Patents by Inventor Birgit Pfitzmann

Birgit Pfitzmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110302647
    Abstract: Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment.
    Type: Application
    Filed: June 3, 2010
    Publication date: December 8, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kamal Bhattacharya, Nikolai A. Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy
  • Publication number: 20110302273
    Abstract: A system allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a system is presented for providing an identity-related information about a user to a requesting entity. The method includes a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.
    Type: Application
    Filed: June 2, 2011
    Publication date: December 8, 2011
    Applicant: International Business Machines Corporation
    Inventors: Birgit Pfitzmann, Michael Waidner
  • Publication number: 20110252403
    Abstract: Component relinking in migrations may include discovering one or more dependencies in one or more components; planning one or more new locations where the one or more components are to be placed; determining relinking needs in the one or more components based on the discovering and the planning; and applying the relinking needs.
    Type: Application
    Filed: April 13, 2010
    Publication date: October 13, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nikolai A. Joukov, Matthew A. Markley, Birgit Pfitzmann, HariGovind V. Ramasamy
  • Publication number: 20110231455
    Abstract: A file system interface is simulated out of at least a portion of a dormant computer system. File-based discovery is performed on the simulated file system interface to obtain a detailed inventory of at least the portion of the dormant computer system. The detailed inventory includes one or more of software profiles of at least the portion of the dormant computer system, software instances of at least the portion of the dormant computer system, services of at least the portion of the dormant computer system, and data objects used by the services.
    Type: Application
    Filed: March 18, 2010
    Publication date: September 22, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Nikolai A. Joukov, Birgit Pfitzmann, Shaya Potter, Harigovind V. Ramasamy
  • Publication number: 20110213883
    Abstract: A system and method for information technology (IT) migration includes determining a relationship among objects to be migrated such that the relationship includes a set of objects having at least one of a common feature or dependency between the objects in the set. The objects are grouped into a plurality of migration waves such that cross-wave relationships are minimized among the plurality of migration waves. The objects are migrated wave by wave.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Richard Keith Athey, John K. Baker, Ronda L. Caswell, Steve N. Lee, Matthew A. Markley, Birgit Pfitzmann, Michael Tacci, Bruce G. Taylor, Tylon O. Willingham
  • Patent number: 7992195
    Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.
    Type: Grant
    Filed: March 26, 2003
    Date of Patent: August 2, 2011
    Assignee: International Business Machines Corporation
    Inventors: Birgit Pfitzmann, Michael Waidner
  • Publication number: 20110055806
    Abstract: A system and method of discovering one or more program variable values may extract an abstract interpretation of a program variable used in a computer program, locate installation-specific repositories associated with the computer program, parse the located installation-specific repositories and extract one or more configuration parameters, and substitute the one or more configuration parameters into the extracted abstract interpretation.
    Type: Application
    Filed: September 3, 2009
    Publication date: March 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sergej Chicherin, Nikolai A. Joukov, Birgit Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
  • Publication number: 20080294480
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: August 5, 2008
    Publication date: November 27, 2008
    Inventors: Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20070250913
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: June 18, 2007
    Publication date: October 25, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20070130460
    Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.
    Type: Application
    Filed: March 26, 2003
    Publication date: June 7, 2007
    Inventors: Birgit Pfitzmann, Michael Waidner
  • Publication number: 20070094202
    Abstract: A method for rule compliance situation checking is provided. The method in one aspect, includes the steps of: a) building a rule model for predefined rules and building a business operational model for business processes; b) normalizing vocabularies in the rule model and the business operational model; c) checking whether the rule model is satisfied by the business operational model; and d) outputting a report on checking results. The present invention also provides a corresponding system for rule compliance checking. The rule compliance checking of the present invention allows users to perform fast and effective automatic checking of rule compliance, avoid interference of man-made factors in checking process to a great extent and thus guarantee veracity of checking results.
    Type: Application
    Filed: August 29, 2006
    Publication date: April 26, 2007
    Applicant: International Business Machines Corporation
    Inventors: Ying Huang, Haiqi Liang, Ying Liu, Birgit Pfitzmann, Jian Wang, Xin Zhou, Jun Zhu
  • Publication number: 20060184995
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: December 22, 2005
    Publication date: August 17, 2006
    Applicant: International Business Machines Corporation
    Inventors: Michael Backes, Guenter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20060168332
    Abstract: Provides methods, apparatus and systems for determining an applicable policy for an incoming message having a service-level addressing element. A method includes the following steps: a) applying a potentially applicable policy (P1) on the incoming message to make the service-level addressing element of the incoming message visible, b) if the service-level addressing element of the incoming message gets visible and is the one to which the currently applied policy (P1) is associated, the currently applied policy (P1) is determined to be the applicable policy, and if not associated c) repeating steps a) and b) with a further potentially applicable policy (P2 . . . Pn).
    Type: Application
    Filed: January 17, 2006
    Publication date: July 27, 2006
    Applicant: International Business Machines Corporation
    Inventor: Birgit Pfitzmann
  • Publication number: 20050289340
    Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050055434
    Abstract: A method is presented for obtaining information from a client for the benefit of a server using a particular communication protocol that the server does not implement. A primary server receives a client-generated request, and the primary server sends a first request to a secondary server as part of the processing of the client-generated request. While processing the first request, the secondary server determines a need for data obtainable from a client application that supports user interaction using a communication protocol for which the secondary server is not configured to implement. The secondary server sends a second request to the primary server for obtaining data that results from using the communication protocol. The secondary server subsequently receives the resulting data and continues to process the first request using the resulting data, after which the secondary server returns a response for the first request to the primary server.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Warwick Burrows, Guenter Karioth, Anthony Moran, Birgit Pfitzmann, Matthias Schunter, Brian Turner
  • Publication number: 20050044409
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: August 19, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Patent number: 6856977
    Abstract: A system for proving ownership of digital media works. Proof of ownership of such type of work is provided by a protocol for registering a work with a registration center thus providing the rightful owner or copyright holder of the work with an ownership certificate. There is also provided a protocol for proving to another party who is a prospective buyer or licensee, that an ownership claim is correct and valid by providing the ownership certificate when required. Another protocol is utilized for showing to a third party, a prospective buyer or licensee, that a second party has correctly obtained the corresponding work from the rightful copyright owner.
    Type: Grant
    Filed: September 21, 2000
    Date of Patent: February 15, 2005
    Assignee: International Business Machines Corporation
    Inventors: André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi