Patents by Inventor Christian Cotichini
Christian Cotichini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9223819Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.Type: GrantFiled: January 13, 2014Date of Patent: December 29, 2015Assignee: Make Technologies, Inc.Inventors: Christian Cotichini, Michael E. F. White, David John Green
-
Patent number: 8886851Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: GrantFiled: August 30, 2013Date of Patent: November 11, 2014Assignee: Absolute Software CorporationInventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Patent number: 8831964Abstract: A system of tools and methodologies configured to capture, process, and analyze user interaction through multimedia tagging for the purpose of exposing users' adapted behavior when they are performing their job function with the legacy application is described. The resulting analysis can be applied to the re-engineering process in order to create a new application that is fully functional in a modern context.Type: GrantFiled: March 5, 2007Date of Patent: September 9, 2014Assignee: MAKE Technologies, Inc.Inventor: Christian Cotichini
-
Publication number: 20140129517Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.Type: ApplicationFiled: January 13, 2014Publication date: May 8, 2014Inventors: Christian Cotichini, Michael E. F. White, David John Green
-
Publication number: 20140075584Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: ApplicationFiled: August 30, 2013Publication date: March 13, 2014Applicant: ABSOLUTE SOFTWARE CORPORATIONInventors: Fraser CAIN, Christian COTICHINI, Thanh Cam NGUYEN
-
Patent number: 8639675Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.Type: GrantFiled: August 28, 2008Date of Patent: January 28, 2014Assignee: Make Technologies, Inc.Inventors: Christian Cotichini, Michael E. F. White, David John Green
-
Patent number: 8606971Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: GrantFiled: May 16, 2011Date of Patent: December 10, 2013Assignee: Absolute Software CorporationInventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Publication number: 20120275572Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: ApplicationFiled: May 16, 2011Publication date: November 1, 2012Applicant: ABSOLUTE SOFTWARE CORPORATIONInventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Patent number: 8150896Abstract: A database modernization auditing system and method is disclosed. One embodiment comprises a method for loading a legacy data object, transforming the legacy data object into a modern data object according to a rule set, wherein transforming the legacy data object into the modern data object further includes abstracting at least a portion of the legacy data object into semantic information and transforming the semantic information into the modern data object, and generating an audit log entry corresponding to an error that occurs while transforming the semantic information into the modern data object, wherein the audit log entry contains a unique identifier that relates the audit log entry with the legacy data object.Type: GrantFiled: December 21, 2007Date of Patent: April 3, 2012Assignee: MAKE Technologies, Inc.Inventors: Christian Cotichini, Michael E. F. White, David John Green
-
Patent number: 7996413Abstract: A database modernization system and method is disclosed. One example embodiment comprises a method for receiving a record stored as a source physical data model, parsing the source physical data model into a source logical data model, wherein the source logical data model includes semantic information from the record, transforming the source logical data model to a destination logical data model independent of a source or a destination record physical implementation, wherein the destination logical data model includes at least a portion of the semantic information from the record, and storing the destination logical data model in a destination physical data model. In this manner, a destination physical data model may be stored in a relational database management system on a per record basis.Type: GrantFiled: December 21, 2007Date of Patent: August 9, 2011Assignee: MAKE Technologies, Inc.Inventors: Christian Cotichini, Michael E. F. White, David John Green
-
Patent number: 7945709Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: GrantFiled: October 2, 2002Date of Patent: May 17, 2011Assignee: Absolute Software CorporationInventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Publication number: 20100057759Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.Type: ApplicationFiled: August 28, 2008Publication date: March 4, 2010Applicant: MAKE Technologies, Inc.Inventors: Christian Cotichini, Michael E.F. White, David John Green
-
Publication number: 20090164491Abstract: A database modernization system and method is disclosed. One example embodiment comprises a method for receiving a record stored as a source physical data model, parsing the source physical data model into a source logical data model, wherein the source logical data model includes semantic information from the record, transforming the source logical data model to a destination logical data model independent of a source or a destination record physical implementation, wherein the destination logical data model includes at least a portion of the semantic information from the record, and storing the destination logical data model in a destination physical data model. In this manner, a destination physical data model may be stored in a relational database management system on a per record basis.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: MAKE TECHNOLOGIES INC.Inventors: Christian Cotichini, Michael E.F. White, David John Green
