Patents by Inventor Cedric Hebert

Cedric Hebert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8726395
    Abstract: Methods and systems are provided for document encryption. In one embodiment, an adaptation engine is provided for partial encryption of a document. The adaptation engine may include a paginator for paginating the document into at least one sub-page according to characteristics of a specific device class. The adaptation engine may further include an encryptor for separately encrypting a to-be-encrypted element of the at least one sub-page using a partial encryption mechanism known by a client device that belongs to the specific device class.
    Type: Grant
    Filed: February 8, 2005
    Date of Patent: May 13, 2014
    Assignee: SAP AG
    Inventors: Laurent Gomez, Cedric Hebert, Cedric Ulmer
  • Publication number: 20130262397
    Abstract: A virtual file system may be used to determine a data file, and a splitter may then split the data file into at least a first portion and a second portion, and may provide a parity file using the first portion and the second portion. Any two of the first portion, the second portion, and the parity file include sufficient information to reconstruct the data file. A dispatcher may then distribute the first portion, the second portion, and the parity file for individual storage thereof using at least three separate storage locations.
    Type: Application
    Filed: March 27, 2012
    Publication date: October 3, 2013
    Applicant: SAP AG
    Inventor: Cedric Hebert
  • Patent number: 8548627
    Abstract: Systems and methods for automatically organizing and achieving a pre-given task by means of plurality of robots, each robot having a robot specific set of functionalities, are described. In an example implementation, a method can include the following steps: providing and exposing, for each robot, a semantic description of the robot's robot specific functionalities by respective semantic web services; providing a semantic description of the pre-given task; matching the semantically described task with the semantic web services describing the robot specific functionalities; and combining automatically a coordinated set of the plurality of robots according to the matching result, such that the task is achieved when the robots are sequentially working upon invocation.
    Type: Grant
    Filed: December 5, 2006
    Date of Patent: October 1, 2013
    Assignee: SAP AG
    Inventors: Cedric Ulmer, Laurent Gomez, Frederic Montagut, Cedric Hebert, Konrad Wrona
  • Publication number: 20130160079
    Abstract: A request handler may receive an access request for access to application server resources of an application server and determine that the access request is unauthorized. A response manager may provide a false positive response including apparent access to the application server resources.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Applicant: SAP AG
    Inventor: Cedric Hebert
  • Patent number: 8468598
    Abstract: A password manager may receive a password, and a false password generator may generate at least one false password, based on the password. A false password selector may store the at least one false password together with the password. A password handler may receive a login attempt that includes the at least one false password, and an attack detector may determine that the login attempt is potentially unauthorized, based on the receipt of the at least one false password.
    Type: Grant
    Filed: August 16, 2010
    Date of Patent: June 18, 2013
    Assignee: SAP AG
    Inventor: Cedric Hebert
  • Publication number: 20120042364
    Abstract: A password manager may receive a password, and a false password generator may generate at least one false password, based on the password. A false password selector may store the at least one false password together with the password. A password handler may receive a login attempt that includes the at least one false password, and an attack detector may determine that the login attempt is potentially unauthorized, based on the receipt of the at least one false password.
    Type: Application
    Filed: August 16, 2010
    Publication date: February 16, 2012
    Applicant: SAP AG
    Inventor: Cedric Hebert
  • Patent number: 7673141
    Abstract: A system for providing secured access to an application service includes a challenge provider that uses a first cryptographic technique to provide a challenge to a client seeking access to an application service. The client uses a second cryptographic technique to generate a response, and provides the response to an authentication service. The authentication service grants the client access to the application service only if the challenge and response are authenticated using a first authentication technique complementary to the first cryptographic technique and a second authentication technique complementary to the second cryptographic technique, respectively.
    Type: Grant
    Filed: October 7, 2004
    Date of Patent: March 2, 2010
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Jochen Haller, Laurent Gomez, Cedric Hebert
  • Publication number: 20090222399
    Abstract: The present description refers in particular to a computer-implemented method, computer program product, and computer system for trust evaluation of sensor data during at least part of a sensor data life-cycle. The computer-implemented method may include evaluating an acquisition trust value (ATV) of sensor data at a sensor data acquisition module from at least one sensor node in a wireless sensor network (WSN), wherein the WSN comprises at least one sink, evaluating a delivery trust value (DTV) of sensor data at a sensor data delivery module from a sending entity to a receiving entity; and evaluating a processing trust value (PTV) at a sensor data processing module in a processing entity, to obtain a trust evaluation of the sensor data.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 3, 2009
    Applicant: SAP AG
    Inventors: Laurent Gomez, Cedric Hebert, Alessandro Sorniotti, Cedric Ulmer
  • Publication number: 20090077376
    Abstract: There are provided a method, a system and an initiator server for a secure execution of workflow tasks of a workflow to be executed according to a given execution pattern in a distributed workflow management system within a decentralized network system with a plurality of servers (b0, b1, . . . , bn) including at least an initiator server and at least a number of groups of servers of the plurality of servers. Each group satisfies a policy (poli) of a vertex, and thus, knows a corresponding policy key pair including a policy private key (SKpoli) and a policy public key (PKpoli), respectively. Each vertex denotes a set of workflow tasks to be executed in accord with the execution pattern and is assigned a vertex key pair including a vertex private key and a vertex public key.
    Type: Application
    Filed: April 4, 2008
    Publication date: March 19, 2009
    Inventors: Frederic Montagut, Laurent Gomez, Cedric Hebert, Cedric Ulmer
  • Publication number: 20070180036
    Abstract: A method for managing message notification to a user, comprising the operations of: receiving a message addressed to the user; obtaining context information based on the context the user is in; obtaining a user's preference based on the obtained context information; depending on the obtained user's preference, selectively generating and delivering a message notification to the user for notifying the user of the received message.
    Type: Application
    Filed: November 29, 2006
    Publication date: August 2, 2007
    Inventors: Cedric Hebert, Laurent Gomez, Cedric Ulmer, Konrad Wrona
  • Publication number: 20070143403
    Abstract: A method, for automatically controlling a data submission in a forum, the control being based on the respective data content, comprises: the data content submitted by a user for the forum is automatically parsed with respect to specifically selected characters, the selected characters being provided together with respective selection ancillary information, if any selected character is found within the data content, the respective selection ancillary information is analyzed, the data is handled conformable with the analyzed respective selection ancillary information, an answer for the user is elaborated, the answer including the respective found character together with an appropriate analysis of its selection ancillary information and informing the user about the manner the data is handled, and the elaborated answer is communicated to the user.
    Type: Application
    Filed: December 15, 2006
    Publication date: June 21, 2007
    Inventors: Cedric Ulmer, Laurent Gomez, Cedric Hebert, Pascal Spadone
  • Publication number: 20070129847
    Abstract: Systems and methods for automatically organizing and achieving a pre-given task by means of plurality of robots, each robot having a robot specific set of functionalities, are described. In an example implementation, a method can include the following steps: providing and exposing, for each robot, a semantic description of the robot's robot specific functionalities by respective semantic web services; providing a semantic description of the pre-given task; matching the semantically described task with the semantic web services describing the robot specific functionalities; and combining automatically a coordinated set of the plurality of robots according to the matching result, such that the task is achieved when the robots are sequentially working upon invocation.
    Type: Application
    Filed: December 5, 2006
    Publication date: June 7, 2007
    Inventors: Cedric Ulmer, Laurent Gomez, Frederic Montagut, Cedric Hebert, Konrad Wrona
  • Publication number: 20070124405
    Abstract: A method, system and apparatus for chat detection is provided. In one embodiment, the invention is a method. The method includes detecting a series of related emails. The method also includes querying a first user to determine if the first user desires to switch to a chat. The method further includes querying a second user to determine if the second user desires to switch to a chat. Moreover, the method includes initiating a chat between the first user and the second user. The method may also include detecting an end of a chat, and may similarly include providing a log of the chat.
    Type: Application
    Filed: December 27, 2004
    Publication date: May 31, 2007
    Inventors: Cedric Ulmer, Cédric Hébert, Laurent Gomez, Olivier Dumas, Emmanuel Savy, Jeremie Clergue
  • Publication number: 20070124383
    Abstract: A technique for reducing multiple emails is described. In one embodiment, this involves checking mailing lists to which an email recipient subscribes. A method according to the technique includes receiving a message forwarding a forwarded message, comparing a recipient of the message to recipients of the forwarded message, and marking the message as a duplicate. A device developed according to the technique may include a processor and a memory. The memory may include a forward detection module configured to identify forwarded messages, a duplicate detection module configured to identify an intended recipient of a message as a subscriber to a distribution list from which the forwarded message originated, and a duplicate message modification module configured to mark a message forwarding the forwarded message.
