Patents by Inventor Guenter Karjoth
Guenter Karjoth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10225258Abstract: A method for controlling access to a resource of an owner of the resource is provided. The owner can be a user of a resource computer system. The access control can be based on social network data of a social network system and/or on an owner token relating to the owner or a requester token relating to a requester requesting access to the resource and an access control policy. The owner token and the requester token can be received by the system to determine by the social networking system whether access to the resource is to be granted based on the content of the owner token and the requester token. A social network identity of the owner and a social network identity of the requester may only be determinable by the social network system.Type: GrantFiled: October 31, 2014Date of Patent: March 5, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Camenisch, Guenter Karjoth, Gregory Neven, Franz-Stefan Preiss
-
Patent number: 10154038Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: GrantFiled: November 28, 2017Date of Patent: December 11, 2018Assignee: International Business Machines CorporationInventors: Thomas R. Gross, Guenter Karjoth
-
Publication number: 20180091512Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: ApplicationFiled: November 28, 2017Publication date: March 29, 2018Inventors: Thomas R. Gross, Guenter Karjoth
-
Patent number: 9882905Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: GrantFiled: October 24, 2014Date of Patent: January 30, 2018Assignee: International Business Machines CorporationInventors: Thomas R. Gross, Guenter Karjoth
-
Publication number: 20160269416Abstract: “A method for controlling access to a resource of an owner of the resource is provided. The owner can be a user of a resource computer system. The access control can be based on social network data of a social network system and/or on an owner token relating to the owner or, a requester token relating to a requester requesting access to the resource and an access control policy. The owner token and the requester token can be received by the system to determine by the social networking system whether access to the resource is to be granted based on the content of the owner token and the requester token. A social network identity of the owner and a social network identity of the requester may only be determinable by the social network system.Type: ApplicationFiled: October 31, 2014Publication date: September 15, 2016Inventors: Jan Camenisch, Guenter Karjoth, Gregory Neven, Franz-Stefan Preiss
-
Publication number: 20150046973Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: ApplicationFiled: October 24, 2014Publication date: February 12, 2015Inventors: Thomas R. Gross, Guenter Karjoth
-
Patent number: 8875224Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: GrantFiled: May 1, 2012Date of Patent: October 28, 2014Assignee: International Business Machines CorporationInventors: Thomas R. Gross, Guenter Karjoth
-
Patent number: 8826455Abstract: Given a new user U or a user whose role in the organization changed, an automated method of the present disclosure in one aspect determines the new or revised access permissions the user should have. In one aspect, the method of the present disclosure automatically determines access rights based on the access rights held by similar users. This general idea, including a formalization of similarity between users, the details of how access rights are determined, and an algorithm to test if the presented methods are safe to use are provided.Type: GrantFiled: February 17, 2009Date of Patent: September 2, 2014Assignee: International Business Machines CorporationInventors: Klaus Julisch, Guenter Karjoth
-
Patent number: 8786405Abstract: The present invention relates to a privacy method for responding to read request. The present invention further relates to a device for generating a response signal and a computer program product. Methods and systems in accordance with embodiments of the invention validate, whether a read request is directed at a target tag to be protected, and, upon a match, respond to the read request by sending a response signal.Type: GrantFiled: November 23, 2007Date of Patent: July 22, 2014Assignee: International Business Machines CorporationInventors: Guenter Karjoth, Christopher Mark Kenyon, Luke James O'Connor
-
Patent number: 8688591Abstract: A system for anonymous separation of duties with credentials includes an identity provider, the identity provider configured to issue anonymous credentials to a user based on one or more attributes of the user; a service provider, the service provider configured to issue a pseudonym to the user based on the user's anonymous credentials, and to associate the user's pseudonym with a step of an instance of a business process hosted on the service provider, the step being completed by the user; and an auditor, the auditor configured to determine if the completion of the step of the instance of the business process by the user is compliant with a separation of duties policy.Type: GrantFiled: August 6, 2009Date of Patent: April 1, 2014Assignee: International Business Machines CorporationInventors: Jan L. Camenisch, Christopher J. Giblin, Thomas R. Gross, Guenter Karjoth
-
Patent number: 8566906Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: GrantFiled: March 31, 2011Date of Patent: October 22, 2013Assignee: International Business Machines CorporationInventors: Thomas R. Gross, Guenter Karjoth
-
Patent number: 8458764Abstract: A computer implemented access control system, the system includes a database for storing a serialized version of an XACML permissions hierarchy. The system also includes a memory for storing an original version of the XACML permissions hierarchy, and an XACML serialization engine configured to convert the XACML permissions hierarchy into the serialized version, wherein the serialized version contains a listing of at least a portion of the predicates possible in the XACML permission hierarchy and the effect on each of the portion of the predicates.Type: GrantFiled: April 7, 2009Date of Patent: June 4, 2013Assignee: International Business Machines CorporationInventors: Guenter Karjoth, Andreas Schade
-
Publication number: 20120296684Abstract: A computer-implemented method for assigning a task in a workflow system to a user of the workflow system includes receiving the task; determining, by a computer, a set of users who are authorized to perform the received task; selecting from the set a user who has the lowest flexibility to perform other tasks in the workflow system; and assigning the task to the selected user.Type: ApplicationFiled: July 31, 2012Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Samuel J. Burri, Guenter Karjoth
-
Publication number: 20120216247Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: ApplicationFiled: May 1, 2012Publication date: August 23, 2012Inventors: Thomas R. Gross, Guenter Karjoth
-
Publication number: 20120203588Abstract: A computer-implemented method for assigning a task in a workflow system to a user of the workflow system includes receiving the task; determining, by a computer, a set of users who are authorized to perform the received task; selecting from the set a user who has the lowest flexibility to perform other tasks in the workflow system; and assigning the task to the selected user.Type: ApplicationFiled: February 1, 2012Publication date: August 9, 2012Applicant: International Business Machines CorporationInventors: Samuel J. Burri, Guenter Karjoth
-
Patent number: 8122484Abstract: Methods and apparatus are provided for generating an access control policy data structure for a single-authorization-query access control system from a source policy data structure of an access control system in which primary authorizations can be subject to auxiliary constraints. Authorizations in the data structures are defined in terms of subject, resource and action elements. For each resource in a set of resources in the source policy data structure, the data structure is analyzed to identify primary authorizations relating to that resource. For each primary authorization, policy data which represents a policy defining an access rule expressing that authorization is generated and stored in system memory and analyzed to identify any auxiliary constraints associated with that primary authorization. For each auxiliary constraint so identified, policy data is generated and stored in system memory.Type: GrantFiled: April 11, 2008Date of Patent: February 21, 2012Assignee: International Business Machines CorporationInventors: Guenter Karjoth, Elsie A. Van Herreweghen
-
Publication number: 20110247046Abstract: A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with a user request to access a resource and for the request to be granted in absence of an authorization determinative of the request. If the structure does not define an authorization for a request to access a resource, it is determined whether the structure defines a dynamic access requirement determinative for the request, and if so, whether to grant the request in accordance with the respective set of attributes associated with the request. For at least one request, after determining whether to grant the request, a dynamic authorization relating to authorization to access the resource within the request is added to the structure.Type: ApplicationFiled: March 31, 2011Publication date: October 6, 2011Inventors: Thomas R. Gross, Guenter Karjoth
-
Patent number: 8009016Abstract: The present invention relates to a tag identification system comprising: a plurality of tags, each tag being identifiable by an associated tag identifier, and at least one tag comprising at least one link to at least one other tag in said group.Type: GrantFiled: December 17, 2007Date of Patent: August 30, 2011Assignee: International Business Machines CorporationInventors: Michael Backes, Thomas R. Gross, Guenter Karjoth
-
Publication number: 20110035241Abstract: A system for anonymous separation of duties with credentials includes an identity provider, the identity provider configured to issue anonymous credentials to a user based on one or more attributes of the user; a service provider, the service provider configured to issue a pseudonym to the user based on the user's anonymous credentials, and to associate the user's pseudonym with a step of an instance of a business process hosted on the service provider, the step being completed by the user; and an auditor, the auditor configured to determine if the completion of the step of the instance of the business process by the user is compliant with a separation of duties policy.Type: ApplicationFiled: August 6, 2009Publication date: February 10, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Camenisch, Christopher J. Giblin, Thomas R. Gross, Guenter Karjoth
-
Patent number: 7847696Abstract: For detecting a blocker RFID tag, the following steps are conducted. First, a random identifier of a given bit length is created. Alternatively, an identifier is selected out of a probing set, which is stored on a data storage device. The probing set comprises of identifiers, which are not being used as identifiers for a given set of RFID tags. In a second step, a response from all RFID tags is requested having an identifier matching the random identifier or, respectively, the selected identifier. In a third step, it is determined, depending on receiving or not receiving a response, whether the blocker RFID tag is present.Type: GrantFiled: August 12, 2008Date of Patent: December 7, 2010Assignee: International Business Machines CorporationInventors: Guenter Karjoth, Luke O'Connor, Michael Backes