Publication Date 2025-12-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Willis, Peter
  • Veitch, Paul
  • Eardley, Philip

Abstract

A method (200) of operating a hybrid access telecommunications network (100), said telecommunications network comprising a client device (110) and a core network (130) connected therebetween via a plurality of network paths, each network path being established by a different access network (120), the method comprising the steps of: sending (210) and then receiving (220), over each of the plurality of network paths, a lightweight packet train between the client device and the core network; measuring dispersion of each received packet train; determining a relative network performance of the plurality of network paths using said measured dispersions (230); and configuring the telecommunications network so as to send subsequent network communications between the client device and the core network over the plurality of network paths in dependence on the determined relative network performance of the plurality of network paths (250).

IPC Classes  ?

  • H04L 43/10 - Active monitoring, e.g. heartbeat, ping or trace-route
  • H04L 43/50 - Testing arrangements

27.

HTTP REDIRECTION

      
Application Number 18878593
Status Pending
Filing Date 2023-05-26
First Publication Date 2025-12-11
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Farrow, Paul
  • Nilsson, Michael
  • Appleby, Stephen

Abstract

Examples relate to a method of performing HTTP redirects. An intermediary node, such as a home gateway, receives an HTTP request from a client device for a resource located at a content server. The intermediary node, such as a gateway device. determines that the resource is one that could be provided instead by a different source from that of the content server. for example instead by a proxy that is be co-located with the intermediary node. The intermediary node then performs network address translation to modify the source port number associated with the HTTP request to one from a predetermined set of source port numbers, before forwarding the HTTP request with the modified source port number to the content server. The content server receives the request and determines that the source port of the HTTP request is one of the predetermined set of source port numbers. and thus sends an HTTP redirect message to the client device, wherein the HTTP redirect message is addressed to a domain associated with the proxy.

IPC Classes  ?

  • H04L 67/563 - Data redirection of data network streams
  • H04L 61/2517 - Translation of Internet protocol [IP] addresses using port numbers
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

28.

ELECTROMAGNETIC FIELD DETECTOR

      
Application Number EP2025063624
Publication Number 2025/252438
Status In Force
Filing Date 2025-05-16
Publication Date 2025-12-11
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Sun, Qiushuo
  • Singh, Alok
  • Gilks, Daniel

Abstract

An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) of a given frequency; and Multi-Plate WaveGuide (105), MPWG, comprising: at least three overlapping and non-intersecting plates (180); and at least two waveguides (190), each formed by an adjacent pair of the at least three plates, and wherein each waveguide has a separation distance suitable (ℎ) for supporting propagation of the EM field; and wherein the MPWG is arranged so as to direct the EM field towards the RAEM-FD.

IPC Classes  ?

  • G01R 29/08 - Measuring electromagnetic field characteristics
  • H04B 10/00 - Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication

29.

IMPROVEMENTS TO WAVELENGTH-DIVISION MULTIPLEXING

      
Application Number EP2025060073
Publication Number 2025/247546
Status In Force
Filing Date 2025-04-11
Publication Date 2025-12-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Davidson, Zoe

Abstract

There is herein described a method of wavelength division multiplexed (WDM) transmission from a first optical terminal to a second optical terminal, the first optical terminal being communicatively connected to the second optical terminal by a free-space optical link, the method comprising, at the first optical terminal, receiving a correction signal from the second optical terminal over the free space optical link, transmitting one or more component frequencies of an optical frequency comb to the second optical terminal over the free space optical link using WDM, the one or more component frequencies of the optical frequency comb having been modulated with transmission data, where the optical frequency comb has been modified using a noise-correction factor derived from the correction signal

IPC Classes  ?

  • H04B 10/112 - Line-of-sight transmission over an extended range
  • H04J 14/02 - Wavelength-division multiplex systems

30.

OPTICAL FREQUENCY COMB TRANSMISSION METHOD

      
Application Number EP2025060074
Publication Number 2025/247547
Status In Force
Filing Date 2025-04-11
Publication Date 2025-12-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Davidson, Zoe

Abstract

There is herein described a method of optical transmission from a first optical terminal to a second optical terminal, the first optical terminal being connected to the second optical terminal by a free-space optical link, the method comprising transmitting a first master optical frequency comb from the first optical terminal to the second optical terminal over the free-space optical link receiving at the first optical terminal, a return signal transmitted by the second optical terminal over the free-space optical link, the return signal being derived from the transmitted master optical frequency comb, transmitting a second master optical frequency comb from the first optical terminal to the second optical terminal over the free-space optical link, the second master optical frequency comb having been modified using the return signal.

IPC Classes  ?

  • H04B 10/079 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
  • H04B 10/112 - Line-of-sight transmission over an extended range
  • H04B 10/114 - Indoor or close-range type systems
  • H04J 14/02 - Wavelength-division multiplex systems

31.

METHOD OF WAVELENGTH-DIVISION MULTIPLEXING

      
Application Number EP2025060075
Publication Number 2025/247548
Status In Force
Filing Date 2025-04-11
Publication Date 2025-12-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Davidson, Zoe

Abstract

There is herein described a method of wavelength division multiplexed (WDM) transmission from a first optical terminal to a second optical terminal, the first optical terminal being communicatively connected to the second optical terminal by a free-space optical link, the method comprising at the second optical terminal, receiving a correction signal transmitted by the first optical terminal over the free space link, generating a slave optical frequency comb using a noise-correction factor that has been determined using the correction signal, receiving one or more component frequencies of a master optical frequency comb from the first optical terminal over the free-space optical link using WDM, the one or more component frequencies of the master optical frequency comb having been modulated with first transmission data, extracting the transmission data from the received one or more component frequencies of the master optical frequency comb using the slave optical frequency comb.

IPC Classes  ?

  • H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
  • H04B 10/112 - Line-of-sight transmission over an extended range
  • H04B 10/114 - Indoor or close-range type systems
  • H04J 14/02 - Wavelength-division multiplex systems

32.

SECURING AGAINST MALICIOUS ADJUNCTS

      
Application Number EP2025062726
Publication Number 2025/242448
Status In Force
Filing Date 2025-05-09
Publication Date 2025-11-27
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Sajjad, Ali
  • El-Moussa, Fadi

Abstract

The present disclosure relates to securing computers against threats found in adjuncts to communications, such as links in and attachments to emails. It provides an internet gateway for connecting a computer network to the internet, the internet gateway comprising: a traffic monitor configured to monitor outgoing communications from the computer network; a scanner configured to scan incoming communications to the computer network in response to detection, by the traffic monitor, of communication to a suspicious destination; and a sandbox manager configured to, in response to identification, by the scanner, of a suspicious adjunct to an incoming communication, launch a sandbox container on the internet gateway and open the suspicious adjunct in that sandbox container, wherein the suspicious adjunct is only passed on to its recipient communication client if analysis of behaviour elicited by opening it in the sandbox container indicates that it is benign.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • H04W 84/00 - Network topologies
  • H04L 9/40 - Network security protocols
  • H04W 88/16 - Gateway arrangements

33.

CLIMBING ROBOT

      
Application Number EP2025060893
Publication Number 2025/237629
Status In Force
Filing Date 2025-04-22
Publication Date 2025-11-20
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Clarke, Freddy

Abstract

An apparatus for climbing a structure, the apparatus comprising a/an: ascent mechanism for elevating the apparatus up the structure; arresting mechanism for actuation between a: first position in which the arresting mechanism is engaged to the structure so as to impede descent of the apparatus; and second position in which the arresting mechanism is disengaged from the structure so as to allow ascent of the apparatus; urging mechanism for urging the arresting mechanism into the first position; retention mechanism configured to work against the urging mechanism and for retaining the arresting mechanism in the second position; power supply configured to power both the ascent mechanism and the retention mechanism, such that: when powered by the power supply and the ascent mechanism is activated, the retention mechanism is configured to retain the arresting mechanism in the second position and the ascent mechanism is operable to ascend the structure; and when unpowered, the retention mechanism is caused to release the arresting mechanism, thereby causing the urging mechanism to actuate the arresting mechanism into the first position, and the ascent mechanism is deactivated.

IPC Classes  ?

  • B62D 57/02 - Vehicles characterised by having other propulsion or other ground-engaging means than wheels or endless track, alone or in addition to wheels or endless track with ground-engaging propulsion means, e.g. walking members

34.

APPARATUS AND METHOD FOR FASTENING A GUIDE AT AN ELEVATED DEPLOYMENT SITE

      
Application Number EP2025059493
Publication Number 2025/237594
Status In Force
Filing Date 2025-04-07
Publication Date 2025-11-20
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Morsman, Trevor
  • Novakovic, Violeta
  • Nottage, Martin

Abstract

This invention provides apparatus, and a method using the apparatus, for fastening a guide at an elevated deployment site. The apparatus comprises a guide housing configured as a receptacle to receive the guide therein, the guide housing comprises a closed rear face and an open front face, the closed rear face defining a plane; and an elongate element access configured to enable, when the guide is received in the guide housing: passage of a first section of an elongate element through a first opening of the passageway of the guide in a direction that intersects the plane of the closed rear face, and passage of a second section of the elongate element through a second opening of the passageway of the guide, wherein: the guide housing is attachable to a device having an elevatable component, and when a tensioning force is applied between the first and second sections of the elongate element, the first section of the elongate element experiences the tensioning force in the direction that intersects the plane of the closed rear face such that the elongate element exerts a force on the guide towards the closed rear face of the guide housing.

