Patents by Inventor Sergio DE LOS SANTOS

Sergio DE LOS SANTOS has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11917405
    Abstract: A method and system for user authentication through mobility traces comprising: retrieving and processing (401, 411) data records stored in a network events database (14), the data records comprising data of one or more interactions (101) of the user with at least one network element (12) through a mobile device (11) of the user, a timestamp (T) associated with the recorded interactions, a unique identifier of the mobile device (11), a unique identifier of the user and a unique identifier of the network element (12); computing (103) at least one network interaction track, NIT, by using the retrieved data; using the at least one computed NIT (402, 412) to obtain an authentication result, e.g., based on a computed authentication probability (Pi), indicating either a success or a failure of the user authentication to be returned to a third-party service provider (21) requesting the user authentication status check (202, 302).
    Type: Grant
    Filed: March 2, 2022
    Date of Patent: February 27, 2024
    Assignee: Telefónica Cybersecurity & Cloud Tech, S.L.U.
    Inventors: Nicolas Kourtellis, Aruna Prem Bianzino, Sergio De Los Santos Vilchez
  • Publication number: 20240056809
    Abstract: A method and system for providing identity and authentication to a data-generation device is disclosed. The method comprises the provision, by a computing platform, of a beacon for a data-generation device, said beacon including an identification code and providing the data-generation device with connection and security functions; activating, by means of the computing platform, the data-generation device by using and verifying a physical access challenge; verifying, by means of the beacon, a state of activation of the data-generation device by using the identification code; providing, by means of the computing platform, a digital certificate to the beacon; and sending, by means of the beacon, a security verification to the platform, such that the data-generation device can securely establish future communications with remote computer equipment.
    Type: Application
    Filed: September 22, 2021
    Publication date: February 15, 2024
    Applicant: TELEFONICA CYBERSECURITY & CLOUD TECH S.L.U.
    Inventors: Sergio DE LOS SANTOS VÍLCHEZ, Álvaro NÚÑEZ-ROMERO CASADO, Alberto TEN MORÓN, Enrique ORTIZ ENRÍQUEZ DE SALAMANCA
  • Publication number: 20220392240
    Abstract: A method and computer programs for detecting document regions that will be excluded from a watermark embedding process are disclosed. The method comprises converting, by an adapter module, at least one page of a received document into a visual representation thereof, the visual representation keeping the position of the characters of the at least one page; receiving, by a text detector, the visual representation; processing, by the text detector, the visual representation using one or more artificial intelligence algorithms, and returning a list of invalid regions with their associated page positions as a result, wherein each invalid region of the list of invalid regions may have associated thereto a confidence score; and using, by a watermark embedding module or by a watermark extracting module, the list of invalid regions to provide a watermarked document or a message embedded in the document.
    Type: Application
    Filed: June 2, 2022
    Publication date: December 8, 2022
    Applicant: TELEFONICA CYBERSECURITY & CLOUD TECH S.L.U.
    Inventors: Aruna Prem BIANZINO, Juan ELOSUA TOME, Diego PEREZ VIEITES, Sergio DE LOS SANTOS VILCHEZ
  • Publication number: 20220391893
    Abstract: It is proposed a method and system to improve the security of electronic messages exchange between two or more users. The proposed electronic messaging mechanism allows guaranteeing the integrity of a message exchange (i.e., no message has been added, modified, reordered, nor removed from the message exchange), as well as its non-repudiation (i.e., users are univocally associated with the message exchange and cannot deny being authors of the messages they sent), using a local or external blockchain.
    Type: Application
    Filed: November 13, 2020
    Publication date: December 8, 2022
    Applicant: Telefonica Cybersecurity & Cloud Tech S.L.U.
    Inventors: Félix BREZO FERNÁNDEZ, Yaiza RUBIO VIÑUELA, Aruna Prem BIANZINO, José TORRES VELASCO, Sergio DE LOS SANTOS
  • Patent number: 11469899
    Abstract: A system and a method for user authentication and/or authorization, including a passive card to encode a first portion of an authentication or authorization code for a user via capacitive points, and a portable computing device with a capacitive screen to encode a second portion of the code. Each capacitive point is connected to an electronic circuit, being activable by physical contact of the user or with an electrical ground. Once the user has requested access to a specific service or operation, and when at least some of the passive points are activated and the passive card is in contact with the capacitive screen, the device reads the capacitive points, decoding the first portion of the code, and cryptographically signs the decoded portion using the second portion, providing the code, which is used as cryptographic key to grant access to the service or operation.
