BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khanam, Zeba
Hercock, Robert
Abstract
A computer-implemented method of clustering a plurality of vectors, the computer- implemented method comprising: sorting the plurality of vectors by cosine distance from an origin vector to generate an ordered circular list; and dividing the ordered circular list into a plurality of ordered list fragments, each ordered list fragment consisting of one or more vectors, thereby generating a solution in which the one or more vectors constituting each of the plurality of ordered list fragments are assigned to a respective one of a corresponding plurality of vector clusters.
H04L 41/08 - Configuration management of networks or network elements
G06F 18/23211 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with adaptive number of clusters
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kalidass, Sri Harish
Zia, Muhammad Fahad
El-Moussa, Fadi
Abstract
A computer-implemented method of operating a cyber-attack detection machine learning, 'ML', model, the computer-implemented method comprising: obtaining one or more detections of cyber-attacks output from the ML model, each such detection: being based on an input network metadata record, and having an associated confidence level; determining that one or more of the detections are associated with confidence levels below a predetermined confidence threshold; obtaining a network metadata feature set characteristic of each of one or more known categories of cyber-attack; determining that one of the detections associated with confidence levels below the predetermined confidence threshold was based on an input network metadata record whose features correspond to the network metadata feature set characteristic of one of the known categories of cyber-attack; labelling that input network metadata record as a new variant of that known category of cyber-attack; and using that labelled input network metadata record as training data to retrain the ML model.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kalidass, Sri Harish
Zia, Muhammad Fahad
El-Moussa, Fadi
Abstract
A computer-implemented method of generating training data for a cyber-attack detection machine learning, 'ML', model, the computer-implemented method comprising: obtaining a network metadata feature set characteristic of each of one or more known categories of cyber-attack; and generating predicted network metadata representing a plurality of predicted variants of each of the one or more known categories of cyber-attack, based on the respective network metadata feature set.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sun, Qiushuo
Singh, Alok
Gilks, Daniel
Abstract
An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) from a source (175); and a plurality of waveguides (105) for the RAEM-FD, wherein each of the plurality of waveguides is: configured to permit propagation of the EM field therethrough to the RAEM-FD; arranged around the RAEM-FD; and orientated towards a different direction.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sun, Qiushuo
Gilks, Daniel
Singh, Alok
Abstract
An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) from a source (175); reorientable waveguide (105) configured to permit propagation of the EM field therethrough; and reorientation mechanism (180) engaged to the reorientable waveguide and configured to reorientate the waveguide between a/an: aligned position (240-1), in which the reorientable waveguide is aligned between the source and the RAEM-FD thereby to permit propagation of the EM field to the RAEM-FD; and misaligned position (240-2) in which the reorientable waveguide is misaligned with the source and the RAEM-FD.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khanam, Zeba
Hercock, Robert
Abstract
A computer-implemented method of iteratively clustering a plurality of vectors, the computer-implemented method comprising generating a candidate solution based on a current solution by reassigning an outermost vector of a selected cluster to a cluster of a plurality of vector clusters containing a vector of the plurality of vector clusters other than the selected cluster with the shortest distance from that outermost vector.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Wiseman, Richard
Neild, Ian
Abstract
A computer-implemented method of navigating a vehicle on a journey from a start location to an end location is provided. The method receives a plurality of measurements of a property of a positioning signal within a geographical region to be traversed by the vehicle during the journey. The method generates one or more predictions of the property of the positioning signal within the geographical region based on at least some of the plurality of measurements. Each prediction indicates a predicted value of the property of the positioning signal at a respective location within the geographical region at a time that the journey is to take place. The method determines, based on the one or more predictions, at least one location within the geographical region at which the positioning signal is predicted to be lost during the journey. The method prevents a loss of the positioning signal by causing the vehicle to avoid the at least one location.
G01S 19/39 - Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Morsman, Adam
Abstract
There is herein described, a computer-implemented method for causing an action to be performed in relation to a device external to the computer, the method comprising periodically scanning a database to obtain timing information, from which a date and/or time at which the action is to be performed is derivable, at the date and/or time at which the action is to be performed, obtaining (i) an identifier, from which an identity of the device is derivable; and (ii) action information, from which an action that is to be performed in relation to the device is derivable; and using the obtained identifier and action information to cause the action to be performed in relation to the device.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Zia, Syed Muhammad Unsub
Memon, Jamshed
Abu-Tair, Mamun
Rafferty, Joseph
Georgalas, Nektarios
Abstract
An intrusion prevention system, computer-implemented method, computer system and computer program for protecting a network are provided. The system comprises one or more intrusion detection systems. The system further comprises a packet analyser for routing packets within the network that are received from another work. The packet analyser is configured to: receive a packet destined for a computer system within the network; extract one or more features relating to the packet; use a classification model to determine whether the packet is malicious based on the extracted features; prevent delivery of the packet to the computer system in response to determining that the packet is malicious; and deliver the packet to at least one of the intrusion detection systems in the absence of a determination that the packet is malicious. The one or more intrusion detection systems are configured to provide a notification to the packet analyser of any packets that they determine to be malicious. The packet analyser is further configured to train the classification model based on the notification from the one or more intrusion detection systems.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Zhao, Zi-Chuan
Pena-Rios, Anasol
Clark, Adrian
Conway, Anthony
Abstract
A computer-implemented method for 3D reconstruction of a target is provided, comprising obtaining an initial global reconstruction of the target in a 3D space, inferred by a global machine learning model; providing, to a user, an initial visualisation of the target based on the reconstruction; receiving, from the user, at least one indication of at least one point of interest in the visualisation; resampling at least one first subsection of the target based on the at least one point of interest to obtain local data, wherein the local data is associated with the subsection based on spatial information that associates the local data with a point in 3D space; inputting the resampled local data and spatial information into a local feature machine learning model to obtain at least one 3D reconstruction of the target, wherein the local feature machine learning model has been trained to output a target reconstruction from local data of resampled subsections, and wherein the 3D coordinate system of the local 3D reconstruction aligns with the global 3D reconstruction; and merging the global 3D reconstruction with the local 3D reconstruction. A corresponding computer system and computer readable medium may also be provided.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Farrow, Paul
Roper, Ivan
Abstract
Described are methods of delivering a sequence of content segments from a content server to a client device in a server push system, where content segments comprise a first (e.g. header) component and a second (e.g. content payload) component. Where possible, a multicast server is used to deliver at least some of these segments (the content payload components) over a multicast channel, which can be received by edge servers. A unicast root proxy receives the sequence of content segments pushed by the content server to a client device over unicast, and determines whether any given segment has been made available to the edge server over multicast. If not, then the unicast root proxy can transmit the entire content segment over unicast to the edge server, which transmits it onto the client device. If the edge server does have the content segment (the payload component), then the unicast root proxy can send only the header component to the edge server over unicast. The edge server can regenerate the sequence of content segments using the data received over unicast and data received over multicast, and send the regenerated sequence of content segments onto the client device over unicast.
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
H04W 4/06 - Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]Services to user groupsOne-way selective calling services
H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Parkin, Neil
Abstract
There is herein described a method of acoustic sensing, the method comprising performing a preliminary process, the preliminary process comprising determining a round trip duration of a preliminary optical pulse that is transmitted into a head end of an optical fibre, is scattered at a remote end of the fibre and then returns to the head end and using the determined round trip duration to determine a maximum pulse repetition frequency, performing a sensing process comprising transmitting a plurality of optical sensing pulses into the head end of the optical fibre at a frequency that does not exceed the determined maximum pulse repetition frequency and detecting the transmitted plurality of optical sensing pulses after having been scattered by the optical fibre, wherein the maximum pulse repetition frequency corresponds to a frequency at which each of the plurality of optical sensing pulses returns to the head end of the optical fibre at the same time as its immediately-subsequent one of the plurality of optical sensing pulses is transmitted into the head end of the optical fibre.
G01H 9/00 - Measuring mechanical vibrations or ultrasonic, sonic or infrasonic waves by using radiation-sensitive means, e.g. optical means
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Dai, Linglong
Su, Ruochen
Tan, Jingbo
Hao, Mo
Mackenzie, Richard
Abstract
A reflective surface for directing wireless communications signals that includes plurality of independently reconfigurable elements disposed irregularly on the surface is disclosed. A method of controlling a communication channel of a wireless communication system that includes the reflective surface having an irregular element arrangement is also disclosed.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04B 7/0456 - Selection of precoding matrices or codebooks, e.g. using matrices for antenna weighting
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Pena Rios, Anasol
Leon Garza, Hugo
Hagras, Hani
Abstract
A computer-implemented method for providing real-time feedback to a user performing a task, the method comprising: receiving hand-tracking data of a user performing a task in an environment, wherein the user's hand interacts with at least one object; hierarchically classifying, using a fuzzy logic rule-based system, at least one hand gesture and/or hand position within a predefined area of the environment; based on the classified at least one hand gesture and/or hand position, determining feedback for transmission to the user.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Winter, Samuel
Gilks, Daniel
Mosley, Peter
Jones, Kristina
Abstract
This invention provides a vapour containment structure comprising: a first vapour containment structure segment; a second vapour containment structure segment; a first connector comprising: a first portion defining an interior passageway extending between a first interface and a second interface, wherein the first interface of the first portion of the first connector is configured to connect with the first vapour containment structure segment and the second interface is configured to connect with the second vapour containment structure segment, wherein an optical path passes from the first vapour containment structure segment to the second vapour containment structure segment via the interior passageway of the first portion of the first connector, and a second portion defining an interior passageway, the interior passageway of the second portion of the first connector being connected to the interior passageway of the first portion of the first connector at a junction between the first and second interfaces of the first portion of the first connector, wherein a major axis of the first portion of the first connector is offset to a major axis of the second portion of the first connector; and a first vapour reservoir connected to the first portion of the first connector via the second portion of the first connector such that the first vapour reservoir is in fluidic communication with the first and a second vapour containment structure segments via the interior passageway of the first portion of the first connector and the interior passageway of the second portion of the first connector.
