Patents by Inventor Serge Papillon
Serge Papillon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170034695Abstract: Process for preserving the privacy of a user connected to a network through a terminal that comprises geolocation means adapted to emit geolocation information (2, 2a) about the geographical position of said user, said process providing for:—analysing a packet (1) from said terminal to detect the eventual presence of geolocation information (2) into said packet;—replacing in said packet said detected geolocation information by virtual geolocation information (9, 9a) that have been computed for said user;—forwarding through said network said packet with said virtual geolocation information.Type: ApplicationFiled: March 27, 2015Publication date: February 2, 2017Applicant: Alcatel LucentInventors: Sylvain L'Haridon, Serge Papillon, Wael Kanoun
-
Patent number: 9286487Abstract: This method comprises the steps of: —choosing (1) a security parameter n,—segmenting (2) the file in n chunks S1, . . . , Sn, —randomly choosing (3) n2 coefficients aij for i=1, . . . , n and j=1, . . . , n,—verifying (3) that the vectors ai1, . . . , ain, for i=1, . . . , n, are linearly independent, otherwise generating the coefficients again, —computing (4) n linear combinations Ci=ai1S1+ . . . +aijSj+ . . . +ain·Sn, for i=1, n,—choosing (5) n storage service providers Oi, . . . , On among said plurality of storage service provider, —generating (6a; 6b; 6c) n file identifiers ID?1, . . . , ID?n designating said file (F),—storing (6a; 6b; 6c) the combination Ci at the storage service provider Oi in association with the file identifier ID?i, for i=1, . . . , n,—storing the file identifier ID?i and the provider identifier Oi, for i=1, . . . , n, in a file descriptor corresponding to the file (F), this file descriptor being stored in a local memory (LM),—storing the set of coefficients ai,1, . . .Type: GrantFiled: April 18, 2013Date of Patent: March 15, 2016Assignee: Alcatel LucentInventors: Abdullatif Shikfa, Serge Papillon
-
Publication number: 20160057030Abstract: Embodiments of the invention relates to a method for monitoring interactions with audiovisual content, performed by a monitoring device (2, 7). The method allows storing interaction data in an interaction database (23), which reflects user's interactions with commercials of a commercial campaign. The method also allows building the profile of a household, and selecting commercial to be streamed in function of the profile.Type: ApplicationFiled: March 24, 2014Publication date: February 25, 2016Applicant: Alcatel LucentInventors: Wael Kanoun, Serge Papillon
-
Patent number: 9203615Abstract: A method and apparatus for personalizing a smart card coupled with a communication device of a user who is a subscriber of a first telecommunication network and wishes to become a subscriber of a second telecommunication network is disclosed. A first authentication key is stored in both the smart card and in an first application server included in the first telecommunication network. A secure session is established with a second application server included in the second telecommunication network via the first telecommunication network by negotiating with the first application server and the second application server in order that the smart card and the second application server agree on an second authentication key. Shared values and shared functions according to a secure multiparty computation protocol are used to compute a second authentication key which replaces the first authentication key in the smart card.Type: GrantFiled: September 16, 2013Date of Patent: December 1, 2015Assignee: Alcatel LucentInventors: Serge Papillon, Haithem El Abed, Antony Martin, Abdullatif Shikfa
-
Publication number: 20150310664Abstract: A capability for managing a representation of a smart environment is presented herein. The capability for managing a representation of a smart environment is configured to support augmented reality (AR)-based management of a representation of a smart environment, which may include AR-based generation of a representation of the smart environment, AR-based alignment of the representation of the smart environment with the physical reality of the smart environment, and the like.Type: ApplicationFiled: April 29, 2014Publication date: October 29, 2015Applicant: ALCATEL LUCENTInventors: Mathieu Boussard, Serge Papillon, Benoit Christophe
-
Patent number: 9135454Abstract: A system and method for enabling searchable encryption of encrypted documents stored by a client on one or more storage providers includes a broker server in communication with the client and the one or more storage providers. The broker server is adapted to transfer the encrypted documents between the client and the one or more storage providers and to maintain information indicating where the encrypted documents are transferred. The broker server further stores information for at least one encrypted index for the encrypted documents and a test function for a searchable encryption mechanism used to encrypt the at least one encrypted index.Type: GrantFiled: May 31, 2013Date of Patent: September 15, 2015Assignee: Alcatel LucentInventors: Abdullatif Shikfa, Serge Papillon
-
Publication number: 20150188904Abstract: For authenticating a user of a communication device implementing a client application connected to an application server through a telecommunication network, the application server having sent a challenge to the client application to authenticate the user, a user device associated with the communication device establishes a connection with the client application that invites the user to enter secret data on a screen of the communication device, retrieves the challenge from the client application, prompts the user to enter secret data, calculates a response to the challenge, based on secret data entered by the user and the retrieved challenge, and sends the response to the client application that forwards the response to the application server.Type: ApplicationFiled: June 14, 2013Publication date: July 2, 2015Inventors: Serge Papillon, Haithem El-Abed
