Patents by Inventor Jens Staeck
Jens Staeck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8719779Abstract: Determining the association between data objects may be accomplished using any of a variety of systems and techniques. In particular implementations, a system and technique may have the ability to receive a group of data objects and execute a matching algorithm to determine duplicate data object propositions between the data objects. The system and technique also may have the ability determine whether a data object is a potential duplicate data object and, if a data object is a potential duplicate data object, determine whether the data object is a duplicate data object by examining duplicate data object propositions of a plurality of data objects that are associated with the data object through duplicate data object propositions.Type: GrantFiled: December 28, 2004Date of Patent: May 6, 2014Assignee: SAP AGInventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
-
Patent number: 8484334Abstract: A method of providing an application with a resource of a computer system includes storing a set of rules for assigning resources of the computer system, identifying an event, and assigning the resource to the application based on the event and at least rule in the set of rules. The method may also include receiving an event message that corresponds to the event, where the event is identified from the event message.Type: GrantFiled: March 31, 2005Date of Patent: July 9, 2013Assignee: SAP AktiengesellschaftInventors: Henrique Sievers-Tostes, Jens Staeck
-
Patent number: 8156172Abstract: Systems and techniques for monitoring and reporting enterprise data by using a message-based data exchange. In one general aspect, the invention features a computer-implemented method that includes receiving at a message hub one or more messages from one or more sources. A message includes enterprise data. The method includes selecting a message from among the one or more messages, using an extractor implemented at the message hub to extract enterprise data from the selected message, and obtaining information regarding message traffic through the message hub. The method includes selecting a destination and sending to the destination the extracted enterprise data and information regarding message traffic.Type: GrantFiled: November 10, 2004Date of Patent: April 10, 2012Assignee: SAP AGInventors: Gordon Muehl, Daniel Niehoff, Jens Staeck
-
Patent number: 7908290Abstract: Systems and techniques for application development performed independently of system landscape. In one general aspect, the invention provides a computer-implemented method that includes receiving, from a registry for two or more repositories, information describing an object definition of a first repository of the two or more repositories. The first repository is a collection of object definitions associated with a first application. The method includes using the information to generate a proxy for the object definition and storing the proxy in a second repository of the two or more repositories. The proxy is a reference to the object definition of the first repository. The second repository is a collection of definitions associated with a second application. Wherein the proxy is available to the second application for use as though the proxy is an object definition of the second repository.Type: GrantFiled: December 20, 2004Date of Patent: March 15, 2011Assignee: SAP AGInventors: Klaus Herter, Wolfgang Kalthoff, Jens Staeck
-
Patent number: 7860768Abstract: Systems and techniques for implementing an exception handling framework are described. An exception register is configured to store multiple error messages and rules comprising instructions for responding to the error messages. An exception handler in communication with first and second process components is configured to: detect an error message generated by at least one of the first and second process components; determine that the error message is stored in the exception register; and respond according to a rule corresponding to the error message. The rule uses information pertaining to a business scenario being implemented in conjunction with the first and second process components, and the business scenario is at least partially unavailable to at least one of the first and second process components.Type: GrantFiled: November 22, 2005Date of Patent: December 28, 2010Assignee: SAP AGInventors: Klaus Herter, Wolfram Siefke, Henrique Sievers-Tostes, Jens Staeck
-
Patent number: 7606162Abstract: The disclosure relates to tracking process-related communications between at least two members. To allow project planning, the invention provides a method in which communication events between the members are monitored. Communication information is determined from the monitored communication event, and from the communication information selected communication event information is extracted, such as, for example process information and member information related to the communication event. The selected communication event information is stored.Type: GrantFiled: December 30, 2004Date of Patent: October 20, 2009Assignee: SAP AGInventors: Klaus Herter, Wolfram Siefke, Jens Staeck
-
Patent number: 7374086Abstract: Methods, systems, and computer programs are described for detecting items within stores that are not intended for sale, so as to prevent a sale or re-sale of those items. The items are marked with identifiers, such as smart tags. Each of the items may be registered as being sold, perhaps within a data record associated with the item and the identifier, when the items are sold. As a result, the data record may later be checked, prior to a potential re-selling of the item, in order to prevent maliciously manipulated items from being sold or re-sold. Similarly, if there is no correspondence between an item's detected identifier, if any, and one of the data records, then the item may be prevented from being sold or re-sold. An alarm signal may be provided if such a prevented sale is detected.Type: GrantFiled: July 1, 2004Date of Patent: May 20, 2008Assignee: SAP AktiengesellschaftInventors: Wolfram Siefke, Jens Staeck
-
Patent number: 7248168Abstract: A computer-implemented method for mapping data between a data tag and a database application using a generic and extensible mapping interface. A computer-implemented method includes: communicating with the data tag via a wireless interface using a data tag query protocol; communicating with a database application via a database interface using a database query protocol; reading a mapping definition; exchanging data between the wireless interface and the database interface by mapping between the data tag query protocol and the database query protocol within the mapping interface using the mapping definition; and storing the mapping definition separately from the mapping interface, providing separation between mapping interface and mapping definition.Type: GrantFiled: June 21, 2004Date of Patent: July 24, 2007Assignee: SAP AktiengesellschaftInventors: Gordon Muehl, Karsten Hinrichs, Jens Staeck
-
Publication number: 20070168753Abstract: Systems and techniques for implementing an exception handling framework are described. An exception register is configured to store multiple error messages and rules comprising instructions for responding to the error messages. An exception handler in communication with first and second process components is configured to: detect an error message generated by at least one of the first and second process components; determine that the error message is stored in the exception register; and respond according to a rule corresponding to the error message. The rule uses information pertaining to a business scenario being implemented in conjunction with the first and second process components, and the business scenario is at least partially unavailable to at least one of the first and second process components.Type: ApplicationFiled: November 22, 2005Publication date: July 19, 2007Inventors: Klaus Herter, Wolfram Siefke, Henrique Sievers-Tostes, Jens Staeck
-
Publication number: 20070112752Abstract: Systems and techniques for characterizing a similarity between first and second data objects are described. A system includes a matching engine configured to receive first and second results provided by first and second attribute-matching strategies. The matching engine is further configured to scale the first result by a first weight factor that indicates a first level of quality of a first attribute value and to scale the second result by a second weight factor that indicates a second level of quality of a second attribute value. The matching engine is further configured to combine the first and second scaled results to produce an overall result characterizing the similarity between the first and second objects.Type: ApplicationFiled: November 14, 2005Publication date: May 17, 2007Inventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
-
Patent number: 7142119Abstract: A security system for providing monitoring of objects and persons is described. Person identifiers are assigned to, and generally carried by, the persons, where each person identifier is associated with at least one user role. Similarly, object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class. An identification interrogator identifies the object and person identifiers within an area, and a rule generator determines rules defining which persons of which user roles, together with which objects of which object classes are, allowed and/or required within the area.Type: GrantFiled: June 30, 2004Date of Patent: November 28, 2006Assignee: SAP AGInventors: Wolfram Siefke, Jens Staeck
-
Publication number: 20060224740Abstract: A method of providing an application with a resource of a computer system includes storing a set of rules for assigning resources of the computer system, identifying an event, and assigning the resource to the application based on the event and at least rule in the set of rules. The method may also include receiving an event message that corresponds to the event, where the event is identified from the event message.Type: ApplicationFiled: March 31, 2005Publication date: October 5, 2006Inventors: Henrique Sievers-Tostes, Jens Staeck
-
Publication number: 20060146727Abstract: The disclosure relates to tracking process-related communications between at least two members. To allow project planning, the invention provides a method in which communication events between the members are monitored. Communication information is determined from the monitored communication event, and from the communication information selected communication event information is extracted, such as, for example process information and member information related to the communication event. The selected communication event information is stored.Type: ApplicationFiled: December 30, 2004Publication date: July 6, 2006Inventors: Klaus Herter, Wolfram Siefke, Jens Staeck
-
Publication number: 20060143603Abstract: Determining the association between data objects may be accomplished using any of a variety of systems and techniques. In particular implementations, a system and technique may have the ability to receive a group of data objects and execute a matching algorithm to determine duplicate data object propositions between the data objects. The system and technique also may have the ability determine whether a data object is a potential duplicate data object and, if a data object is a potential duplicate data object, determine whether the data object is a duplicate data object by examining duplicate data object propositions of a plurality of data objects that are associated with the data object through duplicate data object propositions.Type: ApplicationFiled: December 28, 2004Publication date: June 29, 2006Inventors: Wolfgang Kalthoff, Jens Staeck, Karl Fuerst, Volker Schott, Peter Lang, Manfred Walter
