Patents by Inventor Christoph Haefner

Christoph Haefner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10834102
    Abstract: A client comprising a web browser is provided. The client is configured to: run an application in the web browser, the application comprising a sensor including sensor JavaScript code, wherein running the application comprises executing the sensor JavaScript code as the first JavaScript code in the web browser to activate the sensor; and wherein the sensor is configured to: gather data with respect to the application at runtime; and check predetermined application-specific rules against the gathered data for detecting client-side attacks at runtime.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: November 10, 2020
    Assignee: SAP SE
    Inventors: Martin Johns, Martin Haerterich, Christoph Haefner
  • Patent number: 10609067
    Abstract: WebRTC is vulnerable to malicious JavaScript, injected by cross-site scripting attacks or compromised or malicious script providers. Through these attacks, attackers can access a WebRTC connection and leak or monitor the audio and video data transmitted. By preventing modification of key WebRTC functions and preventing outgoing streams from being used more than once, these attacks can be thwarted.
    Type: Grant
    Filed: April 16, 2019
    Date of Patent: March 31, 2020
    Assignee: SAP SE
    Inventors: Martin Johns, Christoph Haefner
  • Publication number: 20190245886
    Abstract: WebRTC is vulnerable to malicious JavaScript, injected by cross-site scripting attacks or compromised or malicious script providers. Through these attacks, attackers can access a WebRTC connection and leak or monitor the audio and video data transmitted. By preventing modification of key WebRTC functions and preventing outgoing streams from being used more than once, these attacks can be thwarted.
    Type: Application
    Filed: April 16, 2019
    Publication date: August 8, 2019
    Inventors: Martin Johns, Christoph Haefner
  • Patent number: 10320832
    Abstract: WebRTC is vulnerable to malicious JavaScript, injected by cross-site scripting attacks or compromised or malicious script providers. Through these attacks, attackers can access a WebRTC connection and leak or monitor the audio and video data transmitted. By preventing modification of key WebRTC functions and preventing outgoing streams from being used more than once, these attacks can be thwarted.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: June 11, 2019
    Assignee: SAP SE
    Inventors: Martin Johns, Christoph Haefner
  • Patent number: 10242180
    Abstract: Systems and methods are provided herein for establishing a protection framework for a component. Identified assets of a component requiring protection from a potential attack are received. A list of assets is generated based on the identified assets. A protection framework is configured to include at least one defensive pattern to protect the list of assets against the potential attack. The protection framework is executed to establish a hardened boundary between the component and an attack surface of the component.
    Type: Grant
    Filed: January 11, 2017
    Date of Patent: March 26, 2019
    Assignee: SAP SE
    Inventors: Christoph Haefner, Martin Johns, Martin Haerterich
  • Publication number: 20180198807
    Abstract: A client comprising a web browser is provided. The client is configured to: run an application in the web browser, the application comprising a sensor including sensor JavaScript code, wherein running the application comprises executing the sensor JavaScript code as the first JavaScript code in the web browser to activate the sensor; and wherein the sensor is configured to: gather data with respect to the application at runtime; and check predetermined application-specific rules against the gathered data for detecting client-side attacks at runtime.
    Type: Application
    Filed: January 5, 2018
    Publication date: July 12, 2018
    Inventors: Martin Johns, Martin Haerterich, Christoph Haefner
  • Publication number: 20180196939
    Abstract: Systems and methods are provided herein for establishing a protection framework for a component. Identified assets of a component requiring protection from a potential attack are received. A list of assets is generated based on the identified assets. A protection framework is configured to include at least one defensive pattern to protect the list of assets against the potential attack. The protection framework is executed to establish a hardened boundary between the component and an attack surface of the component.
    Type: Application
    Filed: January 11, 2017
    Publication date: July 12, 2018
    Inventors: Christoph Haefner, Martin Johns, Martin Haerterich
  • Publication number: 20180167410
    Abstract: WebRTC is vulnerable to malicious JavaScript, injected by cross-site scripting attacks or compromised or malicious script providers. Through these attacks, attackers can access a WebRTC connection and leak or monitor the audio and video data transmitted. By preventing modification of key WebRTC functions and preventing outgoing streams from being used more than once, these attacks can be thwarted.
    Type: Application
    Filed: December 9, 2016
    Publication date: June 14, 2018
    Inventors: Martin Johns, Christoph Haefner