Patents by Inventor Udo Klein

Udo Klein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10499195
    Abstract: Location information for a plurality of target subjects can be depicted as a plurality of routes with indications of respective contemporaneous locations of the target subjects at a point in time. A graphical slider can be used to update the visualization to depict contemporaneous locations of the target subjects at a different point in time. A point on one of the routes can be activated to update the visualization to depict contemporaneous locations of the target subjects at a different point in time. Metrics for characteristics of the location data can be displayed proximate the slider. Other features provide a user interface that allows for a rich set of visualization functionality.
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: December 3, 2019
    Assignee: SAP SE
    Inventors: Holger Knospe, Udo Klein, Lukas Melzer
  • Patent number: 10440033
    Abstract: An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine that the first key is not equivalent to the hashed first file. A second key is then obtained that corresponds to the hashed first file. A second file is then obtained using the second key. This second file is hashed to determine whether the second key is equivalent to the hashed second file. Integrity of the first file is confirmed if the second key is equivalent to the hashed second file or integrity of the first file is rejected if the second key is not equivalent to the hashed second file. Related apparatus, systems, techniques and articles are also described.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: October 8, 2019
    Assignee: SAP SE
    Inventor: Udo Klein
  • Patent number: 10417265
    Abstract: A system, a method and a computer program product for indexing data samples are disclosed. A locality-sensitive string hash index is determined for each data sample in a plurality of data samples. The determined locality-sensitive string hash indexes for at least two data samples in the plurality of data samples are compared. The comparison includes estimating, based on the determined locality-sensitive string hash indexes, a distance between the two data samples. Based on the comparison, at least one data sample in the plurality of data samples being similar to at least another data sample in the plurality of data samples is identified.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: September 17, 2019
    Assignee: SAP SE
    Inventors: Udo Klein, Philipp Scholl
  • Patent number: 10360234
    Abstract: A method, a system, and a computer program product for data extraction are disclosed. At least one container of data is analyzed to determine format of at least a portion of data contained in the container. Based on the determined format of the portion of data, at least one extractor in a plurality of extractors is selected to extract the portion of data from the container. The portion of data is extracted from the container and a structure of the extracted portion of data is generated for performing analysis of a content of the extracted portion of data.
    Type: Grant
    Filed: October 26, 2016
    Date of Patent: July 23, 2019
    Assignee: SAP SE
    Inventor: Udo Klein
  • Publication number: 20190213350
    Abstract: An alias key is generated for each person identification (ID) in a database table. The alias key us used to lookup the corresponding person ID in the database table. In addition, for each alias key, a temporary alias key is generated that is used to lookup the corresponding alias key in the database table. A plurality of queries are received from at least one remote client that each specify at least one of the temporary alias keys. Data is later transmitted to the at least one remote client that is responsive to the queries. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: January 5, 2018
    Publication date: July 11, 2019
    Inventors: Udo Klein, Michael Kusber
  • Publication number: 20180300290
    Abstract: Virtualized infrastructure instances are provided for running applications where electronic documents are rendered. The documents may comprise active content associated with risk of security issues. The documents are pre-processed to determine required software functionality for rendering. An index table including documents' characteristics relevant for displaying is generated. The characteristics include a correspondingly defined application for rendering a document, an OS for running the application, other. An identification of a document is received for displaying in a UI application separate from the virtualized instances. The first document is rendered on a virtualized instance from the infrastructure instances. The virtual instance is selected based on requirements for rendering the requested document, such as compatible application and OS. The rendered first document at the virtualized instance is displayed at the UI application on a virtual screen.
    Type: Application
    Filed: April 13, 2017
    Publication date: October 18, 2018
    Inventor: Udo Klein
  • Publication number: 20180268422
    Abstract: Integrity of a physical object is verified by receiving, data encapsulating a request to verify the integrity of the physical object. Subsequently, a data structure is accessed that includes a plurality of linked segments each characterizing an entity within a supply chain for the physical object. Each segment includes a respective predecessor field and a respective hash value. All of the segments can be iterated through in reverse chronological order to confirm, for each segment, whether a value for the predecessor field is equal to a hash value in a hash field in an immediately previously segment, the hash value being a hash of all values of the particular segment. Data characterizing the iteration can then be provided. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: March 16, 2017
    Publication date: September 20, 2018
    Inventors: Udo Klein, Oliver Klemenz
  • Publication number: 20180270252
    Abstract: An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine that the first key is not equivalent to the hashed first file. A second key is then obtained that corresponds to the hashed first file. A second file is then obtained using the second key. This second file is hashed to determine whether the second key is equivalent to the hashed second file. Integrity of the first file is confirmed if the second key is equivalent to the hashed second file or integrity of the first file is rejected if the second key is not equivalent to the hashed second file. Related apparatus, systems, techniques and articles are also described.