-
Publication number: 20090164492Abstract: A database modernization auditing system and method is disclosed. One embodiment comprises a method for loading a legacy data object, transforming the legacy data object into a modern data object according to a rule set, wherein transforming the legacy data object into the modern data object further includes abstracting at least a portion of the legacy data object into semantic information and transforming the semantic information into the modern data object, and generating an audit log entry corresponding to an error that occurs while transforming the semantic information into the modern data object, wherein the audit log entry contains a unique identifier that relates the audit log entry with the legacy data object.Type: ApplicationFiled: December 21, 2007Publication date: June 25, 2009Applicant: MAKE TECHNOLOGIES INC.Inventors: Christian Cotichini, Michael E.F. White, David Green
-
Publication number: 20070245320Abstract: According to one aspect of the invention, a software transformation system is provided that may include a business asset extraction sub-system. The business asset extraction sub-system is typically configured to analyze a legacy computer application and create a mechanical fabric representing computer-implemented operations of the legacy computer application, and to create a semantic model representing operator-perceived meanings attached to interactions with the legacy application. The business asset extraction sub-system is further typically configured to create links between related portions of the mechanical fabric and the semantic model. The mechanical fabric comprises a network of nodes and associations between nodes, the nodes and associations representing one or more system interface objects, computer programs, and data access points, and a physical data model configured to store data records utilized by the legacy computer application.Type: ApplicationFiled: February 12, 2007Publication date: October 18, 2007Applicant: MAKE TECHNOLOGIES INC.Inventors: Christian Cotichini, Yonas Jongkind
-
Publication number: 20070208767Abstract: A system of tools and methodologies configured to capture, process, and analyze user interaction through multimedia tagging for the purpose of exposing users' adapted behavior when they are performing their job function with the legacy application is described. The resulting analysis can be applied to the re-engineering process in order to create a new application that is fully functional in a modern context.Type: ApplicationFiled: March 5, 2007Publication date: September 6, 2007Inventor: Christian Cotichini
-
Publication number: 20030172306Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: ApplicationFiled: October 2, 2002Publication date: September 11, 2003Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Patent number: 6507914Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.Type: GrantFiled: March 11, 1998Date of Patent: January 14, 2003Assignee: Absolute Software CorporationInventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
-
Patent number: 6300863Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the software, firmware, or hardware of a computer. This security system initiates the client computer to periodically and conditionally call a host system to provide unique identifying indicia and location information. In one embodiment, the security system calls the host through a public switched telephone network (PSTN) and transmits the indicia in encoded form. In an alternative embodiment, which may be incorporated concurrently with the PSTN application, the security system calls the host system through the Internet and provides the host with indicia encoded within the DNS query sent. The host system is able to identify the calling computer from the indicia and is able to physically locate the computer through either caller identification or by referencing the Internet links which were used to connect the calling computer with the host system.Type: GrantFiled: March 24, 1998Date of Patent: October 9, 2001Assignee: Absolute Software CorporationInventors: Christian Cotichini, Fraser Cain, David G. Ashworth, Peter Michael Bruce Livingston, Gabor Solymar
-
Patent number: 6269392Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the software, firmware, or hardware of the electronic device. The security system may be embodied in internal memory devices such as ROM BIOS, ROM, Flash ROM, EPROM, EEPROM, electronic components such as modem, CPU, or hardwired circuits or integrated circuits of a computer. This security system initiates the computer to periodically and conditionally call a host system to provide unique identifying indicia and location information. In one embodiment, the security system calls the host through a public switched telephone network (PSTN) and transmits the indicia in encoded form. In an alternative embodiment, which may be incorporated concurrently with the PSTN application, the security system calls the host system through the Internet and provides the host with indicia encoded within the DNS query sent.Type: GrantFiled: June 9, 1997Date of Patent: July 31, 2001Inventors: Christian Cotichini, Fraser Cain, David G. Ashworth, Peter Michael Bruce Livingston, Gabor Solymar, Philip B. Gardner, Timothy S. Woinoski