Patents by Inventor Rossella De Gaetano
Rossella De Gaetano has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230177216Abstract: A solution is proposed for verifying authenticity of documents. A corresponding method comprises calculating signatures representative of segments splitting a current document. The signatures are searched in an authoritative memory structure containing corresponding signatures of segments splitting authoritative documents whose content is certified by authoritative sources. Authenticity information of the current document is determined according to a result of this search. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.Type: ApplicationFiled: December 3, 2021Publication date: June 8, 2023Inventors: Rossella De Gaetano, Vito Longo
-
Patent number: 11556426Abstract: A solution is proposed for controlling backups of objects in an information technology system. A corresponding method comprises determining change categories of changes of the objects being changed since a previous backup thereof; backups of the changed objects are triggered according to corresponding trigger indicators based on change categories of their changes and on relevance weights thereof.Type: GrantFiled: September 28, 2020Date of Patent: January 17, 2023Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Davide Fazzone, Luigi Lombardi, Simone Bonetti
-
Publication number: 20220100610Abstract: A solution is proposed for controlling backups of objects in an information technology system. A corresponding method comprises determining change categories of changes of the objects being changed since a previous backup thereof; backups of the changed objects are triggered according to corresponding trigger indicators based on change categories of their changes and on relevance weights thereof.Type: ApplicationFiled: September 28, 2020Publication date: March 31, 2022Inventors: Rossella De Gaetano, Davide Fazzone, Luigi Lombardi, Simone Bonetti
-
Patent number: 11138365Abstract: A method is provided for retrieving data stored in a data source at pages having a predetermining size. A computing system receives a page request for requesting a new page, within data that are selected in the data source according to a query and are then to be filtered according to one or more filtering criteria external to the data source. A pagination structure (comprising an end point in the selected data of a last previously requested page that has been previously requested) is associated with the page request; the pagination structure is used to retrieve the data following the end point of the last previously requested page and to filter them into the new page. A computer program product for performing the method and a corresponding system are also provided.Type: GrantFiled: February 2, 2018Date of Patent: October 5, 2021Assignee: International Business Machines CorporationInventors: Raimondo Castino, Gabriele De Capoa, Rossella De Gaetano, Fabio Monopoli
-
Patent number: 11055420Abstract: An access control method for controlling access to data requested from an electronic information system. The method comprises receiving a request for the data, determining a user identity associated with the request; gathering the requested data from one or more data sources by an orchestrator for input to a cognitive engine; analyzing the requested data; based on results of analyzing the requested data, deciding on whether the user identity can be allowed to access the requested data; providing feedback by the user identity; and updating a learning module based on the feedback.Type: GrantFiled: February 5, 2018Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Paolo Ottaviano, Gianluca Perreca, Antonio Bagarolo
-
Patent number: 10782953Abstract: A method and system are for deploying a software application. The software application is deployed in a default deployment configuration onto a computing system. The default deployment configuration includes interacting software components of the software application. It is ascertained, from one or more operating indicators of an execution environment of the software application, that a critical condition of the execution environment exists. In response to having ascertained that the critical condition of the execution environment exists, an alternative deployment configuration is selected from one or more alternative deployment configurations of the software application, each alternative deployment configuration having one or more groups of the software components aggregated into corresponding aggregated software components. The software application is re-deployed in the selected alternative deployment configuration onto the computing system.Type: GrantFiled: May 2, 2019Date of Patent: September 22, 2020Assignee: International Business Machines CorporationInventors: Gabriele De Capoa, Rossella De Gaetano, Fausto Ribechini, Valerio Riva, Massimo Villani
-
Patent number: 10769829Abstract: An image controller intercepts a digital representation of an image originating from a user. The image controller performs a visual recognition operation on the image to identify at least one visual layer of a plurality of layers within the image and a separate perspective of the user associated with each layer. The image controller identifies a replacement layer assigned to an identifiable recipient, for a particular layer of the plurality of layers, in an analytics database specifying an expected perspective that corresponds with the separate perspective of the user for the particular layer. The image controller modifies the particular layer with the replacement layer for obtaining a transformed image amended for the identifiable recipient.Type: GrantFiled: October 1, 2018Date of Patent: September 8, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rossella De Gaetano, Gabriele de Capoa, Alessandro Ghezzi, Valerio Mercuri, Alfonso D'Aniello, Martha Pinelo, Corrado Gianfelici, Andrea Tortosa
-
Patent number: 10664592Abstract: An embodiment of the invention may include a method, computer program product and system for executing a software application. The embodiment may include receiving a notification of an intended execution of the software application directly within an operating system of the computing device. The embodiment may include halting the intended execution. The embodiment may include determining whether the software application is known and safe. The embodiment may include determining whether the software application is known and malicious. The embodiment may include creating a container on the computing device. The embodiment may include executing the software application within the container. The embodiment may include monitoring an execution behavior of the software application. The embodiment may include determining whether an anomaly has occurred within the execution behavior.Type: GrantFiled: March 22, 2018Date of Patent: May 26, 2020Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Alessandro Ghezzi, Corrado Gianfelici, Alfonso D'Aniello, Martha Pinelo, Valerio Mercuri
