Patents by Inventor Claudio Marinelli
Claudio Marinelli has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9298928Abstract: A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation.Type: GrantFiled: September 4, 2014Date of Patent: March 29, 2016Assignee: GLOBALFOUNDRIES INC.Inventors: Stefano Borghetti, Alessandro Donatelli, Gianluca Della Corte, Claudio Marinelli, Antonio M. Sgro'
-
Patent number: 9294585Abstract: A method for live-migration of an operating system and an application is provided. The operating system runs on a first computer. The application may run on the operating system. The live-migration may be performed to a second computer while the application showing no externally detectable downtime during live-migration of the application. The method may comprise operating a tracking tool that may track and store data modifications to a disk-system of the computer in a tracking file, triggering a shutdown of the first computer while the tracking tool continues to operate in tracking mode and shut down the first computer completely. Then restarting the first computer and sending the data modifications stored prior to the complete shutdown of the first computer to the second computer, which then may be started based on the sent data, followed by starting the application such that from an external perspective no application disruption is detectable.Type: GrantFiled: August 1, 2013Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Nicolas A. Druet, Jacques Fontignie, Claudio Marinelli, Luigi Pichetti, Pierre-Antoine Queloz
-
Publication number: 20160048461Abstract: Encryption of virtual disc image is accomplished by increasing the size of a virtual disc to support the inclusion of a master boot record and a decryption program. Encrypting portions of a virtual disc image on the virtual disc, but leaving the boot record and decryption program unencrypted and accessible, where the decryption program will decrypt the encrypted portions if the appropriate cryptographic key is supplied. Subsequent decryption is accomplished by initiating a boot sequence through the master boot record, receiving the appropriate cryptographic key, appropriately ordering the decrypted disc image.Type: ApplicationFiled: October 22, 2015Publication date: February 18, 2016Inventors: Claudio Marinelli, Luigi Pichetti, Jacques Fontignie, Marc V. Stueckelberg
-
Patent number: 9264306Abstract: A processor-implemented method, system, and/or computer program product deploys software images onto a computing system. A first computing machine is instantiated from a software image onto a computing system. The first computing machine has a first old access identifier, and is initially connected to a second computing machine in the computing system via a second old access identifier for the second computing machine. The second computing machine is reconfigured to have a new access identifier by: retrieving the new access identifier for said second computing machine, and associating the new access identifier with the second old access identifier; and redirecting each outbound communication, from the first old access identifier to the second old access identifier, to the new access identifier of the second computing machine.Type: GrantFiled: October 14, 2013Date of Patent: February 16, 2016Assignee: International Business Machines CorporationInventors: Giuseppe Ciano, Claudio Marinelli, Luigi Pichetti, Maurizio Simeoni
-
Patent number: 9256648Abstract: The present invention relates to a method for data handling in a computing environment. A data access request is generated to access data by a requesting VM. VMs of an ordered list are sequentially checked for data cache hit corresponding to the data in an order given by a ranking. The data is read from the checked VM in response to at least one data cache hit of a checked VM being found, and thereafter a ranking value of the checked VM is updated, thereby updating ranking based on the ranking value. The data is requested from the at least one storage server in response to no data cache hot being found.Type: GrantFiled: May 21, 2013Date of Patent: February 9, 2016Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Bernardo Pastorelli, Pierre-Antoine Queloz
-
Patent number: 9230113Abstract: A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key.Type: GrantFiled: September 8, 2014Date of Patent: January 5, 2016Assignee: International Business Machines CorporationInventors: Claudio Marinelli, Luigi Pichetti, Jacques Fontignie, Marc V. Stueckelberg
-
Patent number: 9230118Abstract: A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key.Type: GrantFiled: November 3, 2011Date of Patent: January 5, 2016Assignee: International Business Machines CorporationInventors: Claudio Marinelli, Luigi Pichetti, Jacques Fontignie, Marc V. Stueckelberg
-
Patent number: 9195452Abstract: Migrating a data-processing entity from a source software image installed on a mass memory of the data-processing entity to a target software image stored on an external source. A portion of mass memory is released. Memory blocks stored in boot locations of the target software image are relocated to the released portion, including memory blocks required to boot the data-processing entity to load a streaming function for downloading the target software image from the external source. The data-processing entity is booted from the boot blocks, thereby loading the streaming function. Each request for reading a selected memory block of the target software image is served by the streaming function, which downloads the selected memory block from the external source and stores it into the released portion when the selected memory block is not available in the mass memory, or retrieves the selected memory block from the mass memory.Type: GrantFiled: September 25, 2014Date of Patent: November 24, 2015Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Marc V. Stueckelberg
