Patents by Inventor Christof Fetzer
Christof Fetzer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11783038Abstract: A device and a method for computer-aided processing of data are disclosed, the method including: providing configuration data of an application, determining a first application identification, wherein the first application identification is assigned to the application, determining a configuration identification, wherein the configuration identification is assigned to the configuration data of the application, individualizing the data by means of a second application identification, wherein the second application identification is determined using the first application identification and the configuration identification.Type: GrantFiled: June 24, 2021Date of Patent: October 10, 2023Assignee: Technische Universitat DresdenInventors: Christof Fetzer, Franz Gregor
-
Publication number: 20210406038Abstract: A device and a method (300A) for computer-aided processing of data are disclosed, wherein the method (300A) includes: providing configuration data of an application (in 302), determining a first application identification (in 304), wherein the first application identification is assigned to the application, determining a configuration identification (in 306), wherein the configuration identification is assigned to the configuration data of the application, individualizing the data by means of a second application identification (in 310), wherein the second application identification is determined using the first application identification and the configuration identification (in 308).Type: ApplicationFiled: June 24, 2021Publication date: December 30, 2021Inventors: Christof Fetzer, Franz Gregor
-
Patent number: 9958882Abstract: According to various embodiments, a heating system for heating a building and/or for preparing hot water is provided. The heating system can comprise a heat distributing device; and a computer, which is coupled to the heat distributing device in such a way that the heat produced by the computer is distributed in the building by means of the heat distributing device; wherein the computer is designed in such a way that the computer produces a message for a computing load distribution computer, wherein the message contains a piece of information about the heat demand of the heating system and/or of the building.Type: GrantFiled: February 1, 2012Date of Patent: May 1, 2018Assignee: Cloud & Heat Technologies GmbHInventors: Jens Struckmeier, Christof Fetzer
-
Patent number: 9304872Abstract: In one embodiment, a method is provided for data processing in order to provide a value for determining whether an error has occurred in the execution of a program. The method may include: determining a numerical value on the basis of a plurality of reference numbers determined by a checking circuit outside the program; determining a signature of at least one instruction of the program by means of an arithmetic code; updating a cumulative value on the basis of the numerical value and the signature; and transferring the updated cumulative value to the checking circuit in order to determine whether an error has occurred in the execution of the program, on the basis of the plurality of reference numbers and the cumulative value.Type: GrantFiled: September 9, 2011Date of Patent: April 5, 2016Inventors: Andre Schmitt, Ute Schiffel, Christof Fetzer, Martin Suesskraut
-
Publication number: 20140303787Abstract: According to various embodiments, a heating system for heating a building and/or for preparing hot water is provided. The heating system can comprise a heat distributing device; and a computer, which is coupled to the heat distributing device in such a way that the heat produced by the computer is distributed in the building by means of the heat distributing device; wherein the computer is designed in such a way that the computer produces a message for a computing load distribution computer, wherein the message contains a piece of information about the heat demand of the heating system and/or of the building.Type: ApplicationFiled: February 1, 2012Publication date: October 9, 2014Applicant: AoTerra GmbHInventors: Jens Struckmeier, Christof Fetzer
-
Publication number: 20130262938Abstract: In one embodiment, a method is provided for data processing in order to provide a value for determining whether an error has occurred in the execution of a program. The method may include: determining a numerical value on the basis of a plurality of reference numbers determined by a checking circuit out-side the program; determining a signature of at least one instruction of the program by means of an arithmetic code; updating a cumulative value on the basis of the numerical value and the signature; and transferring the updated cumulative value to the checking circuit in order to determine whether an error has occurred in the execution of the program, on the basis of the plurality of reference numbers and the cumulative value.Type: ApplicationFiled: September 9, 2011Publication date: October 3, 2013Applicant: SILISTRA SYSTEMS GMBHInventors: Andre Schmitt, Ute Schiffel, Christof Fetzer, Martin Suesskraut
-
Patent number: 7911978Abstract: A topology discovery process is used to discover all of the links in an ad hoc network and thereby ascertain the topology of the entire network. One of the nodes of the network, referred to as the coordinator, receives the topology information which can then be used to, for example, distribute a routing table to each other node of the network. The process has a Diffusion phase in which a k-resilient mesh, k>1, is created by propagating a topology request message through the network. Through this process, the nodes obtain information from which they are able to discern their local neighbor information. In a subsequent, Gathering phase, the local neighbor information is reported upstream from a node to its parents in the mesh and thence to the parents' parents and so forth back to the coordinator. The robustness of the Diffusion phase is enhanced by allowing a node to have more than one parent as well as by a number of techniques, including use of a so-called diffusion acknowledgement message.Type: GrantFiled: April 29, 2008Date of Patent: March 22, 2011Assignee: AT&T Intellectual Property II, L.P.Inventors: Ranveer Chandra, Christof Fetzer, Karin Hogstedt
-
Patent number: 7577889Abstract: The present embodiments provide methods for detecting errors and vulnerabilities in software without access to its source code. The method entails extracting functions from dynamically linked applications, determining error return codes and error numbers for the extracted functions, and forming a wrapper using the extracted functions. The wrapper is used to intercept some of the function calls, wherein the intercepted functions are manipulated to fail. The embodiments further relate to an article of manufacture to detect errors. The article of manufacture utilizes an extraction module to extract functions from dynamically linked applications, software to compile error return codes and error numbers for functions, and a wrapper module to form a wrapper with the extracted functions.Type: GrantFiled: October 16, 2007Date of Patent: August 18, 2009Assignee: AT&T Intellectual Property II, L.P.Inventors: Christof Fetzer, Zhen Xiao
-
Publication number: 20080235382Abstract: Computer architecture and method splice a new TCP connection. A proxy group for the new TCP connection is determined and, at one of the proxies, the new TCP connection is accepted. At the one proxy, a client request is received from a client of the new TCP connection and an appropriate backend server to handle the client request is determined. At the one proxy, the client request is spliced and sent to the appropriate backend server. Splicing state information of the new TCP connection is sent from the one proxy to other proxies of the proxy group. Each subsequent TCP segment of the new TCP connection is spliced and sent to the appropriate backend server at any one proxy of the proxy group.Type: ApplicationFiled: January 22, 2008Publication date: September 25, 2008Applicant: THE REGENTS OF THE UNIVERSITY OF COLORADOInventors: Manish MARWAH, Christof FETZER, Shivakant MISHRA
-
Patent number: 7366113Abstract: A topology discovery process is used to discover all of the links in an ad hoc network and thereby ascertain the topology of the entire network. One of the nodes of the network, referred to as the coordinator, receives the topology information which can then be used to, for example, distribute a routing table to each other node of the network. The process has a Diffusion phase in which a k-resilient mesh, k>1, is created by propagating a topology request message through the network. Through this process, the nodes obtain information from which they are able to discern their local neighbor information. In a subsequent, Gathering phase, the local neighbor information is reported upstream from a node to its parents in the mesh and thence to the parents' parents and so forth back to the coordinator. The robustness of the Diffusion phase is enhanced by allowing a node to have more than one parent as well as by a number of techniques, including use of a so-called diffusion acknowledgement message.Type: GrantFiled: June 2, 2003Date of Patent: April 29, 2008Assignee: AT & T Corp.Inventors: Ranveer Chandra, Christof Fetzer, Karin Hogstedt
-
Patent number: 7293213Abstract: The present embodiments provide methods for detecting errors and vulnerabilities in software without access to its source code. The method entails extracting functions from dynamically linked applications, determining error return codes and error numbers for the extracted functions, and forming a wrapper using the extracted functions. The wrapper is used to intercept some of the function calls, wherein the intercepted functions are manipulated to fail. The embodiments further relate to an article of manufacture to detect errors. The article of manufacture utilizes an extraction module to extract functions from dynamically linked applications, software to compile error return codes and error numbers for functions, and a wrapper module to form a wrapper with the extracted functions.Type: GrantFiled: August 29, 2005Date of Patent: November 6, 2007Assignee: AT&T Corp.Inventors: Zhen Xiao, Christof Fetzer
-
Publication number: 20070204261Abstract: A method includes a step of executing a software function using a set of test arguments and obtaining a result corresponding to each of the set of test arguments, each result indicating one of a set of robust and non-robust results, a subset of test arguments corresponding to robust results. The method further includes defining a set of arguments based on the results and the set of test arguments, the set of arguments including the subset of test arguments. Thereafter, arguments of subsequent calls to the software function may thereafter be examined to determine whether they fall within the set of arguments.Type: ApplicationFiled: May 1, 2007Publication date: August 30, 2007Inventors: Christof Fetzer, Zhen Xiao
-
Patent number: 7225428Abstract: A method includes a step of executing a software function using a set of test arguments and obtaining a result corresponding to each of the set of test arguments, each result indicating one of a set of robust and non-robust results, a subset of test arguments corresponding to robust results. The method further includes defining a set of arguments based on the results and the set of test arguments, the set of arguments including the subset of test arguments. Thereafter, arguments of subsequent calls to the software function may thereafter be examined to determine whether they fall within the set of arguments.Type: GrantFiled: May 20, 2003Date of Patent: May 29, 2007Assignee: AT&T Corp.Inventors: Christof Fetzer, Zhen Xiao
-
Patent number: 6832302Abstract: A method and apparatus for detecting a heap smashing condition. A call to a library function, such as a request to write a data block to the heap section of a memory, is intercepted from a program being executed. In an embodiment, a fault-containment wrapper module determines whether performing the write request would smash the heap. If it would smash the heap, an error handling procedure is executed instead of writing the data block. If it would not smash the heap, the fault-containment wrapper module causes the data block to be written to the memory as requested.Type: GrantFiled: October 24, 2001Date of Patent: December 14, 2004Assignee: AT&T Corp.Inventors: Christof Fetzer, Zhen Xiao