Patents by Inventor Felix Schuster
Felix Schuster has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240117068Abstract: The present invention concerns antigen binding proteins specifically binding melanoma associated antigen A (MAGE-A) protein-derived antigens. The invention in particular provides antigen binding proteins which specifically bind to the MAGE-A antigenic peptide comprising or consisting of SEQ ID NO: 1 in a complex with a major histocombatibility (MHC) protein. The antigen binding proteins of the invention contain, in particular, the complementary determining regions (CDRs) of novel engineered T cell receptors (TCRs) that specifically bind to said MAGE-A peptide/MHC complex. The antigen binding proteins of the invention are of use for the diagnosis, treatment and prevention of MAGE-A expressing cancerous diseases. Further provided are nucleic acids encoding the antigen binding proteins of the invention, vectors comprising these nucleic acids, recombinant cells expressing the antigen binding proteins and pharmaceutical compositions comprising the antigen binding proteins of the invention.Type: ApplicationFiled: December 13, 2023Publication date: April 11, 2024Inventors: Meike HUTT, Felix UNVERDORBEN, Sebastian BUNK, Dominik MAURER, Martin HOFMANN, Gabriele PSZOLLA, Sara YOUSEF, Claudia WAGNER, Frank SCHWOEBEL, Heiko SCHUSTER
-
Publication number: 20240092933Abstract: The present invention concerns antigen binding proteins directed against PRAME protein-derived antigens. The invention in particular provides antigen binding proteins which are specific for the tumor expressed antigen PRAME, wherein the tumor antigen comprises or consists of SEQ ID NO: 50 and is in a complex with a major histocompatibility complex (MHC) protein. The antigen binding proteins of the invention contain, in particular, the complementary determining regions (CDRs) of novel engineered T cell receptors (TCRs) that specifically bind to said PRAME peptide. The antigen binding proteins of the invention are for use in the diagnosis, treatment and prevention of PRAME expressing cancerous diseases. Further provided are nucleic acids encoding the antigen binding proteins of the invention, vectors comprising said nucleic acids, recombinant cells expressing the antigen binding proteins and pharmaceutical compositions comprising the antigen binding proteins of the invention.Type: ApplicationFiled: November 16, 2023Publication date: March 21, 2024Inventors: Gabriele PSZOLLA, Martin HOFMANN, Meike HUTT, Sebastian BUNK, Felix UNVERDORBEN, Frank SCHWOEBEL, Dominik MAURER, Maike JAWORSKI, Claudia WAGNER, Florian SCHWOERER, Heiko SCHUSTER
-
Publication number: 20220335120Abstract: In various examples there is a computing device in communication with at least one other computing device via a communications network. The computing device has a memory and a central processing unit having a trusted execution environment comprising trusted regions of the memory. The computing device has an operating system configured to create a memory mapping between a virtual address space of the memory and a memory of the at least one other computing device and to provide details of the memory mapping to the trusted execution environment. The trusted execution environment is configured to execute an application which is able to communicate with the other computing device directly using the memory mapping provided by the operating system.Type: ApplicationFiled: April 5, 2022Publication date: October 20, 2022Inventors: Alexander SHAMIS, Sylvan Wesley CLEBSCH, Felix SCHUSTER
-
Patent number: 11308203Abstract: In various examples there is a computing device in communication with at least one other computing device via a communications network. The computing device has a memory and a central processing unit having a trusted execution environment comprising trusted regions of the memory. The computing device has an operating system configured to create a memory mapping between a virtual address space of the memory and a memory of the at least one other computing device and to provide details of the memory mapping to the trusted execution environment. The trusted execution environment is configured to execute an application which is able to communicate with the other computing device directly using the memory mapping provided by the operating system.Type: GrantFiled: January 11, 2019Date of Patent: April 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Alexander Shamis, Sylvan Wesley Clebsch, Felix Schuster
-
Publication number: 20200226248Abstract: In various examples there is a computing device in communication with at least one other computing device via a communications network. The computing device has a memory and a central processing unit having a trusted execution environment comprising trusted regions of the memory. The computing device has an operating system configured to create a memory mapping between a virtual address space of the memory and a memory of the at least one other computing device and to provide details of the memory mapping to the trusted execution environment. The trusted execution environment is configured to execute an application which is able to communicate with the other computing device directly using the memory mapping provided by the operating system.Type: ApplicationFiled: January 11, 2019Publication date: July 16, 2020Inventors: Alexander SHAMIS, Sylvan Wesley CLEBSCH, Felix SCHUSTER
