Patents by Inventor Antony Martin

Antony Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120272316
    Abstract: The present invention provides a method for detecting the hijacking of computer resources, located on an internal network implementing security and confidentiality criteria specific to this internal network, connected to an external network with no such security and confidentiality criteria, through a connection managed by a service provider, comprising: storing a connection parameter implemented by the computer resources to communicate with the external network; processing the stored parameter based on an irreversible function to generate a unique code that corresponds to said stored parameter but which does not allow the identification of said parameter from the corresponding generated code; and sending said generated code to a server located on the external network so that the server can analyze the activity of the computer resources from said unique code to detect any hijacking of the computer resources.
    Type: Application
    Filed: December 8, 2010
    Publication date: October 25, 2012
    Applicant: Alcatel Lucent
    Inventors: Laurent Clevy, Antony Martin
  • Publication number: 20120117563
    Abstract: Provided is a method and devices for overload control in a cloud computing environment. The method includes receiving a first message from a network element associated with the cloud computing environment. The first message includes information associated with a target virtual machine and a list of sessions from the one or more sessions to move from the serving virtual machine to the target virtual machine. Associating one or more client addresses with an address associated with the target virtual machine based on the list of sessions. And, treating the target virtual machine as the serving virtual machine if processing sessions associated with the list of sessions.
    Type: Application
    Filed: November 4, 2010
    Publication date: May 10, 2012
    Inventors: Yuh-Jye Chang, Adiseshu Hari, Pramod Koppol, Antony Martin, Thanos Stathopoulos, Dimitrios Stiliadis
  • Publication number: 20120102330
    Abstract: This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine the intermediate routers which constitute an optimal pathway for routing information, said secure router and said intermediate routers generating this topological map by sharing the lists of links (LSA1, LSA2, LSAn) using a communications protocol, characterized in that the secure router (100) performs the following steps: The step (109) of calculating and then saving, when a list of links (LSA1, LSA2, . . . LSAn) is received, at least one receiving fingerprint (hash(LSA1), hash(LSA2), . . . hash(LSAn)) of the lists received (LSA1, LSA2, . . . LSAn), The step (120) of calculating and then saving, when a list of links (LSA?1, LSA?2, . . . LSA?n) is transmitted, at least one sending fingerprint (hash(LSA?1), hash(LSA?2), . . .
    Type: Application
    Filed: April 22, 2010
    Publication date: April 26, 2012
    Inventors: Haithem El- Abed, Antony Martin
  • Publication number: 20100287615
    Abstract: Intrusion detection method for detecting unauthorized use or abnormal activities of a targeted system of a network, comprising the steps: creating defined preconditions for each vulnerability related to the targeted system and/or for each attack that exploit one or several vulnerabilities; creating assurance references corresponding to said defined preconditions and considering the targeted perimeter capturing data related to the targeted system; comparing captured data with attack signatures for generating at least one security alert when captured data and at least one attack signature match; capturing assurance data from monitoring of the targeted perimeter comparing assurance data, issued from assurance monitoring of the targeted perimeter, with assurance references for generating assurance information when said data issued from assurance monitoring and at least one assurance reference match retrieving the preconditions of the generated security alert checking if assurance information corresponding to said
    Type: Application
    Filed: September 19, 2008
    Publication date: November 11, 2010
    Inventors: Antony Martin, Anula Sinnaya, Samuel Dubus, Laurent Clevy
  • Publication number: 20100182918
    Abstract: Method for classification of traffic on telecommunications networks, said method including a stage for the capture of traffic and a stage for detailed packet analysis, said method also including a stage for the statistical classification of traffic using a statistically-generated decision tree.
    Type: Application
    Filed: August 6, 2008
    Publication date: July 22, 2010
    Inventors: Laurent Clevy, Antony Martin, Haithem El-Abed, Arnaud Ansiaux