Patents by Inventor Dirk Husemann
Dirk Husemann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240133805Abstract: In a method for determining the phase and/or refractive index of a region of an object, the object region is illuminated with coherent or partly coherent light and is imaged into the image plane a number of times with different imaging properties and is recorded in order to obtain a plurality of intensity recordings of the object region. The phase and/or refractive index determination is carried out based upon the plurality of intensity recordings. The different imaging properties differ at least in terms of different phase shifts which are additionally introduced into the imaging beam path, and which are generated differently than by changing the focusing when carrying out the recordings. The different phase shifts which are additionally introduced into the imaging beam path are effected by introducing at least one optical element into the objective and/or manipulating at least one optical element of the objective.Type: ApplicationFiled: October 11, 2023Publication date: April 25, 2024Inventors: Dirk SEIDEL, Christoph HUSEMANN, Lars STOPPE
-
Patent number: 8769618Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: GrantFiled: May 24, 2012Date of Patent: July 1, 2014Assignee: International Business Machines CorporationInventors: Dirk Husemann, Michael Elton Nidd
-
Patent number: 8473551Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.Type: GrantFiled: May 25, 2012Date of Patent: June 25, 2013Assignee: International Business Machines CorporationInventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
-
Patent number: 8285786Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.Type: GrantFiled: August 29, 2008Date of Patent: October 9, 2012Assignee: International Business Machines CorporationInventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
-
Publication number: 20120240199Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.Type: ApplicationFiled: May 25, 2012Publication date: September 20, 2012Applicant: International Business Machines CorporationInventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
-
Patent number: 8272038Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: GrantFiled: May 19, 2008Date of Patent: September 18, 2012Assignee: International Business Machines CorporationInventors: Dirk Husemann, Micheal Elton Nidd
-
Publication number: 20120233669Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: ApplicationFiled: May 24, 2012Publication date: September 13, 2012Applicant: International Business Machines CorporationInventors: Dirk Husemann, Michael Elton Nidd
-
Patent number: 8219921Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.Type: GrantFiled: July 23, 2008Date of Patent: July 10, 2012Assignee: International Business Machines CorporationInventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
-
Patent number: 8132235Abstract: A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.Type: GrantFiled: April 3, 2008Date of Patent: March 6, 2012Assignee: International Business Machines CorporationInventors: Anthony Bussani, Dirk Husemann, Ansgar Schmidt, Dieter Sommer
-
Patent number: 8126811Abstract: There is provided a method and a system for documenting a transfer of authority of control for a container from a first entity of a transportation chain to a second entity of the transportation chain. The first entity transfers an electronic container control certificate to an electronic seal of the respective container, which electronic container control certificate comprises a cryptographic key associated to the second entity, and which container control certificate is digitally signed by the first entity. The container control certificate is stored in a log of the electronic seal.Type: GrantFiled: August 20, 2004Date of Patent: February 28, 2012Assignee: International Business Machines CorporationInventors: Francois Dolivo, Reto J. Hermann, Dirk Husemann, Michael E. Nidd
-
Publication number: 20110029885Abstract: Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation.Type: ApplicationFiled: July 30, 2009Publication date: February 3, 2011Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Dirk Husemann, Dieter Sommer
-
Publication number: 20100318798Abstract: A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with a challenge, a response step for receiving a response to the challenge, an equality check step for determining whether the received response corresponds to an expected response, a signature step for providing a signature for the message, using a cryptographic key and the result of the equality check step, and a send step for sending the signed message via the first application from the mobile device to a backend system.Type: ApplicationFiled: December 30, 2008Publication date: December 16, 2010Applicant: International Business Machines CorporationInventors: Carl Binding, Francois Bernard Dolivo, Reto Josef Hermann, Dirk Husemann
-
Patent number: 7826412Abstract: Systems, methods and computer products for establishing a mesh-network consisting of wireless personal area network (WPAN) having a large number of nodes. Exemplary embodiments include a gradient-driven mesh-network establishment method, including switching on a plurality of nodes in a vicinity of the wireless personal area network, detecting an acknowledgment signal via a wireless personal area network signal, querying for at least one or a resource and a physical quantity, selecting a subset of the plurality of nodes and instructing the subset of the plurality of nodes to send out a low power radio transceiver DISCOVER squirt signal to a neighborhood associated with the subset of the plurality of nodes, wherein nodes exclusive of the subset of the plurality of nodes turn off in response to an expiration of a time-out period.Type: GrantFiled: August 31, 2007Date of Patent: November 2, 2010Assignee: International Business Machines CorporationInventors: Carl Binding, Francois B. Dolivo, Reto J. Hermann, Dirk Husemann, Michael E. Nidd