-
Patent number: 9176982Abstract: A method and system for optimally capturing an image on a physical or virtual environment and transferring it to a target system, by leveraging the capabilities of the operating system residing on the source system to manipulate the file system of the source storage device, and by presenting the target data storage as a local simulated disk to the source environment.Type: GrantFiled: April 29, 2010Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Marc Vuilleumier Stueckelberg
-
Patent number: 9104431Abstract: Deploying a software image from a source data-processing system on target data-processing entities of a target data-processing system, the software image including memory blocks being individually accessible, with a predefined subset of the memory blocks defining a bootstrap module. The deploying includes downloading the bootstrap module onto a main one of the target data-processing entities from the source data-processing system, booting the main target data-processing entity from the bootstrap module thereby loading a streaming driver in the bootstrap module, and serving each request of accessing a selected memory block of the software image on the main data-processing entity by the streaming driver.Type: GrantFiled: January 14, 2013Date of Patent: August 11, 2015Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Bernardo Pastorelli, Luigi Pichetti
-
Patent number: 9098707Abstract: A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation.Type: GrantFiled: October 14, 2013Date of Patent: August 4, 2015Assignee: International Business Machines CorporationInventors: Stefano Borghetti, Alessandro Donatelli, Gianluca Della Corte, Claudio Marinelli, Antonio M. Sgro'
-
Patent number: 9086939Abstract: Provided are a computer program product, system and method for reactivation of a software image from a source machine onto a target machine. Discovery is made of a static software application in the software image listening on a corresponding selected communication channel of the source address. Listening is performed on behalf of the static software application on the corresponding selected communication channel of the target address. An inbound message directed to the selected communication channel of the target address is redirected to the corresponding static software application on the selected communication channel of the source address.Type: GrantFiled: June 14, 2012Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Alessandro Donatelli, Claudio Marinelli, Luigi Pichetti, Roberto Ragusa
-
Patent number: 9086892Abstract: A mechanism is provided for migrating a software image installed on a source data-processing entity to a target data-processing entity. The target data-processing entity is booted from a preliminary bootstrap program. The software image is mounted as a remote mass memory on the target data-processing entity. A primary bootstrap program of the software image is copied onto a local mass memory of the target data-processing entity. The target data-processing entity is re-booted from the primary bootstrap program thereby loading a streaming function, and serving each request of accessing a memory block on the target data-processing entity by the streaming function. In response to the memory block missing from the local mass storage, the streaming function downloads the memory block from the software image and stores the memory block into the local mass memory. Otherwise, the streaming function retrieves the memory block from the local mass memory otherwise.Type: GrantFiled: November 3, 2011Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Paolo Scotton, Marc Vuilleumier Stueckelberg
-
Patent number: 9058235Abstract: Migrating a data-processing entity from a source software image installed on a mass memory of the data-processing entity to a target software image stored on an external source. A portion of mass memory is released. Memory blocks stored in boot locations of the target software image are relocated to the released portion, including memory blocks required to boot the data-processing entity to load a streaming function for downloading the target software image from the external source. The data-processing entity is booted from the boot blocks, thereby loading the streaming function. Each request for reading a selected memory block of the target software image is served by the streaming function, which downloads the selected memory block from the external source and stores it into the released portion when the selected memory block is not available in the mass memory, or retrieves the selected memory block from the mass memory.Type: GrantFiled: November 10, 2011Date of Patent: June 16, 2015Assignee: International Business Machines CorporationInventors: Jacques Fontignie, Claudio Marinelli, Marc V. Stueckelberg
-