-
Patent number: 10620928Abstract: Systems, methods, and computer program products to perform an operation comprising deploying a first application in a first cloud computing environment of a plurality of cloud computing environments, wherein the first application is composed of a first instance of a first service, determining that the first service has become unavailable in the first cloud computing environment, identifying, by an instance of inventory module executing in the first cloud computing environment, a second instance of the first service in one of the plurality of cloud computing environments, building the first application using the second instance of the first service; and redeploying the first application built using the second instance of the first service in the first cloud computing environment.Type: GrantFiled: January 4, 2017Date of Patent: April 14, 2020Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Valentina Martucci, Sandro Piccinini
-
Publication number: 20200105035Abstract: An image controller intercepts a digital representation of an image originating from a user. The image controller performs a visual recognition operation on the image to identify at least one visual layer of a plurality of layers within the image and a separate perspective of the user associated with each layer. The image controller identifies a replacement layer assigned to an identifiable recipient, for a particular layer of the plurality of layers, in an analytics database specifying an expected perspective that corresponds with the separate perspective of the user for the particular layer. The image controller modifies the particular layer with the replacement layer for obtaining a transformed image amended for the identifiable recipient.Type: ApplicationFiled: October 1, 2018Publication date: April 2, 2020Inventors: Rossella De Gaetano, Gabriele de Capoa, Alessandro Ghezzi, Valerio Mercuri, Alfonso D'Aniello, Martha Pinelo, Corrado Gianfelici, Andrea Tortosa
-
Publication number: 20190294778Abstract: An embodiment of the invention may include a method, computer program product and system for executing a software application. The embodiment may include receiving a notification of an intended execution of the software application directly within an operating system of the computing device. The embodiment may include halting the intended execution. The embodiment may include determining whether the software application is known and safe. The embodiment may include determining whether the software application is known and malicious. The embodiment may include creating a container on the computing device. The embodiment may include executing the software application within the container. The embodiment may include monitoring an execution behavior of the software application. The embodiment may include determining whether an anomaly has occurred within the execution behavior.Type: ApplicationFiled: March 22, 2018Publication date: September 26, 2019Inventors: Rossella De Gaetano, Alessandro Ghezzi, Corrado Gianfelici, Alfonso D'Aniello, Martha Pinelo, Valerio Mercuri
-
Publication number: 20190258465Abstract: A method and system are for deploying a software application. The software application is deployed in a default deployment configuration onto a computing system. The default deployment configuration includes interacting software components of the software application. It is ascertained, from one or more operating indicators of an execution environment of the software application, that a critical condition of the execution environment exists. In response to having ascertained that the critical condition of the execution environment exists, an alternative deployment configuration is selected from one or more alternative deployment configurations of the software application, each alternative deployment configuration having one or more groups of the software components aggregated into corresponding aggregated software components. The software application is re-deployed in the selected alternative deployment configuration onto the computing system.Type: ApplicationFiled: May 2, 2019Publication date: August 22, 2019Inventors: Gabriele De Capoa, Rossella De Gaetano, Fausto Ribechini, Valerio Riva, Massimo Villani
-
Publication number: 20190243979Abstract: An access control method for controlling access to data requested from an electronic information system. The method comprises receiving a request for the data, determining a user identity associated with the request; gathering the requested data from one or more data sources by an orchestrator for input to a cognitive engine; analyzing the requested data; based on results of analyzing the requested data, deciding on whether the user identity can be allowed to access the requested data; providing feedback by the user identity; and updating a learning module based on the feedback.Type: ApplicationFiled: February 5, 2018Publication date: August 8, 2019Inventors: Rossella De Gaetano, Paolo Ottaviano, Gianluca Perreca, Antonio Bagarolo
-
Publication number: 20190243876Abstract: A method is provided for retrieving data stored in a data source at pages having a predetermining size. A computing system receives a page request for requesting a new page, within data that are selected in the data source according to a query and are then to be filtered according to one or more filtering criteria external to the data source. A pagination structure (comprising an end point in the selected data of a last previously requested page that has been previously requested) is associated with the page request; the pagination structure is used to retrieve the data following the end point of the last previously requested page and to filter them into the new page. A computer program product for performing the method and a corresponding system are also provided.Type: ApplicationFiled: February 2, 2018Publication date: August 8, 2019Inventors: Raimondo Castino, Gabriele De Capoa, Rossella De Gaetano, Fabio Monopoli
-
