Patents by Inventor Martin Tröster
Martin Tröster has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12164911Abstract: A computer-implemented method for monitoring and auditing secure software builds is disclosed. The computer-implemented includes receiving a build file containing a sequence of build instructions. The computer-implemented method further includes, for each build instruction being executed: determining an indicator value corresponding to a monitoring level associated with a build instruction; and modifying logging of trace information associated with a computing system executing the build instruction based, at least in part, on the indicator value corresponding to the monitoring level.Type: GrantFiled: April 14, 2022Date of Patent: December 10, 2024Assignee: International Business Machines CorporationInventors: Angel Nunez Mencias, Thomas Pohl, Timo Kussmaul, Ralf Schaufler, Simon Spinner, Kai Brennenstuhl, Martin Tröster
-
Patent number: 11874878Abstract: A computer implemented method for replacing components of a data processing system, comprising in response to a detection of a newly added component at a specific location; reading its customization data from a data storage and querying a persistent database to determine if functional capabilities according to customization data are specified for this specific location; depending on a result of determining the functional capabilities and of querying the database if it contains customization data either: disabling the component; or enabling the component and storing in the database the customization data; or enabling the component and replacing the customization data in the database; or storing the customization data in the data storage of the component and enabling the component.Type: GrantFiled: August 13, 2019Date of Patent: January 16, 2024Assignee: International Business Machines CorporationInventors: Martin Tröster, Philip A. Sciuto, Daniel Johannes Klodt, Michael Becht, Giovanni Cautillo
-
Publication number: 20230334147Abstract: A computer-implemented method for monitoring and auditing secure software builds is disclosed. The computer-implemented includes receiving a build file containing a sequence of build instructions. The computer-implemented method further includes, for each build instruction being executed: determining an indicator value corresponding to a monitoring level associated with a build instruction; and modifying logging of trace information associated with a computing system executing the build instruction based, at least in part, on the indicator value corresponding to the monitoring level.Type: ApplicationFiled: April 14, 2022Publication date: October 19, 2023Inventors: Angel Nunez Mencias, Thomas Pohl, Timo Kussmaul, Ralf Schaufler, Simon Spinner, Kai Brennenstuhl, Martin Tröster
-
Patent number: 11061666Abstract: A computer-implemented method for distributing computing tasks to individual computer systems from a first pool of first computer systems, characterized by controllers executing a specific firmware with a gateway to receive commands via a network and an orchestration unit, whereby in response to a request to perform a computing task, an available and suitable first computer system is selected. An available second computer system is selected from a second pool. A firmware image corresponding to a requested controller firmware level is selected, using a gateway connector to send commands to the gateways. A network connection is established between the gateway in the controller of the first computer system and the gateway connector in the second computer system. Execution of the firmware image is triggered.Type: GrantFiled: January 7, 2020Date of Patent: July 13, 2021Assignee: International Business Machines CorporationInventors: Thomas Pohl, Martin Tröster, Angel Nunez Mencias, Jakob Christopher Lang, Herwig Elfering
-
Publication number: 20210208873Abstract: A computer-implemented method for distributing computing tasks to individual computer systems from a first pool of first computer systems, characterized by controllers executing a specific firmware with a gateway to receive commands via a network and an orchestration unit, whereby in response to a request to perform a computing task, an available and suitable first computer system is selected. An available second computer system is selected from a second pool. A firmware image corresponding to a requested controller firmware level is selected, using a gateway connector to send commands to the gateways. A network connection is established between the gateway in the controller of the first computer system and the gateway connector in the second computer system. Execution of the firmware image is triggered.Type: ApplicationFiled: January 7, 2020Publication date: July 8, 2021Inventors: Thomas Pohl, Martin Tröster, Angel Nunez Mencias, Jakob Christopher Lang, Herwig Elfering
-
Publication number: 20210049216Abstract: A computer implemented method for replacing components of a data processing system, comprising in response to a detection of a newly added component at a specific location; reading its customization data from a data storage and querying a persistent database to determine if functional capabilities according to customization data are specified for this specific location; depending on a result of determining the functional capabilities and of querying the database if it contains customization data either: disabling the component; or enabling the component and storing in the database the customization data; or enabling the component and replacing the customization data in the database; or storing the customization data in the data storage of the component and enabling the component.Type: ApplicationFiled: August 13, 2019Publication date: February 18, 2021Inventors: Martin Tröster, Philip A. Sciuto, Daniel Johannes Klodt, Michael Becht, Giovanni Cautillo
-
Patent number: 10839072Abstract: A method and a related system for a protection against unauthorized file encryption in a file system may be provided. The method may comprise providing an anti-ransomware file access unit, determining, by the anti-ransomware file access unit, an entropy value for a portion of a file to be written to the file system, and upon determining that the entropy value is equal or above a threshold value, performing a copy-on-write process to the file to be written, whereby the file is written to a copy-on-write storage area.Type: GrantFiled: January 22, 2018Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: Thomas Pohl, Martin Tröster, Marco H. Kroll, Matthias Seul
-
Patent number: 10686685Abstract: A method is provided for suspending and resuming virtual machines in a network in dependence of network activity. The method includes providing a virtual machine manager. The virtual machine manager monitors network traffic of the virtual machines on a network bridge in a network layer using data packet analysis to detect dedicated network protocol traffic. More particularly, the monitoring of network traffic of the virtual machines may include: logging network addresses of the virtual machines of the network; combining logged network addresses with information about suspending or resuming virtual machines based on filtering rules being provided for such combination; and sending information about the network addresses of active and suspended virtual machines for virtual network adapters assigned to the virtual machines to the virtual machine manager.Type: GrantFiled: March 7, 2019Date of Patent: June 16, 2020Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez-Mencias, Thomas Pohl, Martin Troester
-
Patent number: 10581937Abstract: A method and a system for establishing a communication session between a first communication device in a main communication network and a second communication device in a local communication network comprising a wireless network, the second communication device being located in the vicinity of a mobile device, the first communication device contacting an external phone number, wherein the external phone number is assigned to a unique identifier of the mobile device. The method comprises (i) the mobile device sending the unique identifier detectable on the wireless network; (ii) providing the unique identifier of the mobile device) and a local communication identifier to a service provider adapter; (iii) determining the location of the mobile device, associating the mobile device to the second communication device in dependence of its location.Type: GrantFiled: November 6, 2017Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventors: Martin Troester, Janna Troester, Thomas Pohl, Bernd Simmet
-
Patent number: 10536493Abstract: A method and a system for establishing a communication session between a first communication device in a main communication network and a second communication device in a local communication network comprising a wireless network, the second communication device being located in the vicinity of a mobile device, the first communication device contacting an external phone number, wherein the external phone number is assigned to a unique identifier of the mobile device. The method comprises (i) the mobile device sending the unique identifier detectable on the wireless network; (ii) providing the unique identifier of the mobile device) and a local communication identifier to a service provider adapter; (iii) determining the location of the mobile device, associating the mobile device to the second communication device in dependence of its location.Type: GrantFiled: June 23, 2017Date of Patent: January 14, 2020Assignee: International Business Machines CorporationInventors: Martin Troester, Janna Troester, Thomas Pohl, Bernd Simmet
-
Publication number: 20190228148Abstract: A method and a related system for a protection against unauthorized file encryption in a file system may be provided. The method may comprise providing an anti-ransomware file access unit, determining, by the anti-ransomware file access unit, an entropy value for a portion of a file to be written to the file system, and upon determining that the entropy value is equal or above a threshold value, performing a copy-on-write process to the file to be written, whereby the file is written to a copy-on-write storage area.Type: ApplicationFiled: January 22, 2018Publication date: July 25, 2019Inventors: Thomas Pohl, Martin Tröster, Marco H. Kroll, Matthias Seul
-
Publication number: 20190207838Abstract: A method is provided for suspending and resuming virtual machines in a network in dependence of network activity. The method includes providing a virtual machine manager. The virtual machine manager monitors network traffic of the virtual machines on a network bridge in a network layer using data packet analysis to detect dedicated network protocol traffic. More particularly, the monitoring of network traffic of the virtual machines may include: logging network addresses of the virtual machines of the network; combining logged network addresses with information about suspending or resuming virtual machines based on filtering rules being provided for such combination; and sending information about the network addresses of active and suspended virtual machines for virtual network adapters assigned to the virtual machines to the virtual machine manager.Type: ApplicationFiled: March 7, 2019Publication date: July 4, 2019Inventors: Jakob C. Lang, Angel Nunez-Mencias, Thomas Pohl, Martin Troester
-
Patent number: 10318486Abstract: A method for de-duplicating updates in virtual machines (VMs) is provided that may be executed on a host computer u a hypervisor. Client VMs are derived from a base image, and the method includes: creating a temporary virtual machine, updating the temporary virtual machine, identifying modified blocks of the updated temporary virtual machine, and identifying files associated with the modified blocks. Moreover, the method includes determining block identifiers of matching files of a VM corresponding to identified files of the updated temporary VM, moving block content of blocks relating to the determined block identifiers from its initial location to a free location within the client VM if the block content and the matching files are not identical in the client virtual machine and the temporary VM, and de-duplicating content within the client VM, generating a complete bootable image, and replacing the base image by the temporary VM.Type: GrantFiled: July 8, 2016Date of Patent: June 11, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Marco H. Kroll, Thomas Pohl, Martin Troester
-
Patent number: 10263870Abstract: A method is provided for suspending and resuming virtual machines in a network in dependence of network activity. The method includes providing a virtual machine manager. The virtual machine manager monitors network traffic of the virtual machines on a network bridge in a network layer using data packet analysis to detect dedicated network protocol traffic. More particularly, the monitoring of network traffic of the virtual machines may include: logging network addresses of the virtual machines of the network; combining logged network addresses with information about suspending or resuming virtual machines based on filtering rules being provided for such combination; and sending information about the network addresses of active and suspended virtual machines for virtual network adapters assigned to the virtual machines to the virtual machine manager.Type: GrantFiled: July 7, 2016Date of Patent: April 16, 2019Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez-Mencias, Thomas Pohl, Martin Troester
