Patents by Inventor Madalina Baltatu
Madalina Baltatu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12089034Abstract: A method of protecting the exchange of privacy-sensitive data in a wireless communication network, the method including generating and providing a public cryptographic key to a first entity, possessing the data to be sent to the network through a wireless connection; generating and providing a private secret cryptographic key to a second entity, being the intended recipient of the data, the private key being bound to the public key and being associated to privacy support context information to identify the network; having the network send to the first entity respective wireless network privacy support context information; having the first entity receive the information and encrypt the data using the public key and the received information to obtain protected, encrypted privacy-sensitive data; having the first entity send to the second entity through the network the encrypted data; and having the second entity decrypt the encrypted data exploiting the private key.Type: GrantFiled: May 30, 2016Date of Patent: September 10, 2024Assignee: TELECOM ITALIA S.p.A.Inventors: Madalina Baltatu, Luciana Costa, Roberta D'Amico, Jovan Golic, Dario Lombardo
-
Publication number: 20200322794Abstract: A method of protecting the exchange of privacy-sensitive data in a wireless communication network, the method including generating and providing a public cryptographic key to a first entity, possessing the data to be sent to the network through a wireless connection; generating and providing a private secret cryptographic key to a second entity, being the intended recipient of the data, the private key being bound to the public key and being associated to privacy support context information to identify the network; having the network send to the first entity respective wireless network privacy support context information; having the first entity receive the information and encrypt the data using the public key and the received information to obtain protected, encrypted privacy-sensitive data; having the first entity send to the second entity through the network the encrypted data; and having the second entity decrypt the encrypted data exploiting the private key.Type: ApplicationFiled: May 30, 2016Publication date: October 8, 2020Applicant: TELECOM ITALIA S.p.A.Inventors: Madalina BALTATU, Luciana COSTA, Roberto D'AMICO, Jovan GOLIC, Dario LOMBARDO
-
Patent number: 9094444Abstract: Disclosed herein is an anomaly detection method for a packet-based network which includes several network resources, also called network-related software objects. The method includes monitoring the network resources of the packet-based network, ordering the monitored network resources according to a given ordering criterion, and detecting an anomaly in the packet-based network based on the ordered network resources. In particular, detecting an anomaly includes forming a detection feature vector based on the ordered network resources, and feeding the detection feature vector to a machine learning system configured to detect an anomaly in the packet-based network based on the detection feature vector. The detection feature vector includes detection feature items related to corresponding monitored network resources, and arranged in the detection feature vector depending on the ordering of the corresponding monitored network resources.Type: GrantFiled: December 31, 2008Date of Patent: July 28, 2015Assignee: Telecom Italia S.p.A.Inventors: Madalina Baltatu, Paolo Abeni
-
Patent number: 8626678Abstract: Disclosed herein is an anomaly detection method for link-state routing protocols, a link-state routing protocol providing for link-state update (LSU) messages to be exchanged between nodes in a packet-based network, wherein each link-state update message includes link-state advertisement (LSA) message(s) each having a respective header. The method comprises monitoring the link-state advertisement messages exchanged in the network, extracting and forming respective feature vectors with the values in the fields of the headers of the monitored link-state advertisement messages, and detecting an anomaly related to routing based on the feature vectors. In particular, detecting an anomaly related to routing includes feeding the feature vectors to a machine learning system, conveniently a one-class classifier, preferably a one-class support vector machine (OC-SVM).Type: GrantFiled: December 28, 2007Date of Patent: January 7, 2014Assignee: Telecom Italia S.p.A.Inventors: Madalina Baltatu, Sebastiano Di Paola, Dario Lombardo
-
Patent number: 8312291Abstract: A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level,Type: GrantFiled: December 28, 2006Date of Patent: November 13, 2012Assignee: Telecom Italia S.p.A.Inventors: Jovan Golic, Madalina Baltatu
-
Patent number: 8275175Abstract: An automatic biometric identification method based on face recognition and support vector machines, includes enrolling a user to generate a user's reference template; and identifying the user based on the user's reference template, wherein generating a user's reference template includes acquiring a number of user's face images, and training a one-class support vector machine based on the user's face images only.Type: GrantFiled: July 29, 2005Date of Patent: September 25, 2012Assignee: Telecom Italia S.p.A.Inventors: Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico, Massimo Tistarelli, Enrico Grosso, Manuele Bicego
-
Patent number: 8135180Abstract: A user authentication method based on the use of identification biometric techniques, including the steps of generating a reference biometric template from a first biometric image of a user to be authenticated; splitting the reference biometric template into a first and a second reference biometric template portion that can be physically separated; signing and enciphering the first and the second reference biometric template portion; storing the signed and enciphered first and second reference biometric template portion into different memories.Type: GrantFiled: December 10, 2004Date of Patent: March 13, 2012Assignee: Telecom Italia S.p.A.Inventors: Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico
-
Publication number: 20110267964Abstract: Disclosed herein is an anomaly detection method for a packet-based network which includes several network resources, also called network-related software objects. The method includes monitoring the network resources of the packet-based network, ordering the monitored network resources according to a given ordering criterion, and detecting an anomaly in the packet-based network based on the ordered network resources. In particular, detecting an anomaly includes forming a detection feature vector based on the ordered network resources, and feeding the detection feature vector to a machine learning system configured to detect an anomaly in the packet-based network based on the detection feature vector. The detection feature vector includes detection feature items related to corresponding monitored network resources, and arranged in the detection feature vector depending on the ordering of the corresponding monitored network resources.Type: ApplicationFiled: December 31, 2008Publication date: November 3, 2011Applicant: Telecom Italia S.p.A.Inventors: Madalina Baltatu, Paolo Abeni
-
Publication number: 20100287128Abstract: Disclosed herein is an anomaly detection method for link-state routing protocols, a link-state routing protocol providing for link-state update (LSU) messages to be exchanged between nodes in a packet-based network, wherein each link-state update message includes link-state advertisement (LSA) message(s) each having a respective header. The method comprises monitoring the link-state advertisement messages exchanged in the network, extracting and forming respective feature vectors with the values in the fields of the headers of the monitored link-state advertisement messages, and detecting an anomaly related to routing based on the feature vectors. In particular, detecting an anomaly related to routing includes feeding the feature vectors to a machine learning system, conveniently a one-class classifier, preferably a one-class support vector machine (OC-SVM).Type: ApplicationFiled: December 28, 2007Publication date: November 11, 2010Applicant: TELECOM ITALIA S.P.A.Inventors: Madalina Baltatu, Sebastiano Di Paola, Dario Lombardo
-
Publication number: 20100017618Abstract: A biometric user authentication method, includes enrolling a user based on user's biometric samples to generate user's reference data; and authenticating the user based on a user's live biometric sample and the user's reference data; wherein enrolling a user includes acquiring the user's biometric samples; extracting an enrollment feature vector from each user's biometric sample; computing a biometric reference template vector as a mean vector based on the enrollment feature vectors; computing a variation vector based on the enrollment feature vectors and the mean vector; randomly generating an enrollment secret vector; computing an enrollment code vector based on the enrollment secret vector and the variation vector; computing a difference vector as a wrap-around difference between the enrollment code vector and the mean vector; computing an error correction vector based on the enrollment secret vector to enable error correction during the user authentication phase according to a given error tolerance level,Type: ApplicationFiled: December 28, 2006Publication date: January 21, 2010Inventors: Jovan Golic, Madalina Baltatu
-
Publication number: 20090074259Abstract: An automatic biometric identification method based on face recognition and support vector machines, includes enrolling a user to generate a user's reference template; and identifying the user based on the user's reference template, wherein generating a user's reference template includes acquiring a number of user's face images, and training a one-class support vector machine based on the user's face images only.Type: ApplicationFiled: July 29, 2005Publication date: March 19, 2009Inventors: Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico, Massimo Tistarelli, Enrico Grosso, Manuele Bicego
-
Publication number: 20080019573Abstract: A user authentication method based on the use of identification biometric techniques, including the steps of generating a reference biometric template from a first biometric image of a user to be authenticated; splitting the reference biometric template into a first and a second reference biometric template portion that can be physically separated; signing and enciphering the first and the second reference biometric template portion; storing the signed and enciphered first and second reference biometric template portion into different memories.Type: ApplicationFiled: December 10, 2004Publication date: January 24, 2008Applicant: TELECOM ITALIA S.P.A.Inventors: Madalina Baltatu, Rosalia D'Alessandro, Roberta D'Amico
-
Publication number: 20070107052Abstract: Apparatus for monitoring operation of a processing system includes a set of modules for monitoring operation of a set of system primitives that allocate or release the system resources and are used by different processes running on the system. Preferably, the modules include at least one application knowledge module tracking the processes running on the system and monitoring the resources used thereby, a network knowledge module monitoring connections by the processes running on the system, a file-system analysis module monitoring the file-related operations performed within the system, and a device monitoring module monitoring operation of commonly used modules with the system. A preferred field of application is in host-based intrusion detection systems.Type: ApplicationFiled: December 17, 2003Publication date: May 10, 2007Inventors: Gianluca Cangini, Gerardo Lamastra, Francesco Coda Zabetta, Paolo Abeni, Madalina Baltatu, Rosalia D'Alessandro, Stefano Brusotti, Sebastiano Di Paola, Manuel Leone, Federico Frosali