Patents by Inventor Bernhard Drittler

Bernhard Drittler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7296052
    Abstract: A client computer and a server computer communicate via a network; the server computer receives user identification via the client computer that is selectively a first device or a second device. The server computer stores at least first and second application services for a single predetermined application class, wherein the first and second application services are adapted to client computer type. Upon receiving user identification, the server computer further receives a device attribute from the client computer, compares the device attribute with reference attributes, and selectively sends a representation of the first application service or of the second application service to the client computer according to the device attribute.
    Type: Grant
    Filed: November 1, 2002
    Date of Patent: November 13, 2007
    Assignee: SAP AG
    Inventors: Jürgen Heymann, Stefan Kusterer, Bernhard Drittler
  • Patent number: 7290147
    Abstract: The present invention discloses a method, computer program product and system for adjusting roles in a computer system (100) that launch application services (301-307) by a first user who is assigned to at least one role. A first role (110) calls a second role (150) by reference (111). Both roles comprise representations of applications services (101, 102, 103) and (104, 105). When representations in the second role are modified, for example, application services are added (106, 107), a delta list (112) for the first reference is automatically created to conditionally prevent the first role (110) from referencing to at least some of the modified representations of the second role (150). This is achieved by using a rule database (118) containing rules about application services that are mutually exclusive and checking for conflicts between the representations of the first role and modified, second role. A second user, e.g.
    Type: Grant
    Filed: March 15, 2002
    Date of Patent: October 30, 2007
    Assignee: SAP AG
    Inventors: Peter Bittner, Bernhard Drittler, Jürgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
  • Publication number: 20060080304
    Abstract: A graphical user interface (GUI) for presenting representations of selected objects in a computer system. The GUI presents an object selected from a collection of objects using a selected visual representation selected from at least first and second visual representations to be initiated using different initiation techniques. A first input control causes the selected object to be presented using another visual representation instead of the selected visual representation. A second input control causes another object to be presented instead of the selected object using any visual configuration that is currently used in presenting the selected object. The first and second input controls may be located in an object header area that remains essentially unchanged when changing between the at least first and second visual representations.
    Type: Application
    Filed: October 7, 2005
    Publication date: April 13, 2006
    Inventors: Sultan Ucar, Ingo Deck, Carmen Oestringer, Barbara Jochum, Volker Mueller, Bernhard Drittler, Roman Hayer, Markus Fritz, Martin Dauer
  • Publication number: 20060015867
    Abstract: A method for updating a business software system is provided that includes installing a support package in the business software system and providing an option to an administrator to activate at least one new functionality in the business software system continuously after the installing operation. The support package may be adapted to not provide the new functionality until activated by the administrator. A business software system is provided that includes a support package adapted to provide at least one new functionality upon being activated by an administrator of the business software system. The support package is adapted to not provide the new functionality until activated by the administrator. The support package provides an option to the administrator to activate the new functionality continuously after the installing operation. A method for updating a business software system is provided.
    Type: Application
    Filed: March 29, 2005
    Publication date: January 19, 2006
    Inventors: Bernhard Drittler, Joerg Flender, Dietmar Saddei
  • Publication number: 20050288945
    Abstract: The object based navigation is an intelligent user interface that uses a source object to determine which target information is to be presented to the user. This is done by associating an object to one or more operations, so that selection of a given source object would result in a predefined operation to be activated. The role of the user may also affect the predefined operation that is activated. If multiple operations are associated with a given source object, these operations may be prioritized, so that the one with the highest priority is performed as a default operation.
    Type: Application
    Filed: June 28, 2004
    Publication date: December 29, 2005
    Inventors: Gadi Melamed, Ori Assaraf, Ilan Perez, Ronen Eyal, Barak Hershkovitz, Yossi Tamari, Stefan Kusterer, Bernhard Drittler, Roman Hayer
  • Publication number: 20050044396
    Abstract: Techniques are described for automating the generation of access control information that identifies users that are permitted to access particular business objects used by a computer application. The generation of access control information is based on a characteristic that is shared by the user and the business object to be accessed. The characteristic may be an attribute. The characteristic also may be the identification of a process to determine a characteristic of a user and/or a characteristic of a business object.
    Type: Application
    Filed: August 18, 2003
    Publication date: February 24, 2005
    Inventors: Matthias Vogel, Bernhard Drittler, Markus Kupke
  • Publication number: 20050044426
    Abstract: Data structures for use in controlling access to data objects by users of a computer system or computing device are described. The data structures include an access control group data structure, a user access data structure, and a data object access data structure. The access control group data structure stores access control group data. The user access data structure stores user access data. The user access data relates to at least one entry in the access control group data structure. The data object access data structure stores data object access data, which relates to at least one entry in the access control group. Additional data structures described include an access control rule data structure and a characteristic method data structure.
    Type: Application
    Filed: August 18, 2003
    Publication date: February 24, 2005
    Inventors: Matthias Vogel, Bernhard Drittler, Markus Kupke
  • Publication number: 20040205039
    Abstract: The present invention discloses a method, computer program product and system for adjusting roles in a computer system (100) that launch application services (301-307) by a first user who is assigned to at least one role. A first role (110) calls a second role (150) by reference (111). Both roles comprise representations of applications services (101, 102, 103) and (104, 105). When representations in the second role are modified, for example, application services are added (106, 107), a delta list (112) for the first reference is automatically created to conditionally prevent the first role (110) from referencing to at least some of the modified representations of the second role (150). This is achieved by using a rule database (118) containing rules about application services that are mutually exclusive and checking for conflicts between the representations of the first role and modified, second role. A second user, e.g.
    Type: Application
    Filed: April 29, 2004
    Publication date: October 14, 2004
    Inventors: Peter Bittner, Bernhard Drittler, Jurgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
  • Publication number: 20040193699
    Abstract: Mechanisms for allowing allow multi-session capability and session-return enabling stateful web applications include providing a start URL of a requested portal page with an “External Session ID” (ESID). The ESID is an argument that is different between the two instances of the application (on the same page), and leads to different/independent sessions in the server. When a user returns to the same page, the ESIDs are passed again with the individual application requests, and the server can then logically reconnect to the proper session and allow the user to continue. The ESID can be used to return to an application after the user has previously left to go to another application and then desires to come back, or even when the user closed the browser and restarts the application later.
    Type: Application
    Filed: December 2, 2003
    Publication date: September 30, 2004
    Inventors: Juergen Heymann, Udo Offermann, Roman Hayer, Bernhard Drittler, Rainer Brendle
  • Publication number: 20040187114
    Abstract: A role-based computer system has a first processor with a computer program (100) and has further processors with application systems (Sy1, Sy2, Sy3) and application services (Se). The program generates a start instruction for the further processors to execute the services by consecutively receiving a log-in identification from the user and looking up in a first assignment table (101) for a role (Ro), looking up in a second assignment table (102) to determine logical services (LSe) assigned to the role; and looking up in a second assignment table to determine a pointer (P(Sy/Se)) to the services (Se) that are assigned to the logical service. The pointer has first and second portions to identify the application system (Sy) and the application service (Se), respectively, and becomes part of the start instruction (350).
    Type: Application
    Filed: May 5, 2004
    Publication date: September 23, 2004
    Inventors: Peter Bittner, Bernhard Drittler, Jurgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
  • Publication number: 20040139087
    Abstract: In a computer system (100) that launches application services for predetermined roles, a service-to-role assignment is customized in a target table. The user inserts a CD-ROM with master and reference tables, and the system automatically provides the target table. The master table (119) stores a first assignment (112) of application services (S, 151-156) to roles (RO), and stores a second assignment (113) of service attributes (SA), such as language or industry branch, of the application services (S). The reference table (129) stores reference attributes (REA) for each application service (S) in the master table. The service representations for each role (RO) are forwarded from the master table (119) into the target table (149) if service and reference attributes match.
    Type: Application
    Filed: February 25, 2004
    Publication date: July 15, 2004
    Inventors: Peter Bittner, Bernhard Drittler, Jurgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
  • Publication number: 20030237044
    Abstract: A method includes receiving information about a bookmarked link that a user has invoked within a browser, retrieving a page address from a repository based on a role of the user, and directing the browser to the page address. The method also includes rendering a page corresponding to the page address. The method can include extracting an object ID from the link. The method can also include determining the address based on the role of the user.
    Type: Application
    Filed: November 27, 2002
    Publication date: December 25, 2003
    Inventors: Roman Hayer, Stefan Kusterer, Bernhard Drittler, Thomas Bach, Rainer Brendle
  • Publication number: 20030225925
    Abstract: Systems and techniques to derive virtual objects at run-time from persistencely stored objects. In general, in one implementation, the technique includes receiving a request for a target object from a requesting application. It is determined whether a delta link is associated with the target object. The delta link includes a location of the target object and information describing a desired difference between the target object and a derived object to be returned to the requesting application. The target object is located and a derived object is generated from the target object and the information in the delta link. The derived object is then returned to the requesting application. The target object, and derived object, may include a number of elements. The elements may be name-value pairs, or “properties”, or a number of child objects in an object hierarchy.
    Type: Application
    Filed: December 26, 2002
    Publication date: December 4, 2003
    Inventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Meinolf Block, Bernhard Drittler
  • Publication number: 20030226103
    Abstract: A method includes retrieving a page address from a repository based on a user role and an object link and linking to a page based on the page address. The method may include extracting an object ID from the link. The method may also include using a generator to determine the address based on a user role and the object ID. The method further includes recording the user role.
    Type: Application
    Filed: November 27, 2002
    Publication date: December 4, 2003
    Inventors: Roman Hayer, Stefan Kusterer, Bernhard Drittler, Thomas Bach, Rainer Brendle
  • Publication number: 20030225781
    Abstract: Systems and techniques to generate a virtual hierarchy for navigating in and between object hierarchies. In general, in one implementation, the technique includes: flagging nodes in one or more object hierarchies as entry points and generating a virtual hierarchy including a virtual root and the nodes flagged as entry points depend directly from the virtual root.
    Type: Application
    Filed: December 26, 2002
    Publication date: December 4, 2003
    Inventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Bernhard Drittler
  • Publication number: 20030167299
    Abstract: A client computer and a server computer communicate via a network; the server computer receives user identification via the client computer that is selectively a first device or a second device. The server computer stores at least first and second application services for a single predetermined application class, wherein the first and second application services are adapted to client computer type. Upon receiving user identification, the server computer further receives a device attribute from the client computer, compares the device attribute with reference attributes, and selectively sends a representation of the first application service or of the second application service to the client computer according to the device attribute.
    Type: Application
    Filed: November 1, 2002
    Publication date: September 4, 2003
    Inventors: Jurgen Heymann, Stefan Kusterer, Bernhard Drittler