Patents by Inventor Marco Ferrara

Marco Ferrara has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10738031
    Abstract: This invention relates to compounds of formula (I), a process for their preparation, pharmaceutical compositions containing them and their use in the treatment of conditions having an association with the orexin sub-type 1 receptor. Ar1 and Ar2 have meanings given in the description.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: August 11, 2020
    Assignee: Boehringer Ingelheim International GmbH
    Inventors: Doris Riether, Marco Ferrara, Niklas Heine, Uta Lessel, Janet Rachel Nicholson, Anton Pekcec
  • Patent number: 10734811
    Abstract: Systems and methods for optimal control of one or more energy storage systems are provided. Based on live, historical, and/or forecast data received from one or more data sources, one or more forecasts of one or more parameters relating to the operation of the one or more energy storage systems and an associated forecast uncertainty may be calculated by various forecasting techniques. Using one or more optimization techniques, an optimal dispatch schedule for the operation of the one or more energy storage systems may be created based on the forecasts. The optimal dispatch schedule may be used to determine one or more energy storage system parameters, which are used to control the operation of the energy storage systems.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: August 4, 2020
    Assignee: IHI INC.
    Inventors: Tristan Doherty, Sergey Crane, Yuji Koguma, Marco Ferrara
  • Publication number: 20200231575
    Abstract: The present invention relates to novel N-[(Pyrimidinylamino)propanyl]-, N-[(Pyridylamino)propanyl]- and N-[(Pyrazinylamino)propanyl]arylcarboxamide derivatives, processes for their preparation, pharmaceutical compositions containing them and their use in therapy, particularly in the treatment or prevention of conditions having an association with the orexin sub-type 1 receptor.
    Type: Application
    Filed: July 26, 2018
    Publication date: July 23, 2020
    Inventors: Doris RIETHER, Marco FERRARA, Niklas HEINE, Uta Friederike LESSEL, Radoslaw LIPINSKI, Stefan SCHEUERER
  • Patent number: 10710984
    Abstract: The present invention relates to novel N-[(Pyrimidinylamino)propanyl]- and N-[(Pyridinylamino)propanyl]arylcarboxamide derivatives, processes for their preparation, pharmaceutical compositions containing them and their use in therapy, particularly in the treatment or prevention of conditions having an association with the orexin sub-type 1 receptor.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: July 14, 2020
    Assignee: Boehringer Ingelheim International GmbH
    Inventors: Doris Riether, Marco Ferrara, Niklas Heine, Uta Lessel, Janet Rachel Nicholson, Anton Pekcec, Stefan Scheuerer
  • Publication number: 20200220382
    Abstract: Systems and methods for optimal planning and real-time control of energy storage systems for multiple simultaneous applications are provided. Energy storage applications can be analyzed for relevant metrics such as profitability and impact on the functionality of the electric grid, subject to system-wide and energy storage hardware constraints. The optimal amount of storage capacity and the optimal operating strategy can then be derived for each application and be prioritized according to a dispatch stack, which can be statically or dynamically updated according to data forecasts. Embodiments can consist of both planning tools and real-time control algorithms.
    Type: Application
    Filed: January 6, 2020
    Publication date: July 9, 2020
    Applicant: IHI Inc.
    Inventors: W. Craig CARTER, Marco FERRARA, Michael GOROFF, Maxwell MANN
  • Patent number: 10701099
    Abstract: An improved information tracking procedure is provided. A precise information tracking procedure is performed for a sensitive value when an application is predicted to modify the sensitive value prior to the sensitive value reaching a data sink. The sensitive value comprises an attribute that may be linked to external knowledge to reveal sensitive information about an individual. In response to the application not being predicted to modify the sensitive value prior to the sensitive value reaching the data sink, a value-based information tracking procedure is performed. The value-based information tracking procedure comprises storing one or more values that are observed at a data source, and then determining whether or not each of these one or more values are observed at the data sink.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: June 30, 2020
    Assignee: International Business Machines Corporation
    Inventors: Pietro Ferrara, Marco Pistoia, Omer Tripp, Petar I. Tsankov
  • Publication number: 20200202009
    Abstract: Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a computer-implemented method comprises generating, by a device operatively coupled to a processor, a mathematical model of a computer program product, wherein the mathematical model defines data flows through nodes of the computer program product that reach a secure node corresponding to a secure resource. The computer implemented method further comprises evaluating, by the device, a security protocol of the computer program product using static program analysis of the mathematical model to determine whether any of the data flows provides access to the secure node without proceeding through one or more security nodes corresponding to the security protocol, wherein the one or more security nodes are included in the nodes of the computer program product.
    Type: Application
    Filed: February 27, 2020
    Publication date: June 25, 2020
    Inventors: Matthias Daniel Dietsch, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10675268
    Abstract: 3-aza-bicyclo[3.1.0]hexane-6-carboxylic acid amide derivatives which are agonists of somatostatin receptor subtype 4 (SSTR4), useful for preventing or treating medical disorders related to SSTR4.
    Type: Grant
    Filed: November 2, 2018
    Date of Patent: June 9, 2020
    Assignee: Centrexion Therapeutics Corporation
    Inventors: Riccardo Giovannini, Yunhai Cui, Henri Doods, Marco Ferrara, Stefan Just, Raimund Kuelzer, Iain Lingard, Rocco Mazzaferro, Klaus Rudolf
  • Publication number: 20200175200
    Abstract: Privacy violation detection of a mobile application program is disclosed. Regular histories of the mobile application are mined. A call-graph representation of the mobile application program can be created and sequences of events of interest according to the platform specification of the mobile application can be collected. A plurality of learnable features are extracted from the regular histories. The plurality of learnable features are combined into a single feature vector which is fed into a machine-learning-based classification algorithm. Whether the mobile application program includes one or more permissions for accessing unauthorized privacy data of a mobile application user is determined based on a machine learning classification of the single feature vector. The collected sequences can be reduced into a plurality of feature vectors which can include at least one of a happens-before feature and a multiplicity of occurrences feature.
    Type: Application
    Filed: February 11, 2020
    Publication date: June 4, 2020
    Inventors: Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10650149
    Abstract: Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a computer-implemented method comprises generating, by a device operatively coupled to a processor, a mathematical model of a computer program product, wherein the mathematical model defines data flows through nodes of the computer program product that reach a secure node corresponding to a secure resource. The computer implemented method further comprises evaluating, by the device, a security protocol of the computer program product using static program analysis of the mathematical model to determine whether any of the data flows provides access to the secure node without proceeding through one or more security nodes corresponding to the security protocol, wherein the one or more security nodes are included in the nodes of the computer program product.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: May 12, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthias Daniel Dietsch, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10621333
    Abstract: Online security analysis is provided by installing an analysis agent on a mobile device. The analysis agent monitors the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device. In response to the initiation of installation, the analysis agent quarantines a set of resources corresponding to the new application; analyzes the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists; and, in response to determining that at least one of the potential security threat or the security misconfiguration exists, generates an alert for informing a user that the potential security threat or the security misconfiguration exists.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: April 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Julian T. Dolby, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10614224
    Abstract: Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a computer-implemented method comprises generating, by a device operatively coupled to a processor, a mathematical model of a computer program product, wherein the mathematical model defines data flows through nodes of the computer program product that reach a secure node corresponding to a secure resource. The computer implemented method further comprises evaluating, by the device, a security protocol of the computer program product using static program analysis of the mathematical model to determine whether any of the data flows provides access to the secure node without proceeding through one or more security nodes corresponding to the security protocol, wherein the one or more security nodes are included in the nodes of the computer program product.
    Type: Grant
    Filed: May 15, 2017
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthias Daniel Dietsch, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10614243
    Abstract: Privacy violation detection of a mobile application program is disclosed. Regular histories of the mobile application are mined. A call-graph representation of the mobile application program can be created and sequences of events of interest according to the platform specification of the mobile application can be collected. A plurality of learnable features are extracted from the regular histories. The plurality of learnable features are combined into a single feature vector which is fed into a machine-learning-based classification algorithm. Whether the mobile application program includes one or more permissions for accessing unauthorized privacy data of a mobile application user is determined based on a machine learning classification of the single feature vector. The collected sequences can be reduced into a plurality of feature vectors which can include at least one of a happens-before feature and a multiplicity of occurrences feature.
    Type: Grant
    Filed: August 21, 2018
    Date of Patent: April 7, 2020
    Assignee: International Business Machines Corporation
    Inventors: Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Patent number: 10604511
    Abstract: This invention relates to compounds of formula I a process for their preparation, pharmaceutical compositions containing them and their use in the treatment of conditions having an association with the orexin sub-type 1 receptor. Ar, R1, R2 and R3 have meanings given in the description.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: March 31, 2020
    Assignee: Boehringer Ingelheim International GmbH
    Inventors: Doris Riether, Marco Ferrara, Niklas Heine, Uta Lessel, Janet Rachel Nicholson, Anton Pekcec
  • Publication number: 20200082096
    Abstract: An apparatus, method and computer program product for repairing security vulnerabilities of an application running on a mobile device. The method comprises: monitoring, by a hardware processor running a mobile device application, an application program interface (API) request associated with a data access operation, the data access operation associated with a security vulnerability. The method determines one or more private values provided by the data access operation and tracks, for each determined private value, a use of the private value by the mobile device application. Further, the method determines from the tracked usage, whether a private value has been transformed in a manner associated with the security vulnerability. For each private value that has been transformed, using the processor to modify the private value deemed a security vulnerability prior to an access by the mobile device application.
    Type: Application
    Filed: September 12, 2018
    Publication date: March 12, 2020
    Inventors: Marco Pistoia, Omer Tripp, Pietro Ferrara, Petar Tsankov
  • Publication number: 20200082099
    Abstract: Techniques for identifying computer program security access control violations using static program analysis are provided. In one example, a computer-implemented method comprises generating, by a device operatively coupled to a processor, a mathematical model of a computer program product, wherein the mathematical model defines data flows through nodes of the computer program product that reach a secure node corresponding to a secure resource. The computer implemented method further comprises evaluating, by the device, a security protocol of the computer program product using static program analysis of the mathematical model to determine whether any of the data flows provides access to the secure node without proceeding through one or more security nodes corresponding to the security protocol, wherein the one or more security nodes are included in the nodes of the computer program product.
    Type: Application
    Filed: November 6, 2019
    Publication date: March 12, 2020
    Inventors: Matthias Daniel Dietsch, Pietro Ferrara, Marco Pistoia, Omer Tripp
  • Publication number: 20200081705
    Abstract: A method, system and computer readable program product for cooperative modifying of a software program. In an embodiment, the invention provides a method comprising monitoring two or more running executions of the same software program at two or more user computer systems; detecting an issue with one of the executions; suspending the running executions of the software program; determining a fix to the software program; modifying the software program with the fix on the two or more user computer systems; and resuming the running executions of the software program. In an embodiment, the executions are run at one server computer; and modifying the software program with the fix comprises performing one server instance update to modify all the running executions of the software program with the fix. In an embodiment, the method further comprises issuing notifications to users that the software program has been modified with the fix.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Inventors: Omer Tripp, Marco Pistoia, Pietro Ferrara
  • Publication number: 20200081995
    Abstract: A method, system and computer readable program are disclosed for managing data in a computing network. In an embodiment, the invention provides a method comprising obtaining specified data from a database in the computing network, aggregating the specified data in a defined data structure stored in the computing network, and specifying in the data structure properties over the data aggregated in the data structure. In an embodiment, a plurality of services in the computing network use the data in the data structure in accordance with the properties specified in the data structure. In an embodiment, one or more of the services modifies one or more of the properties specified in the data structure based on a transformation by the one or more of the services of the data aggregated in the data structure.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Inventors: Omer Tripp, Pietro Ferrara, David Lubensky, Marco Pistoia
  • Patent number: 10577336
    Abstract: The invention relates to morpholine and 1,4-oxazepane amide derivatives of general formula (I), which are agonists of somatostatin receptor subtype 4 (SSTR4), useful for preventing or treating medical disorders related to SSTR4. In addition, the invention relates to processes for preparing pharmaceutical compositions as well as processes for manufacture of the compounds according to the invention.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: March 3, 2020
    Assignee: Boehringer Ingelheim International GmbH
    Inventors: Rocco Mazzaferro, Marco Ferrara, Riccardo Giovannini, Iain Lingard, Klaus Rudolf
  • Patent number: 10574087
    Abstract: Systems and methods for optimal planning and real-time control of energy storage systems for multiple simultaneous applications are provided. Energy storage applications can be analyzed for relevant metrics such as profitability and impact on the functionality of the electric grid, subject to system-wide and energy storage hardware constraints. The optimal amount of storage capacity and the optimal operating strategy can then be derived for each application and be prioritized according to a dispatch stack, which can be statically or dynamically updated according to data forecasts. Embodiments can consist of both planning tools and real-time control algorithms.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: February 25, 2020
    Assignee: IHI Inc.
    Inventors: W. Craig Carter, Marco Ferrara, Michael Goroff, Maxwell Mann