Patents Assigned to IDECSI
  • Patent number: 10027679
    Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: July 17, 2018
    Assignee: IDECSI
    Inventors: Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue
  • Patent number: 9723013
    Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: August 1, 2017
    Assignee: IDECSI SAS
    Inventors: Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue
  • Publication number: 20130347125
    Abstract: A system for identify threats to the security of an owner's electronic information by performing a secondary background authorization (SABA) that is transparent to the requester to verify or flag unauthorized access to systems, data or company offices being requested. The secondary background authorization relies on a proprietary security, big data pattern-matching, and modeling approach made possible by the creation, expansion, and analysis of new “data streams” that, together with Operating systems, applications, and devices data, uniquely allows the system to determine a security access risk and provide information to the owner.
    Type: Application
    Filed: August 31, 2012
    Publication date: December 26, 2013
    Applicant: IDECSI
    Inventors: Daniel Rezlan, Jeremie Collonge, Luc Dubrois, Thibault Hue