IPC Classes  ?

  • H02G 1/04 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for overhead lines or cables for mounting or stretching
  • H02G 7/05 - Suspension arrangements or devices for electric cables or lines

35.

A TELECOMMUNICATIONS NETWORK COMPRISING A RYDBERG-ATOM BASED EM SIGNAL RECEIVER

      
Application Number EP2025059506
Publication Number 2025/228630
Status In Force
Filing Date 2025-04-07
Publication Date 2025-11-06
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Burton, Fraser
  • Gilks, Daniel

Abstract

This invention provides a telecommunications network comprising a device and at least one network node. The device comprises a Rydberg-atom based Electromagnetic (EM) signal receiver and an uplink telecommunications interface. The Rydberg-atom based EM signal receiver may be configured in a first Rydberg state for reception at a first frequency. The device may send a request for data via the uplink telecommunications interface. Responsive thereto, the at least one network node may send a first configuration signal at the first frequency to the Rydberg-atom based EM signal receiver, the configuration signal identifying configuration parameters for the Rydberg-atom based EM signal receiver so as to configure the Rydberg-atom based EM signal receiver to a second Rydberg state for reception at a reserved frequency such that a data signal at the reserved frequency causes a detectable change in the Rydberg-atom based EM signal receiver in the second Rydberg state.

IPC Classes  ?

  • H04B 10/118 - Arrangements specific to free-space transmission, i.e. transmission through air or vacuum specially adapted for satellite communication
  • H04B 7/185 - Space-based or airborne stations

36.

AUTOMATIC DEVICE AUTHENTICATION

      
Application Number EP2025061355
Publication Number 2025/228815
Status In Force
Filing Date 2025-04-25
Publication Date 2025-11-06
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Chouhan, Pushpinder
  • Cui, Zhan
  • Selvam, Muthupavithran

Abstract

An authentication method for authenticating a first device in a network of devices, the method comprising: performing an authentication procedure to attempt to authenticate the first device; determining that the authentication procedure has failed to authenticate the first device; determining that a second device is connected to the first device; requesting authentication of the first device by the second device; receiving an authentication response from the second device; and if the second device verifies the first device in response to receiving the authentication response, authenticating the first device.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04W 12/63 - Location-dependentProximity-dependent
  • H04W 12/60 - Context-dependent security
  • G06F 21/40 - User authentication by quorum, i.e. whereby two or more security principals are required
  • H04W 12/065 - Continuous authentication
  • H04W 12/06 - Authentication

37.

SELECTING CANDIDATE WIRELESS NETWORK ACCESS NODES

      
Application Number EP2025061072
Publication Number 2025/224175
Status In Force
Filing Date 2025-04-23
Publication Date 2025-10-30
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Walczak, Nicholas

Abstract

A computer-implemented method comprising selecting a shortlist of candidate wireless network access nodes most likely to serve a target wireless communication device at a target location from a longlist of candidate wireless network access nodes, by iteratively: (i) moving a closest candidate wireless network access node, which is the candidate wireless network access node of the longlist closest to the target location, from the longlist to the shortlist; and (ii) deleting from the longlist any other candidate wireless network access nodes located within a shadow sector which encompasses that closest candidate wireless network access node, the shadow sector being a sector of a circle centred on the target location and encompassing all of the candidate wireless network access nodes on the longlist.

IPC Classes  ?

  • H04W 4/02 - Services making use of location information
  • H04W 16/18 - Network planning tools
  • H04W 36/00 - Handoff or reselecting arrangements
  • H04W 36/32 - Reselection being triggered by specific parameters by location or mobility data, e.g. speed data

38.

OBTAINING A CHARACTERISTIC RESPONSE FROM A COMMUNICATIONS NETWORK DEVICE

      
Application Number 18864383
Status Pending
Filing Date 2023-05-12
First Publication Date 2025-10-23
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor White, Catherine

Abstract

A method of obtaining a characteristic response from a communications network device in a communications network environment comprises accepting, at the communications network device, a challenge signal. Coupling all or part of the challenge signal or all or part of a transformation of the challenge signal in the form of radiation into one or more physical network channel media of the communication network. Allowing radiation to scatter between the physical communication channel media and a physically unclonable function PUF; and obtaining a response to the challenge by measuring scattered radiation from at least the PUF.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

39.

NETWORK CONFIGURATION

      
Application Number EP2025058602
Publication Number 2025/219048
Status In Force
Filing Date 2025-03-28
Publication Date 2025-10-23
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beddus, Simon
  • Mchugh, Daniel
  • Neild, Ian

Abstract

A computer-implemented method of configuring a network to provide network coverage for a mobile entity undertaking a mission is provided. The method comprises: receiving a mission definition file for the mobile entity, the mission definition file indicating a route along which the mobile entity will travel when undertaking the mission and a schedule for the mission; identifying a set of network nodes of the network for providing coverage to the mobile entity during the mission, each network node being associated with a respective portion of the route over which it is to provide network coverage to the mobile entity; determining a set of beam-forming configurations for one or more, or all, of the network nodes based on the mission definition file, each beam-forming configuration being associated with a respective network node and indicating a sequence of beam patterns for providing network coverage to the mobile entity as it travels along the respective portion of the route to be covered by that network node; and configuring the one or more, or all, of the network nodes according to the respective beam-forming configuration associated with that node to cause each network node to form a beam according to the sequence of beam patterns while the mobile entity travels along the respective portion of the route covered by that network node.

IPC Classes  ?

  • G08G 5/32 - Flight plan management for flight plan preparation
  • H04B 7/185 - Space-based or airborne stations
  • H04W 16/18 - Network planning tools
  • H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
  • H04W 16/28 - Cell structures using beam steering

40.

SCALABLE, CONTEXT-BASED ANONYMISATION OF SENSOR DATA

      
Application Number 18870570
Status Pending
Filing Date 2023-05-10
First Publication Date 2025-10-23
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Smith-Creasey, Max
  • Roscoe, Jonathan

Abstract

A computer-implemented method of obfuscating user sensor data is provided. The method comprises collecting sensor data from one or more sensors of one or more user devices, assessing the user's current behaviour from the sensor data, and determining that an obfuscation period is required. The method further comprises generating obfuscated sensor data for the one or more sensors, different to the collected sensor data, during the obfuscation period, and providing the obfuscated sensor data to the one or more programs on the one or more user devices. During the obfuscation period, the obfuscated sensor data is provided to the one or more programs on the one or more user devices includes one or both of a phased-in period at the beginning of the obfuscation period during which the obfuscated data initially matches the collected sensor data, and deviates from the collected sensor data, and a phased-return period at the end of the obfuscation period during which the obfuscated data returns to match the collected sensor data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 67/306 - User profiles

41.

AUTOMATED INSTALLATION ACTION VERIFICATION

      
Application Number 18870578
Status Pending
Filing Date 2023-05-09
First Publication Date 2025-10-23
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Conway, Anthony
  • Di Cairano-Gilfedder, Carla

Abstract

An automated equipment installation verification system to automatically verify correctness of installation actions of an operative installing an item of equipment, the system comprising: a logic unit (804) that executes a rule engine to apply at least one rule to a measure of correctness of each of a plurality of physical acts performed by the operative according to a sequence of stepwise actions to be performed by the operative in the installation of the equipment to determine a degree of correctness of an installation of the equipment, each measure of correctness being determined by a classifier trained to determine a degree of correctness of a respective act based on sensor data corresponding to the act.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring

42.

TELECOMMUNICATIONS NETWORK AND METHOD OF OPERATING THE SAME

      
Application Number EP2025056956
Publication Number 2025/209810
Status In Force
Filing Date 2025-03-13
Publication Date 2025-10-09
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Poustie, Alistair

Abstract

A method (200) of operating a fibre optic telecommunications network (100), said network comprising a/an: spine fibre (120); pair of feeder fibres (150); retroreflector (160) arranged on each of the feeder fibres; optical coupler (140) configured to split the spine fibre into the pair of feeder fibres; optical source (110) connected to the spine fibre and configured to transmit a coherent optical signal through the spine fibre to each of the retroreflectors, via the optical coupler and the pair of feeder fibres, said optical signal having a coherence length equal to or greater than distances between: the optical coupler and each of the retroreflectors, along the respective feeder fibre; and each of the retroreflectors, along the pair of feeder fibres and via the optical coupler; and optical detector (170) connected to the spine fibre; the method comprising the steps of: transmitting, by the optical source, the optical signal to the retroreflectors (210); monitoring, at the optical detector, for a reflection of the transmitted optical signal from at least one of the retroreflectors (220); and in response to detecting that the reflection is: absent, determining that the spine fibre and/or both of the feeder fibres comprise a fault (260-2); present and not comprising an interference pattern, determining that one, but not the other, of the feeder fibres comprises a fault (260-1); and present and comprises an interference pattern, determining that the spine fibre and both the feeder fibres are intact (240-1).

IPC Classes  ?

  • H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
  • H04B 10/272 - Star-type networks

43.