-
Publication number: 20150161411Abstract: This method comprises the steps of: —choosing (1) a security parameter n,—segmenting (2) the file in n chunks S1, . . . , Sn, —randomly choosing (3) n2 coefficients aij for i=1, . . . , n and j=1, . . . , n,—verifying (3) that the vectors ai1, . . . , ain, for i=1, . . . , n, are linearly independent, otherwise generating the coefficients again,—computing (4) n linear combinations Ci=ai1S1+ . . . + aijSj+ . . . + ain·Sn, for i=1, n,—choosing (5) n storage service providers Oi, . . . , On among said plurality of storage service provider,—generating (6a; 6b; 6c) n file identifiers ID?1, . . . , ID?n designating said file (F),—storing (6a; 6b; 6c) the combination Ci at the storage service provider Oi in association with the file identifier ID?i, for i=1, . . . , n,—storing the file identifier ID?i and the provider identifier Oi, for i=1, . . . , n, in a file descriptor corresponding to the file (F), this file descriptor being stored in a local memory (LM),—storing the set of coefficients ai,1, . . .Type: ApplicationFiled: April 18, 2013Publication date: June 11, 2015Applicant: Alcatel LucentInventors: Abdullatif Shikfa, Serge Papillon
-
Publication number: 20150141057Abstract: A method and system for providing conditional interaction for a virtual object (2) accessible with a mobile device (1), said mobile device (1) comprising geolocation means for assessing a real-world geographic location (PI) to said mobile device (1), and said virtual object (2) being assessed a location information (P2) corresponding to a real-world geographic location, In various embodiments at least one interaction is conditioned with said virtual object (2) through said mobile device (1), at least in function of the real-world geographic location (PI) of said mobile device (1) and the location information (P2) of said virtual object (2). In case said conditioning step is satisfied, interacting (7) with said mobile device (1) on said virtual object by modifying said location information (P2) of the virtual object (2).Type: ApplicationFiled: June 12, 2013Publication date: May 21, 2015Applicant: Alcatel LucentInventors: Serge Papillon, Antony Martin
-
Publication number: 20140366152Abstract: To securely transmit data from a communication terminal (TC) to an application server (SA) over a telecommunications network (RT), the communication terminal (TC) being connected to the application server (SA) via an unsecure access network (RAns) and being able to communicate with the application server (SA) via at least one secure access network (RAs), the communication terminal (TC) switches the connection with the application server (SA) from the unsecure access network (RAns) to a secure access network (RAs), when personal data (DonP) is likely to be entered or is entered by the user, transmits the personal data (DonP) to the application server (SA) via the secure access network (RAs), and switches the connection with the application server (SA) from the secure access network (RAs) to an unsecure access network (RAns).Type: ApplicationFiled: December 24, 2012Publication date: December 11, 2014Applicant: Alcatel LucentInventors: Vincent Toubiana, Serge Papillon
-
Publication number: 20140359282Abstract: A system and method for enabling searchable encryption of encrypted documents stored by a client on one or more storage providers includes a broker server in communication with the client and the one or more storage providers. The broker server is adapted to transfer the encrypted documents between the client and the one or more storage providers and to maintain information indicating where the encrypted documents are transferred. The broker server further stores information for at least one encrypted index for the encrypted documents and a test function for a searchable encryption mechanism used to encrypt the at least one encrypted index.Type: ApplicationFiled: May 31, 2013Publication date: December 4, 2014Applicant: ALCATEL-LUCENTInventors: Abdullatif Shikfa, Serge Papillon
-
Publication number: 20140109204Abstract: To authenticate a user possessing a first communication terminal (TC1) and a second communication terminal (TC2), the first terminal being connected to an application server (SApp) in order to access a service, this application server being connected to an authentication server (SAuth) capable of communicating with the second terminal, the authentication server (SAuth) receives a user identifier (IdU) transmitted from the first terminal and identifies the second terminal based on the received identifier. The server generates coding data (DonC) and transmits it to one of the two terminals, and transmits a command to the other one of the two terminals to invite the user to provide a set of data (EnsD) using the coding data received by said one of the two terminals. The server compares the set of data with secret data (DonS) using the coding data, in order to allow the user access to the application server (SApp).Type: ApplicationFiled: June 15, 2012Publication date: April 17, 2014Inventors: Serge Papillon, Antony Martin
-
