Patents by Inventor Birgit Pfitzmann
Birgit Pfitzmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110302647Abstract: Automating network reconfiguration such as firewall reconfiguration in migrations may include determining network reconfiguration needs in one or more network functionalities of the target environment based on the discovering; and applying the network reconfiguration needs to the one or more network functionalities in the target environment.Type: ApplicationFiled: June 3, 2010Publication date: December 8, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kamal Bhattacharya, Nikolai A. Joukov, Birgit Pfitzmann, HariGovind V. Ramasamy
-
Publication number: 20110302273Abstract: A system allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a system is presented for providing an identity-related information about a user to a requesting entity. The method includes a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.Type: ApplicationFiled: June 2, 2011Publication date: December 8, 2011Applicant: International Business Machines CorporationInventors: Birgit Pfitzmann, Michael Waidner
-
Publication number: 20110252403Abstract: Component relinking in migrations may include discovering one or more dependencies in one or more components; planning one or more new locations where the one or more components are to be placed; determining relinking needs in the one or more components based on the discovering and the planning; and applying the relinking needs.Type: ApplicationFiled: April 13, 2010Publication date: October 13, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Matthew A. Markley, Birgit Pfitzmann, HariGovind V. Ramasamy
-
Publication number: 20110231455Abstract: A file system interface is simulated out of at least a portion of a dormant computer system. File-based discovery is performed on the simulated file system interface to obtain a detailed inventory of at least the portion of the dormant computer system. The detailed inventory includes one or more of software profiles of at least the portion of the dormant computer system, software instances of at least the portion of the dormant computer system, services of at least the portion of the dormant computer system, and data objects used by the services.Type: ApplicationFiled: March 18, 2010Publication date: September 22, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Nikolai A. Joukov, Birgit Pfitzmann, Shaya Potter, Harigovind V. Ramasamy
-
Publication number: 20110213883Abstract: A system and method for information technology (IT) migration includes determining a relationship among objects to be migrated such that the relationship includes a set of objects having at least one of a common feature or dependency between the objects in the set. The objects are grouped into a plurality of migration waves such that cross-wave relationships are minimized among the plurality of migration waves. The objects are migrated wave by wave.Type: ApplicationFiled: February 26, 2010Publication date: September 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Richard Keith Athey, John K. Baker, Ronda L. Caswell, Steve N. Lee, Matthew A. Markley, Birgit Pfitzmann, Michael Tacci, Bruce G. Taylor, Tylon O. Willingham
-
Patent number: 7992195Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.Type: GrantFiled: March 26, 2003Date of Patent: August 2, 2011Assignee: International Business Machines CorporationInventors: Birgit Pfitzmann, Michael Waidner
-
Publication number: 20110055806Abstract: A system and method of discovering one or more program variable values may extract an abstract interpretation of a program variable used in a computer program, locate installation-specific repositories associated with the computer program, parse the located installation-specific repositories and extract one or more configuration parameters, and substitute the one or more configuration parameters into the extracted abstract interpretation.Type: ApplicationFiled: September 3, 2009Publication date: March 3, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sergej Chicherin, Nikolai A. Joukov, Birgit Pfitzmann, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl
-
Publication number: 20080294480Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.Type: ApplicationFiled: August 5, 2008Publication date: November 27, 2008Inventors: Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20070250913Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.Type: ApplicationFiled: June 18, 2007Publication date: October 25, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20070130460Abstract: The invention allows a reliable and efficient identity management that can, with full interoperability, accommodate to various requirements of participants. For that a method and system are presented for providing an identity-related information about a user to a requesting entity. The method comprises a location-request step initiated by the requesting entity for requesting from a client application a location information that corresponds to a location entity possessing the identity-related information, a redirecting step for connecting the client application to the location entity in order to instruct the location entity to transfer the identity-related information to the requesting entity, and an acquiring step for obtaining the identity-related information.Type: ApplicationFiled: March 26, 2003Publication date: June 7, 2007Inventors: Birgit Pfitzmann, Michael Waidner
-
Publication number: 20070094202Abstract: A method for rule compliance situation checking is provided. The method in one aspect, includes the steps of: a) building a rule model for predefined rules and building a business operational model for business processes; b) normalizing vocabularies in the rule model and the business operational model; c) checking whether the rule model is satisfied by the business operational model; and d) outputting a report on checking results. The present invention also provides a corresponding system for rule compliance checking. The rule compliance checking of the present invention allows users to perform fast and effective automatic checking of rule compliance, avoid interference of man-made factors in checking process to a great extent and thus guarantee veracity of checking results.Type: ApplicationFiled: August 29, 2006Publication date: April 26, 2007Applicant: International Business Machines CorporationInventors: Ying Huang, Haiqi Liang, Ying Liu, Birgit Pfitzmann, Jian Wang, Xin Zhou, Jun Zhu
-
Publication number: 20060184995Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.Type: ApplicationFiled: December 22, 2005Publication date: August 17, 2006Applicant: International Business Machines CorporationInventors: Michael Backes, Guenter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20060168332Abstract: Provides methods, apparatus and systems for determining an applicable policy for an incoming message having a service-level addressing element. A method includes the following steps: a) applying a potentially applicable policy (P1) on the incoming message to make the service-level addressing element of the incoming message visible, b) if the service-level addressing element of the incoming message gets visible and is the one to which the currently applied policy (P1) is associated, the currently applied policy (P1) is determined to be the applicable policy, and if not associated c) repeating steps a) and b) with a further potentially applicable policy (P2 . . . Pn).Type: ApplicationFiled: January 17, 2006Publication date: July 27, 2006Applicant: International Business Machines CorporationInventor: Birgit Pfitzmann
-
Publication number: 20050289340Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.Type: ApplicationFiled: June 23, 2004Publication date: December 29, 2005Applicant: International Business Machines CorporationInventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Publication number: 20050055434Abstract: A method is presented for obtaining information from a client for the benefit of a server using a particular communication protocol that the server does not implement. A primary server receives a client-generated request, and the primary server sends a first request to a secondary server as part of the processing of the client-generated request. While processing the first request, the secondary server determines a need for data obtainable from a client application that supports user interaction using a communication protocol for which the secondary server is not configured to implement. The secondary server sends a second request to the primary server for obtaining data that results from using the communication protocol. The secondary server subsequently receives the resulting data and continues to process the first request using the resulting data, after which the secondary server returns a response for the first request to the primary server.Type: ApplicationFiled: September 4, 2003Publication date: March 10, 2005Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Warwick Burrows, Guenter Karioth, Anthony Moran, Birgit Pfitzmann, Matthias Schunter, Brian Turner
-
Publication number: 20050044409Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.Type: ApplicationFiled: August 19, 2003Publication date: February 24, 2005Applicant: International Business Machines CorporationInventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
-
Patent number: 6856977Abstract: A system for proving ownership of digital media works. Proof of ownership of such type of work is provided by a protocol for registering a work with a registration center thus providing the rightful owner or copyright holder of the work with an ownership certificate. There is also provided a protocol for proving to another party who is a prospective buyer or licensee, that an ownership claim is correct and valid by providing the ownership certificate when required. Another protocol is utilized for showing to a third party, a prospective buyer or licensee, that a second party has correctly obtained the corresponding work from the rightful copyright owner.Type: GrantFiled: September 21, 2000Date of Patent: February 15, 2005Assignee: International Business Machines CorporationInventors: André Adelsbach, Birgit Pfitzmann, Ahmad-Reza Sadeghi