Patents by Inventor Christian Cotichini

Christian Cotichini has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9223819
    Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.
    Type: Grant
    Filed: January 13, 2014
    Date of Patent: December 29, 2015
    Assignee: Make Technologies, Inc.
    Inventors: Christian Cotichini, Michael E. F. White, David John Green
  • Patent number: 8886851
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: November 11, 2014
    Assignee: Absolute Software Corporation
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Patent number: 8831964
    Abstract: A system of tools and methodologies configured to capture, process, and analyze user interaction through multimedia tagging for the purpose of exposing users' adapted behavior when they are performing their job function with the legacy application is described. The resulting analysis can be applied to the re-engineering process in order to create a new application that is fully functional in a modern context.
    Type: Grant
    Filed: March 5, 2007
    Date of Patent: September 9, 2014
    Assignee: MAKE Technologies, Inc.
    Inventor: Christian Cotichini
  • Publication number: 20140129517
    Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.
    Type: Application
    Filed: January 13, 2014
    Publication date: May 8, 2014
    Inventors: Christian Cotichini, Michael E. F. White, David John Green
  • Publication number: 20140075584
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 13, 2014
    Applicant: ABSOLUTE SOFTWARE CORPORATION
    Inventors: Fraser CAIN, Christian COTICHINI, Thanh Cam NGUYEN
  • Patent number: 8639675
    Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.
    Type: Grant
    Filed: August 28, 2008
    Date of Patent: January 28, 2014
    Assignee: Make Technologies, Inc.
    Inventors: Christian Cotichini, Michael E. F. White, David John Green
  • Patent number: 8606971
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: December 10, 2013
    Assignee: Absolute Software Corporation
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Publication number: 20120275572
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Application
    Filed: May 16, 2011
    Publication date: November 1, 2012
    Applicant: ABSOLUTE SOFTWARE CORPORATION
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Patent number: 8150896
    Abstract: A database modernization auditing system and method is disclosed. One embodiment comprises a method for loading a legacy data object, transforming the legacy data object into a modern data object according to a rule set, wherein transforming the legacy data object into the modern data object further includes abstracting at least a portion of the legacy data object into semantic information and transforming the semantic information into the modern data object, and generating an audit log entry corresponding to an error that occurs while transforming the semantic information into the modern data object, wherein the audit log entry contains a unique identifier that relates the audit log entry with the legacy data object.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: April 3, 2012
    Assignee: MAKE Technologies, Inc.
    Inventors: Christian Cotichini, Michael E. F. White, David John Green
  • Patent number: 7996413
    Abstract: A database modernization system and method is disclosed. One example embodiment comprises a method for receiving a record stored as a source physical data model, parsing the source physical data model into a source logical data model, wherein the source logical data model includes semantic information from the record, transforming the source logical data model to a destination logical data model independent of a source or a destination record physical implementation, wherein the destination logical data model includes at least a portion of the semantic information from the record, and storing the destination logical data model in a destination physical data model. In this manner, a destination physical data model may be stored in a relational database management system on a per record basis.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: August 9, 2011
    Assignee: MAKE Technologies, Inc.
    Inventors: Christian Cotichini, Michael E. F. White, David John Green
  • Patent number: 7945709
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Grant
    Filed: October 2, 2002
    Date of Patent: May 17, 2011
    Assignee: Absolute Software Corporation
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Publication number: 20100057759
    Abstract: A system and method for linking parent and child data records during data migration is disclosed. One embodiment comprises sequentially receiving a plurality of data records from an arbitrary source of records without running a query on the source of records, generating a destination store of records that contains the plurality of data records, and locating any records in the destination store of records that has a dangling key. In this way, the embodiment may correct dangling keys to generate a destination store of records with referential integrity.
    Type: Application
    Filed: August 28, 2008
    Publication date: March 4, 2010
    Applicant: MAKE Technologies, Inc.
    Inventors: Christian Cotichini, Michael E.F. White, David John Green
  • Publication number: 20090164491
    Abstract: A database modernization system and method is disclosed. One example embodiment comprises a method for receiving a record stored as a source physical data model, parsing the source physical data model into a source logical data model, wherein the source logical data model includes semantic information from the record, transforming the source logical data model to a destination logical data model independent of a source or a destination record physical implementation, wherein the destination logical data model includes at least a portion of the semantic information from the record, and storing the destination logical data model in a destination physical data model. In this manner, a destination physical data model may be stored in a relational database management system on a per record basis.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Applicant: MAKE TECHNOLOGIES INC.