STEPWISE AUTOMATED EQUIPMENT INSTALLATION VERIFICATION

      
Application Number 18867572
Status Pending
Filing Date 2023-05-09
First Publication Date 2025-10-09
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Conway, Anthony Stephen
  • Di Cairano-Gilfedder, Carla
  • San Cayo Villar, Nurla
  • Leon Garza, Hugo

Abstract

An automated equipment installation verification system to automatically verify correctness of each of a sequence of installation steps for the installation of an item of equipment, the system comprising: a data store that stores a digital model of the equipment at each step of a stepwise installation process; a logic unit that executes a comparator to compare a representation of the equipment indicating a configuration of the equipment with the digital model of the equipment at a current step in the stepwise installation process to generate a degree of conformity of the equipment at the current step; and a communications interface that communicates the degree of conformity to an operative.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06T 7/00 - Image analysis
  • G09B 25/02 - Models for purposes not provided for in group , e.g. full-sized devices for demonstration purposes of industrial processesModels for purposes not provided for in group , e.g. full-sized devices for demonstration purposes of machinery

44.

OPTICAL PHYSICALLY UNCLONABLE FUNCTIONS

      
Application Number 18863955
Status Pending
Filing Date 2023-04-06
First Publication Date 2025-10-02
Owner British Telecommunications Public Limited Company (United Kingdom)
Inventor White, Catherine

Abstract

A physically unclonable function (PUF) configured to receive a challenge signal and produce a response signal dependent on the challenge signal in response thereto; wherein: the PUF comprises a photonic crystal structure of plural dimensionality which is configured to: be illuminated by an optical input signal which is, or is derived from, the challenge signal; and responsive thereto, produce an optical output signal dependent on the optical input signal's interaction with the photonic crystal structure, wherein the response signal is, or is derived from, the optical output signal.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

45.

VIDEO IMAGE PROCESSING

      
Application Number EP2025053728
Publication Number 2025/201725
Status In Force
Filing Date 2025-02-12
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Craigie, Roland
  • Pilgrim, Luke
  • Trimby, Martin

Abstract

A computer implemented video image processing method is described, which comprises receiving a sequence of video images of a scene, and receiving one or more supplementary media items. Objects of interest within the received video images are identified, and a spatial portion of each received video image is selected to generate a reframed image. The reframing is carried out in dependence on a size and/or position for the received supplementary media items, and a size and/or position of at least one of the identified objects of interest. The spatial portion for each video image is selected to include one or more of the identified objects of interest in that video image. A display image is then rendered, the display image including the reframed image and the supplementary media items. In this way, the images in the video sequence are each reframed in a manner which preserves visibility of the objects of interest while permitting display of the supplementary media items.

IPC Classes  ?

  • H04N 21/431 - Generation of visual interfacesContent or additional data rendering
  • H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
  • H04N 21/81 - Monomedia components thereof
  • H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs

46.

IMAGE PROCESSING

      
Application Number EP2025053835
Publication Number 2025/201726
Status In Force
Filing Date 2025-02-13
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Bicknell, John
  • Masterson, Elena

Abstract

A computer implemented image processing method is described, which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion For one or more of the problem hues, the method defines an original colour group, the original colour group including the problem hue and related hues within a colour range of the problem hue. The method adjusts the hues of the original colour group(s) to generate a corresponding adjusted colour group. Then, when video images are received, the method replaces pixels within each video image having a hue corresponding to the original colour group(s) with the adjusted hue of the corresponding adjusted colour group(s). In this way, problem colours can be identified for a viewer with colour vision deficiency, and those particular colours (and variants thereof) can be adjusted to be more distinguishable for the colour deficient viewer, while leaving other colours unchanged to minimise the visual impact for other viewers.

IPC Classes  ?

  • H04N 1/60 - Colour correction or control
  • H04N 1/62 - Retouching, i.e. modification of isolated colours only or in isolated picture areas only
  • H04N 9/64 - Circuits for processing colour signals

47.

MULTICAST CACHING METHOD

      
Application Number EP2025055131
Publication Number 2025/201778
Status In Force
Filing Date 2025-02-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Nilsson, Michael
  • Appleyby, Stephen
  • Turnbull, Rory
  • Stevens, Timothy

Abstract

Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segment received over multicast and if necessary, which stored segment to delete from the cache.

IPC Classes  ?

  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/75 - Media network packet handling
  • H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics
  • H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data

48.

MULTICAST CACHING METHOD

      
Application Number EP2025055132
Publication Number 2025/201779
Status In Force
Filing Date 2025-02-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Nilsson, Michael
  • Appleby, Stephen
  • Turnbull, Rory
  • Stevens, Timothy

Abstract

Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segments received over multicast and if necessary, which stored segment to delete from the cache, taking into account the relative timings of when segments are received over multicast and when unicast requests are received.

IPC Classes  ?

  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/75 - Media network packet handling
  • H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics
  • H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data
  • H04N 21/6405 - Multicasting

49.

VIDEO DATA PROVISION

      
Application Number EP2025057055
Publication Number 2025/201919
Status In Force
Filing Date 2025-03-14
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Bowman, Tom
  • Beard, Alfie

Abstract

A computer-implemented method of providing video data from one or more mobile entities to an operator of the one or more mobile entities is provided. The method obtains video data comprising one or more video streams, each video stream being captured by a respective video camera attached to a respective mobile entity and comprising a plurality of sequentially ordered frames. The method processes each of the video streams using a machine learning model trained to identify one or more significant frames. The method initiates provision of at least some of the video data to the operator, the provision of the significant frames being prioritised over the provision of other frames of the video data.

IPC Classes  ?

  • G06V 20/40 - ScenesScene-specific elements in video content
  • G06V 20/56 - Context or environment of the image exterior to a vehicle by using sensors mounted on the vehicle

50.

SELECTING OVERLAY GRAPHIC PLACEMENT LOCATIONS

      
Application Number EP2025058319
Publication Number 2025/202320
Status In Force
Filing Date 2025-03-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining an m x n matrix representation of an image sequence of one or more images to which the overlay graphic is to be applied; obtaining a q x r matrix representation of the overlay graphic, wherein q ≤ m, r ≤ n, and q.r < m.n; initiating a process to convolve the matrix representation of the image sequence with the matrix representation of the overlay graphic; and selecting the overlay graphic placement location in dependence on one or more convolution entries generated by that process.

IPC Classes  ?

  • G06T 11/60 - Editing figures and textCombining figures or text

51.

IMAGE PROCESSING

      
Application Number EP2025053836
Publication Number 2025/201727
Status In Force
Filing Date 2025-02-13
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Masterson, Elena
  • Bicknell, John

Abstract

A computer implemented image processing method is described which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining the two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion. For one or more of the problem hues, a colour group is defined, the colour group including the problem hue and related hues within a colour range of the problem hue. Subsequently, when video images are received, for one or more of the colour groups, one or more regions in a received image having a hue corresponding to that colour group are identified, and a pattern is applied to those regions. In this way, patterns are applied only to regions of the image having a hue within a defined colour group containing a problem hue. As a result, the part of the image formerly represented only by the problem colour is now represented by a pattern, which is easily discernible by a colour-blind viewer. Regions of the image which do not contain a problem hue are not patterned in this way, and so the majority of the image remains unchanged.

IPC Classes  ?

  • G06T 11/00 - 2D [Two Dimensional] image generation
  • G09G 5/00 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
  • H04N 1/60 - Colour correction or control

52.

SELECTING OVERLAY GRAPHIC PLACEMENT LOCATIONS

      
Application Number EP2025058323
Publication Number 2025/202323
Status In Force
Filing Date 2025-03-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of selecting an overlay graphic placement location for display of an overlay graphic on a display device over an image sequence originating from a camera, the method comprising: obtaining overlay graphic data; obtaining object data indicating proximity of any objects in the image sequence to the camera at the time the image sequence was recorded; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, the placement scores being determined in dependence on proximity data derived from the object data; and selecting the overlay graphic placement location in dependence on the placement scores.

IPC Classes  ?

  • G06T 11/60 - Editing figures and textCombining figures or text
  • G06V 20/20 - ScenesScene-specific elements in augmented reality scenes

53.

SELECTING OVERLAY GRAPHIC PLACEMENT LOCATIONS

      
Application Number EP2025058326
Publication Number 2025/202326
Status In Force
Filing Date 2025-03-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining object data indicating the location of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, wherein the process is terminated when a placement score above a predetermined stopping threshold value is found; and selecting the overlay graphic placement location in dependence on the placement scores such that, when a placement score above the predetermined stopping threshold value is found, the current candidate graphic location is selected to be the overlay graphic placement location.

IPC Classes  ?

  • G06T 11/60 - Editing figures and textCombining figures or text

54.

SELECTING OVERLAY GRAPHIC PLACEMENT LOCATIONS

      
Application Number EP2025058327
Publication Number 2025/202327
Status In Force
Filing Date 2025-03-26
Publication Date 2025-10-02
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining initial object data indicating locations of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; predicting subsequent object data in dependence on the initial object data; initiating a process to determine a placement score, based on the overlay graphic data and the initial and subsequent object data, for each of a plurality of candidate graphic locations; and selecting the overlay graphic placement location in dependence on the placement scores.

IPC Classes  ?

  • G06T 11/60 - Editing figures and textCombining figures or text

55.

SOURCE CODE MIGRATION, MAINTENANCE, REFACTORING WITH ABDUCTIVE REASONING

      
Application Number EP2025053147
Publication Number 2025/195665
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Noppen, Johannes
  • Ziolkowski, Adam
  • Johns, Jack

Abstract

A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional role is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. Abductive role reasoning is used to improve accuracy of functional role assignments. 1 to be published with the abstract

IPC Classes  ?

