Patents by Inventor Gianluca Perreca
Gianluca Perreca has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11082413Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.Type: GrantFiled: November 11, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Patent number: 11082448Abstract: Methods and systems for preventing phishing attacks using the domain name system are disclosed. A method includes: receiving, by a computing device, a domain name system (DNS) request comprising a domain name; determining, by the computing device, at least one domain name that is similar to the domain name; and sending, by the computing device, the at least one domain name that is similar to the domain name as a response to the DNS request.Type: GrantFiled: June 14, 2018Date of Patent: August 3, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Antonio Bagarolo, Paolo Ottaviano, Gianluca Perreca, Pasquale Maria Mascolo Montenero, Marco Imperia, Maximiliano Cammisa
-
Patent number: 11055420Abstract: An access control method for controlling access to data requested from an electronic information system. The method comprises receiving a request for the data, determining a user identity associated with the request; gathering the requested data from one or more data sources by an orchestrator for input to a cognitive engine; analyzing the requested data; based on results of analyzing the requested data, deciding on whether the user identity can be allowed to access the requested data; providing feedback by the user identity; and updating a learning module based on the feedback.Type: GrantFiled: February 5, 2018Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Paolo Ottaviano, Gianluca Perreca, Antonio Bagarolo
-
Publication number: 20200076780Abstract: A method for connecting a computing device to a computing arrangement. A proxy system determines, based on an address in a message specifying the computing arrangement, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement. Establishing the new secure connection includes instantiating a container and initiating an establishment of the secure connection by a protocol entity deployed within the container. The container is a virtual software object that encompasses all of the elements that are needed for an application to run within an operating system, which enables isolation of the container from one or more additional containers running within an operating system.Type: ApplicationFiled: November 11, 2019Publication date: March 5, 2020Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Patent number: 10547597Abstract: A method and associated system for connecting a computing device to a computing arrangement. A message from the computing device is received. The message includes an address specifying the computing arrangement. The proxy system is a computer system. It is determined, based on the address, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to the determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement.Type: GrantFiled: January 24, 2017Date of Patent: January 28, 2020Assignee: International Business Machines CorporationInventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Patent number: 10515320Abstract: Techniques are disclosed for validating a ticket based on biometric data provided by a ticket holding user. A ticket controller device broadcasts an inquiry frame specifying a request for authentication data for a ticket user requesting access to a service hosted by the ticket controller. A mobile device may receive the inquiry frame and generate a response frame encapsulating a ticket identifier and biometric data associated with a user. The ticket controller receives the response frame including the ticket identifier and the biometric data. Upon determining that the ticket identifier and the biometric data encapsulated in the response frame matches a stored ticket identifier and biometric data, the ticket controller grants the user access to the service.Type: GrantFiled: September 20, 2016Date of Patent: December 24, 2019Assignee: International Business Machines CorporationInventors: Vinicio Bombacino, Sergio Pagano, Gianluca Perreca, Andrea Tortosa
-
Publication number: 20190387022Abstract: Methods and systems for preventing phishing attacks using the domain name system are disclosed. A method includes: receiving, by a computing device, a domain name system (DNS) request comprising a domain name; determining, by the computing device, at least one domain name that is similar to the domain name; and sending, by the computing device, the at least one domain name that is similar to the domain name as a response to the DNS request.Type: ApplicationFiled: June 14, 2018Publication date: December 19, 2019Inventors: Antonio BAGAROLO, Paolo OTTAVIANO, Gianluca PERRECA, Pasquale Maria MASCOLO MONTENERO, Marco IMPERIA, Maximiliano CAMMISA
-
Publication number: 20190243979Abstract: An access control method for controlling access to data requested from an electronic information system. The method comprises receiving a request for the data, determining a user identity associated with the request; gathering the requested data from one or more data sources by an orchestrator for input to a cognitive engine; analyzing the requested data; based on results of analyzing the requested data, deciding on whether the user identity can be allowed to access the requested data; providing feedback by the user identity; and updating a learning module based on the feedback.Type: ApplicationFiled: February 5, 2018Publication date: August 8, 2019Inventors: Rossella De Gaetano, Paolo Ottaviano, Gianluca Perreca, Antonio Bagarolo
-
Publication number: 20180212930Abstract: A method and associated system for connecting a computing device to a computing arrangement. A message from the computing device is received. The message includes an address specifying the computing arrangement. The proxy system is a computer system. It is determined, based on the address, that a secure connection between the proxy system and the computing arrangement does not exist. The secure connection is dedicated for secure communication between the computing device and the computing arrangement. In response to the determining that the secure connection does not exist, a new secure connection is established between the proxy system and the computing arrangement.Type: ApplicationFiled: January 24, 2017Publication date: July 26, 2018Inventors: Maximiliano Cammisa, Antonio Di Cocco, Marco Imperia, Paolo Ottaviano, Gianluca Perreca
-
Publication number: 20180082220Abstract: Techniques are disclosed for validating a ticket based on biometric data provided by a ticket holding user. A ticket controller device broadcasts an inquiry frame specifying a request for authentication data for a ticket user requesting access to a service hosted by the ticket controller. A mobile device may receive the inquiry frame and generate a response frame encapsulating a ticket identifier and biometric data associated with a user. The ticket controller receives the response frame including the ticket identifier and the biometric data. Upon determining that the ticket identifier and the biometric data encapsulated in the response frame matches a stored ticket identifier and biometric data, the ticket controller grants the user access to the service.Type: ApplicationFiled: September 20, 2016Publication date: March 22, 2018Inventors: Vinicio BOMBACINO, Sergio PAGANO, Gianluca PERRECA, Andrea TORTOSA
-
Patent number: 9910656Abstract: A solution for updating at least one software product installed on a virtual machine, including providing a software image of at least one new virtual disk storing a new level of the software product together with new metadata including an indication of at least one new activation procedure of the new level of the software product, and replacing a current level of the software product with the new level of the software product, the current level of the software product being stored in at least one current virtual disk of the virtual machine together with current metadata including current activation information of the current level of the software product, where the replacing includes removing at least one current virtual disk from the virtual machine; adding at least one new virtual disk to the virtual machine; and running at least one new activation procedure according to the current activation information.Type: GrantFiled: March 30, 2017Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Mauro Arcese, Giuseppe Ciano, Marco De Santis, Gianluca Perreca, Luigi Pichetti
-
Publication number: 20170206074Abstract: A solution for updating at least one software product installed on a virtual machine, including providing a software image of at least one new virtual disk storing a new level of the software product together with new metadata including an indication of at least one new activation procedure of the new level of the software product, and replacing a current level of the software product with the new level of the software product, the current level of the software product being stored in at least one current virtual disk of the virtual machine together with current metadata including current activation information of the current level of the software product, where the replacing includes removing at least one current virtual disk from the virtual machine; adding at least one new virtual disk to the virtual machine; and running at least one new activation procedure according to the current activation information.Type: ApplicationFiled: March 30, 2017Publication date: July 20, 2017Inventors: Mauro Arcese, Giuseppe Ciano, Marco De Santis, Gianluca Perreca, Luigi Pichetti
-
Patent number: 9612820Abstract: A solution for updating at least one software product installed on a virtual machine, including providing a software image of at least one new virtual disk storing a new level of the software product together with new metadata including an indication of at least one new activation procedure of the new level of the software product, and replacing a current level of the software product with the new level of the software product, the current level of the software product being stored in at least one current virtual disk of the virtual machine together with current metadata including current activation information of the current level of the software product, where the replacing includes removing at least one current virtual disk from the virtual machine; adding at least one new virtual disk to the virtual machine; and running at least one new activation procedure according to the current activation information.Type: GrantFiled: January 26, 2015Date of Patent: April 4, 2017Assignee: International Business Machines CorporationInventors: Mauro Arcese, Giuseppe Ciano, Marco De Santis, Gianluca Perreca, Luigi Pichetti
-
Patent number: 9158852Abstract: A system, method and/or software for using overlap between a first website area-of-interest map, associated with a first website, and a searcher area-of-interest map to help prioritize the websites returned by a search engine search. The area-of-interest maps are made up of geographic pixels respectively assigned with area-of-interest values. Overlap area is determined by comparing, on a pixel-by-pixel basis, corresponding pixels of the searcher area-of-interest map and the first website area-of-interest map to determine overlap pixels where the following conditions hold: (i) the first website area-of-interest map has a non-zero interest value, and (ii) the searcher area-of-interest map has a non-zero interest value.Type: GrantFiled: December 20, 2012Date of Patent: October 13, 2015Assignee: International Business Machines CorporationInventors: Antonio Di Cocco, Leonardo Lanni, Gianluca Perreca, Andrea Tortosa
-
Publication number: 20150220324Abstract: A solution for updating at least one software product installed on a virtual machine, including providing a software image of at least one new virtual disk storing a new level of the software product together with new metadata including an indication of at least one new activation procedure of the new level of the software product, and replacing a current level of the software product with the new level of the software product, the current level of the software product being stored in at least one current virtual disk of the virtual machine together with current metadata including current activation information of the current level of the software product, where the replacing includes removing at least one current virtual disk from the virtual machine; adding at least one new virtual disk to the virtual machine; and running at least one new activation procedure according to the current activation information.Type: ApplicationFiled: January 26, 2015Publication date: August 6, 2015Inventors: Mauro Arcese, Giuseppe Ciano, Marco De Santis, Gianluca Perreca, Luigi Pichetti
-
Publication number: 20140181064Abstract: A system, method and/or software for using overlap between a first website area-of-interest map, associated with a first website, and a searcher area-of-interest map to help prioritize the websites returned by a search engine search. The area-of-interest maps are made up of geographic pixels respectively assigned with area-of-interest values. Overlap area is determined by comparing, on a pixel-by-pixel basis, corresponding pixels of the searcher area-of-interest map and the first website area-of-interest map to determine overlap pixels where the following conditions hold: (i) the first website area-of-interest map has a non-zero interest value, and (ii) the searcher area-of-interest map has a non-zero interest value.Type: ApplicationFiled: December 20, 2012Publication date: June 26, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Antonio Di Cocco, Leonardo Lanni, Gianluca Perreca, Andrea Tortosa
-
Publication number: 20130179824Abstract: A method, computer program product, and apparatus for managing a user interface. In one illustrative embodiment, a number of tags associated with a group of fields is identified for display in the user interface responsive to receiving a request to display the user interface. A number of policies for displaying fields in the user interface comprising a priority for a tag in the number of tags is identified. The fields are displayed according to the priority for the tag in the number of tags identified in the number of policies.Type: ApplicationFiled: January 6, 2012Publication date: July 11, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Luca Lazzaro, Gianluca Perreca, Alessandro Scotti, Federico Spiti