G01R 33/26 - Arrangements or instruments for measuring magnetic variables involving magnetic resonance for measuring direction or magnitude of magnetic fields or magnetic flux using optical pumping
G02B 6/032 - Optical fibres with cladding with non-solid core or cladding
H03L 7/26 - Automatic control of frequency or phaseSynchronisation using energy levels of molecules, atoms, or subatomic particles as a frequency reference
G01N 21/31 - Investigating relative effect of material at wavelengths characteristic of specific elements or molecules, e.g. atomic absorption spectrometry
G02B 6/10 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type
H01S 3/30 - Lasers, i.e. devices using stimulated emission of electromagnetic radiation in the infrared, visible or ultraviolet wave range using scattering effects, e.g. stimulated Brillouin or Raman effects
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Lord, Andrew
Abstract
There is herein disclosed an apparatus for performing quantum key distribution, the apparatus comprising a plurality of connected functional components which, in use, co-operate to perform quantum key distribution, wherein one or more of the plurality of functional components is provisioned in a module, the module being relocatable relative to the remainder of the plurality of functional components.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Menchetti, Marco
Bussey, Liam
Burton, Fraser
Abstract
This invention provides a network node comprising: an optical fibre interface configured to receive, from one or more remote optical sources, a first optical signal, a second optical signal and a third optical signal, wherein the first, second and third optical signals each have a respective wavelength within an optical fibre transmission band being one of the O-band, E-band, S-band, C-band, L-band, and U/XL-band; one or more wavelength converters configured to convert the wavelength of one or more of the first optical signal, second optical signal and third optical signal; and a Rydberg-atom based transmission medium configured to be excited by the first optical signal, second optical signal and third optical signal, following wavelength conversion of one or more of the first optical signal, second optical signal and third optical signal, such that electrons of the Rydberg-atom based transmission medium are excited to a predetermined Rydberg state.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Lees, Amelia
Gilks, Daniel
Abstract
This invention provides a Rydberg-atom based electromagnetic field detector array comprising a plurality of Rydberg-atom based electromagnetic field detectors, wherein each Rydberg-atom based electromagnetic field detector is divided into a plurality of units, each unit of the plurality of units being either: a variable transparency unit configured to vary its transparency by the Electromagnetically Induced Transparency, EIT, effect and further vary its transparency in response to an incident electromagnetic field, or a separator unit, wherein a sequence of one or more variable transparency units and one or more separator units of the plurality of units for a Rydberg-atom based electromagnetic field detector uniquely identifies that Rydberg-atom based electromagnetic field detector in the Rydberg-atom based electromagnetic field detector array.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Stevens, Timothy
Turnbull, Rory
Abstract
Described are improved methods of managing content delivery to a client device by a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, delivery of segments over multicast and managing the cache that stores received multicast segments need to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to optimise multicast delivery and associated cache management.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Rezaeifar, Zeinab
Cruciani, Federico
Nugent, Christopher
Sani, Sadiq
Beard, Alfie
Abstract
A computer-implemented method of protecting a network is provided. The method receives security alert data from one or more intrusion detection systems. The security alert data comprises a plurality of security alerts relating to the network. The method generates a plurality of similarity matrices from the security alert data. Each similarity matrix is generated using a different respective similarity function and indicates a respective similarity between each of the security alerts according to that similarity function. The method generates one or more attack graphs from the plurality of similarity matrices. Each attack graph represents a respective set of security alerts, wherein a similarity between each of the security alerts in the set, according to at least one of the similarity matrices, is above a predefined threshold. The method causes one or more predetermined actions to be taken with respect to the network to mitigate a respective attack represented by each of the attack graphs.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Di Cairano-Gilfedder, Carla
Conway, Anthony
Abstract
A method comprising the steps: (a) applying a first detector to equipment; (b) applying a second detector to at least one external element; (c) obtaining a performance measurement associated with the equipment at time of installation; (d) obtaining data associated with the environment in which the equipment is being installed; (e) obtaining historical fault data associated with the equipment and/or environment; (f) inputting, to a machine learning model, at least some of the data and/or information, obtained in steps (a)-(e); (g) outputting, from the machine learning model, a faulty installation likelihood predictor and, based on the faulty installation likelihood predictor, determining an overall confidence level for the installed equipment; (h) if the overall confidence level is below a predetermined threshold, recommending a corrective action; and (i) repeating steps (a), (b), (f), (g) and (h) until the overall confidence level is above a second predetermined threshold.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Di Cairano-Gilfedder, Carla
Conway, Anthony
Abstract
A method comprising: (a) obtaining a hierarchy of two or more devices in a network, wherein the hierarchy describes connectivity of the two or more devices and/or describes relationship between the two or more devices; (b) obtaining a first detector's output of each of the two or more devices at a time of installation; (c) obtaining a second detector's output of an external element of the two of more devices at the time of installation; (d) obtaining performance measurement(s) of each of the two or more devices at the time of installation; (e) obtaining environmental information of each of the two or more devices at the time and/or a location of installation; (f) obtaining historical fault data associated with the network, device(s) and/or environment; (g) obtaining network performance metrics associated with the network; (h) inputting, to a machine learning model, at least some of the data, metrics and/or information, obtained in steps (a)-(g); (i) outputting, from the machine learning model, a faulty installation likelihood predictor configured to apply an overall confidence level to the installed equipment; (j) if the overall confidence level is below a first predetermined threshold, recommending a corrective action until the overall confidence level is above a second predetermined threshold.
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/5009 - Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Winter, Samuel
Gilks, Daniel
Mosley, Peter
Jones, Kristina
Abstract
This invention provides a vapour containment structure, a system comprising the vapour containment structure, and a method of operating the system, the vapour containment structure comprising: an elongate section defining an interior passageway, the elongate section having a major axis; a first optical access window permitting passage of an optical path into the elongate section and along the interior passageway of the elongate section; and a first sealable section further defining an interior passageway, the first sealable section having a major axis, wherein: the interior passageway of the first sealable section comprises a port for receiving vapour, the interior passageway of the first sealable section joins the interior passageway of the elongate section permitting fluidic communication between the interior passageway of the first sealable section and the interior passageway of the elongate section, the major axis of the first sealable section is offset from the major axis of the elongate section, and the first sealable section comprises a sealing point along its length that, when sealed, prevents fluidic communication into the interior passageway of the first sealable section.
G01N 21/31 - Investigating relative effect of material at wavelengths characteristic of specific elements or molecules, e.g. atomic absorption spectrometry
G01N 21/41 - RefractivityPhase-affecting properties, e.g. optical path length
British Telecommunications Public Limited Company (United Kingdom)
Inventor
Lalovic, Milan
Kumar, Parveen
Abstract
A method (300) of operating a cellular telecommunications system (100), said system comprising User Equipment (105), UE, and a cellular private network (110-2), and the method comprising the steps of: storing, at the UE and at the private network, a: Static IDentifier, SID; and first Network IDentifier, NID, for uniquely identifying the private network to the UE, wherein the first NID comprises the SID; by the private network: broadcasting the first NID; modifying the first NID into a second, different, NID for uniquely identifying the private network (350), wherein the second NID is unfamiliar to the UE for the purposes of permitting the UE to request a connection to the private network on the basis of the second NID, and in which the second NID comprises: the SID, wherein the SID remains unchanged as between the first and second NIDs; and a Variable IDentifier, VID, consisting of at least one character that is different to a corresponding portion of the first NID; and subsequently broadcasting the second NID instead of the first NID, thereby instead to identify the private network using the second NID; by the UE: detecting the broadcast second NID (360); determining, using the SID, that the detected second NID comprises the SID (330-2); and requesting, in response to determining that the broadcast second NID comprises the SID, attachment to the private network using the SID, despite the second NID being unfamiliar to the UE (330-1).
KHALIFA UNIVERSITY OF SCIENCE AND TECHNOLOGY (United Arab Emirates)
BRITISH TELECOMMUNICATIONS PLC (United Kingdom)
EMIRATES TELECOMMUNICATIONS GROUP COMPANY PJSC (United Arab Emirates)
Inventor
Asal, Rasool
Yoo, Paul D.
Abstract
This invention relates to methods and systems for intrusion detection. An embodiment provides a system for detecting an attempted intrusion into a networked device, the system including: a sensor module arranged to read and monitor network traffic to and from the device and produce event data based on the network traffic; a detection module arranged to assess the event data using an anomaly-based classifier to classify the event as an attempted intrusion or not and to generate an alert if the event is classified as an attempted intrusion. The detection module is further arranged to: use an auto-encoder to process the event data to construct features in a latent representation; and determine features in the latent representation which deviate from a normal condition by more than a predetermined threshold. Processing of the intrusion detection may be distributed across networked devices to reduce the computational power required, making the methods and systems suited to use in IoT devices.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Willis, Peter
Veitch, Paul
Eardley, Philip
Abstract
A method (200) of operating a hybrid access telecommunications network (100), said telecommunications network comprising a client device (110) and a core network (130) connected therebetween via a plurality of network paths, each network path being established by a different access network (120), the method comprising the steps of: sending (210) and then receiving (220), over each of the plurality of network paths, a lightweight packet train between the client device and the core network; measuring dispersion of each received packet train; determining a relative network performance of the plurality of network paths using said measured dispersions (230); and configuring the telecommunications network so as to send subsequent network communications between the client device and the core network over the plurality of network paths in dependence on the determined relative network performance of the plurality of network paths (250).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Farrow, Paul
Nilsson, Michael
Appleby, Stephen
Abstract
Examples relate to a method of performing HTTP redirects. An intermediary node, such as a home gateway, receives an HTTP request from a client device for a resource located at a content server. The intermediary node, such as a gateway device. determines that the resource is one that could be provided instead by a different source from that of the content server. for example instead by a proxy that is be co-located with the intermediary node. The intermediary node then performs network address translation to modify the source port number associated with the HTTP request to one from a predetermined set of source port numbers, before forwarding the HTTP request with the modified source port number to the content server. The content server receives the request and determines that the source port of the HTTP request is one of the predetermined set of source port numbers. and thus sends an HTTP redirect message to the client device, wherein the HTTP redirect message is addressed to a domain associated with the proxy.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sun, Qiushuo
Singh, Alok
Gilks, Daniel
Abstract
An apparatus (100) for detecting an Electro-Magnetic, EM, field, said apparatus comprising a: Rydberg-Atom EM Field Detector (107), RAEM-FD, configured to detect an EM field (170) of a given frequency; and Multi-Plate WaveGuide (105), MPWG, comprising: at least three overlapping and non-intersecting plates (180); and at least two waveguides (190), each formed by an adjacent pair of the at least three plates, and wherein each waveguide has a separation distance suitable (ℎ) for supporting propagation of the EM field; and wherein the MPWG is arranged so as to direct the EM field towards the RAEM-FD.
G01R 29/08 - Measuring electromagnetic field characteristics
H04B 10/00 - Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Davidson, Zoe
Abstract
There is herein described a method of wavelength division multiplexed (WDM) transmission from a first optical terminal to a second optical terminal, the first optical terminal being communicatively connected to the second optical terminal by a free-space optical link, the method comprising, at the first optical terminal, receiving a correction signal from the second optical terminal over the free space optical link, transmitting one or more component frequencies of an optical frequency comb to the second optical terminal over the free space optical link using WDM, the one or more component frequencies of the optical frequency comb having been modulated with transmission data, where the optical frequency comb has been modified using a noise-correction factor derived from the correction signal
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Davidson, Zoe
Abstract
There is herein described a method of optical transmission from a first optical terminal to a second optical terminal, the first optical terminal being connected to the second optical terminal by a free-space optical link, the method comprising transmitting a first master optical frequency comb from the first optical terminal to the second optical terminal over the free-space optical link receiving at the first optical terminal, a return signal transmitted by the second optical terminal over the free-space optical link, the return signal being derived from the transmitted master optical frequency comb, transmitting a second master optical frequency comb from the first optical terminal to the second optical terminal over the free-space optical link, the second master optical frequency comb having been modified using the return signal.
H04B 10/079 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using measurements of the data signal
H04B 10/112 - Line-of-sight transmission over an extended range
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Davidson, Zoe
Abstract
There is herein described a method of wavelength division multiplexed (WDM) transmission from a first optical terminal to a second optical terminal, the first optical terminal being communicatively connected to the second optical terminal by a free-space optical link, the method comprising at the second optical terminal, receiving a correction signal transmitted by the first optical terminal over the free space link, generating a slave optical frequency comb using a noise-correction factor that has been determined using the correction signal, receiving one or more component frequencies of a master optical frequency comb from the first optical terminal over the free-space optical link using WDM, the one or more component frequencies of the master optical frequency comb having been modulated with first transmission data, extracting the transmission data from the received one or more component frequencies of the master optical frequency comb using the slave optical frequency comb.
H04B 10/077 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using an in-service signal using a supervisory or additional signal
H04B 10/112 - Line-of-sight transmission over an extended range
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Sajjad, Ali
El-Moussa, Fadi
Abstract
The present disclosure relates to securing computers against threats found in adjuncts to communications, such as links in and attachments to emails. It provides an internet gateway for connecting a computer network to the internet, the internet gateway comprising: a traffic monitor configured to monitor outgoing communications from the computer network; a scanner configured to scan incoming communications to the computer network in response to detection, by the traffic monitor, of communication to a suspicious destination; and a sandbox manager configured to, in response to identification, by the scanner, of a suspicious adjunct to an incoming communication, launch a sandbox container on the internet gateway and open the suspicious adjunct in that sandbox container, wherein the suspicious adjunct is only passed on to its recipient communication client if analysis of behaviour elicited by opening it in the sandbox container indicates that it is benign.
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Clarke, Freddy
Abstract
An apparatus for climbing a structure, the apparatus comprising a/an: ascent mechanism for elevating the apparatus up the structure; arresting mechanism for actuation between a: first position in which the arresting mechanism is engaged to the structure so as to impede descent of the apparatus; and second position in which the arresting mechanism is disengaged from the structure so as to allow ascent of the apparatus; urging mechanism for urging the arresting mechanism into the first position; retention mechanism configured to work against the urging mechanism and for retaining the arresting mechanism in the second position; power supply configured to power both the ascent mechanism and the retention mechanism, such that: when powered by the power supply and the ascent mechanism is activated, the retention mechanism is configured to retain the arresting mechanism in the second position and the ascent mechanism is operable to ascend the structure; and when unpowered, the retention mechanism is caused to release the arresting mechanism, thereby causing the urging mechanism to actuate the arresting mechanism into the first position, and the ascent mechanism is deactivated.
B62D 57/02 - Vehicles characterised by having other propulsion or other ground-engaging means than wheels or endless track, alone or in addition to wheels or endless track with ground-engaging propulsion means, e.g. walking members
34.
APPARATUS AND METHOD FOR FASTENING A GUIDE AT AN ELEVATED DEPLOYMENT SITE
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Morsman, Trevor
Novakovic, Violeta
Nottage, Martin
Abstract
This invention provides apparatus, and a method using the apparatus, for fastening a guide at an elevated deployment site. The apparatus comprises a guide housing configured as a receptacle to receive the guide therein, the guide housing comprises a closed rear face and an open front face, the closed rear face defining a plane; and an elongate element access configured to enable, when the guide is received in the guide housing: passage of a first section of an elongate element through a first opening of the passageway of the guide in a direction that intersects the plane of the closed rear face, and passage of a second section of the elongate element through a second opening of the passageway of the guide, wherein: the guide housing is attachable to a device having an elevatable component, and when a tensioning force is applied between the first and second sections of the elongate element, the first section of the elongate element experiences the tensioning force in the direction that intersects the plane of the closed rear face such that the elongate element exerts a force on the guide towards the closed rear face of the guide housing.
H02G 1/04 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for overhead lines or cables for mounting or stretching
H02G 7/05 - Suspension arrangements or devices for electric cables or lines
35.
A TELECOMMUNICATIONS NETWORK COMPRISING A RYDBERG-ATOM BASED EM SIGNAL RECEIVER
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Burton, Fraser
Gilks, Daniel
Abstract
This invention provides a telecommunications network comprising a device and at least one network node. The device comprises a Rydberg-atom based Electromagnetic (EM) signal receiver and an uplink telecommunications interface. The Rydberg-atom based EM signal receiver may be configured in a first Rydberg state for reception at a first frequency. The device may send a request for data via the uplink telecommunications interface. Responsive thereto, the at least one network node may send a first configuration signal at the first frequency to the Rydberg-atom based EM signal receiver, the configuration signal identifying configuration parameters for the Rydberg-atom based EM signal receiver so as to configure the Rydberg-atom based EM signal receiver to a second Rydberg state for reception at a reserved frequency such that a data signal at the reserved frequency causes a detectable change in the Rydberg-atom based EM signal receiver in the second Rydberg state.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
Cui, Zhan
Selvam, Muthupavithran
Abstract
An authentication method for authenticating a first device in a network of devices, the method comprising: performing an authentication procedure to attempt to authenticate the first device; determining that the authentication procedure has failed to authenticate the first device; determining that a second device is connected to the first device; requesting authentication of the first device by the second device; receiving an authentication response from the second device; and if the second device verifies the first device in response to receiving the authentication response, authenticating the first device.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Walczak, Nicholas
Abstract
A computer-implemented method comprising selecting a shortlist of candidate wireless network access nodes most likely to serve a target wireless communication device at a target location from a longlist of candidate wireless network access nodes, by iteratively: (i) moving a closest candidate wireless network access node, which is the candidate wireless network access node of the longlist closest to the target location, from the longlist to the shortlist; and (ii) deleting from the longlist any other candidate wireless network access nodes located within a shadow sector which encompasses that closest candidate wireless network access node, the shadow sector being a sector of a circle centred on the target location and encompassing all of the candidate wireless network access nodes on the longlist.
