Patents by Inventor Jean-Marie Sommerlatt

Jean-Marie Sommerlatt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7188365
    Abstract: A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with the other device via a firewall device, are provided. The method and system may include obtaining an encryption parameter that is shared by the first device, second device and firewall device. A data packet sent by the first device may then be copied within the firewall device, so that decryption of the copy of the data packet within a portion of the firewall device may take place. In particular, the portion of the firewall device in which decryption takes place is defined such that contents of the portion are inaccessible to an operator of the firewall device. Thus, scanning of the decrypted copy of the data packet for compliance with a predetermined criterion may take place within the firewall device, without an operator of the firewall device having access to the contents of the data packet to be transmitted.
    Type: Grant
    Filed: April 4, 2002
    Date of Patent: March 6, 2007
    Assignee: AT&T Corp.
    Inventors: Joel Balissat, Claude Galand, Jean-Francois Le Pennec, Jean-Marie Sommerlatt
  • Publication number: 20070016947
    Abstract: A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with the other device via a firewall device, are provided. The method and system may include obtaining an encryption parameter that is shared by the first device, second device and firewall device. A data packet sent by the first device may then be copied within the firewall device, so that decryption of the copy of the data packet within a portion of the firewall device may take place. In particular, the portion of the firewall device in which decryption takes place is defined such that contents of the portion are inaccessible to an operator of the firewall device. Thus, scanning of the decrypted copy of the data packet for compliance with a predetermined criterion may take place within the firewall device, without an operator of the firewall device having access to the contents of the data packet to be transmitted.
    Type: Application
    Filed: September 22, 2006
    Publication date: January 18, 2007
    Inventors: Joel Balissat, Claude Galand, Jean-Francois Le Pennec, Jean-Marie Sommerlatt
  • Publication number: 20050283639
    Abstract: Method for performing the analysis of the characteristics of a data path from a first data processing device to a second data processing device through a network comprising at least an autonomous system consisting in defining a scenario file the scenario to be used, such a scenario including the actions to be used, building a parameter file defining the parameters to be used in the actions, running at least one analysis module based upon the actions of the scenario file and the parameters of the parameter file, the analysis module calling at least a predefined information requesting procedure, and storing in at least an output file the data resulting from the running of the analysis modules
    Type: Application
    Filed: August 11, 2003
    Publication date: December 22, 2005
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Nicolas Grisi, Jean-Marie Sommerlatt
  • Publication number: 20040250158
    Abstract: Data transmission system including at least a data transmission network (10, 12), at least a server (29), a plurality of users (16, 18, 20) able to be connected to the server in order to get data from it and at least a user being able to initiate a denial of service attack, the system further including a security network manager (30) and at least a detecting device for detecting abnormal operating conditions with respect to an operation of the system defined by predetermined parameters and transmitting detection messages to the security network manager, the security network manager activating filtering actions upon receiving the detection messages.
    Type: Application
    Filed: August 11, 2003
    Publication date: December 9, 2004
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Claude Galand, Jean-Marie Sommerlatt
  • Publication number: 20040205245
    Abstract: Data transmission system based upon the Internet protocol (IP) comprising a private transmission network (18) and a public transmission network or the like (16) interconnected by a network address translation device NAT (12) wherein at least a workstation WS (10) connected to said private transmission network has to establish a communication with a peer device (14) connected to the public transmission network, the local IP address of each data packet from the workstation WS being translated into a NAT address used to provide the route through the public transmission network. The system includes a registration server (19) connected to the public transmission network for registering the local IP address corresponding to the NAT address and providing the correspondence between the NAT address and the local IP address to the peer device in order for this one to replace in the IP header of each data packet received by the peer device, the NAT address by the local IP address.
    Type: Application
    Filed: August 11, 2003
    Publication date: October 14, 2004
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Nicolas Grisi, Jean-Marie Sommerlatt, Bernard Amadei
  • Publication number: 20040059909
    Abstract: Method of gaining secure access from a host (13) to Intranet resources provided by at least a content server (18) in a data transmission system wherein the host is connected to the content server through a gateway (17). Such a method consists in generating and sending at predetermined transmission instants from either the host or the gateway verification messages wherein each verification message contains a signature which depends upon the data exchanged between the host and the gateway since the preceding verification message, the host and the gateway also called peer devices having at their disposal a same algorithm defining which of them sends a verification message at each of the predetermined instants.
