Patents by Inventor Stephane MAHIEU

Stephane MAHIEU has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11991186
    Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: May 21, 2024
    Assignee: NOKIA TECHNOLOGIES OY
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin, Zhigang Luo
  • Patent number: 11729072
    Abstract: Methods and apparatus are provided for Service Level Agreement managements in distributed cloud environments. A method comprises monitoring enforcements of Service Level Agreements for services provided to a plurality of tenants by a cloud provider; detecting a possible Service Level Agreement violation for a service provided to one tenant of the plurality of tenants, wherein the possible Service Level Agreement violation is related to performance or security requirements; and automatically mitigating the possible Service Level Agreement violation with cooperation with at least one of a cloud manager and a security management system of the cloud provider. The possible Service Level Agreement violation can involve a possible confliction between performance requirements and security requirements, and mitigating the possible Service Level Agreement violation comprises resolving the possible confiction for self-healing. Methods for an automatic Service Level Agreement update is also provided.
    Type: Grant
    Filed: September 5, 2017
    Date of Patent: August 15, 2023
    Assignee: NOKIA SOLUTIONS AND NETWORKS OY
    Inventors: Iris Adam, Jing Ping, Stephane Mahieu
  • Patent number: 11558353
    Abstract: Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.
    Type: Grant
    Filed: February 6, 2018
    Date of Patent: January 17, 2023
    Assignee: Nokia Technologies Oy
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin
  • Patent number: 11368489
    Abstract: An apparatus for security management based on event correlation in a distributed multi-layered cloud environment is disclosed, wherein the distributed multi-layered cloud environment comprises at least one first layer cloud service provider, and at least one second layer cloud service provider as a tenant of the first layer cloud service provider, and the apparatus is installed at least on one cloud service provider of the first layer cloud service provider and the second layer cloud service provider, the apparatus comprising: a central processing module configured to: provide correlation as a Service (CORRaaS) to a plurality of tenants as virtualized security appliances or virtualized security functions for the plurality of tenants's lices, generate a second interface for allowing the plurality of tenants to configure the correlation as a Service (CORRaaS), and correlate and process security events from security functions in the plurality of tenants' slices to form processed security event data, and to detec
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: June 21, 2022
    Assignee: Nokia Technologies Oy
    Inventors: Iris Adam, Jing Ping, Stephane Mahieu
  • Patent number: 11290490
    Abstract: Cloud service security management in cloud computer environment uses a first computer cloud entity with first security capabilities and under security management coordinated by a first security management service point in compliance with predefined first security requirements. Security management of a second computer cloud entity is coordinated by a second security management service point in compliance with predefined second security requirements. In the managing of the security of the cloud service in the cloud computer environment: a trusted relationship is established between the first and second security management service points, general security requirements for the cloud service are obtained; and a first security policy is defined for the first security management service point, based on the general security requirements for the cloud service, the first security capabilities and the first security requirements, for the running of the cloud service by the first computer cloud entity.
    Type: Grant
    Filed: October 12, 2016
    Date of Patent: March 29, 2022
    Assignee: Nokia Technologies Oy
    Inventors: Manfred Schaefer, Iris Adam, Stephane Mahieu, Jing Ping
  • Publication number: 20210211439
    Abstract: Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.
    Type: Application
    Filed: May 22, 2018
    Publication date: July 8, 2021
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin, Zhigang Luo
  • Publication number: 20210067419
    Abstract: Methods and apparatus are provided for Service Level Agreement managements in distributed cloud environments. A method comprises monitoring enforcements of Service Level Agreements for services provided to a plurality of tenants by a cloud provider; detecting a possible Service Level Agreement violation for a service provided to one tenant of the plurality of tenants, wherein the possible Service Level Agreement violation is related to performance or security requirements; and automatically mitigating the possible Service Level Agreement violation with cooperation with at least one of a cloud manager and a security management system of the cloud provider. The possible Service Level Agreement violation can involve a possible confliction between performance requirements and security requirements, and mitigating the possible Service Level Agreement violation comprises resolving the possible confiction for self-healing. Methods for an automatic Service Level Agreement update is also provided.
