Patents by Inventor Marcello Velati

Marcello Velati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8413134
    Abstract: A method for facilitating the management of a software distribution process is proposed. The method provides the possibility of performing an introspection of a software package (which is used for installing a corresponding software product) before its application on each endpoint. The introspection evaluates any run-time parameters that condition the execution of the actions specified in the software package; in this way, it is possible to determine a list of the actions that will be actually executed during the application of the software package. This list is displayed on a monitor of the endpoint, so as to allow its user to decide whether the application of the software package should be accepted or not. Alternatively, the list of those actions can be collected on a distribution server (from multiple endpoints), to determine an impact of the distribution process on the whole system before its execution.
    Type: Grant
    Filed: May 10, 2006
    Date of Patent: April 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Massimiliano Celli, Luigi Pichetti, Marco Secchi, Marcello Velati
  • Patent number: 8230222
    Abstract: A software distribution method (300) with security add-on is proposed. Particularly, any software package to be deployed to selected target endpoints is encrypted (312-315) with a symmetric key (generated dynamically). The symmetric key is in turn encrypted (318-321) with a public key of each target endpoint. A multi-segment software package (embedding the encrypted software package and the encrypted symmetric keys) is then deployed (324-336, 360) to all the target endpoints. In this way, each target endpoint can decrypt (343-348) the encrypted symmetric key with a corresponding private key; it is then possible to decrypt (363-366) the encrypted software package with the symmetric key so obtained. As a result, the endpoint is able to apply (369) the decrypted software package. Therefore, the application of the software package can be restricted to the desired target endpoints only.
    Type: Grant
    Filed: August 21, 2006
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Massimiliano Celli, Luca Ferri, Luigi Pichetti, Marco Secchi, Marcello Velati
  • Patent number: 7668905
    Abstract: The invention proposes a solution allowing a web application to generate a response page based on local information of a client. For this purpose, a front-end servlet (receiving a request from the browser of the client) verifies (318, 360) whether the local information is available on the server. If not, a wait page with a command for uploading the local information is generated and sent (321) to the client, so as to cause the client to transmit (327-342) the local information to a back-end servlet of the server. The wait page self-refreshes (348-357) after a predefined delay; in response thereto, the same front-end servlet verifies whether the local information is ready to use. If the uploading is still in progress, a wait page without the upload command (which self-refreshes after the same delay) is generated and sent (363) again. Once the uploading has been completed, the front-end servlet can generate and send (366-372) the desired response page based on the up-to-date local information of the client.
    Type: Grant
    Filed: December 1, 2005
    Date of Patent: February 23, 2010
    Assignee: International Business Machines Corporation
    Inventors: Gianluca Bernardini, Rosario Gangemi, Gaetano Ruggiero, Marcello Velati
  • Publication number: 20090268887
    Abstract: A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party.
    Type: Application
    Filed: November 26, 2008
    Publication date: October 29, 2009
    Applicant: International Business Machines Corporation
    Inventors: Massimiliano Celli, Luigi Pichetti, Marcello Velati, Marco Secchi
  • Publication number: 20090158266
    Abstract: A method is presented for deploying a component onto a production computer system. The method may include identifying one or more alterations associated with deployment of a first application onto a first computer system, where the first application on the first computer system is substantially similar to a second application on a second computer system. Embodiments may further include generating a command and an object corresponding to the alteration, where the command and the object are generated as a function of the first application. The alteration may then be replicated on the second application of the second computer system by executing the command and the object on the second computer system.
    Type: Application
    Filed: August 29, 2008
    Publication date: June 18, 2009
    Applicant: International Business Machines Corporation
    Inventors: Massimiliano Celli, Luigi Pichetti, Marco Secchi, Marcello Velati
  • Patent number: 7474745
    Abstract: A method and system provides for notification of a called party of an incoming voice phone call intended for the called party even while the called party is engaged in data communications via a dial-up modem. In response to a calling party placing a call, a telecommunications network determining whether the called number is busy. If the called number is busy, the telecommunications network determines whether the called number is engaged in data communications. If the called number is engaged in data communications, the telecommunications network further: determines a data communication protocol being used by the called party to access the data network via a modem device, retrieves from a user profile of the called party one or more user notification addresses associated with the data communication protocol, and transmits an incoming call notification message to the one or more user notification addresses of the called party.
    Type: Grant
    Filed: April 24, 2008
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventors: Massimiliano Celli, Luigi Pichetti, Marcello Velati, Marco Secchi
  • Publication number: 20070055725
    Abstract: The invention proposes a solution allowing a web application to generate a response page based on local information of a client. For this purpose, a front-end servlet (receiving a request from the browser of the client) verifies (318,360) whether the local information is available on the server. If not, a wait page with a command for uploading the local information is generated and sent (321) to the client, so as to cause the client to transmit (327-342) the local information to a back-end servlet of the server. The wait page self-refreshes (348-357) after a predefined delay; in response thereto, the same front-end servlet verifies whether the local information is ready to use. If the uploading is still in progress, a wait page without the upload command (which self-refreshes after the same delay) is generated and sent (363) again. Once the uploading has been completed, the front-end servlet can generate and send (366-372) the desired response page based on the up-to-date local information of the client.
    Type: Application
    Filed: December 1, 2005
    Publication date: March 8, 2007
    Inventors: Gianluca Bernardini, Rosario Gangemi, Gaetano Ruggiero, Marcello Velati
  • Publication number: 20070047735
    Abstract: A software distribution method (300) with security add-on is proposed. Particularly, any software package to be deployed to selected target endpoints is encrypted (312-315) with a symmetric key (generated dynamically). The symmetric key is in turn encrypted (318-321) with a public key of each target endpoint. A multi-segment software package (embedding the encrypted software package and the encrypted symmetric keys) is then deployed (324-336, 360) to all the target endpoints. In this way, each target endpoint can decrypt (343-348) the encrypted symmetric key with a corresponding private key; it is then possible to decrypt (363-366) the encrypted software package with the symmetric key so obtained. As a result, the endpoint is able to apply (369) the decrypted software package. Therefore, the application of the software package can be restricted to the desired target endpoints only.
    Type: Application
    Filed: August 21, 2006
    Publication date: March 1, 2007
    Inventors: Massimiliano Celli, Luca Ferri, Luigi Pichetti, Marco Secchi, Marcello Velati
  • Publication number: 20060259904
    Abstract: A method (300) for facilitating the management of a software distribution process is proposed. For this purpose, the method provides the possibility of performing (333-339) an introspection of a software package (which is used for installing a corresponding software product) before its application on each endpoint. The introspection evaluates (333) any run-time parameters that condition the execution of the actions specified in the software package; in this way, it is possible to determine (336-339) a list of the actions that will be actually executed during the application of the software package. This list is displayed (339) on a monitor of the endpoint, so as to allow its user to decide (345) whether the application of the software package should be accepted or not. Alternatively, the list of those actions can be collected (357-366) on a distribution server (from multiple endpoints), so as to determine (375) an impact of the distribution process on the whole system before its execution.
    Type: Application
    Filed: May 10, 2006
    Publication date: November 16, 2006
    Inventors: Massimiliano Celli, Luigi Pichetti, Marco Secchi, Marcello Velati