Patents by Inventor Maurizio Dusi

Maurizio Dusi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10389576
    Abstract: A method for operating a distributed computing system includes transmitting, by a first node in a first level to an intermediate node in a second level, a first message and storing, by the first node, the first message. The method further includes receiving, by the intermediate node, the first message, generating a second message, and transmitting, to a third node, the second message. The method additionally includes receiving, by the intermediate node from the third node, a first acknowledgement message indicating that the second message was successfully received by the third node, and transmitting, by the intermediate node to the first node after receiving the first acknowledgement message, a second acknowledgement message. The method includes deleting, by the first node in response to receiving the second acknowledgment message, the stored first message.
    Type: Grant
    Filed: July 31, 2018
    Date of Patent: August 20, 2019
    Assignee: NEC CORPORATION
    Inventors: Maurizio Dusi, Francesco Gringoli, Paolo Laffranchini
  • Publication number: 20180337819
    Abstract: A method for operating a distributed computing system includes transmitting, by a first node in a first level to an intermediate node in a second level, a first message and storing, by the first node, the first message. The method further includes receiving, by the intermediate node, the first message, generating a second message, and transmitting, to a third node, the second message. The method additionally includes receiving, by the intermediate node from the third node, a first acknowledgement message indicating that the second message was successfully received by the third node, and transmitting, by the intermediate node to the first node after receiving the first acknowledgement message, a second acknowledgement message. The method includes deleting, by the first node in response to receiving the second acknowledgment message, the stored first message.
    Type: Application
    Filed: July 31, 2018
    Publication date: November 22, 2018
    Inventors: Maurizio Dusi, Francesco Gringoli, Paolo Laffranchini
  • Patent number: 10104043
    Abstract: A method for analyzing a data flow includes: (a) extracting packet information of a packet, (b) determining a status of the packet based on the extracted packet information by applying at least one probabilistic filter to the packet and storing the packet for later inspection based on the status of the packet indicating that the packet is out-of sequence, and (c) inspecting the stored packet based on inspection rules. Upon a partial match of an inspection rule with the extracted packet information, a result of the inspection is temporarily stored. Already stored packets are inspected based on the already stored packets being in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted. The at least one probabilistic filter includes a connection Bloom filter and a sequence Bloom filter.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: October 16, 2018
    Assignee: NEC CORPORATION
    Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
  • Patent number: 10069675
    Abstract: A method for operating a distributed computing system including a plurality of nodes connected in a general network topological sequential manner includes storing a first message on a first node; removing the first message from the first node only if an N-level acknowledgement message is received by the first node indicating that a second message based on the data of the first message was successfully received by a second node on a second level, wherein the difference between the values for the first and second level is a predefined value N; and saving a node state of at least the second node or a third node on a level higher than the first level before sending out an acknowledgement message to a node on a level below if an outgoing message towards the second node is generated based on the node state.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: September 4, 2018
    Assignee: NEC CORPORATION
    Inventors: Maurizio Dusi, Francesco Gringoli, Paolo Laffranchini
  • Publication number: 20180124019
    Abstract: A method for analyzing a data flow includes: (a) extracting packet information of a packet, (b) determining a status of the packet based on the extracted packet information by applying at least one probabilistic filter to the packet and storing the packet for later inspection based on the status of the packet indicating that the packet is out-of sequence, and (c) inspecting the stored packet based on inspection rules. Upon a partial match of an inspection rule with the extracted packet information, a result of the inspection is temporarily stored. Already stored packets are inspected based on the already stored packets being in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted. The at least one probabilistic filter includes a connection Bloom filter and a sequence Bloom filter.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 3, 2018
    Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
  • Patent number: 9923870
    Abstract: A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of the data flow based on the extracted packet information and storing the packet for later inspection when the status of the packet and/or the status of the data flow indicate that the packet is out-of sequence, and inspecting the packet and/or the stored packet based on inspection rules. Upon a partial match of at least one of the inspection rules with the extracted packet information, a result of the inspection of the packet is temporarily stored. Already stored packets are inspected when they are in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted.
