Patents by Inventor Franziska Geisert

Franziska Geisert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9424102
    Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.
    Type: Grant
    Filed: May 14, 2014
    Date of Patent: August 23, 2016
    Assignee: International Business Machines Corporation
    Inventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Publication number: 20160239667
    Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.
    Type: Application
    Filed: February 13, 2015
    Publication date: August 18, 2016
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Publication number: 20160241393
    Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.
    Type: Application
    Filed: November 14, 2015
    Publication date: August 18, 2016
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Patent number: 9329836
    Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.
    Type: Grant
    Filed: April 17, 2014
    Date of Patent: May 3, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D Notohardjono, Angel Nunez-Mencias
  • Publication number: 20160105429
    Abstract: Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server within a common network. The method includes: providing a network address of the server in persistent memory of the hardware security module; providing an encrypted secret entity in the persistent memory of the hardware security module; providing a private key in the persistent memory of the hardware security module; and based on the hardware security module being connectable to one of the computer systems, the method includes: establishing a secure connection between the hardware security module and the server; retrieving, via the secure connection, a wrapping key from the server and storing it in volatile memory of the hardware security module; and decrypting the encrypted secret entity with the wrapping key and storing the decrypted secret entity in the volatile memory of the hardware security module.
    Type: Application
    Filed: October 6, 2015
    Publication date: April 14, 2016
    Inventors: Volker M.M. BOENISCH, Reinhard BUENDGEN, Franziska GEISERT, Jakob C. LANG, Mareike LATTERMANN, Angel NUNEZ-MENCIAS
  • Publication number: 20160092243
    Abstract: Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM.
    Type: Application
    Filed: December 18, 2014
    Publication date: March 31, 2016
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Publication number: 20160092687
    Abstract: Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Publication number: 20160077804
    Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.
    Type: Application
    Filed: November 23, 2015
    Publication date: March 17, 2016
    Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
  • Publication number: 20160077805
    Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collects information theoretic entropy data from the measurement of the vibration sensors. The data is then filtered and added to an entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.
    Type: Application
    Filed: November 23, 2015
    Publication date: March 17, 2016
    Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
  • Publication number: 20160055039
    Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.
    Type: Application
    Filed: November 3, 2015
    Publication date: February 25, 2016
    Inventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Publication number: 20150331717
    Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.
    Type: Application
    Filed: May 14, 2014
    Publication date: November 19, 2015
    Applicant: International Business Machines Corporation
    Inventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
  • Patent number: 9176804
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Grant
    Filed: June 27, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Patent number: 9176805
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: November 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Publication number: 20150301803
    Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.
    Type: Application
    Filed: April 17, 2014
    Publication date: October 22, 2015
    Applicant: International Business Machines Corporation
    Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lettermann, Budy D Notohardjono, Angel Nunez-Mencias
  • Publication number: 20150304107
    Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collects information theoretic entropy data from the measurement of the vibration sensors. The data is then filtered and added to an entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.
    Type: Application
    Filed: April 17, 2014
    Publication date: October 22, 2015
    Applicant: International Business Machines Corporation
    Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
  • Patent number: 9013403
    Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: April 21, 2015
    Assignee: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer
  • Publication number: 20150006822
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 1, 2015
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Publication number: 20150006963
    Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.
    Type: Application
    Filed: September 24, 2013
    Publication date: January 1, 2015
    Applicant: International Business Machines Corporation
    Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
  • Publication number: 20120326979
    Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer