Patents by Inventor Antonio Di Cocco
Antonio Di Cocco has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11556621Abstract: A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.Type: GrantFiled: February 25, 2019Date of Patent: January 17, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
-
Patent number: 11487425Abstract: Mechanisms are provided to implement a smart device screen management mechanism for facilitating single-hand wide-screen management of the smart device. The mechanism identifies a movement indicated by a user in proximity of a screen of the smart device and determines whether the movement indicates a selection of an action item outside a maximum reach of the user when the user is operating the smart device with a single hand. Responsive to the movement indicating a selection of an action item outside the maximum reach of the user, the mechanism identifies a direction of the movement indicated by the user in proximity of the screen of the smart device and identifies a subset action items that are in the direction of the movement and outside the maximum reach. The mechanism then presents the subset of action items in a redrawn user interface within the maximum reach of the user.Type: GrantFiled: January 17, 2019Date of Patent: November 1, 2022Assignee: International Business Machines CorporationInventors: Antonio Bagarolo, Antonio Di Cocco, Paolo Ottaviano, Sandro Piccinini, Andrea Tortosa
-
Publication number: 20220114001Abstract: A solution is proposed for managing a computing environment. A corresponding method comprises detecting critical commands and applying each critical command and possible following commands to the computing environment by maintaining an unchanged image thereof; a command effect of the application of the critical command on the computing environment is verified according to one or more operative parameters thereof, and the application of the critical/following commands is integrated into the computing environment in in response to a positive result of the verification. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.Type: ApplicationFiled: October 8, 2020Publication date: April 14, 2022Inventors: Damiano Bassani, Antonio Di Cocco, Alfonso D'Aniello, Catia Mecozzi
-
Patent number: 11281488Abstract: A solution is proposed for managing a computing environment. A corresponding method comprises detecting critical commands and applying each critical command and possible following commands to the computing environment by maintaining an unchanged image thereof; a command effect of the application of the critical command on the computing environment is verified according to one or more operative parameters thereof, and the application of the critical/following commands is integrated into the computing environment in in response to a positive result of the verification. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.Type: GrantFiled: October 8, 2020Date of Patent: March 22, 2022Assignee: International Business Machines CorporationInventors: Damiano Bassani, Antonio Di Cocco, Alfonso D'Aniello, Catia Mecozzi
-
Patent number: 11182195Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.Type: GrantFiled: October 24, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Gianluca Bernardini, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
-
Publication number: 20210297483Abstract: A method for associating an Internet-of-Things (IoT) device with a wireless network, a method for discovering and logically grouping smart light bulbs, and a smart light bulb. One embodiment may comprise automatically starting a counter on an IoT device in response to initially receiving power from a power supply loop to which the IoT device is connected, and by the IoT device, determining whether to perform a pairing operation for associating the IoT device with a wireless network based at least in part on a state of the counter in the IoT device.Type: ApplicationFiled: March 18, 2020Publication date: September 23, 2021Inventors: Paolo Ottaviano, Andrea Tortosa, Maximiliano Cammisa, Antonio Di Cocco
-
Patent number: 11082413Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.Type: GrantFiled: November 11, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Patent number: 11018955Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.Type: GrantFiled: June 25, 2019Date of Patent: May 25, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Antonio Bagarolo, Antonio Di Cocco, Luigi Pichetti, Paolo Ottaviano
-
Patent number: 10936695Abstract: Techniques are disclosed for distributing online content (e.g., news articles, blog posts, and the like) to a social media provider at a point in time determined based on topic maturity. One or more metrics are obtained from each of a plurality of social media providers. The metrics relate to a topic associated with a document for publishing on the social media providers. A measure is determined for each of the social media providers. The measure indicates when to publish the document on the social media provider based on the metrics associated with that provider. Upon determining that the measure exceeds a threshold for at least one of the social media providers, the document is published to the social media provider.Type: GrantFiled: August 2, 2016Date of Patent: March 2, 2021Assignee: International Business Machines CorporationInventors: Cristina Bonanni, Giuseppe Ciano, Gianluca Della Corte, Antonio Di Cocco, Alessandro Donatelli, Filomena Ferrara, Giuseppe Longobardi, Antonio Sgro'
-
Patent number: 10904319Abstract: A method for determining a deployment configuration of multiple micro services that interact with each other is provided. The method includes the steps of determining a metric describing an amount of communication traffic between at least two of the micro services. Based on the metric, an execution environment may be determined for at least one of the micro services. Deployment information specifying that the at least one micro service shall be deployed on the determined execution environment may be generated.Type: GrantFiled: February 4, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Antonio Bagarolo, Antonio Di Cocco, Claudio Marinelli, Luigi Pichetti
-
Publication number: 20200412625Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: building a change management meta model on relationships between change request tasks of a change request and logical components of a computing environment via deployment processes that realizes respective change request tasks onto the logical components. A change request fulfillment plan that minimizes a maintenance window for deploying the change request tasks to the logical components is produced. After deployment, performance metrics of the logical components updates change request constraints.Type: ApplicationFiled: June 25, 2019Publication date: December 31, 2020Inventors: Antonio BAGAROLO, Antonio DI COCCO, Luigi PICHETTI, Paolo OTTAVIANO
-
Patent number: 10880732Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.Type: GrantFiled: October 31, 2019Date of Patent: December 29, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
-
Patent number: 10824413Abstract: A method for maintaining a computing system comprising a plurality of computing nodes is disclosed. The method comprises causing an application of a maintenance activity concurrently on a maintenance subset of the computing nodes not exceeding a limit number, monitoring one or more status indicators of the computing system during the application of the maintenance activity and updating the limit number according to the status indicators. A computer program and a computer program product for performing the method are also disclosed. Moreover, a corresponding control computing machine is disclosed.Type: GrantFiled: July 23, 2018Date of Patent: November 3, 2020Assignee: International Business Machines CorporationInventors: Damiano Bassani, Antonio Di Cocco, Pasquale Maria Mascolo Montenero, Paolo Ottaviano
-
Patent number: 10785721Abstract: A method, computer program product, and network system for controlling an energy consumption of mobile equipment adapted to communicate over a telecommunication network are provided. The embodiment may include entering an energy saving mode for a mobile equipment in response to an energy saving activation. The embodiment may also include receiving inbound information to be transmitted to the mobile equipment in the energy saving mode. The embodiment may further include verifying a transmission enablement of the inbound information in response to said receiving the inbound information according to an energy saving policy based on one or more category indicators of the inbound information. The embodiment may also include controlling a transmission of the inbound information to the mobile equipment in the energy saving mode according to a result of said verifying the transmission enablement.Type: GrantFiled: May 10, 2019Date of Patent: September 22, 2020Assignee: International Business Machines CorporationInventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
-
Publication number: 20200272711Abstract: A method, system, and computer program product for encoding a key touch on a device. The method may include detecting a key touch at one of two of more subareas of a key area and encoding the detected key touch into one code of a plurality of codes. Each code may be associated with one key area and one subarea of the key area. The method may perform an operation to determine whether to authorize access to a resource by determining whether the code, at least in part, authorizes the access. The key area may be marked with an indicia. The two or more subareas of the key area may be unmarked and may be of equal size. The key area may be divided into the two or more subareas by specifying two or more subregions of sensor pixels of a region of sensor pixels of a touch-sensitive screen.Type: ApplicationFiled: February 25, 2019Publication date: August 27, 2020Inventors: Valerio Bontempi, Crescenzo Migliaccio, Simone Rutigliano, Gianluca Carugno, Antonio Di Cocco, Umberto Manganiello
-
Publication number: 20200233577Abstract: Mechanisms are provided to implement a smart device screen management mechanism for facilitating single-hand wide-screen management of the smart device. The mechanism identifies a movement indicated by a user in proximity of a screen of the smart device and determines whether the movement indicates a selection of an action item outside a maximum reach of the user when the user is operating the smart device with a single hand. Responsive to the movement indicating a selection of an action item outside the maximum reach of the user, the mechanism identifies a direction of the movement indicated by the user in proximity of the screen of the smart device and identifies a subset action items that are in the direction of the movement and outside the maximum reach. The mechanism then presents the subset of action items in a redrawn user interface within the maximum reach of the user.Type: ApplicationFiled: January 17, 2019Publication date: July 23, 2020Inventors: Antonio Bagarolo, Antonio Di Cocco, Paolo Ottaviano, Sandro Piccinini, Andrea Tortosa
-
Publication number: 20200076780Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.Type: ApplicationFiled: November 11, 2019Publication date: March 5, 2020Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Publication number: 20200068394Abstract: According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes, responsive to receiving a call from a telephone unit, identifying a received encrypted identification object having information associated with an identity of a caller placing the call. A telephone number corresponding to the caller is identified and a decryption key associated with the call is generated by combining the telephone number with a decryption code. The identification object is decrypted using the generated decryption key and an identity of the caller placing the call from the second telephone unit is verified based on the decrypted identification object.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: Vinicio Bombacino, Antonio Di Cocco, Leonardo Lanni, Andrea Tortosa
-
Publication number: 20200057670Abstract: Embodiments include systems, methods, and computer program products to perform an operation for managing different virtual machine images as a single virtual machine image. The operation generally includes generating a representation of a virtual machine (VM) image, and generating a first VM instance from the VM image. The representation of the VM image includes a set of artifacts associated with the VM image. The operation also includes receiving an indication of an available software update. Upon determining that the software update is applicable to the representation of the VM image, the operation further includes applying the software update to the first VM instance image.Type: ApplicationFiled: October 24, 2019Publication date: February 20, 2020Inventors: Gianluca BERNARDINI, Antonio DI COCCO, Claudio MARINELLI, Luigi PICHETTI
-
Patent number: 10547597Abstract: A method and associated system for connecting a computing device to a computing arrangement. A message from the computing device is received. The message includes an address specifying the computing arrangement. The proxy system is a computer system. It is determined, based on the address, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to the determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement.Type: GrantFiled: January 24, 2017Date of Patent: January 28, 2020Assignee: International Business Machines CorporationInventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca