Patents by Inventor Michael Waidner

Michael Waidner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080294480
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: August 5, 2008
    Publication date: November 27, 2008
    Inventors: Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20080256595
    Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.
    Type: Application
    Filed: May 21, 2008
    Publication date: October 16, 2008
    Applicant: International Business Machines Corporation
    Inventors: Matthias Schunter, Jonathan A. Poritz, Michael Waidner, Elsie A. Van Herreweghen
  • Publication number: 20080229097
    Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).
    Type: Application
    Filed: May 26, 2008
    Publication date: September 18, 2008
    Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
  • Patent number: 7412724
    Abstract: The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.
    Type: Grant
    Filed: July 27, 2004
    Date of Patent: August 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: Birgit Baum-Waidner, Michael Waidner, Christopher Kenyon
  • Publication number: 20070250913
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: June 18, 2007
    Publication date: October 25, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20070169172
    Abstract: A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.
    Type: Application
    Filed: January 17, 2006
    Publication date: July 19, 2007
    Applicant: International Business Machines Corporation
    Inventors: Michael Backes, Shmuel Ben-Yehuda, Jan Camenisch, Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Smith, Michael Waidner
  • Patent number: 7240362
    Abstract: This invention provides identity-related information about a client application to an honest requesting entity, ensuring identity of client applications and preventing man-in-the-middle attacks.
    Type: Grant
    Filed: August 8, 2003
    Date of Patent: July 3, 2007
    Assignee: International Business Machines Corporation
    Inventors: Birgit M. Pfitzmann, Michael Waidner
  • Publication number: 20070130460
    Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.
    Type: Application
    Filed: March 26, 2003
    Publication date: June 7, 2007
    Inventors: Birgit Pfitzmann, Michael Waidner
  • Patent number: 7149895
    Abstract: The invention is related to a system which allows a user to authenticate unknown terminals. The invention uses a first authentication step wherein the terminal authenticates itself to a server. Depending on whether the personal device has its own output means, such as a loudspeaker or a screen, the final message, whether the terminal can be trusted or not, can be output on the personal device or on the terminal itself. In the case where the device has no output means of its own, this message can originate in the device and be transmitted from there to the terminal. The user can input authentication information into his personal device, which can then be fully or partially transmitted to the terminal. In the end, the terminal may use the transmitted information to give out the authenticity output message. After the first authentication step follows a second authentication step, wherein the server authenticates itself to the personal device, if there is one.
    Type: Grant
    Filed: February 1, 2000
    Date of Patent: December 12, 2006
    Assignee: International Business Machines Corporation
    Inventors: Nadarajah Asokan, Herve C. Debar, Michael Steiner, Michael Waidner
  • Publication number: 20060184995
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: December 22, 2005
    Publication date: August 17, 2006
    Applicant: International Business Machines Corporation
    Inventors: Michael Backes, Guenter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Patent number: 7069427
    Abstract: The present invention is a system and method for handling personally identifiable information, using a rules model. The invention involves defining a limited number of privacy-related actions regarding personally identifiable information; constructing a rule for each circumstance in which one of said privacy-related actions may be taken or must be taken; allowing for the input of dynamic contextual information to precisely specify the condition for evaluation of a rule; creating a programming object containing at least one of said rules; associating the programming object with personally identifiable information; processing a request; and providing an output. The invention does not merely give a “yes-or-no answer. The invention has the advantage of being able to specify additional actions that must be taken. The invention may use a computer system and network. One aspect of the present invention is a method for handling personally identifiable information.
    Type: Grant
    Filed: June 19, 2001
    Date of Patent: June 27, 2006
    Assignee: International Business Machines Corporation
    Inventors: Steven B. Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Guenter Karjoth, Dogan Kesdogan, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Martin Joseph Clayton Presler-Marshall, Michael Schnyder, Elsie Van Herreweghen, Michael Waidner
  • Publication number: 20060026423
    Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).
    Type: Application
    Filed: July 11, 2005
    Publication date: February 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
  • Publication number: 20050289340
    Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050251857
    Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.
    Type: Application
    Filed: May 2, 2005
    Publication date: November 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Matthias Schunter, Jonathan Poritz, Michael Waidner, Elsie Van Herreweghen
  • Publication number: 20050102235
    Abstract: The present invention relates to a method and corresponding system for the computerized processing of documents with electronic signatures. For providing an electronically signed document to an exploiter the current invention suggests a first step of transforming a signer machine-readable source format of the document into a universal format representing said document identically and independently from a computer system used for its representation. In a second step the electronic signature is created based on the universal format of the document. Finally in a third step the electronic signature and a single representation of the document in an exchange format is provided to an exploiter. For further processing of the electronically signed document by an exploiter it is suggested to validate the electronic signature by transforming the exchange format of the document into the universal format of the document and validating said signature with respect to said universal format of the document.
    Type: Application
    Filed: December 20, 2001
    Publication date: May 12, 2005
    Inventor: Michael Waidner
  • Publication number: 20050044409
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: August 19, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050027981
    Abstract: The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.
    Type: Application
    Filed: July 27, 2004
    Publication date: February 3, 2005
    Applicant: International Business Machines Corporation
    Inventors: Birgit Baum-Waidner, Michael Waidner, Christopher Kenyon
  • Publication number: 20050005170
    Abstract: Provides efficient schemes that allow a user to decide what information an access granting party gets to know. This enables the user to control and minimize information conveyed. It provides methods, apparatus and systems for verifying and enabling access to a service. An example of a method comprises the steps of: receiving a request from a remote computer requesting access to the service computer providing the service desired by a user; sending to the remote computer a response comprising an access policy, the access policy describing at least one possibility to obtain access to the service computer; receiving from the remote computer a reply comprising a description of evidence information to be gathered to fulfill the access policy; receiving evidence information specified by the description; and in the event that the received evidence information is sufficient to fulfill the access policy enabling the access, otherwise denying the access.
    Type: Application
    Filed: June 23, 2004
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Michael Waidner
  • Publication number: 20040236747
    Abstract: Methods, apparatus and systems for controlling access to an object in a data processing system comprises: receiving a request to access the object from a task; classifying the access request into one of critical and non-critical classes in dependence on stored access control data associated with the object and the task; granting the task access to the object and storing data indicative of the access in an access log if the access is classified into the non-critical class; and in the event that the access is classified into the critical class, granting or denying the task access to the object in dependence on the contents of the access log and the stored access control data.
    Type: Application
    Filed: March 3, 2004
    Publication date: November 25, 2004
    Inventors: Morton G. Swimmer, Michael Waidner, Andreas Wespi
  • Publication number: 20040078475
    Abstract: A method and a system for providing an anonymous access to a service within a network is disclosed. Thereby a user entity sends a user request comprising access-service information and requested service information to an anonymous-access service. The anonymous-access service verifies whether the access-service information are valid. In the event that the access-service information are valid, the anonymous-access service assigns the access-service information to subscription information and connects to the service by sending a verified request comprising the subscription information and the requested service information. The anonymous-access service receives response-service information from the service and forwards it to the user entity. By doing so, the user's instances of access to the services are not linkable to each other nor are they linkable to the user's real identity.
    Type: Application
    Filed: November 17, 2003
    Publication date: April 22, 2004
    Inventors: Jan Camenisch, Michael Waidner, Elsie A. Van Herreweghen