British Telecommunications Public Limited Company (United Kingdom)
Inventor
White, Catherine
Abstract
A method of obtaining a characteristic response from a communications network device in a communications network environment comprises accepting, at the communications network device, a challenge signal. Coupling all or part of the challenge signal or all or part of a transformation of the challenge signal in the form of radiation into one or more physical network channel media of the communication network. Allowing radiation to scatter between the physical communication channel media and a physically unclonable function PUF; and obtaining a response to the challenge by measuring scattered radiation from at least the PUF.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beddus, Simon
Mchugh, Daniel
Neild, Ian
Abstract
A computer-implemented method of configuring a network to provide network coverage for a mobile entity undertaking a mission is provided. The method comprises: receiving a mission definition file for the mobile entity, the mission definition file indicating a route along which the mobile entity will travel when undertaking the mission and a schedule for the mission; identifying a set of network nodes of the network for providing coverage to the mobile entity during the mission, each network node being associated with a respective portion of the route over which it is to provide network coverage to the mobile entity; determining a set of beam-forming configurations for one or more, or all, of the network nodes based on the mission definition file, each beam-forming configuration being associated with a respective network node and indicating a sequence of beam patterns for providing network coverage to the mobile entity as it travels along the respective portion of the route to be covered by that network node; and configuring the one or more, or all, of the network nodes according to the respective beam-forming configuration associated with that node to cause each network node to form a beam according to the sequence of beam patterns while the mobile entity travels along the respective portion of the route covered by that network node.
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Smith-Creasey, Max
Roscoe, Jonathan
Abstract
A computer-implemented method of obfuscating user sensor data is provided. The method comprises collecting sensor data from one or more sensors of one or more user devices, assessing the user's current behaviour from the sensor data, and determining that an obfuscation period is required. The method further comprises generating obfuscated sensor data for the one or more sensors, different to the collected sensor data, during the obfuscation period, and providing the obfuscated sensor data to the one or more programs on the one or more user devices. During the obfuscation period, the obfuscated sensor data is provided to the one or more programs on the one or more user devices includes one or both of a phased-in period at the beginning of the obfuscation period during which the obfuscated data initially matches the collected sensor data, and deviates from the collected sensor data, and a phased-return period at the end of the obfuscation period during which the obfuscated data returns to match the collected sensor data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Conway, Anthony
Di Cairano-Gilfedder, Carla
Abstract
An automated equipment installation verification system to automatically verify correctness of installation actions of an operative installing an item of equipment, the system comprising: a logic unit (804) that executes a rule engine to apply at least one rule to a measure of correctness of each of a plurality of physical acts performed by the operative according to a sequence of stepwise actions to be performed by the operative in the installation of the equipment to determine a degree of correctness of an installation of the equipment, each measure of correctness being determined by a classifier trained to determine a degree of correctness of a respective act based on sensor data corresponding to the act.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Poustie, Alistair
Abstract
A method (200) of operating a fibre optic telecommunications network (100), said network comprising a/an: spine fibre (120); pair of feeder fibres (150); retroreflector (160) arranged on each of the feeder fibres; optical coupler (140) configured to split the spine fibre into the pair of feeder fibres; optical source (110) connected to the spine fibre and configured to transmit a coherent optical signal through the spine fibre to each of the retroreflectors, via the optical coupler and the pair of feeder fibres, said optical signal having a coherence length equal to or greater than distances between: the optical coupler and each of the retroreflectors, along the respective feeder fibre; and each of the retroreflectors, along the pair of feeder fibres and via the optical coupler; and optical detector (170) connected to the spine fibre; the method comprising the steps of: transmitting, by the optical source, the optical signal to the retroreflectors (210); monitoring, at the optical detector, for a reflection of the transmitted optical signal from at least one of the retroreflectors (220); and in response to detecting that the reflection is: absent, determining that the spine fibre and/or both of the feeder fibres comprise a fault (260-2); present and not comprising an interference pattern, determining that one, but not the other, of the feeder fibres comprises a fault (260-1); and present and comprises an interference pattern, determining that the spine fibre and both the feeder fibres are intact (240-1).
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Conway, Anthony Stephen
Di Cairano-Gilfedder, Carla
San Cayo Villar, Nurla
Leon Garza, Hugo
Abstract
An automated equipment installation verification system to automatically verify correctness of each of a sequence of installation steps for the installation of an item of equipment, the system comprising: a data store that stores a digital model of the equipment at each step of a stepwise installation process; a logic unit that executes a comparator to compare a representation of the equipment indicating a configuration of the equipment with the digital model of the equipment at a current step in the stepwise installation process to generate a degree of conformity of the equipment at the current step; and a communications interface that communicates the degree of conformity to an operative.
G09B 25/02 - Models for purposes not provided for in group , e.g. full-sized devices for demonstration purposes of industrial processesModels for purposes not provided for in group , e.g. full-sized devices for demonstration purposes of machinery
British Telecommunications Public Limited Company (United Kingdom)
Inventor
White, Catherine
Abstract
A physically unclonable function (PUF) configured to receive a challenge signal and produce a response signal dependent on the challenge signal in response thereto; wherein: the PUF comprises a photonic crystal structure of plural dimensionality which is configured to: be illuminated by an optical input signal which is, or is derived from, the challenge signal; and responsive thereto, produce an optical output signal dependent on the optical input signal's interaction with the photonic crystal structure, wherein the response signal is, or is derived from, the optical output signal.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Craigie, Roland
Pilgrim, Luke
Trimby, Martin
Abstract
A computer implemented video image processing method is described, which comprises receiving a sequence of video images of a scene, and receiving one or more supplementary media items. Objects of interest within the received video images are identified, and a spatial portion of each received video image is selected to generate a reframed image. The reframing is carried out in dependence on a size and/or position for the received supplementary media items, and a size and/or position of at least one of the identified objects of interest. The spatial portion for each video image is selected to include one or more of the identified objects of interest in that video image. A display image is then rendered, the display image including the reframed image and the supplementary media items. In this way, the images in the video sequence are each reframed in a manner which preserves visibility of the objects of interest while permitting display of the supplementary media items.
