Patents by Inventor Roberto Di Pietro
Roberto Di Pietro has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12177335Abstract: A multilevel power line communication quantization method for physical layer security is provided. The multilevel quantization method includes generating an estimated channel impulse response of at least one link between a first node and a second node; performing a quantization of the estimated channel impulse response; generating a virtual channel impulse response; performing a quantization of the virtual channel impulse response for generating a first key and a second key, wherein the first key has a corresponding first position vector and the second key has a corresponding second position vector; and confirming that the first key and the second key are equal.Type: GrantFiled: January 4, 2023Date of Patent: December 24, 2024Assignees: QATAR FOUNDATION FOR EDUCATION, SCIENCE AND COMMUNITY DEVELOPMENT, IBERDROLA QSTP LLCInventors: Roberto Di Pietro, Aymen Omri, Javier Hernandez-Fernandez
-
Publication number: 20230216663Abstract: A multilevel power line communication quantization method for physical layer security is provided. The multilevel quantization method includes generating an estimated channel impulse response of at least one link between a first node and a second node; performing a quantization of the estimated channel impulse response; generating a virtual channel impulse response; performing a quantization of the virtual channel impulse response for generating a first key and a second key, wherein the first key has a corresponding first position vector and the second key has a corresponding second position vector; and confirming that the first key and the second key are equal.Type: ApplicationFiled: January 4, 2023Publication date: July 6, 2023Inventors: Roberto Di Pietro, Aymen Omri, Javier Hernandez-Fernandez
-
Patent number: 11641363Abstract: Disclosed herein are methods and systems that can be used by an end-user to verify both the identity of a remote service (4) and the authenticity of a response provided by the remote service (4), even if the first authentication arrangement (2) used to interact with the remote service (4) is compromised. The end-user requests the remote service (4) to provide evidence of its identity, in the form of potentially different authentication materials. The authentication materials are then verified independently on each additional authentication arrangements (6, 7) and used to determine the authenticity of the response from the remote service (4).Type: GrantFiled: October 18, 2019Date of Patent: May 2, 2023Assignee: Qatar Foundation for Education, Science and Community DevelopmentInventors: Roberto Di Pietro, Savio Sciancalepore, Simone Raponi
-
Patent number: 11371846Abstract: Systems and methods for determining the position of a device or vehicle by using celestial information captured by an imaging apparatus. The systems and methods identify a star set in the celestial information, generate a star set fingerprint and compare the star set fingerprint with reference celestial information. Once a comparison is made, the location of the device or vehicle can be determined and used within a celestial navigation system.Type: GrantFiled: January 13, 2020Date of Patent: June 28, 2022Assignee: QATAR FOUNDATION FOR EDUCATION SCIENCE AND COMMUNITY DEVELOPMENTInventors: Roberto Di Pietro, Pietro Tedeschi
-
Patent number: 11271749Abstract: The present disclosure provides systems and methods for enhanced wireless communication security. The preambles used for the identification of an upcoming wireless communication may be periodically changed (e.g., dynamic), on a time basis, based on a secret key function shared between the communicating parties. In this way, only the intended parties are able to recognize the start of an ongoing communication, synchronize with the transmitters, and access the information contained therein. An attacker, being unaware of the specific preamble sequence used for the synchronization, will not recognize the pattern of the communication, and thus will be unable to recognize when communications are ongoing. Additional authentication measures may also be implemented with the transmissions.Type: GrantFiled: April 10, 2020Date of Patent: March 8, 2022Assignee: QATAR FOUNDATION FOR EDUCATION, SCIENCE AND COMMUNITY DEVELOPMENTInventors: Roberto Di Pietro, Savio Sciancalepore, Gabriele Oligeri
-
Patent number: 11182470Abstract: The present disclosure provides a new and innovative system, method, and non-transitory computer-readable medium for securely recovering access to an online service account. Secret splitting is utilized to require multiple recovery mechanisms in order to recover access to an online service account, thus decreasing the likelihood that a malicious attacker will compromise all of the recovery mechanisms to gain access to the online service account. The secret is split into a quantity of tokens via a secret sharing function that can reconstruct the secret with a predetermined threshold quantity of the tokens. The level of security provided by the system is flexible by adjusting the quantity of recovery mechanisms and the predetermined threshold quantity of tokens required to reconstruct the secret.Type: GrantFiled: May 21, 2020Date of Patent: November 23, 2021Assignee: Qatar Foundation for Education, Science and Community DevelopmentInventors: Roberto Di Pietro, Simone Raponi
-
Patent number: 11150671Abstract: The presently disclosed method and system exploits a received signal strength of a jamming signal emitted by a jammer to allow navigation of an object through an area containing the jamming signal. In one embodiment, the method comprises receiving a plurality of navigation data and a jamming signal when entering a jamming zone. The method then comprises repeatedly measuring the strength of the jamming signal while moving within the jamming zone. The method then comprises determining the location of the jammer based on the movement within the jamming zone and the strength of the jamming signal at multiple coordinates. The method further comprises performing movement to destination coordinates within the jamming zone at least partially based on the jammer location and the strength of the jamming signal.Type: GrantFiled: May 7, 2019Date of Patent: October 19, 2021Assignee: Qatar Foundation for Education, Science and Community DevelopmentInventors: Roberto Di Pietro, Gabriele Oligeri, Pietro Tedeschi
-
Publication number: 20210018936Abstract: The presently disclosed method and system exploits a received signal strength of a jamming signal emitted by a jammer to allow navigation of an object through an area containing the jamming signal. In one embodiment, the method comprises receiving a plurality of navigation data and a jamming signal when entering a jamming zone. The method then comprises repeatedly measuring the strength of the jamming signal while moving within the jamming zone. The method then comprises determining the location of the jammer based on the movement within the jamming zone and the strength of the jamming signal at multiple coordinates. The method further comprises performing movement to destination coordinates within the jamming zone at least partially based on the jammer location and the strength of the jamming signal.Type: ApplicationFiled: May 7, 2019Publication date: January 21, 2021Inventors: Roberto Di Pietro, Gabriele Oligeri, Pietro Tedeschi
-
Publication number: 20200372149Abstract: The present disclosure provides a new and innovative system, method, and non-transitory computer-readable medium for securely recovering access to an online service account. Secret splitting is utilized to require multiple recovery mechanisms in order to recover access to an online service account, thus decreasing the likelihood that a malicious attacker will compromise all of the recovery mechanisms to gain access to the online service account. The secret is split into a quantity of tokens via a secret sharing function that can reconstruct the secret with a predetermined threshold quantity of the tokens. The level of security provided by the system is flexible by adjusting the quantity of recovery mechanisms and the predetermined threshold quantity of tokens required to reconstruct the secret.Type: ApplicationFiled: May 21, 2020Publication date: November 26, 2020Inventors: Roberto Di Pietro, Simone Raponi
-
Publication number: 20200328900Abstract: The present disclosure provides systems and methods for enhanced wireless communication security. The preambles used for the identification of an upcoming wireless communication may be periodically changed (e.g., dynamic), on a time basis, based on a secret key function shared between the communicating parties. In this way, only the intended parties are able to recognize the start of an ongoing communication, synchronize with the transmitters, and access the information contained therein. An attacker, being unaware of the specific preamble sequence used for the synchronization, will not recognize the pattern of the communication, and thus will be unable to recognize when communications are ongoing. Additional authentication measures may also be implemented with the transmissions.Type: ApplicationFiled: April 10, 2020Publication date: October 15, 2020Inventors: Roberto Di Pietro, Savio Sciancalepore, Gabriele Oligeri
-
Publication number: 20200329378Abstract: A spoofing detection device is provided. The spoofing detection device includes an antenna configured to receive a signal from wireless communication; a processor configured to extract at least one feature of the received signal; a storage configured to store a local signal feature; a detection circuit configured to compare the extracted feature from the received signal and the local signal feature. The detection circuit is configured to decide if the signal is a spoofed signal based on a result of comparison between the extracted feature from the received signal and the local signal feature.Type: ApplicationFiled: March 17, 2020Publication date: October 15, 2020Inventors: Roberto Di Pietro, Savio Sciancalepore, Gabriele Oligeri, Pietro Tedeschi
-
Publication number: 20200225040Abstract: Systems and methods for determining the position of a device or vehicle by using celestial information captured by an imaging apparatus. The systems and methods identify a star set in the celestial information, generate a star set fingerprint and compare the star set fingerprint with reference celestial information. Once a comparison is made, the location of the device or vehicle can be determined and used within a celestial navigation system.Type: ApplicationFiled: January 13, 2020Publication date: July 16, 2020Inventors: Roberto Di Pietro, Pietro Tedeschi
-
Publication number: 20200228541Abstract: Disclosed herein are methods and systems that can be used by an end-user to verify both the identity of a remote service (4) and the authenticity of a response provided by the remote service (4), even if the first authentication arrangement (2) used to interact with the remote service (4) is compromised. The end-user requests the remote service (4) to provide evidence of its identity, in the form of potentially different authentication materials. The authentication materials are then verified independently on each additional authentication arrangements (6, 7) and used to determine the authenticity of the response from the remote service (4).Type: ApplicationFiled: October 18, 2019Publication date: July 16, 2020Inventors: Roberto Di Pietro, Savio Sciancalepore, Simone Raponi
-
Publication number: 20190182284Abstract: A method and system of detecting a security threat within a network of connected devices that share a ledger of transactions between them under the form of exchanged blockchain messages (50). Enhanced blockchain messages are built by adding all forked chains (51) to the blockchain messages (50). Forked chains in such enhanced blockchains are then inspected to detect any anomaly. When an anomaly is detected in a forked chain, all transactions of the ledger in the forked chain (51) and the blockchain message (50) leading up to the network attack entry point are reviewed to identify the source of the security threat.Type: ApplicationFiled: July 13, 2017Publication date: June 13, 2019Applicant: Alcatel LucentInventors: Matteo Signorini, Roberto Di Pietro, Wael Kanoun