Patents by Inventor Andrea Cosentino

Andrea Cosentino has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098116
    Abstract: A cross-domain data access service enables data access across two or more computing domains, such as, for example, transient access by a public device to data held in a private cloud. In particular, the cross-domain data access service can identify a data subset from within a secure datastore of a first computing domain. The cross-domain data access service can replicate the data subset within a transient datastore that is segregated from the secured datastore. The cross-domain data access service can implement a data access policy so as to enable a client device from a second domain to access the transient datastore.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
  • Publication number: 20240086203
    Abstract: A computing device receives data related to operation of a cloud computing environment having an application comprising several services. The data related to operation of the cloud computing environment can include time-based data related to computing resource use in the cloud computing environment, such as I/O rate, processor utilization, and others. In some implementations the services that compose the application can be orchestrated through an orchestrator, and in those implementations data regarding the orchestration can also be provided to the computing device. The computing device can also request service-related information from the cloud computing environment, where the service-related information can include financial related information for operations in the cloud.
    Type: Application
    Filed: September 8, 2022
    Publication date: March 14, 2024
    Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
  • Publication number: 20240070258
    Abstract: Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data may be received by a serverless function. The first state data may representing a first condition of the first vehicle. In some examples, a first user-defined rule may be evaluated using the first state data. In further examples, first control data may be sent to a first computing device of the first vehicle based on the evaluation of the first user-defined rule using the first state data. The first control data may be effective to control operation of at least one component of the first vehicle.
    Type: Application
    Filed: August 30, 2022
    Publication date: February 29, 2024
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20240067193
    Abstract: Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data representing a first software version of a first system associated with the first vehicle identifier data may be received. In some examples, a first condition associated with the first system may be determined based at least in part on the first state data. In further examples, first control data may be sent to a first computing device of a first vehicle based at least in part on the first condition. In various examples, the first control data may be effective to control operation of at least one component of the first vehicle.
    Type: Application
    Filed: August 30, 2022
    Publication date: February 29, 2024
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20240040017
    Abstract: Systems and methods for adaptive compression for idempotent data stores in computer messaging are generally described. In some examples, a first node may receive a first message that includes a first message identifier and first payload data. In some examples, the first node may determine that a respective available amount of storage of each node of a plurality of nodes is below a first threshold available amount of storage. In some cases, the plurality of nodes may include the first node. The first node may receive a compression key from a primary node of a cluster including the plurality of nodes. The first node may compress a second message identifier stored in a data structure of the first node using the compression key.
    Type: Application
    Filed: July 28, 2022
    Publication date: February 1, 2024
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20240036971
    Abstract: A request to validate a project object model (POM) is received from a client device. The POM references one or more modules, each of which is associated with one or more artifacts. The artifacts associated with a module are downloaded to a staging repository along with checksums of the artifacts. The downloaded checksum is compared to a checksum calculated on the staging repository. Upon determining that the downloaded checksum matches the calculated checksum for all artifacts of all modules, the POM is moved to the staging repository.
    Type: Application
    Filed: July 26, 2022
    Publication date: February 1, 2024
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11861292
    Abstract: A system includes a memory and a processor, where the processor is in communication with the memory. The processor is configured to receive a request to compress a schema. The schema is analyzed to determine whether to apply a first type of compression or a second type of compression, where analyzing the schema includes determining whether the schema exceeds a threshold level. Upon determining that the schema exceed the threshold level, a compressed schema is generated by performing the second type of compression. Next, the processor responds to the request with the compressed schema.
    Type: Grant
    Filed: April 15, 2021
    Date of Patent: January 2, 2024
    Assignee: Red Hat, Inc.
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230328586
    Abstract: In one example described herein, a processing device can receive computing metrics from nodes within a mesh network. The processing device can use those computing metrics to derive a maximum message size based on the capabilities of the nodes within the mesh network. The processing device can then transmit the maximum message size to nodes within the mesh network so that the nodes can generate messages that do not exceed the maximum message size.
    Type: Application
    Filed: April 8, 2022
    Publication date: October 12, 2023
    Inventors: Andrea Cosentino, Leigh Griffin, Paolo Antinori
  • Publication number: 20230303032
    Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
    Type: Application
    Filed: May 31, 2023
    Publication date: September 28, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230273836
    Abstract: Events associated with a virtual machine can be used to adjust an amount of resource objects that may be allocated from a resource pool for the virtual machine. For example, a system can receive a notification including event data indicating an event related to the virtual machine, wherein the virtual machine is configured to rely on resource objects in a resource pool for performing one or more computing operations. The system can determine that the event is a particular type of event. Based on determining that the event is the particular type of event, the system can select a scaling policy corresponding to the particular type of event. The system can then apply the scaling policy to the event data to determine a scaling strategy for adjusting the amount of resource objects.
    Type: Application
    Filed: February 25, 2022
    Publication date: August 31, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11731585
    Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: August 22, 2023
    Assignee: RED HAT, INC.
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230256936
    Abstract: An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted. The first encoded counter value may include a cryptographic encoding of the first counter value generated in view of a secret key.
    Type: Application
    Filed: February 15, 2022
    Publication date: August 17, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230133441
    Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
    Type: Application
    Filed: October 28, 2021
    Publication date: May 4, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230138041
    Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.
    Type: Application
    Filed: May 5, 2022
    Publication date: May 4, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11641306
    Abstract: Systems and techniques for dynamic runtime application integration are generally described. A set of source nodes may be determined for a first compute service. A source node priority score may be determined for each source node. A first destination node priority score may be determined for a first destination node for the first compute service. The source node priority score for a first source node and the first destination node priority score may be combined to determine a first priority score. The source node priority score for a second source node and the first destination node priority score may be combined to determine a second priority score. A first data pathway from the first source node to the first destination node may be prioritized based at least in part on a comparison of the first priority score and the second priority score.
    Type: Grant
    Filed: February 3, 2022
    Date of Patent: May 2, 2023
    Assignee: RED HAT, INC.
    Inventors: Andrea Cosentino, Paolo Antinori
  • Publication number: 20230119536
    Abstract: Systems and techniques for application profiling to resize and reconfigure compute instances are generally described. In some examples, a first application executing in a user space of a first compute instance may be determined. A Berkeley Packet Filter (BPF) process may be executed in the user space of the first compute instance. The BPF process monitors resource consumption of a first resource of the first compute instance. First consumption data for the first resource may be determined. The first consumption data may be associated with a first process of the first application over a first period of time. The first consumption data may be evaluated using first criteria. A configuration of a second compute instance may be determined based on evaluation of the first consumption data using the first criteria. The second compute instance may be deployed according to the configuration.
    Type: Application
    Filed: October 20, 2021
    Publication date: April 20, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11609803
    Abstract: Event delivery can be managed in a serverless computing environment. For example, an event broker can determine that each event message in a group of event messages from one or more event producers includes a particular key among a set of keys, and can determine a target event consumer that is to receive the group of event messages. Based on each event message in the group of event messages including the particular key, the event broker can add each event message to a dispatching queue in a sequential order in which the plurality of event messages were received. The event broker can then provide the group of event messages in the dispatching queue to the target event consumer in the sequential order in which the group of event messages are in the dispatching queue.
    Type: Grant
    Filed: September 16, 2020
    Date of Patent: March 21, 2023
    Assignee: RED HAT, INC.
    Inventors: Nicola Ferraro, Andrea Cosentino
  • Publication number: 20230060957
    Abstract: Processing logic may determine that an application is to produce one or more records to an event streaming platform. Processing logic may determine a data structure to contain content to be stored to the event streaming platform. Processing logic may automatically generate a serializer in view of the data structure during development of the application. During runtime, the application may use the serializer to serialize the content contained in the data structure and store the content to the one or more records of the event streaming platform.
    Type: Application
    Filed: August 25, 2021
    Publication date: March 2, 2023
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11567751
    Abstract: A system includes a memory, a processor in communication with the memory, and an automotive operating system (OS) with a software update manager for an automobile. The system is configured to determine a new software update is available, monitor operating metrics of the automotive OS, and determine an installation time-window when each of the operating metrics collectively fall within respective predetermined thresholds. Responsive to determining that each of the operating metrics fall within respective predetermined thresholds, the system is configured to signal to the software update manager to start the installation once the automobile meets installation criteria. The installation criteria include at least (i) a first criteria that the automobile is stationary and (ii) a second criteria that the automotive OS is in an available state.
    Type: Grant
    Filed: June 9, 2021
    Date of Patent: January 31, 2023
    Assignee: Red Hat, Inc.
    Inventors: Andrea Cosentino, Paolo Antinori
  • Patent number: 11567739
    Abstract: A system includes a memory and a processor, where the processor is in communication with the memory. The processor is configured to receive a request to build an application, where the application is associated with source code. The source code is analyzed to detect whether a first interface is implemented within the application. The source code is parsed to determine an invocation of the first interface. Inputs and outputs (I/Os) from the first interface are determined based on the invocation of the first interface. A model is generated based on the I/Os associated with the first interface, where the model includes a structure of each of the I/Os. The model is published to a registry.
    Type: Grant
    Filed: April 15, 2021
    Date of Patent: January 31, 2023
    Assignee: Red Hat, Inc.
    Inventors: Paolo Antinori, Andrea Cosentino