Patents by Inventor Sebastien Tandel
Sebastien Tandel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230360420Abstract: Upon placement of a camera-facing surface of a camera device on a document or upon parallel positioning of the camera-facing surface close to and over the document, images are continually captured by an image capturing sensor of the camera device. While the camera device is being raised above the document, whether the document is fully included within a captured image is detected. In response to detecting that the document is fully included within the captured image, the captured image that fully includes the document is selected as a document image.Type: ApplicationFiled: October 14, 2020Publication date: November 9, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: Lucas Nedel Kirsten, Sebastien Tandel, Carlos Eduardo Leao, Juliano Cardoso Vacaro
-
Patent number: 11546328Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.Type: GrantFiled: January 24, 2019Date of Patent: January 3, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Rafael Anton Eichelberger, Carlos Gomez Gallego, Sebastien Tandel, Juliano Cardoso Vacaro
-
Publication number: 20220198814Abstract: An example non-transitory computer-readable medium includes instructions executable by a processor to detect boundaries of a representation of a document page in a captured image, model the boundaries of the representation of the document page as nonlinear curves, use the nonlinear curves to transform pixels of the representation of the document page into pixels of a dewarped representation of the document page, and output a dewarped image based on the dewarped representation of the document page.Type: ApplicationFiled: August 14, 2019Publication date: June 23, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Sebastien Tandel, Ricardo Ribani, Ricardo Farias Bidart Piccoli, Tiago de Padua
-
Publication number: 20210243201Abstract: A verification framework is decentralized by implementing a database of Known Good States through a blockchain and smart contracts. In this manner, the system may provide an open platform to attest the integrity of various components, which may originate from different vendors. As such, the system supports attestation for multi-vendor infrastructures. In some instances, the system may leverage crypto-economics to monetize the platform. For instance, verifiers may be rewarded according to terms of a smart contract implemented on the blockchain network. Moreover, in some instances, the components may be delivered via an immutable file system, such as the InterPlanetary File System (“IPFS”). The IPFS is a decentralized file system based on a peer-to-peer protocol, improving file distribution efficiency. Components stored using IPFS each are assigned a unique identifier, which is a hash digest composition over the file's blocks. Thus, any modifications to the components may be detected via hash comparisons.Type: ApplicationFiled: June 14, 2018Publication date: August 5, 2021Inventors: Sebastien Tandel, Gustavo Bervian Brand, Juliano Cardoso Vacaro, Dorian Conde Langbeck
-
Patent number: 10805163Abstract: An example non-transitory memory resource including instructions executable by the processing resource to monitor device information for a plurality of devices, wherein the plurality of devices comprise at least one device of an unknown device type, identify behavior attributes for the plurality of devices based on the monitored device information, cluster the plurality of devices into groups based on the behavior attributes, identify a device type for the plurality of devices based on the group of the plurality of devices; and present identifiers for each of the plurality of devices, based on the device type of the plurality of devices.Type: GrantFiled: August 21, 2018Date of Patent: October 13, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Sebastien Tandel, Rajesh Kumar Ganapathy Achari, Anoop Kumaran Nair
-
Patent number: 10742722Abstract: Examples relate to load balancing servers. In one example, a computing device may: receive a network packet from a source device, the network packet including data specifying a value; divide the value included in the network packet by a divisor; determine, from a plurality of servers, a destination server for the network packet based on a remainder of the division; and forward the network packet to the destination server.Type: GrantFiled: June 26, 2015Date of Patent: August 11, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Juliano Vacaro, Sebastien Tandel, Bryan Stiekes
-
Publication number: 20200244653Abstract: A device is authenticated for communication over a network based on a sensor data signature and a traffic pattern signature. The sensor data signature and the traffic pattern signature identify the device. A determination is made whether the sensor data signature corresponds to one of a plurality of recognized sensor data signatures. A determination is also made whether the traffic pattern signature of the device corresponds to one of a plurality of recognized traffic pattern signatures. The device is authenticated for communication over the network responsive to determining that the sensor data signature corresponds to one of the plurality of recognized sensor data signatures and the traffic pattern signature corresponds to one of the plurality of recognized traffic pattern signatures.Type: ApplicationFiled: January 24, 2019Publication date: July 30, 2020Inventors: Rafael Anton Eichelberger, Carlos Gomez Gallego, Sebastien Tandel, Juliano Cardoso Vacaro
-
Patent number: 10659351Abstract: In some examples, a network controller includes a flow repository and a consistency verification engine. The flow repository may store a dataflow configuration previously specified by an application. The consistency verification engine may access the dataflow configuration from the flow repository, retrieve flow table entries from a flow table of a network device, identify an inconsistency between the dataflow configuration previously specified by the application and the flow table entries of the network device, and respond to the identified inconsistency.Type: GrantFiled: December 16, 2015Date of Patent: May 19, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Rafael Anton Eichelberger, Juliano Cardoso Vacaro, Julio Cesar Fernandes Correa, Sebastien Tandel
-
Publication number: 20200067777Abstract: An example non-transitory memory resource including instructions executable by the processing resource to monitor device information for a plurality of devices, wherein the plurality of devices comprise at least one device of an unknown device type, identify behavior attributes for the plurality of devices based on the monitored device information, cluster the plurality of devices into groups based on the behavior attributes, identify a device type for the plurality of devices based on the group of the plurality of devices; and present identifiers for each of the plurality of devices, based on the device type of the plurality of devices.Type: ApplicationFiled: August 21, 2018Publication date: February 27, 2020Inventors: Sebastien Tandel, Rajesh Kumar Ganapathy Achari, Anoop Kumaran Nair
-
Publication number: 20190215268Abstract: An example, a computing system includes a processor, and a non-transitory medium storing instructions thereon. The instructions, when executed, cause the processor to: receive a packet comprising a machine access control (MAC) source address, and determine, based on a first field of bits of the source MAC address, a service function chain identifier corresponding to a service function chain for the packet. The instructions further cause the processor to: determine, based on a second field of bits of the MAC address, a service function index corresponding to a service function for the packet, determine, based on a third field of bits of the source MAC address, a tunnel identifier corresponding to a tunnel for the packet, and determine, based on a fourth field of bits of the source MAC address, an action value for the packet.Type: ApplicationFiled: April 12, 2016Publication date: July 11, 2019Inventors: Sebastien Tandel, Juliano Vacaro, Rafael Eichelberger
-
Patent number: 10348684Abstract: Examples include a network device to filter a packet for a packet type. The network device includes a filter to receive the packet and to determine whether the packet is a defined packet type. The network device also includes a Bloom filter to receive the packet from the filter based on the determination that the packet is a defined packet type and to determine whether the packet is a matched packet or an unmatched packet. A processing resource of the network device may receive the packet from the Bloom filter based on the determination that the packet is a matched packet and to determine whether the packet is an exact match.Type: GrantFiled: September 1, 2016Date of Patent: July 9, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Shaun Wakumoto, Freeman Yufei Huang, Tomas Navarro, Nam Soo Kim, Bruce E Lavigne, Jechun Chiu, Sebastien Tandel
-
Patent number: 10341389Abstract: In some examples, a system receives a context of an application to request a set of network traffic, the context including a requested behavior of a service enabled by the application, and provides a policy to a network device of a network, the policy to regulate the set of network traffic based on the context, the policy provided to the network device to cause the network device to route the set of network traffic based on applying the policy, the routing comprising forwarding the set of network traffic to a destination or denying transmission of the set of network traffic to the destination.Type: GrantFiled: July 23, 2018Date of Patent: July 2, 2019Assignee: Hewlett Packard Enterprise Department LPInventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
-
Patent number: 10298711Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to intercept a packet from a downstream service function classifier, in which the packet includes metadata that specifies an ordered set of service functions within a service function chain to be implemented on the packet, generate a correlation cookie that associates the packet with the service function chain, and encode the correlation cookie into the packet. The instructions may also cause the processor to store the correlation cookie and the metadata in a cache to correlate the correlation cookie and the metadata and send the packet with the encoded correlation cookie to the service function provider.Type: GrantFiled: June 9, 2017Date of Patent: May 21, 2019Assignee: Hewlett Packard Enterprise Development LPInventors: Juliano Cardoso Vacaro, Paul Allen Bottorff, Donald Fedyk, Sebastien Tandel, Dorian Conde Langbeck
-
