Patents by Inventor Franziska Geisert
Franziska Geisert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9424102Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.Type: GrantFiled: May 14, 2014Date of Patent: August 23, 2016Assignee: International Business Machines CorporationInventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Publication number: 20160239667Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.Type: ApplicationFiled: February 13, 2015Publication date: August 18, 2016Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Publication number: 20160241393Abstract: At least one hardware security module out of a plurality of hardware security modules is assigned to a guest system. The at least one hardware security module out of the plurality of hardware security modules is configured with a master key. A data pattern is used for a challenge protocol adapted to prove that the at least one hardware security module out of the plurality of hardware security modules is configured with the master key. The at least one hardware security module including the master key is assigned to the guest system based on a positive outcome of the challenge protocol.Type: ApplicationFiled: November 14, 2015Publication date: August 18, 2016Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Patent number: 9329836Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.Type: GrantFiled: April 17, 2014Date of Patent: May 3, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D Notohardjono, Angel Nunez-Mencias
-
Publication number: 20160105429Abstract: Methods are provided for using a hardware module connectable to multiple computer systems, where the multiple computer systems are connectable to a server within a common network. The method includes: providing a network address of the server in persistent memory of the hardware security module; providing an encrypted secret entity in the persistent memory of the hardware security module; providing a private key in the persistent memory of the hardware security module; and based on the hardware security module being connectable to one of the computer systems, the method includes: establishing a secure connection between the hardware security module and the server; retrieving, via the secure connection, a wrapping key from the server and storing it in volatile memory of the hardware security module; and decrypting the encrypted secret entity with the wrapping key and storing the decrypted secret entity in the volatile memory of the hardware security module.Type: ApplicationFiled: October 6, 2015Publication date: April 14, 2016Inventors: Volker M.M. BOENISCH, Reinhard BUENDGEN, Franziska GEISERT, Jakob C. LANG, Mareike LATTERMANN, Angel NUNEZ-MENCIAS
-
Publication number: 20160092243Abstract: Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM.Type: ApplicationFiled: December 18, 2014Publication date: March 31, 2016Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Publication number: 20160092687Abstract: Trusted firmware on a host server is used for managing access to a hardware security module (HSM) connected to the host server. The HSM stores confidential information associated with an operating system. As part of access management, the firmware detects a boot device identifier associated with a boot device configured to boot the operating system on the host server. The firmware then receives a second boot device identifier from the HSM. The boot device identifier and the second boot device identifier are then compared by the firmware. Based on the comparison, the firmware determines that the boot device identifier matches with the second boot device identifier. Based on this determination, the firmware grants the operating system access to the HSM.Type: ApplicationFiled: September 30, 2014Publication date: March 31, 2016Inventors: Volker M. M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Publication number: 20160077804Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.Type: ApplicationFiled: November 23, 2015Publication date: March 17, 2016Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
-
Publication number: 20160077805Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collects information theoretic entropy data from the measurement of the vibration sensors. The data is then filtered and added to an entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.Type: ApplicationFiled: November 23, 2015Publication date: March 17, 2016Inventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
-
Publication number: 20160055039Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.Type: ApplicationFiled: November 3, 2015Publication date: February 25, 2016Inventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Publication number: 20150331717Abstract: In an approach to grouping tasks initialized by a first user, one or more computer processors receive a first task initialization by a first user. The one or more computer processors determine whether one or more additional tasks contained in one or more task groups are in use by the first user. Responsive to determining one or more additional tasks contained in one or more task groups are in use, the one or more computer processors determine whether the first task is related to at least one task of the one or more additional tasks. Responsive to determining the first task is related to at least one task of the one or more additional tasks, the one or more computer processors add the first task to the task group containing the at least one related task of the one or more additional tasks.Type: ApplicationFiled: May 14, 2014Publication date: November 19, 2015Applicant: International Business Machines CorporationInventors: Volker M. Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias
-
Patent number: 9176804Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: GrantFiled: June 27, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Patent number: 9176805Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: GrantFiled: September 24, 2013Date of Patent: November 3, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Publication number: 20150301803Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collect entropy data from the measurements of the vibration sensors. The data is then filtered and sent via secure connection to a second machine to be added to the second machine's entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.Type: ApplicationFiled: April 17, 2014Publication date: October 22, 2015Applicant: International Business Machines CorporationInventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lettermann, Budy D Notohardjono, Angel Nunez-Mencias
-
Publication number: 20150304107Abstract: Generating a pool of random numbers for use by computer applications. Vibration sensors are placed throughout a machine and collects information theoretic entropy data from the measurement of the vibration sensors. The data is then filtered and added to an entropy pool. Applications needing a random number may acquire a number from the pool. A method, computer program product and system to generate the pool are provided.Type: ApplicationFiled: April 17, 2014Publication date: October 22, 2015Applicant: International Business Machines CorporationInventors: Volker Boenisch, Reinhard Buendgen, Franziska Geisert, Jakob Lang, Mareike Lattermann, Budy D. Notohardjono, Angel Nunez-Mencias
-
Patent number: 9013403Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.Type: GrantFiled: June 15, 2012Date of Patent: April 21, 2015Assignee: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer
-
Publication number: 20150006822Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: ApplicationFiled: June 27, 2013Publication date: January 1, 2015Inventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Publication number: 20150006963Abstract: Reducing memory dump data size by: (i) receiving a memory dump data including a set of stack(s), including at least a first stack which includes a current stack portion; (ii) removing from the memory dump data a first removed data portion that comes from a portion of the first stack to yield an optimized memory dump data; (iii) determining respective ranking values for a plurality of ranked data portions from the set of stacks; and (iv) selecting a ranked data portion from the current stack portion of the first stack to be a first removed data portion based, at least in part, upon the ranking values.Type: ApplicationFiled: September 24, 2013Publication date: January 1, 2015Applicant: International Business Machines CorporationInventors: Franziska Geisert, Jakob C. Lang, Angel Nunez Mencias, Jochen Schweflinghaus
-
Publication number: 20120326979Abstract: A method is provided for remote controlling of mouse cursor functions of a computer device is disclosed. The method includes: tracking movement of a handheld pointing device in a three dimensional monitoring space based on a directional carrier sent by the handheld pointing device; modulating the directional carrier with a pulse pattern based on a corresponding manual operation action at the handheld pointing device; converting the tracked movement of the handheld pointing device in corresponding movement information; converting the movement information of the handheld pointing device in valid desktop coordinates for the computer device and moving a mouse cursor to these coordinates; demodulating the directional carrier and evaluating the pulse pattern in order to determine a corresponding manual operating action at the handheld pointing device; and taking corresponding action if a defined manual operating action at the handheld pointing device is determined.Type: ApplicationFiled: June 15, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Franziska Geisert, Jakob C. Lang, Andreas O. Loesche, Florian Schaefer