    Type: Application
    Filed: December 3, 2004
    Publication date: May 31, 2007
    Inventors: Cedric Hebert, Laurent Gomez, Cedric Ulmer, Pascal Spadone
  • Publication number: 20070061589
    Abstract: An embodiment relates to a system for scrambling characters of a password entered by a user on an input device. The system includes a keystroke controller to identify a keystroke that represents a character of the password entered on the input device. The system further includes a scrambling pad to scramble the character represented by the identified keystroke into a scrambled character according to a transformation rule.
    Type: Application
    Filed: August 28, 2006
    Publication date: March 15, 2007
    Inventors: Cedric Ulmer, Pascal Spadone, Cedric Hebert, Laurent Gomez
  • Publication number: 20060253314
    Abstract: A method and system to control an interaction of a plurality of participants in a workflow process. The method classifies the plurality of activities as (1) first activity of the workflow process, (2) first activity of a participant in an on-going workflow process, and (3) interaction activity. A set of access control policies is generated for each type of activity. The policies include workflow initialization policy, participation policy and interaction policies. The policies determine if a requesting participant is permitted to interact with a responding participant. In addition, the system includes a policy enforcement point for receiving a request from a requesting participant, wherein the request is for activating an activity of a responding participant. The policy enforcement point forwards the request to a policy decision point where the request is evaluated based on the set of access control policies.
    Type: Application
    Filed: February 17, 2006
    Publication date: November 9, 2006
    Inventors: Yevgen Reznichenko, Maarten Rits, Jochen Haller, Pascal Spadone, Cedric Hebert
  • Publication number: 20060168062
    Abstract: An electronic mail system identifies autoreply messages and stores the date of return in a virtual calendar. The system then uses the virtual calendar for several features. A user can attempt to access the calendar of another user, and if that user's calendar is not accessible, then information from the virtual calendar is displayed. Also, when a user is sending a message, the virtual calendar is checked to see if a message recipient is out of the office. In another embodiment, the virtual calendar is accessed when a user creates a meeting request to determine if any meeting attendees will be out of the office at the time of the scheduled meeting. The system also has the ability to remind users of the date that a person returns to the office, and to delete entries from the virtual calendar at the appropriate time.
    Type: Application
    Filed: November 10, 2005
    Publication date: July 27, 2006
    Inventors: Cedric Hebert, Laurent Gomez, Cedric Ulmer, Pascal Spadone
  • Publication number: 20060053116
    Abstract: A system for dynamic software updating using a mobile agent includes a server for issuing the mobile agent with a software update and a client for receiving the mobile agent. The mobile agent executes the software update, on the client, utilizing aspect oriented programming.
    Type: Application
    Filed: August 31, 2004
    Publication date: March 9, 2006
    Inventors: Maarten Rits, Cedric Ulmer, Cedric Hebert, Pascal Spadone, Laurent Gomez
  • Publication number: 20060048225
    Abstract: A technique for protecting against installation of malicious software includes preventing interaction with a software product when keywords in a disclaimer associated with the software product are detected. A computing device identifies keywords in a disclaimer associated with a software product. If keywords are identified, further interaction with the software is prevented by removing interactive content that facilitates interaction with the software and adding interactive content facilitating sending a request to an administrator for permission to interact with the software. The administrator determines whether interaction with the software product is permitted.
    Type: Application
    Filed: August 31, 2004
    Publication date: March 2, 2006
    Inventors: Laurent Gomez, Cedric Hebert, Cedric Ulmer
  • Publication number: 20060048226
    Abstract: A method for dynamic security enforcement includes running an application with linked aspects and determining if a security issue is present in the application. A type of the security issue is determined and an aspect is written to fix the security issue based on the type of the security issue. Finally, the aspect linked to the application.
    Type: Application
    Filed: August 31, 2004
    Publication date: March 2, 2006
    Inventors: Maarten Rits, Cedric Ulmer, Cedric Hebert, Laurent Gomez, Pascal Spadone