Patents by Inventor Serge Adda
Serge Adda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12069068Abstract: A method for detecting a side attack of a target by a user comprising a step of recording data relating to a so-called sensitive file, the sensitive file being a configuration file of the target; a step of primary connection of the user on a proxy gateway to establish a secondary connection of the proxy gateway on the target; a step of verification of the integrity of the sensitive file, subsequently to the step of secondary connection of the proxy gateway on the target and when the integrity of the sensitive tile is determined as compromised by the step of verification of the integrity of the sensitive file, and a step of detection of a side attack of the target by the user.Type: GrantFiled: June 24, 2019Date of Patent: August 20, 2024Assignee: WALLIXInventors: Meng Tan, Serge Adda
-
Patent number: 12047364Abstract: A method for connecting an application to a resource by a command, the application being provided for configuring the resource by connecting to the resource by means of a program and configuration parameters, the program implementing a client side of a communication protocol, the method comprising the steps of executing the command when the program is called by the application, the command being interposed between the application and the program; receiving authentication data for accessing the resource, by querying a vault, on the basis of configuration parameters; establishing a connection between the command and the resource by executing the program, into which the authentication data for accessing the resource are input and the configuration parameters retrieved; and establishing a direct connection between the application and the resource.Type: GrantFiled: December 26, 2019Date of Patent: July 23, 2024Assignee: WALLIXInventor: Serge Adda
-
Patent number: 11477205Abstract: A method for automatically supplying a secure connection proxy with remote targets on the basis of privileged account data, includes a step of exploring, by a robot program, at least one domain for identifying the privileged accounts; a step of filtering the privileged accounts on the basis of criteria; steps of extracting characteristics from identified privileged accounts; and a step of supplying the proxy with the gathered data.Type: GrantFiled: July 20, 2017Date of Patent: October 18, 2022Assignee: WALLIXInventors: Eric Pinson, Serge Adda
-
Patent number: 11277500Abstract: A standard network protocol layer is integrated in a Web browser by compilation to Webassembly and use of a Websocket. A method for connecting a local client device to a remote computing resource, by establishing a computing session in accordance with a standard protocol includes: executing on the client device a Web browsing application; opening a first tunnel (websocket) with a server GATEWAY, wherein the opening of the first tunnel between the client device and the GATEWAY commands the opening of a network connection with the remote resource.Type: GrantFiled: November 7, 2017Date of Patent: March 15, 2022Assignee: WALLIXInventors: Christophe Grosjean, Serge Adda
-
Publication number: 20220078176Abstract: A method for connecting an application to a resource by a command, the application being provided for configuring the resource by connecting to the resource by means of a program and configuration parameters, the program implementing a client side of a communication protocol, the method comprising the steps of executing the command when the program is called by the application, the command being interposed between the application and the program; receiving authentication data for accessing the resource, by querying a vault, on the basis of configuration parameters; establishing a connection between the command and the resource by executing the program, into which the authentication data for accessing the resource are input and the configuration parameters retrieved; and establishing a direct connection between the application and the resource.Type: ApplicationFiled: December 26, 2019Publication date: March 10, 2022Inventor: Serge Adda
-
Patent number: 11157610Abstract: A method for accessing a secure computer resource by a computer application having no human-machine interaction for inputting authentication information comprises: a) a first initialization step comprising the creation of a temporary cryptographic key consisting of applying a cryptographic process to a plurality of information that is invariant over time and of encrypting, using the thus calculated key, authentication data of an account authorized to access a vault with passwords and b) steps for automatic access by the application to the secure computer resource consisting of creating a temporary cryptographic key consisting of applying a cryptographic process to the plurality of information that is invariant over time, reading the credentials file created during the initialization step and decrypting the credentials file with the temporary cryptographic key calculated in the preceding step, then transferring, to the calling application, the data coming from the computer resource.Type: GrantFiled: January 26, 2018Date of Patent: October 26, 2021Assignee: WALLIXInventor: Serge Adda
-
Publication number: 20210329017Abstract: A method for detecting a side attack of a target by a user comprising a step of recording data relating to a so-called sensitive file, the sensitive file being a configuration file of the target; a step of primary connection of the user on a proxy gateway to establish a secondary connection of the proxy gateway on the target; a step of verification of the integrity of the sensitive file, subsequently to the step of secondary connection of the proxy gateway on the target and when the integrity of the sensitive tile is determined as compromised by the step of verification of the integrity of the sensitive file, and a step of detection of a side attack of the target by the user.Type: ApplicationFiled: June 24, 2019Publication date: October 21, 2021Inventors: Meng Tan, Serge Adda
-
Publication number: 20210288969Abstract: A method for automatically supplying a secure connection proxy with remote targets on the basis of privileged account data, includes a step of exploring, by a robot program, at least one domain for identifying the privileged accounts; a step of filtering the privileged accounts on the basis of criteria; steps of extracting characteristics from identified privileged accounts; and a step of supplying the proxy with the gathered data.Type: ApplicationFiled: July 20, 2017Publication date: September 16, 2021Inventors: Eric Pinson, Serge Adda
-
