Patents by Inventor Jens Staeck

Jens Staeck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8719779
    Abstract: Determining the association between data objects may be accomplished using any of a variety of systems and techniques. In particular implementations, a system and technique may have the ability to receive a group of data objects and execute a matching algorithm to determine duplicate data object propositions between the data objects. The system and technique also may have the ability determine whether a data object is a potential duplicate data object and, if a data object is a potential duplicate data object, determine whether the data object is a duplicate data object by examining duplicate data object propositions of a plurality of data objects that are associated with the data object through duplicate data object propositions.
    Type: Grant
    Filed: December 28, 2004
    Date of Patent: May 6, 2014
    Assignee: SAP AG
    Inventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
  • Patent number: 8484334
    Abstract: A method of providing an application with a resource of a computer system includes storing a set of rules for assigning resources of the computer system, identifying an event, and assigning the resource to the application based on the event and at least rule in the set of rules. The method may also include receiving an event message that corresponds to the event, where the event is identified from the event message.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: July 9, 2013
    Assignee: SAP Aktiengesellschaft
    Inventors: Henrique Sievers-Tostes, Jens Staeck
  • Patent number: 8156172
    Abstract: Systems and techniques for monitoring and reporting enterprise data by using a message-based data exchange. In one general aspect, the invention features a computer-implemented method that includes receiving at a message hub one or more messages from one or more sources. A message includes enterprise data. The method includes selecting a message from among the one or more messages, using an extractor implemented at the message hub to extract enterprise data from the selected message, and obtaining information regarding message traffic through the message hub. The method includes selecting a destination and sending to the destination the extracted enterprise data and information regarding message traffic.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: April 10, 2012
    Assignee: SAP AG
    Inventors: Gordon Muehl, Daniel Niehoff, Jens Staeck
  • Patent number: 7908290
    Abstract: Systems and techniques for application development performed independently of system landscape. In one general aspect, the invention provides a computer-implemented method that includes receiving, from a registry for two or more repositories, information describing an object definition of a first repository of the two or more repositories. The first repository is a collection of object definitions associated with a first application. The method includes using the information to generate a proxy for the object definition and storing the proxy in a second repository of the two or more repositories. The proxy is a reference to the object definition of the first repository. The second repository is a collection of definitions associated with a second application. Wherein the proxy is available to the second application for use as though the proxy is an object definition of the second repository.
    Type: Grant
    Filed: December 20, 2004
    Date of Patent: March 15, 2011
    Assignee: SAP AG
    Inventors: Klaus Herter, Wolfgang Kalthoff, Jens Staeck
  • Patent number: 7860768
    Abstract: Systems and techniques for implementing an exception handling framework are described. An exception register is configured to store multiple error messages and rules comprising instructions for responding to the error messages. An exception handler in communication with first and second process components is configured to: detect an error message generated by at least one of the first and second process components; determine that the error message is stored in the exception register; and respond according to a rule corresponding to the error message. The rule uses information pertaining to a business scenario being implemented in conjunction with the first and second process components, and the business scenario is at least partially unavailable to at least one of the first and second process components.
    Type: Grant
    Filed: November 22, 2005
    Date of Patent: December 28, 2010
    Assignee: SAP AG
    Inventors: Klaus Herter, Wolfram Siefke, Henrique Sievers-Tostes, Jens Staeck
  • Patent number: 7606162
    Abstract: The disclosure relates to tracking process-related communications between at least two members. To allow project planning, the invention provides a method in which communication events between the members are monitored. Communication information is determined from the monitored communication event, and from the communication information selected communication event information is extracted, such as, for example process information and member information related to the communication event. The selected communication event information is stored.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: October 20, 2009
    Assignee: SAP AG
    Inventors: Klaus Herter, Wolfram Siefke, Jens Staeck
  • Patent number: 7374086
    Abstract: Methods, systems, and computer programs are described for detecting items within stores that are not intended for sale, so as to prevent a sale or re-sale of those items. The items are marked with identifiers, such as smart tags. Each of the items may be registered as being sold, perhaps within a data record associated with the item and the identifier, when the items are sold. As a result, the data record may later be checked, prior to a potential re-selling of the item, in order to prevent maliciously manipulated items from being sold or re-sold. Similarly, if there is no correspondence between an item's detected identifier, if any, and one of the data records, then the item may be prevented from being sold or re-sold. An alarm signal may be provided if such a prevented sale is detected.
