Patents by Inventor Michael Waidner
Michael Waidner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20080294480Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.Type: ApplicationFiled: August 5, 2008Publication date: November 27, 2008Inventors: Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20080256595Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.Type: ApplicationFiled: May 21, 2008Publication date: October 16, 2008Applicant: International Business Machines CorporationInventors: Matthias Schunter, Jonathan A. Poritz, Michael Waidner, Elsie A. Van Herreweghen
-
Publication number: 20080229097Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).Type: ApplicationFiled: May 26, 2008Publication date: September 18, 2008Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
-
Patent number: 7412724Abstract: The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.Type: GrantFiled: July 27, 2004Date of Patent: August 12, 2008Assignee: International Business Machines CorporationInventors: Birgit Baum-Waidner, Michael Waidner, Christopher Kenyon
-
Publication number: 20070250913Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.Type: ApplicationFiled: June 18, 2007Publication date: October 25, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20070169172Abstract: A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.Type: ApplicationFiled: January 17, 2006Publication date: July 19, 2007Applicant: International Business Machines CorporationInventors: Michael Backes, Shmuel Ben-Yehuda, Jan Camenisch, Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Smith, Michael Waidner
-
Patent number: 7240362Abstract: This invention provides identity-related information about a client application to an honest requesting entity, ensuring identity of client applications and preventing man-in-the-middle attacks.Type: GrantFiled: August 8, 2003Date of Patent: July 3, 2007Assignee: International Business Machines CorporationInventors: Birgit M. Pfitzmann, Michael Waidner
-
Publication number: 20070130460Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.Type: ApplicationFiled: March 26, 2003Publication date: June 7, 2007Inventors: Birgit Pfitzmann, Michael Waidner
-
Patent number: 7149895Abstract: The invention is related to a system which allows a user to authenticate unknown terminals. The invention uses a first authentication step wherein the terminal authenticates itself to a server. Depending on whether the personal device has its own output means, such as a loudspeaker or a screen, the final message, whether the terminal can be trusted or not, can be output on the personal device or on the terminal itself. In the case where the device has no output means of its own, this message can originate in the device and be transmitted from there to the terminal. The user can input authentication information into his personal device, which can then be fully or partially transmitted to the terminal. In the end, the terminal may use the transmitted information to give out the authenticity output message. After the first authentication step follows a second authentication step, wherein the server authenticates itself to the personal device, if there is one.Type: GrantFiled: February 1, 2000Date of Patent: December 12, 2006Assignee: International Business Machines CorporationInventors: Nadarajah Asokan, Herve C. Debar, Michael Steiner, Michael Waidner
-
Publication number: 20060184995Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.Type: ApplicationFiled: December 22, 2005Publication date: August 17, 2006Applicant: International Business Machines CorporationInventors: Michael Backes, Guenter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Patent number: 7069427Abstract: The present invention is a system and method for handling personally identifiable information, using a rules model. The invention involves defining a limited number of privacy-related actions regarding personally identifiable information; constructing a rule for each circumstance in which one of said privacy-related actions may be taken or must be taken; allowing for the input of dynamic contextual information to precisely specify the condition for evaluation of a rule; creating a programming object containing at least one of said rules; associating the programming object with personally identifiable information; processing a request; and providing an output. The invention does not merely give a “yes-or-no answer. The invention has the advantage of being able to specify additional actions that must be taken. The invention may use a computer system and network. One aspect of the present invention is a method for handling personally identifiable information.Type: GrantFiled: June 19, 2001Date of Patent: June 27, 2006Assignee: International Business Machines CorporationInventors: Steven B. Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Guenter Karjoth, Dogan Kesdogan, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Martin Joseph Clayton Presler-Marshall, Michael Schnyder, Elsie Van Herreweghen, Michael Waidner
-
Publication number: 20060026423Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).Type: ApplicationFiled: July 11, 2005Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
-
Publication number: 20050289340Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.Type: ApplicationFiled: June 23, 2004Publication date: December 29, 2005Applicant: International Business Machines CorporationInventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20050251857Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.Type: ApplicationFiled: May 2, 2005Publication date: November 10, 2005Applicant: International Business Machines CorporationInventors: Matthias Schunter, Jonathan Poritz, Michael Waidner, Elsie Van Herreweghen
