Patents by Inventor Valerio Graziani

Valerio Graziani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8572050
    Abstract: A method and system for managing integrity of system log file data. The system comprises a first component which, using a hook in a kernel of an operating system, allows interception of a write operation by a file system on at least one log file; then the first component detects a change in the security context in which the record is written in the log file. At each change detected, the first component adds information in the log file including the context information. The system further comprises a second component which reads the log file and, using the information added by the first component, detects if the change of context is due to a malicious writing operation in the log file for instance done by an unauthorized user or process.
    Type: Grant
    Filed: November 18, 2010
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: Valerio Graziani, Attilio Mattiocco, Gaetano Ruggiero
  • Patent number: 8316240
    Abstract: A log file is secured. One implementation involves maintaining a log file including one or more log entries in a storage device connected to a computer, and entering a new log entry by generating a new message authentication code based on a preceding log entry including a preceding message authentication code, and applying the message authentication code to the new log entry.
    Type: Grant
    Filed: February 20, 2009
    Date of Patent: November 20, 2012
    Assignee: International Business Machines Corporation
    Inventor: Valerio Graziani
  • Publication number: 20110131188
    Abstract: A method and system for managing integrity of system log file data. The system comprises a first component which, using a hook in a kernel of an operating system, allows interception of a write operation by a file system on at least one log file; then the first component detects a change in the security context in which the record is written in the log file. At each change detected, the first component adds information in the log file including the context information. The system further comprises a second component which reads the log file and, using the information added by the first component, detects if the change of context is due to a malicious writing operation in the log file for instance done by an unauthorized user or process.
    Type: Application
    Filed: November 18, 2010
    Publication date: June 2, 2011
    Applicant: International Business Machines Corporation
    Inventors: Valerio Graziani, Attilio Mattiocco, Gaetano Ruggiero
  • Publication number: 20100218002
    Abstract: A log file is secured. One implementation involves maintaining a log file including one or more log entries in a storage device connected to a computer, and entering a new log entry by generating a new message authentication code based on a preceding log entry including a preceding message authentication code, and applying the message authentication code to the new log entry.
    Type: Application
    Filed: February 20, 2009
    Publication date: August 26, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Valerio Graziani