H04N 21/431 - Generation of visual interfacesContent or additional data rendering
H04N 21/4402 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
H04N 21/44 - Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Bicknell, John
Masterson, Elena
Abstract
A computer implemented image processing method is described, which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion For one or more of the problem hues, the method defines an original colour group, the original colour group including the problem hue and related hues within a colour range of the problem hue. The method adjusts the hues of the original colour group(s) to generate a corresponding adjusted colour group. Then, when video images are received, the method replaces pixels within each video image having a hue corresponding to the original colour group(s) with the adjusted hue of the corresponding adjusted colour group(s). In this way, problem colours can be identified for a viewer with colour vision deficiency, and those particular colours (and variants thereof) can be adjusted to be more distinguishable for the colour deficient viewer, while leaving other colours unchanged to minimise the visual impact for other viewers.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleyby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segment received over multicast and if necessary, which stored segment to delete from the cache.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
Described are improved methods of managing the cache at a proxy in a hybrid unicast-multicast network. In such networks, multicast and unicast delivery are used, with a proxy inserted between a client and a content server. The proxy can join to a multicast channel, receive content segments over multicast, store these received segments in the cache, and provide these segments to the client when requested, packaged to look like unicast delivered segments. However, the cache that stores received multicast segments needs to be managed in a particular manner to optimise the use of the cache for satisfying unicast segment requests from the client. Described are various methods to manage the cache by determining when to store a segments received over multicast and if necessary, which stored segment to delete from the cache, taking into account the relative timings of when segments are received over multicast and when unicast requests are received.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Bowman, Tom
Beard, Alfie
Abstract
A computer-implemented method of providing video data from one or more mobile entities to an operator of the one or more mobile entities is provided. The method obtains video data comprising one or more video streams, each video stream being captured by a respective video camera attached to a respective mobile entity and comprising a plurality of sequentially ordered frames. The method processes each of the video streams using a machine learning model trained to identify one or more significant frames. The method initiates provision of at least some of the video data to the operator, the provision of the significant frames being prioritised over the provision of other frames of the video data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining an m x n matrix representation of an image sequence of one or more images to which the overlay graphic is to be applied; obtaining a q x r matrix representation of the overlay graphic, wherein q ≤ m, r ≤ n, and q.r < m.n; initiating a process to convolve the matrix representation of the image sequence with the matrix representation of the overlay graphic; and selecting the overlay graphic placement location in dependence on one or more convolution entries generated by that process.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Masterson, Elena
Bicknell, John
Abstract
A computer implemented image processing method is described which comprises identifying a degree of similarity between two or more hues as viewed by a colour vision deficient viewer, and determining the two or more hues to be problem hues if the degree of similarity satisfies a similarity criterion. For one or more of the problem hues, a colour group is defined, the colour group including the problem hue and related hues within a colour range of the problem hue. Subsequently, when video images are received, for one or more of the colour groups, one or more regions in a received image having a hue corresponding to that colour group are identified, and a pattern is applied to those regions. In this way, patterns are applied only to regions of the image having a hue within a defined colour group containing a problem hue. As a result, the part of the image formerly represented only by the problem colour is now represented by a pattern, which is easily discernible by a colour-blind viewer. Regions of the image which do not contain a problem hue are not patterned in this way, and so the majority of the image remains unchanged.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of selecting an overlay graphic placement location for display of an overlay graphic on a display device over an image sequence originating from a camera, the method comprising: obtaining overlay graphic data; obtaining object data indicating proximity of any objects in the image sequence to the camera at the time the image sequence was recorded; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, the placement scores being determined in dependence on proximity data derived from the object data; and selecting the overlay graphic placement location in dependence on the placement scores.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining object data indicating the location of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; initiating a process to determine a placement score, based on the overlay graphic data and the object data, for each of a plurality of candidate graphic locations, wherein the process is terminated when a placement score above a predetermined stopping threshold value is found; and selecting the overlay graphic placement location in dependence on the placement scores such that, when a placement score above the predetermined stopping threshold value is found, the current candidate graphic location is selected to be the overlay graphic placement location.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of selecting an overlay graphic placement location for display on a display device, the method comprising: obtaining overlay graphic data; obtaining initial object data indicating locations of any objects in an image sequence of one or more images to which the overlay graphic is to be applied; predicting subsequent object data in dependence on the initial object data; initiating a process to determine a placement score, based on the overlay graphic data and the initial and subsequent object data, for each of a plurality of candidate graphic locations; and selecting the overlay graphic placement location in dependence on the placement scores.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abstract
A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional role is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. Abductive role reasoning is used to improve accuracy of functional role assignments. 1 to be published with the abstract
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Noppen, Johannes
Johns, Jack
Ziolkowski, Adam
Abstract
A method reduces architectural coupling in source code. A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role. A plurality of concepts of a domain of the source code are available. An occurrence of the functional marker is identified in the graph representing the source code. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The assigned functional roles are matched to the concepts. An architectural coupling of different functional roles within a single node of the graph is identified using the assigned functional roles and matched concepts. The architectural coupling is reduced by transforming the source code.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Glynn, F. Joseph
Batagurki, Rajesh Vasant
Abstract
A method of operating a telephony system, the system including a client server to access a conferencing server for establishing a conference call, connect a plurality of terminals to the conferencing server; and communicate with a UE so as to receive a call from the UE;, the method including, by the client server, detecting initiation of a call between the UE and a given one of the plurality of terminals; identifying the UE and the given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to the non-conference call; receiving, from the conferencing server, access information for accessing the requested conference call; and distributing the access information to each of the plurality of terminals, thereby permitting any of the terminals to access the conference call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abstract
A computer implemented method is described comprising accessing source code from a legacy code base and computing a graph representing the source code with the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker is accessed comprising a plurality of interconnected nodes with each node representing a software component and having a known functional role. An occurrence of the functional marker in the graph representing the source code is identified. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. The functional rose is assigned to the source code from the legacy code base corresponding to the nodes with the assigned functional roles and triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Noppen, Johannes
Ziolkowski, Adam
Johns, Jack
Abstract
Source code from a legacy code base is represented using a graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A functional marker comprising a plurality of interconnected nodes, each node representing a software component and having a known functional role is accessed. An occurrence of the functional marker in the graph representing the source code is found. A functional role is assigned to nodes in the graph which are part of the occurrence by using the known functional roles of the functional marker. For the source code from the legacy code base corresponding to the nodes with the assigned functional roles, an automated tool triggers any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring. The functional marker is a design pattern which makes it possible to assign functional roles associated with the design pattern.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Noppen, Johannes
Abu-Tair, Mamun
Ali, Aftab
Mcclean, Sally
Ziolkowski, Adam
Johns, Jack
Abstract
An adaptive quality assessor assesses quality of source code, taking into account feedback from software engineers. A modification to source code of a software system is detected. A plurality of metrics are selected from source code metrics available for the source code, the selection being at least in response to feedback about the modification to the source code. A score is computed comprising a weighted combination of the selected plurality of metrics. An automated action on a consuming process is triggered in response to the computed score, such as to control integration of the modified source code into the software system or to prioritize tasks in a queue.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Johns, Jack
Noppen, Johannes
Ziolkowski, Adam
Abstract
A graph representing the source code is computed, the graph comprising a plurality of nodes connected by edges, each node representing a software component of the source code and each edge representing a relationship between software components. A domain model of a domain related to the legacy code base is computed, the domain model comprising a plurality of concepts and relationships between the concepts. A node of the graph matching one of the concepts is identified. A functional role of model is assigned to the identified node. The knowledge of the assigned functional role is used to trigger any of: migration, deployment as a microservice, deployment as a containerised service, deployment as a cloud-native application, maintenance, refactoring.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Glynn, F. Joseph
Batagurki, Rajesh
Abstract
A method (300, 400) of operating a telephony system (100), said system comprising a: client server (170), configured to: access a conferencing server (140) for establishing a conference call; connect a plurality of terminals (180) to the conferencing server; and communicate with a UE (160) so as to receive a call from the UE; the method comprising the steps of, by the client server: detecting initiation of a call between the UE and a given one of the plurality of terminals (320, 420); identifying the UE and said given terminal; assessing whether the detected call is a conference call or a non-conference call; in response to assessing that the call is a non-conference call: requesting, from the conferencing server, establishment of a conference call for the identified UE and the given terminal and corresponding to said non-conference call (330-2, 430); receiving, from the conferencing server, access information for accessing the requested conference call (340, 440); and distributing the access information to each of the plurality of terminals (360, 460), thereby permitting any of said terminals to access the conference call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Bayart, Damien
Free, Michael
Abstract
Various examples relate to a method for grounding responses from a Large Language Model (LLM). The LLM is prompted using a prompt that has been augmented using information retrieved from a knowledge base and a response is received from the LLM. Entities are extracted from the response and from the information retrieved from the knowledge base. A grounding service checks the response is grounded with respect to the knowledge base by checking the types and values of critical entities extracted from the response match the types and values of critical entities extracted from the information retrieved from the knowledge base.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Free, Michael
Bayart, Damien
Abstract
A prompt is received from an end user device, the prompt being for prompting a large language model, LLM. A RAG engine queries a knowledge base using a query formed from the prompt, to obtain search results. The search results are filtered to exclude information in a store of information known by the LLM. A retrieval augmented generation, RAG, prompt is formed from the received prompt and the filtered search results. The RAG prompt is sent to the LLM and a response is received from the LLM. The response is sent to a user interface or used to control a communications network.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kiss, Stephanie
Taylor, Paul
Yearling, David
Abstract
A call management tool is described comprising a memory and a processor. The memory stores instructions which when executed by the processor implements a method of establishing a call via a communications network between an end user communications device and an agent, extracting metadata from the call, constructing a prompt using the metadata, sending the prompt to a large language model (LLM) and receiving a response to the prompt from the large language model, and triggering a next action using the response, where the next action manages the call.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kiss, Stephanie
Taylor, Paul
Yearling, David
Abstract
A computer implemented method is defined. The method comprises receiving an image of an environment; providing the image to a trained multi-modal large language model trained to identify one or more objects within the image and a position of each of the one or more objects within the image and output text identifying the one or more objects and the positions of the one or more objects; receiving from the multi-modal large language model the output text; forming a record of the environment using the output text of the multi-modal large language model, wherein the record of the environment comprises an identification of the one or more objects in the environment and the position of the one or more objects in the environment; and querying the record to determine an identity and/or a position of an object of the one or more objects.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kiss, Stephanie
Yearling, David
Taylor, Paul
Abstract
Some examples of training a large language model (LLM) to detect an anomaly comprise receiving a plurality of modalities of training data, each modality of training data comprising a different data type. The training data comprises labels indicating a presence of an anomaly. Each modality of training data is transformed with a respective transformation to obtain respective vector embeddings. The respective vector embeddings of the training data are input into a pretrained LLM. Weights of the pre-trained LLM are fine-tuned using the training data via supervised learning such that the pre-trained LLM is able to detect anomalies in multi-modal data.