    Type: Application
    Filed: August 11, 2003
    Publication date: March 25, 2004
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Nicolas Grisi, Jean-Marie Sommerlatt
  • Publication number: 20040049701
    Abstract: Firewall system for interconnecting a first IP network (10) to a second IP network (16), these networks belonging to two different entities having each a different administration wherein any data packet transmitted/received by the first IP network is filtered by using a first firewall function and any data packet transmitted/received by the second IP network is filtered by using a second firewall function. The system comprises essentially a single firewall device (20) including filtering means (41, 43) performing both first firewall function and second firewall function, a console port (37) enabling the administrator in charge of each IP network to enter filtering rules for updating the associated firewall function and control means (39, 47, 49) interconnecting the console port and the filtering means for transmitting thereto the filtering rules so that each administrator may independently manage the system from the console port.
    Type: Application
    Filed: August 11, 2003
    Publication date: March 11, 2004
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Nicolas Grisi, Jean-Marie Sommerlatt
  • Publication number: 20040039823
    Abstract: Data transmission system comprising a help desk workstation (100) provided with the Telnet client function and connected to a Wide Area Network WAN (115) and to the Public Switched Telephone Network PSTN (130), and a Telnet manageable device (120) not provided with a modem and to which the help desk workstation may gain access by using the Telnet protocol. The system comprises a data processing device (110) provided with the proxy function and being connected to the PSTN and to the Telnet manageable device by the intermediary of a Local Area Network LAN (125), the data processing device including proxy means for completing a first Telnet connection with the help desk workstation through the PSTN and for establishing a second Telnet connection with the Telnet manageable device upon receiving a request from the help desk workstation to gain the Telnet access to the Telnet manageable device.
    Type: Application
    Filed: July 25, 2003
    Publication date: February 26, 2004
    Inventors: Jean-Francois Le Pennec, Aurelien Bruno, Nicolas Grisi, Jean-Marie Sommerlatt
  • Publication number: 20030191937
    Abstract: A method and system for implementing secure communications between a plurality of devices are provided. The method and system generally include the provision of at least one common encryption parameter to each of the plurality of devices, as well as an identification of the plurality of devices to one another. This information can be maintained and shared by interaction of the plurality of devices with a designated server device. In this way, a secure, point-to-point connection between at least two of the plurality of devices can be established.
    Type: Application
    Filed: April 4, 2002
    Publication date: October 9, 2003
    Inventors: Joel Balissat, Claude Galand, Jean-Francois Le Pennec, Jean-Marie Sommerlatt
  • Publication number: 20030191963
    Abstract: A method and system for implementing secure network communications between a first device and a second device, at least one of the devices communicating with the other device via a firewall device, are provided. The method and system may include obtaining an encryption parameter that is shared by the first device, second device and firewall device. A data packet sent by the first device may then be copied within the firewall device, so that decryption of the copy of the data packet within a portion of the firewall device may take place. In particular, the portion of the firewall device in which decryption takes place is defined such that contents of the portion are inaccessible to an operator of the firewall device. Thus, scanning of the decrypted copy of the data packet for compliance with a predetermined criterion may take place within the firewall device, without an operator of the firewall device having access to the contents of the data packet to be transmitted.
    Type: Application
    Filed: April 4, 2002
    Publication date: October 9, 2003
    Inventors: Joel Balissat, Claude Galand, Jean-Francois Le Pennec, Jean-Marie Sommerlatt
  • Publication number: 20030191843
    Abstract: A method and system for providing secure network connections are provided. When a device resides on a private network such that its address is not commonly available to other devices via a public network, a gateway, firewall or similar device can be used to preserve the address of the private network device in confidence while still allowing a secure, end-to-end connection between the public and private network devices. The gateway or similar device may negotiate separate secure connections, such as Security Associations, with each of the public and private network devices. In this way, encryption parameters of those two devices can be exchanged even though neither need be knowledgeable of the other's actual address. Moreover, the gateway or similar device can perform this function without itself gaining access to the content being transmitted between the public and private network devices.
    Type: Application
    Filed: April 4, 2002
    Publication date: October 9, 2003
    Inventors: Joel Balissat, Claude Galand, Jean-Francois Le Pennec, Jean-Marie Sommerlatt