Patents by Inventor Sebastien Tandel

Sebastien Tandel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230360420
    Abstract: Upon placement of a camera-facing surface of a camera device on a document or upon parallel positioning of the camera-facing surface close to and over the document, images are continually captured by an image capturing sensor of the camera device. While the camera device is being raised above the document, whether the document is fully included within a captured image is detected. In response to detecting that the document is fully included within the captured image, the captured image that fully includes the document is selected as a document image.
    Type: Application
    Filed: October 14, 2020
    Publication date: November 9, 2023
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Lucas Nedel Kirsten, Sebastien Tandel, Carlos Eduardo Leao, Juliano Cardoso Vacaro
  • Patent number: 11546328
    Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.
    Type: Grant
    Filed: January 24, 2019
    Date of Patent: January 3, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Rafael Anton Eichelberger, Carlos Gomez Gallego, Sebastien Tandel, Juliano Cardoso Vacaro
  • Publication number: 20220198814
    Abstract: An example non-transitory computer-readable medium includes instructions executable by a processor to detect boundaries of a representation of a document page in a captured image, model the boundaries of the representation of the document page as nonlinear curves, use the nonlinear curves to transform pixels of the representation of the document page into pixels of a dewarped representation of the document page, and output a dewarped image based on the dewarped representation of the document page.
    Type: Application
    Filed: August 14, 2019
    Publication date: June 23, 2022
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Sebastien Tandel, Ricardo Ribani, Ricardo Farias Bidart Piccoli, Tiago de Padua
  • Publication number: 20210243201
    Abstract: A verification framework is decentralized by implementing a database of Known Good States through a blockchain and smart contracts. In this manner, the system may provide an open platform to attest the integrity of various components, which may originate from different vendors. As such, the system supports attestation for multi-vendor infrastructures. In some instances, the system may leverage crypto-economics to monetize the platform. For instance, verifiers may be rewarded according to terms of a smart contract implemented on the blockchain network. Moreover, in some instances, the components may be delivered via an immutable file system, such as the InterPlanetary File System (“IPFS”). The IPFS is a decentralized file system based on a peer-to-peer protocol, improving file distribution efficiency. Components stored using IPFS each are assigned a unique identifier, which is a hash digest composition over the file's blocks. Thus, any modifications to the components may be detected via hash comparisons.
    Type: Application
    Filed: June 14, 2018
    Publication date: August 5, 2021
    Inventors: Sebastien Tandel, Gustavo Bervian Brand, Juliano Cardoso Vacaro, Dorian Conde Langbeck
  • Patent number: 10805163
    Abstract: An example non-transitory memory resource including instructions executable by the processing resource to monitor device information for a plurality of devices, wherein the plurality of devices comprise at least one device of an unknown device type, identify behavior attributes for the plurality of devices based on the monitored device information, cluster the plurality of devices into groups based on the behavior attributes, identify a device type for the plurality of devices based on the group of the plurality of devices; and present identifiers for each of the plurality of devices, based on the device type of the plurality of devices.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: October 13, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sebastien Tandel, Rajesh Kumar Ganapathy Achari, Anoop Kumaran Nair
  • Patent number: 10742722
    Abstract: Examples relate to load balancing servers. In one example, a computing device may: receive a network packet from a source device, the network packet including data specifying a value; divide the value included in the network packet by a divisor; determine, from a plurality of servers, a destination server for the network packet based on a remainder of the division; and forward the network packet to the destination server.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: August 11, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Juliano Vacaro, Sebastien Tandel, Bryan Stiekes
  • Publication number: 20200244653
    Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.