Patent number: 9052918Abstract: A data processing entity that includes a mass memory with a plurality of memory locations for storing memory blocks. Each of a plurality of software images includes a plurality of memory blocks with corresponding image addresses within the software image. The memory blocks of software images stored in boot locations of a current software image are relocated. The boot blocks of the current software image are stored into the corresponding boot locations. The data processing entity is booted from the boot blocks of the current software image in the corresponding boot locations, thereby loading the access function. Each request to access a selected memory block of the current software image is served by the access function, with the access function accessing the selected memory block in the associated memory location provided by the control structure.Type: GrantFiled: December 14, 2011Date of Patent: June 9, 2015Assignee: International Business Machines CorporationInventors: David Clerc, Jacques Fontignie, Luis Garcés-Erice, Claudio Marinelli, John G. Rooney, Marc V. Stückelberg
-
Publication number: 20150142664Abstract: A method for planning assignment of floating licenses of software products is proposed. Floating licenses can be requested to a runtime server by multiple workstations (to which they are assigned until a maximum number of instances of the product are running concurrently). In the solution of the invention, a user of every workstation needing to run the product in a future timeframe submits a corresponding reservation request to the runtime server. If at least one license is available for the selected timeframe, the runtime server reserves the license to the workstation (so as to prevent assigning it to other workstations for the same period); at the same time, a corresponding temporary permission is stored on the workstation. In this way, the product can be used during the selected timeframe on the workstation only; this is possible without any risk even if the workstation is disconnected from the runtime server.Type: ApplicationFiled: January 20, 2015Publication date: May 21, 2015Inventors: Salvatore D'Alo, Arcangelo Di Balsamo, Alessandro Donatelli, Claudio Marinelli
-
Publication number: 20150113530Abstract: A mechanism is provided for managing one or more virtual appliances on a computing system. For a specific virtual appliance, profile information indicative of a set of profiles of the specific virtual appliance is retrieved, status information indicative of a status of the computing system is retrieved, and constraint information indicative of one or more constraints applicable to one or more software programs of the specific virtual appliance on the computing system is retrieved. A determination is made of a configuration scheme of the specific virtual appliance according to the profile information, the status information, and the constraint information. The configuration scheme a specific profile of the set of profiles of the specific virtual appliance having the one or more software programs thereof compliant with the applicable constraints. The specific virtual appliance is configured according to the configuration scheme.Type: ApplicationFiled: September 25, 2014Publication date: April 23, 2015Inventors: Mauro Arcese, Giuseppe Ciano, Francesca Curzi, Claudio Marinelli, Luigi Pichetti
-
Publication number: 20150106942Abstract: A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation.Type: ApplicationFiled: September 4, 2014Publication date: April 16, 2015Inventors: Stefano Borghetti, Alessandro Donatelli, Gianluca Della Corte, Claudio Marinelli, Antonio M. Sgro'
-
Publication number: 20150106940Abstract: A computer processor receives rules associated with applications installed on a mobile device, and collects declared intents of the applications prior to execution of the applications. The computer processor generates possible combinations of declared intents of the applications and collects, by an intent proxy during execution, information associated with intercepted intents. The computer processor compares the information associated with each of the intercepted intents to the rules, wherein a match results in a first violation. The computer processor compares the intercepted intents to the possible combinations of the declared intents, wherein the intercepted intents other than the possible combinations of the declared intents results in a second violation. The computer processor displays a risk alert for the applications associated with either or both of the first violation and the second violation.Type: ApplicationFiled: October 14, 2013Publication date: April 16, 2015Applicant: International Business Machines CorporationInventors: Stefano Borghetti, Alessandro Donatelli, Gianluca Della Corte, Claudio Marinelli, Antonio M. Sgro'
-
Patent number: 9009079Abstract: A method (300) for planning assignment of floating licenses of software products is proposed. Floating licenses can be requested to a runtime server by multiple workstations (to which they are assigned until a maximum number of instances of the product are running concurrently). In the solution of the invention, a user of every workstation needing to run the product in a future timeframe submits (306) a corresponding reservation request to the runtime server. If at least one license is available for the selected timeframe, the runtime server reserves (357) the license to the workstation (so as to prevent assigning it to other workstations for the same period); at the same time, a corresponding temporary permission is stored (360) on the workstation. In this way, the product can be used (363-387) during the selected timeframe on the workstation only; this is possible without any risk even if the workstation is disconnected from the runtime server.Type: GrantFiled: June 29, 2006Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Salvatore D'Alo, Arcangelo Di Balsamo, Alessandro Donatelli, Claudio Marinelli