Patents by Inventor Fabien Bignon

Fabien Bignon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10757118
    Abstract: A method for aiding detection of infection of a terminal by malware. The method includes: reception of a current request originating from the terminal asking for access to a resource of a network; detection that the resource requested is malevolent; when the current request includes a reference to an initial resource, verification that access to the initial resource has been requested from the terminal in at least one earlier request, the initial resource having been detected legitimate during processing of the earlier request; and wherein the current request being then considered to be an attempt to infect the terminal.
    Type: Grant
    Filed: October 10, 2016
    Date of Patent: August 25, 2020
    Assignee: ORANGE
    Inventors: Karel Mittig, Fabien Bignon
  • Publication number: 20180316697
    Abstract: A method for aiding detection of infection of a terminal by malware. The method includes: reception of a current request originating from the terminal asking for access to a resource of a network; detection that the resource requested is malevolent; when the current request includes a reference to an initial resource, verification that access to the initial resource has been requested from the terminal in at least one earlier request, the initial resource having been detected legitimate during processing of the earlier request; and wherein the current request being then considered to be an attempt to infect the terminal.
    Type: Application
    Filed: October 10, 2016
    Publication date: November 1, 2018
    Inventors: Karel Mittig, Fabien Bignon
  • Patent number: 10091223
    Abstract: The invention concerns a method for detecting anomalies in network traffic, said traffic being transmitted by a server (10) in response to requests from at least one client device (11), the method comprising: —a step (E10) of receiving a request, said request being of a given type, —a step (E11) of receiving a response to the request, —a step (E13) of constructing a current bit vector (VN), representative of the response, —a step (E17) of calculating a similarity index representative of a distance between the current bit vector and a model bit vector (Vmod) associated with the request type, —a step of checking (E18) that the similarity index (Isc) does not belong to a compliance interval (IC) calculated for the request type, an anomaly being detected when the similarity index does not belong to the compliance interval.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: October 2, 2018
    Assignee: Orange
    Inventors: Karel Mittig, Fabien Bignon
  • Patent number: 9866577
    Abstract: A method for detecting intrusions on a set of virtual resources in a computer system including at least one physical machine hosting the set of virtual resources. The method includes: calculating an intrusion detection itinerary defined by a sequence of virtual resources from the set, the virtual resources being integrated and arranged in the sequence on the basis of respective vulnerability criticality levels assigned to the virtual resources of the set; and carrying out an intrusion detection operation, following the calculated itinerary.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: January 9, 2018
    Assignee: ORANGE
    Inventors: Sylvie Laniepce, Fabien Bignon, Karel Mittig
  • Patent number: 9536077
    Abstract: A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said set of virtual machines. The method includes: receiving an attack detection message regarding a virtual machine, triggering a first migration of the virtual machine from the first host server toward a security system, and receiving an attack treatment message regarding the migrated virtual machine.
    Type: Grant
    Filed: June 21, 2012
    Date of Patent: January 3, 2017
    Assignee: ORANGE
    Inventors: Fabien Bignon, Sylvie Laniepce, Karel Mittig
  • Publication number: 20160219069
    Abstract: The invention concerns a method for detecting anomalies in network traffic, said traffic being transmitted by a server (10) in response to requests from at least one client device (11), the method comprising: a step (E10) of receiving a request, said request being of a given type, a step (E11) of receiving a response to the request, a step (E13) of constructing a current bit vector (VN), representative of the response, a step (E17) of calculating a similarity index representative of a distance between the current bit vector and a model bit vector (Vmod) associated with the request type, a step of checking (E18) that the similarity index (Isc) does not belong to a compliance interval (IC) calculated for the request type, an anomaly being detected when the similarity index does not belong to the compliance interval.
    Type: Application
    Filed: September 25, 2014
    Publication date: July 28, 2016
    Inventors: Karel Mittig, Fabien Bignon
  • Publication number: 20140223556
    Abstract: A method is provided for attack detection and protection of a set of virtual machines in a system, which includes at least one first host server hosting said set of virtual machines. The method includes: receiving an attack detection message regarding a virtual machine, triggering a first migration of the virtual machine from the first host server toward a security system, and receiving an attack treatment message regarding the migrated virtual machine.
    Type: Application
    Filed: June 21, 2012
    Publication date: August 7, 2014
    Applicant: ORANGE
    Inventors: Fabien Bignon, Sylvie Laniepce, Karel Mittig
  • Publication number: 20140189868
    Abstract: A method for detecting intrusions on a set of virtual resources in a computer system including at least one physical machine hosting the set of virtual resources. The method includes: calculating an intrusion detection itinerary defined by a sequence of virtual resources from the set, the virtual resources being integrated and arranged in the sequence on the basis of respective vulnerability criticality levels assigned to the virtual resources of the set; and carrying out an intrusion detection operation, following the calculated itinerary.
    Type: Application
    Filed: May 7, 2012
    Publication date: July 3, 2014
    Applicant: ORANGE
    Inventors: Sylvie Laniepce, Fabien Bignon, Karel Mittig