Patents by Inventor Dirk Husemann

Dirk Husemann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240133805
    Abstract: In a method for determining the phase and/or refractive index of a region of an object, the object region is illuminated with coherent or partly coherent light and is imaged into the image plane a number of times with different imaging properties and is recorded in order to obtain a plurality of intensity recordings of the object region. The phase and/or refractive index determination is carried out based upon the plurality of intensity recordings. The different imaging properties differ at least in terms of different phase shifts which are additionally introduced into the imaging beam path, and which are generated differently than by changing the focusing when carrying out the recordings. The different phase shifts which are additionally introduced into the imaging beam path are effected by introducing at least one optical element into the objective and/or manipulating at least one optical element of the objective.
    Type: Application
    Filed: October 11, 2023
    Publication date: April 25, 2024
    Inventors: Dirk SEIDEL, Christoph HUSEMANN, Lars STOPPE
  • Patent number: 8769618
    Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
    Type: Grant
    Filed: May 24, 2012
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dirk Husemann, Michael Elton Nidd
  • Patent number: 8473551
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: June 25, 2013
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Patent number: 8285786
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Publication number: 20120240199
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 20, 2012
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Patent number: 8272038
    Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
    Type: Grant
    Filed: May 19, 2008
    Date of Patent: September 18, 2012
    Assignee: International Business Machines Corporation
    Inventors: Dirk Husemann, Micheal Elton Nidd
  • Publication number: 20120233669
    Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
    Type: Application
    Filed: May 24, 2012
    Publication date: September 13, 2012
    Applicant: International Business Machines Corporation
    Inventors: Dirk Husemann, Michael Elton Nidd
  • Patent number: 8219921
    Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.
    Type: Grant
    Filed: July 23, 2008
    Date of Patent: July 10, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Patent number: 8132235
    Abstract: A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
    Type: Grant
    Filed: April 3, 2008
    Date of Patent: March 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Anthony Bussani, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
  • Patent number: 8126811
    Abstract: There is provided a method and a system for documenting a transfer of authority of control for a container from a first entity of a transportation chain to a second entity of the transportation chain. The first entity transfers an electronic container control certificate to an electronic seal of the respective container, which electronic container control certificate comprises a cryptographic key associated to the second entity, and which container control certificate is digitally signed by the first entity. The container control certificate is stored in a log of the electronic seal.
    Type: Grant
    Filed: August 20, 2004
    Date of Patent: February 28, 2012
    Assignee: International Business Machines Corporation
    Inventors: Francois Dolivo, Reto J. Hermann, Dirk Husemann, Michael E. Nidd
  • Publication number: 20110029885
    Abstract: Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation.
    Type: Application
    Filed: July 30, 2009
    Publication date: February 3, 2011
    Applicant: International Business Machines Corporation
    Inventors: Jan Leonhard Camenisch, Dirk Husemann, Dieter Sommer
  • Publication number: 20100318798
    Abstract: A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with a challenge, a response step for receiving a response to the challenge, an equality check step for determining whether the received response corresponds to an expected response, a signature step for providing a signature for the message, using a cryptographic key and the result of the equality check step, and a send step for sending the signed message via the first application from the mobile device to a backend system.
    Type: Application
    Filed: December 30, 2008
    Publication date: December 16, 2010
    Applicant: International Business Machines Corporation
    Inventors: Carl Binding, Francois Bernard Dolivo, Reto Josef Hermann, Dirk Husemann
  • Patent number: 7826412
    Abstract: Systems, methods and computer products for establishing a mesh-network consisting of wireless personal area network (WPAN) having a large number of nodes. Exemplary embodiments include a gradient-driven mesh-network establishment method, including switching on a plurality of nodes in a vicinity of the wireless personal area network, detecting an acknowledgment signal via a wireless personal area network signal, querying for at least one or a resource and a physical quantity, selecting a subset of the plurality of nodes and instructing the subset of the plurality of nodes to send out a low power radio transceiver DISCOVER squirt signal to a neighborhood associated with the subset of the plurality of nodes, wherein nodes exclusive of the subset of the plurality of nodes turn off in response to an expiration of a time-out period.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: November 2, 2010
    Assignee: International Business Machines Corporation
    Inventors: Carl Binding, Francois B. Dolivo, Reto J. Hermann, Dirk Husemann, Michael E. Nidd
  • Patent number: 7757019
    Abstract: A mobile hub is proposed, the mobile hub includes a circular buffer for storing events, a timer for monitoring the storage period of an event stored in the buffer, and an event manager designed for discarding an event from the buffer when a time-out of the associated timer is exceeded. As no event can block the buffer any more a small-scale buffer can be used for the mobile hub.
    Type: Grant
    Filed: May 25, 2006
    Date of Patent: July 13, 2010
    Assignee: International Business Machines Corporation
    Inventors: Dirk Husemann, Michael E. Nidd, Jonathan T. Waddilove
  • Publication number: 20100058443
    Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.
    Type: Application
    Filed: August 29, 2008
    Publication date: March 4, 2010
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
  • Publication number: 20100040293
    Abstract: In one embodiment, a computer-implemented method for authentication by kinematic pattern match is provided. The computer implemented method prompts a user for a kinematic input, receives an element of a kinematic pattern to form a set of received elements, and determines whether there are additional elements of the kinematic pattern. Responsive to a determination that there are no additional elements of the kinematic pattern, forms a kinematic pattern from the set of received elements and computes a signature from the set of received elements. The computer implemented method further determines whether the signature matches a predetermined value, and responsive to a determination that the signature matches a predetermined value, sends an authentication signal.
    Type: Application
    Filed: August 12, 2008
    Publication date: February 18, 2010
    Applicant: International Business Machines Corporation
    Inventors: Reto Josef Hermann, Dirk Husemann, Andreas Schade
  • Publication number: 20100023889
    Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.
    Type: Application
    Filed: July 23, 2008
    Publication date: January 28, 2010
    Applicant: International Business Machines Corporation
    Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Marco Schmidt, Dieter Sommer
  • Publication number: 20090315916
    Abstract: A specification of a set of objects associated with at least one virtual world is obtained. The objects are laid out in a three-dimensional virtual representation. An on-the-fly virtual place is created in the virtual world, based on the layout.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 24, 2009
    Applicant: International Business Machines Corporation
    Inventors: Dirk Husemann, Samuel Muller, Michael Elton Nidd, Matthias Schunter, Diego M. Zamboni
  • Publication number: 20090288159
    Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
    Type: Application
    Filed: May 19, 2008
    Publication date: November 19, 2009
    Inventors: Dirk Husemann, Micheal Elton Nidd
  • Patent number: RE40985
    Abstract: Methods, system and apparatus are provided for advertising service offerings in a communication system. An example embodiment comprises at least one device. A first device broadcasts a message of a first type, chooses a value for a time limit and listens for a message sent by a second device. If no message has been received before time limit, elapse, it again broadcasts a message of a first type. Otherwise, the message received from said second device is analyzed and if said message includes valid information about said first device chooses a value for the time limit. However, if said message received does not include valid service description about said first device, a message of a second type is broadcast. This reduces useless broadcast of a complete service list. Broadcast may be initiated more often and, service discovery for new devices coming into proximity takes less time.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: November 17, 2009
    Assignee: Wistron Corporation
    Inventors: Reto Hermann, Dirk Husemann, Michael Moser, Michael Elton Nidd