-
Publication number: 20050102235Abstract: The present invention relates to a method and corresponding system for the computerized processing of documents with electronic signatures. For providing an electronically signed document to an exploiter the current invention suggests a first step of transforming a signer machine-readable source format of the document into a universal format representing said document identically and independently from a computer system used for its representation. In a second step the electronic signature is created based on the universal format of the document. Finally in a third step the electronic signature and a single representation of the document in an exchange format is provided to an exploiter. For further processing of the electronically signed document by an exploiter it is suggested to validate the electronic signature by transforming the exchange format of the document into the universal format of the document and validating said signature with respect to said universal format of the document.Type: ApplicationFiled: December 20, 2001Publication date: May 12, 2005Inventor: Michael Waidner
-
Publication number: 20050044409Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.Type: ApplicationFiled: August 19, 2003Publication date: February 24, 2005Applicant: International Business Machines CorporationInventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20050027981Abstract: The invention provides a data network, systems and methods for checking nodes of a data network that are used for detecting whether a privacy policy concerning an information is maintained. The information comprises a mark corresponding to the privacy policy. The mark defines the storage place or the accessing paths or the transferring paths of the information. The mark is automatically searchable. The mark is searched, analyzed and checked as to whether the privacy policy is maintained. The advantage of the system is that vulnerabilities of systems for protecting confidential information may be detected a long time before an attack on the confidential information occurs.Type: ApplicationFiled: July 27, 2004Publication date: February 3, 2005Applicant: International Business Machines CorporationInventors: Birgit Baum-Waidner, Michael Waidner, Christopher Kenyon
-
Publication number: 20050005170Abstract: Provides efficient schemes that allow a user to decide what information an access granting party gets to know. This enables the user to control and minimize information conveyed. It provides methods, apparatus and systems for verifying and enabling access to a service. An example of a method comprises the steps of: receiving a request from a remote computer requesting access to the service computer providing the service desired by a user; sending to the remote computer a response comprising an access policy, the access policy describing at least one possibility to obtain access to the service computer; receiving from the remote computer a reply comprising a description of evidence information to be gathered to fulfill the access policy; receiving evidence information specified by the description; and in the event that the received evidence information is sufficient to fulfill the access policy enabling the access, otherwise denying the access.Type: ApplicationFiled: June 23, 2004Publication date: January 6, 2005Applicant: International Business Machines CorporationInventors: Jan Camenisch, Michael Waidner
-
Publication number: 20040236747Abstract: Methods, apparatus and systems for controlling access to an object in a data processing system comprises: receiving a request to access the object from a task; classifying the access request into one of critical and non-critical classes in dependence on stored access control data associated with the object and the task; granting the task access to the object and storing data indicative of the access in an access log if the access is classified into the non-critical class; and in the event that the access is classified into the critical class, granting or denying the task access to the object in dependence on the contents of the access log and the stored access control data.Type: ApplicationFiled: March 3, 2004Publication date: November 25, 2004Inventors: Morton G. Swimmer, Michael Waidner, Andreas Wespi
-
Publication number: 20040078475Abstract: A method and a system for providing an anonymous access to a service within a network is disclosed. Thereby a user entity sends a user request comprising access-service information and requested service information to an anonymous-access service. The anonymous-access service verifies whether the access-service information are valid. In the event that the access-service information are valid, the anonymous-access service assigns the access-service information to subscription information and connects to the service by sending a verified request comprising the subscription information and the requested service information. The anonymous-access service receives response-service information from the service and forwards it to the user entity. By doing so, the user's instances of access to the services are not linkable to each other nor are they linkable to the user's real identity.Type: ApplicationFiled: November 17, 2003Publication date: April 22, 2004Inventors: Jan Camenisch, Michael Waidner, Elsie A. Van Herreweghen