H04L 41/06 - Management of faults, events, alarms or notifications
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khan, Kashaf
Abstract
Some examples of a method and apparatus are described, including: for each of a plurality of time instants, receiving operation data, wherein the operation data comprises a current configuration of an operation and an output of the operation, where the operation is computer- implemented functionality for managing a communications network or for managing a service deployed in a communications network; determining a performance label associated with the output of the operation; generating behaviour data comprising the operation data and the performance label; and storing the behaviour data in a behaviour repository. The method comprises simulating the operation using the stored behaviour data; and triggering change to the configuration of the operation in response to output of the simulation.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/147 - Network analysis or design for predicting network behaviour
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
H04L 41/0859 - Retrieval of network configurationTracking network configuration history by keeping history of different configuration generations or by rolling back to previous configuration versions
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Pena Rios, Anasol
Conway, Anthony
Zhao, Zi-Chuan
Clark, Adrian
Abstract
A computer implemented method, comprising: acquiring a plurality of images of a first scene captured from different viewing positions; training a 3D implicit neural representation model for the scene using the acquired images; wherein the training comprises rendering an image from the 3D model of the scene, the image being rendered as if captured from a first viewing position, comparing the rendered image with one of the acquired images taken from the first viewing position, and adjusting one or more parameters of the model in dependence on a result of the comparison; and the training further comprises rendering a 2D spatial image bearing 3D information, the 2D spatial image being rendered as if captured from a second viewing position, and adjusting one or more parameters of the model in dependence on the 2D spatial image.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Thurlow, Ian
Abstract
A computer-implemented method of maintaining a deployed sensor unit is provided. The method receives (410) a raw sensor data stream from the deployed sensor unit (210). The method further receives (420) a set of calibration measurements associated with the deployed sensor unit, the set of calibration measurements being taken by a mobile reference sensor unit (220) whilst in proximity to the deployed sensor unit during a calibration period. The method determines (430) a drift of the deployed sensor unit based on the raw sensor data and the set of calibration measurements. The method further determines (440) whether the deployed sensor unit should be replaced based, at least in part, on the determined drift. The method schedules (460) a replacement of the deployed sensor unit in response to determining that the deployed sensor unit should be replaced and schedules (450) a further calibration of the deployed sensor unit in response to determining that the deployed sensor unit should not be replaced. The further calibration is to be undertaken by a mobile reference sensor unit whilst in proximity to the deployed sensor unit during a further calibration period to take a further set of calibration measurements.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Gilks, Daniel
Davey, Steven
Abstract
This invention provides a device, and a method of manufacturing said device, the device comprising: a container containing an atomic vapour; and a Photonic Integrated Circuit, PIC, positioned inside the container, the PIC comprising: a substrate comprising a surface and a first optical path, wherein the substrate defines a first opening extending from the surface of the substrate to a first section of the first optical path, the first opening being exposed to the atomic vapour of the container such that the first section of the first optical path passes across the first opening through the atomic vapour.
G04F 5/14 - Apparatus for producing preselected time intervals for use as timing standards using atomic clocks
G01C 19/62 - Electronic or nuclear magnetic resonance gyrometers with optical pumping
G01R 33/26 - Arrangements or instruments for measuring magnetic variables involving magnetic resonance for measuring direction or magnitude of magnetic fields or magnetic flux using optical pumping
H03L 7/26 - Automatic control of frequency or phaseSynchronisation using energy levels of molecules, atoms, or subatomic particles as a frequency reference
G02B 6/12 - Light guidesStructural details of arrangements comprising light guides and other optical elements, e.g. couplings of the optical waveguide type of the integrated circuit kind
72.
A TELECOMMUNICATIONS SYSTEM AND A METHOD OF OPERATING THE TELECOMMUNICATIONS SYSTEM
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mckay, Alistair
Mazloumian, Gregory
Smith, Paul
Abstract
A Method Of Operating The Telecommunications System A method (400) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; and communicate with a User Equipment (110), UE, over a wireless local connection (180-1); communicating, from the CN, to the UE, over the wireless local connection, the eSIM profile (420); receiving, at the CTN, from the UE using the eSIM profile, a/an: request for a service plan; identifier of the communicated eSIM profile; and unique identifier associated with the UE, other than the identifier of the eSIM profile (430); determining, at the CTN, the UE to be (440): eligible to receive the service plan in response to identifying, as stored in the CTN, an absence of an association between the unique identifier and prior provision of the requested service plan by the CTN; and ineligible to receive the service plan in response to identifying, as stored in the CTN, an association between the unique identifier and prior provision of the requested service plan; and in response to determining that the UE is: eligible, the CTN permitting the identified eSIM profile to access to the requested service plan (460); and not eligible, the CTN preventing the identified eSIM profile from accessing to the requested service plan (450). Further methods and systems are disclosed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
Cui, Zhan
Abstract
Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception decoys to deploy in response to the network intrusion, and deploying the one or more deception decoys in response to the intrusion.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khanam, Zeba
Umeh, Ikenna
Hercock, Robert
Claireaux, Leah
Abstract
The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising: a hash table, referred to herein as an 'embedding hash table', consisting of one or more buckets, wherein: for each bucket of the embedding hash table, a corresponding key is a vector embedding of an entity name; and each bucket of the embedding hash table stores an entity type label associated with the corresponding entity name; and a data substructure storing all of the keys to the embedding hash table.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mckay, Alistair
Smith, Paul
Mazloumian, Gregory
Abstract
A Telecommunications System And A Method Of Operating The Telecommunications System A method (500) of operating a telecommunications system (100), the method comprising the steps of: providing a Communication Node (120), CN, configured to: store an embedded Subscriber Identification Module (eSIM) profile for accessing a Cellular Telecommunications Network (130), CTN; communicate with the CTN; and communicate with a User Equipment (110), UE, using a wireless local connection (180-1); receiving, at the CN, from the UE, and over the wireless local connection, context data associated with the UE, in which said context data is indicative of a state of the UE and/or comprises user data (520); communicating, by the CN to the CTN: an identifier of the stored eSIM profile; a request for a service plan for the identified eSIM profile; and the received context data (530); and configuring, at the CTN, the requested service plan for the identified eSIM profile in dependence upon the context data (540).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
El-Moussa, Fadi
Abstract
Cyber defensive deception (CDD) encompasses a range of techniques which can be used to mislead and deceive an attacker. A cyber deception method comprises detecting a network intrusion, determining one or more deception breadcrumbs to deploy in response to the network intrusion, and deploying the one or more deception breadcrumbs in response to the intrusion.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Umeh, Ikenna
Khanam, Zeba
Hercock, Robert
Abstract
The present disclosure relates to named-entity resolution and recognition, such as may be used to pre-process data for input to automated cybersecurity and telecommunications network management systems. Methods described herein relate to a data structure comprising a hash table consisting of one or more buckets, referred to herein as a 'vector hash table', wherein: each bucket of the vector hash table stores a string comprising one or more aliases for a respective entity, referred to herein as an 'alias string'; and for each bucket, a corresponding key is a vector embedding of that alias string.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Herwono, Ian
El-Moussa, Fadi
Abstract
An example computer-implemented method of data obfuscation is defined. The computer- implemented method comprises monitoring network traffic from one or more IoT devices in a computing environment; generating an obfuscation schedule based on the monitored network traffic, the obfuscation schedule specifying a transmission time and one or more parameters for each of a plurality of decoy data packets to be transmitted according to the obfuscation schedule transmission times and parameters for a plurality of decoy data packets; and transmitting the decoy data packets according to the obfuscation schedule.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of simulating the propagation of malware in a network is provided. The method comprises accessing a model of the network, where the model comprising a plurality of computer nodes and where each computer node of the plurality of computer nodes is connected to at least one edge of a plurality of edges. Each edge of the plurality of edges connects a pair of computer nodes of the plurality of computer nodes. The method further comprises initiating an outbreak of the malware in the model at a predetermined source computer node of the plurality of computer nodes, and propagating the malware through the model of the network from the source computer node over a plurality of step-times. The propagation is determined based on a rate of transmission per step-time for each edge, and each step-time of the plurality of step-times corresponds to a temporal point that is universal across the network, such that at each step-time the malware propagation through the network occurs simultaneously for each edge of the plurality of edges according to the rate of transmission per step-time for each edge.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Chouhan, Pushpinder
Beard, Alfie
Abstract
The disclosed technology relates to a computer-implemented method of training an intrusion response system, IRS. The method comprises receiving a plurality of rules for responding to cyber-attacks. The method generates additional rules by applying a data augmentation technique to the plurality of rules and provides the plurality of rules and the additional rules as training data to the IRS. Some examples of the method detect a potential threat that matches at least one of the rules in the plurality of rules and additional rules with the IRS, subsequent to training the IRS with the training data.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Hercock, Robert
Abstract
Some examples of for training a neural network, wherein the neural network comprises a plurality of interconnected neurons, comprise receiving input data at a first neural network unit of the neural network and processing the input data using the first neural network unit to produce an output, a neural network unit comprising one or more of the neurons. Assign a first frequency to the first neural network unit and assign a second frequency associated to the second neural network unit. A difference value between the first frequency and the second frequency is determined and is used as an attention mechanism by, scaling the output of the first neural network unit in relation to the determined difference.
