Patents by Inventor Federico Frosali

Federico Frosali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9015473
    Abstract: In a communications network including at least one authentication entity adapted to authenticating a network access requestor in order to conditionally grant thereto access to the communications network, wherein the authenticating is based on public key cryptography, a method for automatically provisioning the network access requestor with service access credentials for accessing an on-line service offered by an on-line service provider accessible through the communications network.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: April 21, 2015
    Assignee: Telecom Italia S.p.A.
    Inventors: Luciana Costa, Paolo De Lutiis, Federico Frosali
  • Patent number: 8621201
    Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key b
    Type: Grant
    Filed: June 29, 2005
    Date of Patent: December 31, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
  • Patent number: 8369830
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: February 5, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luigi Sperti, Maria José Mollo, Federico Frosali, Giorgio Freguglia
  • Patent number: 8370894
    Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: February 5, 2013
    Assignee: Telecom Italia S.p.A.
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
  • Publication number: 20100058442
    Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.
    Type: Application
    Filed: December 26, 2006
    Publication date: March 4, 2010
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
  • Publication number: 20090217033
    Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key b
    Type: Application
    Filed: June 29, 2005
    Publication date: August 27, 2009
    Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
  • Publication number: 20090158032
    Abstract: In a communications network including at least one authentication entity adapted to authenticating a network access requestor in order to conditionally grant thereto access to the communications network, wherein the authenticating is based on public key cryptography, a method for automatically provisioning the network access requestor with service access credentials for accessing an on-line service offered by an on-line service provider accessible through the communications network.
    Type: Application
    Filed: November 30, 2005
    Publication date: June 18, 2009
    Applicant: TELECOM ITALIA S.P.A.
    Inventors: Luciana Costa, Paolo De Lutiis, Federico Frosali
  • Publication number: 20080043686
    Abstract: A method of detecting attacks in a wireless data communications network, includes: monitoring wireless traffic over the wireless data communications network; deriving a first network state from the monitored wireless traffic; acquiring trusted information indicative of a wireless network state from at least one apparatus of a network infrastructure; establishing a second network state based on the acquired trusted information; comparing the derived first network state with the second network state, and determining a wireless network attack in case of incoherence between the derived first network state compared to the second network state.
    Type: Application
    Filed: December 30, 2004
    Publication date: February 21, 2008
    Applicant: TELECOM ITALIA S.P.A.
    Inventors: Luigi Sperti, Maria Mollo, Federico Frosali, Giorgio Freguglia
  • Publication number: 20070107052
    Abstract: Apparatus for monitoring operation of a processing system includes a set of modules for monitoring operation of a set of system primitives that allocate or release the system resources and are used by different processes running on the system. Preferably, the modules include at least one application knowledge module tracking the processes running on the system and monitoring the resources used thereby, a network knowledge module monitoring connections by the processes running on the system, a file-system analysis module monitoring the file-related operations performed within the system, and a device monitoring module monitoring operation of commonly used modules with the system. A preferred field of application is in host-based intrusion detection systems.
    Type: Application
    Filed: December 17, 2003
    Publication date: May 10, 2007
    Inventors: Gianluca Cangini, Gerardo Lamastra, Francesco Coda Zabetta, Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro, Stefano Brusotti, Sebastiano Di Paola, Manuel Leone, Federico Frosali