Patent number: 10360012Abstract: A method and system are for deploying a software application. The software application is deployed in a default deployment configuration onto a computing system. The default deployment configuration includes interacting software components of the software application. One or more operating indicators of an execution environment of the software application are monitored. From the monitored one or more operating indicators, it is ascertained that a critical condition of the execution environment exists. In response to having ascertained that the critical condition exists, an alternative deployment configuration is selected from one or more alternative deployment configurations of the software application, each alternative deployment configuration having one or more groups of the software components aggregated into corresponding aggregated software components. The software application is re-deployed in the selected alternative deployment configuration onto the computing system.Type: GrantFiled: November 9, 2017Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Gabriele De Capoa, Rossella De Gaetano, Fausto Ribechini, Valerio Riva, Massimo Villani
-
Publication number: 20190138287Abstract: A method and system are for deploying a software application. The software application is deployed in a default deployment configuration onto a computing system. The default deployment configuration includes interacting software components of the software application. One or more operating indicators of an execution environment of the software application are monitored. From the monitored one or more operating indicators, it is ascertained that a critical condition of the execution environment exists. In response to having ascertained that the critical condition exists, an alternative deployment configuration is selected from one or more alternative deployment configurations of the software application, each alternative deployment configuration having one or more groups of the software components aggregated into corresponding aggregated software components. The software application is re-deployed in the selected alternative deployment configuration onto the computing system.Type: ApplicationFiled: November 9, 2017Publication date: May 9, 2019Inventors: Gabriele De Capoa, Rossella De Gaetano, Fausto Ribechini, Valerio Riva, Massimo Villani
-
Publication number: 20180191865Abstract: Systems, methods, and computer program products to perform an operation comprising deploying a first application in a first cloud computing environment of a plurality of cloud computing environments, wherein the first application is composed of a first instance of a first service, determining that the first service has become unavailable in the first cloud computing environment, identifying, by an instance of inventory module executing in the first cloud computing environment, a second instance of the first service in one of the plurality of cloud computing environments, building the first application using the second instance of the first service; and redeploying the first application built using the second instance of the first service in the first cloud computing environment.Type: ApplicationFiled: January 4, 2017Publication date: July 5, 2018Inventors: Rossella DE GAETANO, Valentina MARTUCCI, Sandro PICCININI
-
Patent number: 10001986Abstract: A daemon agent for updating software instances in a cloud computing system is disclosed. The daemon agent in a first instance of an application detects a failure in a scenario. The daemon agent broadcasts a first message from the first instance to a plurality of peer instances of the application in the computing system to query whether the plurality of instances has experienced the failure. The daemon agent receives a second message from a second instance of the plurality of instances, where the second message indicates that the second instance has not experienced the failure. The daemon agent determines differences between the first instance and the second instance and selects one or more components of the application based on the determined differences. The daemon agent updates the first instance by installing the selected one or more components on the first instance.Type: GrantFiled: February 9, 2017Date of Patent: June 19, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Rossella De Gaetano, Sandro Piccinini
-
Patent number: 9086999Abstract: A method, computer program product, and apparatus for managing encrypted data are provided. A respective set of sectors in each page of the volume is selected for storing data based on a respective key in a number of keys responsive to receiving a request to store the data in the volume and an identification of the number of keys with which users are allowed to store the data in the volume. Selection of the respective set of sectors is a function of a value of the respective key and a number of available sectors within a page and the volume is much larger than the data. The data is encrypted using the respective key to form the encrypted data. The encrypted data is stored in the respective set of sectors in the page in the volume.Type: GrantFiled: July 5, 2011Date of Patent: July 21, 2015Assignee: International Business Machines CorporationInventors: Piotr Beltowski, Rossella De Gaetano, David W. Knapp, Jr., Wojciech M. Kocjan
-
Patent number: 9065825Abstract: Embodiments of the invention relate to methods, apparatus and systems, including computer program products for license management in one or more computer systems. A first computer runs a master license server process instance. The master license service process instance is associated with a hardware identifier relates to the first computer and has a license to run a predefined number of concurrent production license server process instances that are responsible for license management towards clients. A request is received by the master license server process instance for a license from a production license server process instance in a second computer. The master license server process instance provides a virtual identifier to the production license server process instance to be used as a unique identifier for license management purposes towards clients by the production license server process instance. The virtual identifier is cryptographically secured against modification.Type: GrantFiled: November 5, 2010Date of Patent: June 23, 2015Assignee: International Business Machines CorporationInventors: Rossella De Gaetano, Artur Obrzut, Ryszard Olkusnik, Rafal Sontowski