    Type: Grant
    Filed: December 12, 2013
    Date of Patent: March 20, 2018
    Assignee: NEC CORPORATION
    Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
  • Publication number: 20180048530
    Abstract: A method for supporting detection of irregularities in a network includes monitoring features of said network using at least one monitoring device in order to collect spatio-temporal measuring data; providing, in an off-line phase, a training matrix where collected measuring data is aggregated in a predetermined time window such that said training matrix includes spatia-temporal correlations; performing, in said off-line phase, non-negative matrix factorization in order to decompose said training matrix into a coefficient matrix and a basis matrix, wherein temporal correlations and spatial correlations are jointly considered; creating, in an on-line phase; a current runtime matrix on a basis of measuring data newly collected in the on-line phase, computing, in said on-line phase, a current runtime coefficient matrix on a basis of said current runtime matrix and said basis matrix; and comparing, in said on-line phase, said current runtime coefficient matrix with at least one previous coefficient matrix.
    Type: Application
    Filed: October 23, 2015
    Publication date: February 15, 2018
    Inventors: Sofia Nikitaki, Maurizio Dusi, Mohamed Ahmed, Saverio Niccolini
  • Publication number: 20160205072
    Abstract: A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of the data flow based on the extracted packet information arid storing the packet for later inspection when the status of the packet and/or the status of the data flow indicate that the packet is out-of sequence, and inspecting the packet and/or the stored packet based on inspection rules. Upon a partial match of at least one of the inspection rules with the extracted packet information, a result of the inspection of the packet is temporarily stored. Already stored packets are inspected when they are in-order with already inspected packets. Upon a total match of at least one of the inspection rules, a predetermined action is performed and the stored result is deleted.
    Type: Application
    Filed: December 12, 2013
    Publication date: July 14, 2016
    Inventors: Maurizio Dusi, Saverio Niccolini, Giulio Picierro, Riccardo Paolillo, Michele Orru, Giuseppe Bianchi
  • Publication number: 20160179627
    Abstract: A method for check pointing a global state of a distributed system with one or more distributed applications organized in a directed acyclic graph topology includes, upon receiving a marker in an active input channel of a first task application, putting an active input channel on hold, performing check pointing by saving an internal state of the first task application when all input channels have received a marker and are put on hold, forwarding the marker via all output channels of the first task application to at least one other task application of the one or more task applications, and reactivating all input channels of the first task application, wherein the global state is a union of all internal states of the task applications after each of the one or more task applications has been check pointed.
    Type: Application
    Filed: July 30, 2013
    Publication date: June 23, 2016
    Applicant: NEC Europe Ltd.
    Inventors: Maurizio Dusi, Luca Fiori, Francesco Gringoli
  • Publication number: 20160164716
    Abstract: A method for operating a distributed computing system including a plurality of nodes connected in a general network topological sequential manner includes storing a first message on a first node; removing the first message from the first node only if an N-level acknowledgement message is received by the first node indicating that a second message based on the data of the first message was successfully received by a second node on a second level, wherein the difference between the values for the first and second level is a predefined value N; and saving a node state of at least the second node or a third node on a level higher than the first level before sending out an acknowledgement message to a node on a level below if an outgoing message towards the second node is generated based on the node state.
    Type: Application
    Filed: August 30, 2013
    Publication date: June 9, 2016
    Inventors: Maurizio Dusi, Francesco Gringoli, Paolo Laffranchini
  • Patent number: 9203857
    Abstract: A method and system for detecting anomaly of user behavior in a network with a hierarchical topology, including a plurality of users, at least two bridges to each of which at least one user is connected to and wherein the bridges are configured to be operable to connect the corresponding users to the network, and at least one predetermined profiling network entity, the method includes the steps of: a) determining common behaviors of the users connected to the respective bridges; b) transmitting the determined common behaviors to the profiling network entity; c) determining an overall profile based on the transmitted common behaviors; d) transmitting back the determined overall profile to the bridges; and e) detecting anomaly of user behavior of the users connected to the corresponding bridges based on the overall profile.
    Type: Grant
    Filed: August 10, 2012
    Date of Patent: December 1, 2015
    Assignee: NEC EUROPE LTD.
    Inventors: Saverio Niccolini, Maurizio Dusi, Christian Vitale
  • Patent number: 9131538
    Abstract: A Soederberg electrode with low PAH emission that can be used in electro-thermal processes for the production of metal materials, preferably ferro-alloys, which can be obtained from an electrode paste with a base of a carbonaceous material, fine graphite, carbohydrates and water and/or PEG.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: September 8, 2015
    Assignee: ITALGHISA S.P.A.
    Inventors: Sandro Ferrari, Irma Cavallotti, Giuseppe Conti, Maurizio Dusi
  • Publication number: 20140215612
    Abstract: A method and system for detecting anomaly of user behavior in a network with a hierarchical topology, including a plurality of users, at least two bridges to each of which at least one user is connected to and wherein the bridges are configured to be operable to connect the corresponding users to the network, and at least one predetermined profiling network entity, the method includes the steps of: a) determining common behaviors of the users connected to the respective bridges; b) transmitting the determined common behaviors to the profiling network entity; c) determining an overall profile based on the transmitted common behaviors; d) transmitting back the determined overall profile to the bridges; and e) detecting anomaly of user behavior of the users connected to the corresponding bridges based on the overall profile.
    Type: Application
    Filed: August 10, 2012
    Publication date: July 31, 2014
    Inventors: Saverio Niccolini, Maurizio Dusi, Christian Vitale
  • Publication number: 20120248385
    Abstract: A Soederberg electrode with low PAH emission that can be used in electro-thermal processes for the production of metal materials, preferably ferro-alloys, which can be obtained from an electrode paste with a base of a carbonaceous material, fine graphite, carbohydrates and water and/or PEG.
    Type: Application
    Filed: December 13, 2010
    Publication date: October 4, 2012
    Applicant: ITALGHISA S.P.A.
    Inventors: Sandro Ferrari, Irma Cavallotti, Giuseppe Conti, Maurizio Dusi
  • Patent number: 7852775
    Abstract: A method to determine if an encrypted flow of packets (F) belongs to a predefined class of flows (?t), comprises the steps of giving probability density functions (p(xi|?t)) of the values of two measurable variables in a plurality of encrypted flows of packets (Fj) belonging to the predefined class of flows (?t), measuring the values (si,?t1) of the two measurable variables, apply the measured values (si,?t1) to the probability density functions (p(xi|?t)) to generate a sequence of values of probability density (p({right arrow over (x)}|?t)), process the sequence of values of probability density (p({right arrow over (x)}|?t)) to generate a reference value (S({right arrow over (x)}|?t)), and compare such reference value (S({right arrow over (x)}|?t)) to a threshold value (T) to determine whether the encrypted flow of packets (F) belongs to the predefined class of flows.
    Type: Grant
    Filed: February 11, 2009
    Date of Patent: December 14, 2010
    Assignee: Universita Degli Studi Di Brescia
    Inventors: Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
  • Publication number: 20090207740
    Abstract: A method to determine if an encrypted flow of packets (F) belongs to a predefined class of flows (?t), comprises the steps of giving probability density functions (p(xi|?t)) of the values of two measurable variables in a plurality of encrypted flows of packets (Fj) belonging to the predefined class of flows (?t), measuring the values (si,?t1) of the two measurable variables, apply the measured values (si,?t1) to the probability density functions (p(xi|?t)) to generate a sequence of values of probability density (p({right arrow over (x)}|?t)), process the sequence of values of probability density (p({right arrow over (x)}|?t)) to generate a reference value (S({right arrow over (x)}|?t)), and compare such reference value (S({right arrow over (x)}|?t)) to a threshold value (T) to determine whether the encrypted flow of packets (F) belongs to the predefined class of flows.
    Type: Application
    Filed: February 11, 2009
    Publication date: August 20, 2009
    Applicant: Universita degli Studi di Brescia
    Inventors: Manuel Crotti, Maurizio Dusi, Francesco Gringoli, Luca Salgarelli