-
Patent number: 10250696Abstract: Stateful network connections between a first virtual machine and at least a second virtual machine are preserved during a suspend and resume cycle. The virtual machines are interconnected by a network. A control instance is provided to manage a routing of network traffic of the virtual machines to the network. In case of a suspend operation, the control instance tracks network addresses of each virtual machine, whereas in case of a resume operation, the control instance sets up a router for each virtual machine and requests new network addresses for each router. The control instance configures a network address translation on the router assigned to each virtual machine to map the new network addresses to the network addresses used before suspending the virtual machines.Type: GrantFiled: July 26, 2016Date of Patent: April 2, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Publication number: 20180375905Abstract: A method and a system for establishing a communication session between a first communication device in a main communication network and a second communication device in a local communication network comprising a wireless network, the second communication device being located in the vicinity of a mobile device, the first communication device contacting an external phone number, wherein the external phone number is assigned to a unique identifier of the mobile device. The method comprises (i) the mobile device sending the unique identifier detectable on the wireless network; (ii) providing the unique identifier of the mobile device) and a local communication identifier to a service provider adapter; (iii) determining the location of the mobile device, associating the mobile device to the second communication device in dependence of its location.Type: ApplicationFiled: June 23, 2017Publication date: December 27, 2018Inventors: Martin Troester, Janna Troester, Thomas Pohl, Bernd Simmet
-
Publication number: 20180375909Abstract: A method and a system for establishing a communication session between a first communication device in a main communication network and a second communication device in a local communication network comprising a wireless network, the second communication device being located in the vicinity of a mobile device, the first communication device contacting an external phone number, wherein the external phone number is assigned to a unique identifier of the mobile device. The method comprises (i) the mobile device sending the unique identifier detectable on the wireless network; (ii) providing the unique identifier of the mobile device) and a local communication identifier to a service provider adapter; (iii) determining the location of the mobile device, associating the mobile device to the second communication device in dependence of its location.Type: ApplicationFiled: November 6, 2017Publication date: December 27, 2018Inventors: Martin Troester, Janna Troester, Thomas Pohl, Bernd Simmet
-
Patent number: 10025582Abstract: Embodiments of the present invention disclose a method, computer program product, and system for applying a plurality of program patch sets on a plurality of computer programs. Virtual machines are prepared to be patchable, in response to a suspended computer program. Synchronized snapshots of the virtual machines are created. A plurality of binary code sections of each of the synchronized snapshots are determined. Symbol data information of each of the synchronized snapshots are analyzed, based on the program patch sets. The determined binary code sections are replaced with a set of patch data, based on the plurality of program patch sets, resulting in patched snapshots for each of the synchronized snapshots. Dependencies of the patch data are adjusted, based on the replaced plurality of binary code sections and the execution of the computer program on each of the virtual machines are resumed using the plurality of patched snapshots.Type: GrantFiled: December 10, 2015Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Patent number: 10025585Abstract: Embodiments of the present invention disclose a method, computer program product, and system for applying a plurality of program patch sets on a plurality of computer programs. Virtual machines are prepared to be patchable, in response to a suspended computer program. Synchronized snapshots of the virtual machines are created. A plurality of binary code sections of each of the synchronized snapshots are determined. Symbol data information of each of the synchronized snapshots are analyzed, based on the program patch sets. The determined binary code sections are replaced with a set of patch data, based on the plurality of program patch sets, resulting in patched snapshots for each of the synchronized snapshots. Dependencies of the patch data are adjusted, based on the replaced plurality of binary code sections and the execution of the computer program on each of the virtual machines are resumed using the plurality of patched snapshots.Type: GrantFiled: May 6, 2016Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: Jakob C. Lang, Angel Nunez Mencias, Thomas Pohl, Martin Troester
-
Patent number: 10003622Abstract: A method and a system for establishing a communication session between a first communication device in a main communication network and a second communication device in a local communication network comprising a wireless network, the second communication device being located in the vicinity of a mobile device, the first communication device contacting an external phone number, wherein the external phone number is assigned to a unique identifier of the mobile device. The method comprises (i) the mobile device sending the unique identifier detectable on the wireless network; (ii) providing the unique identifier of the mobile device) and a local communication identifier to a service provider adapter; (iii) determining the location of the mobile device, associating the mobile device to the second communication device in dependence of its location.Type: GrantFiled: December 14, 2017Date of Patent: June 19, 2018Assignee: International Business Machines CorporationInventors: Martin Troester, Janna Troester, Thomas Pohl, Bernd Simmet