会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明专利
    • Secure publish-subscribe communication methods and apparatus
    • GB2588107A
    • 2021-04-21
    • GB201914444
    • 2019-10-07
    • BRITISH TELECOMM
    • DANIEL BASTOSFADI EL-MOUSSA
    • H04L29/08G06F21/60H04L29/06
    • A publish-subscribe protocol in a network comprising publisher(s), a broker and subscriber(s), comprising one of the publishers: i-a. receiving a public key from the broker; i-b. determining, based on attribute(s) of data to be published to the broker, whether a sensitivity level of the data is low; and ii. following steps i-a and i-b, publishing the data to the broker, wherein: if the sensitivity level of the data is low, the data is transmitted to the broker unencrypted and when it is not low the data is encrypted before transmitting the resulting encrypted data to the broker, wherein the step of encrypting uses the public key. Also, a method performed at the broker comprises: receiving encrypted data from a publisher, determining based on one or more attributes of the data whether the sensitivity level of the data is high; and publishing the encrypted data to one of the subscriber devices by the broker, wherein: when the determination is that the sensitivity level of the data is not high the broker forwards the encrypted data to a subscriber and when the sensitivity level is high the broker encrypts the encrypted data to produce double-encrypted data which is transmitted to a subscriber.
    • 2. 发明专利
    • Computer-implemented security methods and systems
    • GB2597909A
    • 2022-02-16
    • GB202011025
    • 2020-07-17
    • BRITISH TELECOMM
    • BEHNAM AZVINEFADI EL-MOUSSADANIEL BASTOS
    • G06F21/55G06F21/82G06N20/00
    • One method involves a machine learning algorithm updating weighting coefficients associated with threat factors, threat factors having values defined for requests for peripheral devices to connect to networked devices coupled to a secure network; updating a security policy associated with the secure network in respect of a particular threat factor when that threat factor’s weighting coefficient changes by more than a predetermined amount in a predetermined period; and automatically approving or denying requests for peripheral devices to connect to the networked devices in dependence on that policy. Another method involves obtaining a peripheral connection request profile, obtaining a threat score associated with the request, where the threat score is determined from a weighted combination of threat factors dependent on contents of a field of the profile and having a weighting coefficient; denying the request when the threat score is above a threshold, otherwise, obtaining a policy decision based on profile and secure network policy comparison and providing request approval or denial according to the policy decision. Storing the profile in a database in association with an approval/denial indication of the request, updating weighting coefficients in dependence on the database contents, and updating the policy in response to changing weighting coefficients.
    • 3. 发明专利
    • Network security
    • GB2608592A
    • 2023-01-11
    • GB202109365
    • 2021-06-29
    • BRITISH TELECOMM
    • DANIEL BASTOSFADI EL-MOUSSA
    • H04L9/40
    • A processor-controlled device 104 and remote system 114 for identifying malicious behaviour in a network. The processor-controlled device (e.g. a gateway, router or home hub) identifies (e.g. using a machine learning system) a first portion of a data transmission 107 indicative of an anomaly and a second portion of the data transmission comprising personal data. The processor-controlled device generates a modified data transmission 112, the modification of the data transmission comprising anonymising at least the second portion of the data transmission, and sends the modified data transmission to the remote system for identification of whether the first portion of the data is indicative of malicious behaviour. If the first portion is indicative of malicious behaviour, then the remote system may send a response (118, Figure 2) indicative of this to the processor-controlled device. The response may include a policy to be implemented by the processor-controlled device. The modification of the data transmission may include encrypting the first portion and the encryption may be attribute-based. By providing anonymised data to the remote system the privacy of users is ensured.