  • G06F 8/51 - Source to source
  • G06F 8/72 - Code refactoring
  • G06F 8/73 - Program documentation
  • G06F 8/76 - Adapting program code to run in a different environmentPorting
  • G06F 8/10 - Requirements analysisSpecification techniques
  • G06F 8/74 - Reverse engineeringExtracting design information from source code
  • G06N 5/04 - Inference or reasoning models

56.

SOURCE CODE MIGRATION, MAINTENANCE, REFACTORING WITH ARCHITECTURAL RESTRUCTURING

      
Application Number EP2025053148
Publication Number 2025/195666
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Noppen, Johannes
  • Johns, Jack
  • Ziolkowski, Adam

Abstract

A method reduces architectural coupling in source code. A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role. A plurality of concepts of a domain of the source code are available. An occurrence of the functional marker is identified in the graph representing the source code. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The assigned functional roles are matched to the concepts. An architectural coupling of different functional roles within a single node of the graph is identified using the assigned functional roles and matched concepts. The architectural coupling is reduced by transforming the source code.

IPC Classes  ?

  • G06F 8/72 - Code refactoring
  • G06F 8/76 - Adapting program code to run in a different environmentPorting
  • G06F 8/74 - Reverse engineeringExtracting design information from source code
  • G06F 8/51 - Source to source

57.

TELEPHONY SYSTEM AND METHOD OF OPERATING THE SAME

      
Application Number 19077202
Status Pending
Filing Date 2025-03-12
First Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Glynn, F. Joseph
  • Batagurki, Rajesh Vasant

Abstract

A method of operating a telephony system, the system including a client server to access a conferencing server for establishing a conference call, connect a plurality of terminals to the conferencing server; and communicate with a UE so as to receive a call from the UE;, the method including, by the client server, detecting initiation of a call between the UE and a given one of the plurality of terminals; identifying the UE and the given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to the non-conference call; receiving, from the conferencing server, access information for accessing the requested conference call; and distributing the access information to each of the plurality of terminals, thereby permitting any of the terminals to access the conference call.

IPC Classes  ?

  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
  • H04W 24/08 - Testing using real traffic
  • H04W 76/15 - Setup of multiple wireless link connections

58.

SOURCE CODE MIGRATION, MAINTENANCE, REFACTORING FOR TELECOMMUNICATIONS NETWORK SERVICES

      
Application Number EP2025053142
Publication Number 2025/195662
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Noppen, Johannes
  • Ziolkowski, Adam
  • Johns, Jack

Abstract

A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional rose is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.

IPC Classes  ?

  • G06F 8/51 - Source to source
  • G06F 8/72 - Code refactoring
  • G06F 8/76 - Adapting program code to run in a different environmentPorting
  • G06F 8/74 - Reverse engineeringExtracting design information from source code
  • G06N 5/04 - Inference or reasoning models

59.

SOURCE CODE MIGRATION, MAINTENANCE, REFACTORING USING DESIGN PATTERNS

      
Application Number EP2025053144
Publication Number 2025/195663
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Noppen, Johannes
  • Ziolkowski, Adam
  • Johns, Jack

Abstract

Source code from a legacy code base is represented using a graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role is accessed. An occurrence of the functional marker in the graph representing the source code is found. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. For the source code from the legacy code base corresponding to the nodes with the assigned functional roles, an automated tool triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. The functional marker is a design pattern which makes it possible to assign functional roles associated with the design pattern.

IPC Classes  ?

  • G06F 8/76 - Adapting program code to run in a different environmentPorting
  • G06F 8/72 - Code refactoring
  • G06F 8/74 - Reverse engineeringExtracting design information from source code
  • G06F 8/51 - Source to source

60.

ADAPTIVE SOURCE CODE QUALITY ASSESSMENT

      
Application Number EP2025053145
Publication Number 2025/195664
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Noppen, Johannes
  • Abu-Tair, Mamun
  • Ali, Aftab
  • Mcclean, Sally
  • Ziolkowski, Adam
  • Johns, Jack

Abstract

An adaptive quality assessor assesses quality of source code, taking into account feedback from software engineers. A modification to source code of a software system is detected. A plurality of metrics are selected from source code metrics available for the source code, the selection being at least in response to feedback about the modification to the source code. A score is computed comprising a weighted combination of the selected plurality of metrics. An automated action on a consuming process is triggered in response to the computed score, such as to control integration of the modified source code into the software system or to prioritize tasks in a queue.

IPC Classes  ?

  • G06F 8/77 - Software metrics
  • G06F 8/71 - Version control Configuration management
  • G06F 11/3604 - Analysis of software for verifying properties of programs

61.

SOURCE CODE MIGRATION, MAINTENANCE, REFACTORING USING DOMAIN CONCEPTS FOR TELECOMMUNICATIONS NETWORK SERVICES

      
Application Number EP2025053149
Publication Number 2025/195667
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Johns, Jack
  • Noppen, Johannes
  • Ziolkowski, Adam

Abstract

A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A domain model of a domain related to the legacy code base is computed, the domain model comprising a plurality of concepts and relationships between the concepts. A node of the graph matching one of the concepts is identified. A functional role of model is assigned to the identified node. The knowledge of the assigned functional role is used to trigger any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.

IPC Classes  ?

  • G06F 8/51 - Source to source
  • G06F 8/72 - Code refactoring
  • G06F 8/73 - Program documentation
  • G06F 8/76 - Adapting program code to run in a different environmentPorting
  • G06F 8/10 - Requirements analysisSpecification techniques
  • G06F 8/74 - Reverse engineeringExtracting design information from source code

62.

TELEPHONY SYSTEM AND METHOD OF OPERATING THE SAME

      
Application Number EP2025054125
Publication Number 2025/195693
Status In Force
Filing Date 2025-02-14
Publication Date 2025-09-25
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Glynn, F. Joseph
  • Batagurki, Rajesh

Abstract

A method (300, 400) of operating a telephony system (100), said system comprising a: client server (170), configured to: access a conferencing server (140) for establishing a conference call; connect a plurality of terminals (180) to the conferencing server; and communicate with a UE (160) so as to receive a call from the UE; the method comprising the steps of, by the client server: detecting initiation of a call between the UE and a given one of the plurality of terminals (320, 420); identifying the UE and said given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to said non-conference call (330-2, 430); receiving, from the conferencing server, access information for accessing the requested conference call (340, 440); and distributing the access information to each of the plurality of terminals (360, 460), thereby permitting any of said terminals to access the conference call.

IPC Classes  ?

  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention
  • H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
  • H04L 65/1069 - Session establishment or de-establishment
  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences

63.

GROUNDING RESPONSES FROM A LARGE LANGUAGE MODEL

      
Application Number EP2025052939
Publication Number 2025/190564
Status In Force
Filing Date 2025-02-05
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Bayart, Damien
  • Free, Michael

Abstract

Various examples relate to a method for grounding responses from a Large Language Model (LLM). The LLM is prompted using a prompt that has been augmented using information retrieved from a knowledge base and a response is received from the LLM. Entities are extracted from the response and from the information retrieved from the knowledge base. A grounding service checks the response is grounded with respect to the knowledge base by checking the types and values of critical entities extracted from the response match the types and values of critical entities extracted from the information retrieved from the knowledge base.

IPC Classes  ?

64.

PROMPT SPACE OPTIMIZATION

      
Application Number EP2025053156
Publication Number 2025/190570
Status In Force
Filing Date 2025-02-06
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Free, Michael
  • Bayart, Damien

Abstract

A prompt is received from an end user device, the prompt being for prompting a large language model, LLM. A RAG engine queries a knowledge base using a query formed from the prompt, to obtain search results. The search results are filtered to exclude information in a store of information known by the LLM. A retrieval augmented generation, RAG, prompt is formed from the received prompt and the filtered search results. The RAG prompt is sent to the LLM and a response is received from the LLM. The response is sent to a user interface or used to control a communications network.

IPC Classes  ?

65.

CALL MANAGEMENT

      
Application Number EP2025053692
Publication Number 2025/190587
Status In Force
Filing Date 2025-02-12
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kiss, Stephanie
  • Taylor, Paul
  • Yearling, David

Abstract

A call management tool is described comprising a memory and a processor. The memory stores instructions which when executed by the processor implements a method of establishing a call via a communications network between an end user communications device and an agent, extracting metadata from the call, constructing a prompt using the metadata, sending the prompt to a large language model (LLM) and receiving a response to the prompt from the large language model, and triggering a next action using the response, where the next action manages the call.

IPC Classes  ?

  • H04M 3/51 - Centralised call answering arrangements requiring operator intervention

66.

A METHOD FOR PROCESSING IMAGES TO IDENTIFY OBJECTS WITHIN AN ENVIRONMENT

      
Application Number EP2025053729
Publication Number 2025/190588
Status In Force
Filing Date 2025-02-12
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kiss, Stephanie
  • Taylor, Paul
  • Yearling, David

Abstract

A computer implemented method is defined. The method comprises receiving an image of an environment; providing the image to a trained multi-modal large language model trained to identify one or more objects within the image and a position of each of the one or more objects within the image and output text identifying the one or more objects and the positions of the one or more objects; receiving from the multi-modal large language model the output text; forming a record of the environment using the output text of the multi-modal large language model, wherein the record of the environment comprises an identification of the one or more objects in the environment and the position of the one or more objects in the environment; and querying the record to determine an identity and/or a position of an object of the one or more objects.

IPC Classes  ?

  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
  • G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
  • G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations

67.

ANOMALY DETECTION FOR COMMUNICATIONS NETWORKS

      
Application Number EP2025053731
Publication Number 2025/190589
Status In Force
Filing Date 2025-02-12
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kiss, Stephanie
  • Yearling, David
  • Taylor, Paul

Abstract

Some examples of training a large language model (LLM) to detect an anomaly comprise receiving a plurality of modalities of training data, each modality of training data comprising a different data type. The training data comprises labels indicating a presence of an anomaly. Each modality of training data is transformed with a respective transformation to obtain respective vector embeddings. The respective vector embeddings of the training data are input into a pretrained LLM. Weights of the pre-trained LLM are fine-tuned using the training data via supervised learning such that the pre-trained LLM is able to detect anomalies in multi-modal data.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06N 3/09 - Supervised learning
  • H04L 41/06 - Management of faults, events, alarms or notifications
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

68.

BEHAVIOUR LEARNER

      
Application Number EP2025054078
Publication Number 2025/190608
Status In Force
Filing Date 2025-02-14
Publication Date 2025-09-18
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Khan, Kashaf

Abstract

Some examples of a method and apparatus are described, including: for each of a plurality of time instants, receiving operation data, wherein the operation data comprises a current configuration of an operation and an output of the operation, where the operation is computer- implemented functionality for managing a communications network or for managing a service deployed in a communications network; determining a performance label associated with the output of the operation; generating behaviour data comprising the operation data and the performance label; and storing the behaviour data in a behaviour repository. The method comprises simulating the operation using the stored behaviour data; and triggering change to the configuration of the operation in response to output of the simulation.

IPC Classes  ?

  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0866 - Checking the configuration
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 41/0859 - Retrieval of network configurationTracking network configuration history by keeping history of different configuration generations or by rolling back to previous configuration versions

69.

3D MODEL TRAINING

      
Application Number EP2025054232
Publication Number 2025/185973
Status In Force
Filing Date 2025-02-17
Publication Date 2025-09-11
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Pena Rios, Anasol
  • Conway, Anthony
  • Zhao, Zi-Chuan
  • Clark, Adrian

Abstract

A computer implemented method, comprising: acquiring a plurality of images of a first scene captured from different viewing positions; training a 3D implicit neural representation model for the scene using the acquired images; wherein the training comprises rendering an image from the 3D model of the scene, the image being rendered as if captured from a first viewing position, comparing the rendered image with one of the acquired images taken from the first viewing position, and adjusting one or more parameters of the model in dependence on a result of the comparison; and the training further comprises rendering a 2D spatial image bearing 3D information, the 2D spatial image being rendered as if captured from a second viewing position, and adjusting one or more parameters of the model in dependence on the 2D spatial image.

IPC Classes  ?

70.

SENSOR MAINTENANCE

      
Application Number EP2025054230
Publication Number 2025/185972
Status In Force
Filing Date 2025-02-17
Publication Date 2025-09-11
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Thurlow, Ian

Abstract

A computer-implemented method of maintaining a deployed sensor unit is provided. The method receives (410) a raw sensor data stream from the deployed sensor unit (210). The method further receives (420) a set of calibration measurements associated with the deployed sensor unit, the set of calibration measurements being taken by a mobile reference sensor unit (220) whilst in proximity to the deployed sensor unit during a calibration period. The method determines (430) a drift of the deployed sensor unit based on the raw sensor data and the set of calibration measurements. The method further determines (440) whether the deployed sensor unit should be replaced based, at least in part, on the determined drift. The method schedules (460) a replacement of the deployed sensor unit in response to determining that the deployed sensor unit should be replaced and schedules (450) a further calibration of the deployed sensor unit in response to determining that the deployed sensor unit should not be replaced. The further calibration is to be undertaken by a mobile reference sensor unit whilst in proximity to the deployed sensor unit during a further calibration period to take a further set of calibration measurements.

IPC Classes  ?

  • G01D 18/00 - Testing or calibrating apparatus or arrangements provided for in groups
  • G01D 21/00 - Measuring or testing not otherwise provided for

71.

A DEVICE COMPRISING A PHOTONIC INTEGRATED CIRCUIT AND A METHOD OF MANUFACTURING THE SAME

      
Application Number EP2025050770
Publication Number 2025/180707
Status In Force
Filing Date 2025-01-14
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Gilks, Daniel
  • Davey, Steven

Abstract

This invention provides a device, and a method of manufacturing said device, the device comprising: a container containing an atomic vapour; and a Photonic Integrated Circuit, PIC, positioned inside the container, the PIC comprising: a substrate comprising a surface and a first optical path, wherein the substrate defines a first opening extending from the surface of the substrate to a first section of the first optical path, the first opening being exposed to the atomic vapour of the container such that the first section of the first optical path passes across the first opening through the atomic vapour.

IPC Classes  ?

  • G04F 5/14 - Apparatus for producing preselected time intervals for use as timing standards using atomic clocks
  • G01C 19/62 - Electronic or nuclear magnetic resonance gyrometers with optical pumping
  • G01R 33/26 - Arrangements or instruments for measuring magnetic variables involving magnetic resonance for measuring direction or magnitude of magnetic fields or magnetic flux using optical pumping
  • H03L 7/26 - Automatic control of frequency or phaseSynchronisation using energy levels of molecules, atoms, or subatomic particles as a frequency reference
  • G01N 21/03 - Cuvette constructions
  • G02B 6/12 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type of the integrated circuit kind

72.

A TELECOMMUNICATIONS SYSTEM AND A METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM

      
Application Number EP2025050839
Publication Number 2025/180711
Status In Force
Filing Date 2025-01-14
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Mckay, Alistair
  • Mazloumian, Gregory
  • Smith, Paul

Abstract

A Method Of Operating The Telecommunications System A method (400) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; and communicate with a User Equipment (110), UE, over a wireless local connection (180-1); communicating, from the CN, to the UE, over the wireless local connection, the eSIM profile (420); receiving, at the CTN, from the UE using the eSIM profile, a/an: request for a service plan; identifier of the communicated eSIM profile; and unique identifier associated with the UE, other than the identifier of the eSIM profile (430); determining, at the CTN, the UE to be (440): eligible to receive the service plan in response to identifying, as stored in the CTN, an absence of an association between the unique identifier and prior provision of the requested service plan by the CTN; and ineligible to receive the service plan in response to identifying, as stored in the CTN, an association between the unique identifier and prior provision of the requested service plan; and in response to determining that the UE is: eligible, the CTN permitting the identified eSIM profile to access to the requested service plan (460); and not eligible, the CTN preventing the identified eSIM profile from accessing to the requested service plan (450). Further methods and systems are disclosed.

IPC Classes  ?

  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 48/02 - Access restriction performed under specific conditions

73.

AUTOMATIC DEPLOYMENT OF DECOYS

      
Application Number EP2025052493
Publication Number 2025/180755
Status In Force
Filing Date 2025-01-31
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Chouhan, Pushpinder
  • Cui, Zhan

Abstract

Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception decoys to deploy in response to the network intrusion, and deploying the one or more deception decoys in response to the intrusion.

IPC Classes  ?

74.

DATA STRUCTURES AND METHODS FOR NAMED ENTITY RESOLUTION AND RECOGNITION IN NETWORK SECURITY AND MANAGEMENT

      
Application Number EP2025052889
Publication Number 2025/180785
Status In Force
Filing Date 2025-02-05
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Khanam, Zeba
  • Umeh, Ikenna
  • Hercock, Robert
  • Claireaux, Leah

Abstract

The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising: a hash table, referred to herein as an 'embedding hash table', consisting of one or more buckets, wherein: for each bucket of the embedding hash table, a corresponding key is a vector embedding of an entity name; and each bucket of the embedding hash table stores an entity type label associated with the corresponding entity name; and a data substructure storing all of the keys to the embedding hash table.

IPC Classes  ?

  • G06F 16/31 - IndexingData structures thereforStorage structures
  • G06F 16/35 - ClusteringClassification
  • G06F 16/353 - ClusteringClassification into predefined classes

75.

TELECOMMUNICATIONS SYSTEM AND METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM

      
Application Number EP2025050838
Publication Number 2025/180710
Status In Force
Filing Date 2025-01-14
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Mckay, Alistair
  • Smith, Paul
  • Mazloumian, Gregory

Abstract

A Telecommunications System And A Method Of Operating The Telecommunications System A method (500) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; communicate with the CTN; and communicate with a User Equipment (110), UE, using a wireless local connection (180-1); receiving, at the CN, from the UE, and over the wireless local connection, context data associated with the UE, in which said context data is indicative of a state of the UE and/or comprises user data (520); communicating, by the CN to the CTN: an identifier of the stored eSIM profile; a request for a service plan for the identified eSIM profile; and the received context data (530); and configuring, at the CTN, the requested service plan for the identified eSIM profile in dependence upon the context data (540).

IPC Classes  ?

  • H04W 8/18 - Processing of user or subscriber data, e.g. subscribed services, user preferences or user profilesTransfer of user or subscriber data
  • H04W 8/20 - Transfer of user or subscriber data
  • H04W 8/26 - Network addressing or numbering for mobility support
  • H04W 8/22 - Processing or transfer of terminal data, e.g. status or physical capabilities

76.

AUTOMATIC DEPLOYMENT OF BREADCRUMBS

      
Application Number EP2025052274
Publication Number 2025/180750
Status In Force
Filing Date 2025-01-29
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Chouhan, Pushpinder
  • El-Moussa, Fadi

Abstract

Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception breadcrumbs to deploy in response to the network intrusion, and deploying the one or more deception breadcrumbs in response to the intrusion.

