Patents by Inventor Philippe Hebrais

Philippe Hebrais has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8769619
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Grant
    Filed: December 11, 2012
    Date of Patent: July 1, 2014
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Patent number: 8356189
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Grant
    Filed: August 23, 2010
    Date of Patent: January 15, 2013
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Publication number: 20100318813
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Application
    Filed: August 23, 2010
    Publication date: December 16, 2010
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Patent number: 7783901
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Grant
    Filed: February 25, 2008
    Date of Patent: August 24, 2010
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Publication number: 20080155278
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Application
    Filed: February 25, 2008
    Publication date: June 26, 2008
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Patent number: 7346783
    Abstract: The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    Type: Grant
    Filed: December 5, 2001
    Date of Patent: March 18, 2008
    Assignee: AT&T Corp.
    Inventors: Sandra Lynn Carrico, Philippe Hebrais
  • Publication number: 20030135616
    Abstract: Transmission of IPsec packets from a first IP sec client (12, 120) to a second IPsec client (14, 140) can occur without adverse results due to traversal of a Network Address Translation (NAT) (22, 2501, 2502) device, by wrapping the packet in a non-proprietary tunneling protocol format for transmission to a non-proprietary tunneling protocol format server (16, 160). The server creates a non-proprietary tunneling protocol format tunnel (21, 2801, 2802) to the destination IPsec client to allow transmission of the packet through the tunnel so as to avoid any deleterious affects associated by traversal of one or more the NAT devices.
    Type: Application
    Filed: January 11, 2002
    Publication date: July 17, 2003
    Inventors: Sandra Lynn Carrico, Philippe Hebrais