Patents by Inventor Jörg Abendroth
Jörg Abendroth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8966568Abstract: A method and a device for data processing are provided comprising a first instance comprising at least one local trusted unit (LTU) and a local trust manager (LTM), the method comprising the step: The local trust manager provides a policy related information to the at least one local trusted unit and/or to a second instance.Type: GrantFiled: April 29, 2008Date of Patent: February 24, 2015Assignee: Nokia Solutions and Networks OyInventors: Joerg Abendroth, Michael Marhoefer, Manfred Schaefer
-
Patent number: 8683604Abstract: A method of providing data in response to a search request comprises the steps of a social networking website receiving the search request to provide a pseudonym associated with the real name; the social networking website determining that the search request is for a pseudonym which, within its database, is not associated with the real name; the social networking website referring the search request to a identity management server which contains an association between the pseudonym and the real name; the identity management server determining the pseudonym which is associated with the real name; and the identity management server providing an information item which is related to the pseudonym.Type: GrantFiled: June 30, 2009Date of Patent: March 25, 2014Assignee: Nokia Solutions and Networks OyInventors: Joerg Abendroth, Markus Bauer-Hermann, Robert Seidl
-
Publication number: 20130031180Abstract: A template is described that can be applied to user attribute data in order to generate a pseudonym/virtual identity for the user. The pseudonym includes a subset of the user's overall user attributes. The invention also enables a user to determine whether a particular pseudonym meets the requirements of a template by checking the pseudonym against a template provided, for example, by a service provider.Type: ApplicationFiled: April 16, 2010Publication date: January 31, 2013Applicant: NOKIA SIEMENS NETWORKS OYInventors: Joerg Abendroth, Markus Bauer-Hermann, Robert Seidl
-
Publication number: 20120311663Abstract: The present invention relates to an improved identity management in which a first authentication request is received from a service provider where the first authentication request requests authentication attributes relating to a user. A second authentication request is transmitted to an identity provider and a first authentication response is received from the identity provider wherein the first authentication response includes at least one authentication attribute relating to said user. At least one predefined policy is applied to the first authentication response to generate a second authentication response and the second authentication response is transmitted to the service provider.Type: ApplicationFiled: February 5, 2010Publication date: December 6, 2012Applicant: NOKIA SIEMENS NETWORKS OYInventors: Robert Seidl, Joerg Abendroth, Gerald Meyer, Markus Bauer-Hermann
-
Publication number: 20120250658Abstract: A method, a device, and a computer program product detect changes to the connection of a device, such as a mobile device to a network, and initiate at least one measure when changes are detected. Changes might be caused by malicious users or malicious mobile phone SW in order to perform Denial of Service (DoS) attacks to the network. Those changes could be, for example, frequent handover actions, frequent attach/detach actions or frequent Packet Data Protocol context activation, deactivation or modification actions initiated by a mobile device or a group of mobile devices. The changes to the connection are detected by checking if parameters related to the mobile device, or related to network elements, violate defined policy rules. The detection itself is done in a network element, such as a core network element.Type: ApplicationFiled: December 15, 2009Publication date: October 4, 2012Applicant: NOKIA SIEMENS NETWORKS OYInventors: Jochen Eisl, Joerg Abendroth, Jari Pekka Mustajarvi
-
Publication number: 20120240210Abstract: The invention enables a user to use single-sign-on methodologies to obtain access to a service where that user has more than one account. In addition to querying an identity provider to obtain user credentials in the usual way, the invention enables an application to request and obtain further credentials for that user in order to enable the user to gain access to the desired user account. The user may then be prompted to select which of the available accounts should be used at the application.Type: ApplicationFiled: November 23, 2009Publication date: September 20, 2012Applicant: NOKIA SIEMENS NETWORKS OYInventors: Robert Seidl, Joerg Abendroth, Markus Bauer-Hermann
-
