Patents by Inventor Antonio Di Cocco

Antonio Di Cocco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150089642
    Abstract: A method and a system for detecting phishing of a matrix barcode is provided. The matrix barcode comprises colored and white squares in rows and columns. The method comprises scanning the matrix barcode row by row and column by column resulting in received squares, storing a corresponding white color level for each received white square, and comparing the white color levels of the received white squares couple-wise.
    Type: Application
    Filed: July 29, 2014
    Publication date: March 26, 2015
    Inventors: Antonio Di Cocco, Leonardo Lanni, Nicola Milanese, Riccardo Pizzutilo, Andrea Tortosa
  • Publication number: 20150039875
    Abstract: A solution for deploying a software image comprising a target operating system on a target computing machine is proposed. A corresponding method comprises mounting the software image as a storage device, identifying each software program comprised in the software image, downloading a configuration logic for configuring each software program, applying each configuration logic against the software image, and booting the target computing machine from the target operating system.
    Type: Application
    Filed: June 12, 2014
    Publication date: February 5, 2015
    Inventors: Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20140187203
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes: responsive to initiation of a telephone call by a caller from a first telephone unit to a second telephone unit, retrieving an identification object comprising identification information corresponding to the caller; encrypting the identification object using an encryption key stored on the first telephone unit; and transmitting, as part of the telephone call, the encrypted caller identification object to a telephone network destined for the second telephone unit.
    Type: Application
    Filed: January 2, 2013
    Publication date: July 3, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Publication number: 20140181064
    Abstract: A system, method and/or software for using overlap between a first website area-of-interest map, associated with a first website, and a searcher area-of-interest map to help prioritize the websites returned by a search engine search. The area-of-interest maps are made up of geographic pixels respectively assigned with area-of-interest values. Overlap area is determined by comparing, on a pixel-by-pixel basis, corresponding pixels of the searcher area-of-interest map and the first website area-of-interest map to determine overlap pixels where the following conditions hold: (i) the first website area-of-interest map has a non-zero interest value, and (ii) the searcher area-of-interest map has a non-zero interest value.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Antonio Di Cocco, Leonardo Lanni, Gianluca Perreca, Andrea Tortosa
  • Publication number: 20130263113
    Abstract: A mechanism is provided for managing pre-requisite software components of a software product distributed on a virtual machine. A list of pre-requisite software components for the software product provided in the software product virtual image distribution package of the software product virtual image is read. A test is performed as to whether each pre-requisite software component in the list of prerequisite software components is not installed in the virtual machine. If the prerequisite software component is not installed, the pre-requisite software component is retrieved. License text of the retrieved pre-requisite software component is read and displayed to a user. Upon approval of the license text by the user, the retrieved pre-requisite software component is installed. The process is repeated until all the pre-requisite software components are installed.
    Type: Application
    Filed: November 3, 2011
    Publication date: October 3, 2013
    Applicant: International Business Machines Corporation
    Inventors: Paolo Cavazza, Giuseppe Ciano, Antonio Di Cocco, Luigi Pichetti
  • Publication number: 20130074068
    Abstract: A method for managing a virtual image in a cloud environment by implementing a customizable virtual image deployment may be provided. The method may comprise generating a virtual image and a set of configuration parameters related to specific parts of the virtual image, and assigning a set of values to the configuration parameters. Furthermore, the method may comprise deploying the virtual image using the set of values assigned to the parameters, such that parts of the virtual image may be deployed as a customized virtual image depending on the set of values of the parameters.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 21, 2013
    Applicant: International Business Machines Corporation
    Inventors: Giuseppe Ciano, Rossella De Gaetano, Antonio Di Cocco, Luigi Pichetti
  • Publication number: 20130007265
    Abstract: Provided are a computer program product, system, and method for monitoring resources in a cloud computing environment. A set of cloud resources is provisioned to a user of the cloud-computing environment. A set of private resources is provided for the user, each private resource being provisioned within the set of cloud resources of the user. Monitoring templates are exposed, each one for a corresponding type of a private resource to the user. A user subscription is received to at least one of the monitoring templates, wherein each of the subscribed monitoring templates is for one of the user private resources. A private monitoring agent is provided within the cloud resources of the user housing the private resource of the user to monitor the private resource according to the corresponding selected monitoring template.
    Type: Application
    Filed: June 11, 2012
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Fabio Benedetti, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20120159317
    Abstract: An implementation of an auto-completion or auto-correction mechanism where a dictionary of entry list look-up is triggered by the expiry of a time limit between data entry events such as key-press events, where the value of the time limit is dynamically determined as a function of the entry rate. The time limit may be calculated for example on the basis of an average entry rate, and may include an extra margin value. The occurrence of look up triggering will therefore tend to be optimised to the present user's data entry rate.
    Type: Application
    Filed: June 16, 2006
    Publication date: June 21, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Antonio Di Cocco, Filippo Cala
  • Publication number: 20090313631
    Abstract: A method of automatically optimizing workload scheduling. Target values for workload characteristics and constraint specifications are received. Generation of a first execution plan is initiated. Initial constraint values conforming to the constraint specifications are selected. Each constraint value constrains tasks included in the workload. The first execution plan is executed, thereby determining measurements of workload characteristics. Contributions indicating differences between workload characteristic measurements and target values are determined and stored. Generation of a next execution plan is initiated. Modified constraint values conforming to the constraint specifications are selected. Changes in the workload characteristics based on the modified constraint values are evaluated. An optimal or acceptable sub-optimal solution in a space of solutions defined by the constraint specifications is determined, resulting in new values for the constraints.
    Type: Application
    Filed: June 11, 2008
    Publication date: December 17, 2009
    Inventors: Fabio De Marzo, Antonio Di Cocco, Domenico Di Giulio, Franco Mossotto