    Type: Application
    Filed: January 24, 2019
    Publication date: July 30, 2020
    Inventors: Rafael Anton Eichelberger, Carlos Gomez Gallego, Sebastien Tandel, Juliano Cardoso Vacaro
  • Patent number: 10659351
    Abstract: In some examples, a network controller includes a flow repository and a consistency verification engine. The flow repository may store a dataflow configuration previously specified by an application. The consistency verification engine may access the dataflow configuration from the flow repository, retrieve flow table entries from a flow table of a network device, identify an inconsistency between the dataflow configuration previously specified by the application and the flow table entries of the network device, and respond to the identified inconsistency.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: May 19, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Rafael Anton Eichelberger, Juliano Cardoso Vacaro, Julio Cesar Fernandes Correa, Sebastien Tandel
  • Publication number: 20200067777
    Abstract: An example non-transitory memory resource including instructions executable by the processing resource to monitor device information for a plurality of devices, wherein the plurality of devices comprise at least one device of an unknown device type, identify behavior attributes for the plurality of devices based on the monitored device information, cluster the plurality of devices into groups based on the behavior attributes, identify a device type for the plurality of devices based on the group of the plurality of devices; and present identifiers for each of the plurality of devices, based on the device type of the plurality of devices.
    Type: Application
    Filed: August 21, 2018
    Publication date: February 27, 2020
    Inventors: Sebastien Tandel, Rajesh Kumar Ganapathy Achari, Anoop Kumaran Nair
  • Publication number: 20190215268
    Abstract: An example, a computing system includes a processor, and a non-transitory medium storing instructions thereon. The instructions, when executed, cause the processor to: receive a packet comprising a machine access control (MAC) source address, and determine, based on a first field of bits of the source MAC address, a service function chain identifier corresponding to a service function chain for the packet. The instructions further cause the processor to: determine, based on a second field of bits of the MAC address, a service function index corresponding to a service function for the packet, determine, based on a third field of bits of the source MAC address, a tunnel identifier corresponding to a tunnel for the packet, and determine, based on a fourth field of bits of the source MAC address, an action value for the packet.
    Type: Application
    Filed: April 12, 2016
    Publication date: July 11, 2019
    Inventors: Sebastien Tandel, Juliano Vacaro, Rafael Eichelberger
  • Patent number: 10348684
    Abstract: Examples include a network device to filter a packet for a packet type. The network device includes a filter to receive the packet and to determine whether the packet is a defined packet type. The network device also includes a Bloom filter to receive the packet from the filter based on the determination that the packet is a defined packet type and to determine whether the packet is a matched packet or an unmatched packet. A processing resource of the network device may receive the packet from the Bloom filter based on the determination that the packet is a matched packet and to determine whether the packet is an exact match.
    Type: Grant
    Filed: September 1, 2016
    Date of Patent: July 9, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Shaun Wakumoto, Freeman Yufei Huang, Tomas Navarro, Nam Soo Kim, Bruce E Lavigne, Jechun Chiu, Sebastien Tandel
  • Patent number: 10341389
    Abstract: In some examples, a system receives a context of an application to request a set of network traffic, the context including a requested behavior of a service enabled by the application, and provides a policy to a network device of a network, the policy to regulate the set of network traffic based on the context, the policy provided to the network device to cause the network device to route the set of network traffic based on applying the policy, the routing comprising forwarding the set of network traffic to a destination or denying transmission of the set of network traffic to the destination.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: July 2, 2019
    Assignee: Hewlett Packard Enterprise Department LP
    Inventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
  • Patent number: 10298711
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to intercept a packet from a downstream service function classifier, in which the packet includes metadata that specifies an ordered set of service functions within a service function chain to be implemented on the packet, generate a correlation cookie that associates the packet with the service function chain, and encode the correlation cookie into the packet. The instructions may also cause the processor to store the correlation cookie and the metadata in a cache to correlate the correlation cookie and the metadata and send the packet with the encoded correlation cookie to the service function provider.
    Type: Grant
    Filed: June 9, 2017
    Date of Patent: May 21, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Juliano Cardoso Vacaro, Paul Allen Bottorff, Donald Fedyk, Sebastien Tandel, Dorian Conde Langbeck
  • Publication number: 20180367448
    Abstract: In some examples, a network controller includes a flow repository and a consistency verification engine. The flow repository may store a dataflow configuration previously specified by an application. The consistency verification engine may access the dataflow configuration from the flow repository, retrieve flow table entries from a flow table of a network device, identify an inconsistency between the dataflow configuration previously specified by the application and the flow table entries of the network device, and respond to the identified inconsistency.
