Patents by Inventor Marcelo Yannuzzi Sanchez
Marcelo Yannuzzi Sanchez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230394370Abstract: Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.Type: ApplicationFiled: August 22, 2023Publication date: December 7, 2023Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Simon Dyke, David Delano Ward
-
Patent number: 11763194Abstract: Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.Type: GrantFiled: January 15, 2020Date of Patent: September 19, 2023Assignee: Cisco Technology, Inc.Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Simon Dyke, David Delano Ward
-
Patent number: 11681813Abstract: Systems, methods, and computer-readable media for context-based transfer and access of data include a producer which receives a request from a consumer to access a data block. The producer verifies whether a context associated with the consumer will allow access the data block, by providing a challenge to the consumer and obtaining a response, the response including a certification that the context associated with the consumer will allow the consumer to access the data block. Upon verifying that the context allows the consumer to access the data block, the producer transfers a data capsule, the data capsule including an encrypted version of the data block and a micro agent for monitoring access to the data block. The micro agent can interact with an operating system at the consumer to allow decryption and local access of the data block upon the data capsule being transferred.Type: GrantFiled: January 15, 2020Date of Patent: June 20, 2023Assignee: Cisco Technology, Inc.Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Robert Edgar Barton, Simon Dyke
-
Patent number: 11499851Abstract: Methods and systems for sensor fusion as a service include receiving a sensor fusion intent descriptive of desired data from a specified environment; determining candidate sensors present in the specified environment that may be used to obtain at least a portion of the desired data; and transforming the sensor fusion intent into a sensor fusion manifest by selecting a plurality of the candidate sensors to obtain respective output data, and by defining at least one action to fuse the respective output data into the desired data, wherein the sensor fusion manifest includes an identification of the selected candidate sensors and the at least one action to fuse the respective output data from the selected candidate sensors into the desired data.Type: GrantFiled: August 12, 2020Date of Patent: November 15, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Hervé Muyal, Simon Dyke
-
Patent number: 11388011Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.Type: GrantFiled: January 22, 2020Date of Patent: July 12, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Frank Michaud, Ram Abhinav Somaraju, Marcelo Yannuzzi Sanchez, Alan Robert Lynn
-
Patent number: 11166147Abstract: The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.Type: GrantFiled: July 21, 2020Date of Patent: November 2, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Timothy P. Stammers, Carlos M. Pignataro, Marcelo Yannuzzi Sanchez, Hervé Muyal, Bart Brinckman
-
Publication number: 20210281994Abstract: The present technology discloses non-transitory computer-readable media, systems, and methods for receiving a notification that an identified physical object has attached to a roaming network, wherein the identified physical object is roaming when on the roaming network; translating at least one policy intent that was defined at a home network for the identified physical object into a policy suitable to be applied by the roaming network; and sending, to the roaming network, the at least one translated policy intent to be applied to the identified physical object on the roaming network.Type: ApplicationFiled: July 21, 2020Publication date: September 9, 2021Inventors: Timothy P. Stammers, Carlos M. Pignataro, Marcelo Yannuzzi Sanchez, Hervé Muyal, Bart Brinckman
-
Publication number: 20210239498Abstract: Methods and systems for sensor fusion as a service include receiving a sensor fusion intent descriptive of desired data from a specified environment; determining candidate sensors present in the specified environment that may be used to obtain at least a portion of the desired data; and transforming the sensor fusion intent into a sensor fusion manifest by selecting a plurality of the candidate sensors to obtain respective output data, and by defining at least one action to fuse the respective output data into the desired data, wherein the sensor fusion manifest includes an identification of the selected candidate sensors and the at least one action to fuse the respective output data from the selected candidate sensors into the desired data.Type: ApplicationFiled: August 12, 2020Publication date: August 5, 2021Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Hervé Muyal, Simon Dyke
-
Publication number: 20210027306Abstract: A management system performs a focused search to find uniform resource identifiers (URIs) of potentially counterfeit products and/or fake assets online, performs a search for adjacencies of blacklist URIs of counterfeit products and/or fake assets online to find additional URIs of potentially counterfeit products and/or fake assets online that are related to the blacklist URIs, and adds the URIs and the additional URIs to a URI list. The management system classifies, by a machine learning classifier, each URI on the URI list as one of a blacklist URI of counterfeit products and/or fake assets online, and a whitelist URI of authentic products and/or assets online, and repeats the performing the search for adjacencies using blacklist URIs resulting from the classifying, the adding, and the classifying operations, and removes access to counterfeit and/or fake assets online revealed by the focused search, the search for adjacencies, or the classifying.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Inventors: Ram Abhinav Somaraju, Hervé Muyal, Marcelo Yannuzzi Sánchez, Carlos M. Pignataro
-
Publication number: 20200364615Abstract: Systems, methods, and computer-readable for cognitive sensor fusion management include obtaining one or more data streams from one or more sensors. Learning algorithms are used for determining whether a combination of the one or more data streams includes sufficient information for achieving a desired outcome, based on context, business verticals, or other considerations. One or more modifications are determined to at least the one or more data streams or one or more sensors based on whether the combination of the one or more data streams includes sufficient information for achieving the desired outcome. In a closed-loop system, feedback from implementing the one or more modifications can be used to update the desired outcome.Type: ApplicationFiled: January 15, 2020Publication date: November 19, 2020Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Simon Dyke, David Delano Ward
-
Publication number: 20200364351Abstract: Systems, methods, and computer-readable media for context-based transfer and access of data include a producer which receives a request from a consumer to access a data block. The producer verifies whether a context associated with the consumer will allow access the data block, by providing a challenge to the consumer and obtaining a response, the response including a certification that the context associated with the consumer will allow the consumer to access the data block. Upon verifying that the context allows the consumer to access the data block, the producer transfers a data capsule, the data capsule including an encrypted version of the data block and a micro agent for monitoring access to the data block. The micro agent can interact with an operating system at the consumer to allow decryption and local access of the data block upon the data capsule being transferred.Type: ApplicationFiled: January 15, 2020Publication date: November 19, 2020Inventors: Marcelo Yannuzzi Sanchez, Carlos M. Pignataro, Robert Edgar Barton, Simon Dyke
-
Publication number: 20200322169Abstract: The present technology pertains to a system that authenticates the identity of a user trying to access a service. The system comprises an authentication provider configured to communicate authentication requirements to a continuous multifactor authentication device and the continuous multifactor authentication device configured to receive authentication requirements, to fuse multiple identification factors into an identification credential for a user according to the authentication requirements, and to send the authentication credential to the authentication provider. After receiving the identification credential meeting the authentication requirements, the authentication provider is configured to instruct a service provider to initiate a session.Type: ApplicationFiled: January 22, 2020Publication date: October 8, 2020Inventors: Frank Michaud, Ram Abhinav Somaraju, Marcelo Yannuzzi Sanchez, Alan Robert Lynn
-
Publication number: 20060097046Abstract: A system for luggage self-tracking/identification during air travel involves a programmable, wireless LAN active transceiver preferably located inside each piece of luggage, with controlled access to the airlines' luggage tracking networks. Prior to a flight, each transceiver is loaded with the passenger's itinerary, and logged in the airline's network at check-in. Each transceiver is uniquely identifiable by the luggage tracking network. An example of a preferred identifier would be the utilization of its Medium Access Control (MAC) and its alphanumeric serial keyword to provide unique and secure registration/identification of the transceiver in the airline's network. During the trip, which may include different stopovers before reaching the final destination, the transceiver is able to automatically compare its programmed itinerary with its current location via wireless access to the airports and aircraft wireless LANs.Type: ApplicationFiled: October 24, 2005Publication date: May 11, 2006Inventors: Marcelo Baru Fassio, Marcelo Yannuzzi Sanchez, Gonzalo Picun Miller