Patents by Inventor Christian Guenther

Christian Guenther has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130290833
    Abstract: The present invention provides for a server computer, a data processing system and an access control system. Data related to items that are supposed to be in the possession of an employee is retrieved from distributed data sources. A web page is generated using these data values for the employee's information and review. These data values can be stored on a chip card that is used for access control and/or control of the circulation of items within the premises of a company.
    Type: Application
    Filed: July 1, 2013
    Publication date: October 31, 2013
    Applicant: SAP AG
    Inventors: Ariane Skutela, Dirk Ahlert, Christian Guenther
  • Patent number: 8539555
    Abstract: A method, an apparatus and a system for authorization-dependent access to multimedia contents. A first terminal produces a first request for a multimedia content for an output of the multimedia content via the first terminal. A first authorization information item is used to check that the output of the multimedia content is authorized. The first terminal produces a second request for an output of the multimedia content via a second terminal. A check is carried out to determine whether to output a first security note via the first terminal. The output of the multimedia content takes place via the second terminal if the first security note is not to be output, or an input of a confirming acknowledgement for the first security note is identified by the first terminal.
    Type: Grant
    Filed: April 20, 2010
    Date of Patent: September 17, 2013
    Assignee: Nokia Siemens Networks Oy
    Inventors: Anja Jerichow, Christian Guenther
  • Patent number: 8484567
    Abstract: Systems and methods are provided for personalizing software programs in a computer system. In accordance with one implementation, default values for personalization data adapted to or harmonized with the individual needs or preferences of the end-user are provided to a plurality of end-users at start-up of a program. Further, two personalization levels are provided, including a first personalization level containing administrative personalization data which can be set by a system administrator, and a second personalization level containing individual personalization data, which can be set by the end-user. A data filing system for this personalization data may be of a hierarchical structure.
    Type: Grant
    Filed: May 27, 2005
    Date of Patent: July 9, 2013
    Assignee: SAP AG
    Inventors: Dirk Ahlert, Christian Guenther, Jochen Kountz
  • Patent number: 8477945
    Abstract: After a radio link is established between a mobile subscriber terminal and an access network, the subscriber is authenticated by a proxy server of an intermediate network forwarding, from the access network to a home network of the subscriber, authentication message(s) containing a subscriber identification. If the subscriber is authenticated and the subscriber identification is already stored in the proxy server, the proxy server assigns a group-specific mobile key to the subscriber identification. When the home agent receives a registration request message originating from a subscriber terminal and containing a subscriber identification and transmits a key request message, containing the subscriber identification, for a mobile key to the proxy server, if the subscriber identification in the key request message matches a subscriber identification stored by the proxy server, a mobile key for cryptographic protection of mobile signalling messages is provided to the home agent by the proxy server.
    Type: Grant
    Filed: October 30, 2006
    Date of Patent: July 2, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Patent number: 8478840
    Abstract: Computer-implemented methods, computer systems and computer program products are provided for generating user specific web pages. Data related to items that are supposed to be in the possession of an employee may be retrieved from distributed data sources. A web page is generated using these data values for the employee's information and review. These data values can be stored on a chip card that is used for access control and/or control of the circulation of items within the premises of a company.
    Type: Grant
    Filed: May 26, 2004
    Date of Patent: July 2, 2013
    Assignee: SAP AG
    Inventors: Ariane Skutela, Dirk Ahlert, Christian Guenther
  • Patent number: 8457318
    Abstract: In service access networks having different key hierarchies that provide broadcast service to a mobile terminal, when switching from a first service access network, from which the mobile terminal receives the data of the broadcast service in an encrypted manner by a first data content encryption key, to a second service access network, from which the mobile terminal receives the data of the same broadcast service in an encrypted manner by a second data content encryption key, the mobile terminal receives a key of the hierarchy of the second service access network which is encrypted by a user-specific key of the first service access network.
    Type: Grant
    Filed: September 7, 2007
    Date of Patent: June 4, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventor: Christian Günther
  • Publication number: 20130117719
    Abstract: The present disclosure describes methods, systems, and computer program products for providing context-based adaptations in business applications. One example method includes identifying an executing instance of an application associated with at least one adaptation configuration, where each adaptation configuration is associated with a set of context criteria. An environmental context associated with the executing instance of the application is determined. A request to perform an operation of the application is received, and a comparison of the environmental context is made with the at least one adaptation configuration to determine if the environmental context satisfies the set of context criteria. The at least one adaptation configuration is then applied for the performance of the operation based on the environmental context satisfying the set of context criteria.
