“I had the opportunity to work with Frédéric, a very straight forward, committed and knowledgeable person. No doubt Frederic expertise in project management is a valuable asset to any company, along with serious technical skills. Few people possess a practical expertise in those two domains and this very good balance makes Frédéric a precious person to hire at the head of an IT department that would need structuration, innovation and concrete metrics to measure its progression. If we didn’t had already an excellent CTO, I’ll definitely think about Frédéric for the job.”
About
20 years experienced, dedicated, product-focused CTO, track record of:
💻 combining…
Activity
-
Grateful to be a part of this group. I have gotten to work with some of the most incredible people at some of the most incredible brands. It's a deep…
Grateful to be a part of this group. I have gotten to work with some of the most incredible people at some of the most incredible brands. It's a deep…
Liked by Frédéric R.
-
We’re thrilled to announce our new Chief Product Officer, Christophe Frenet! 🎉 With over 20 years of experience in product strategy and innovation…
We’re thrilled to announce our new Chief Product Officer, Christophe Frenet! 🎉 With over 20 years of experience in product strategy and innovation…
Liked by Frédéric R.
Experience
Publications
-
Le livre du CTO
Ametix
Le CTO ou Chief Technology Officer, c’est un peu le chef d’orchestre de la révolution numérique. Si les développeurs sont les bâtisseurs des autoroutes de l’information, alors les CTO en sont les contremaîtres. Avec l’ensemble des plus grands CTO de notre pays, nous avons monté ce think tank, le Club City-O, dont cet ouvrage est l’un des fruits. Nous espérons qu’avec celui-ci, vous découvrirez ou re-découvrirez les sujets qui sont inhérents à la vie de tout leader technique.
-
Continuous Delivery eBook
StudioB / Zend
I participated in that collective eBook: Continuous Delivery eBook - Quotes from 29 DevOps Experts
-
Web Project training modules [ partially in French]
3-module Course on Web Project Management done for University of Bobigny
Patents
-
Multiple relying parties in a single-sign-on environment
Issued US12052232B2
A system and method for providing secure Single-Sign-On (SSO) authentication in a zero-knowledge architecture. A first server component may operate as a first relying party in a first SSO flow. When the user of an application successfully authenticates to a first identity provider, a first part of a secret key may be provided to the application. Additionally, a second server component may operate as a second relying party in a second SSO flow. When the first part of the secret key is received…
A system and method for providing secure Single-Sign-On (SSO) authentication in a zero-knowledge architecture. A first server component may operate as a first relying party in a first SSO flow. When the user of an application successfully authenticates to a first identity provider, a first part of a secret key may be provided to the application. Additionally, a second server component may operate as a second relying party in a second SSO flow. When the first part of the secret key is received by the application, authentication information may be provided to a second identity provider. Based on a successful authentication, a second part of the secret key may be provided to the application. The first and second parts of the secret key may be combined by the application to generate a final secret key that may be used to decipher encrypted user data.
Other inventorsSee patent -
Crowdsourced learning engine for semantic analysis of webpages
Issued US11080597B2
A method for autofilling an electronic form is provided. Elements of the electronic form are identified. A value for each identified elements of the electronic form is determined. The electronic form is automatically filled with the determined values. During the automatically filling of the electronic form, the determined value is provided in a field corresponding to each of the elements. A user input is received on the provided value. The received user input includes a correction to a first…
A method for autofilling an electronic form is provided. Elements of the electronic form are identified. A value for each identified elements of the electronic form is determined. The electronic form is automatically filled with the determined values. During the automatically filling of the electronic form, the determined value is provided in a field corresponding to each of the elements. A user input is received on the provided value. The received user input includes a correction to a first value provided in a first field of the electronic form. An autofill application is trained using the received user input.
Other inventorsSee patent -
User-session management in a zero-knowledge environment
Issued US10904004B2
Examples of the present disclosure describe systems and methods relating to user-session management in a zero-knowledge environment. When a user authenticates with a computing service to begin a session, a credential-cipher key is used to encrypt the user's authentication credentials, thereby generating session-resume data. The computing service stores the credential-cipher key, such that it is not retained by the user's computing device. Accordingly, when the user resumes the session, a resume…
Examples of the present disclosure describe systems and methods relating to user-session management in a zero-knowledge environment. When a user authenticates with a computing service to begin a session, a credential-cipher key is used to encrypt the user's authentication credentials, thereby generating session-resume data. The computing service stores the credential-cipher key, such that it is not retained by the user's computing device. Accordingly, when the user resumes the session, a resume request is generated to retrieve the credential-cipher key from the computing service, wherein the request is validated before providing the key. Upon successful validation, the computing service provides the credential-cipher key, which is then used to decrypt the session-resume data and regain access to the user's authentication credentials. The encrypted user data may then be decrypted, thereby obviating the need for the user to re-authenticate, while still retaining the privacy and security benefits of the zero-knowledge environment.