-
Patent number: 10565129Abstract: In various examples a compute node is described. The compute node has a central processing unit which implements a hardware transactional memory using at least one cache of the central processing unit. The compute node has a memory in communication with the central processing unit, the memory storing information comprising at least one of: code and data. The compute node has a processor which loads at least part of the information, from the memory into the cache. The processor executes transactions using the hardware transactional memory and at least the loaded information, such that the processor ensures that the loaded information remains in the cache until completion of the execution.Type: GrantFiled: June 29, 2017Date of Patent: February 18, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Silverio da Silva Costa, Daniel Gruss, Julian Lettner
-
Publication number: 20180341600Abstract: In various examples a compute node is described. The compute node has a central processing unit which implements a hardware transactional memory using at least one cache of the central processing unit. The compute node has a memory in communication with the central processing unit, the memory storing information comprising at least one of: code and data. The compute node has a processor which loads at least part of the information, from the memory into the cache. The processor executes transactions using the hardware transactional memory and at least the loaded information, such that the processor ensures that the loaded information remains in the cache until completion of the execution.Type: ApplicationFiled: June 29, 2017Publication date: November 29, 2018Inventors: Felix Schuster, Olga Ohrimenko, Istvan Haller, Manuel Silverio da Silva Costa, Daniel Gruss, Julian Lettner
-
Publication number: 20170372226Abstract: A multi-party privacy-preserving machine learning system is described which has a trusted execution environment comprising at least one protected memory region. An code loader at the system loads machine learning code, received from at least one of the parties, into the protected memory region. A data uploader uploads confidential data, received from at least one of the parties, to the protected memory region. The trusted execution environment executes the machine learning code using at least one data-oblivious procedure to process the confidential data and returns the result to at least one of the parties, where a data-oblivious procedure is a process where any patterns of memory accesses, patterns of disk accesses and patterns of network accesses are such that the confidential data cannot be predicted from the patterns.Type: ApplicationFiled: August 23, 2016Publication date: December 28, 2017Inventors: Manuel Silverio da Silva Costa, Cédric Alain Marie Christophe Fournet, Aastha Mehta, Sebastian Nowozin, Olga Ohrimenko, Felix Schuster, Kapil Vaswani
-
Patent number: 9792427Abstract: Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an embodiment each machine which processes data within the system provides a secure sub-system which is protected from other parts of the machine and which receives encrypted data and encrypted code, processes the data using the received code and outputs encrypted data. When establishing the secure sub-systems, keys are exchanged between the client and secure sub-systems and the secure sub-systems provide an attestation confirming the identity of the code running in the secure sub-systems and confirming that the code is running on genuine secure sub-systems. In another embodiment a data-flow computation system is described in which chunks of input data, each comprising an identifier, are authenticated/encrypted. The identifiers are used within the system to confirm that each chunk is processed exactly once.Type: GrantFiled: February 7, 2014Date of Patent: October 17, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Manuel Costa, Felix Schuster, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Antony Ian Taylor Rowstron
-
Publication number: 20150229619Abstract: Methods for enforcing confidentiality and integrity of code and data while running the code over the data in a distributed computing system are described. In an embodiment each machine which processes data within the system provides a secure sub-system which is protected from other parts of the machine and which receives encrypted data and encrypted code, processes the data using the received code and outputs encrypted data. When establishing the secure sub-systems, keys are exchanged between the client and secure sub-systems and the secure sub-systems provide an attestation confirming the identity of the code running in the secure sub-systems and confirming that the code is running on genuine secure sub-systems. In another embodiment a data-flow computation system is described in which chunks of input data, each comprising an identifier, are authenticated/encrypted. The identifiers are used within the system to confirm that each chunk is processed exactly once.Type: ApplicationFiled: February 7, 2014Publication date: August 13, 2015Inventors: Manuel Costa, Felix Schuster, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Antony Ian Taylor Rowstron