-
Publication number: 20060136873Abstract: Systems and techniques for application development performed independently of system landscape. In one general aspect, the invention provides a computer-implemented method that includes receiving, from a registry for two or more repositories, information describing an object definition of a first repository of the two or more repositories. The first repository is a collection of object definitions associated with a first application. The method includes using the information to generate a proxy for the object definition and storing the proxy in a second repository of the two or more repositories. The proxy is a reference to the object definition of the first repository. The second repository is a collection of definitions associated with a second application. Wherein the proxy is available to the second application for use as though the proxy is an object definition of the second repository.Type: ApplicationFiled: December 20, 2004Publication date: June 22, 2006Inventors: Klaus Herter, Wolfgang Kalthoff, Jens Staeck
-
Publication number: 20060098647Abstract: Systems and techniques for monitoring and reporting enterprise data by using a message-based data exchange. In one general aspect, the invention features a computer-implemented method that includes receiving at a message hub one or more messages from one or more sources. A message includes enterprise data. The method includes selecting a message from among the one or more messages, using an extractor implemented at the message hub to extract enterprise data from the selected message, and obtaining information regarding message traffic through the message hub. The method includes selecting a destination and sending to the destination the extracted enterprise data and information regarding message traffic.Type: ApplicationFiled: November 10, 2004Publication date: May 11, 2006Inventors: Gordon Muehl, Daniel Niehoff, Jens Staeck
-
Publication number: 20060064671Abstract: A method of creating a building block includes receiving, in a computer system that includes building blocks, a user input to create a composite building block that is associated with at least two of the building blocks. The method includes creating the composite building block in response to the user input, the composite building block being self-similar to the building blocks. The composite building block may be associated with a method or a relationship of one of the at least two building blocks. A method of using building blocks includes receiving, in a computer system that includes building blocks, a call for a function available in a composite building block. The composite building block is self-similar to the building blocks. The function is performed in response to the call. The composite building block inherits the function from one of the building blocks.Type: ApplicationFiled: September 20, 2004Publication date: March 23, 2006Inventors: Klaus Herter, Wolfgang Kalthoff, Gerd Moser, Matthias Schmitt, Jens Staeck
-
Publication number: 20060001544Abstract: A security system for providing monitoring of objects and persons is described. Person identifiers are assigned to, and generally carried by, the persons, where each person identifier is associated with at least one user role. Similarly, object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class. An identification interrogator identifies the object and person identifiers within an area, and a rule generator determines rules defining which persons of which user roles, together with which objects of which object classes are, allowed and/or required within the area.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Inventors: Wolfram Siefke, Jens Staeck
-
Publication number: 20060004635Abstract: Methods, systems, and computer programs are described for detecting items within stores that are not intended for sale, so as to prevent a sale or re-sale of those items. The items are marked with identifiers, such as smart tags. Each of the items may be registered as being sold, perhaps within a data record associated with the item and the identifier, when the items are sold. As a result, the data record may later be checked, prior to a potential re-selling of the item, in order to prevent maliciously manipulated items from being sold or re-sold. Similarly, if there is no correspondence between an item's detected identifier, if any, and one of the data records, then the item may be prevented from being sold or re-sold. An alarm signal may be provided if such a prevented sale is detected.Type: ApplicationFiled: July 1, 2004Publication date: January 5, 2006Inventors: Wolfram Siefke, Jens Staeck
-
Publication number: 20050280540Abstract: A computer-implemented method for mapping data between a data tag and a database application using a generic and extensible mapping interface. A computer-implemented method includes: communicating with the data tag via a wireless interface using a data tag query protocol; communicating with a database application via a database interface using a database query protocol; reading a mapping definition; exchanging data between the wireless interface and the database interface by mapping between the data tag query protocol and the database query protocol within the mapping interface using the mapping definition; and storing the mapping definition separately from the mapping interface, providing separation between mapping interface and mapping definition.Type: ApplicationFiled: June 21, 2004Publication date: December 22, 2005Inventors: Gordon Muehl, Karsten Hinrichs, Jens Staeck