Other inventorsSee patent -
Zero-knowledge architecture between multiple systems
Issued US10848312B2
Examples of the present disclosure describe systems and methods relating to a zero-knowledge architecture between multiple systems. In an example, multiple systems may provide an application. User data of the application may be encrypted using a cryptographic key to restrict access to the user data. In some examples, the cryptographic key may not be provided to the multiple systems, thereby providing a zero-knowledge architecture. In order to ensure a user may access the cryptographic key, the…
Examples of the present disclosure describe systems and methods relating to a zero-knowledge architecture between multiple systems. In an example, multiple systems may provide an application. User data of the application may be encrypted using a cryptographic key to restrict access to the user data. In some examples, the cryptographic key may not be provided to the multiple systems, thereby providing a zero-knowledge architecture. In order to ensure a user may access the cryptographic key, the cryptographic key may be encrypted using a second cryptographic key. The encrypted representation of the cryptographic key may be provided to a first system, while the second cryptographic key may be provided to a second system. As a result, a user computing device may retrieve both the encrypted representation of the cryptographic key and the second cryptographic key from the first and second systems, respectively, in order to encrypt/decrypt user data.
Other inventorsSee patent -
Methods and systems for user authentication
Issued US10574648B2
Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first device. A first challenge is sent to the first device in response to the first request. The first challenge is resolved using a first private key associated with the first user for the first content. A first response, including a resolved challenge, is received from the first device. It is determined whether the first response is an…
Methods and systems for passwordless authenticating of a user are provided. A first request to access a first content is received from a first user of a first device. A first challenge is sent to the first device in response to the first request. The first challenge is resolved using a first private key associated with the first user for the first content. A first response, including a resolved challenge, is received from the first device. It is determined whether the first response is an acceptable response to the first challenge. Access to the first content is granted to the first user in response determining that the first response is an acceptable response.
Other inventorsSee patent -
Master password reset in a zero-knowledge architecture
Issued US10432397B2
Examples of the present disclosure describe systems and methods relating to master password reset in a zero-knowledge architecture. A master password reset may be used to regain access to encrypted user data despite not having access to the master password associated with decrypting the user data. As an example, the user data may be encrypted using a local ciphering key, wherein the key may be encrypted using a master password and stored. A second copy of the key may be stored, wherein the…
Examples of the present disclosure describe systems and methods relating to master password reset in a zero-knowledge architecture. A master password reset may be used to regain access to encrypted user data despite not having access to the master password associated with decrypting the user data. As an example, the user data may be encrypted using a local ciphering key, wherein the key may be encrypted using a master password and stored. A second copy of the key may be stored, wherein the second copy may be encrypted using a recovery key. The recovery key may then be stored by a third party. In a reset scenario in which the master password is forgotten, the recovery key may be retrieved from the third party and used to decrypt the second copy of the local ciphering key, thereby providing access to the encrypted user data without use of the master password.
Other inventorsSee patent
Organizations
-
Tech Rocks
Co-organizer of the Tech Summit. Active member
- Present -
City-O
Co-Founder and President
-Co-founder of City-O the first French network of CTO http://www.journaldunet.com/solutions/emploi-rh/city-o.shtml
Recommendations received
6 people have recommended Frédéric
Join now to viewMore activity by Frédéric
-
I'm thrilled to share that I've joined Dashlane as Chief Product Officer! I've always been passionate about leading mission-driven companies that…
I'm thrilled to share that I've joined Dashlane as Chief Product Officer! I've always been passionate about leading mission-driven companies that…
Liked by Frédéric R.
-
How it started, how it's going 🤩 Almost 6 years ago - to the day - Arlen Oharonian sent me this message on LinkedIn. He'd applied for the role…
How it started, how it's going 🤩 Almost 6 years ago - to the day - Arlen Oharonian sent me this message on LinkedIn. He'd applied for the role…
Liked by Frédéric R.
-
On May 29th, Posh is excited to be hosting Early Stage Hiring & Being Hired in conjunction with Companyon Ventures and FirstMark. Come join us for…
On May 29th, Posh is excited to be hosting Early Stage Hiring & Being Hired in conjunction with Companyon Ventures and FirstMark. Come join us for…
Liked by Frédéric R.
-
I'll be talking today at the North-America ISACA conference in Orlando on the topic of credential security and authentication threats, sharing my…
I'll be talking today at the North-America ISACA conference in Orlando on the topic of credential security and authentication threats, sharing my…
Shared by Frédéric R.
-
We're expanding our footprint in 🇵🇹 Portugal, reaffirming Lisbon as a key hub for global growth by tripling the size of our headquarters. Our new…
We're expanding our footprint in 🇵🇹 Portugal, reaffirming Lisbon as a key hub for global growth by tripling the size of our headquarters. Our new…
Liked by Frédéric R.
-
Today, we’re pulling back the curtain on one of our most powerful (and privacy-conscious) features: our AI-powered autofill system. 🔍 Learn how we…
Today, we’re pulling back the curtain on one of our most powerful (and privacy-conscious) features: our AI-powered autofill system. 🔍 Learn how we…
Liked by Frédéric R.
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Frédéric R. in United States
-
Frederic R
Social Media Manager at Badgirlbags.co
-
Fred Seddiqui
-
Frederick Allen
-
Frederick Van Riper, R-PLC, Fair Play Facilitator®
I help ambitious dads master connection at home—so their success FEELS like success. High-performance coaching for men ready to lead at home like they do at work | From tension to trust in 5 weeks
-
Frederick Afragola
Board of Directors at The FreeStyle Life, Inc.
97 others named Frédéric R. in United States are on LinkedIn
See others named Frédéric R.