BRITISH TELECOMMUNICATIONS public limited company (United Kingdom)
Inventor
Burton, Fraser
Menchetti, Marco
Bussey, Liam
Lees, Amelia
Abstract
This invention provides an electromagnetic field detector, a system comprising the electromagnetic field detector, and a method of operating an electromagnetic field detector, the electromagnetic field detector comprising a first optical signal interface configured to receive, from one or more remote optical sources, a first optical signal; an electromagnetic field transmitter configured to transmit a local oscillator electromagnetic field generated from the first optical signal, the electromagnetic field transmitter comprising: a photocurrent generator configured to generate a photocurrent from the first optical signal; and an antenna interface configured to supply the photocurrent to an antenna to transmit the local oscillator electromagnetic field; a second optical signal interface configured to receive, from the one or more remote optical sources, a probe optical signal and a coupling optical signal; and a transmission medium configured to be excited by the probe optical signal and further excited by the coupling optical signal, wherein the probe optical signal has a probe frequency set to excite electrons of the transmission medium to a first excited state and the coupling optical signal has a coupling frequency set to excite electrons of the transmission medium to a predetermined Rydberg state so as to induce an Electromagnetic Induced Transparency, EIT, effect, wherein the transmission medium is further configured to receive a phase-modulated electromagnetic field from a remote transmitter and the local oscillator electromagnetic field such that the combination of the phase-modulated electromagnetic field and the local oscillator electromagnetic field causes a change in the probe optical signal from which a phase state of the phase-modulated electromagnetic field can be detected.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Lord, Andrew
White, Catherine
Abstract
There is herein described an alignment system for aligning an optical transmitter and optical receiver for transmission of an optical beam therebetween over free space, the alignment system comprising a plurality of sub-receivers and an adjustment system, where the plurality of sub-receivers are arranged to receive the optical beam from the optical receiver and are spaced apart in a direction perpendicular to the longitudinal axis of the optical beam, where the plurality of sub-receivers are adapted to provide an indication of a characteristic of the optical beam received at the plurality of sub-receivers to the adjustment system, where the adjustment system is adapted to use the indication to determine an adjustment to the relative orientations of the optical receiver and the optical transmitter and where the adjustment system is adapted to output the determined adjustment.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Turnbull, Rory
Nilsson, Michael
Stevens, Timothy
Appleby, Stephen
Abstract
Described are methods of managing content delivery to a client device, where a proxy server services unicast requests for content segments by joining a multicast channel carrying those content segments. An alternative content segment is provided to the proxy server in advance of the proxy server joining the multicast channel. Then, should a requested content segment not have been received over multicast and stored at the proxy server, for example when first joining a multicast channel, the proxy server can respond to the request with the stored alternative content segment. The alternative content segment can carry, for example, a simple video clip or static image such as a broadcaster logo or programme details, associated with the multicast channel. Thus, there is no need for the proxy server to make a unicast request for any content segment it has yet to receive over the appropriate multicast channel.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arum, Steve
Mackenzie, Richard
Abstract
This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: one or more gateways; a plurality of Reconfigurable Intelligent Surfaces, RISs; and a plurality of non-terrestrial access points; the method comprising the steps of: detecting a trigger to develop a connection in the wireless telecommunications network; obtaining data identifying a requirement for a performance parameter of the connection; obtaining data for a first candidate connection comprising at least two inter-non-terrestrial access point connections via a respective RIS of the plurality of RIS, the data identifying a first value of the performance parameter for the first candidate connection; comparing the first value of the performance parameter for the first candidate connection to the requirement for the performance parameter of the connection; and based on the comparison, developing the connection.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Arum, Steve
Mackenzie, Richard
Abstract
This invention provides a method in a wireless telecommunications network, the wireless telecommunications network comprising: a plurality of Reconfigurable Intelligent Surfaces, RISs, each RIS comprising a plurality of reflecting elements, each reflecting element of the plurality of reflecting elements of each RIS being a member of either a first set of utilised reflecting elements that are configured for reflecting a signal in the wireless telecommunications network or a second set of available reflecting elements; a plurality of non-terrestrial access points, wherein a first inter-non-terrestrial access point connection is communicated via a first RIS of the plurality of RISs; and one or more gateways configured to provide a feeder link to at least one non-terrestrial access point of the plurality of non-terrestrial access points; the method comprising the steps of: determining a subarray availability of the first RIS as a function of a number of reflecting elements in a second set of available reflecting elements of the first RIS; determining a subarray availability of a second RIS of the plurality of RISs as a function of a number of reflecting elements in a second set of available reflecting elements of the second RIS; and reconfiguring the wireless telecommunications network based on the determined subarray availabilities of the first and second RIS.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Horsley, Ian
Rafel Porti, Albert
Reid, Andrew
Abstract
A method (400) of operating a fibre optic telecommunications network (100), said network comprising a/an: Optical Line Terminal (110), OLT, configured for Time-Division Multiplexing, TDM, communication; optical switch (120), connected to the OLT and arranged at a junction of a first branch (140-2-1) and a second branch (140-2-2), different to the first branch, of the fibre optic telecommunications network, and configured to switch between, at least, a: first state (260-1), in which the OLT is connected, via the optical switch, to the first branch instead of the second branch; and second state (260-2), in which the OLT is connected, via the optical switch, to the second branch instead of the first branch; first ONU set (130-1), comprising at least one ONU, connected to the optical switch via the first branch; second ONU set (130-2), comprising at least one ONU, connected to the optical switch via the second branch; scheduler (220) for scheduling switching of the optical switch between the first state and the second state according to a schedule, wherein said scheduler is co-ordinated with a TDM timetable for communication between the OLT and each of the first ONU set and the second ONU set using TDM; the method comprising the steps of: providing the optical switch in one of the first state and the second state, thereby facilitating communication between the OLT and the first ONU set or the second ONU set, respectively (410); subsequently determining, using the scheduler, an upcoming time to switch the optical switch from the state in which said switch is provided to the other one of the first state and second state, so as to cause routing between the OLT and the other of the first ONU set and the second ONU set in coordination with the TDM timetable (420); and instructing, at the determined upcoming time, and subsequently causing, the optical switch to switch to said other state (440).
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Di Cairano-Gilfedder, Carla
Conway, Anthony
Abstract
A digital twin system is provided for controlling a computing system including multiple hardware and software entities. The digital twin system comprises: a digital twin comprising a virtual model of the computing system including the multiple hardware and software entities and their environment. The virtual model incorporates three-dimensional physical dimensions of the hardware, the virtual model being configured to emulate the behaviour of the computing system. The digital twin system further comprises a communications interface for performing bi-directional communications with the computing system. The communications include receipt of real-time information regarding performance of the computing system and sensed conditions of the computing system and its environment. The digital twin system also comprises a machine learning system trained on (i) historical and real-time performance data; and (ii) historical and real-time sensed data of the computing system and its environment. The digital twin system further comprises an orchestrator configured to use the digital twin and the trained machine learning system in conjunction with the received real-time performance data and sensed data for the computing system and its environment to determine at least one action for the computing system and its environment that supports one or more selected system management objectives. The orchestrator is further configured to transmit a command over the bi-directional link to the computing system to perform the at least one action.
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Novakovic, Violeta
Morsman, Trevor
Smith, Mark
Abstract
A method of removing a core of an armoured cable is described. Within a footway box, a cable is located entering the footway box from an end user premises, the cable having a core surrounded by armouring wires, the armouring wires held between an inner sheath and an outer sheath of the cable. An exposed end of the core is attached to a winch in the footway box by threading the exposed end of the core through an aperture in a body of the winch and attaching the exposed end of the core to a spool of the winch. The aperture being sized and shaped such that the outer sheath and armouring wires abut or are held by the body of the winch in use, when the spool is rotated, to pull the core from the end user premises onto the spool thereby leaving the outer sheath, armouring wires and inner sheath in situ.
