Patents by Inventor Matthias Schunter

Matthias Schunter has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090192780
    Abstract: At least one anomaly associated with at least one actual hardware element in a computer system having a plurality of hardware elements is addressed. The anomaly is detected, and, responsive to the detection, a virtualization layer is inserted between (i) an operating system of the computer system, and (ii) the plurality of hardware elements. Hardware emulation and/or selective hardware activation/deactivation are performed on the at least one actual hardware element by the virtualization layer. The insertion of the virtualization layer is accomplished in an on-the-fly manner.
    Type: Application
    Filed: January 30, 2008
    Publication date: July 30, 2009
    Applicant: International Business Machines Corporation
    Inventors: Martim Carbone, Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Axel Tanner, Diego M. Zamboni
  • Patent number: 7523200
    Abstract: A dynamic information retrieval service is provided that can be configured to retrieve entitlement information from a plurality of providers. Any application that requires entitlement data may make a request for that information to the dynamic information retrieval service using a single standard interface. A request includes information describing the identity of the user and a list of names representing the entitlement data that are required. The dynamic information retrieval service determines the appropriate provider for the entitlement information, retrieves the entitlement data, and returns the requested entitlement data to the application. The dynamic information retrieval service may also cache the entitlement data. The dynamic information retrieval service may process requests requiring several distinct items of entitlement data to be retrieved in parallel. Therefore, applications may send a single request for entitlement data for a single user, but for several providers.
    Type: Grant
    Filed: July 2, 2003
    Date of Patent: April 21, 2009
    Assignee: International Business Machines Corporation
    Inventors: Thomas Gross, Brook M. Lovatt, Anthony Scott Moran, Matthias Schunter
  • Publication number: 20080294480
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: August 5, 2008
    Publication date: November 27, 2008
    Inventors: Michael Backes, Guenter Karioth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20080256595
    Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.
    Type: Application
    Filed: May 21, 2008
    Publication date: October 16, 2008
    Applicant: International Business Machines Corporation
    Inventors: Matthias Schunter, Jonathan A. Poritz, Michael Waidner, Elsie A. Van Herreweghen
  • Publication number: 20080235793
    Abstract: A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
    Type: Application
    Filed: January 28, 2008
    Publication date: September 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthias Schunter, Axel Tanner, Bernhard Jansen
  • Publication number: 20080235534
    Abstract: A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
    Type: Application
    Filed: March 25, 2008
    Publication date: September 25, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Matthias Schunter, Axel Tanner, Bernhard Jansen
  • Publication number: 20080229097
    Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).
    Type: Application
    Filed: May 26, 2008
    Publication date: September 18, 2008
    Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
  • Publication number: 20080144825
    Abstract: The present invention relates to a method for protecting user data from unauthorized access, the method comprising the steps of, on a data processing system: maintaining said user data in encrypted form stored on a second storage, when loading an operating system using an operating system loader: receiving in a first disk key transmission step from a first user system a symmetric user key that is only accessible by the data processing system if the operating system loader has been started on behalf of said first user system, wherein the symmetric user key is received sealed to a combination of the operating system loader and a user identifier corresponding to said first user system in said first disk key transmission step; accessing the symmetric user key, if the operating system loader has been started on behalf of said first user system; decrypting in a user data decryption step said user data using the symmetric user key, maintaining said symmetric user key in a volatile memory.
    Type: Application
    Filed: December 19, 2006
    Publication date: June 19, 2008
    Inventors: Daniel M. Dias, Matthias Schunter, Michael Steiner
  • Patent number: 7302569
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Grant
    Filed: August 19, 2003
    Date of Patent: November 27, 2007
    Assignee: International Business Machines Corporation
    Inventors: Linda Betz, John C. Dayka, Walter B. Farrell, Richard H. Guski, Guenter Karjoth, Mark A. Nelson, Birgit M. Pfitzmann, Matthias Schunter, Michael P. Waidner
  • Publication number: 20070250913
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: June 18, 2007
    Publication date: October 25, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20070169065
    Abstract: One embodiment disclosed is a computer program with metadata management function. The computer program includes a basic program module and a metadata management module. The metadata management module includes intercept definition elements that define intercept points in the basic program module. The metadata management module further includes intercept instructions that define metadata operations to be performed when an intercept point occurs in the basic program module.
    Type: Application
    Filed: October 31, 2006
    Publication date: July 19, 2007
    Inventors: Philippe Janson, Tadeusz Pietraszek, Matthias Schunter, Chris Berghe
  • Publication number: 20060184995
    Abstract: The present invention provides methods and apparatus for creating a privacy policy from a process model, and methods and apparatus for checking the compliance of a privacy policy. An example of a method for creating a privacy policy from a process model according to the invention comprises the following steps. First, a task from the process model is chosen. Then one or more of the elements role, data, purpose, action, obligation, and condition are gathered from the task and a rule is build up by means of these elements. Finally the rule is added to the privacy policy.
    Type: Application
    Filed: December 22, 2005
    Publication date: August 17, 2006
    Applicant: International Business Machines Corporation
    Inventors: Michael Backes, Guenter Karjoth, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20060026423
    Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM), and comprises the following steps. First, the computing platform (P) receives configuration values (PCR1 . . . PCRn). Then, by means of the trusted platform module (TPM), a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCR1 . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp)) on one of the received configuration values (PCR1 . . . PCRn).