    Type: Grant
    Filed: September 14, 2020
    Date of Patent: October 11, 2022
    Assignee: TELEFONICA CYBERSECURITY TECH S.L.
    Inventors: Sergio De Los Santos Vilchez, Aruna Prem Bianzino, Jose Torres Velasco, Enrique Rando Carrion
  • Publication number: 20220286852
    Abstract: A method and system for user authentication through mobility traces comprising: retrieving and processing (401, 411) data records stored in a network events database (14), the data records comprising data of one or more interactions (101) of the user with at least one network element (12) through a mobile device (11) of the user, a timestamp (T) associated with the recorded interactions, a unique identifier of the mobile device (11), a unique identifier of the user and a unique identifier of the network element (12); computing (103) at least one network interaction track, NIT, by using the retrieved data; using the at least one computed NIT (402, 412) to obtain an authentication result, e.g., based on a computed authentication probability (Pi), indicating either a success or a failure of the user authentication to be returned to a third-party service provider (21) requesting the user authentication status check (202, 302).
    Type: Application
    Filed: March 2, 2022
    Publication date: September 8, 2022
    Applicant: Telefónica Cybersecurity & Cloud Tech, S.L.U.
    Inventors: Nicolas KOURTELLIS, Aruna Prem BIANZINO, Sergio DE LOS SANTOS VILCHEZ
  • Patent number: 11418486
    Abstract: A method and system for controlling internet browsing user security is provided. A control device (120) receives, via a first communication channel, a web page request from a control agent (102) implemented in a browser (101), the browser (101) being installed in a computer device operated by a user. Then, the control device (120) requests, to a control service (130), via a second communication channel, a security level of said requested web page including a status of the user and the presence of risks in the requested web page. The control service (130) executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device (120) allows or denies access to said web page.
    Type: Grant
    Filed: February 11, 2020
    Date of Patent: August 16, 2022
    Assignee: TELEFONICA CYBERSECURITY TECH S.L.
    Inventors: Victor Manuel Mundilla Garcia, Aruna Prem Bianzino, Jose Maria Alonso Cebrian, Sergio De Los Santos Vilchez
  • Patent number: 11317277
    Abstract: The present invention proposes a method, device and system for protecting the connection to a wireless network (a WiFi network) by users of electronic communications devices, even the first time the user device connects to the network. The proposed method, device and system provides an improved security when connecting to a WiFi network, avoiding attacks that may jeopardize the security, confidentiality, integrity and availability of WiFi users and WiFi infrastructure. In the proposed solution, the network will be certified by the user device before connecting to an access point for accessing the wireless network.
    Type: Grant
    Filed: May 27, 2020
    Date of Patent: April 26, 2022
    Assignee: Telefonica Cybersecurity & Cloud Tech S.L.U.
    Inventors: José María Alonso Cebrian, Aruna Prem Bianzino, Pablo González Pérez, Sergio De Los Santos Vilchez
  • Patent number: 11301565
    Abstract: The present invention relates to the detection of malicious software in electronic documents and comprises: detecting an executable code in the electronic document provided to a client module; extracting information from the electronic document comprising the executable code and metadata of the electronic document; creating a binary vector associated with the electronic document; comparing, in a classifier module (200), the binary vector with one or more groups of vectors previously classified and stored in a database (400); classifying the vector in one of the groups, where each group has associated therewith a verdict about the presence of malicious software; and determining that the document contains malicious software depending on the verdict associated with the group in which its associated vector has been classified.
    Type: Grant
    Filed: December 19, 2016
    Date of Patent: April 12, 2022
    Assignee: Telefonica Cybersecurity & Cloud Tech S.L.U.
    Inventors: Sergio De Los Santos Vilchez, Pedro Pablo Pérez García, José Torres Velasco
  • Publication number: 20210337388
    Abstract: A method for classifying ad networks to be used by an app, comprising the following steps performed by a server (10): for each app in a database (12), computing a quality index of the app based on evaluating parameters related to the app using an ad network and related to other apps using the same ad network; for each app using the ad network, computing an aggressivity level of the ad network based on aggressivity parameters which measure intrusivity, impact and effectivity of the ad network in the app; ranking all the apps of the database (12) according to the computed quality index and aggressivity level; for each ad network, computing a single classification metric based on structural parameters related to the ad network and to the apps using it; ranking all the ad networks according to the computed classification metric; delivering the rankings of the mobile applications and ad networks to both private users (14) and professional users (15).
