Patents by Inventor Michael Kiessling
Michael Kiessling has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250052856Abstract: In accordance with an embodiment, a method includes: obtaining radar data indicative of a radar signal of a first radar sensor; determining an amount of samples of interest present in the radar data, wherein each of the samples of interest have a value that fulfills a predetermined criterion relative to a predetermined amplitude threshold; and determining a presence of an interference of a second radar sensor with the first radar sensor or a presence of a target in a field of view of the first radar sensor based on the amount of samples of interest detected in the radar data.Type: ApplicationFiled: July 24, 2024Publication date: February 13, 2025Inventors: Christoph Jürgen Will, Michael Kießling
-
Patent number: 10430259Abstract: Systems and methods are provided for data object validation using multilayer computing environments. A dashboard monitor initiates monitoring of a listener component belonging to a processing center core layer for changes in data objects stored in a data store. The listener component monitors a data maintenance component for changed data objects recorded in a changed objects list stored within the listener component. A daemon framework orchestrates compliance validation of the changed data objects with policies stored in another data store. Compliance of the changed data objects with the policies based on validation rules is validated by a shadow processing component. Real time results associated with the validated compliance are provided to a user interface dashboard.Type: GrantFiled: November 4, 2016Date of Patent: October 1, 2019Assignee: SAP SEInventors: Michael Kiessle, Christof Schmoll
-
Publication number: 20180129548Abstract: Systems and methods are provided for data object validation using multilayer computing environments. A dashboard monitor initiates monitoring of a listener component belonging to a processing center core layer for changes in data objects stored in a data store. The listener component monitors a data maintenance component for changed data objects recorded in a changed objects list stored within the listener component. A daemon framework orchestrates compliance validation of the changed data objects with policies stored in another data store. Compliance of the changed data objects with the policies based on validation rules is validated by a shadow processing component. Real time results associated with the validated compliance are provided to a user interface dashboard.Type: ApplicationFiled: November 4, 2016Publication date: May 10, 2018Inventors: Michael Kiessle, Christof Schmoll
-
Patent number: 8563500Abstract: Provided is a method of treating a patient having an inflammatory disease by using a compound which inhibits the complex I-mediated ROS production, a medicament containing such compound and methods for screening for such compounds.Type: GrantFiled: September 5, 2007Date of Patent: October 22, 2013Assignee: Deutsches Krebsforschungszentrum Stiftung des Offentlichen RechtsInventors: Karsten Guelow, Marcin Kaminski, Michael Kiessling, Peter H. Krammer
-
Patent number: 8528108Abstract: A way for securely protecting secret information—for example, a secret key—in a programmed electronic device is provided. A technique is disclosed for protecting secret information in a programmed electronic device that includes a non-trusted memory containing software, a data memory containing the secret information, and an access restriction logic unit that is adapted to allow or block access to the secret information wherein the secret information is adapted to be used for verifying the integrity of the software. In one embodiment, when starting up the programmed electronic device, the access restriction logic unit allows access to the secret information. Then the secret information is accessed for use in verifying the integrity of the software, and subsequently the access restriction logic unit blocks further access to the secret information. Embodiments of a semiconductor device and a programmed electronic device comprising similar features are also disclosed.Type: GrantFiled: October 6, 2006Date of Patent: September 3, 2013Assignee: Agere Systems LLCInventors: Gerhard Ammer, Michael Chambers, Hai Wang, Paul Renshaw, Michael Kiessling
-
Publication number: 20110281618Abstract: A mobile communication device and a camera module are disclosed herein. In one embodiment, the mobile communication device includes: (1) a main body having attaching means for attaching a camera module, the attaching means comprising means for automatically moving the camera module from the retracted position to the exposed position employing electrical energy and (2) a camera module having complementary attaching means to the main body, such that the camera module is movable with respect to the main body from a retracted position to an exposed position, is wholly detachable from the mobile communication device and is rotatable in the exposed position about at least one axis of rotation.Type: ApplicationFiled: July 26, 2011Publication date: November 17, 2011Applicant: Agere Systems IncorporatedInventors: Michael J. Chambers, Michael Kiessling
-
Patent number: 8010154Abstract: A mobile communication device having a camera module and a method of operating a mobile communication device having a camera module. In one embodiment, the mobile communication device includes: (1) a main body and (2) a camera module, coupled to the main body and configured for movement with respect thereto between a retracted position and an exposed position and rotatable in the exposed position about at least one axis of rotation.Type: GrantFiled: May 16, 2007Date of Patent: August 30, 2011Assignee: Agere Systems Inc.Inventors: Michael J. Chambers, Michael Kiessling
-
Patent number: 7941125Abstract: A system for, and method of automated data input that employs a mobile telephone as an input device. In one embodiment, the system includes: (1) a mobile telephone having a camera configured to generate an image of a document that contains the data, (2) a processing server adapted to receive the document via a wireless communication network, extract the data from the image and arrange the data according to a format and (3) a database, associated with the interpreter, that receives and stores the data according to the format.Type: GrantFiled: September 19, 2003Date of Patent: May 10, 2011Assignee: Agere Systems, Inc.Inventors: Michael J. Chambers, Michael Kiessling
-
Publication number: 20100305187Abstract: Provided is a method of treating a patient having an inflammatory disease by using a compound which inhibits the complex I-mediated ROS production, a medicament containing such compound and methods for screening for such compounds.Type: ApplicationFiled: September 5, 2007Publication date: December 2, 2010Applicant: Deutsches Krebsforschungszentrum Stiftung des offentlichen RechtsInventors: Karsten Guelow, Marcin Kaminski, Michael Kiessling, Peter H. Krammer
-
Publication number: 20100293388Abstract: This disclosure provides a way for securely protecting secret information—for example, a secret key—in a programmed electronic device. A technique is disclosed for protecting secret information in a programmed electronic device that includes a non-trusted memory containing software, a data memory containing the secret information, and an access restriction logic unit that is adapted to allow or block access to the secret information wherein the secret information is adapted to be used for verifying the integrity of the software. In one embodiment, when starting up the programmed electronic device, the access restriction logic unit allows access to the secret information. Then the secret information is accessed for use in verifying the integrity of the software, and subsequently the access restriction logic unit blocks further access to the secret information. Embodiments of a semiconductor device and a programmed electronic device comprising similar features are also disclosed.Type: ApplicationFiled: October 6, 2006Publication date: November 18, 2010Applicant: AGERE SYSTEMS, INC.Inventors: Gerhard Ammer, Michael Chambers, Hai Wang, Paul Renshaw, Michael Kiessling
-
Patent number: 7782375Abstract: A mobile communication device, in particular a mobile telephone, a PDA or a MDA. In one embodiment, the mobile communication device includes: (1) a main body and (2) a camera module, coupled to the main body and configured for rotation relative to the main body about at least one axis of rotation. In another embodiment, the main body has a camera module mechanical interface, the camera module has a main body mechanical interface that is complementary to the camera module mechanical interface and the camera module is configured to be removably coupled to the main body and further configured for rotation relative to the main body about at least one axis of rotation.Type: GrantFiled: September 23, 2004Date of Patent: August 24, 2010Assignee: Agere Systems Inc.Inventors: Michael J. Chambers, Michael Kiessling
-
Patent number: 7751541Abstract: A method for setting up a connection between a first communication device and a second communication device, which are connectable by means of a communication network. In one embodiment, the method includes: (1) providing party-defined data, (2) generating a setup message containing the party-defined data, (3) transmitting the setup message from the first communication device to the second communication device, (4) extracting the party-defined data from the received setup message in the second communication device, (5) retrieving output data stored in the second communication device depending on the extracted party-defined data and (6) providing the output data via an output of the second communication device. Communication devices and a communication system are introduced and configured carry out the method.Type: GrantFiled: March 18, 2005Date of Patent: July 6, 2010Assignee: Agere Systems Inc.Inventors: Michael J. Chambers, Michael Kiessling
-
Publication number: 20100077230Abstract: This disclosure provides an apparatus including a programmable memory, a data write path for writing data into the memory and a data read path for reading data from the memory. The memory comprises at least one protected memory field. The data write path comprises a decryption unit that is adapted for receiving encrypted data, decrypting the encrypted data, and writing resulting plain data into the at least one protected memory field. The data read path is adapted for reading out the plain data stored in the protected memory field. The at least one protected memory field is only writable by applying the data to be written into the at least one protected memory field in encrypted form to the data write path.Type: ApplicationFiled: December 15, 2006Publication date: March 25, 2010Inventors: Michael Chambers, Paul Renshaw, Michael Kiessling
-
Patent number: 7657754Abstract: Apparatus and methods are presented for protecting data in microcontrollers from both malicious software processes running inside the device as well as from unauthorized attempts to read the data from an external data bus and/or external memory. An illustrative embodiment of the invention accomplishes these security improvements, in part, by utilizing an enhanced memory management unit (MMU). The enhanced MMU is configured to prevent one software process running on the microcontroller from accessing data associated with a different software process running on the same microcontroller. Moreover, data transmitted over an external data bus or stored in an external memory is encrypted, thereby reducing the chances that unauthorized users will gain exploitable information from this data.Type: GrantFiled: December 8, 2005Date of Patent: February 2, 2010Assignee: Agere Systems IncInventors: Michael Joseph Chambers, Michael Kiessling, Kenneth A. Tuchman, Hai Wang
-
Patent number: 7570978Abstract: A mobile communication device and a method of operating the same to prevent unintentional activation thereof. In one embodiment, the mobile communication device includes: (1) a first body part, (2) a second body part, (3) a slider mechanism configured to slidably attach the second body part to the first body part, the second body part movable at least from a first position to a second position with respect to the first body part by means of the slider mechanism and (4) a lock configured to lock the second body part in the first position.Type: GrantFiled: December 1, 2005Date of Patent: August 4, 2009Assignee: Agere Systems Inc.Inventors: Michael J. Chambers, Michael Kiessling
-
Patent number: 7512398Abstract: The present invention provides a method for authenticating a digital data unit of a mobile communications device. In one embodiment, the invention provides for the capture of a digital data unit with a mobile communications device and generating authentication data to confirm at least one of the source or integrity of the digital data unit.Type: GrantFiled: August 23, 2005Date of Patent: March 31, 2009Assignee: Agere Systems Inc.Inventors: Michael J. Chambers, Michael Kiessling, Kenneth A. Tuchman
-
Publication number: 20080064437Abstract: A mobile communication device (e.g., a wireless telephone) capable of making stereoscopic images. In one embodiment, the mobile communication device includes: (1) a main body, (2) first and second camera modules rotatably attached to the main body and (3) a drive structure coupled to the first and second camera modules and configured to rotate the first and second camera modules relative to the main body about corresponding first and second axes of rotation.Type: ApplicationFiled: September 27, 2004Publication date: March 13, 2008Inventors: Michael Chambers, Michael Kiessling
-
Publication number: 20070279481Abstract: A mobile communication device, in particular a mobile telephone, a PDA or a MDA. In one embodiment, the mobile communication device includes: (1) a main body and (2) a camera module, coupled to the main body and configured for rotation relative to the main body about at least one axis of rotation. In another embodiment, the main body has a camera module mechanical interface, the camera module has a main body mechanical interface that is complementary to the camera module mechanical interface and the camera module is configured to be removably coupled to the main body and further configured for rotation relative to the main body about at least one axis of rotation.Type: ApplicationFiled: September 23, 2004Publication date: December 6, 2007Inventors: Michael Chambers, Michael Kiessling
-
Publication number: 20070273752Abstract: A mobile communication device having a camera module and a method of operating a mobile communication device having a camera module. In one embodiment, the mobile communication device includes: (1) a main body and (2) a camera module, coupled to the main body and configured for movement with respect thereto between a retracted position and an exposed position and rotatable in the exposed position about at least one axis of rotation.Type: ApplicationFiled: May 16, 2007Publication date: November 29, 2007Applicant: Agere Systems IncorporatedInventors: Michael Chambers, Michael Kiessling
-
Publication number: 20070136576Abstract: Apparatus and methods are presented for protecting data in microcontrollers from both malicious software processes running inside the device as well as from unauthorized attempts to read the data from an external data bus and/or external memory. An illustrative embodiment of the invention accomplishes these security improvements, in part, by utilizing an enhanced memory management unit (MMU). The enhanced MMU is configured to prevent one software process running on the microcontroller from accessing data associated with a different software process running on the same microcontroller. Moreover, data transmitted over an external data bus or stored in an external memory is encrypted, thereby reducing the chances that unauthorized users will gain exploitable information from this data.Type: ApplicationFiled: December 8, 2005Publication date: June 14, 2007Inventors: Michael Chambers, Michael Kiessling, Kenneth Tuchman, Hai Wang