    Inventors: Christian Cotichini, Michael E.F. White, David John Green
  • Publication number: 20090164492
    Abstract: A database modernization auditing system and method is disclosed. One embodiment comprises a method for loading a legacy data object, transforming the legacy data object into a modern data object according to a rule set, wherein transforming the legacy data object into the modern data object further includes abstracting at least a portion of the legacy data object into semantic information and transforming the semantic information into the modern data object, and generating an audit log entry corresponding to an error that occurs while transforming the semantic information into the modern data object, wherein the audit log entry contains a unique identifier that relates the audit log entry with the legacy data object.
    Type: Application
    Filed: December 21, 2007
    Publication date: June 25, 2009
    Applicant: MAKE TECHNOLOGIES INC.
    Inventors: Christian Cotichini, Michael E.F. White, David Green
  • Publication number: 20070245320
    Abstract: According to one aspect of the invention, a software transformation system is provided that may include a business asset extraction sub-system. The business asset extraction sub-system is typically configured to analyze a legacy computer application and create a mechanical fabric representing computer-implemented operations of the legacy computer application, and to create a semantic model representing operator-perceived meanings attached to interactions with the legacy application. The business asset extraction sub-system is further typically configured to create links between related portions of the mechanical fabric and the semantic model. The mechanical fabric comprises a network of nodes and associations between nodes, the nodes and associations representing one or more system interface objects, computer programs, and data access points, and a physical data model configured to store data records utilized by the legacy computer application.
    Type: Application
    Filed: February 12, 2007
    Publication date: October 18, 2007
    Applicant: MAKE TECHNOLOGIES INC.
    Inventors: Christian Cotichini, Yonas Jongkind
  • Publication number: 20070208767
    Abstract: A system of tools and methodologies configured to capture, process, and analyze user interaction through multimedia tagging for the purpose of exposing users' adapted behavior when they are performing their job function with the legacy application is described. The resulting analysis can be applied to the re-engineering process in order to create a new application that is fully functional in a modern context.
    Type: Application
    Filed: March 5, 2007
    Publication date: September 6, 2007
    Inventor: Christian Cotichini
  • Publication number: 20030172306
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Application
    Filed: October 2, 2002
    Publication date: September 11, 2003
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Patent number: 6507914
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the computer. This security system causes the client computer to periodically and conditionally call a host system to report its serial number via an encoded series of dialed numbers. A host monitoring system receives calls from various clients and determines which calls to accept and which to reject by comparing the decoded client serial numbers with a predefined and updated list of numbers corresponding to reported stolen computers. The host also concurrently obtains the caller ID of the calling client to determine the physical location of the client computer. The caller ID and the serial number are subsequently transmitted to a notifying station in order to facilitate the recovery of the stolen device. The security system remains hidden from the user, and actively resists attempts to disable it.
    Type: Grant
    Filed: March 11, 1998
    Date of Patent: January 14, 2003
    Assignee: Absolute Software Corporation
    Inventors: Fraser Cain, Christian Cotichini, Thanh Cam Nguyen
  • Patent number: 6300863
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the software, firmware, or hardware of a computer. This security system initiates the client computer to periodically and conditionally call a host system to provide unique identifying indicia and location information. In one embodiment, the security system calls the host through a public switched telephone network (PSTN) and transmits the indicia in encoded form. In an alternative embodiment, which may be incorporated concurrently with the PSTN application, the security system calls the host system through the Internet and provides the host with indicia encoded within the DNS query sent. The host system is able to identify the calling computer from the indicia and is able to physically locate the computer through either caller identification or by referencing the Internet links which were used to connect the calling computer with the host system.
    Type: Grant
    Filed: March 24, 1998
    Date of Patent: October 9, 2001
    Assignee: Absolute Software Corporation
    Inventors: Christian Cotichini, Fraser Cain, David G. Ashworth, Peter Michael Bruce Livingston, Gabor Solymar
  • Patent number: 6269392
    Abstract: A system for locating and monitoring electronic devices utilizing a security system that is secretly and transparently embedded within the software, firmware, or hardware of the electronic device. The security system may be embodied in internal memory devices such as ROM BIOS, ROM, Flash ROM, EPROM, EEPROM, electronic components such as modem, CPU, or hardwired circuits or integrated circuits of a computer. This security system initiates the computer to periodically and conditionally call a host system to provide unique identifying indicia and location information. In one embodiment, the security system calls the host through a public switched telephone network (PSTN) and transmits the indicia in encoded form. In an alternative embodiment, which may be incorporated concurrently with the PSTN application, the security system calls the host system through the Internet and provides the host with indicia encoded within the DNS query sent.
    Type: Grant
    Filed: June 9, 1997
    Date of Patent: July 31, 2001
    Inventors: Christian Cotichini, Fraser Cain, David G. Ashworth, Peter Michael Bruce Livingston, Gabor Solymar, Philip B. Gardner, Timothy S. Woinoski