Patent number: 8261076Abstract: Based on security parameters previously agreed upon by first and second communication devices, a first security value is determined by the second communication device and transmitted to the first communication device. The first communication device determines second and third security values based on the security parameters and the first security value and transmits the second and third security values to the second communication device. The second communication device determines a fourth security value based on the security parameters and, if the second security value matches the fourth security value, authenticates the first communication device. Upon successful authentication of the first communication device, a shared key is determined by both communication devices based on the third security value and the security parameters.Type: GrantFiled: January 26, 2007Date of Patent: September 4, 2012Assignee: Siemens AktiengesellschsftInventors: Jörg Abendroth, Jorge Cuellar, Hariharan Rajasekaran
-
Publication number: 20120106399Abstract: A local identity management module is described that is able to identify each of a plurality of user devices. The user devices communicate with the outside world via a network address translation device that converts an internal address of the user devices to a single internet protocol address, typically the internet protocol address of the network address translation device. An external identity management system can communicate with the local identity management module in order to identify which of said plurality of user devices made a particular request and, in some embodiments, to identify a user of said user device.Type: ApplicationFiled: August 27, 2009Publication date: May 3, 2012Applicant: NOKIA SIEMENS NETWORKS OYInventors: Joerg Abendroth, Markus Bauer-Hermann, Gerald Meyer, Robert Seidl
-
Publication number: 20120110677Abstract: A method of providing data in response to a search request comprises the steps of a social networking website receiving the search request to provide a pseudonym associated with the real name; the social networking website determining that the search request is for a pseudonym which, within its database, is not associated with the real name; the social networking website referring the search request to a identity management server which contains an association between the pseudonym and the real name; the identity management server determining the pseudonym which is associated with the real name; and the identity management server providing an information item which is related to the pseudonym.Type: ApplicationFiled: June 30, 2009Publication date: May 3, 2012Applicant: NOKIA SIEMENS NETWORKS OYInventors: Joerg Abendroth, Markus Bauer-Hermann, Robert Seidl
-
Publication number: 20110131627Abstract: A method and a device for data processing are provided comprising a first instance comprising at least one local trusted unit (LTU) and a local trust manager (LTM), the method comprising the step: The local trust manager provides a policy related information to the at least one local trusted unit and/or to a second instance.Type: ApplicationFiled: April 29, 2008Publication date: June 2, 2011Applicant: NOKIA SIEMENS NETWORKS OYInventors: Joerg Abendroth, Michael Marhoefer, Manfred Schaefer
-
Publication number: 20090249070Abstract: Digital right management systems are technically constructed for protecting and carrying out wishes of a copyright holder such that the digital content is connected in a cryptographic and unique manner to any particular device and/or data carrier. Use of the digital content on other devices of the person who acquires rights is only possible after previous registration by the copyright holder. The person who acquires rights is enabled to manage the acquired rights thereof themselves on the electronic data object without instructing the intervention of a central copyright holder. This is accomplished by the person who acquires the rights creating partial amounts of the user rights having individual user rights. The digital content can be used, respectively, in the periphery of the created partial amounts of the individual user rights.Type: ApplicationFiled: March 30, 2006Publication date: October 1, 2009Applicant: Siemens AktiengesellschaftInventors: Jörg Abendroth, Jorge Cuellar, Michael Marhöfer, Hariharan Rajasekaran
-
Publication number: 20090041251Abstract: Based on security parameters previously agreed upon by first and second communication devices, a first security value is determined by the second communication device and transmitted to the first communication device. The first communication device determines second and third security values based on the security parameters and the first security value and transmits the second and third security values to the second communication device. The second communication device determines a fourth security value based on the security parameters and, if the second security value matches the fourth security value, authenticates the first communication device. Upon successful authentication of the first communication device, a shared key is determined by both communication devices based on the third security value and the security parameters.Type: ApplicationFiled: January 26, 2007Publication date: February 12, 2009Applicant: SIEMENS AKTIENGESELLSCHAFTInventors: Jörg Abendroth, Jorge Cuellar, Hariharan Rajasekaran