Patents by Inventor Roberto Ragusa

Roberto Ragusa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949672
    Abstract: A solution is proposed for performing authentications. A corresponding method comprises storing a verification string corresponding to applying a one-way function iteratively starting from a secret string. An authentication request is received in association with an authentication string (or more) being generated by applying the one-way function iteratively starting from the secret string for a lower number of times. A result of the authentication request is determined by comparing the verification string with a comparison string being generated by applying the one-way function to the authentication string (or a few times iteratively). Corresponding computer programs and a computer program products for performing the method are also proposed. Moreover, corresponding systems for implementing the method are proposed.
    Type: Grant
    Filed: January 31, 2022
    Date of Patent: April 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Roberto Ragusa, Remo Freddi, Chiara Conti, Alessandra Asaro
  • Publication number: 20240092351
    Abstract: A method, computer system, and a computer program product for brake detection is provided. The present invention may include determining a first geometric ratio associated with a rear portion of a first vehicle, from a first image of the first vehicle. The present invention may also include determining a second geometric ratio associated with the rear portion of the first vehicle, from a second image of the first vehicle. The present invention may further include, in response to determining that the second geometric ratio is less than the first geometric ratio, detecting a braking action of the first vehicle.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Inventors: Roberto Ragusa, Remo Freddi, Chiara Conti, Alessandra Asaro
  • Patent number: 11775272
    Abstract: A solution is proposed for deploying software programs. A corresponding method comprises calculating a program security indicator of each software program according to corresponding component security indicators of software components being used by the software program. A computing system (or more) is selected for deploying the software program according to a comparison between the program security indicator and corresponding system security indicators of a plurality of available computing systems. A computer program and a computer program product for performing the method are also proposed. Moreover, a corresponding system is proposed.
    Type: Grant
    Filed: March 24, 2022
    Date of Patent: October 3, 2023
    Assignee: International Business Machines Corporation
    Inventors: Gianluca Volpe, Donatello Carriero, Gianluca Gigliarelli, Roberto Ragusa, Wanda Righi
  • Publication number: 20230305825
    Abstract: A solution is proposed for deploying software programs. A corresponding method comprises calculating a program security indicator of each software program according to corresponding component security indicators of software components being used by the software program. A computing system (or more) is selected for deploying the software program according to a comparison between the program security indicator and corresponding system security indicators of a plurality of available computing systems. A computer program and a computer program product for performing the method are also proposed. Moreover, a corresponding system is proposed.
    Type: Application
    Filed: March 24, 2022
    Publication date: September 28, 2023
    Inventors: Gianluca Volpe, Donatello Carriero, Gianluca Gigliarelli, Roberto Ragusa, Wanda Righi
  • Patent number: 11736595
    Abstract: A system and related method exchange messages under the control of a messaging client. The method comprises splitting a content of a source message into a plurality of fragments defined by corresponding portions of its content associated with different recipients of the message. A plurality of transport messages are generated, each comprising one or more of the fragments associated with the recipients. The transport messages are submitted to a messaging server for causing it to provide the transport messages to corresponding further messaging clients of the recipients for their aggregation. A computer program and a computer program product for performing the method are also provided.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: August 22, 2023
    Assignee: International Business Machines Corporation
    Inventors: Alice Guidotti, Roberto Ragusa, Leonardo Modeo, Anna Pintus, Matteo Filippo Corona
  • Publication number: 20230247017
    Abstract: A solution is proposed for performing authentications. A corresponding method comprises storing a verification string corresponding to applying a one-way function iteratively starting from a secret string. An authentication request is received in association with an authentication string (or more) being generated by applying the one-way function iteratively starting from the secret string for a lower number of times. A result of the authentication request is determined by comparing the verification string with a comparison string being generated by applying the one-way function to the authentication string (or a few times iteratively). Corresponding computer programs and a computer program products for performing the method are also proposed. Moreover, corresponding systems for implementing the method are proposed.