    Type: Application
    Filed: March 16, 2017
    Publication date: September 20, 2018
    Inventor: Udo Klein
  • Publication number: 20180144032
    Abstract: Disclosed herein are system, method, and computer program product embodiments for providing enterprise resource textual analysis. An embodiment operates by receiving a request to search a document management system for a keyword. One or more relevant documents of the document management system associated with the keyword are identified. The keyword is compared to a data dictionary corresponding to an enterprise system associated with the document management system. Contextual search results including the one or more relevant documents and a relationship between the keyword and data of the enterprise system are provided.
    Type: Application
    Filed: November 21, 2016
    Publication date: May 24, 2018
    Inventors: Udo Klein, Susan Marie Thomas
  • Publication number: 20180137238
    Abstract: A plurality of deoxyribonucleic acid (DNA) reads is received, where each DNA read represents a portion of a DNA sequence of a patient's DNA sample. The plurality of DNA reads is assembled into an aligned DNA sequence based on a human reference DNA sequence. At least one variant is identified by comparing the aligned DNA sequence to the human reference sequence, where each variant represents a difference between the aligned DNA sequence and the human reference sequence. A plurality of virus reference DNA sequences is received, where each virus reference sequence represents a DNA sequence of a virus. For each identified variant and each of the plurality of virus reference sequences, a correlation is computed between the variant and the virus reference sequence.
    Type: Application
    Filed: November 15, 2016
    Publication date: May 17, 2018
    Inventors: Jens Odenheimer, Udo Klein
  • Publication number: 20180137115
    Abstract: A system, a method and a computer program product for indexing data samples are disclosed. A locality-sensitive string hash index is determined for each data sample in a plurality of data samples. The determined locality-sensitive string hash indexes for at least two data samples in the plurality of data samples are compared. The comparison includes estimating, based on the determined locality-sensitive string hash indexes, a distance between the two data samples. Based on the comparison, at least one data sample in the plurality of data samples being similar to at least another data sample in the plurality of data samples is identified.
    Type: Application
    Filed: November 15, 2016
    Publication date: May 17, 2018
    Inventors: Udo Klein, Philipp Scholl
  • Publication number: 20180113920
    Abstract: A method, a system, and a computer program product for data extraction are disclosed. At least one container of data is analyzed to determine format of at least a portion of data contained in the container. Based on the determined format of the portion of data, at least one extractor in a plurality of extractors is selected to extract the portion of data from the container. The portion of data is extracted from the container and a structure of the extracted portion of data is generated for performing analysis of a content of the extracted portion of data.
    Type: Application
    Filed: October 26, 2016
    Publication date: April 26, 2018
    Inventor: Udo Klein
  • Patent number: 9916154
    Abstract: A system includes reception of a configuration set definition file defining the structure of one or more customizing tables of a software application, reception of a configuration data file including data for the one or more customizing tables, and, during activation of the software application in a run-time system, generation of the one or more customizing tables based on the configuration set definition file, generation of a service to access the configuration data file, and population of the one or more customizing tables with data of the configuration data file.
    Type: Grant
    Filed: March 12, 2015
    Date of Patent: March 13, 2018
    Assignee: SAP SE
    Inventors: Meinolf Block, Urlich Bestfleisch, Daniel Hutzel, Udo Klein
  • Publication number: 20180068059
    Abstract: In a process of malicious sequence detection for gene synthesizer, a sequence is received as input in the gene synthesizer. A sequence of interest is isolated from the received sequence. The sequence of interest is encoded using an encoding mechanism. The encoded sequence of interest is received as input in a locality sensitive hasher. A hash is generated corresponding to the sequence of interest. The hash is matched with malicious hashes stored in a database. Upon determining a match between the hash and a malicious hash, a similarity score is computed between the hash and the malicious hash. It is determined whether the similarity score is above a threshold score. Upon determining that the similarity score is above the threshold score, the sequence of interest is identified as malicious sequence and is prevented from synthesis.