    Type: Application
    Filed: September 5, 2017
    Publication date: March 4, 2021
    Inventors: Iris Adam, Jing Ping, Stephane Mahieu
  • Publication number: 20210044567
    Abstract: Embodiments of the present disclosure relate to a method, apparatus, and computer readable medium for providing a security service for a data center. According to the method, a packet terminating at or originating from the data center is received. At least one label is determined for the packet, each label indicating a security requirement for the packet. Based on the at least one label, a security service chain is selected for the packet, the security service chain including an ordered set of security functions deployed in the data center and to be applied to the packet. The packet is transmitted to the selected security service chain in association with the at least one label, the packet being processed by the ordered set of security functions in the security service chain.
    Type: Application
    Filed: February 6, 2018
    Publication date: February 11, 2021
    Inventors: Zhiyuan Hu, Jing Ping, Stephane Mahieu, Yueming Yin
  • Publication number: 20200344267
    Abstract: An apparatus for security management based on event correlation in a distributed multi-layered cloud environment is disclosed, wherein the distributed multi-layered cloud environment comprises at least one first layer cloud service provider, and at least one second layer cloud service provider as a tenant of the first layer cloud service provider, and the apparatus is installed at least on one cloud service provider of the first layer cloud service provider and the second layer cloud service provider, the apparatus comprising: a central processing module configured to: provide correlation as a Service (CORRaaS) to a plurality of tenants as virtualized security appliances or virtualized security functions for the plurality of tenants's lices, generate a second interface for allowing the plurality of tenants to configure the correlation as a Service (CORRaaS), and correlate and process security events from security functions in the plurality of tenants'slices to form processed security event data, and to detect
    Type: Application
    Filed: November 20, 2017
    Publication date: October 29, 2020
    Inventors: Iris Adam, Jing Ping, Stephane Mahieu
  • Publication number: 20200128046
    Abstract: Cloud service security management in cloud computer environment uses a first computer cloud entity with first security capabilities and under security management coordinated by a first security management service point in compliance with predefined first security requirements. Security management of a second computer cloud entity is coordinated by a second security management service point in compliance with predefined second security requirements. In the managing of the security of the cloud service in the cloud computer environment: a trusted relationship is established between the first and second security management service points, general security requirements for the cloud service are obtained; and a first security policy is defined for the first security management service point, based on the general security requirements for the cloud service, the first security capabilities and the first security requirements, for the running of the cloud service by the first computer cloud entity.
    Type: Application
    Filed: October 12, 2016
    Publication date: April 23, 2020
    Inventors: Manfred SCHAEFER, Iris ADAM, Stephane MAHIEU, Jing PING
  • Publication number: 20180316730
    Abstract: An apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to design an extended security zone configuration for a network service to be instantiated including at least one virtual network function in a communication network comprising virtualized network parts, wherein the extended security zone configuration assigns the at least one virtual network function according to local and/or global security requirements to at least one dedicated security zone, and to provide a security zone descriptor information element describing a final result of the extended security zone configuration design for usage in an information set defining a deployment variant of the network service to be instantiated
    Type: Application
    Filed: October 22, 2015
    Publication date: November 1, 2018
    Inventors: Manfred SCHAEFER, Jing PING, Stephane MAHIEU
  • Publication number: 20180034781
    Abstract: An apparatus comprising at least one processing circuitry, and at least one memory for storing instructions to be executed by the processing circuitry, wherein the at least one memory and the instructions are configured to, with the at least one processing circuitry, cause the apparatus at least: to execute management tasks in an automated manner related to a control of security in a communication between two end points of a communication connection in a hybrid communication network, wherein the security is controlled for physical and virtual parts of the hybrid communication network, and to automatically control at least one of deployment, configuration and management of a security service including at least one security function instantiated or implemented in the hybrid communication network.
    Type: Application
    Filed: February 13, 2015
    Publication date: February 1, 2018
    Inventors: Bernd JAEGER, Stephane MAHIEU, Volker MENDISCH, Jing PING