Patents by Inventor Jose Maria ALONSO CEBRIAN
Jose Maria ALONSO CEBRIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11418486Abstract: A method and system for controlling internet browsing user security is provided. A control device (120) receives, via a first communication channel, a web page request from a control agent (102) implemented in a browser (101), the browser (101) being installed in a computer device operated by a user. Then, the control device (120) requests, to a control service (130), via a second communication channel, a security level of said requested web page including a status of the user and the presence of risks in the requested web page. The control service (130) executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device (120) allows or denies access to said web page.Type: GrantFiled: February 11, 2020Date of Patent: August 16, 2022Assignee: TELEFONICA CYBERSECURITY TECH S.L.Inventors: Victor Manuel Mundilla Garcia, Aruna Prem Bianzino, Jose Maria Alonso Cebrian, Sergio De Los Santos Vilchez
-
Patent number: 11317277Abstract: The present invention proposes a method, device and system for protecting the connection to a wireless network (a WiFi network) by users of electronic communications devices, even the first time the user device connects to the network. The proposed method, device and system provides an improved security when connecting to a WiFi network, avoiding attacks that may jeopardize the security, confidentiality, integrity and availability of WiFi users and WiFi infrastructure. In the proposed solution, the network will be certified by the user device before connecting to an access point for accessing the wireless network.Type: GrantFiled: May 27, 2020Date of Patent: April 26, 2022Assignee: Telefonica Cybersecurity & Cloud Tech S.L.U.Inventors: José María Alonso Cebrian, Aruna Prem Bianzino, Pablo González Pérez, Sergio De Los Santos Vilchez
-
Patent number: 10897353Abstract: The invention relates to a computer-implemented method for generating passwords and to computer program products of same. The method comprises: accessing, by a user (100), by means of a first computation device (200), for the first time, a webpage or website identified by a web domain that requires the Identification of the user (100) on the webpage or website; and generating, by means of a password generator, a password required by the webpage or website, based on the use of a result obtained from the execution of a cryptographic function using password policies related to the domain, the use of a master password (101) known only to the user (100) and the use of an Id_Hash (208).Type: GrantFiled: April 19, 2016Date of Patent: January 19, 2021Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: Ricardo Martín Rodríguez, Sergio De Los Santos Vilchez, Carmen Torrano Giménez, Antonio Guzmán Sacristán, José María Alonso Cebrián
-
Publication number: 20200382952Abstract: The present invention proposes a method, device and system for protecting the connection to a wireless network (a WiFi network) by users of electronic communications devices, even the first time the user device connects to the network. The proposed method, device and system provides an improved security when connecting to a WiFi network, avoiding attacks that may jeopardize the security, confidentiality, integrity and availability of WiFi users and WiFi infrastructure. In the proposed solution, the network will be certified by the user device before connecting to an access point for accessing the wireless network.Type: ApplicationFiled: May 27, 2020Publication date: December 3, 2020Applicant: Telefonica Digital España, S.L.U.Inventors: José María ALONSO CEBRIAN, Aruna Prem BIANZINO, Pablo GONZÁLEZ PÉREZ, Sergio DE LOS SANTOS VILCHEZ
-
Publication number: 20200259791Abstract: A method and system for controlling internet browsing user security is provided. A control device (120) receives, via a first communication channel, a web page request from a control agent (102) implemented in a browser (101), the browser (101) being installed in a computer device operated by a user. Then, the control device (120) requests, to a control service (130), via a second communication channel, a security level of said requested web page including a status of the user and the presence of risks in the requested web page. The control service (130) executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device (120) allows or denies access to said web page.Type: ApplicationFiled: February 11, 2020Publication date: August 13, 2020Applicant: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: Victor Manuel MUNDILLA GARCIA, Aruna Prem BIANZINO, Jose Maria ALONSO CEBRIAN, Sergio DE LOS SANTOS VILCHEZ
-
Patent number: 10334065Abstract: A method for detecting applications of mobile user terminals, comprising: parsing files of an app to obtain domains of requests and splitting every domain into words to generate an app signature, weighting the words to obtain their frequency, splitting the mobile traffic into traffic blocks and each traffic block into words, generating a traffic vector for each block by including the repetition or frequency of each word in the block, comparing the generated traffic vectors with the generated signature by applying a similarity method to obtain the number of times that the signature is detected in the traffic vectors of a mobile terminal, estimating a probability of a user having the app installed in the mobile terminal, applying a threshold on the probability to discard wrongly detected applications.Type: GrantFiled: May 16, 2018Date of Patent: June 25, 2019Assignee: Telefónica, S.A.Inventors: Julia Llanos Alonso, Antonio Guzmán Sacristán, José Maria Alonso Cebrián
-
Publication number: 20190123898Abstract: The invention relates to a computer-implemented method for generating passwords and to computer program products of same. The method comprises: accessing, by a user (100), by means of a first computation device (200), for the first time, a webpage or website identified by a web domain that requires the Identification of the user (100) on the webpage or website; and generating, by means of a password generator, a password required by the webpage or website, based on the use of a result obtained from the execution of a cryptographic function using password policies related to the domain, the use of a master password (101) known only to the user (100) and the use of an Id_Hash (208).Type: ApplicationFiled: April 19, 2016Publication date: April 25, 2019Applicant: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: Ricardo MARTÍN RODRÍGUEZ, Sergio DE LOS SANTOS VILCHEZ, Carmen TORRANO GIMÉNEZ, Antonio GUZMÁN SACRISTÁN, José María ALONSO CEBRIÁN
-
Publication number: 20180338010Abstract: A method for detecting applications of mobile user terminals, comprising parsing the files of an app to obtain the domains of its requests and splitting every domain into words to generate an app signature (1), weighting (2) the words to obtain their frequency, splitting the mobile traffic (3) into traffic blocks and splitting each traffic block (4) into words, generating a traffic vector for each block by including its words and the repetition or frequency (5) of each word in the block, comparing the generated traffic vectors with the generated signature (1) by applying the similarity method (6) to obtain the number of times that the signature (1) of each app is detected in the traffic vectors of a mobile terminal, estimating a probability (7) of a user having each app installed in the mobile terminal, applying a threshold (8) on the probability (7) to discard wrongly detected applications.Type: ApplicationFiled: May 16, 2018Publication date: November 22, 2018Inventors: Julia LLANOS ALONSO, Antonio GUZMÁN SACRISTÁN, José Maria ALONSO CEBRIÁN
-
Patent number: 10063543Abstract: The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and authenticating said request by verifying user identification information of said user, wherein a second server in connection with a user computing device with a dedicated program is used for: receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication; verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status to said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid.Type: GrantFiled: June 23, 2014Date of Patent: August 28, 2018Assignee: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Jose Maria Alonso Cebrian, David Barroso Berrueta, Jose Maria Palazon Romero, Antonio Guzman Sacristan
-
Patent number: 9860248Abstract: The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and reinforcing an authentication factor mechanism by including a biometric identity verification of biometric information of the user.Type: GrantFiled: June 23, 2014Date of Patent: January 2, 2018Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: José Maria Palazón Romero, Antonio Guzmán Sacristán, David Barroso Berrueta, José María Alonso Cebrián, Daniel Kachakil Dib
-
Patent number: 9832192Abstract: A computer implemented method and computer program products to prevent attacks against authorization systems The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server. The computer programs implement the method.Type: GrantFiled: June 23, 2014Date of Patent: November 28, 2017Assignee: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Jose Maria Alonso Cebrian, David Barroso Berrueta, Jose Maria Palazon Romero, Antonio Guzman Sacristan
-