Publication number: 20180367448Abstract: In some examples, a network controller includes a flow repository and a consistency verification engine. The flow repository may store a dataflow configuration previously specified by an application. The consistency verification engine may access the dataflow configuration from the flow repository, retrieve flow table entries from a flow table of a network device, identify an inconsistency between the dataflow configuration previously specified by the application and the flow table entries of the network device, and respond to the identified inconsistency.Type: ApplicationFiled: December 16, 2015Publication date: December 20, 2018Inventors: Rafael Anton Eichelberger, Juliano Cardoso Vacaro, Julio Cesar Fernandes Correa, Sebastien Tandel
-
Publication number: 20180359329Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to intercept a packet from a downstream service function classifier, in which the packet includes metadata that specifies an ordered set of service functions within a service function chain to be implemented on the packet, generate a correlation cookie that associates the packet with the service function chain, and encode the correlation cookie into the packet. The instructions may also cause the processor to store the correlation cookie and the metadata in a cache to correlate the correlation cookie and the metadata and send the packet with the encoded correlation cookie to the service function provider.Type: ApplicationFiled: June 9, 2017Publication date: December 13, 2018Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Juliano Cardoso VACARO, Paul Allen BOTTORFF, Donald FEDYK, Sebastien TANDEL, Dorian Conde LANGBECK
-
Publication number: 20180332081Abstract: In some examples, a system receives a context of an application to request a set of network traffic, the context including a requested behavior of a service enabled by the application, and provides a policy to a network device of a network, the policy to regulate the set of network traffic based on the context, the policy provided to the network device to cause the network device to route the set of network traffic based on applying the policy, the routing comprising forwarding the set of network traffic to a destination or denying transmission of the set of network traffic to the destination.Type: ApplicationFiled: July 23, 2018Publication date: November 15, 2018Inventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
-
Publication number: 20180331965Abstract: In some examples, a Software-Defined Network (SDN) controller includes a processing resource a memory resource including machine readable instructions to: (1) run a first SDN application to monitor usage of a control channel between the SDN controller and a device in the control domain of the SDN controller, (2) run a second SDN application that uses the control channel to communicate with the device, (3) and throttle the use of the control channel by the second SDN application when it is determined, by monitoring usage of the control channel with the first SDN application, that control channel usage satisfies a usage criteria.Type: ApplicationFiled: August 31, 2015Publication date: November 15, 2018Inventors: Sebastien Tandel, Julio Correa, Rafael Anton Eichelberger
-
Publication number: 20180309781Abstract: In example implementations, a method is disclosed for a software defined network (SDN) controller assisting an intrusion prevention system (IPS). The method includes receiving an indication that a malicious packet has been detected by an IPS in a communication network. A list of source nodes that have a source Internet protocol (IP) address that matches a source IP address of the malicious packet is determined. A virtual local area network identification (VLAN ID) associated with a source node of the list of source nodes that sent the malicious packet is determined. The SDN controller may instruct an edge switch to block additional packets from the source node of the list of source nodes having the VLAN ID.Type: ApplicationFiled: October 20, 2015Publication date: October 25, 2018Inventors: Sebastien Tandel, Julio Correa, Kairo Tavares
-
Patent number: 10044760Abstract: In one implementation, an example system may include a policy engine. The policy engine may receive a context of an application to request a set of network traffic and provide a policy rule to a network device of a network path. In another implementation, an example system may identify a party and a requested behavior of the service and maintain a context to determine a policy rule to regulate a set of network traffic associated with the service based on the party and the requested behavior. In another implementation, an example method may comprise receiving a service request and an authentication, identifying a party, identifying a behavior, and deploying a policy to a network device of a network based on the party and the behavior.Type: GrantFiled: December 4, 2013Date of Patent: August 7, 2018Assignee: Hewlett Packard Enterprise Development LPInventors: Bryan Stiekes, Sebastien Tandel, Jechun Chiu
-
Publication number: 20180176294Abstract: Examples relate to load balancing servers. In one example, a computing device may: receive a network packet from a source device, the network packet including data specifying a value; divide the value included in the network packet by a divisor; determine, from a plurality of servers, a destination server for the network packet based on a remainder of the division; and forward the network packet to the destination server.Type: ApplicationFiled: June 26, 2015Publication date: June 21, 2018Inventors: Juliano Vacaro, Sebastien Tandel, Bryan Stiekes