Patents by Inventor Humberto Cardoso MARCHEZI
Humberto Cardoso MARCHEZI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11200466Abstract: In an implementation, a non-transitory machine-readable storage medium stores instructions that when executed by a processor, cause the processor to allocate classifier data structures to persistent memory, read a number of categories from a set of training data, and populate the classifier data structures with training data including training-based, category and word probabilities calculated based on the training data.Type: GrantFiled: October 28, 2015Date of Patent: December 14, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Humberto Cardoso Marchezi, Taciano Perez, Carlos Haas
-
Patent number: 11003518Abstract: Example systems may relate to component failure prediction. A non-transitory computer readable medium may contain instructions to analyze a plurality of features corresponding to a component of a system. The non-transitory computer readable medium may further contain instructions to determine which of the plurality of features to use to model a failure of the component. The non-transitory computer readable medium may contain instructions to generate a plurality of models to model the failure of the component and assemble the plurality of models into a single model for predicting component failure. The non-transitory computer readable medium may further contain instructions to extract data associated with a component failure predicted by the single model and correlate the data associated with the predicted component failure with the single model.Type: GrantFiled: September 29, 2016Date of Patent: May 11, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Marlon Gomes Lopez, Guilherme Selau Riberio, Luciano Alves, Humberto Cardoso Marchezi, Brian Schmitz Tani, Leonardo Marquezini, Eduardo Rodel, Josepe Franco Gerent
-
Patent number: 10992669Abstract: Examples disclosed herein relate to acquisition of a device fingerprint from an instance of a client application. Examples include association of a target device fingerprint, based on device context information, with a target user account in a remote service, and acquisition of an application device fingerprint from an unpaired instance of a client application.Type: GrantFiled: April 28, 2015Date of Patent: April 27, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Victor Albuquerque Correa, Humberto Cardoso Marchezi, Roberto Bender, Joao Carrion
-
Patent number: 10877430Abstract: In one example, an electromechanical device includes a removable component comprising an electronic identification tag. The apparatus also includes a plurality of tag readers disposed at a plurality of sectors in the apparatus to detect the electronic identification tag and signal strengths associated with the detected electronic identification tag, and send the signal strengths to a tracking system.Type: GrantFiled: October 11, 2016Date of Patent: December 29, 2020Assignee: HP Indigo B.V.Inventors: Eduardo Rodel, Humberto Cardoso Marchezi, Guilherme Selau Ribeiro, Marlon Gomes Lopes, Josepe Franco Gerent, Luciano Alves, Leonardo Dias Marquezini, Brian Schmitz Tani
-
Publication number: 20200026590Abstract: Example systems may relate to component failure prediction. A non-transitory computer readable medium may contain instructions to analyze a plurality of features corresponding to a component of a system. The non-transitory computer readable medium may further contain instructions to determine which of the plurality of features to use to model a failure of the component. The non-transitory computer readable medium may contain instructions to generate a plurality of models to model the failure of the component and assemble the plurality of models into a single model for predicting component failure. The non-transitory computer readable medium may further contain instructions to extract data associated with a component failure predicted by the single model and correlate the data associated with the predicted component failure with the single model.Type: ApplicationFiled: September 29, 2016Publication date: January 23, 2020Inventors: Marlon Gomes Lopez, Guilherme Selau Riberio, Luciano Alves, Humberto Cardoso Marchezi, Brian Schmitz Tani, Leonardo Marquezini, Eduardo Rodel, Josepe Franco Gerent
-
Publication number: 20190361389Abstract: In one example, an electromechanical device includes a removable component comprising an electronic identification tag. The apparatus also includes a plurality of tag readers disposed at a plurality of sectors in the apparatus to detect the electronic identification tag and signal strengths associated with the detected electronic identification tag, and send the signal strengths to a tracking system.Type: ApplicationFiled: October 11, 2016Publication date: November 28, 2019Applicant: HP Indigo B.V.Inventors: Eduardo Rodel, Humberto Cardoso Marchezi, Guilherme Selau Ribeiro, Marlon Gomes Lopes, Josepe Franco Gerent, Luciano Alves, Leonardo Dias Marquezini, Brian Schmitz Tani
-
Publication number: 20180276507Abstract: In an implementation, a non-transitory machine-readable storage medium stores instructions that when executed by a processor, cause the processor to allocate classifier data structures to persistent memory, read a number of categories from a set of training data, and populate the classifier data structures with training data including training-based, category and word probabilities calculated based on the training data.Type: ApplicationFiled: October 28, 2015Publication date: September 27, 2018Inventors: Humberto Cardoso Marchezi, TacĂano Perez, Carios Haas
-
Publication number: 20170310667Abstract: Examples disclosed herein relate to acquisition of a device fingerprint from an instance of a client application. Examples include association of a target device fingerprint, based on device context information, with a target user account in a remote service, and acquisition of an application device fingerprint from an unpaired instance of a client application.Type: ApplicationFiled: April 28, 2015Publication date: October 26, 2017Inventors: Victor Albuquerque Correa, Humberto Cardoso Marchezi, Roberto Bender, Joao Carrion
-
Patent number: 9584523Abstract: According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a remote computer network asset, and determining, by a processor, an authorization of the application to access the remote computer network asset based on a policy. In response to a determination that the application is authorized to access the remote computer network asset, the method includes setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN. In response to a determination that the application is not authorized to access the remote computer network asset, the method includes routing traffic from the application to a network different than the remote computer network.Type: GrantFiled: October 30, 2012Date of Patent: February 28, 2017Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Soma Sundaram Santhiveeran, Jose Paulo Xavier Pires, Ricardo Bueno Moreira, Humberto Cardoso Marchezi, Paul Gerhard Schulze
-
Publication number: 20170034216Abstract: Examples of authorizing application access to a virtual private network are disclosed. In one example implementation according to aspects of the present disclosure, a method may include connecting, by a computing system, electronically to a virtual private network (VPN) by sending authentication credentials, and receiving, by the computing system, a set of application policies from an application policy database in the VPN. The method may further include determining, by the computing system, whether an application running on the computing system is authorized to access resources within the VPN based on the set of application policies received from the application policy database. Additionally, the method may include enabling, by the computing system, the application to access the resources within the VPN when it is determined that the set of application policies authorizes the application to access the resources within the VPN.Type: ApplicationFiled: November 27, 2013Publication date: February 2, 2017Applicant: Hewlett Packard Enterprise Development LPInventors: Soma Sundaram Santhiveeran, Jose Paulo Xavier Pires, Humberto Cardoso Marchezi, Paul Gerhard Schulze, Ricardo Moreira
-
Publication number: 20140122716Abstract: According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a remote computer network asset, and determining, by a processor, an authorization of the application to access the remote computer network asset based on a policy. In response to a determination that the application is authorized to access the remote computer network asset, the method includes setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN. In response to a determination that the application is not authorized to access the remote computer network asset, the method includes routing traffic from the application to a network different than the remote computer network.Type: ApplicationFiled: October 30, 2012Publication date: May 1, 2014Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Soma Sundaram SANTHIVEERAN, Jose Paulo Xavier PIRES, Ricardo Bueno MOREIRA, Humberto Cardoso MARCHEZI, Paul Gerhard SCHULZE