Patents by Inventor Antonio Di Cocco

Antonio Di Cocco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200412625
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.
    Type: Application
    Filed: June 25, 2019
    Publication date: December 31, 2020
    Inventors: Antonio BAGAROLO, Antonio DI COCCO, Luigi PICHETTI, Paolo OTTAVIANO
  • Patent number: 10880732
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: December 29, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Patent number: 10824413
    Abstract: A method for maintaining a computing system comprising a plurality of computing nodes is disclosed. The method comprises causing an application of a maintenance activity concurrently on a maintenance subset of the computing nodes not exceeding a limit number, monitoring one or more status indicators of the computing system during the application of the maintenance activity and updating the limit number according to the status indicators. A computer program and a computer program product for performing the method are also disclosed. Moreover, a corresponding control computing machine is disclosed.
    Type: Grant
    Filed: July 23, 2018
    Date of Patent: November 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Damiano Bassani, Antonio Di Cocco, Pasquale Maria Mascolo Montenero, Paolo Ottaviano
  • Patent number: 10785721
    Abstract: A method, computer program product, and network system for controlling an energy consumption of mobile equipment adapted to communicate over a telecommunication network are provided. The embodiment may include entering an energy saving mode for a mobile equipment in response to an energy saving activation. The embodiment may also include receiving inbound information to be transmitted to the mobile equipment in the energy saving mode. The embodiment may further include verifying a transmission enablement of the inbound information in response to said receiving the inbound information according to an energy saving policy based on one or more category indicators of the inbound information. The embodiment may also include controlling a transmission of the inbound information to the mobile equipment in the energy saving mode according to a result of said verifying the transmission enablement.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: September 22, 2020
    Assignee: International Business Machines Corporation
    Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
  • Publication number: 20200272711
    Abstract: A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.
    Type: Application
    Filed: February 25, 2019
    Publication date: August 27, 2020
    Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
  • Publication number: 20200233577
    Abstract: Mechanisms are provided to implement a smart device screen management mechanism for facilitating single-hand wide-screen management of the smart device. The mechanism identifies a movement indicated by a user in proximity of a screen of the smart device and determines whether the movement indicates a selection of an action item outside a maximum reach of the user when the user is operating the smart device with a single hand. Responsive to the movement indicating a selection of an action item outside the maximum reach of the user, the mechanism identifies a direction of the movement indicated by the user in proximity of the screen of the smart device and identifies a subset action items that are in the direction of the movement and outside the maximum reach. The mechanism then presents the subset of action items in a redrawn user interface within the maximum reach of the user.
    Type: Application
    Filed: January 17, 2019
    Publication date: July 23, 2020
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Paolo Ottaviano, Sandro Piccinini, Andrea Tortosa
  • Publication number: 20200076780
    Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.
    Type: Application
    Filed: November 11, 2019
    Publication date: March 5, 2020
    Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
  • Publication number: 20200068394
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.
    Type: Application
    Filed: October 31, 2019
    Publication date: February 27, 2020
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Publication number: 20200057670
    Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Application
    Filed: October 24, 2019
    Publication date: February 20, 2020
    Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI
  • Patent number: 10547597
    Abstract: A method and associated system for connecting a computing device to a computing arrangement. A message from the computing device is received. The message includes an address specifying the computing arrangement. The proxy system is a computer system. It is determined, based on the address, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to the determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement.
    Type: Grant
    Filed: January 24, 2017
    Date of Patent: January 28, 2020
    Assignee: International Business Machines Corporation
    Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
  • Publication number: 20200026507
    Abstract: A method for maintaining a computing system comprising a plurality of computing nodes is disclosed. The method comprises causing an application of a maintenance activity concurrently on a maintenance subset of the computing nodes not exceeding a limit number, monitoring one or more status indicators of the computing system during the application of the maintenance activity and updating the limit number according to the status indicators. A computer program and a computer program product for performing the method are also disclosed. Moreover, a corresponding control computing machine is disclosed.
    Type: Application
    Filed: July 23, 2018
    Publication date: January 23, 2020
    Inventors: Damiano Bassani, Antonio Di Cocco, Pasquale Maria Mascolo Montenero, Paolo Ottaviano
  • Patent number: 10534628
    Abstract: Embodiments include systems and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Grant
    Filed: May 19, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gianluca Bernardini, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Patent number: 10534630
    Abstract: Embodiments include methods to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Grant
    Filed: December 29, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Gianluca Bernardini, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Patent number: 10499243
    Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes: responsive to initiation of a telephone call by a caller from a first telephone unit to a second telephone unit, retrieving an identification object comprising identification information corresponding to the caller; encrypting the identification object using an encryption key stored on the first telephone unit; and transmitting, as part of the telephone call, the encrypted caller identification object to a telephone network destined for the second telephone unit.
    Type: Grant
    Filed: January 2, 2016
    Date of Patent: December 3, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
  • Publication number: 20190173940
    Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.
    Type: Application
    Filed: February 4, 2019
    Publication date: June 6, 2019
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Patent number: 10255052
    Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.
    Type: Grant
    Filed: May 30, 2017
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Patent number: 10152139
    Abstract: An implementation of an auto-completion or auto-correction mechanism where a dictionary of entry list look-up is triggered by the expiry of a time limit between data entry events such as key-press events, where the value of the time limit is dynamically determined as a function of the entry rate. The time limit may be calculated for example on the basis of an average entry rate, and may include an extra margin value. The occurrence of look up triggering will therefore tend to be optimised to the present user's data entry rate.
    Type: Grant
    Filed: June 16, 2006
    Date of Patent: December 11, 2018
    Assignee: International Business Machines Corporation
    Inventors: Antonio Di Cocco, Filippo Calá
  • Publication number: 20180349121
    Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.
    Type: Application
    Filed: May 30, 2017
    Publication date: December 6, 2018
    Inventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
  • Publication number: 20180336055
    Abstract: Embodiments include methods to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Application
    Filed: December 29, 2017
    Publication date: November 22, 2018
    Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI
  • Publication number: 20180336053
    Abstract: Embodiments include systems and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.
    Type: Application
    Filed: May 19, 2017
    Publication date: November 22, 2018
    Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI