Patents by Inventor Nicolas BEAUCHESNE

Nicolas BEAUCHESNE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150264061
    Abstract: Approaches for detecting network intrusions, such as malware infection, Trojans, worms, or bot net mining activities includes: identifying one or more threat detections in session datasets, the session datasets corresponding to network traffic from a plurality of hosts; determining a layered detection score, the layered detection score corresponding to a certainty score and threat score; determining a layered host score, the layered host score corresponding to a certainty score and threat score; and generating alarm data comprising the layered detection score and the layered host score. In some embodiments, the network traffic may be received passively through a network switch; for example, by “tapping” the switch. Other additional objects, features, and advantages of the invention are described in the detailed description, figures and claims.
    Type: Application
    Filed: March 10, 2015
    Publication date: September 17, 2015
    Applicant: VECTRA NETWORKS, INC.
    Inventors: Oskar IBATULLIN, Ryan James PRENGER, Nicolas BEAUCHESNE, Karl Matthew LYNN, Oliver Kourosh TAVAKOLI
  • Publication number: 20100042834
    Abstract: A method performed by a network device may include generating and storing a first public key and a first private key in a first device, transmitting a serial number and the first public key from the first device to a second device, generating, by the second device, a second public key and a second private key, transmitting the second public key from the second device to the first device and transmitting the serial number, the first public key, the second public key and the second private key to a third device, establishing and authenticating a connection between the first device and the third device using the first public key and the second public key and transmitting encrypted configuration information with the two key pairs from the third device to the first device.
    Type: Application
    Filed: August 12, 2008
    Publication date: February 18, 2010
    Applicant: JUNIPER NETWORKS INC.
    Inventors: Eric MORET, Robert HUBBARD, Kent A. WATSEN, Muku MURTHY, Nicolas BEAUCHESNE