    Type: Application
    Filed: September 8, 2016
    Publication date: March 8, 2018
    Inventors: Jens Odenheimer, Udo Klein
  • Patent number: 9886270
    Abstract: A system, a method, and a computer program product for providing a layered business configuration are disclosed. A configuration information for configuring an application object of a software application is obtained. The configuration information is arranged in at least one configuration staging table. The configuration staging table contains at least one configuration object. The configuration object contained in the configuration staging table is activated. Based on the activated configuration object, at least one configuration runtime table for configuring the application object is generated.
    Type: Grant
    Filed: April 17, 2015
    Date of Patent: February 6, 2018
    Assignee: SAP SE
    Inventors: Ulrich Bestfleisch, Gregor Karl Frey, Oliver Klemenz, Udo Klein
  • Patent number: 9632910
    Abstract: This disclosure provides software that identifies a variable in a computer program as a target variable. The software automatically processes a first source code statement in the computer program for the target variable. The software determines if the target variable is not found in the particular processed statement and progresses through preceding statements until the target variable is found. The software determines if the particular statement involves an indirect assignment to the target variable and can return that particular statement as the origination statement. Additionally, the software determines if the particular statement involves a direct assignment to the target variable from a second variable. If the particular statement involves a direct assignment to the target variable from a second variable, the software can change the target variable to the second variable and can progress through preceding statements until the new target variable is found in a particular of the statements.
    Type: Grant
    Filed: December 16, 2008
    Date of Patent: April 25, 2017
    Assignee: SAP SE
    Inventor: Udo Klein
  • Publication number: 20160364426
    Abstract: An artifact in an application is assigned with a tag. The tag is a string that characterizes the artifact. A list of suggested tags is provided, which includes tags assigned to similar artifacts maintained by the application. The list of suggested tags also includes newly suggested tags based on analysis of the artifact. The tags within the application are maintained and operations such as deletion, renaming, or unification of tags are performed. Unification of tags is performed through determining similarities between at least two tags. The similarity is determined based on existence of a trigram in the at least two tags after normalization of tags and based on edit distance between each two tags from the at least two tags. A tag cloud is provided for navigation between artifacts in the application. Tag cloud is defined based on frequency of use and selectiveness of tags.
    Type: Application
    Filed: June 11, 2015
    Publication date: December 15, 2016
    Inventors: Sebastian Schroetel, Uwe Schulz, Udo Klein
  • Publication number: 20160306628
    Abstract: A system, a method, and a computer program product for providing a layered business configuration are disclosed. A configuration information for configuring an application object of a software application is obtained. The configuration information is arranged in at least one configuration staging table. The configuration staging table contains at least one configuration object. The configuration object contained in the configuration staging table is activated. Based on the activated configuration object, at least one configuration runtime table for configuring the application object is generated.
    Type: Application
    Filed: April 17, 2015
    Publication date: October 20, 2016
    Inventors: Ulrich Bestfleisch, Gregor Karl Frey, Oliver Klemenz, Udo Klein
  • Patent number: 9449343
    Abstract: A consumer user can perform a number of augmented reality shopping operations using a local client shopping application executable on a mobile device. Features related to implementations of the current subject matter can include, but are not limited to, the ability to view an augmented reality depiction of a shopping display using the mobile device and to execute various “e-commerce” functions accessible via the augmented reality depiction. Related methods, systems, articles of manufacture, and the like are described.
    Type: Grant
    Filed: October 5, 2012
    Date of Patent: September 20, 2016
    Assignee: SAP SE
    Inventors: Jochen Mayerle, Udo Klein, Clemens Jacob, Sanu Koshy, Timo Hoyer, Steffen Tatzel
  • Publication number: 20160266895
    Abstract: A system includes reception of a configuration set definition file defining the structure of one or more customizing tables of a software application, reception of a configuration data file including data for the one or more customizing tables, and, during activation of the software application in a run-time system, generation of the one or more customizing tables based on the configuration set definition file, generation of a service to access the configuration data file, and population of the one or more customizing tables with data of the configuration data file.
    Type: Application
    Filed: March 12, 2015
    Publication date: September 15, 2016
    Inventors: Meinolf Block, Urlich Bestfleisch, Daniel Hutzel, Udo Klein