Patents by Inventor Jürgen Heymann
Jürgen Heymann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9866638Abstract: Mechanisms for allowing allow multi-session capability and session-return enabling stateful web applications include providing a start URL of a requested portal page with an “External Session ID” (ESID). The ESID is an argument that is different between the two instances of the application (on the same page), and leads to different/independent sessions in the server. When a user returns to the same page, the ESIDs are passed again with the individual application requests, and the server can then logically reconnect to the proper session and allow the user to continue. The ESID can be used to return to an application after the user has previously left to go to another application and then desires to come back, or even when the user closed the browser and restarts the application later.Type: GrantFiled: August 6, 2013Date of Patent: January 9, 2018Assignee: SAP SEInventors: Juergen Heymann, Udo Offermann, Roman Hayer, Bernhard Drittler, Rainer Brendle
-
Publication number: 20150370685Abstract: Defect localization can be performed in integration tests to more efficiently determine if recent source code changes caused a defect. Change locations are identified that represent code changes (e.g., source code changes) that occurred since a last integration test run. Code coverage information can be obtained indicating lines of code actually tested during the integration test. A search can be performed to find an intersection between the code changes and the code actually tested to determine one or more candidate code changes that may have caused a defect in the integration test. The candidate code changes can be ranked based on one or more different ranking algorithms.Type: ApplicationFiled: June 24, 2014Publication date: December 24, 2015Inventors: Juergen Heymann, Petra Meyer, Thomas Jansen
-
Patent number: 9146773Abstract: Embodiments of the invention are generally directed to a system and method for implicit transaction control. A transaction manager receives an indication that an operation is to be executed within a transaction. The transaction manager determines whether a preexisting transaction context is available to provide the transaction for the operation. The operation is enclosed within the preexisting transaction context, if the preexisting transaction context is available.Type: GrantFiled: December 6, 2004Date of Patent: September 29, 2015Assignee: SAP SEInventors: Christian Fecht, Dietmar Theobald, Juergen Heymann, Thomas Raupp, Rainer Brendle
-
Publication number: 20140019523Abstract: Mechanisms for allowing allow multi-session capability and session-return enabling stateful web applications include providing a start URL of a requested portal page with an “External Session ID” (ESID). The ESID is an argument that is different between the two instances of the application (on the same page), and leads to different/independent sessions in the server. When a user returns to the same page, the ESIDs are passed again with the individual application requests, and the server can then logically reconnect to the proper session and allow the user to continue. The ESID can be used to return to an application after the user has previously left to go to another application and then desires to come back, or even when the user closed the browser and restarts the application later.Type: ApplicationFiled: August 6, 2013Publication date: January 16, 2014Applicant: SAP AGInventors: Juergen Heymann, Udo Offermann, Roman Hayer, Bernhard Drittler, Rainer Brendle
-
Patent number: 8527636Abstract: Mechanisms for allowing allow multi-session capability and session-return enabling stateful web applications include providing a start URL of a requested portal page with an “External Session ID” (ESID). The ESID is an argument that is different between the two instances of the application (on the same page), and leads to different/independent sessions in the server. When a user returns to the same page, the ESIDs are passed again with the individual application requests, and the server can then logically reconnect to the proper session and allow the user to continue. The ESID can be used to return to an application after the user has previously left to go to another application and then desires to come back, or even when the user closed the browser and restarts the application later.Type: GrantFiled: December 2, 2003Date of Patent: September 3, 2013Assignee: SAP AktiengesellschaftInventors: Juergen Heymann, Udo Offermann, Roman Hayer, Bernhard Drittler, Rainer Brendle
-
Patent number: 7657528Abstract: In a computer system (100) that launches application services for predetermined roles, a service-to-role assignment is customized in a target table. The user inserts a CD-ROM with master and reference tables, and the system automatically provides the target table. The master table (119) stores a first assignment (112) of application services (S, 151-156) to roles (RO), and stores a second assignment (113) of service attributes (SA), such as language or industry branch, of the application services (S). The reference table (129) stores reference attributes (REA) for each application service (S) in the master table. The service representations for each role (RO) are forwarded from the master table (119) into the target table (149) if service and reference attributes match.Type: GrantFiled: March 11, 2002Date of Patent: February 2, 2010Assignee: SAP AGInventors: Peter Bittner, Bernhard Drittler, Jürgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
-