    Type: Grant
    Filed: July 1, 2004
    Date of Patent: May 20, 2008
    Assignee: SAP Aktiengesellschaft
    Inventors: Wolfram Siefke, Jens Staeck
  • Patent number: 7248168
    Abstract: A computer-implemented method for mapping data between a data tag and a database application using a generic and extensible mapping interface. A computer-implemented method includes: communicating with the data tag via a wireless interface using a data tag query protocol; communicating with a database application via a database interface using a database query protocol; reading a mapping definition; exchanging data between the wireless interface and the database interface by mapping between the data tag query protocol and the database query protocol within the mapping interface using the mapping definition; and storing the mapping definition separately from the mapping interface, providing separation between mapping interface and mapping definition.
    Type: Grant
    Filed: June 21, 2004
    Date of Patent: July 24, 2007
    Assignee: SAP Aktiengesellschaft
    Inventors: Gordon Muehl, Karsten Hinrichs, Jens Staeck
  • Publication number: 20070168753
    Abstract: Systems and techniques for implementing an exception handling framework are described. An exception register is configured to store multiple error messages and rules comprising instructions for responding to the error messages. An exception handler in communication with first and second process components is configured to: detect an error message generated by at least one of the first and second process components; determine that the error message is stored in the exception register; and respond according to a rule corresponding to the error message. The rule uses information pertaining to a business scenario being implemented in conjunction with the first and second process components, and the business scenario is at least partially unavailable to at least one of the first and second process components.
    Type: Application
    Filed: November 22, 2005
    Publication date: July 19, 2007
    Inventors: Klaus Herter, Wolfram Siefke, Henrique Sievers-Tostes, Jens Staeck
  • Publication number: 20070112752
    Abstract: Systems and techniques for characterizing a similarity between first and second data objects are described. A system includes a matching engine configured to receive first and second results provided by first and second attribute-matching strategies. The matching engine is further configured to scale the first result by a first weight factor that indicates a first level of quality of a first attribute value and to scale the second result by a second weight factor that indicates a second level of quality of a second attribute value. The matching engine is further configured to combine the first and second scaled results to produce an overall result characterizing the similarity between the first and second objects.
    Type: Application
    Filed: November 14, 2005
    Publication date: May 17, 2007
    Inventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
  • Patent number: 7142119
    Abstract: A security system for providing monitoring of objects and persons is described. Person identifiers are assigned to, and generally carried by, the persons, where each person identifier is associated with at least one user role. Similarly, object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class. An identification interrogator identifies the object and person identifiers within an area, and a rule generator determines rules defining which persons of which user roles, together with which objects of which object classes are, allowed and/or required within the area.
    Type: Grant
    Filed: June 30, 2004
    Date of Patent: November 28, 2006
    Assignee: SAP AG
    Inventors: Wolfram Siefke, Jens Staeck
  • Publication number: 20060224740
    Abstract: A method of providing an application with a resource of a computer system includes storing a set of rules for assigning resources of the computer system, identifying an event, and assigning the resource to the application based on the event and at least rule in the set of rules. The method may also include receiving an event message that corresponds to the event, where the event is identified from the event message.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: Henrique Sievers-Tostes, Jens Staeck
  • Publication number: 20060146727
    Abstract: The disclosure relates to tracking process-related communications between at least two members. To allow project planning, the invention provides a method in which communication events between the members are monitored. Communication information is determined from the monitored communication event, and from the communication information selected communication event information is extracted, such as, for example process information and member information related to the communication event. The selected communication event information is stored.
    Type: Application
    Filed: December 30, 2004
    Publication date: July 6, 2006
    Inventors: Klaus Herter, Wolfram Siefke, Jens Staeck
  • Publication number: 20060143603
    Abstract: Determining the association between data objects may be accomplished using any of a variety of systems and techniques. In particular implementations, a system and technique may have the ability to receive a group of data objects and execute a matching algorithm to determine duplicate data object propositions between the data objects. The system and technique also may have the ability determine whether a data object is a potential duplicate data object and, if a data object is a potential duplicate data object, determine whether the data object is a duplicate data object by examining duplicate data object propositions of a plurality of data objects that are associated with the data object through duplicate data object propositions.
