-
公开(公告)号:US20220286931A1
公开(公告)日:2022-09-08
申请号:US17597851
申请日:2020-06-09
IPC分类号: H04W36/24 , H04W36/08 , G06V10/764 , G06V20/00
摘要: This disclosure provides a method, and a network node for implementing the method, of initiating a transfer in a cellular telecommunications network, wherein the cellular telecommunications network comprises a User Equipment (UE) and a base station, wherein the UE includes a camera, the method including storing visual data including a visual representation of at least a part of the base station; receiving visual data captured by the camera of the UE; performing a computer vision operation, trained on the stored visual data, on the captured visual data to determine that the visual representation of the base station or part thereof is present in the captured visual data; and, initiating a transfer of the UE to the base station.
-
公开(公告)号:US20220261466A1
公开(公告)日:2022-08-18
申请号:US17597629
申请日:2020-06-16
发明人: Gabriele GELARDI , Ali Sajjad , Gery DUCATEL
摘要: Computer implemented methods for enrolling a user as an authenticated user of a computing device and for authenticating a user of a computing device are provided. The methods make use of behavioral biometrics to determine a set of shares that represent a secret credential according to a secret sharing scheme. The set of shares is initially determined when the user is enrolled based on typical measurements of the user's behavioral biometrics and authentication data indicating how to generate the set of shares from a user's behavioral biometrics is generated. When authenticating the user, the computing device can generate the set of shares based on the authentication data and measurements of the current user's behavioral biometrics. The computing device can use the generated set of shares to recreate a copy of the secret credential with which to authenticate the user.
-
公开(公告)号:US20220164422A1
公开(公告)日:2022-05-26
申请号:US17310969
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviours of the user, the method comprising: defining a training period during which access to the device is determined based on a credential-based authentication scheme wherein each access determination is used to generate an item of training data including at least a result of the credential-based authentication and a behaviour of the user; training a machine learning classifier based on the training data such that the classifier is operable to classify user behaviour as compliant or non-compliant such that compliant behaviour is determined by the classifier to be consistent with prior behaviour for permitting access to the device subsequent to the training period; and responsive to a determination that a behaviour subsequent to the training period is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behaviour as a compliant behaviour by providing the subsequent behaviour as an additional training example.
-
公开(公告)号:US11341237B2
公开(公告)日:2022-05-24
申请号:US16498932
申请日:2018-03-26
发明人: Joshua Daniel , Xiaofeng Du
摘要: A computer implemented method to detect a computer system in execution operating in a manner that is not compliant with a definition of a set of compliant operations, the method including receiving a first set of records for the computer system, each record detailing an occurrence in the computer system during a first predetermined time period; generating a sparse distributed representation of the set of records to form a training set for a hierarchical temporal memory (HTM); training the HTM based on the training set in order that the trained HTM provides a model of the operation of the computer system during the predetermined time period; selecting at least a subset of operations in the set of compliant operations and causing the invocation of each operation of the subset in the computer system over a second predetermined time period to generate a second set of records of occurrences in the computer system; generating a sparse distributed representation of the set of records to form an input set for the trained HTM; executing the trained HTM based on the input set to determine a degree of recognition of the records of the input set; and responsive to a determination that a degree of recognition of one or more records of the input set is below a threshold degree, identifying the operation of the computer system as non-compliant.
-
公开(公告)号:US20220156351A1
公开(公告)日:2022-05-19
申请号:US17310972
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant such that compliant behavior is determined by the classifier to be consistent with prior behavior for permitting access to the device. The method further includes, in response to a determination that a subsequent behavior is classified as non-compliant, requesting a credential-based authentication of the user and permitting access to the device in response to the credential-based authentication, wherein permitting access to the device further includes constructively training the classifier based on the subsequent behavior as a compliant behavior by providing the subsequent behavior as an additional training example.
-
公开(公告)号:US11336623B2
公开(公告)日:2022-05-17
申请号:US15733355
申请日:2018-12-21
发明人: Simon Ringland , Francis Scahill , Timothy Twell
摘要: There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.
-
公开(公告)号:US20220150118A1
公开(公告)日:2022-05-12
申请号:US17431772
申请日:2020-01-30
发明人: Ruth BROWN , Jonathan HART , Maria CUEVAS RAMIREZ
IPC分类号: H04L41/0816 , H04L45/12 , H04L47/80 , A63F13/332 , A63F13/358
摘要: A method of managing a telecommunications network, the telecommunications network having a first user and a second user, the method comprising the step of: ascertaining a competitive characteristic associated with the first user and a competitive characteristic associated with the second user (210); comparing the ascertained competitive characteristics (220); identifying whether there is a disparity between the competitive characteristics that exceeds a threshold (230), thereby to identify a competitive advantage associated with the first or second user; and if it is identified that the disparity exceeds the threshold, adapting a network configuration of a network connection associated with the first user so as to offset the competitive advantage associated with the first or second user (240).
-
公开(公告)号:US20220141542A1
公开(公告)日:2022-05-05
申请号:US17433414
申请日:2020-02-24
发明人: Timothy STEVENS , Rory TURNBULL , Stephen APPLEBY
IPC分类号: H04N21/6405 , H04N21/6408 , H04N21/266
摘要: Described is a method of delivering content over a network using an approach referred to as “Multicast Assisted Unicast Delivery” (MAUD), as a multicast network is used to assist, rather than substituting for, an otherwise unicast path. Content is requested by client devices from a content server over unicast. The responses containing the requested content are separated into two components: a first component containing elements that are specific to individual client devices (for example session specific data), and a second component that is common to all client devices (typically this is the video content being requested). The first component can be delivered over unicast and the second component over multicast. Identifiers are introduced into each of the first and second components to aid recombination of the components to form the original responses. The separation and recombination are handled by suitably configured proxy servers.
-
公开(公告)号:US11317421B2
公开(公告)日:2022-04-26
申请号:US15527850
申请日:2015-11-13
发明人: Michael Fitch , Richard Mackenzie
摘要: This invention relates to a method in a cellular communications network having a plurality of base stations, and to a base station for said cellular communications network, wherein each base station is configured to use a frequency band of one of a hierarchy of spectrum levels, the method comprising: a first base station using a frequency band of a first spectrum level of the hierarchy of spectrum levels; determining an interference level in the network; determining whether the interference level indicates that the first base station's performance is sub-optimal; and, if so, the first base station reconfiguring to use a frequency band of a second spectrum level of the hierarchy of spectrum levels, the second spectrum level having a different number of frequency bands than the first spectrum level.
-
公开(公告)号:US20220100829A1
公开(公告)日:2022-03-31
申请号:US17310968
申请日:2020-02-28
发明人: Gabriele GELARDI , Gery DUCATEL
摘要: A computer implemented method of access control for a user device having at least one component for determining behaviors of the user. The method including accessing a first machine learning classifier trained based on at least one prior behavior of the user using the device, the classifier classifying user behavior as compliant or non-compliant. The method further including, in response to a determination that a subsequent behavior is classified as non-compliant, accessing a second machine learning classifier trained based on at least one prior behavior of the user using the device where the prior behavior is classified as non-compliant by the first classifier. The method further including, in response to a determination that the subsequent behavior is classified as non-compliant by the second classifier, requesting a credential-based authentication of the user and constructively training one of the machine learning classifiers based on the credential-based authentication result
-
-
-
-
-
-
-
-
-