    Type: Application
    Filed: January 31, 2022
    Publication date: August 3, 2023
    Inventors: Roberto Ragusa, Remo Freddi, Chiara Conti, Alessandra Asaro
  • Patent number: 11689568
    Abstract: In several aspects of the present invention, a processor receives, from a rule-based intrusion detection system, an intercepted request sent by a hacker. A processor analyzes the intercepted request to determine, in part, a type of service and a type of hacker. A processor builds a first layer of a honeypot maze based on the analyzed intercepted request. A processor simulates the first layer of the honeypot maze to the hacker. A processor iteratively builds additional layers of the honeypot maze based on additional intercepted requests from the hacker.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Francesco Maria Carteri, Roberto Ragusa
  • Publication number: 20230186801
    Abstract: A device and method for displaying security information to a user is provided. The present invention may include a security device configured to display a security information on a display surface. The security information may include at least one component having two images based on a splitting of its representation that are viewable from corresponding angles of view. The images may be fused into the representation of the at least one component by a visual system of the user looking at them at a reading distance causing the eyes of the user to look at the images from the corresponding angles of view. A corresponding method for displaying security information to a user is also provided.
    Type: Application
    Filed: December 10, 2021
    Publication date: June 15, 2023
    Inventors: Alessandra Asaro, Chiara Conti, Remo Freddi, Roberto Ragusa
  • Publication number: 20230179687
    Abstract: A system and related method exchange messages under the control of a messaging client. The method comprises splitting a content of a source message into a plurality of fragments defined by corresponding portions of its content associated with different recipients of the message. A plurality of transport messages are generated, each comprising one or more of the fragments associated with the recipients. The transport messages are submitted to a messaging server for causing it to provide the transport messages to corresponding further messaging clients of the recipients for their aggregation. A computer program and a computer program product for performing the method are also provided.
    Type: Application
    Filed: December 3, 2021
    Publication date: June 8, 2023
    Inventors: Alice Guidotti, Roberto Ragusa, Leonardo Modeo, Anna Pintus, Matteo Filippo Corona
  • Publication number: 20230135968
    Abstract: A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
    Type: Application
    Filed: October 28, 2021
    Publication date: May 4, 2023
    Inventors: Roberto Ragusa, Remo Freddi, Chiara Conti, Alessandra Asaro
  • Patent number: 11605256
    Abstract: A method includes controlling a shared location. Item identifiers are read from a set of items (pertaining to one or more operators sharing the shared location) reaching a gate of the shared location. A verification request message for the item identifiers is broadcast for receiving corresponding verification response messages from central computing systems of the operators. A passage of the items through the gate is controlled according to the verification response messages. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
    Type: Grant
    Filed: March 12, 2020
    Date of Patent: March 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Roberto Ragusa, Elisabetta Quaranta, Marco Mulas, Paolo Ottaviano
  • Patent number: 11388596
    Abstract: Aspects of the present invention disclose a method for encoding and transmitting access codes of a network to a computing device that is attempting to access the network. The method includes one or more processors identifying an audio command received by a first computing device. The method further includes generating a sound waveform that includes an access code of an access point, by encoding the access code into the sound waveform. The method further includes defining a sound power level of the sound waveform. The method further includes transmitting the sound waveform. The method further includes determining whether a second computing device receives the access code that is encoded in the sound waveform.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: July 12, 2022
    Assignee: International Business Machines Corporation
    Inventors: Roberto Ragusa, Gianluca Gargaro, Matteo Rogante, Paolo Ottaviano
  • Patent number: 11323263
    Abstract: A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to the target device, receiving an utterance of the verification token and transmitting the secret information encrypted with the public key in response to the utterance of the verification token. A corresponding method for obtaining the secret information by a target (computing) device comprises transmitting a public key of the target device, receiving a verification token, outputting the verification token and receiving the secret information encrypted with the public key in response to an utterance of the verification token. Corresponding computer programs and computer program products are also proposed. Moreover, a source computing device and a target computing device for implementing the methods are proposed.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: May 3, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gianluca Gargaro, Matteo Rogante, Paolo Ottaviano, Roberto Ragusa
  • Patent number: 11294372
    Abstract: A driving mode decision support for a decision to select a driving mode of driving on at least one road segment is provided to a user of an autonomous vehicle. A driver driving profile of a user is received. Segment information defining the at least one road segment is queried. The segment information includes at least a model driver driving profile associated with the at least one road segment. A driving mode decision support for the user is determined for the at least one road segment based on the driver driving profile of the user and the model driver driving profile. An indication of the driving mode decision support is provided to the user. The driving mode decision support includes a recommended driving mode of driving on the at least one road segment.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: April 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Leonardo Rosati, Alice Guidotti, Fabio Cerri, Roberto Ragusa
  • Patent number: 11190473
    Abstract: A content score value is assigned to a text message for content categories. Context data values relating to the text message and to context categories are collected. A context score value for each context category is determined by comparing the context data values with context data threshold values. A content score value for each content category is determined by comparing the content data values with content data threshold values. A difference factor value is calculated as a square root of a summation over differences between the context score values and the content score values. If the difference factor value is determined to exceed a specified difference factor threshold value, then a confirmation is requested and received. The text message is sent by electronic mail to a receiving address.
    Type: Grant
    Filed: March 16, 2020
    Date of Patent: November 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: Giulia Carnevale, Marco Gianfico, Ciro Ragusa, Roberto Ragusa
  • Publication number: 20210352103
    Abstract: In several aspects of the present invention, a processor receives, from a rule-based intrusion detection system, an intercepted request sent by a hacker. A processor analyzes the intercepted request to determine, in part, a type of service and a type of hacker. A processor builds a first layer of a honeypot maze based on the analyzed intercepted request. A processor simulates the first layer of the honeypot maze to the hacker. A processor iteratively builds additional layers of the honeypot maze based on additional intercepted requests from the hacker.
    Type: Application
    Filed: May 8, 2020
    Publication date: November 11, 2021
    Inventors: Francesco Maria Carteri, Roberto Ragusa
  • Publication number: 20210351930
    Abstract: A solution is proposed for sharing secret information for accessing a wireless computing network. A corresponding method for distributing the secret information by a source (computing) device comprises receiving a public key of the a target (computing) device, transmitting a verification token to the target device, receiving an utterance of the verification token and transmitting the secret information encrypted with the public key in response to the utterance of the verification token. A corresponding method for obtaining the secret information by a target (computing) device comprises transmitting a public key of the target device, receiving a verification token, outputting the verification token and receiving the secret information encrypted with the public key in response to an utterance of the verification token. Corresponding computer programs and computer program products are also proposed. Moreover, a source computing device and a target computing device for implementing the methods are proposed.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 11, 2021
    Inventors: Gianluca Gargaro, MATTEO ROGANTE, Paolo Ottaviano, Roberto Ragusa
  • Publication number: 20210287473
    Abstract: A method includes controlling a shared location. Item identifiers are read from a set of items (pertaining to one or more operators sharing the shared location) reaching a gate of the shared location. A verification request message for the item identifiers is broadcast for receiving corresponding verification response messages from central computing systems of the operators. A passage of the items through the gate is controlled according to the verification response messages. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
    Type: Application
    Filed: March 12, 2020
    Publication date: September 16, 2021
    Inventors: Roberto Ragusa, Elisabetta Quaranta, Marco Mulas, Paolo Ottaviano
  • Patent number: 11086667
    Abstract: A method for selective scheduling and deployment of maintenance tasks in cloud computing environments is provided. The method determines a computing environment in which a maintenance task is to be performed. The computing environment has one or more environment characteristics. The method then determines one or more task characteristics for the maintenance task. Based on the one or more environment characteristics and the one or more task characteristics, the method determines a similarity between the maintenance task and one or more historical maintenance tasks. The method generates a completion indicator for the maintenance task based on the similarity between the maintenance task and the one or more historical maintenance tasks. Based on the completion indicator, the method schedules performance of the maintenance task.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: August 10, 2021
    Assignee: International Business Machines Corporation
    Inventors: Maria Sbriccoli, Marco Martino, Roberto Ragusa, Pasquale Maria Mascolo Montenero
  • Patent number: 11055590
    Abstract: A multiresolution optical code can be encoded. A first set of information and a second set of information to encode in an optical code is received. An optical code that encodes the first set of information in a plurality of dots is generated. Each dot of the plurality of dots is divided into a matrix of a first number of sub-dots by a second number of sub-dots, wherein each of the first number and the second number are integers equal to or greater than three and wherein this dividing creates a set of matrices of sub-dots. The second set of information is encoded in a plurality of the sub-dots of the set of matrices of sub-dots.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: July 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Roberto Ragusa, Marco Imperia, Antonio Bagarolo, Alice Guidotti