IPC Classes  ?

77.

DATA STRUCTURES AND METHODS SUITABLE FOR NAMED-ENTITY RESOLUTION AND RECOGNITION IN NETWORK SECURITY AND MANAGEMENT

      
Application Number EP2025052898
Publication Number 2025/180787
Status In Force
Filing Date 2025-02-05
Publication Date 2025-09-04
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Umeh, Ikenna
  • Khanam, Zeba
  • Hercock, Robert

Abstract

The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising a hash table consisting of one or more buckets, referred to herein as a 'vector hash table', wherein: each bucket of the vector hash table stores a string comprising one or more aliases for a respective entity, referred to herein as an 'alias string'; and for each bucket, a corresponding key is a vector embedding of that alias string.

IPC Classes  ?

  • G06F 16/31 - IndexingData structures thereforStorage structures
  • G06F 16/35 - ClusteringClassification
  • G06F 16/353 - ClusteringClassification into predefined classes

78.

DATA OBFUSCATION METHOD

      
Application Number EP2025053563
Publication Number 2025/172282
Status In Force
Filing Date 2025-02-11
Publication Date 2025-08-21
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Herwono, Ian
  • El-Moussa, Fadi

Abstract

An example computer-implemented method of data obfuscation is defined. The computer- implemented method comprises monitoring network traffic from one or more IoT devices in a computing environment; generating an obfuscation schedule based on the monitored network traffic, the obfuscation schedule specifying a transmission time and one or more parameters for each of a plurality of decoy data packets to be transmitted according to the obfuscation schedule transmission times and parameters for a plurality of decoy data packets; and transmitting the decoy data packets according to the obfuscation schedule.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • H04W 12/02 - Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
  • H04W 12/037 - Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

79.

TIME-BASED APPROACHES IN MALWARE SIMULATION FOR RESPONSIVE MEASURE DEPLOYMENT

      
Application Number 18845144
Status Pending
Filing Date 2023-02-13
First Publication Date 2025-08-21
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of simulating the propagation of malware in a network is provided. The method comprises accessing a model of the network, where the model comprising a plurality of computer nodes and where each computer node of the plurality of computer nodes is connected to at least one edge of a plurality of edges. Each edge of the plurality of edges connects a pair of computer nodes of the plurality of computer nodes. The method further comprises initiating an outbreak of the malware in the model at a predetermined source computer node of the plurality of computer nodes, and propagating the malware through the model of the network from the source computer node over a plurality of step-times. The propagation is determined based on a rate of transmission per step-time for each edge, and each step-time of the plurality of step-times corresponds to a temporal point that is universal across the network, such that at each step-time the malware propagation through the network occurs simultaneously for each edge of the plurality of edges according to the rate of transmission per step-time for each edge.

IPC Classes  ?

80.

COMMUNICATIONS NETWORK INTRUSION RESPONSE SYSTEM TRAINING

      
Application Number EP2025050821
Publication Number 2025/171981
Status In Force
Filing Date 2025-01-14
Publication Date 2025-08-21
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Chouhan, Pushpinder
  • Beard, Alfie

Abstract

The disclosed technology relates to a computer-implemented method of training an intrusion response system, IRS. The method comprises receiving a plurality of rules for responding to cyber-attacks. The method generates additional rules by applying a data augmentation technique to the plurality of rules and provides the plurality of rules and the additional rules as training data to the IRS. Some examples of the method detect a potential threat that matches at least one of the rules in the plurality of rules and additional rules with the IRS, subsequent to training the IRS with the training data.

IPC Classes  ?

81.

NEURAL NETWORK ARCHITECTURE

      
Application Number EP2025052432
Publication Number 2025/172072
Status In Force
Filing Date 2025-01-30
Publication Date 2025-08-21
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Hercock, Robert

Abstract

Some examples of for training a neural network, wherein the neural network comprises a plurality of interconnected neurons, comprise receiving input data at a first neural network unit of the neural network and processing the input data using the first neural network unit to produce an output, a neural network unit comprising one or more of the neurons. Assign a first frequency to the first neural network unit and assign a second frequency associated to the second neural network unit. A difference value between the first frequency and the second frequency is determined and is used as an attention mechanism by, scaling the output of the first neural network unit in relation to the determined difference.

IPC Classes  ?

  • G06N 3/045 - Combinations of networks
  • G06N 3/049 - Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs
  • G06N 3/065 - Analogue means
  • G06N 3/084 - Backpropagation, e.g. using gradient descent

82.

Electromagnetic field detector

      
Application Number 19101952
Grant Number 12411162
Status In Force
Filing Date 2023-07-11
First Publication Date 2025-08-14
Grant Date 2025-09-09
Owner BRITISH TELECOMMUNICATIONS public limited company (United Kingdom)
Inventor
  • Burton, Fraser
  • Menchetti, Marco
  • Bussey, Liam
  • Lees, Amelia

Abstract

This invention provides an electromagnetic field detector, a system comprising the electromagnetic field detector, and a method of operating an electromagnetic field detector, the electromagnetic field detector comprising a first optical signal interface configured to receive, from one or more remote optical sources, a first optical signal; an electromagnetic field transmitter configured to transmit a local oscillator electromagnetic field generated from the first optical signal, the electromagnetic field transmitter comprising: a photocurrent generator configured to generate a photocurrent from the first optical signal; and an antenna interface configured to supply the photocurrent to an antenna to transmit the local oscillator electromagnetic field; a second optical signal interface configured to receive, from the one or more remote optical sources, a probe optical signal and a coupling optical signal; and a transmission medium configured to be excited by the probe optical signal and further excited by the coupling optical signal, wherein the probe optical signal has a probe frequency set to excite electrons of the transmission medium to a first excited state and the coupling optical signal has a coupling frequency set to excite electrons of the transmission medium to a predetermined Rydberg state so as to induce an Electromagnetic Induced Transparency, EIT, effect, wherein the transmission medium is further configured to receive a phase-modulated electromagnetic field from a remote transmitter and the local oscillator electromagnetic field such that the combination of the phase-modulated electromagnetic field and the local oscillator electromagnetic field causes a change in the probe optical signal from which a phase state of the phase-modulated electromagnetic field can be detected.

IPC Classes  ?

  • G01R 29/08 - Measuring electromagnetic field characteristics
  • H04B 10/2575 - Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier

83.

OPTICAL ALIGNMENT SYSTEM

      
Application Number EP2025052138
Publication Number 2025/168395
Status In Force
Filing Date 2025-01-28
Publication Date 2025-08-14
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Lord, Andrew
  • White, Catherine

Abstract

There is herein described an alignment system for aligning an optical transmitter and optical receiver for transmission of an optical beam therebetween over free space, the alignment system comprising a plurality of sub-receivers and an adjustment system, where the plurality of sub-receivers are arranged to receive the optical beam from the optical receiver and are spaced apart in a direction perpendicular to the longitudinal axis of the optical beam, where the plurality of sub-receivers are adapted to provide an indication of a characteristic of the optical beam received at the plurality of sub-receivers to the adjustment system, where the adjustment system is adapted to use the indication to determine an adjustment to the relative orientations of the optical receiver and the optical transmitter and where the adjustment system is adapted to output the determined adjustment.

IPC Classes  ?

  • H04B 10/112 - Line-of-sight transmission over an extended range
  • G02B 6/02 - Optical fibres with cladding

84.

MULTICAST JOIN METHOD

      
Application Number EP2024085048
Publication Number 2025/162630
Status In Force
Filing Date 2024-12-06
Publication Date 2025-08-07
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Turnbull, Rory
  • Nilsson, Michael
  • Stevens, Timothy
  • Appleby, Stephen

Abstract

Described are methods of managing content delivery to a client device, where a proxy server services unicast requests for content segments by joining a multicast channel carrying those content segments. An alternative content segment is provided to the proxy server in advance of the proxy server joining the multicast channel. Then, should a requested content segment not have been received over multicast and stored at the proxy server, for example when first joining a multicast channel, the proxy server can respond to the request with the stored alternative content segment. The alternative content segment can carry, for example, a simple video clip or static image such as a broadcaster logo or programme details, associated with the multicast channel. Thus, there is no need for the proxy server to make a unicast request for any content segment it has yet to receive over the appropriate multicast channel.

IPC Classes  ?

  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 65/75 - Media network packet handling
  • H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics

85.

A METHOD IN A WIRELESS TELECOMMUNICATIONS NETWORK

      
Application Number EP2024085781
Publication Number 2025/162636
Status In Force
Filing Date 2024-12-11
Publication Date 2025-08-07
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Arum, Steve
  • Mackenzie, Richard

Abstract

This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: one or more gateways; a plurality of Reconfigurable Intelligent Surfaces, RISs; and a plurality of non-terrestrial access points; the method comprising the steps of: detecting a trigger to develop a connection in the wireless telecommunications network; obtaining data identifying a requirement for a performance parameter of the connection; obtaining data for a first candidate connection comprising at least two inter-non-terrestrial access point connections via a respective RIS of the plurality of RIS, the data identifying a first value of the performance parameter for the first candidate connection; comparing the first value of the performance parameter for the first candidate connection to the requirement for the performance parameter of the connection; and based on the comparison, developing the connection.

IPC Classes  ?

86.

A METHOD IN A WIRELESS TELECOMMUNICATIONS NETWORK

      
Application Number EP2024085049
Publication Number 2025/162631
Status In Force
Filing Date 2024-12-06
Publication Date 2025-08-07
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Arum, Steve
  • Mackenzie, Richard

Abstract

This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: a plurality of Reconfigurable Intelligent Surfaces, RISs, each RIS comprising a plurality of reflecting elements, each reflecting element of the plurality of reflecting elements of each RIS being a member of either a first set of utilised reflecting elements that are configured for reflecting a signal in the wireless telecommunications network or a second set of available reflecting elements; a plurality of non-terrestrial access points, wherein a first inter-non-terrestrial access point connection is communicated via a first RIS of the plurality of RISs; and one or more gateways configured to provide a feeder link to at least one non-terrestrial access point of the plurality of non-terrestrial access points; the method comprising the steps of: determining a subarray availability of the first RIS as a function of a number of reflecting elements in a second set of available reflecting elements of the first RIS; determining a subarray availability of a second RIS of the plurality of RISs as a function of a number of reflecting elements in a second set of available reflecting elements of the second RIS; and reconfiguring the wireless telecommunications network based on the determined subarray availabilities of the first and second RIS.

IPC Classes  ?

87.

FIBRE OPTIC TELECOMMUNICATIONS NETWORK AND A METHOD OF OPERATING THE SAME

      
Application Number EP2024086274
Publication Number 2025/162639
Status In Force
Filing Date 2024-12-13
Publication Date 2025-08-07
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Horsley, Ian
  • Rafel Porti, Albert
  • Reid, Andrew

Abstract

A method (400) of operating a fibre optic telecommunications network (100), said network comprising a/an: Optical Line Terminal (110), OLT, configured for Time-Division Multiplexing, TDM, communication; optical switch (120), connected to the OLT and arranged at a junction of a first branch (140-2-1) and a second branch (140-2-2), different to the first branch, of the fibre optic telecommunications network, and configured to switch between, at least, a: first state (260-1), in which the OLT is connected, via the optical switch, to the first branch instead of the second branch; and second state (260-2), in which the OLT is connected, via the optical switch, to the second branch instead of the first branch; first ONU set (130-1), comprising at least one ONU, connected to the optical switch via the first branch; second ONU set (130-2), comprising at least one ONU, connected to the optical switch via the second branch; scheduler (220) for scheduling switching of the optical switch between the first state and the second state according to a schedule, wherein said scheduler is co-ordinated with a TDM timetable for communication between the OLT and each of the first ONU set and the second ONU set using TDM; the method comprising the steps of: providing the optical switch in one of the first state and the second state, thereby facilitating communication between the OLT and the first ONU set or the second ONU set, respectively (410); subsequently determining, using the scheduler, an upcoming time to switch the optical switch from the state in which said switch is provided to the other one of the first state and second state, so as to cause routing between the OLT and the other of the first ONU set and the second ONU set in coordination with the TDM timetable (420); and instructing, at the determined upcoming time, and subsequently causing, the optical switch to switch to said other state (440).

IPC Classes  ?

  • H04Q 11/00 - Selecting arrangements for multiplex systems

88.

A METHOD AND SYSTEM FOR CONTROLLING A COMPUTING SYSTEM

      
Application Number 18857581
Status Pending
Filing Date 2023-04-13
First Publication Date 2025-07-31
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Di Cairano-Gilfedder, Carla
  • Conway, Anthony

Abstract

A digital twin system is provided for controlling a computing system including multiple hardware and software entities. The digital twin system comprises: a digital twin comprising a virtual model of the computing system including the multiple hardware and software entities and their environment. The virtual model incorporates three-dimensional physical dimensions of the hardware, the virtual model being configured to emulate the behaviour of the computing system. The digital twin system further comprises a communications interface for performing bi-directional communications with the computing system. The communications include receipt of real-time information regarding performance of the computing system and sensed conditions of the computing system and its environment. The digital twin system also comprises a machine learning system trained on (i) historical and real-time performance data; and (ii) historical and real-time sensed data of the computing system and its environment. The digital twin system further comprises an orchestrator configured to use the digital twin and the trained machine learning system in conjunction with the received real-time performance data and sensed data for the computing system and its environment to determine at least one action for the computing system and its environment that supports one or more selected system management objectives. The orchestrator is further configured to transmit a command over the bi-directional link to the computing system to perform the at least one action.

IPC Classes  ?

  • H04L 41/14 - Network analysis or design
  • H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
  • H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

89.

REMOVING A CORE OF AN ARMOURED CABLE

      
Application Number EP2024085782
Publication Number 2025/149282
Status In Force
Filing Date 2024-12-11
Publication Date 2025-07-17
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Novakovic, Violeta
  • Morsman, Trevor
  • Smith, Mark

Abstract

A method of removing a core of an armoured cable is described. Within a footway box, a cable is located entering the footway box from an end user premises, the cable having a core surrounded by armouring wires, the armouring wires held between an inner sheath and an outer sheath of the cable. An exposed end of the core is attached to a winch in the footway box by threading the exposed end of the core through an aperture in a body of the winch and attaching the exposed end of the core to a spool of the winch. The aperture being sized and shaped such that the outer sheath and armouring wires abut or are held by the body of the winch in use, when the spool is rotated, to pull the core from the end user premises onto the spool thereby leaving the outer sheath, armouring wires and inner sheath in situ.

IPC Classes  ?

  • H01B 15/00 - Apparatus or processes for salvaging material from cables
  • B23D 25/14 - Machines or arrangements for shearing stock while the latter is travelling otherwise than in the direction of the cut without regard to the exact dimensions of the resulting material, e.g. for cutting-up scrap
  • G02B 6/50 - Underground or underwater installationInstallation through tubing, conduits or ducts
  • H02G 1/12 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for removing insulation or armouring from cables, e.g. from the end thereof

90.

CONTENT DELIVERY

      
Application Number 18850779
Status Pending
Filing Date 2023-03-14
First Publication Date 2025-07-10
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Nilsson, Michael
  • Appleby, Stephen
  • Turnbull, Rory
  • Stevens, Timothy

Abstract

The present invention provides a method of controlling the delivery rate of content to a client device to influence the quality level at which the client device requests subsequent content segments. The aim is to influence the client device so that it requests content segments at a consistent adaptive bit rate (ABR) level, where that level is one at which many client devices are requesting content segments. The result is that requests are more concentrated around a subset of the available ABR levels. This enables a more efficient and widespread use of any subsequent multicast.

IPC Classes  ?

  • H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
  • H04L 65/752 - Media network packet handling adapting media to network capabilities

91.

ANOMALY DETECTION

      
Application Number 18849999
Status Pending
Filing Date 2023-03-03
First Publication Date 2025-07-03
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Georgalas, Nektarios
  • Wallwork, Matthew
  • Cristina, Claudia

Abstract

A computer implemented method of detecting anomalous behaviour within an environment is provided. The environment is monitored by a plurality of sensors providing a plurality of data feeds. Each data feed provides a respective data series representing a respective physical property of the environment over time. The method of detects an occurrence of an event within the environment and identifies a type of that event. The method identifies a plurality of normally correlated data feeds from the plurality of data feeds for the type of the event. The method determines a respective degree of correlation between the respective data series provided by each of the normally correlated data feeds for the occurrence of the event. The method determines a classification of the behaviour within the environment based on the determined degree(s) of correlation, the classification indicating whether the behaviour is normal or anomalous for the environment. Also provided is a method of training an anomaly detector for detecting anomalous behaviour within such an environment, as well as associated computer systems, computer programs, computer-readable data carriers and data carrier signals for performing such methods.

IPC Classes  ?

  • G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons

92.

MULTIPLE ACCESS SCHEME PROVISIONING

      
Application Number 18850344
Status Pending
Filing Date 2023-02-10
First Publication Date 2025-07-03
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor Mehran, Farhad

Abstract

Examples exploit the processing capabilities of the available access points in a wireless telecommunications network operating in dual connectivity operation to enhance the data rate and fairness among the users. The wireless telecommunications network may include a first access point, or master node, connected to a plurality of further access points, or secondary nodes. The master node discovers which of the secondary access nodes has the processing capabilities and available processing capacity to handle NOMA transmissions. The master node can then coordinate the connection of a selected group of users to one of the secondary nodes that can support NOMA. The processing capabilities and available processing capacity to handle NOMA transmissions can be communicated by the secondary nodes to the master node actively, for example in a periodic manner, or reactively, for example as a result of a request for such information from the master node.

IPC Classes  ?

  • H04W 76/15 - Setup of multiple wireless link connections
  • H04L 5/00 - Arrangements affording multiple use of the transmission path

93.

MULTIFACTOR CONTINUOUS AUTHENTICATION

      
Application Number EP2024085242
Publication Number 2025/140840
Status In Force
Filing Date 2024-12-09
Publication Date 2025-07-03
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Kalidass, Sri Harish
  • Roscoe, Jonathan
  • Selvam, Muthupavithran

Abstract

A system to verify the correctness of equipment installation configured to perform the steps of: accessing a digital model of the equipment; receiving a representation of the equipment indicating a configuration of the equipment, Accessing installation-specific metadata associated with the installation of the equipment; Predicting at least one behaviour of the equipment based on metadata associated with installation of the equipment; Accessing service information comprising at least one measured behaviour of the equipment; Comparing the representation with the model to determine a first degree of conformity of the equipment with the model of the equipment; if the first degree of conformity is within a first threshold degree of conformity, comparing the at least one predicted behaviour with the at least one measured behaviour to determine a second degree of conformity of the equipment with the service information; and if the second degree of conformity is within a threshold second degree of conformity, verifying to an operator that the equipment is correctly installed.

