会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • DATA MESSAGE SHARING
    • WO2019206524A1
    • 2019-10-31
    • PCT/EP2019/056886
    • 2019-03-19
    • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    • GIUBILO, FabioEL-MOUSSA, FadiSHACKLETON, Mark
    • H04L29/06G06F21/60G06F21/62H04L9/08H04L9/32
    • A computer implemented method of sharing a data message containing multiple data fields between a provider computer system and a consumer computer system, wherein the provider and consumer computer systems have mutual mistrust, the method comprising: responsive to an authentication of the provider computer system, receiving a definition of one or more fields in the data message accessible to the consumer computer system, each field having associated a cryptographic key; responsive to an indication from a data storage server that a ciphertext of the data message is requested to be stored in the data storage server including a derivative of an identifier of the provider computer system, confirming the authenticity of the ciphertext by confirming the authenticity of the derivative, wherein each field of the ciphertext is encrypted using a corresponding cryptographic key; responsive to an authentication of the consumer computer system, issuing the consumer computer system with a cryptographic key for each of the fields in the data message accessible to the consumer computer system, such that the consumer computer system is operable to obtain the ciphertext from the data storage server and to decrypt the one or more accessible data fields and such that other data fields being non-accessible to the consumer are encrypted to anonymise such other data fields.
    • 2. 发明申请
    • TRACKING AREA CONFIGURATION
    • 跟踪区域配置
    • WO2016156547A1
    • 2016-10-06
    • PCT/EP2016/057166
    • 2016-03-31
    • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    • SAFFRE, FabriceSHACKLETON, Mark
    • H04W24/02
    • H04W24/02H04W60/00
    • A method of configuring tracking areas in a network comprising a first cell associated with a first tracking area, a second cell associated with a second tracking area, and a boundary between the first tracking area and the second tracking area, the method comprising: calculating a first value based on the number of handovers between the first cell and the second cell; calculating a second value based on the number of handovers between the second cell and another cell in the second tracking area; comparing the first value and the second value; and using the result of the comparison in a decision to change the boundary between the first tracking area and the second tracking area.
    • 一种在网络中配置跟踪区域的方法,包括与第一跟踪区域相关联的第一小区,与第二跟踪区域相关联的第二小区以及所述第一跟踪区域和所述第二跟踪区域之间的边界,所述方法包括: 基于第一单元和第二单元之间的切换次数的第一值; 基于所述第二小区与所述第二跟踪区域中的另一小区之间的切换次数计算第二值; 比较第一值和第二值; 以及在改变第一跟踪区域和第二跟踪区域之间的边界的判定中使用比较结果。
    • 6. 发明申请
    • DYNAMIC SECURITY POLICY
    • WO2019091697A1
    • 2019-05-16
    • PCT/EP2018/077781
    • 2018-10-11
    • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
    • SHACKLETON, MarkEL-MOUSSA, Fadi
    • G06F21/57G06F9/455
    • G06F21/577G06F2009/45587
    • A computer implemented method to generate training data for a machine learning algorithm for determining security vulnerabilities of a virtual machine (VM) in a virtualised computing environment, the machine learning algorithm determining the vulnerabilities based on a vector of configuration characteristics for the VM, the method comprising: receiving a plurality of VM configuration vectors for each of one or more training VMs, each configuration vector including attributes of a configuration of a VM and having a temporal indication; receiving a security occurrence identification being referable to a VM configuration vector for a training VM based on a temporal indication of the security occurrence, the security occurrence identification including information for defining a vector of vulnerabilities for the training VM associated with the referenced VM configuration vector, and associating the referenced VM configuration vector with the vulnerability vector as a first training example; identifying one or more further VM configuration vectors for the training VM, each of the further VM configuration vectors having temporal indications preceding that of the referenced VM configuration vector; and associating a modified form of the vulnerability vector with each of the further VM configuration vectors as further training examples, the vulnerability vector being modified for each further VM configuration vector by a reverse decay function such that each temporally earlier VM configuration vector is associated with a vulnerability vector indicating vulnerability to a lesser degree.