Patent number: 9634841Abstract: A computer implemented method including a software distributor signing via a first server at least one software file using a digital certificate with a digital signature and at least one user via a computing device acquiring a copy of the signed software file. The digital certificate to be used is previously recorded in a second server in communication with the first server, the digital certificate to be recorded being provided by the software distributor upon a registration of the latter in the second server and including information obtained from a trust certificate chain associated to the digital certificate when performing the registration. The second server generates, upon a request made by the software distributor, a hashstamp of the signed software file.Type: GrantFiled: December 3, 2014Date of Patent: April 25, 2017Assignee: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Sergio De Los Santos, David Barroso Berrueta, Antonio Guzman Sacristan, Tero De La Rosa, Jose Maria Alonso Cebrian
-
Publication number: 20160277395Abstract: The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and reinforcing an authentication factor mechanism by including a biometric identity verification of biometric information of the user.Type: ApplicationFiled: June 23, 2014Publication date: September 22, 2016Applicant: TELEFONICA DIGITAL ESPAÑA, S.L.U.Inventors: José Maria PALZÓN ROMERO, Antonio GUZMÁN SACRISTÁN, David BARROSO BERRUETA, José Maria ALONSO CEBRIÁN, Daniel KACHAKIL DIB
-
Publication number: 20160156598Abstract: A computer implemented method and computer program products to improve security in authentication/authorization systems The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and a defining a secure channel for certificate exchange for authentication. The computer programs implement the method.Type: ApplicationFiled: June 23, 2014Publication date: June 2, 2016Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Jose Maria ALONSO CEBRIAN, David BARROSO BERRUETA, Jose Maria PALAZON ROMERO, Antonio GUZMAN SACRISTAN
-
Publication number: 20160021174Abstract: A computer implemented method for classifying mobile applications and computer programs thereof.Type: ApplicationFiled: July 16, 2015Publication date: January 21, 2016Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Sergio DE LOS SANTOS VILCHEZ, Antonio GUZMAN SACRISTAN, David BARROSO BERRUETA, Jose Maria ALONSO CEBRIAN
-
Publication number: 20150156024Abstract: A computer implemented method including a software distributor signing via a first server at least one software file using a digital certificate with a digital signature and at least one user via a computing device acquiring a copy of the signed software file. The digital certificate to be used is previously recorded in a second server in communication with the first server, the digital certificate to be recorded being provided by the software distributor upon a registration of the latter in the second server and including information obtained from a trust certificate chain associated to the digital certificate when performing the registration. The second server generates, upon a request made by the software distributor, a hashstamp of the signed software file.Type: ApplicationFiled: December 3, 2014Publication date: June 4, 2015Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Sergio DE LOS SANTOS, David BARROSO BERRUETA, Antonio GUZMAN SACRISTAN, Tero DE LA ROSA, Jose Maria ALONSO CEBRIAN
-
Publication number: 20140380431Abstract: A computer implemented method and computer program products to prevent attacks against authorization systems The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server. The computer programs implement the method.Type: ApplicationFiled: June 23, 2014Publication date: December 25, 2014Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Jose Maria ALONSO CEBRIAN, David BARROSO BERRUETA, Jose Maria PALAZON ROMERO, Antonio GUZMAN SACRISTAN
-
Publication number: 20140380453Abstract: The computer implemented method comprising: receiving a first server a request in the name of a user to be logged into a service of said first server and authenticating said request by verifying user identification information of said user, wherein a second server in connection with a user computing device with a dedicated program is used for: receiving a request about a status associated to said user; initializing a credential exchange in order to provide mutual authentication; verifying said associated status that has been previously set as valid or as invalid by said user; and sending said associated status to said first server wherein the latter allows the logging of said request or rejects it if said associated status is set as valid or as invalid.Type: ApplicationFiled: June 23, 2014Publication date: December 25, 2014Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.Inventors: Jose Maria ALONSO CEBRIAN, David BARROSO BERRUETA, Jose Maria PALAZON ROMERO, Antonio GUZMAN SACRISTAN