    Type: Application
    Filed: April 23, 2021
    Publication date: October 28, 2021
    Inventors: Sergio DE LOS SANTOS VILCHEZ, Aruna Prem BIANZINO, José TORRES VELASCO
  • Publication number: 20210083877
    Abstract: A system and a method for user authentication and/or authorization, including a passive card to encode a first portion of an authentication or authorization code for a user via capacitive points, and a portable computing device with a capacitive screen to encode a second portion of the code. Each capacitive point is connected to an electronic circuit, being activable by physical contact of the user or with an electrical ground. Once the user has requested access to a specific service or operation, and when at least some of the passive points are activated and the passive card is in contact with the capacitive screen, the device reads the capacitive points, decoding the first portion of the code, and cryptographically signs the decoded portion using the second portion, providing the code, which is used as cryptographic key to grant access to the service or operation.
    Type: Application
    Filed: September 14, 2020
    Publication date: March 18, 2021
    Applicant: TELEFONICA DIGITAL ESPANA, S.L.U.
    Inventors: Sergio DE LOS SANTOS VILCHEZ, Aruna Prem BIANZINO, Jose TORRES VELASCO, Enrique RANDO CARRION
  • Patent number: 10897353
    Abstract: The invention relates to a computer-implemented method for generating passwords and to computer program products of same. The method comprises: accessing, by a user (100), by means of a first computation device (200), for the first time, a webpage or website identified by a web domain that requires the Identification of the user (100) on the webpage or website; and generating, by means of a password generator, a password required by the webpage or website, based on the use of a result obtained from the execution of a cryptographic function using password policies related to the domain, the use of a master password (101) known only to the user (100) and the use of an Id_Hash (208).
    Type: Grant
    Filed: April 19, 2016
    Date of Patent: January 19, 2021
    Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.
    Inventors: Ricardo Martín Rodríguez, Sergio De Los Santos Vilchez, Carmen Torrano Giménez, Antonio Guzmán Sacristán, José María Alonso Cebrián
  • Publication number: 20200382952
    Abstract: The present invention proposes a method, device and system for protecting the connection to a wireless network (a WiFi network) by users of electronic communications devices, even the first time the user device connects to the network. The proposed method, device and system provides an improved security when connecting to a WiFi network, avoiding attacks that may jeopardize the security, confidentiality, integrity and availability of WiFi users and WiFi infrastructure. In the proposed solution, the network will be certified by the user device before connecting to an access point for accessing the wireless network.
    Type: Application
    Filed: May 27, 2020
    Publication date: December 3, 2020
    Applicant: Telefonica Digital España, S.L.U.
    Inventors: José María ALONSO CEBRIAN, Aruna Prem BIANZINO, Pablo GONZÁLEZ PÉREZ, Sergio DE LOS SANTOS VILCHEZ
  • Patent number: 10841300
    Abstract: The system includes a passive card (10) configured to store a first portion of an authentication or authorization code via a set of capacitive points (11) included on its surface; and a portable computing device (20) having a capacitive screen and being configured to store a second portion of said authentication or authorization code. Such that, once the user (1) has requested access to a specific service or to a specific operation and when the passive card (10) is in contact with the capacitive screen, the portable computing device (20) is further configured to read at least some of the set of capacitive points (11), decoding the first portion, and cryptographically signing the decoded first portion using said stored second portion, providing the authentication or authorization code, which is used as cryptographic key to grant access to said specific service or specific operation to the user (1).
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: November 17, 2020
    Assignee: TELEFONICA DIGITAL ESPAÑA, S.L.U.
    Inventors: José Torres Velasco, Aruna Prem Bianzino, Alvaro Nunez-Romero Casado, Sergio De Los Santos Vilchez
  • Publication number: 20200259791
    Abstract: A method and system for controlling internet browsing user security is provided. A control device (120) receives, via a first communication channel, a web page request from a control agent (102) implemented in a browser (101), the browser (101) being installed in a computer device operated by a user. Then, the control device (120) requests, to a control service (130), via a second communication channel, a security level of said requested web page including a status of the user and the presence of risks in the requested web page. The control service (130) executes a security check on said requested web page by checking whether the requested web page is included in a blacklist or a whitelist and also by checking certain risk control criteria of the requested web page. Finally, in response to receipt a result of said security check, the control device (120) allows or denies access to said web page.
