Patents by Inventor Enzo FENOGLIO

Enzo FENOGLIO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10282414
    Abstract: In one embodiment, a method includes obtaining text from a user, applying the text to a deep learning neural network to generate a plurality of bias coordinates defining a point in an embedded space, and, in response to determining that at least one of the plurality of bias coordinates exceeds a threshold, providing an indication of bias to the user.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: May 7, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Guillaume Sauvage De Saint Marc, Monique Jeanne Morrow, Manikandan Kesavan
  • Publication number: 20190097809
    Abstract: In one illustrative example, a network cybersecurity procedure may be employed with use of at least one unmanned aerial vehicle (UAV), where the UAV includes an intermediary pairing device for providing a temporary connection between a first network (e.g. a private LAN) and a second network (e.g. the Internet). The network cybersecurity procedure may involve deploying the UAV in proximity to the first network, such that the intermediary pairing device pairs with a first pairing device via a first transceiver and with a second pairing device via a second transceiver. A temporary connection is established between the first network connected via the first pairing device and the second network connected via the second pairing device. Data is communicated between a first device (e.g. IoT device) or server of the first network and a second device or server of the second network over the temporary connection. During this time, the intermediary pairing device executes a cybersecurity service function.
    Type: Application
    Filed: September 22, 2017
    Publication date: March 28, 2019
    Inventors: Ronnie Dan, Hugo Mike Latapie, Andre Jean-Marie Surcouf, Enzo Fenoglio, Thierry Gruszka
  • Publication number: 20190080178
    Abstract: In one embodiment, a device identifies, from image data captured by one or more cameras of a physical location, a focal point of interest and people located within the physical location. The device forms a set of nodes whereby a given node represents one or more of the identified people located within the physical location. The device represents a person queue as an ordered list of nodes from the set of nodes and adds a particular one of the set of nodes to the list based on the particular node being within a predefined distance to the focal point of interest. The device adds one or more nodes to the list based on the added node being within an angle and distance range trailing a forward direction associated with at least one node in the list. The device provides an indication of the person queue to an interface.
    Type: Application
    Filed: September 12, 2017
    Publication date: March 14, 2019
    Inventors: Victor Tsekay To, Feng Jiang, Nham Van Le, Hugo Latapie, Enzo Fenoglio
  • Publication number: 20190034799
    Abstract: In one embodiment, a method includes receiving current data, the current data including time series data representing a plurality of time instances. The method includes storing at least a recent portion of the current data in a buffer. The method includes reducing the dimensionality of the current data to generate dimensionality-reduced data. The method includes generating a reconstruction error based on the dimensionality-reduced data and a plurality of neural network metrics. At least one of a size of the recent portion of the current data stored in the buffer or an amount of the reducing the dimensionality of the current data is based on the reconstruction error.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Joseph T. Friel, Andre Surcouf, Pascal Thubert
  • Publication number: 20190028496
    Abstract: Presented herein are techniques for detecting anomalies in micro-service communications that are indicative of security issues/problems for the application. More specifically, a computing device receives a plurality of micro-service communication records each associated with traffic sent between pairs of executables (nodes) that are related to a micro-services application. Each of the micro-service communication records includes a time series entry and an associated trace sequence identifier and each of the micro-service communication records are generated during a time period. The computing device analyzes the plurality of micro-service communications to detect possible anomalous communication patterns associated with the micro-services application during the time period.
    Type: Application
    Filed: July 19, 2017
    Publication date: January 24, 2019
    Inventors: Enzo Fenoglio, Jérôme Tollet, Syed Muhammad Mohsin Kazmi, Hugo M. Latapie
  • Patent number: 10178131
    Abstract: In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device assigns each of the set of network entities to one or more hyperedges of a hypergraph based on the characteristics. The device applies a security policy to a particular one of the network entities based on the one or more hyperedges of the hypergraph to which the particular network entity is assigned.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: January 8, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Plamen Nedeltchev, Hugo Latapie, Enzo Fenoglio, Manikandan Kesavan, Deon J. Chatterton
  • Publication number: 20180376108
    Abstract: Systems and methods are disclosed for anticipating a video switch to accommodate a new speaker in a video conference comprising a real time video stream captured by a camera local to a first videoconference endpoint is analyzed according to at least one speaker anticipation model. The speaker anticipation model predicts that a new speaker is about to speak. Video of the anticipated new speaker is sent to the conferencing server in response to a request for the video on the anticipated new speaker from the conferencing server. Video of the anticipated new speaker is distributed to at least a second videoconference endpoint.
    Type: Application
    Filed: July 11, 2017
    Publication date: December 27, 2018
    Inventors: Paul Bright-Thomas, Nathan Buckles, Keith Griffin, Eric Chen, Manikandan Kesavan, Plamen Nedeltchev, Hugo Mike Latapie, Enzo Fenoglio
  • Patent number: 10158973
    Abstract: Techniques in an information-centric network (ICN) for facilitating the transport of passengers or items are described. In one illustrative example, a first mobile device is configured to operate as a mobile transportation-offering ICN endpoint device. The first mobile device may connect to one of a plurality of fixed-location ICN nodes in the ICN network. The first mobile device may communicate in the ICN network one or more interest packet messages indicating an interest in a passenger or item to transport. The interest in a passenger or item to transport may be indicated in, for example, a Named Data Object (NDO). The one or more interest packet messages may include current transportation route information indicating a current anticipated route of transportation for a current passenger or item.
    Type: Grant
    Filed: July 27, 2017
    Date of Patent: December 18, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Andre Surcouf, Thierry Gruszka, Hugo Latapie, Ronnie Dan, Enzo Fenoglio
  • Patent number: 10121103
    Abstract: In one embodiment, a method includes receiving training data, the training data including training video data representing video of a location in a quiescent state, training a neural network using the training data to obtain a plurality of metrics, receiving current data, the current data including current video data representing video of the location at a current time period, generating a reconstruction error based on the plurality of metrics and the current video data in the embedded space, and generating, in response to determining that the reconstruction error is greater than a threshold, a notification indicative of the location being in a non-quiescent state.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: November 6, 2018
    Assignee: Cisco Technologies, Inc.
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Joseph T. Friel, Andre Surcouf, Pascal Thubert
  • Publication number: 20180302490
    Abstract: According to one aspect, a method includes obtaining a request for content through a physical network layer at a first node, the first node being one of a plurality of nodes in a content network layer, each node of the plurality of nodes including the content, wherein the request includes a first packet. The method also includes identifying a second node of the plurality of nodes from which to obtain the content, and inserting a segment routing (SR) list into the first packet, the SR list specifying an address of the second node as a next destination of the first packet. Finally, the method includes providing the packet including the SR list from the first node to the second node, wherein the second node is arranged to change the next destination of the packet to an address of the content included on the second node.
    Type: Application
    Filed: April 13, 2017
    Publication date: October 18, 2018
    Applicant: Cisco Technology, Inc.
    Inventors: Andre Surcouf, Enzo Fenoglio, Hugo Latapie, Joseph Friel, Thierry Gruszka
  • Patent number: 10067810
    Abstract: Various implementations disclosed herein provide a method for performing one or more transactions between application containers. In various implementations, the method includes transmitting a key request to a first network node within a cluster of network nodes that are configured to generate and maintain a distributed ledger. In some implementations, the key request indicates that the requested key is for one or more transactions between a first application container and a second application container. In various implementations, the method includes receiving a key in response to transmitting the key request. In some implementations, the key is valid for the one or more transactions between the first application container and the second application container. In various implementations, the method includes synthesizing, at the first application container, transaction data with the key.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: September 4, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Andre Jean-Marie Surcouf, Hugo Mike Latapie, Enzo Fenoglio, Joseph T. Friel
  • Publication number: 20180246873
    Abstract: In one embodiment, a method includes obtaining text from a user, applying the text to a deep learning neural network to generate a plurality of bias coordinates defining a point in an embedded space, and, in response to determining that at least one of the plurality of bias coordinates exceeds a threshold, providing an indication of bias to the user.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Guillaume Sauvage De Saint Marc, Monique Jeanne Morrow, Manikandan Kesavan
  • Publication number: 20180234348
    Abstract: In one embodiment, a device in a network receives control plane packet data indicative of control plane packets for a control plane in the network. The device models the control plane using a machine learning model based on the control plane packet data. The device predicts an instability in the control plane using the machine learning model. The device causes performance of a mitigation action based on the predicted instability in the control plane.
    Type: Application
    Filed: February 14, 2017
    Publication date: August 16, 2018
    Inventors: Dmitry Goloubew, Gonzalo Salgueiro, Enzo Fenoglio, Hugo Latapie, Andre Surcouf
  • Publication number: 20180212996
    Abstract: In one embodiment, a device in a network identifies a set of network entities. The device determines characteristics of the network entities. The device assigns each of the set of network entities to one or more hyperedges of a hypergraph based on the characteristics. The device applies a security policy to a particular one of the network entities based on the one or more hyperedges of the hypergraph to which the particular network entity is assigned.
    Type: Application
    Filed: January 23, 2017
    Publication date: July 26, 2018
    Inventors: Plamen Nedeltchev, Hugo Latapie, Enzo Fenoglio, Manikandan Kesavan, Deon J. Chatterton
  • Publication number: 20180165576
    Abstract: In one embodiment, a method includes receiving training data, the training data including training video data representing video of a location in a quiescent state, training a neural network using the training data to obtain a plurality of metrics, receiving current data, the current data including current video data representing video of the location at a current time period, generating a reconstruction error based on the plurality of metrics and the current video data in the embedded space, and generating, in response to determining that the reconstruction error is greater than a threshold, a notification indicative of the location being in a non-quiescent state.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 14, 2018
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Joseph T. Friel, Andre Surcouf, Pascal Thubert
  • Publication number: 20180165579
    Abstract: In one embodiment, a method includes training a deep neural network using a first set of network characteristics corresponding to a first time and a second set of network characteristics corresponding to a second time, generating, using the deep neural network, a predictive set of network characteristics corresponding to a future time, and assigning a task of a distributed application to a processing unit based on the predictive set of network characteristics.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 14, 2018
    Inventors: Joseph T. Friel, Andre Surcouf, Hugo Mike Latapie, Enzo Fenoglio, Pascal Thubert
  • Patent number: 9998805
    Abstract: Disclosed are systems, methods, and computer-readable storage media for adaptive telemetry based on in-network cross domain intelligence. A telemetry server can receive at least a first telemetry data stream and a second telemetry data stream. The first telemetry data stream can provide data collected from a first data source and the second telemetry data stream can provide data collected from a second data source. The telemetry server can determine correlations between the first telemetry data stream and the second telemetry data stream that indicate redundancies between data included in the first telemetry data stream and the second telemetry data stream, and then adjust, based on the correlations between the first telemetry data stream and the second telemetry data stream, data collection of the second telemetry data stream to reduce redundant data included in the first telemetry data stream and the second telemetry data stream.
    Type: Grant
    Filed: July 26, 2017
    Date of Patent: June 12, 2018
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Joseph Friel, Hugo Latapie, Andre Surcouf, Enzo Fenoglio
  • Publication number: 20180139146
    Abstract: According to one aspect, a method includes identifying at least a first chunk to be obtained, the at least first chunk including at least a first packet, and determining a deadline for the first chunk, the deadline being indicative of an amount of time before the first chunk is needed. The method also includes determining whether the deadline for the first chunk is relatively long, and de-prioritizing the first chunk with respect to obtaining the first chunk for queueing in a buffer when it is determined that the deadline for the first chunk is relatively long. Finally, the method includes obtaining the first chunk for queueing in the buffer, wherein obtaining the first chunk for queueing in the buffer includes obtaining the first chunk after obtaining a second chunk for queueing in the buffer, the second chunk having a shorter deadline than the deadline for the first chunk.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 17, 2018
    Applicant: Cisco Technology, Inc.
    Inventors: Joseph Friel, Hugo Latapie, Andre Surcouf, Enzo Fenoglio, Thierry Gruszka
  • Publication number: 20180033024
    Abstract: In one embodiment, a method includes obtaining a plurality of tracklets, each of the plurality of tracklets including tracklet data representing a position of a respective one of a plurality of people at a plurality of times. The method includes generating a behavioral analytic metric based on the plurality of tracklets. The method includes generating a notification in response to determining that the behavioral analytic metric is greater than a threshold.
    Type: Application
    Filed: July 28, 2016
    Publication date: February 1, 2018
    Inventors: Hugo Mike Latapie, Enzo Fenoglio, Andre Jean-Marie Surcouf, Joseph T. Friel
  • Publication number: 20180032383
    Abstract: Various implementations disclosed herein provide a method for performing one or more transactions between application containers. In various implementations, the method includes transmitting a key request to a first network node within a cluster of network nodes that are configured to generate and maintain a distributed ledger. In some implementations, the key request indicates that the requested key is for one or more transactions between a first application container and a second application container. In various implementations, the method includes receiving a key in response to transmitting the key request. In some implementations, the key is valid for the one or more transactions between the first application container and the second application container. In various implementations, the method includes synthesizing, at the first application container, transaction data with the key.
    Type: Application
    Filed: July 28, 2016
    Publication date: February 1, 2018
    Inventors: Andre Jean-Marie Surcouf, Hugo Mike Latapie, Enzo Fenoglio, Joseph T. Friel