-
Patent number: 7757019Abstract: A mobile hub is proposed, the mobile hub includes a circular buffer for storing events, a timer for monitoring the storage period of an event stored in the buffer, and an event manager designed for discarding an event from the buffer when a time-out of the associated timer is exceeded. As no event can block the buffer any more a small-scale buffer can be used for the mobile hub.Type: GrantFiled: May 25, 2006Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: Dirk Husemann, Michael E. Nidd, Jonathan T. Waddilove
-
Publication number: 20100058443Abstract: Methods and apparatus for forming and presenting confidential presentations within a computing environment associated with a virtual application are presented. For example, a method for forming a confidential presentation includes obtaining a correspondence indicator from an asset server, obtaining a first texture from the asset server, and overlaying the first texture onto a first object. The correspondence indicator indicates the first texture corresponds to the first object. The first object is within the computing environment associated with the virtual application. The first texture and the asset server are inaccessible by the computing environment associated with the virtual application. The confidential presentation comprises the first texture.Type: ApplicationFiled: August 29, 2008Publication date: March 4, 2010Inventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Dieter M. Sommer
-
Publication number: 20100040293Abstract: In one embodiment, a computer-implemented method for authentication by kinematic pattern match is provided. The computer implemented method prompts a user for a kinematic input, receives an element of a kinematic pattern to form a set of received elements, and determines whether there are additional elements of the kinematic pattern. Responsive to a determination that there are no additional elements of the kinematic pattern, forms a kinematic pattern from the set of received elements and computes a signature from the set of received elements. The computer implemented method further determines whether the signature matches a predetermined value, and responsive to a determination that the signature matches a predetermined value, sends an authentication signal.Type: ApplicationFiled: August 12, 2008Publication date: February 18, 2010Applicant: International Business Machines CorporationInventors: Reto Josef Hermann, Dirk Husemann, Andreas Schade
-
Publication number: 20100023889Abstract: A method for receiving input from a user of a virtual world, the method including: interacting with an object displayed in the virtual world; displaying another object in the virtual world in response to the interacting, the another object adapted to interact with the user; displaying at least one of a user specific label and a service specific label in place of a generic label associated with the another object; selecting the another object; and receiving the generic label and the at least one of the user specific label and the service specific label as the input in response to the selecting.Type: ApplicationFiled: July 23, 2008Publication date: January 28, 2010Applicant: International Business Machines CorporationInventors: Anthony Bussani, Jan L. Camenisch, Thomas R. Gross, Dirk Husemann, Ansgar Marco Schmidt, Dieter Sommer
-
Publication number: 20090315916Abstract: A specification of a set of objects associated with at least one virtual world is obtained. The objects are laid out in a three-dimensional virtual representation. An on-the-fly virtual place is created in the virtual world, based on the layout.Type: ApplicationFiled: June 24, 2008Publication date: December 24, 2009Applicant: International Business Machines CorporationInventors: Dirk Husemann, Samuel Muller, Michael Elton Nidd, Matthias Schunter, Diego M. Zamboni
-
Publication number: 20090288159Abstract: A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.Type: ApplicationFiled: May 19, 2008Publication date: November 19, 2009Inventors: Dirk Husemann, Micheal Elton Nidd
-
Patent number: RE40985Abstract: Methods, system and apparatus are provided for advertising service offerings in a communication system. An example embodiment comprises at least one device. A first device broadcasts a message of a first type, chooses a value for a time limit and listens for a message sent by a second device. If no message has been received before time limit, elapse, it again broadcasts a message of a first type. Otherwise, the message received from said second device is analyzed and if said message includes valid information about said first device chooses a value for the time limit. However, if said message received does not include valid service description about said first device, a message of a second type is broadcast. This reduces useless broadcast of a complete service list. Broadcast may be initiated more often and, service discovery for new devices coming into proximity takes less time.Type: GrantFiled: October 31, 2007Date of Patent: November 17, 2009Assignee: Wistron CorporationInventors: Reto Hermann, Dirk Husemann, Michael Moser, Michael Elton Nidd