H01B 15/00 - Apparatus or processes for salvaging material from cables
B23D 25/14 - Machines or arrangements for shearing stock while the latter is travelling otherwise than in the direction of the cut without regard to the exact dimensions of the resulting material, e.g. for cutting-up scrap
G02B 6/50 - Underground or underwater installationInstallation through tubing, conduits or ducts
H02G 1/12 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for removing insulation or armouring from cables, e.g. from the end thereof
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Nilsson, Michael
Appleby, Stephen
Turnbull, Rory
Stevens, Timothy
Abstract
The present invention provides a method of controlling the delivery rate of content to a client device to influence the quality level at which the client device requests subsequent content segments. The aim is to influence the client device so that it requests content segments at a consistent adaptive bit rate (ABR) level, where that level is one at which many client devices are requesting content segments. The result is that requests are more concentrated around a subset of the available ABR levels. This enables a more efficient and widespread use of any subsequent multicast.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Georgalas, Nektarios
Wallwork, Matthew
Cristina, Claudia
Abstract
A computer implemented method of detecting anomalous behaviour within an environment is provided. The environment is monitored by a plurality of sensors providing a plurality of data feeds. Each data feed provides a respective data series representing a respective physical property of the environment over time. The method of detects an occurrence of an event within the environment and identifies a type of that event. The method identifies a plurality of normally correlated data feeds from the plurality of data feeds for the type of the event. The method determines a respective degree of correlation between the respective data series provided by each of the normally correlated data feeds for the occurrence of the event. The method determines a classification of the behaviour within the environment based on the determined degree(s) of correlation, the classification indicating whether the behaviour is normal or anomalous for the environment. Also provided is a method of training an anomaly detector for detecting anomalous behaviour within such an environment, as well as associated computer systems, computer programs, computer-readable data carriers and data carrier signals for performing such methods.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Mehran, Farhad
Abstract
Examples exploit the processing capabilities of the available access points in a wireless telecommunications network operating in dual connectivity operation to enhance the data rate and fairness among the users. The wireless telecommunications network may include a first access point, or master node, connected to a plurality of further access points, or secondary nodes. The master node discovers which of the secondary access nodes has the processing capabilities and available processing capacity to handle NOMA transmissions. The master node can then coordinate the connection of a selected group of users to one of the secondary nodes that can support NOMA. The processing capabilities and available processing capacity to handle NOMA transmissions can be communicated by the secondary nodes to the master node actively, for example in a periodic manner, or reactively, for example as a result of a request for such information from the master node.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Kalidass, Sri Harish
Roscoe, Jonathan
Selvam, Muthupavithran
Abstract
A system to verify the correctness of equipment installation configured to perform the steps of: accessing a digital model of the equipment; receiving a representation of the equipment indicating a configuration of the equipment, Accessing installation-specific metadata associated with the installation of the equipment; Predicting at least one behaviour of the equipment based on metadata associated with installation of the equipment; Accessing service information comprising at least one measured behaviour of the equipment; Comparing the representation with the model to determine a first degree of conformity of the equipment with the model of the equipment; if the first degree of conformity is within a first threshold degree of conformity, comparing the at least one predicted behaviour with the at least one measured behaviour to determine a second degree of conformity of the equipment with the service information; and if the second degree of conformity is within a threshold second degree of conformity, verifying to an operator that the equipment is correctly installed.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Beard, Alfie
Bowman, Tom
Abstract
A computer-implemented method of simulating a propagation of a malware through a set of computer systems, the method comprising: identifying a plurality of first simulated computer systems infected with a simulated malware; for each of the first simulated computer systems, infecting a number of neighbouring second simulated computer systems, the number being zero or an integer; and determining a value of a reproduction number, R0, based on the total number of second simulated computer systems and the number of first simulated computer systems.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
White, Catherine
Wallwork, Matthew
Abstract
Computer implemented methods. systems and programs of transmitting data from a source node to a destination node through a network via a plurality of intermediate nodes are provided. The method splits the data into a plurality of shares using a secret sharing algorithm. The method determines a respective route through the network to the destination node for each of the plurality of shares. Each route comprises a plurality of intermediate nodes via which that share is to be transmitted. At least two of the routes are different from each other. At least a first intermediate node of each route is common to the other routes. The method constructs a plurality of datagrams for conveying the plurality of shares through the network along their respective routes. Each datagram is intended for processing by a respective intermediate node and is encrypted with a key associated with that intermediate node. Each datagram comprises a payload and routing information for instructing the respective intermediate node to forward data contained in the payload for conveying one or more of the shares along their respective routes towards the destination node. The portion of the respective routes of the one or more shares prior to the respective intermediate node are common to each other. Each datagram other than an initial datagram intended for the first intermediate node is encapsulated within the payload of a preceding datagram intended for a preceding intermediate node on the respective routes of the one or more shares. The payload of at least one of the datagrams comprises a plurality of encapsulated datagrams. The routing information of the at least one of the datagrams instructs the respective intermediate node to transmit the plurality of encapsulated datagrams on to different respective intermediate nodes in the network. The method transmits the initial datagram to the first intermediate node.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Horsley, Ian
Bally, Stephanie
Abstract
An enclosure (120) for routing a fibre optic cable (190) for a telecommunications network (100), the enclosure comprising a/an: routing member (310) for receiving and routing a fibre optic cable (190) within the enclosure; securing structure (180) for securing the fibre optic cable within the routing member; grating (240) for generating a Mechanically Induced Filter, MIF, in the fibre optic cable; urging member (180) configured to urge the grating against the fibre optic cable thereby to generate the MIF within said fibre optic cable; translation mechanism (230) configured to translate the urging member and the securing structure between: a first arrangement, in which the grating is urged against the fibre optic cable when said fibre optic cable is routed in the routing member, and in which the securing structure secures the fibre optic cable; and a second arrangement, in which the grating is not urged against the fibre optic cable when said fibre optic cable is routed in the routing member, the MIF thereby being absent from the fibre optic cable (540-2), and the fibre optic cable is unsecured by the securing structure.
G02B 6/44 - Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
G01M 11/00 - Testing of optical apparatusTesting structures by optical methods not otherwise provided for
H04B 10/071 - Arrangements for monitoring or testing transmission systemsArrangements for fault measurement of transmission systems using a reflected signal, e.g. using optical time domain reflectometers [OTDR]
97.
A METHOD OF DEPLOYING AN OPTICAL FIBRE CABLE IN A TELECOMMUNICATIONS NETWORK
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Novakovic, Violeta
Morsman, Trevor
Hubert, Malcolm
Abstract
This invention provides a method of deploying an optical fibre cable in a telecommunications network, the optical fibre cable being configured to connect a first optical fibre interface unit in the telecommunications network and a second optical fibre interface unit in a dwelling, the method comprising the steps of: positioning an optical fibre subduct connector on an optical fibre duct so as to align an aperture in the optical fibre subduct connector with an aperture in the optical fibre duct; connecting an optical fibre subduct with an optical fibre subduct connection interface of the optical fibre subduct connector such that any overlap of the optical fibre subduct and optical fibre subduct connection interface extends up to and not exceeding the aperture of the optical fibre duct, the optical fibre subduct connection interface being configured to resist disconnection of the optical fibre subduct and optical fibre subduct connection interface, wherein the optical fibre subduct connection interface comprises a first section and a second section and the optical fibre subduct and the optical fibre subduct connection interface are connected such that, once the optical fibre subduct connector is positioned on the optical fibre duct, in the first section, the optical fibre subduct and optical fibre duct are parallel or substantially parallel and, in the second section, an angle between the optical fibre subduct and the optical fibre duct is less than 45 degrees; and deploying an optical fibre cable between the first optical fibre interface unit in the telecommunications network and the second optical fibre interface unit in the dwelling by routing the optical fibre cable through optical fibre duct, the optical fibre subduct connector, and the optical fibre subduct.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Gunning, Paul
Rawlinson, John
Challinor, Simon
Abstract
There is herein described a method of active queue management for use in a telecommunications system comprising a Customer Premises Equipment (CPE) and a network access point, the network access point being adapted to transmit one or more data packets to the CPE, wherein the CPE comprises a plurality of packet queues, each of the plurality of packet queues being capable of holding data packets received from the network access point, the method comprising transmitting queue management information from the CPE to the network access point, where the queue management information enables the determination of a most suitable one of the plurality of packet queues for receiving a data packet, determining, using the transmitted queue management information, the most suitable one of the plurality of packet queues for receiving a data packet to be transmitted from the network access point to the CPE.
H04L 47/283 - Flow controlCongestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
H04L 47/30 - Flow controlCongestion control in combination with information about buffer occupancy at either end or at transit nodes
H04L 47/625 - Queue scheduling characterised by scheduling criteria for service slots or service orders
H04L 47/6295 - Queue scheduling characterised by scheduling criteria using multiple queues, one for each individual QoS, connection, flow or priority
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Liret, Anne
Pena Rios, Anasol
El-Moussa, Fadi
Kern, Mathias
Chimatapu, Ravikiran
Abstract
A method of monitoring and managing a network of charger modules for electric vehicles, EVs, is provided. The method comprises receiving charger module network data regarding the location of a plurality of charger modules in the network of charger modules, and receiving EV data from a plurality of EVs currently travelling in the region of the network of charger modules. The method further comprises generating a digital twin of the network of charger modules and EVs based on the charger module network data and the EV data, and monitoring, by the digital twin, the utilisation of the plurality of charger modules by the plurality of EVs. The method further comprises generating one or more predictions based on the monitoring of the utilisation of the plurality of charger modules by the plurality of EVs, and simulating, by the digital twin, the network of charger modules in one or more scenarios based on the generated one or more predictions. A report is then generated based on the simulations and outputted to a management entity.
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (United Kingdom)
Inventor
Khan, Kashaf
Burns, Julian
White, Melvyn
Abstract
A system for managing resources in a machine learning environment comprising one or more machine learning applications, the system comprising a machine learning application API; a workflow module of the machine learning environment; a generative machine learning model, a first resource controller configured to intercept traffic going to and from the workflow module and configured to perform flow control operations on the intercepted traffic in accordance with a first flow configuration; a second resource controller configured to intercept traffic going to and from the generative machine learning model and configured to perform flow control operations on the intercepted traffic in accordance with a second flow configuration; and a controller manager in communication with the first resource controller and the second resource controller, the controller manager configured to determine the first flow configuration for the first resource controller and the second flow configuration for the second resource controller.