Patents by Inventor Yoan Jean Claude MICHE

Yoan Jean Claude MICHE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220035899
    Abstract: An apparatus, method and computer program is described comprising: receiving (41) a control signal from a user-operated control apparatus for controlling a remote apparatus, extracting (42) a user noise signal from the received control signal, determining (43) if the user noise signal meets one or more predetermined criteria and authenticating (44) a user of the control apparatus at least partially based on the user noise signal determination.
    Type: Application
    Filed: September 18, 2018
    Publication date: February 3, 2022
    Applicant: NOKIA TECHNOLOGIES OY
    Inventors: Yoan Jean Claude MICHE, Aapo KALLIOLA, Ian Justin OLIVER
  • Publication number: 20210377212
    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising a receiver configured to receive a message from a first security zone, distinct from the one where the apparatus is comprised in, and at least one processing core configured to determine whether to apply a recovery action to the message, the determination comprising a first verification, based on first criteria, to assess whether to apply the recovery action outright, and only in case the first verification does not result in the assessment to apply the recovery action outright, a second verification, based on second criteria, to generate a first weight and a third verification, based on third criteria, to generate a second weight, and to compare a sum of the first weight and the second weight to a predefined trigger to perform the determination.
    Type: Application
    Filed: May 20, 2019
    Publication date: December 2, 2021
    Inventors: Silke HOLTMANNS, Yoan Jean Claude MICHE, Nagendra S Bykampadi
  • Patent number: 11165829
    Abstract: A method for protection of virtualized network functions may comprise: obtaining security orchestration information for one or more virtualized network functions; determining network interfaces relevant to protection of the one or more virtualized network functions based at least in part on network topology information, in response to the security orchestration information; and issuing a security instruction for the protection of the one or more virtualized network functions, according to the determined network interfaces.
    Type: Grant
    Filed: October 11, 2016
    Date of Patent: November 2, 2021
    Assignee: Nokia Technologies Oy
    Inventors: Aapo Kalliola, Yoan Jean Claude Miche, Ian Justin Oliver
  • Patent number: 10602396
    Abstract: This document discloses a solution for detecting and mitigating anomalies such as signalling storms in a radio access network of a wireless communication system. According to an aspect, there is disclosed a method including receiving, in a first local traffic analysis module, configuration parameters from a second local traffic analysis module or from a central traffic analysis module connected to a plurality of local traffic analysis modules; monitoring, by a first traffic analysis module by using the received configuration parameters, traffic in a radio access network of a wireless communication system; detecting, in the monitored traffic on the basis of the configuration parameters, an anomaly causing a control plane signalling load; and in response to said detecting, taking an action to mitigate the anomaly and reporting information on the anomaly to the central traffic analysis module.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: March 24, 2020
    Assignee: Nokia Solutions and Networks Oy
    Inventors: Aapo Kalliola, Ian Justin Oliver, Yoan Jean Claude Miche, Silke Holtmanns, Amaanat Ali, Pekka Kuure
  • Publication number: 20190372939
    Abstract: There are provided measures for malicious network activity mitigation. Such measures exemplarily comprise determining a boundary enclosing a first group of target virtual network functions including at least one target virtual network function, identifying, on the basis of said boundary, a first group of communication paths between said first group of target virtual network functions and respective network entities outside said boundary, said first group of communication paths including a first communication path, and initiating setup of a first wrapper virtual network function corresponding to said first communication path, said first wrapper virtual network function monitoring network traffic on said first communication path.
    Type: Application
    Filed: September 16, 2016
    Publication date: December 5, 2019
    Inventors: Aapo KALLIOLA, Ian Justin OLIVER, Yoan Jean Claude MICHE, Orestis KOSTAKIS
  • Publication number: 20190245889
    Abstract: A method for protection of virtualized network functions may comprise: obtaining security orchestration information for one or more virtualized network functions; determining network interfaces relevant to protection of the one or more virtualized network functions based at least in part on network topology information, in response to the security orchestration information; and issuing a security instruction for the protection of the one or more virtualized network functions, according to the determined network interfaces.
    Type: Application
    Filed: October 11, 2016
    Publication date: August 8, 2019
    Applicant: Nokia Technologies Oy
    Inventors: Aapo Kalliola, Yoan Jean Claude Miche, Ian Justin Oliver
  • Publication number: 20180248684
    Abstract: A method in a network includes: at a client having a memory and a processor, sending a first request to a proxy, the proxy including a memory and a processor; at the client, receiving a first response from the proxy; at the client, sending a second request to the proxy; from the proxy, sending an encrypted computed function to the client in response to the second request; and decrypting the computed function at the client.
    Type: Application
    Filed: August 2, 2016
    Publication date: August 30, 2018
    Inventors: Ian Justin OLIVER, Madeleine Linnea EKBLOM, Yoan Jean Claude MICHE
  • Publication number: 20180109975
    Abstract: This document discloses a solution for detecting and mitigating anomalies such as signalling storms in a radio access network of a wireless communication system. According to an aspect, there is disclosed a method including receiving, in a first local traffic analysis module, configuration parameters from a second local traffic analysis module or from a central traffic analysis module connected to a plurality of local traffic analysis modules; monitoring, by a first traffic analysis module by using the received configuration parameters, traffic in a radio access network of a wireless communication system; detecting, in the monitored traffic on the basis of the configuration parameters, an anomaly causing a control plane signalling load; and in response to said detecting, taking an action to mitigate the anomaly and reporting information on the anomaly to the central traffic analysis module.
    Type: Application
    Filed: October 17, 2017
    Publication date: April 19, 2018
    Inventors: Aapo KALLIOLA, Ian Justin OLIVER, Yoan Jean Claude MICHE, Silke HOLTMANNS, Amaanat ALI, Pekka KUURE