Patents by Inventor Antonio Di Cocco

Antonio Di Cocco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11556621
    Abstract: A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: January 17, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
  • Patent number: 11487425
    Abstract: Mechanisms are provided to implement a smart device screen management mechanism for facilitating single-hand wide-screen management of the smart device. The mechanism identifies a movement indicated by a user in proximity of a screen of the smart device and determines whether the movement indicates a selection of an action item outside a maximum reach of the user when the user is operating the smart device with a single hand. Responsive to the movement indicating a selection of an action item outside the maximum reach of the user, the mechanism identifies a direction of the movement indicated by the user in proximity of the screen of the smart device and identifies a subset action items that are in the direction of the movement and outside the maximum reach. The mechanism then presents the subset of action items in a redrawn user interface within the maximum reach of the user.
    Type: Grant
    Filed: January 17, 2019
    Date of Patent: November 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Paolo Ottaviano, Sandro Piccinini, Andrea Tortosa
  • Publication number: 20220114001
    Abstract: A solution is proposed for managing a computing environment. A corresponding method comprises detecting critical commands and applying each critical command and possible following commands to the computing environment by maintaining an unchanged image thereof; a command effect of the application of the critical command on the computing environment is verified according to one or more operative parameters thereof, and the application of the critical/following commands is integrated into the computing environment in in response to a positive result of the verification. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 14, 2022
    Inventors: Damiano Bassani, Antonio Di Cocco, Alfonso D'Aniello, Catia Mecozzi
  • Patent number: 11281488
    Abstract: A solution is proposed for managing a computing environment. A corresponding method comprises detecting critical commands and applying each critical command and possible following commands to the computing environment by maintaining an unchanged image thereof; a command effect of the application of the critical command on the computing environment is verified according to one or more operative parameters thereof, and the application of the critical/following commands is integrated into the computing environment in in response to a positive result of the verification. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
    Type: Grant
    Filed: October 8, 2020
    Date of Patent: March 22, 2022
    Assignee: International Business Machines Corporation
    Inventors: Damiano Bassani, Antonio Di Cocco, Alfonso D'Aniello, Catia Mecozzi
  • Patent number: 11182195
    Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Grant
    Filed: October 24, 2019
    Date of Patent: November 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Gianluca Bernardini, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20210297483
    Abstract: A method for associating an Internet-of-Things (IoT) device with a wireless network, a method for discovering and logically grouping smart light bulbs, and a smart light bulb. One embodiment may comprise automatically starting a counter on an IoT device in response to initially receiving power from a power supply loop to which the IoT device is connected, and by the IoT device, determining whether to perform a pairing operation for associating the IoT device with a wireless network based at least in part on a state of the counter in the IoT device.
    Type: Application
    Filed: March 18, 2020
    Publication date: September 23, 2021
    Inventors: Paolo Ottaviano, Andrea Tortosa, Maximiliano Cammisa, Antonio Di Cocco
  • Patent number: 11082413
    Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.
    Type: Grant
    Filed: November 11, 2019
    Date of Patent: August 3, 2021
    Assignee: International Business Machines Corporation
    Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
  • Patent number: 11018955
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.
    Type: Grant
    Filed: June 25, 2019
    Date of Patent: May 25, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Luigi Pichetti, Paolo Ottaviano
  • Patent number: 10936695
    Abstract: Techniques are disclosed for distributing online content (e.g., news articles, blog posts, and the like) to a social media provider at a point in time determined based on topic maturity. One or more metrics are obtained from each of a plurality of social media providers. The metrics relate to a topic associated with a document for publishing on the social media providers. A measure is determined for each of the social media providers. The measure indicates when to publish the document on the social media provider based on the metrics associated with that provider. Upon determining that the measure exceeds a threshold for at least one of the social media providers, the document is published to the social media provider.
    Type: Grant
    Filed: August 2, 2016
    Date of Patent: March 2, 2021
    Assignee: International Business Machines Corporation
    Inventors: Cristina Bonanni, Giuseppe Ciano, Gianluca Della Corte, Antonio Di Cocco, Alessandro Donatelli, Filomena Ferrara, Giuseppe Longobardi, Antonio Sgro'
  • Patent number: 10904319
    Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: January 26, 2021
    Assignee: International Business Machines Corporation
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20200412625
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Inventors: Antonio BAGAROLO, Antonio DI COCCO, Luigi PICHETTI, Paolo OTTAVIANO
  • Patent number: 10880732
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: December 29, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Patent number: 10824413
    Abstract: A method for maintaining a computing system comprising a plurality of computing nodes is disclosed. The method comprises causing an application of a maintenance activity concurrently on a maintenance subset of the computing nodes not exceeding a limit number, monitoring one or more status indicators of the computing system during the application of the maintenance activity and updating the limit number according to the status indicators. A computer program and a computer program product for performing the method are also disclosed. Moreover, a corresponding control computing machine is disclosed.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: November 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Damiano Bassani, Antonio Di Cocco, Pasquale Maria Mascolo Montenero, Paolo Ottaviano
  • Patent number: 10785721
    Abstract: A method, computer program product, and network system for controlling an energy consumption of mobile equipment adapted to communicate over a telecommunication network are provided. The embodiment may include entering an energy saving mode for a mobile equipment in response to an energy saving activation. The embodiment may also include receiving inbound information to be transmitted to the mobile equipment in the energy saving mode. The embodiment may further include verifying a transmission enablement of the inbound information in response to said receiving the inbound information according to an energy saving policy based on one or more category indicators of the inbound information. The embodiment may also include controlling a transmission of the inbound information to the mobile equipment in the energy saving mode according to a result of said verifying the transmission enablement.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
  • Publication number: 20200272711
    Abstract: A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.
    Type: Application
    Filed: February 25, 2019
    Publication date: August 27, 2020
    Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
  • Publication number: 20200233577
    Abstract: Mechanisms are provided to implement a smart device screen management mechanism for facilitating single-hand wide-screen management of the smart device. The mechanism identifies a movement indicated by a user in proximity of a screen of the smart device and determines whether the movement indicates a selection of an action item outside a maximum reach of the user when the user is operating the smart device with a single hand. Responsive to the movement indicating a selection of an action item outside the maximum reach of the user, the mechanism identifies a direction of the movement indicated by the user in proximity of the screen of the smart device and identifies a subset action items that are in the direction of the movement and outside the maximum reach. The mechanism then presents the subset of action items in a redrawn user interface within the maximum reach of the user.
    Type: Application
    Filed: January 17, 2019
    Publication date: July 23, 2020
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Paolo Ottaviano, Sandro Piccinini, Andrea Tortosa
  • Publication number: 20200076780
    Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.
    Type: Application
    Filed: November 11, 2019
    Publication date: March 5, 2020
    Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
  • Publication number: 20200068394
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Publication number: 20200057670
    Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Application
    Filed: October 24, 2019
    Publication date: February 20, 2020
    Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI
  • Patent number: 10547597
    Abstract: A method and associated system for connecting a computing device to a computing arrangement. A message from the computing device is received. The message includes an address specifying the computing arrangement. The proxy system is a computer system. It is determined, based on the address, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to the determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca