Patents by Inventor Olivier Lemarie

Olivier Lemarie has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11552993
    Abstract: A method of collecting training data related to a branded phishing URL may comprise retrieving a phishing URL impersonating a brand; fetching a final webpage referenced thereby; determining the main language of the textual content thereof; rendering graphical representation(s) of the final webpage; extracting, from the source of URLs, information including the retrieved phishing URL, a brand, a type and a date associated therewith and storing the extracted information together with the final webpage and the rendered graphical representation(s). A message that contains a URL matching the phishing URL may then be retrieved. The main language of the textual content of the message may be determined and graphical representations thereof rendered. A record may be updated with the message, the main language and the rendered graphical representations, which may be made accessible as training data to train users to recognize phishing websites and messages.
    Type: Grant
    Filed: October 18, 2021
    Date of Patent: January 10, 2023
    Assignee: VADE USA, INCORPORATED
    Inventors: Adrien Gendre, Olivier Lemarié, Sébastien Goutal
  • Publication number: 20220109690
    Abstract: A method of collecting training data related to a branded phishing URL may comprise retrieving a phishing URL impersonating a brand; fetching a final webpage referenced thereby; determining the main language of the textual content thereof; rendering graphical representation(s) of the final webpage; extracting, from the source of URLs, information including the retrieved phishing URL, a brand, a type and a date associated therewith and storing the extracted information together with the final webpage and the rendered graphical representation(s). A message that contains a URL matching the phishing URL may then be retrieved. The main language of the textual content of the message may be determined and graphical representations thereof rendered. A record may be updated with the message, the main language and the rendered graphical representations, which may be made accessible as training data to train users to recognize phishing websites and messages.
    Type: Application
    Filed: October 18, 2021
    Publication date: April 7, 2022
    Inventors: Adrien GENDRE, Olivier LEMARIÉ, Sébastien GOUTAL
  • Patent number: 11184393
    Abstract: A method of collecting training data related to a branded phishing URL may comprise retrieving a phishing URL impersonating a brand; fetching a final webpage referenced thereby; determining the main language of the textual content thereof; rendering graphical representation(s) of the final webpage; extracting, from the source of URLs, information including the retrieved phishing URL, a brand, a type and a date associated therewith and storing the extracted information together with the final webpage and the rendered graphical representation(s). A message that contains a URL matching the phishing URL may then be retrieved. The main language of the textual content of the message may be determined and graphical representations thereof rendered. A record may be updated with the message, the main language and the rendered graphical representations, which may be made accessible as training data to train users to recognize phishing websites and messages.
    Type: Grant
    Filed: October 1, 2020
    Date of Patent: November 23, 2021
    Assignee: VADE SECURE INC.
    Inventors: Adrien Gendre, Olivier Lemarié, Sébastien Goutal
  • Patent number: 9729413
    Abstract: A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to preserve a second level domain, track requests for subdomains of the second level domain, determine the size of encoded subdomain data and determine the size of response data for subdomain requests. When the ratio of the number of unique subdomains versus the number of subdomain requests is over a first threshold a first satisfied condition is established. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds a second threshold and the size of response data exceeds a third threshold to establish a second satisfied condition corresponding to deemed domain name system tunnel activity. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds the second threshold to establish a third satisfied condition corresponding to deemed domain name system data exfiltration activity.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: August 8, 2017
    Assignee: Coudmark, Inc.
    Inventors: Neil Cook, Olivier Lemarié, Mark Richard Stemm
  • Publication number: 20160099954
    Abstract: A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to identify a resource attack in response to spikes in the number of unique subdomains being queried and spikes in the number of timeouts or delayed responses from a specified name server.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 7, 2016
    Applicant: CLOUDMARK, INC.
    Inventors: Neil Cook, Olivier Lemarié, Aaron Alexander Lehmann
  • Publication number: 20160099852
    Abstract: A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to preserve a second level domain, track requests for subdomains of the second level domain, determine the size of encoded subdomain data and determine the size of response data for subdomain requests. When the ratio of the number of unique subdomains versus the number of subdomain requests is over a first threshold a first satisfied condition is established. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds a second threshold and the size of response data exceeds a third threshold to establish a second satisfied condition corresponding to deemed domain name system tunnel activity. It is determined, in response to the first satisfied condition, when the size of the subdomain data exceeds the second threshold to establish a third satisfied condition corresponding to deemed domain name system data exfiltration activity.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 7, 2016
    Applicant: Cloudmark, Inc.
    Inventors: Neil Cook, Olivier Lemarié, Mark Richard Stemm
  • Patent number: 9294490
    Abstract: A machine includes a processor and a memory connected to the processor. The memory stores instructions executed by the processor to identify a resource attack in response to spikes in the number of unique subdomains being queried and spikes in the number of timeouts or delayed responses from a specified name server.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: March 22, 2016
    Assignee: Cloudmark, Inc.
    Inventors: Neil Cook, Olivier Lemarié, Aaron Alexander Lehmann
  • Patent number: 8429444
    Abstract: A multipurpose storage system based upon a distributed hashing mechanism with transactional support and failover capability is disclosed. According to one embodiment, a system comprises a client system in communication with a network, a secondary storage system in communication with the network, and a supervisor system in communication with the network. The supervisor system assigns a unique identifier to a first node system and places the first node system in communication with the network in a location computed by using hashing. The client system stores a data object on the first node system.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: April 23, 2013
    Assignee: Scality, S.A.
    Inventors: Vianney Rancurel, Olivier Lemarie, Giorgio Regni, Alain Tauch, Benoit Artuso, Jonathan Gramain, Bertrand Demiddelaer
  • Publication number: 20100162035
    Abstract: A multipurpose storage system based upon a distributed hashing mechanism with transactional support and failover capability is disclosed. According to one embodiment, a system comprises a client system in communication with a network, a secondary storage system in communication with the network, and a supervisor system in communication with the network. The supervisor system assigns a unique identifier to a first node system and places the first node system in communication with the network in a location computed by using hashing. The client system stores a data object on the first node system.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 24, 2010
    Inventors: Vianney Rancurel, Olivier Lemarie, Giorgio Regni, Alain Tauch, Benoit Artuso, Jonathan Gramain, Bertrand Demiddelaer