    Type: Application
    Filed: February 11, 2020
    Publication date: August 13, 2020
    Applicant: TELEFONICA DIGITAL ESPAÑA, S.L.U.
    Inventors: Victor Manuel MUNDILLA GARCIA, Aruna Prem BIANZINO, Jose Maria ALONSO CEBRIAN, Sergio DE LOS SANTOS VILCHEZ
  • Publication number: 20200104483
    Abstract: It is provided computer implemented method for analysis of a software extension for installation and execution in a computing system, the method comprising obtaining a software extension from a marketplace, analyzing contents of the obtained software extension and computing a risk index based on the analyzed software extension and on information related to previously-downloaded software extensions stored in a local database, as well as related to previously detected malware. The risk index is computed before installing and executing the software extension in the computing system and wherein a high value of the risk index persuades a user to install and execute the software extension in the computing system.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 2, 2020
    Applicant: Telefónica Digital España, S.L.U.
    Inventors: Félix BREZO FERNÁNDEZ, Aruna Prem BIANZINO, Sergio DE LOS SANTOS VILCHEZ
  • Publication number: 20200089880
    Abstract: The present invention relates to the detection of malicious software in electronic documents and comprises: detecting an executable code in the electronic document provided to a client module; extracting information from the electronic document comprising the executable code and metadata of the electronic document; creating a binary vector associated with the electronic document; comparing, in a classifier module (200), the binary vector with one or more groups of vectors previously classified and stored in a database (400); classifying the vector in one of the groups, where each group has associated therewith a verdict about the presence of malicious software; and determining that the document contains malicious software depending on the verdict associated with the group in which its associated vector has been classified.
    Type: Application
    Filed: December 19, 2016
    Publication date: March 19, 2020
    Applicant: Telefónica Digital España, S.L.U.
    Inventors: Sergio DE LOS SANTOS VILCHEZ, Pedro Pablo PÉREZ GARCÍA, José TORRES VELASCO
  • Patent number: 10536574
    Abstract: Present invention provides a method, system and application for providing authentication of a mobile device user, based on the measurement of electromagnetic fields modified by a pre-established movement of a specific magnetic token associated to the user. This univocal process will be able to obtain new authentication factors, including something that the user owns (i.e., the token), something that the user knows (i.e., the interaction between the token and the device), and somewhere that the user is (i.e., where the interaction takes place).
    Type: Grant
    Filed: November 8, 2018
    Date of Patent: January 14, 2020
    Assignee: Telefónica Digital España, S.L.U.
    Inventors: Aruna Prem Bianzino, Rafael De Las Heras Del Dedo, Sergio De Los Santos
  • Publication number: 20190386988
    Abstract: It is provided a method, device and system for providing authentication of a user of an electronic device (for example, when using a certain service or accessing a certain asset or premises). The user's authentication is based on the measurement of a biometric/biotechnological feature of the individual (preferably on the user's pulse) and on the detection of the user motion (and eventually location) status change.
    Type: Application
    Filed: June 18, 2019
    Publication date: December 19, 2019
    Applicant: Telefónica, S.A
    Inventors: Carlos Segura Perales, Jordi Luque Serrano, Javier Esteban Zarza, Joan Fabregat Serra, Alexandre Maravilla Girbes, Aruna Prem Bianzino, Sergio De Los Santos
  • Publication number: 20190342285
    Abstract: The system includes a passive card (10) configured to store a first portion of an authentication or authorization code via a set of capacitive points (11) included on its surface; and a portable computing device (20) having a capacitive screen and being configured to store a second portion of said authentication or authorization code. Such that, once the user (1) has requested access to a specific service or to a specific operation and when the passive card (10) is in contact with the capacitive screen, the portable computing device (20) is further configured to read at least some of the set of capacitive points (11), decoding the first portion, and cryptographically signing the decoded first portion using said stored second portion, providing the authentication or authorization code, which is used as cryptographic key to grant access to said specific service or specific operation to the user (1).
    Type: Application
    Filed: May 3, 2019
    Publication date: November 7, 2019
    Applicant: TELEFONICA DIGITAL ESPAÑA, S.L.U.
    Inventors: José TORRES VELASCO, Aruna Prem Bianzino, Alvaro Nunez-Romero Casado, Sergio De Los Santos Vilchez