    Type: Application
    Filed: December 16, 2015
    Publication date: December 20, 2018
    Inventors: Rafael Anton Eichelberger, Juliano Cardoso Vacaro, Julio Cesar Fernandes Correa, Sebastien Tandel
  • Publication number: 20180359329
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to intercept a packet from a downstream service function classifier, in which the packet includes metadata that specifies an ordered set of service functions within a service function chain to be implemented on the packet, generate a correlation cookie that associates the packet with the service function chain, and encode the correlation cookie into the packet. The instructions may also cause the processor to store the correlation cookie and the metadata in a cache to correlate the correlation cookie and the metadata and send the packet with the encoded correlation cookie to the service function provider.
    Type: Application
    Filed: June 9, 2017
    Publication date: December 13, 2018
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Juliano Cardoso VACARO, Paul Allen BOTTORFF, Donald FEDYK, Sebastien TANDEL, Dorian Conde LANGBECK
  • Publication number: 20180332081
    Abstract: In some examples, a system receives a context of an application to request a set of network traffic, the context including a requested behavior of a service enabled by the application, and provides a policy to a network device of a network, the policy to regulate the set of network traffic based on the context, the policy provided to the network device to cause the network device to route the set of network traffic based on applying the policy, the routing comprising forwarding the set of network traffic to a destination or denying transmission of the set of network traffic to the destination.
    Type: Application
    Filed: July 23, 2018
    Publication date: November 15, 2018
    Inventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
  • Publication number: 20180331965
    Abstract: In some examples, a Software-Defined Network (SDN) controller includes a processing resource a memory resource including machine readable instructions to: (1) run a first SDN application to monitor usage of a control channel between the SDN controller and a device in the control domain of the SDN controller, (2) run a second SDN application that uses the control channel to communicate with the device, (3) and throttle the use of the control channel by the second SDN application when it is determined, by monitoring usage of the control channel with the first SDN application, that control channel usage satisfies a usage criteria.
    Type: Application
    Filed: August 31, 2015
    Publication date: November 15, 2018
    Inventors: Sebastien Tandel, Julio Correa, Rafael Anton Eichelberger
  • Publication number: 20180309781
    Abstract: In example implementations, a method is disclosed for a software defined network (SDN) controller assisting an intrusion prevention system (IPS). The method includes receiving an indication that a malicious packet has been detected by an IPS in a communication network. A list of source nodes that have a source Internet protocol (IP) address that matches a source IP address of the malicious packet is determined. A virtual local area network identification (VLAN ID) associated with a source node of the list of source nodes that sent the malicious packet is determined. The SDN controller may instruct an edge switch to block additional packets from the source node of the list of source nodes having the VLAN ID.
    Type: Application
    Filed: October 20, 2015
    Publication date: October 25, 2018
    Inventors: Sebastien Tandel, Julio Correa, Kairo Tavares
  • Patent number: 10044760
    Abstract: In one implementation, an example system may include a policy engine. The policy engine may receive a context of an application to request a set of network traffic and provide a policy rule to a network device of a network path. In another implementation, an example system may identify a party and a requested behavior of the service and maintain a context to determine a policy rule to regulate a set of network traffic associated with the service based on the party and the requested behavior. In another implementation, an example method may comprise receiving a service request and an authentication, identifying a party, identifying a behavior, and deploying a policy to a network device of a network based on the party and the behavior.
    Type: Grant
    Filed: December 4, 2013
    Date of Patent: August 7, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
  • Publication number: 20180176294
    Abstract: Examples relate to load balancing servers. In one example, a computing device may: receive a network packet from a source device, the network packet including data specifying a value; divide the value included in the network packet by a divisor; determine, from a plurality of servers, a destination server for the network packet based on a remainder of the division; and forward the network packet to the destination server.
    Type: Application
    Filed: June 26, 2015
    Publication date: June 21, 2018
    Inventors: Juliano Vacaro, Sebastien Tandel, Bryan Stiekes