Patents by Inventor Stefano Braghin

Stefano Braghin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200245141
    Abstract: Embodiments for privacy protection of entities in a transportation system by a processor. Route instructions may be provided to an approximate destination located within a defined proximity of an entity for a transportation service for protecting a current location of an entity. The approximate destination may be dynamically adjusted to converge with the current location of the entity as the transportation service approaches the entity.
    Type: Application
    Filed: January 30, 2019
    Publication date: July 30, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Adi BOTEA, Stefano BRAGHIN, Naoise HOLOHAN, Akihiro KISHIMOTO
  • Patent number: 10700864
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: July 12, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Patent number: 10700866
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: June 30, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20200162253
    Abstract: Various embodiments are provided for authenticating an entity in non-secure communication channels via secure out-of-bands channels. An operator may be authenticated to have access to a secured location associated with an entity upon determining the operator retrieved and communicated a unique token, provided by the user and stored at the secured location, back to the user.
    Type: Application
    Filed: November 19, 2018
    Publication date: May 21, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Elizabeth DALY, Spyridon ANTONATOS, Stefano BRAGHIN
  • Patent number: 10614236
    Abstract: Embodiments for performing self-contained, consistent data masking in a distributed computing environment by a processor. A data masking operation is performed on one or more datasets in one of a plurality of data formats such that a key of each value of each key-value pair representing a common set of columns or paths for the one or more datasets is masked.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: April 7, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon Antonatos, Stefano Braghin, Ioannis Gkoufas, Pol Mac Aonghusa
  • Publication number: 20200050768
    Abstract: A system and method for asset leak risk assessment in blockchains are presented. A risk assessment of recursive call attack vulnerabilities may be cognitively determined according to risk vulnerability measurements generated from a computer program source code, a list of external call functions, a risk assessment function, a list of assets, a parser, or a combination thereof.
    Type: Application
    Filed: August 10, 2018
    Publication date: February 13, 2020
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Emanuele RAGNOLI, John SHEEHAN, Stefano BRAGHIN, Gokhan SAGIRLAR
  • Publication number: 20200026847
    Abstract: To improve the security performance of a computer system, a retrieval component executing on at least one hardware processor obtains a list of known compromised passwords. A validation component executing on the at least one hardware processor obtains a specification of a putative password and risk-scores the putative password based at least in part on presence of the putative password in the list of known compromised passwords. The system obtains a specification of an actual password chosen in accordance with the risk score of the putative password. Access to at least one aspect of the computer system is controlled based on the actual chosen password.
    Type: Application
    Filed: July 18, 2018
    Publication date: January 23, 2020
    Inventors: Derek Wayne Botti, Elizabeth Daly, Martin Stephenson, Spyridon Antonatos, Stefano Braghin
  • Publication number: 20190310970
    Abstract: Quasi-identifiers (QIDs) are detected in a dataset using a set of computing tasks. The dataset has a plurality of records and a set of attributes. An index is generated for the dataset. The index has an indicator for each attribute value of each record in the dataset. Each indicator specifies all the records in the dataset having the same value for the attribute. Each task is assigned an attribute combination and a subset of the plurality of records in the dataset and is passed to a thread for execution on computing resources. The executing task inspects the set of records specified by the index indicator for each attribute value in the attribute combination to produce a result. The result of at least one task identifies a unique record for the associated attribute combination. The attribute combination producing the unique record is a QID.
    Type: Application
    Filed: June 20, 2019
    Publication date: October 10, 2019
    Inventors: Stefano Braghin, Aris Gkoulalas-Divanis, Michael Wurst
  • Patent number: 10380088
    Abstract: Quasi-identifiers (QIDs) are detected in a dataset using a set of computing tasks. The dataset has a plurality of records and a set of attributes. An index is generated for the dataset. The index has an indicator for each attribute value of each record in the dataset. Each indicator specifies all the records in the dataset having the same value for the attribute. Each task is assigned an attribute combination and a subset of the plurality of records in the dataset and is passed to a thread for execution on computing resources. The executing task inspects the set of records specified by the index indicator for each attribute value in the attribute combination to produce a result. The result of at least one task identifies a unique record for the associated attribute combination. The attribute combination producing the unique record is a QID.
    Type: Grant
    Filed: June 27, 2016
    Date of Patent: August 13, 2019
    Assignee: International Business Machines Corporation
    Inventors: Stefano Braghin, Aris Gkoulalas-Divanis, Michael Wurst
  • Publication number: 20190236305
    Abstract: Techniques facilitating automatically detecting unauthorized use of sensitive information in content communicated over a network are provided. A computer-implemented method can comprise receiving, by a system operatively coupled to a processor, from a first entity, data associated with the first entity and one or more rules defining use of the data by a second entity. The data and the one or more rules can be defined by the first entity. The computer-implemented method can also comprise analyzing, by the system, content communicated over a network by the second entity to determine whether the content violates the one or more rules. The computer-implemented method can further comprise generating, by the system, information indicative of one or more violations of the one or more rules based on a determination that the content violates the one or more rules.