    Type: Application
    Filed: November 7, 2011
    Publication date: May 9, 2013
    Applicant: SAP AG
    Inventors: Julia Bender, Christian Guenther, Ralf Kaltenmaier
  • Publication number: 20120070296
    Abstract: A rotor blade or rotor blade segment for a wind turbine has at least one cable for the fixation of the rotor blade or rotor blade segment on a rotor hub or on the further rotor blade segment. A connecting surface, in the mounted state, faces the rotor hub or further rotor blade segment and from this connecting surface, a free end of the at least one cable protrudes for fixation on the rotor hub or further rotor blade segment. The at least one cable is anchored inside a connecting region of the rotor blade or rotor blade segment and extends only over a longitudinal section of the rotor blade or rotor blade segment which adjoins the connecting surface.
    Type: Application
    Filed: September 13, 2011
    Publication date: March 22, 2012
    Inventors: Hendrik Klein, Christian Günther
  • Publication number: 20100275247
    Abstract: A method, an apparatus and a system for authorization-dependent access to multimedia contents. A first terminal produces a first request for a multimedia content for an output of the multimedia content via the first terminal. A first authorization information item is used to check that the output of the multimedia content is authorized. The first terminal produces a second request for an output of the multimedia content via a second terminal. A check is carried out to determine whether to output a first security note via the first terminal. The output of the multimedia content takes place via the second terminal if the first security note is not to be output, or an input of a confirming acknowledgement for the first security note is identified by the first terminal.
    Type: Application
    Filed: April 20, 2010
    Publication date: October 28, 2010
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Anja Jerichow, Christian Guenther
  • Publication number: 20100182985
    Abstract: It is disclosed a method including providing a relation of network access technology-specific identification information (NATSII) of a user equipment or user and network identity-related information (NIRI) of the user equipment, receiving an inquiry comprising network identity-related inquiry information (NIRII), resolving the received NIRII based on the provided relation, and sending a response including the NATSII according to a result of the resolved NIRII; a method including receiving a registration request comprising NIRII from a user equipment or user, obtaining NATSII based on the received NIRII, appending the received NIRII with the obtained NATSII, and sending the appended NIRII; and a method receiving a registration request comprising first NATSII and NIRI, obtaining second NATSII based on the received NIRI, matching the received first NATSII against the obtained second NATSII, and authorizing access for a user equipment based on a result of matching.
    Type: Application
    Filed: May 8, 2008
    Publication date: July 22, 2010
    Inventors: Christian Guenther, Dirk Kroeselberg, Richard Wisenöcker
  • Publication number: 20100017601
    Abstract: A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server.
    Type: Application
    Filed: October 31, 2006
    Publication date: January 21, 2010
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Publication number: 20100011426
    Abstract: A method provides subscriber-specific activation of network-based mobility management using an authentication server. According to the method, network-based mobility management is enforced, even if the mobile terminal supports terminal-based mobility management. This gives a network provider complete control over mobility management in his network, preventing configuration problems during the configuration of mobile terminals. In the method, after the successful authentication of a subscriber, the authentication server transmits an authentication confirmation message to an authentication client in an access network. The received authentication confirmation message contains an activation attribute for activating network-based mobility management, if the authentication server does not provide a common mobile key for terminal-based mobility management.
    Type: Application
    Filed: October 31, 2006
    Publication date: January 14, 2010
    Applicant: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Publication number: 20090327475
    Abstract: A counter status that is allocated to a communication terminal and a base station is usually deleted when the storage space in the respective base station is used up. To address this, the counter status is saved in an additional communication network element when a predefinable criterion is met, and can thus be retrieved.
    Type: Application
    Filed: December 6, 2006
    Publication date: December 31, 2009
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Publication number: 20090282246
    Abstract: In service access networks having different key hierarchies that provide broadcast service to a mobile terminal, when switching from a first service access network, from which the mobile terminal receives the data of the broadcast service in an encrypted manner by a first data content encryption key, to a second service access network, from which the mobile terminal receives the data of the same broadcast service in an encrypted manner by a second data content encryption key, the mobile terminal receives a key of the hierarchy of the second service access network which is encrypted by a user-specific key of the first service access network.
    Type: Application
    Filed: September 7, 2007
    Publication date: November 12, 2009
    Inventor: Christian Günther
  • Patent number: 7599903
    Abstract: Systems and methods are provided for extracting data sets from an online relational database into a data warehouse. A data query based on special timestamping technique is executed. Timestamping allows extraction of only these data sets that have changed since the last extraction point. The data sets that have been already imported stay unchanged and do not need to be deleted at the time of the new import. Extraction interval of data sets including a time window enclosed by lower and upper limits is defined. The extracted data sets that have been imported twice may be filtered out with the use of, for example, an operational data store (ODS) objects. The filtered out data sets may be available in the data warehouse for the drilldown reporting.
    Type: Grant
    Filed: July 15, 2004
    Date of Patent: October 6, 2009
    Assignee: SAP AG
    Inventors: Christian Günther, Michael Aakolk, Jochen Kountz, Nuran Adal
  • Publication number: 20090226994
    Abstract: The present invention relates to a method and device for non-intrusively manipulating suspended particles and/or cells and/or viruses, which are supplied to a micro-chamber or to a micro-channel (46) of a substrate, said micro-chamber or micro-channel (46) having at least a bottom wall as well as lateral walls. At least one acoustic wave (41) is applied via at least one acoustic transducer (42, 44) from outside of said substrate to an inner volume of said micro-chamber or micro-channel (46), a frequency of said acoustic wave (41) being selected to generate a standing and/or stationary acoustic wave in said volume. In the present method and device the acoustic wave (41) is applied laterally to said volume. The present device and method allow an efficient coupling of energy into the channels as well as an improved control of standing and/or stationary acoustic wave fields along the channels.
    Type: Application
    Filed: July 7, 2005
    Publication date: September 10, 2009
    Applicant: FRAUNHOFER-GESELLSCHAFT ZUR FORDERUNG DER ANGEWANDTEN FORSCHUNG E.V.
    Inventors: Robert Lemor, Christian Günther, Günter Fuhr, Martin Wiklund, Hans Hertz
  • Publication number: 20090193253
    Abstract: After a radio link is established between a mobile subscriber terminal and an access network, the subscriber is authenticated by a proxy server of an intermediate network forwarding, from the access network to a home network of the subscriber, authentication message(s) containing a subscriber identification. If the subscriber is authenticated and the subscriber identification is already stored in the proxy server, the proxy server assigns a group-specific mobile key to the subscriber identification. When the home agent receives a registration request message originating from a subscriber terminal and containing a subscriber identification and transmits a key request message, containing the subscriber identification, for a mobile key to the proxy server, if the subscriber identification in the key request message matches a subscriber identification stored by the proxy server, a mobile key for cryptographic protection of mobile signalling messages is provided to the home agent by the proxy server.
    Type: Application
    Filed: October 30, 2006
    Publication date: July 30, 2009
    Inventors: Rainer Falk, Christian Günther, Dirk Kröselberg
  • Patent number: 7486293
    Abstract: A method is provided to display a plurality of signals, on a display screen with an intuitive graphical interface, wherein a user has ability to monitor overall data from a single view. A plurality of signals having different frequencies and remaining in a complex relationship with each other may be visualized. Each signal may be displayed by using a symbol, wherein a quasi static signal is graphically depicted using a limit symbol while the dynamic signals are visualized using bar symbols. The symbols may be arranged horizontally, on multiple image planes, in close proximity to each other. A limit symbol may be positioned on the topmost image plane in such a way that if one bar reaches the limit symbol, the bar symbol is at least partially covered. The spatial relationship among the symbols is such that the user can easily determine if an actual signal output matches planned or scheduled output or if it does not exceed the total available capacity.
    Type: Grant
    Filed: January 6, 2004
    Date of Patent: February 3, 2009
    Assignee: SAP AG
    Inventors: Dirk Ahlert, Christian Guenther, Ariane Skutela, Guido Tesch
  • Publication number: 20060192773
    Abstract: A method is provided to display a plurality of signals, on a display screen with an intuitive graphical interface, wherein a user has ability to monitor overall data from a single view. A plurality of signals having different frequencies and remaining in a complex relationship with each other may be visualized. Each signal may be displayed by using a symbol, wherein a quasi static signal is graphically depicted using a limit symbol while the dynamic signals are visualized using bar symbols. The symbols may be arranged horizontally, on multiple image planes, in close proximity to each other. A limit symbol may be positioned on the topmost image plane in such a way that if one bar reaches the limit symbol, the bar symbol is at least partially covered. The spatial relationship among the symbols is such that the user can easily determine if an actual signal output matches planned or scheduled output or if it does not exceed the total available capacity.
    Type: Application
    Filed: January 6, 2004
    Publication date: August 31, 2006
    Inventors: Dirk Ahlert, Christian Guenther, Arlane Skutela, Guido Tesch
  • Publication number: 20050273719
    Abstract: Systems and methods are provided for personalizing software programs in a computer system. In accordance with one implementation, default values for personalization data adapted to or harmonized with the individual needs or preferences of the end-user are provided to a plurality of end-users at start-up of a program. Further, two personalization levels are provided, including a first personalization level containing administrative personalization data which can be set by a system administrator, and a second personalization level containing individual personalization data, which can be set by the end-user. A data filing system for this personalization data may be of a hierarchical structure.
    Type: Application
    Filed: May 27, 2005
    Publication date: December 8, 2005
    Inventors: Dirk Ahlert, Christian Guenther, Jochen Kountz