Patents by Inventor Matthias Buehl

Matthias Buehl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11595445
    Abstract: Methods, systems, and computer-readable storage media for receiving, by an AMS, a policy definition file defining policies to be enforced during execution of an instance of an application within the cloud platform, providing, by the AMS, an enhanced policy definition file indicating authorizations for roles for a policy of the policy definition file, providing an authentication bundle for execution of policy decisions at the instance, the authentication bundle provided based on the enhanced policy definition file, the authentication bundle distributed to application containers within the cloud platform, and during execution of the instance: transmitting, by the instance, an authorization request from the instance to an ADC, the ADC including an OPA and being executed within the container and executing policy decisions based on the authentication bundle, receiving, by the instance, a policy decision from the ADC and enforcing the policy based on the policy decision.
    Type: Grant
    Filed: February 2, 2021
    Date of Patent: February 28, 2023
    Assignee: SAP SE
    Inventors: Anett Lippert, Juergen Denner, Matthias Buehl
  • Publication number: 20220247787
    Abstract: Methods, systems, and computer-readable storage media for receiving, by an AMS, a policy definition file defining policies to be enforced during execution of an instance of an application within the cloud platform, providing, by the AMS, an enhanced policy definition file indicating authorizations for roles for a policy of the policy definition file, providing an authentication bundle for execution of policy decisions at the instance, the authentication bundle provided based on the enhanced policy definition file, the authentication bundle distributed to application containers within the cloud platform, and during execution of the instance: transmitting, by the instance, an authorization request from the instance to an ADC, the ADC including an OPA and being executed within the container and executing policy decisions based on the authentication bundle, receiving, by the instance, a policy decision from the ADC and enforcing the policy based on the policy decision.
    Type: Application
    Filed: February 2, 2021
    Publication date: August 4, 2022
    Inventors: Anett Lippert, Juergen Denner, Matthias Buehl
  • Patent number: 10713246
    Abstract: A system, method, and computer-readable medium, to receive a query specifying a result set of data from at least one database table; determine whether at least one column of the at least one database table is subject to a column-based authorization restriction; modify the query, in an instance it is determined that at least one column of the at least one database table is subject to a column-based authorization restriction, to restrict the result set of data in accordance with the column-based authorization restriction; and execute, in response to the modifying of the query, the modified query.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: July 14, 2020
    Assignee: SAP SE
    Inventors: Igor Schukovets, Gregor Tielsch, Erich Schulzke, Nils Hartmann, Roland Lucius, Matthias Buehl, Timm Falter
  • Publication number: 20180373757
    Abstract: A system, method, and computer-readable medium, to receive a query specifying a result set of data from at least one database table; determine whether at least one column of the at least one database table is subject to a column-based authorization restriction; modify the query, in an instance it is determined that at least one column of the at least one database table is subject to a column-based authorization restriction, to restrict the result set of data in accordance with the column-based authorization restriction; and execute, in response to the modifying of the query, the modified query.
    Type: Application
    Filed: June 22, 2017
    Publication date: December 27, 2018
    Inventors: Igor Schukovets, Gregor Tielsch, Erich Schulzke, Nils Hartmann, Roland Lucius, Matthias Buehl, Timm Falter
  • Publication number: 20160092816
    Abstract: The present disclosure describes methods, systems, and computer program products for providing services for efficient use of existing resources. One computer-implemented method includes building a data model enhanced for efficient storage of a material, the enhancements permitting generation of optimization problem solutions related to storage of the material, wherein the enhancements include technical specifications and customizing data, enhancing one or more attributes of the enhanced data model with regulatory attributes or rules, performing, using the enhanced data model, demand planning related to the material, performing, using a dynamic optimization algorithm, material transfer planning to determine where to most effectively store the material, performing a simulation of various storage possibilities of the material, and balancing amounts of the material using results of the performed simulation by shifting quantities of the material to, from, or within a particular storage medium.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Sylvia Beate Wuertele, Matthias Buehl
  • Publication number: 20150142852
    Abstract: The present disclosure describes methods, systems, and computer program products for providing declarative authorizations for SQL data manipulation. One computer-implemented method includes defining a data access model by: defining at least one aspect to be used as an authorization-relevant attribute for a resource entity, defining a path definition from the resource entity to the at least one aspect to relate the at least one aspect to the resource entity the authorization is restricted on, defining at least one restriction for the at least one aspect as part of the path definition, wherein defining the at least one restriction includes determining which constraint condition are to be used and how the constraint conditions are to be combined, and defining/assigning a role to a user, the role defining authorization to the resource entity using, at least in part, the at least one aspect, and deploying a data control language document.
    Type: Application
    Filed: November 15, 2013
    Publication date: May 21, 2015
    Inventors: Anett Lippert, Wolfgang Orlich, Ralf Miko, Matthias Buehl
  • Patent number: 8938622
    Abstract: A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a customer computing platform to a key store of the cloud computing platform, based on a customer-based encryption key. The cloud-based encryption key and customer-based encryption key is able to encrypt or decrypt customer data used by an application server running on the cloud computing platform. Next, the cloud-based encryption key is unlocked from the key store, and then stored in a secure store of a main memory associated with the customer computing platform. Then, according to encryption or decryption mechanism, the unlocked cloud-based encryption key is accessed to encrypt or decrypt customer data stored on a database of the main memory and used by the application server.
    Type: Grant
    Filed: September 21, 2012
    Date of Patent: January 20, 2015
    Assignee: SAP AG
    Inventor: Matthias Buehl
  • Publication number: 20150006217
    Abstract: Techniques of organizing meetings are disclosed. Time boundary information and a plurality of participant parameters for a meeting may be received. A priority indication for each participant parameter may also be received. The priority indication may indicate a level of priority of the corresponding participant parameter for the meeting. Different priority indications may indicate different levels of priority. For each participant parameter, at least one potential participant for the meeting may be identified based on the corresponding participant parameter. The priority indication for each participant parameter may be associated with the at least one potential participant corresponding to that participant parameter. For each potential participant, a measure of availability may be determined based on the time boundary information of the meeting. At least one proposed meeting time for the meeting may be determined based on the priority indications and the measures of availability of the potential participants.
    Type: Application
    Filed: June 26, 2013
    Publication date: January 1, 2015
    Applicant: SAP AG
    Inventors: Matthias Buehl, Sylvia Beate Scheu
  • Patent number: 8909685
    Abstract: Various embodiments of systems and methods for pattern recognition of a distribution function are described herein. An influenced distribution function corresponding to an influenced attribute is compared with other distribution functions corresponding to other attributes. Based on the comparison, a correlation is determined between the influenced distribution function and an influencing distribution function from the other distribution functions. Based on the determination, a raw distribution function corresponding to an influenced attribute is extracted using the influenced distribution function and the influencing distribution function. The extracted raw distribution function and the influencing distribution function may be classified.
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: December 9, 2014
    Assignee: SAP SE
    Inventors: Sylvia Scheu, Matthias Buehl, Boris Oliver Kneisel
  • Patent number: 8763095
    Abstract: A method relates to access control of shared resources on computer systems that have diverse system policies for access rights to resources. The method includes, on a source computer system with which a target computer system shares a resource, preparing user-authorization data for the shared resource in a flat file format as data tuples, line records or tables. This format makes the user-authorization data usable in computer systems with diverse system policies for access rights to resources. The method further includes authorizing user access to the shared resource on the target computer system based on the user-authorization data prepared in flat file format by the source computer system.
    Type: Grant
    Filed: April 12, 2012
    Date of Patent: June 24, 2014
    Assignee: SAP AG
    Inventor: Matthias Buehl
  • Publication number: 20140089674
    Abstract: A system and method for encryption in a cloud computing platform with customer controlled keys is disclosed. A cloud-based encryption key is uploaded from a customer computing platform to a key store of the cloud computing platform, based on a customer-based encryption key. The cloud-based encryption key and customer-based encryption key is able to encrypt or decrypt customer data used by an application server running on the cloud computing platform. Next, the cloud-based encryption key is unlocked from the key store, and then stored in a secure store of a main memory associated with the customer computing platform. Then, according to encryption or decryption mechanism, the unlocked cloud-based encryption key is accessed to encrypt or decrypt customer data stored on a database of the main memory and used by the application server.
    Type: Application
    Filed: September 21, 2012
    Publication date: March 27, 2014
    Inventor: MATTHIAS BUEHL
  • Publication number: 20130276066
    Abstract: A method relates to access control of shared resources on computer systems that have diverse system policies for access rights to resources. The method includes, on a source computer system with which a target computer system shares a resource, preparing user-authorization data for the shared resource in a flat file format as data tuples, line records or tables. This format makes the user-authorization data usable in computer systems with diverse system policies for access rights to resources. The method further includes authorizing user access to the shared resource on the target computer system based on the user-authorization data prepared in flat file format by the source computer system.
    Type: Application
    Filed: April 12, 2012
    Publication date: October 17, 2013
    Applicant: SAP AG
    Inventor: Matthias Buehl
  • Publication number: 20130159370
    Abstract: Various embodiments of systems and methods for pattern recognition of a distribution function are described herein. An influenced distribution function corresponding to an influenced attribute is compared with other distribution functions corresponding to other attributes. Based on the comparison, a correlation is determined between the influenced distribution function and an influencing distribution function from the other distribution functions. Based on the determination, a raw distribution function corresponding to an influenced attribute is extracted using the influenced distribution function and the influencing distribution function. The extracted raw distribution function and the influencing distribution function may be classified.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Inventors: Sylvia Scheu, Matthias Buehl, Boris Oliver Kneisel