Publication number: 20210099553Abstract: A standard network protocol layer is integrated in a Web browser by compilation to Webassembly and use of a Websocket. A method for connecting a local client device to a remote computing resource, by establishing a computing session in accordance with a standard protocol includes: executing on the client device a Web browsing application; opening a first tunnel with a server GATEWAY; wherein the opening of the first tunnel between the client device and the GATEWAY commands the opening of a network connection with the remote resource.Type: ApplicationFiled: November 7, 2017Publication date: April 1, 2021Inventors: Christophe Grosjean, Serge Adda
-
Patent number: 10594662Abstract: The application relates to a method for secure connection from a client computer device to a target computer resource comprising a server, comprising the following steps: the emission of a session-opening request by an application installed on the client station, leading to the creation of a primary session between the client station and the proxy gateway, the request containing either the identifier of the target server or the identifier of the target application; and the opening of a session between the proxy gateway and the server. The request-emission step is implemented by the prior opening of a primary session [RDP] between the client station and the proxy gateway by the transmission of a message containing the identifier of the target server or the identifier of the target application.Type: GrantFiled: September 20, 2016Date of Patent: March 17, 2020Assignee: WALLIXInventors: Raphaël Zhou, Serge Adda
-
Publication number: 20200074066Abstract: A method for accessing a secure computer resource by a computer application having no human-machine interaction for inputting authentication information comprises: a) a first initialization step comprising the creation of a temporary cryptographic key consisting of applying a cryptographic process to a plurality of information that is invariant over time and of encrypting, using the thus calculated key, authentication data of an account authorized to access a vault with passwords and b) steps for automatic access by the application to the secure computer resource consisting of creating a temporary cryptographic key consisting of applying a cryptographic process to the plurality of information that is invariant over time, reading the credentials file created during the initialization step and decrypting the credentials file with the temporary cryptographic key calculated in the preceding step, then transferring, to the calling application, the data coming from the computer resource.Type: ApplicationFiled: January 26, 2018Publication date: March 5, 2020Inventor: Serge Adda
-
Patent number: 10498733Abstract: A secure method connects to an application run on a server from a client computer device, by a user who does not have the authentication data of the account declared in the application, the account including at least one proxy ID. The disclosure also relates to the application and associated authentication data, implementing a proxy [mandatary gateway] including a memory for recording, for each user declared by a primary account comprising at least one user ID, the list of resource targets C and accounts to which the user has access.Type: GrantFiled: March 3, 2016Date of Patent: December 3, 2019Assignee: WallixInventors: Raphaël Zhou, Serge Adda
-
Publication number: 20180248849Abstract: The application relates to a method for secure connection from a client computer device to a target computer resource comprising a server, comprising the following steps: the emission of a session-opening request by an application installed on the client station, leading to the creation of a primary session between the client station and the proxy gateway, the request containing either the identifier of the target server or the identifier of the target application; and the opening of a session between the proxy gateway and the server. The request-emission step is implemented by the prior opening of a primary session [RDP] between the client station and the proxy gateway by the transmission of a message containing the identifier of the target server or the identifier of the target application.Type: ApplicationFiled: September 20, 2016Publication date: August 30, 2018Inventors: Raphaël Zhou, Serge Adda
-
Publication number: 20180083966Abstract: A secure method connects to an application run on a server from a client computer device, by a user who does not have the authentication data of the account declared in the application, the account including at least one proxy ID. The disclosure also relates to the application and associated authentication data, implementing a proxy [mandatary gateway] including a memory for recording, for each user declared by a primary account comprising at least one user ID, the list of resource targets C and accounts to which the user has access.Type: ApplicationFiled: March 3, 2016Publication date: March 22, 2018Applicant: WALLIXInventors: Raphaël ZHOU, Serge ADDA
-
Patent number: 9069823Abstract: A method is provided for managing a relational database of the SQL type for information technology and network infrastructure service information, including a method in which the following are created, in a system for managing a database of the MySQL type, a read-only data storage engine, and unmodifiable tables, for example of WORM, defined as “Write Once Read Many” type managed by the storage engine; each table includes a column of digital counting data called a “timestamp”; each table is partitioned by time intervals; partition files are grouped in subdirectories of a file system, these directories forming a tree structure, each node of which is uniquely identified from a timestamp.Type: GrantFiled: March 22, 2010Date of Patent: June 30, 2015Assignee: INFOVISTA SAInventors: Serge Adda, Olivier Chedru
-
Publication number: 20100250540Abstract: A method is provided for managing a relational database of the SQL type for information technology and network infrastructure service information, including a method in which the following are created, in a system for managing a database of the MySQL type, a read-only data storage engine, and unmodifiable tables, for example of WORM, defined as “Write Once Read Many” type managed by the storage engine; each table includes a column of digital counting data called a “timestamp”; each table is partitioned by time intervals; partition files are grouped in subdirectories of a file system, these directories forming a tree structure, each node of which is uniquely identified from a timestamp.Type: ApplicationFiled: March 22, 2010Publication date: September 30, 2010Inventors: Serge ADDA, Olivier CHEDRU
-
Publication number: 20050071456Abstract: A method of guaranteeing that a communication network server can reach an element that is remote from the network using a path or link which is automatically updated when the remote element is moved within the network. The method employs indirect addressing (lookup table), and is used, in particular, in network performance measuring systems.Type: ApplicationFiled: December 6, 2002Publication date: March 31, 2005Inventors: Serge Adda, Loic Mathieu