    Type: Application
    Filed: January 29, 2018
    Publication date: August 1, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Naoise Holohan, Pol Mac Aonghusa
  • Patent number: 10356164
    Abstract: A method of point of interest (POI) load balancing includes storing load profile data of a plurality of POIs, monitoring a position of a mobile device, determining an arrival of the mobile device at a first POI of the plurality of POIs, measuring a duration of stay of the mobile device at the first POI, determining whether the duration of stay of the mobile device at the first POI exceeds a preset time threshold for the first POI, and sending an incentive for a second POI of the plurality of POIs to the mobile device upon the mobile device exceeding the preset time threshold for the first POI.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: July 16, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Adi Ionel Botea, Stefano Braghin, Akihiro Kishimoto
  • Publication number: 20190205507
    Abstract: Embodiments for watermarking anonymized datasets using decoys in a computing environment are provided. One or more decoy records may be embedded in an anonymized dataset such that a re-identification attack on the anonymized dataset targets the one or more decoy records.
    Type: Application
    Filed: January 2, 2018
    Publication date: July 4, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Stefano BRAGHIN, Naoise HOLOHAN, Pol MAC AONGHUSA
  • Patent number: 10242000
    Abstract: Distributed, consistent utility-preserving data masking is provided by retrieving an original value from a data table; initiating a communication with a mapping service to ascertain whether or not a masking table of the mapping service includes a fictionalized value associated with the original value; when the masking table does not include a fictionalized value associated with the original value, producing a fictionalized value for the original value wherein the fictionalized value preserves at least one utility function of the original value, updating the mapping service to include the fictionalized value in the masking table, and applying a first masking operation by replacing the retrieved original value with the fictionalized value.
    Type: Grant
    Filed: May 27, 2016
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Spyridon Antonatos, Stefano Braghin, Aris Gkoulalas-Divanis, Olivier Verscheure
  • Publication number: 20190087604
    Abstract: Embodiments for data anonymity by a processor. A dataset may be transformed into an anonymous dataset by applying a differential privacy operation and a clustering operation to the dataset.
    Type: Application
    Filed: September 21, 2017
    Publication date: March 21, 2019
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Spyridon ANTONATOS, Stefano BRAGHIN, Naoise HOLOHAN, Pol MAC AONGHUSA
  • Patent number: 10229223
    Abstract: A mechanism is provided in a data processing system for extracting subgraphs from a multigraph with approximation. The mechanism receives a multigraph and a relevance function and a pattern generation component executing within the data processing system searches the multigraph for occurrences of at least one pattern based on an approximation function. A relevance computation component executing within the data processing system determines a relevance measure for the multigraph based on the relevance function and the occurrences of the at least one pattern. The mechanism provides output of relevant patterns based on the occurrences of the at least one pattern.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: March 12, 2019
    Assignee: International Business Machines Corporation
    Inventors: Pranay Anchuri, Michele Berlingerio, Stefano Braghin
  • Publication number: 20190020477
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: December 14, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20190020475
    Abstract: Techniques facilitating autonomously rendering an encrypted data anonymous in a non-trusted environment are provided. In one example, a computer-implemented method can comprise generating, by a system operatively coupled to a processor, a plurality of clusters of encrypted data from an encrypted dataset using a machine learning algorithm. The computer-implemented method can also comprise modifying, by the system, the plurality of clusters based on a defined criterion that can facilitate anonymity of the encrypted data.
    Type: Application
    Filed: July 12, 2017
    Publication date: January 17, 2019
    Inventors: Spyridon Antonatos, Stefano Braghin, Akshar Kaul, Manish Kesarwani, Sameep Mehta
  • Publication number: 20180365354
    Abstract: Techniques for employing natural language processing (NLP) to facilitate geospatial analysis are provided. In one example, a computer-implemented method comprises receiving, by a device operatively coupled to a processor, input information in a natural language format indicating a change to a state of a system comprising different nodes through which physical elements flow, wherein the system is associated with a state model that characterizes movement of the physical elements through the different nodes based on one or more flow parameters. The computer-implemented method further comprises, determining, by the device based on the input information, a subset of the one or more flow parameters associated with the change, determining, by the device based on the input information, one or more constraints to the subset that account for the change, and modifying, by the device, the state model based on the one or more constraints, resulting in a modified state model.
    Type: Application
    Filed: December 14, 2017
    Publication date: December 20, 2018
    Inventors: Stefano Braghin, Vincent Petrus Anthonius Lonij, Rahul Nair, Rana E. Novack, Paulito Pedregosa Palmes
  • Publication number: 20180365351
    Abstract: Techniques for employing natural language processing (NLP) to facilitate geospatial analysis are provided. In one example, a computer-implemented method comprises receiving, by a device operatively coupled to a processor, input information in a natural language format indicating a change to a state of a system comprising different nodes through which physical elements flow, wherein the system is associated with a state model that characterizes movement of the physical elements through the different nodes based on one or more flow parameters. The computer-implemented method further comprises, determining, by the device based on the input information, a subset of the one or more flow parameters associated with the change, determining, by the device based on the input information, one or more constraints to the subset that account for the change, and modifying, by the device, the state model based on the one or more constraints, resulting in a modified state model.
    Type: Application
    Filed: June 14, 2017
    Publication date: December 20, 2018
    Inventors: Stefano Braghin, Vincent Petrus Anthonius Lonij, Rahul Nair, Rana E. Novack, Paulito Pedregosa Palmes
  • Publication number: 20180357564
    Abstract: Embodiments for intelligent flow prediction by a processor. One or more flows of a domain of interest between target entities may be forecasted according to one or more forecast models learned via machine learning using extracted features of one or more target variables from one or more data sources. The one or more flows may include a quantitative value, an intensity score, an intensity category, or a combination thereof between the target entities.
    Type: Application
    Filed: June 13, 2017
    Publication date: December 13, 2018
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefano BRAGHIN, Vincent LONIJ, Rahul NAIR, Rana E. NOVACK, Paulito PALMES