Publication number: 20140089669Abstract: A method and apparatus for personalizing a smart card coupled with a communication device of a user who is a subscriber of a first telecommunication network and wishes to become a subscriber of a second telecommunication network is disclosed. A first authentication key is stored in both the smart card and in an first application server included in the first telecommunication network. A secure session is established with a second application server included in the second telecommunication network via the first telecommunication network by negotiating with the first application server and the second application server in order that the smart card and the second application server agree on an second authentication key. Shared values and shared functions according to a secure multiparty computation protocol are used to compute a second authentication key which replaces the first authentication key in the smart card.Type: ApplicationFiled: September 16, 2013Publication date: March 27, 2014Applicant: Alcatel LucentInventors: Serge Papillon, Haithem El Abed, Antony Martin, Abdullatif Shikfa
-
Publication number: 20120297478Abstract: A method for preventing the poisoning of at least one DNS cache (5—i) within a computer network (B) including several DNS caches (5—1, 5—i, 5—n), this method comprising a step of comparing at least two DNS responses to a DNS query, returned by two different DNS caches.Type: ApplicationFiled: January 18, 2011Publication date: November 22, 2012Inventors: Antony Martin, Serge Papillon
-
Publication number: 20100104085Abstract: A method for establishing communication between a calling party and a called party by means of user agents connected to communication networks (30) having a control unit (50), which method comprises the following steps: retrieving a communication session initiated by the calling party and controlled by the corresponding control unit, this session comprising an initialization request made by a user agent corresponding to the calling party and addressed to the called party, determining, based on the initialization request, an identifier corresponding to the called party and the communication format; based on the identifier, and based on at least one predetermined criterion, selecting a usable user agent from a predetermined list of user agents corresponding to the called party, adapting the session initiated by the calling party to the selected user agent, by at least: converting the identifier used by the calling party to designate the called party into an identifier compatible with the selected user agentType: ApplicationFiled: September 25, 2009Publication date: April 29, 2010Inventors: Serge Papillon, Sylvain Squedin
-
Publication number: 20090254947Abstract: A method is dedicated to providing interactive menus upon the request of a user communication terminal (T1), via a two-way communication network (R1). This method consists, when a terminal (T1, T?) is distributing a piece of content transmitted by the network (R1) on a one-way channel, of i) activating a dedicated function in a communication terminal (T1) so as to transmit to the network, over a two-way backchannel, a request requesting the transmission of an interactive menu related to the distributed content, ii) upon the receipt of said request, accessing first memorization means (BD) in which are stored first data related to said distributed content, iii) generating an interactive menu based on at least said first data related to said distributed content, and iv) transmitting said generated interactive menu to said requesting terminal (Ti) via said backchannel of the network (R1) so that it can display it and so that its user can select at least one of the elements it contains.Type: ApplicationFiled: November 27, 2006Publication date: October 8, 2009Inventors: Sylvain Squedin, Serge Papillon, Olivier Martinot
-
Publication number: 20090063156Abstract: A voice synthesis method, said method comprising a step of choosing a synthetic voice from among a set of voices having predetermined spectral signatures and a step of recording the natural voice of a first person, the method comprising a step of transforming the natural recorded voice so as to conform with the spectral signature of the chosen synthetic voice, the natural voice thereby transformed being recorded, said method comprising a step of determining at least one situation parameter for a first character from among a set of predefined parameters, each predefined parameter being associated with a spectral alteration of the emitted voice, the determined situation parameter particularly characterizing the environment or the physical or psychological state of the character, the method comprising a step of spectrally altering the transformed natural voice so as to conform with the spectral alteration associated with the character's situation parameter.Type: ApplicationFiled: August 26, 2008Publication date: March 5, 2009Applicant: Alcatel LucentInventors: Sylvain SQUEDIN, Serge Papillon
-
Publication number: 20080016560Abstract: The invention concerns an access control method for determining whether a given user (1) of a number of users may apply a given function of a set of functions to a given resource (2) among a plurality of resources, the resources being classified in accordance with at least one criterion. The inventive control access method comprises a step which consists in transmitting to an access control module (4) a message (5) including a user field (6) containing a group identifier of the given user, and a list of fields organized into at least one criterion field (14, 15), each criterion field containing the value of a criterion specific for the given resource.Type: ApplicationFiled: December 28, 2005Publication date: January 17, 2008Applicant: Alcatel LucentInventors: Serge Papillon, Sougandy Ragou, Francis Detot
-
Publication number: 20070174877Abstract: A device (DA) is dedicated to analyzing data relating to access to programs (or contents) that are transmitted by communication networks (R) to communication terminals (T1-T3) that are attached to them.Type: ApplicationFiled: September 7, 2006Publication date: July 26, 2007Inventors: Serge Papillon, Sylvain Squedin