Patents by Inventor Roger Kilian-Kehr
Roger Kilian-Kehr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8862493Abstract: In a computer-implemented process modeling and simulating environment, an analyzer receives a process model with parameters in combination with data from previous or planned process performances. An analyzer receives a simulation target from a user, calculates evaluation results that represent the influence of the parameters in view of the simulation target, and presents the evaluation results as indicators to the user. Upon receiving modifications to the performance data, the process is simulated with modified performance data. Alternatively, the evaluation results are converted to computer instructions to automatically modify the process parameters.Type: GrantFiled: August 31, 2009Date of Patent: October 14, 2014Assignee: SAP AGInventors: Mathias Fritzsche, Roger Kilian-Kehr, Wasif Gilani, Ralph Gerbig
-
Patent number: 8146100Abstract: A method including receiving a plurality of event descriptors, each event descriptor of the plurality of event descriptors corresponding to a respective event relevant to a software development process, transmitting the plurality of event descriptors to a subscriber; and receiving a subscription message from a subscriber, the subscription message including an indication of an event descriptor selected from the plurality of event descriptors.Type: GrantFiled: March 21, 2006Date of Patent: March 27, 2012Assignee: SAP AGInventor: Roger Kilian-Kehr
-
Patent number: 7904111Abstract: A mobile exchange infrastructure, in which a request to invoke functionality provided by a first of two services is accessed. If the request is incompatible with the first service, the accessed request is affected. The functionality is invoked using the affected request.Type: GrantFiled: March 17, 2008Date of Patent: March 8, 2011Assignee: SAP AktiengesellschaftInventors: Roger Kilian-Kehr, Jochen Haller
-
Publication number: 20110054865Abstract: In a computer-implemented process modeling and simulating environment, an analyzer receives a process model with parameters in combination with data from previous or planned process performances. An analyzer receives a simulation target from a user, calculates evaluation results that represent the influence of the parameters in view of the simulation target, and presents the evaluation results as indicators to the user. Upon receiving modifications to the performance data, the process is simulated with modified performance data. Alternatively, the evaluation results are converted to computer instructions to automatically modify the process parameters.Type: ApplicationFiled: August 31, 2009Publication date: March 3, 2011Applicant: SAP AGInventors: Mathias Fritzsche, Roger Kilian-Kehr, Wasif Gilani, Ralph Gerbig
-
Patent number: 7865731Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.Type: GrantFiled: August 8, 2007Date of Patent: January 4, 2011Assignee: SAP AktiengesellschaftInventor: Roger Kilian-Kehr
-
Patent number: 7818585Abstract: Systems, methods, and computer program products for secure license management. A host computer runs in a trusted state. A license manager is installed on the host computer. The license manager is configured to provide access to one or more software programs. The one or more software programs are accessible only through the license manager. The license manager is bound to the trusted state of the host computer, such that if the trusted state ceases to exist, then the license manager is not executable and the one or more software programs are not accessible. The host computer can be a TCPA (Trusted Computing Platform Alliance) enabled computer.Type: GrantFiled: December 22, 2004Date of Patent: October 19, 2010Assignee: SAP AktiengesellschaftInventors: Roger Kilian-Kehr, Jan Kuemmerle
-
Patent number: 7761850Abstract: This document discusses, among other things, a system and a method for using a meta-model to manage relationships between software artifacts, the method comprising determining a meta-model; identifying one or more available artifacts in one or more software applications; using the meta-model to define one or more relationships between the one or more available artifacts, wherein each relationship is a specific instance of a possible association defined in the meta-model; and providing the one or more relationships as one or more configurations to the one or more software applications.Type: GrantFiled: December 22, 2005Date of Patent: July 20, 2010Assignee: SAP AGInventor: Roger Kilian-Kehr
-
Patent number: 7673141Abstract: A system for providing secured access to an application service includes a challenge provider that uses a first cryptographic technique to provide a challenge to a client seeking access to an application service. The client uses a second cryptographic technique to generate a response, and provides the response to an authentication service. The authentication service grants the client access to the application service only if the challenge and response are authenticated using a first authentication technique complementary to the first cryptographic technique and a second authentication technique complementary to the second cryptographic technique, respectively.Type: GrantFiled: October 7, 2004Date of Patent: March 2, 2010Assignee: SAP AktiengesellschaftInventors: Roger Kilian-Kehr, Jochen Haller, Laurent Gomez, Cedric Hebert
-
Patent number: 7603466Abstract: A mobile computer system hosts mobile application and a collaboration module. The collaboration module is adapted to enable the mobile application to communicate with a further mobile application, hosted on a further mobile computer system, and to access functionality of an enterprise application, hosted on an enterprise system.Type: GrantFiled: July 19, 2004Date of Patent: October 13, 2009Assignee: SAP (AG)Inventors: Roger Kilian-Kehr, Jochen Haller
-
Patent number: 7487177Abstract: Set identifiers for objects are determined based on individual identifiers of the objects. A first identifier is received from a first identification tag associated with a first object. A second identifier is received from a second identification tag associated with a second object. A set identifier corresponding to a set of objects that includes the first object and the second object is determined, based on the first identifier and the second identifier. The set identifier is associated with a virtual object that corresponds to the set.Type: GrantFiled: November 8, 2004Date of Patent: February 3, 2009Assignee: SAP AktiengesellschaftInventors: Roger Kilian-Kehr, Julien Vayssiere
-
Publication number: 20080215706Abstract: A mobile exchange infrastructure, in which a request to invoke functionality provided by a first of two services is accessed. If the request is incompatible with the first service, the accessed request is affected. The functionality is invoked using the affected request.Type: ApplicationFiled: March 17, 2008Publication date: September 4, 2008Inventors: Roger Kilian-Kehr, Jochen Haller
-
Patent number: 7392060Abstract: A mobile exchange infrastructure provides for dynamic mediation between services and applications, particularly in a mobile environment. Such services include Web services that are designed to provide functionality to an application that is not native to that application. The mobile exchange infrastructure ensures that the services and applications may interact with one another, even when they have been constructed in different development environments, have multiple associated messaging protocols, or are running in different application frameworks. As a result, mobile users may experience increased efficiency and use of available applications and services.Type: GrantFiled: July 28, 2004Date of Patent: June 24, 2008Assignee: SAP AktiengesellschaftInventors: Roger Kilian-Kehr, Jochen Haller
-
Publication number: 20080046734Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A. proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.Type: ApplicationFiled: August 8, 2007Publication date: February 21, 2008Applicant: SAP AKTIENGESELLSCHAFTInventor: Roger Kilian-Kehr
-
Publication number: 20070226755Abstract: A method including receiving a plurality of event descriptors, each event descriptor of the plurality of event descriptors corresponding to a respective event relevant to a software development process, transmitting the plurality of event descriptors to a subscriber; and receiving a subscription message from a subscriber, the subscription message including an indication of an event descriptor selected from the plurality of event descriptors.Type: ApplicationFiled: March 21, 2006Publication date: September 27, 2007Inventor: Roger Kilian-Kehr
-
Patent number: 7269732Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.Type: GrantFiled: June 5, 2003Date of Patent: September 11, 2007Assignee: SAP AktiengesellschaftInventor: Roger Kilian-Kehr
-
Publication number: 20070150490Abstract: This document discusses, among other things, a system and a method for using a meta-model to manage relationships between software artifacts, the method comprising determining a meta-model; identifying one or more available artifacts in one or more software applications; using the meta-model to define one or more relationships between the one or more available artifacts, wherein each relationship is a specific instance of a possible association defined in the meta-model; and providing the one or more relationships as one or more configurations to the one or more software applications.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Inventor: Roger Kilian-Kehr
-
Publication number: 20060137022Abstract: Systems, methods, and computer program products for secure license management. A host computer runs in a trusted state. A license manager is installed on the host computer. The license manager is configured to provide access to one or more software programs. The one or more software programs are accessible only through the license manager. The license manager is bound to the trusted state of the host computer, such that if the trusted state ceases to exist, then the license manager is not executable and the one or more software programs are not accessible. The host computer can be a TCPA (Trusted Computing Platform Alliance) enabled computer.Type: ApplicationFiled: December 22, 2004Publication date: June 22, 2006Inventors: Roger Kilian-Kehr, Jan Kuemmerle
-
Publication number: 20060101067Abstract: Set identifiers for objects are determined based on individual identifiers of the objects. A first identifier is received from a first identification tag associated with a first object. A second identifier is received from a second identification tag associated with a second object. A set identifier corresponding to a set of objects that includes the first object and the second object is determined, based on the first identifier and the second identifier. The set identifier is associated with a virtual object that corresponds to the set.Type: ApplicationFiled: November 8, 2004Publication date: May 11, 2006Inventors: Roger Kilian-Kehr, Julien Vayssiere
-
Publication number: 20060047944Abstract: Systems, methods, and computer program products implementing techniques for secure booting of a computing device. In one aspect, the techniques include verifying the trustworthiness of the target computing system and only after the trustworthiness of the target computing system has been verified, loading user data onto the target computing system. Verifying the trustworthiness of the target computing system includes establishing communication between the target computing system and a third party system, proving the trustworthiness of the target computing system to the third party system, receiving a decryption key from the third party system once the trustworthiness of the target computing system has been verified by the third party system, and using the decryption key to decrypt user data, the user data being stored in the boot device or at another location accessible to the target computing system.Type: ApplicationFiled: September 1, 2004Publication date: March 2, 2006Inventor: Roger Kilian-Kehr
-
Publication number: 20060023688Abstract: A mobile exchange infrastructure provides for dynamic mediation between services and applications, particularly in a mobile environment. Such services include Web services that are designed to provide functionality to an application that is not native to that application. The mobile exchange infrastructure ensures that the services and applications may interact with one another, even when they have been constructed in different development environments, have multiple associated messaging protocols, or are running in different application frameworks. As a result, mobile users may experience increased efficiency and use of available applications and services.Type: ApplicationFiled: July 28, 2004Publication date: February 2, 2006Inventors: Roger Kilian-Kehr, Jochen Haller