Patents by Inventor Marcelo Yannuzzi

Marcelo Yannuzzi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220232375
    Abstract: A method includes receiving, at an access node, a connection request from a device and in response to the connection request, establishing a connection with an identity provider. The device, the access node, the local network, and the identity provider are members of an identity federation. The method also includes, after the device is authenticated with the identity provider, sending or receiving, to or from the identity provider and by the access node, data linking the device to an item and an owner of the device.
    Type: Application
    Filed: January 21, 2021
    Publication date: July 21, 2022
    Inventors: Marcelo YANNUZZI, Herve MUYAL, Benjamin W. RYDER, Marco TRINELLI, Bart A. BRINCKMAN
  • Publication number: 20220222609
    Abstract: According to one or more embodiments of the disclosure, a service deploys a first service connector to a first deployment network of a first organization and a second service connector to a second deployment network of a second organization. The service receives a selected visibility offering by the first organization and a selected visibility intent for the second organization. The service determines a data sharing policy by matching the selected visibility offering by the first organization to the selected visibility intent for the second organization. The service configures the first service connector to capture data specified by the data sharing policy from the first deployment network and provide that data to the second service connector.
    Type: Application
    Filed: January 12, 2021
    Publication date: July 14, 2022
    Inventors: Marcelo Yannuzzi, Joel Abraham Obstfeld, Franciscus Johannes Marcellus van Lingen, Anuj Jain
  • Patent number: 11388011
    Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
    Type: Grant
    Filed: January 22, 2020
    Date of Patent: July 12, 2022
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Frank Michaud, Ram Abhinav Somaraju, Marcelo Yannuzzi Sanchez, Alan Robert Lynn
  • Patent number: 11330546
    Abstract: Embodiments herein registers Asset Owners (AOs) and AO applications to a location, aggregation, and insight (LAI) service that are part of the same identity federation. When registering the AO with the LAI service, the AO selects which of a plurality of Identity Providers (IDPs) it has a relationship with, and the LAI service can then bind those IDPs to the AO application. This binding associates respective realms (e.g., domains) corresponding to the selected IDPs to the AO application. Later, when a device owned by the AO roams to a visited network (VN), the LAI service can then use a realm identified from a device ID provided by the device to identify the ID of the AO application. The LAI service then enables the VN to transmit a location of the device to the AO application. In one embodiment, the VN obtains consent from the AO before sharing location data.
    Type: Grant
    Filed: December 11, 2020
    Date of Patent: May 10, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Marcelo Yannuzzi, Herve Muyal, Bart A. Brinckman, Vikas S. Murthy
  • Patent number: 11166147
    Abstract: The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.
    Type: Grant
    Filed: July 21, 2020
    Date of Patent: November 2, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Timothy P. Stammers, Carlos M. Pignataro, Marcelo Yannuzzi Sanchez, Hervé Muyal, Bart Brinckman
  • Publication number: 20210281994
    Abstract: The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.
    Type: Application
    Filed: July 21, 2020
    Publication date: September 9, 2021
    Inventors: Timothy P. Stammers, Carlos M. Pignataro, Marcelo Yannuzzi Sanchez, Hervé Muyal, Bart Brinckman
  • Publication number: 20210239498
    Abstract: Methods and systems for sensor fusion as a service include receiving a sensor fusion intent descriptive of desired data from a specified environment; determining candidate sensors present in the specified environment that may be used to obtain at least a portion of the desired data; and transforming the sensor fusion intent into a sensor fusion manifest by selecting a plurality of the candidate sensors to obtain respective output data, and by defining at least one action to fuse the respective output data into the desired data, wherein the sensor fusion manifest includes an identification of the selected candidate sensors and the at least one action to fuse the respective output data from the selected candidate sensors into the desired data.
    Type: Application
    Filed: August 12, 2020
    Publication date: August 5, 2021
    Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Hervé Muyal, Simon Dyke
  • Publication number: 20210027306
    Abstract: A management system performs a focused search to find uniform resource identifiers (URIs) of potentially counterfeit products and/or fake assets online, performs a search for adjacencies of blacklist URIs of counterfeit products and/or fake assets online to find additional URIs of potentially counterfeit products and/or fake assets online that are related to the blacklist URIs, and adds the URIs and the additional URIs to a URI list. The management system classifies, by a machine learning classifier, each URI on the URI list as one of a blacklist URI of counterfeit products and/or fake assets online, and a whitelist URI of authentic products and/or assets online, and repeats the performing the search for adjacencies using blacklist URIs resulting from the classifying, the adding, and the classifying operations, and removes access to counterfeit and/or fake assets online revealed by the focused search, the search for adjacencies, or the classifying.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Ram Abhinav Somaraju, Hervé Muyal, Marcelo Yannuzzi Sánchez, Carlos M. Pignataro
  • Publication number: 20200364615
    Abstract: Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.
    Type: Application
    Filed: January 15, 2020
    Publication date: November 19, 2020
    Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Simon Dyke, David Delano Ward
  • Publication number: 20200364351
    Abstract: Systems, methods, and computer-readable media for context-based transfer and access of data include a producer which receives a request from a consumer to access a data block. The producer verifies whether a context associated with the consumer will allow access the data block, by providing a challenge to the consumer and obtaining a response, the response including a certification that the context associated with the consumer will allow the consumer to access the data block. Upon verifying that the context allows the consumer to access the data block, the producer transfers a data capsule, the data capsule including an encrypted version of the data block and a micro agent for monitoring access to the data block. The micro agent can interact with an operating system at the consumer to allow decryption and local access of the data block upon the data capsule being transferred.
    Type: Application
    Filed: January 15, 2020
    Publication date: November 19, 2020
    Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Robert Edgar Barton, Simon Dyke
  • Publication number: 20200322169
    Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.
    Type: Application
    Filed: January 22, 2020
    Publication date: October 8, 2020
    Inventors: Frank Michaud, Ram Abhinav Somaraju, Marcelo Yannuzzi Sanchez, Alan Robert Lynn
  • Patent number: 10412074
    Abstract: In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: September 10, 2019
    Assignee: Cisco Technology, Inc.
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Marcelo Yannuzzi, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20190036900
    Abstract: In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
    Type: Application
    Filed: October 4, 2018
    Publication date: January 31, 2019
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Marcelo Yannuzzi, Gonzalo Salgueiro, Joseph Michael Clarke
  • Patent number: 10122695
    Abstract: In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
    Type: Grant
    Filed: October 28, 2015
    Date of Patent: November 6, 2018
    Assignee: Cisco Technology, Inc.
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Marcelo Yannuzzi, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20170126647
    Abstract: In one embodiment, a first device in a network receives information regarding one or more nodes in the network. The first device determines a property of the one or more nodes based on the received information. The first device determines a degree of trustworthiness of the one or more nodes based on the received information. The first device attests to the determined property and degree of trustworthiness of the one or more nodes to a verification device. The verification device is configured to verify the attested property and degree of trustworthiness.
    Type: Application
    Filed: October 28, 2015
    Publication date: May 4, 2017
    Inventors: Tao Zhang, Yi Zheng, Helder F. Antunes, Marcelo Yannuzzi, Gonzalo Salgueiro, Joseph Michael Clarke
  • Publication number: 20060097046
    Abstract: A system for luggage self-tracking/identification during air travel involves a programmable, wireless LAN active transceiver preferably located inside each piece of luggage, with controlled access to the airlines' luggage tracking networks. Prior to a flight, each transceiver is loaded with the passenger's itinerary, and logged in the airline's network at check-in. Each transceiver is uniquely identifiable by the luggage tracking network. An example of a preferred identifier would be the utilization of its Medium Access Control (MAC) and its alphanumeric serial keyword to provide unique and secure registration/identification of the transceiver in the airline's network. During the trip, which may include different stopovers before reaching the final destination, the transceiver is able to automatically compare its programmed itinerary with its current location via wireless access to the airports and aircraft wireless LANs.
    Type: Application
    Filed: October 24, 2005
    Publication date: May 11, 2006
    Inventors: Marcelo Baru Fassio, Marcelo Yannuzzi Sanchez, Gonzalo Picun Miller