Patent number: 7606901Abstract: A client computer and a server computer communicate via HTTP. The client computer uses a standard HTTP-browser. Substantially simultaneously with establishing a session by allocating a resource at the server computer, the server computer sends a termination instruction to the browser. The instruction remains unexecuted in the browser during the whole session. In the event that the server computer terminates the session (such as upon unloading the instruction from the browser), the browser causes the server computer to de-allocate the resource.Type: GrantFiled: June 13, 2001Date of Patent: October 20, 2009Assignee: SAP AGInventors: Juergen Heymann, Udo Offermann, Petr Zdrahal
-
Patent number: 7502821Abstract: A system and method of managing a client/server session is disclosed, in which a client uses a browser to request content from a content server. The content associated with the session is received at the browser along with a session termination URL from the content server, the content and session termination URL being passed to a portal page received at the browser from a portal server. A request for a new session is sent from the browser to the portal server, the request including the session termination URL. The session termination URL is sent by the portal server to the content server to terminate the session.Type: GrantFiled: December 16, 2004Date of Patent: March 10, 2009Assignee: SAP AGInventor: Juergen Heymann
-
Patent number: 7480681Abstract: Embodiments of the invention are generally directed to a system and method for a transaction manager. A transaction manager registers one or more callback methods each having an associated synchronization identifier. An order is defined for the one or more callback methods based, at least in part, on the synchronization identifier associated with each callback method. The callback methods are called in the defined order.Type: GrantFiled: December 6, 2004Date of Patent: January 20, 2009Assignee: SAP AGInventors: Christian Fecht, Dietmar Theobald, Juergen Heymann, Thomas Raupp, Rainer Brendle
-
Patent number: 7469255Abstract: Systems and techniques to generate a virtual hierarchy for navigating in and between object hierarchies. In general, in one implementation, the technique includes: flagging nodes in one or more object hierarchies as entry points and generating a virtual hierarchy including a virtual root and the nodes flagged as entry points depend directly from the virtual root.Type: GrantFiled: December 26, 2002Date of Patent: December 23, 2008Assignee: SAP AGInventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Bernhard Drittler
-
Patent number: 7441239Abstract: A role-based computer system has a first processor with a computer program (100) and has further processors with application systems (Sy1, Sy2, Sy3) and application services (Se). The program generates a start instruction for the further processors to execute the services by consecutively receiving a log-in identification from the user and looking up in a first assignment table (101) for a role (Ro), looking up in a second assignment table (102) to determine logical services (LSe) assigned to the role; and looking up in a second assignment table to determine a pointer (P(Sy/Se)) to the services (Se) that are assigned to the logical service. The pointer has first and second portions to identify the application system (Sy) and the application service (Se), respectively, and becomes part of the start instruction (350).Type: GrantFiled: March 18, 2002Date of Patent: October 21, 2008Assignee: SAP AGInventors: Peter Bittner, Bernhard Drittler, Jürgen Heymann, Stefan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
-
Patent number: 7308676Abstract: Systems and techniques to derive virtual objects at run-time from persistencely stored objects. In general, in one implementation, the technique includes receiving a request for a target object from a requesting application. It is determined whether a delta link is associated with the target object. The delta link includes a location of the target object and information describing a desired difference between the target object and a derived object to be returned to the requesting application. The target object is located and a derived object is generated from the target object and the information in the delta link. The derived object is then returned to the requesting application. The target object, and derived object, may include a number of elements. The elements may be name-value pairs, or “properties”, or a number of child objects in an object hierarchy.Type: GrantFiled: December 26, 2002Date of Patent: December 11, 2007Assignee: SAP AGInventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Meinolf Block, Bernhard Drittler
-
Patent number: 7296052Abstract: A client computer and a server computer communicate via a network; the server computer receives user identification via the client computer that is selectively a first device or a second device. The server computer stores at least first and second application services for a single predetermined application class, wherein the first and second application services are adapted to client computer type. Upon receiving user identification, the server computer further receives a device attribute from the client computer, compares the device attribute with reference attributes, and selectively sends a representation of the first application service or of the second application service to the client computer according to the device attribute.Type: GrantFiled: November 1, 2002Date of Patent: November 13, 2007Assignee: SAP AGInventors: Jürgen Heymann, Stefan Kusterer, Bernhard Drittler
-
Patent number: 7290147Abstract: The present invention discloses a method, computer program product and system for adjusting roles in a computer system (100) that launch application services (301-307) by a first user who is assigned to at least one role. A first role (110) calls a second role (150) by reference (111). Both roles comprise representations of applications services (101, 102, 103) and (104, 105). When representations in the second role are modified, for example, application services are added (106, 107), a delta list (112) for the first reference is automatically created to conditionally prevent the first role (110) from referencing to at least some of the modified representations of the second role (150). This is achieved by using a rule database (118) containing rules about application services that are mutually exclusive and checking for conflicts between the representations of the first role and modified, second role. A second user, e.g.Type: GrantFiled: March 15, 2002Date of Patent: October 30, 2007Assignee: SAP AGInventors: Peter Bittner, Bernhard Drittler, Jürgen Heymann, Sterfan Kusterer, Sven Schwerin-Wenzel, Thorsten Vieth
-
Publication number: 20060149876Abstract: Embodiments of the invention are generally directed to a system and method for implicit transaction control. A transaction manager receives an indication that an operation is to be executed within a transaction. The transaction manager determines whether a preexisting transaction context is available to provide the transaction for the operation. The operation is enclosed within the preexisting transaction context, if the preexisting transaction context is available.Type: ApplicationFiled: December 6, 2004Publication date: July 6, 2006Inventors: Christian Fecht, Dietmar Theobald, Juergen Heymann, Thomas Raupp, Rainer Brendle
-
Publication number: 20060136592Abstract: A system and method of managing a client/server session is disclosed, in which a client uses a browser to request content from a content server. The content associated with the session is received at the browser along with a session termination URL from the content server, the content and session termination URL being passed to a portal page received at the browser from a portal server. A request for a new session is sent from the browser to the portal server, the request including the session termination URL. The session termination URL is sent by the portal server to the content server to terminate the session.Type: ApplicationFiled: December 16, 2004Publication date: June 22, 2006Inventor: Juergen Heymann
-
Publication number: 20060122966Abstract: Embodiments of the invention are generally directed to a system and method for a transaction manager. A transaction manager registers one or more callback methods each having an associated synchronization identifier. An order is defined for the one or more callback methods based, at least in part, on the synchronization identifier associated with each callback method. The callback methods are called in the defined order.Type: ApplicationFiled: December 6, 2004Publication date: June 8, 2006Inventors: Christian Fecht, Dietmar Theobald, Juergen Heymann, Thomas Raupp, Rainer Brendle
-
Publication number: 20040193699Abstract: Mechanisms for allowing allow multi-session capability and session-return enabling stateful web applications include providing a start URL of a requested portal page with an “External Session ID” (ESID). The ESID is an argument that is different between the two instances of the application (on the same page), and leads to different/independent sessions in the server. When a user returns to the same page, the ESIDs are passed again with the individual application requests, and the server can then logically reconnect to the proper session and allow the user to continue. The ESID can be used to return to an application after the user has previously left to go to another application and then desires to come back, or even when the user closed the browser and restarts the application later.Type: ApplicationFiled: December 2, 2003Publication date: September 30, 2004Inventors: Juergen Heymann, Udo Offermann, Roman Hayer, Bernhard Drittler, Rainer Brendle
-
Publication number: 20030225925Abstract: Systems and techniques to derive virtual objects at run-time from persistencely stored objects. In general, in one implementation, the technique includes receiving a request for a target object from a requesting application. It is determined whether a delta link is associated with the target object. The delta link includes a location of the target object and information describing a desired difference between the target object and a derived object to be returned to the requesting application. The target object is located and a derived object is generated from the target object and the information in the delta link. The derived object is then returned to the requesting application. The target object, and derived object, may include a number of elements. The elements may be name-value pairs, or “properties”, or a number of child objects in an object hierarchy.Type: ApplicationFiled: December 26, 2002Publication date: December 4, 2003Inventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Meinolf Block, Bernhard Drittler
-
Publication number: 20030225781Abstract: Systems and techniques to generate a virtual hierarchy for navigating in and between object hierarchies. In general, in one implementation, the technique includes: flagging nodes in one or more object hierarchies as entry points and generating a virtual hierarchy including a virtual root and the nodes flagged as entry points depend directly from the virtual root.Type: ApplicationFiled: December 26, 2002Publication date: December 4, 2003Inventors: Stefan Kusterer, Eckart Liemke, Gerhard Bosch, Juergen Heymann, Bernhard Drittler