Patents by Inventor Andrea Cosentino
Andrea Cosentino has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240098116Abstract: A cross-domain data access service enables data access across two or more computing domains, such as, for example, transient access by a public device to data held in a private cloud. In particular, the cross-domain data access service can identify a data subset from within a secure datastore of a first computing domain. The cross-domain data access service can replicate the data subset within a transient datastore that is segregated from the secured datastore. The cross-domain data access service can implement a data access policy so as to enable a client device from a second domain to access the transient datastore.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
-
Publication number: 20240086203Abstract: A computing device receives data related to operation of a cloud computing environment having an application comprising several services. The data related to operation of the cloud computing environment can include time-based data related to computing resource use in the cloud computing environment, such as I/O rate, processor utilization, and others. In some implementations the services that compose the application can be orchestrated through an orchestrator, and in those implementations data regarding the orchestration can also be provided to the computing device. The computing device can also request service-related information from the cloud computing environment, where the service-related information can include financial related information for operations in the cloud.Type: ApplicationFiled: September 8, 2022Publication date: March 14, 2024Inventors: Leigh Griffin, Andrea Cosentino, Paolo Antinori
-
Publication number: 20240070258Abstract: Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data may be received by a serverless function. The first state data may representing a first condition of the first vehicle. In some examples, a first user-defined rule may be evaluated using the first state data. In further examples, first control data may be sent to a first computing device of the first vehicle based on the evaluation of the first user-defined rule using the first state data. The first control data may be effective to control operation of at least one component of the first vehicle.Type: ApplicationFiled: August 30, 2022Publication date: February 29, 2024Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20240067193Abstract: Systems and methods for cloud-based vehicle control are generally described. In some examples, first vehicle identifier data identifying a first vehicle may be received. In some cases, first state data representing a first software version of a first system associated with the first vehicle identifier data may be received. In some examples, a first condition associated with the first system may be determined based at least in part on the first state data. In further examples, first control data may be sent to a first computing device of a first vehicle based at least in part on the first condition. In various examples, the first control data may be effective to control operation of at least one component of the first vehicle.Type: ApplicationFiled: August 30, 2022Publication date: February 29, 2024Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20240040017Abstract: Systems and methods for adaptive compression for idempotent data stores in computer messaging are generally described. In some examples, a first node may receive a first message that includes a first message identifier and first payload data. In some examples, the first node may determine that a respective available amount of storage of each node of a plurality of nodes is below a first threshold available amount of storage. In some cases, the plurality of nodes may include the first node. The first node may receive a compression key from a primary node of a cluster including the plurality of nodes. The first node may compress a second message identifier stored in a data structure of the first node using the compression key.Type: ApplicationFiled: July 28, 2022Publication date: February 1, 2024Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20240036971Abstract: A request to validate a project object model (POM) is received from a client device. The POM references one or more modules, each of which is associated with one or more artifacts. The artifacts associated with a module are downloaded to a staging repository along with checksums of the artifacts. The downloaded checksum is compared to a checksum calculated on the staging repository. Upon determining that the downloaded checksum matches the calculated checksum for all artifacts of all modules, the POM is moved to the staging repository.Type: ApplicationFiled: July 26, 2022Publication date: February 1, 2024Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11861292Abstract: A system includes a memory and a processor, where the processor is in communication with the memory. The processor is configured to receive a request to compress a schema. The schema is analyzed to determine whether to apply a first type of compression or a second type of compression, where analyzing the schema includes determining whether the schema exceeds a threshold level. Upon determining that the schema exceed the threshold level, a compressed schema is generated by performing the second type of compression. Next, the processor responds to the request with the compressed schema.Type: GrantFiled: April 15, 2021Date of Patent: January 2, 2024Assignee: Red Hat, Inc.Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230328586Abstract: In one example described herein, a processing device can receive computing metrics from nodes within a mesh network. The processing device can use those computing metrics to derive a maximum message size based on the capabilities of the nodes within the mesh network. The processing device can then transmit the maximum message size to nodes within the mesh network so that the nodes can generate messages that do not exceed the maximum message size.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Inventors: Andrea Cosentino, Leigh Griffin, Paolo Antinori
-
Publication number: 20230303032Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.Type: ApplicationFiled: May 31, 2023Publication date: September 28, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230273836Abstract: Events associated with a virtual machine can be used to adjust an amount of resource objects that may be allocated from a resource pool for the virtual machine. For example, a system can receive a notification including event data indicating an event related to the virtual machine, wherein the virtual machine is configured to rely on resource objects in a resource pool for performing one or more computing operations. The system can determine that the event is a particular type of event. Based on determining that the event is the particular type of event, the system can select a scaling policy corresponding to the particular type of event. The system can then apply the scaling policy to the event data to determine a scaling strategy for adjusting the amount of resource objects.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11731585Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.Type: GrantFiled: October 28, 2021Date of Patent: August 22, 2023Assignee: RED HAT, INC.Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230256936Abstract: An example method may include receiving, from a key device, a first counter value and a first encoded counter value, identifying, among one or more mapping table entries in an access control unit mapping table, an access control unit mapping table entry specifying a second counter value that corresponds to the received first counter value, determining whether a second encoded counter value specified by the identified access control unit mapping table entry corresponds to the received first encoded counter value, and responsive to determining that the second encoded counter value corresponds to the received first encoded counter value, sending, to a control unit, an indication that permission is granted. The first encoded counter value may include a cryptographic encoding of the first counter value generated in view of a secret key.Type: ApplicationFiled: February 15, 2022Publication date: August 17, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230133441Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.Type: ApplicationFiled: October 28, 2021Publication date: May 4, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230138041Abstract: Systems and methods for cloud-based keyless entry are generally described. In some examples, a first number is received from a vehicle. A first computing device of the vehicle may be configured to control an electronic door lock. A first unlock code may be generated using the first number. In some examples, a notification is sent to a remote entry device associated with the vehicle. A response to the notification may be received from the remote entry device. In some examples, the first number may be retrieved from a messaging service based at least in part on the receiving the response to the notification. A second unlock code may be generated using the first number. A determination may be made that the first unlock code matches the second unlock code. An instruction may be sent to the first computing device, the instruction effective to cause unlock of the electronic door lock.Type: ApplicationFiled: May 5, 2022Publication date: May 4, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11641306Abstract: Systems and techniques for dynamic runtime application integration are generally described. A set of source nodes may be determined for a first compute service. A source node priority score may be determined for each source node. A first destination node priority score may be determined for a first destination node for the first compute service. The source node priority score for a first source node and the first destination node priority score may be combined to determine a first priority score. The source node priority score for a second source node and the first destination node priority score may be combined to determine a second priority score. A first data pathway from the first source node to the first destination node may be prioritized based at least in part on a comparison of the first priority score and the second priority score.Type: GrantFiled: February 3, 2022Date of Patent: May 2, 2023Assignee: RED HAT, INC.Inventors: Andrea Cosentino, Paolo Antinori
-
Publication number: 20230119536Abstract: Systems and techniques for application profiling to resize and reconfigure compute instances are generally described. In some examples, a first application executing in a user space of a first compute instance may be determined. A Berkeley Packet Filter (BPF) process may be executed in the user space of the first compute instance. The BPF process monitors resource consumption of a first resource of the first compute instance. First consumption data for the first resource may be determined. The first consumption data may be associated with a first process of the first application over a first period of time. The first consumption data may be evaluated using first criteria. A configuration of a second compute instance may be determined based on evaluation of the first consumption data using the first criteria. The second compute instance may be deployed according to the configuration.Type: ApplicationFiled: October 20, 2021Publication date: April 20, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11609803Abstract: Event delivery can be managed in a serverless computing environment. For example, an event broker can determine that each event message in a group of event messages from one or more event producers includes a particular key among a set of keys, and can determine a target event consumer that is to receive the group of event messages. Based on each event message in the group of event messages including the particular key, the event broker can add each event message to a dispatching queue in a sequential order in which the plurality of event messages were received. The event broker can then provide the group of event messages in the dispatching queue to the target event consumer in the sequential order in which the group of event messages are in the dispatching queue.Type: GrantFiled: September 16, 2020Date of Patent: March 21, 2023Assignee: RED HAT, INC.Inventors: Nicola Ferraro, Andrea Cosentino
-
Publication number: 20230060957Abstract: Processing logic may determine that an application is to produce one or more records to an event streaming platform. Processing logic may determine a data structure to contain content to be stored to the event streaming platform. Processing logic may automatically generate a serializer in view of the data structure during development of the application. During runtime, the application may use the serializer to serialize the content contained in the data structure and store the content to the one or more records of the event streaming platform.Type: ApplicationFiled: August 25, 2021Publication date: March 2, 2023Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11567751Abstract: A system includes a memory, a processor in communication with the memory, and an automotive operating system (OS) with a software update manager for an automobile. The system is configured to determine a new software update is available, monitor operating metrics of the automotive OS, and determine an installation time-window when each of the operating metrics collectively fall within respective predetermined thresholds. Responsive to determining that each of the operating metrics fall within respective predetermined thresholds, the system is configured to signal to the software update manager to start the installation once the automobile meets installation criteria. The installation criteria include at least (i) a first criteria that the automobile is stationary and (ii) a second criteria that the automotive OS is in an available state.Type: GrantFiled: June 9, 2021Date of Patent: January 31, 2023Assignee: Red Hat, Inc.Inventors: Andrea Cosentino, Paolo Antinori
-
Patent number: 11567739Abstract: A system includes a memory and a processor, where the processor is in communication with the memory. The processor is configured to receive a request to build an application, where the application is associated with source code. The source code is analyzed to detect whether a first interface is implemented within the application. The source code is parsed to determine an invocation of the first interface. Inputs and outputs (I/Os) from the first interface are determined based on the invocation of the first interface. A model is generated based on the I/Os associated with the first interface, where the model includes a structure of each of the I/Os. The model is published to a registry.Type: GrantFiled: April 15, 2021Date of Patent: January 31, 2023Assignee: Red Hat, Inc.Inventors: Paolo Antinori, Andrea Cosentino