Patents by Inventor Luigi Sperti

Luigi Sperti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8443446
    Abstract: A system for identifying malicious messages transmitted over a mobile communication network includes: sentinel modules associated with respective mobile terminals in the network for monitoring messages passing therethrough, wherein the sentinel modules identify as a candidate malicious message, any message passing through the mobile terminals and failing to comply with a first set of patterns and issue a corresponding sentinel identification message; a set of probe modules for monitoring messages transmitted over the network, wherein the probe modules identify as a candidate malicious message any message transmitted over the network and failing to comply with a second set of patterns and issue a corresponding probe identification message; and preferably at least one client honeypot module for receiving and processing any messages sent thereto to produce corresponding processing results, wherein the client honeypot module identifies as a candidate malicious message any message producing a processing result fai
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: May 14, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Gerardo Lamastra, Gianluca Cangini, Francesco Coda Zabetta, Luigi Sperti
  • Patent number: 8369830
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: February 5, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luigi Sperti, Maria José Mollo, Federico Frosali, Giorgio Freguglia
  • Publication number: 20120151585
    Abstract: A system for identifying malicious messages transmitted over a mobile communication network includes: sentinel modules associated with respective mobile terminals in the network for monitoring messages passing therethrough, wherein the sentinel modules identify as a candidate malicious message, any message passing through the mobile terminals and failing to comply with a first set of patterns and issue a corresponding sentinel identification message; a set of probe modules for monitoring messages transmitted over the network, wherein the probe modules identify as a candidate malicious message any message transmitted over the network and failing to comply with a second set of patterns and issue a corresponding probe identification message; and preferably at least one client honeypot module for receiving and processing any messages sent thereto to produce corresponding processing results, wherein the client honeypot module identifies as a candidate malicious message any message producing a processing result fai
    Type: Application
    Filed: March 27, 2006
    Publication date: June 14, 2012
    Inventors: Gerardo Lamastra, Gianluca Cangini, Francesco Coda Zabetta, Luigi Sperti
  • Publication number: 20080043686
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Application
    Filed: December 30, 2004
    Publication date: February 21, 2008
    Applicant: TELECOM ITALIA S.P.A.
    Inventors: Luigi Sperti, Maria Mollo, Federico Frosali, Giorgio Freguglia