    Type: Application
    Filed: December 28, 2004
    Publication date: June 29, 2006
    Inventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
  • Publication number: 20060136873
    Abstract: Systems and techniques for application development performed independently of system landscape. In one general aspect, the invention provides a computer-implemented method that includes receiving, from a registry for two or more repositories, information describing an object definition of a first repository of the two or more repositories. The first repository is a collection of object definitions associated with a first application. The method includes using the information to generate a proxy for the object definition and storing the proxy in a second repository of the two or more repositories. The proxy is a reference to the object definition of the first repository. The second repository is a collection of definitions associated with a second application. Wherein the proxy is available to the second application for use as though the proxy is an object definition of the second repository.
    Type: Application
    Filed: December 20, 2004
    Publication date: June 22, 2006
    Inventors: Klaus Herter, Wolfgang Kalthoff, Jens Staeck
  • Publication number: 20060098647
    Abstract: Systems and techniques for monitoring and reporting enterprise data by using a message-based data exchange. In one general aspect, the invention features a computer-implemented method that includes receiving at a message hub one or more messages from one or more sources. A message includes enterprise data. The method includes selecting a message from among the one or more messages, using an extractor implemented at the message hub to extract enterprise data from the selected message, and obtaining information regarding message traffic through the message hub. The method includes selecting a destination and sending to the destination the extracted enterprise data and information regarding message traffic.
    Type: Application
    Filed: November 10, 2004
    Publication date: May 11, 2006
    Inventors: Gordon Muehl, Daniel Niehoff, Jens Staeck
  • Publication number: 20060064671
    Abstract: A method of creating a building block includes receiving, in a computer system that includes building blocks, a user input to create a composite building block that is associated with at least two of the building blocks. The method includes creating the composite building block in response to the user input, the composite building block being self-similar to the building blocks. The composite building block may be associated with a method or a relationship of one of the at least two building blocks. A method of using building blocks includes receiving, in a computer system that includes building blocks, a call for a function available in a composite building block. The composite building block is self-similar to the building blocks. The function is performed in response to the call. The composite building block inherits the function from one of the building blocks.
    Type: Application
    Filed: September 20, 2004
    Publication date: March 23, 2006
    Inventors: Klaus Herter, Wolfgang Kalthoff, Gerd Moser, Matthias Schmitt, Jens Staeck
  • Publication number: 20060001544
    Abstract: A security system for providing monitoring of objects and persons is described. Person identifiers are assigned to, and generally carried by, the persons, where each person identifier is associated with at least one user role. Similarly, object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class. An identification interrogator identifies the object and person identifiers within an area, and a rule generator determines rules defining which persons of which user roles, together with which objects of which object classes are, allowed and/or required within the area.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Wolfram Siefke, Jens Staeck
  • Publication number: 20060004635
    Abstract: Methods, systems, and computer programs are described for detecting items within stores that are not intended for sale, so as to prevent a sale or re-sale of those items. The items are marked with identifiers, such as smart tags. Each of the items may be registered as being sold, perhaps within a data record associated with the item and the identifier, when the items are sold. As a result, the data record may later be checked, prior to a potential re-selling of the item, in order to prevent maliciously manipulated items from being sold or re-sold. Similarly, if there is no correspondence between an item's detected identifier, if any, and one of the data records, then the item may be prevented from being sold or re-sold. An alarm signal may be provided if such a prevented sale is detected.
    Type: Application
    Filed: July 1, 2004
    Publication date: January 5, 2006
    Inventors: Wolfram Siefke, Jens Staeck
  • Publication number: 20050280540
    Abstract: A computer-implemented method for mapping data between a data tag and a database application using a generic and extensible mapping interface. A computer-implemented method includes: communicating with the data tag via a wireless interface using a data tag query protocol; communicating with a database application via a database interface using a database query protocol; reading a mapping definition; exchanging data between the wireless interface and the database interface by mapping between the data tag query protocol and the database query protocol within the mapping interface using the mapping definition; and storing the mapping definition separately from the mapping interface, providing separation between mapping interface and mapping definition.
    Type: Application
    Filed: June 21, 2004
    Publication date: December 22, 2005
    Inventors: Gordon Muehl, Karsten Hinrichs, Jens Staeck