    Type: Application
    Filed: July 11, 2005
    Publication date: February 2, 2006
    Applicant: International Business Machines Corporation
    Inventors: Endre Bangerter, Matthias Schunter, Michael Waidner, Jan Camenisch
  • Publication number: 20050289340
    Abstract: Method, system, and storage medium for reducing or minimizing access to sensitive information. A method includes identifying processes and data associated with a computer system and classifying each of the data as one of either sensitive information or non-sensitive information. The sensitive information includes at least one of: data that is personal to an individual, confidential data, and data that is legally subject to conditions of restricted use. For each of the processes the method includes selecting a process and a sensitive data item, modifying the sensitive data item, analyzing the behavior of at least the selected process, and preventing access of the sensitive data item by the selected process if, as a result of the analyzing, the sensitive data item is determined not to be needed by the selected process.
    Type: Application
    Filed: June 23, 2004
    Publication date: December 29, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jan Camenisch, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050251857
    Abstract: Method and device for verifying the security of a computing platform. In the method for verifying the security of a computing platform a verification machine is first transmitting a verification request via an integrity verification component to the platform. Then the platform is generating by means of a trusted platform module a verification result depending on binaries loaded on the platform, and is transmitting it to the integrity verification component. Afterwards, the integrity verification component is determining with the received verification result the security properties of the platform and transmits them to the verification machine. Finally, the verification machine is determining whether the determined security properties comply with desired security properties.
    Type: Application
    Filed: May 2, 2005
    Publication date: November 10, 2005
    Applicant: International Business Machines Corporation
    Inventors: Matthias Schunter, Jonathan Poritz, Michael Waidner, Elsie Van Herreweghen
  • Publication number: 20050086228
    Abstract: According to the present invention, there is provided a method and apparatus for controlling an access for a client application residing on a user computer to data stored on a network computer within a network.
    Type: Application
    Filed: October 20, 2004
    Publication date: April 21, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas Gross, Guenter Karjoth, Matthias Schunter
  • Publication number: 20050055434
    Abstract: A method is presented for obtaining information from a client for the benefit of a server using a particular communication protocol that the server does not implement. A primary server receives a client-generated request, and the primary server sends a first request to a secondary server as part of the processing of the client-generated request. While processing the first request, the secondary server determines a need for data obtainable from a client application that supports user interaction using a communication protocol for which the secondary server is not configured to implement. The secondary server sends a second request to the primary server for obtaining data that results from using the communication protocol. The secondary server subsequently receives the resulting data and continues to process the first request using the resulting data, after which the secondary server returns a response for the first request to the primary server.
    Type: Application
    Filed: September 4, 2003
    Publication date: March 10, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Warwick Burrows, Guenter Karioth, Anthony Moran, Birgit Pfitzmann, Matthias Schunter, Brian Turner
  • Publication number: 20050044409
    Abstract: A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving function set (PSFS) comprising a list of application functions that read or write PII data objects. Each PII PSFS is also assigned a PII classification label. A PII data object is accessible via an application function of a PII PSFS having a PII classification label that is identical to or dominant of the PII classification label of the PII object. A user of the control facility is assigned a PII clearance set which contains a list of at least one PII classification label, which is employed in determining whether the user is entitled to access a particular function.
    Type: Application
    Filed: August 19, 2003
    Publication date: February 24, 2005
    Applicant: International Business Machines Corporation
    Inventors: Linda Betz, John Dayka, Walter Farrell, Richard Guski, Guenter Karjoth, Mark Nelson, Birgit Pfitzmann, Matthias Schunter, Michael Waidner
  • Publication number: 20050004913
    Abstract: A dynamic information retrieval service is provided that can be configured to retrieve entitlement information from a plurality of providers. Any application that requires entitlement data may make a request for that information to the dynamic information retrieval service using a single standard interface. A request includes information describing the identity of the user and a list of names representing the entitlement data that are required. The dynamic information retrieval service determines the appropriate provider for the entitlement information, retrieves the entitlement data, and returns the requested entitlement data to the application. The dynamic information retrieval service may also cache the entitlement data. The dynamic information retrieval service may process requests requiring several distinct items of entitlement data to be retrieved in parallel. Therefore, applications may send a single request for entitlement data for a single user, but for several providers.
    Type: Application
    Filed: July 2, 2003
    Publication date: January 6, 2005
    Applicant: International Business Machines Corporation
    Inventors: Thomas Gross, Brook Lovatt, Anthony Moran, Matthias Schunter
  • Publication number: 20030004734
    Abstract: The present invention involves providing in a computer a first set of object classes representing active entities in an information-handling process, wherein a limited number of privacy-related actions represent operations performed on data, and providing in the computer a second set of object classes representing data and rules in the information-handling process, wherein at least one object class has rules associated with data. The invention also involves using the above-mentioned objects in constructing a model of an information-handling process, and providing output that identifies at least one way in which the information-handling process could be improved. One aspect of the present invention is a method for handling personally identifiable information. Another aspect of the present invention is a system for executing the method of the present invention.
    Type: Application
    Filed: June 19, 2001
    Publication date: January 2, 2003
    Applicant: International Business Machines Corporation
    Inventors: Steven B. Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Dogan Kesdogan, Matthew P. Leonard, Xuan Liu, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Calvin Stacy Powers, Michael Schnyder, Edith Schonberg, Matthias Schunter, Elsie Van Herreweghen, Michael Waidner