Patents by Inventor Jean Diaconu

Jean Diaconu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250080530
    Abstract: In one embodiment, a method comprises accessing information associated with a user that is trying to login to an application, generating a first session identifier corresponding to the information, sending a first notification to an authentication client that the user is trying to login using an authentication service, receiving a first request from an authentication provider for authenticating a second session identifier, determining that the second session identifier is identical to the first session identifier by comparing the second session identifier with stored first session identifier, and causing the authentication provider to patch one or more authentication tokens with the information regarding the tenant, where the one or more authentication tokens are used for accessing the application.
    Type: Application
    Filed: August 31, 2023
    Publication date: March 6, 2025
    Inventors: Marco Trinelli, Mohamed Tahar Kedjour, Jean Diaconu, Márk Sági-Kazár, Sándor Szilárd Magyari
  • Publication number: 20240273187
    Abstract: In one embodiment, a method for storing auditable metadata, by a system, includes receiving incoming signals communicated from at least one application service to a first pod associated with a user space of a node. The method further includes extracting metadata associated with data provided by the received incoming signals. The method further includes receiving outgoing signals communicated from the first pod to an external entity, wherein the incoming signals and the outgoing signals are received by a listener module. The method further includes comparing the incoming signals to the outgoing signals to detect a variation and determining that the data has been transmitted to the external entity based on a determination that there is no detected variation from the comparison between the incoming signals and the outgoing signals.
    Type: Application
    Filed: May 31, 2023
    Publication date: August 15, 2024
    Inventors: Marcelo Yannuzzi, Jean Diaconu, Jeffrey M. Napper, Herve Muyal, Hendrikus G. P. Bosch
  • Publication number: 20240265112
    Abstract: A system and a method to map attack paths in a visualization interface may include storing in a memory asset inventory indicating application assets, attack vector parameters configured to indicate vulnerabilities of one or more of the application assets, and asset mapping information. A processor may determine multiple vulnerable assets in the application assets based at least in part upon the attack vector parameters. Further, the processor may obtain security parameters from a security framework indicating one or more attack techniques, associate each of the vulnerable assets to one or more of the security parameters, and generate a visual interface showing the vulnerable assets and the security parameters. The processor may determine an attack path connecting the vulnerable assets based at least in part upon the asset mapping information, and map the attack path to the application layers and the security parameters in the visual interface.
    Type: Application
    Filed: June 6, 2023
    Publication date: August 8, 2024
    Inventors: Jeffrey M. Napper, Hendrikus G. P. Bosch, Jean Diaconu, Marcelo Yannuzzi, Alessandro Duminuco, Guillaume Sauvage De Saint Marc, Marc Scibelli
  • Publication number: 20240265113
    Abstract: A system and a method to determine attack paths to application assets may include storing in a memory asset inventory indicating multiple application assets, multiple attack vector parameters configured to indicate vulnerabilities of one or more of the application assets, and asset mapping information configured to associate each of the application assets to one or more of the application layers. A processor may determine multiple vulnerable assets in the application assets based at least in part upon the attack vector parameters. Further, the processor may determine feasibility parameters that indicate a likelihood of the attack path to occur in the system, generate a visual interface showing the vulnerable assets, determine an attack path connecting the vulnerable assets based at least in part upon the asset mapping information, and map the attack path to the application layers in the visual interface based at least in part upon the feasibility parameters.
    Type: Application
    Filed: June 6, 2023
    Publication date: August 8, 2024
    Inventors: Jeffrey M. Napper, Hendrikus G. P. Bosch, Jean Diaconu, Marcelo Yannuzzi, Alessandro Duminuco