IPC Classes  ?

94.

DETERMINING A REPRODUCTION NUMBER FOR A MALWARE

      
Application Number 18844731
Status Pending
Filing Date 2023-02-13
First Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Beard, Alfie
  • Bowman, Tom

Abstract

A computer-implemented method of simulating a propagation of a malware through a set of computer systems, the method comprising: identifying a plurality of first simulated computer systems infected with a simulated malware; for each of the first simulated computer systems, infecting a number of neighbouring second simulated computer systems, the number being zero or an integer; and determining a value of a reproduction number, R0, based on the total number of second simulated computer systems and the number of first simulated computer systems.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

95.

DATA TRANSMISSION

      
Application Number 18851028
Status Pending
Filing Date 2023-02-07
First Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • White, Catherine
  • Wallwork, Matthew

Abstract

Computer implemented methods. systems and programs of transmitting data from a source node to a destination node through a network via a plurality of intermediate nodes are provided. The method splits the data into a plurality of shares using a secret sharing algorithm. The method determines a respective route through the network to the destination node for each of the plurality of shares. Each route comprises a plurality of intermediate nodes via which that share is to be transmitted. At least two of the routes are different from each other. At least a first intermediate node of each route is common to the other routes. The method constructs a plurality of datagrams for conveying the plurality of shares through the network along their respective routes. Each datagram is intended for processing by a respective intermediate node and is encrypted with a key associated with that intermediate node. Each datagram comprises a payload and routing information for instructing the respective intermediate node to forward data contained in the payload for conveying one or more of the shares along their respective routes towards the destination node. The portion of the respective routes of the one or more shares prior to the respective intermediate node are common to each other. Each datagram other than an initial datagram intended for the first intermediate node is encapsulated within the payload of a preceding datagram intended for a preceding intermediate node on the respective routes of the one or more shares. The payload of at least one of the datagrams comprises a plurality of encapsulated datagrams. The routing information of the at least one of the datagrams instructs the respective intermediate node to transmit the plurality of encapsulated datagrams on to different respective intermediate nodes in the network. The method transmits the initial datagram to the first intermediate node.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/40 - Network security protocols

96.

ENCLOSURE FOR FIBRE OPTIC CABLES AND A METHOD OF USING THE SAME

      
Application Number EP2024081693
Publication Number 2025/131418
Status In Force
Filing Date 2024-11-08
Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Horsley, Ian
  • Bally, Stephanie

Abstract

An enclosure (120) for routing a fibre optic cable (190) for a telecommunications network (100), the enclosure comprising a/an: routing member (310) for receiving and routing a fibre optic cable (190) within the enclosure; securing structure (180) for securing the fibre optic cable within the routing member; grating (240) for generating a Mechanically Induced Filter, MIF, in the fibre optic cable; urging member (180) configured to urge the grating against the fibre optic cable thereby to generate the MIF within said fibre optic cable; translation mechanism (230) configured to translate the urging member and the securing structure between: a first arrangement, in which the grating is urged against the fibre optic cable when said fibre optic cable is routed in the routing member, and in which the securing structure secures the fibre optic cable; and a second arrangement, in which the grating is not urged against the fibre optic cable when said fibre optic cable is routed in the routing member, the MIF thereby being absent from the fibre optic cable (540-2), and the fibre optic cable is unsecured by the securing structure.

IPC Classes  ?

  • G02B 6/02 - Optical fibres with cladding
  • G02B 6/44 - Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
  • G01M 11/00 - Testing of optical apparatusTesting structures by optical methods not otherwise provided for
  • H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]

97.

A METHOD OF DEPLOYING AN OPTICAL FIBRE CABLE IN A TELECOMMUNICATIONS NETWORK

      
Application Number EP2024082212
Publication Number 2025/131446
Status In Force
Filing Date 2024-11-13
Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Novakovic, Violeta
  • Morsman, Trevor
  • Hubert, Malcolm

Abstract

This invention provides a method of deploying an optical fibre cable in a telecommunications network, the optical fibre cable being configured to connect a first optical fibre interface unit in the telecommunications network and a second optical fibre interface unit in a dwelling, the method comprising the steps of: positioning an optical fibre subduct connector on an optical fibre duct so as to align an aperture in the optical fibre subduct connector with an aperture in the optical fibre duct; connecting an optical fibre subduct with an optical fibre subduct connection interface of the optical fibre subduct connector such that any overlap of the optical fibre subduct and optical fibre subduct connection interface extends up to and not exceeding the aperture of the optical fibre duct, the optical fibre subduct connection interface being configured to resist disconnection of the optical fibre subduct and optical fibre subduct connection interface, wherein the optical fibre subduct connection interface comprises a first section and a second section and the optical fibre subduct and the optical fibre subduct connection interface are connected such that, once the optical fibre subduct connector is positioned on the optical fibre duct, in the first section, the optical fibre subduct and optical fibre duct are parallel or substantially parallel and, in the second section, an angle between the optical fibre subduct and the optical fibre duct is less than 45 degrees; and deploying an optical fibre cable between the first optical fibre interface unit in the telecommunications network and the second optical fibre interface unit in the dwelling by routing the optical fibre cable through optical fibre duct, the optical fibre subduct connector, and the optical fibre subduct.

IPC Classes  ?

  • G02B 6/50 - Underground or underwater installationInstallation through tubing, conduits or ducts
  • G02B 6/44 - Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
  • G02B 6/46 - Processes or apparatus adapted for installing optical fibres or optical cables

98.

ACTIVE QUEUE MANAGEMENT SYSTEM

      
Application Number EP2024082367
Publication Number 2025/131458
Status In Force
Filing Date 2024-11-14
Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Gunning, Paul
  • Rawlinson, John
  • Challinor, Simon

Abstract

There is herein described a method of active queue management for use in a telecommunications system comprising a Customer Premises Equipment (CPE) and a network access point, the network access point being adapted to transmit one or more data packets to the CPE, wherein the CPE comprises a plurality of packet queues, each of the plurality of packet queues being capable of holding data packets received from the network access point, the method comprising transmitting queue management information from the CPE to the network access point, where the queue management information enables the determination of a most suitable one of the plurality of packet queues for receiving a data packet, determining, using the transmitted queue management information, the most suitable one of the plurality of packet queues for receiving a data packet to be transmitted from the network access point to the CPE.

IPC Classes  ?

  • H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
  • H04L 47/30 - Flow controlCongestion control in combination with information about buffer occupancy at either end or at transit nodes
  • H04L 47/625 - Queue scheduling characterised by scheduling criteria for service slots or service orders
  • H04L 47/6295 - Queue scheduling characterised by scheduling criteria using multiple queues, one for each individual QoS, connection, flow or priority
  • H04L 47/70 - Admission controlResource allocation
  • H04L 49/9005 - Buffering arrangements using dynamic buffer space allocation

99.

ELECTRIC VEHICLES PLATFORM FOR NEW CHARGE INFRASTRUCTURE RISK, TACTICAL, AND OPERATIONAL PLANNING

      
Application Number EP2024082986
Publication Number 2025/131518
Status In Force
Filing Date 2024-11-20
Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Liret, Anne
  • Pena Rios, Anasol
  • El-Moussa, Fadi
  • Kern, Mathias
  • Chimatapu, Ravikiran

Abstract

A method of monitoring and managing a network of charger modules for electric vehicles, EVs, is provided. The method comprises receiving charger module network data regarding the location of a plurality of charger modules in the network of charger modules, and receiving EV data from a plurality of EVs currently travelling in the region of the network of charger modules. The method further comprises generating a digital twin of the network of charger modules and EVs based on the charger module network data and the EV data, and monitoring, by the digital twin, the utilisation of the plurality of charger modules by the plurality of EVs. The method further comprises generating one or more predictions based on the monitoring of the utilisation of the plurality of charger modules by the plurality of EVs, and simulating, by the digital twin, the network of charger modules in one or more scenarios based on the generated one or more predictions. A report is then generated based on the simulations and outputted to a management entity.

IPC Classes  ?

  • B60L 53/63 - Monitoring or controlling charging stations in response to network capacity
  • B60L 53/67 - Controlling two or more charging stations
  • B60L 53/68 - Off-site monitoring or control, e.g. remote control

100.

RESOURCE MANAGEMENT IN A MACHINE LEARNING ENVIRONMENT

      
Application Number EP2024083425
Publication Number 2025/131556
Status In Force
Filing Date 2024-11-25
Publication Date 2025-06-26
Owner BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
  • Khan, Kashaf
  • Burns, Julian
  • White, Melvyn

Abstract

A system for managing resources in a machine learning environment comprising one or more machine learning applications, the system comprising a machine learning application API; a workflow module of the machine learning environment; a generative machine learning model, a first resource controller configured to intercept traffic going to and from the workflow module and configured to perform flow control operations on the intercepted traffic in accordance with a first flow configuration; a second resource controller configured to intercept traffic going to and from the generative machine learning model and configured to perform flow control operations on the intercepted traffic in accordance with a second flow configuration; and a controller manager in communication with the first resource controller and the second resource controller, the controller manager configured to determine the first flow configuration for the first resource controller and the second flow configuration for the second resource controller.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  1     2     3     ...     27        Next Page