Bezzi
Micele Bezzi, Le Haut Sartoux-Valbonne FR
Patent application number | Description | Published |
---|---|---|
20110087880 | REVOCATION OF CREDENTIALS IN SECRET HANDSHAKE PROTOCOLS - According to a general aspect, a computer-implemented method for a first user to verify an association with a second user through a secret handshake protocol includes maintaining information about a reusable identification handle for the first user, where the information about the reusable identification handle is provided by a trusted third party, maintaining information about a reusable credential for the first user, where the information about the reusable credential is provided by a trusted third party, and maintaining information about a matching reference for verifying an association with another user, where the information about the matching reference is provided by a trusted third party. Information based on the reusable identification handle and based on the reusable credential is transmitted to a potential peer. First information based on a reusable identification handle for the second user is received, and second information based on a reusable credential for the second user is received. A first comparison of a combination of the first information and the second information is performed with the matching reference to determine whether the second user's credentials match the first users matching reference. A second comparison of the first information with information published on a revocation list is performed to determine whether the second user's credentials have been revoked from usage. Based on the first comparison and the second comparison, a determination is made whether or not to verify the association of second user with the first user. | 04-14-2011 |
Michele Bezzi, Antibes FR
Patent application number | Description | Published |
---|---|---|
20100169332 | ANONYMITY MEASURING DEVICE - The invention concerns a data anonymity measuring device for selectively transmitting an anonymised database to a third party comprising: calculation means ( | 07-01-2010 |
20130138676 | Anonymity Measuring Device - The invention concerns a data anonymity measuring device for selectively transmitting an anonymized database to a third party comprising: calculation means ( | 05-30-2013 |
Michele Bezzi, Le Haut Sartoux-Valbonne FR
Patent application number | Description | Published |
---|---|---|
20130304900 | REPUTATION MANAGEMENT USING EVOLVING REPUTATION SCORES - An evidence monitor may monitor interactions between at least one service provider and at least one service consumer during a time period. The evidence monitor may receive negative feedback from the at least one service consumer regarding a corresponding interaction of the interactions. A reputation engine may increase a reputation score of the at least one service provider during the time period in accordance with a growth rate, as the interactions occur during the time period. The reputation engine may also decrease the reputation score of the at least one service provider in response to the negative feedback and in accordance with a negative feedback response characteristic. | 11-14-2013 |
20140013415 | AUTOMATIC GENERATION OF SECURITY CHECKS - The embodiments encompass an apparatus for generating security checks including a model editor configured to annotate at least one element in an architectural source model with security requirement information and countermeasure information. The security requirement information identifies the at least one element and provides a textual description of a corresponding security requirement, and the countermeasure information identifies the at least one element and indicates a countermeasure type to the corresponding security requirement. The apparatus also includes a code generation engine configured to generate a security check for the countermeasure information based on the countermeasure type. | 01-09-2014 |
20140059203 | PREVENTION OF COALITION ATTACKS IN SOCIAL NETWORK COMMUNITIES - A report handler may receive abuse reports from reporters alleging policy violations of network use policies by at least one potential victim, and a source analyzer may determine at least one subset of the reporters. A content analyzer may determine a reference to the at least one potential victim in network activities of the at least one subset, and a review requester may generate a notification of a potential coalition attack against the at least one potential victim, based on the reference in the context of the at least one subset. | 02-27-2014 |