Patents by Inventor Michael Munzert
Michael Munzert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11588647Abstract: Provided is a method for validating a predetermined digital certificate having a validation device, wherein the validation device stores approval information that specifies which digital certificates of a plurality of digital certificates are permissible digital certificates, and wherein the validation device further stores trust information which indicates a trust level of the permissible digital certificates. The method includes determining, while taking account of the approval information, whether the predetermined digital certificate is permissible for the planned use under the current conditions; and if it is determined that the predetermined digital certificate is permissible, determining the trust level of the predetermined digital certificate by taking into consideration the trust information for the planned use and the current conditions, is provided.Type: GrantFiled: November 6, 2018Date of Patent: February 21, 2023Assignee: SIEMENS GAMESA RENEWABLE ENERGY A/SInventors: Michael Munzert, David von Oheimb
-
Patent number: 10931693Abstract: A computing device is proposed for detecting attacks on a technical system based on events of an event sequence is provided. The computing device has a receiving unit for receiving the event sequence which includes a plurality of events, wherein an attack is determined by a specific sequence in the events in the received event sequence, and a checking unit for checking the received event sequence based on a main event which is contained in the specific sequence in events, wherein the checking unit is additionally designed to carry out a pattern recognition in the received event sequence based on the specific sequence in events if the main event has occurred. As the checking unit merely checks the received event sequence for the occurrence of a main event, and the more exact pattern recognition is only carried out after the main event occurs, the necessary computing expense can be reduced.Type: GrantFiled: July 6, 2015Date of Patent: February 23, 2021Inventors: Jens-Uwe Bußer, Jorge Cuellar, Michael Munzert, Heiko Patzlaff, Jan Stijohann
-
Publication number: 20200358623Abstract: Provided is a method for validating a predetermined digital certificate having a validation device, wherein the validation device stores approval information that specifies which digital certificates of a plurality of digital certificates are permissible digital certificates, and wherein the validation device further stores trust information which indicates a trust level of the permissible digital certificates. The method includes determining, while taking account of the approval information, whether the predetermined digital certificate is permissible for the planned use under the current conditions; and if it is determined that the predetermined digital certificate is permissible, determining the trust level of the predetermined digital certificate by taking into consideration the trust information for the planned use and the current conditions, is provided.Type: ApplicationFiled: November 6, 2018Publication date: November 12, 2020Inventors: Michael Munzert, David von Oheimb
-
Authorization apparatus and method for an authorized issuing of an authentication token for a device
Patent number: 10511587Abstract: Provided is a method for an authorized issuing of an authentication token for a device, including requesting an authentication token for the device by sending a request message and at least one authentication parameter to an authorization apparatus, verifying authenticity of the request message using the authentication parameter, verifying authorization for the request by comparing information on the device obtained with the request message in the authorization apparatus with context information for the device stored in a database, and on success of the verification of the authenticity and of the authorization, authorizing the issuing of the requested authentication token.Type: GrantFiled: May 18, 2016Date of Patent: December 17, 2019Assignee: SIEMENS AKTIENGESELLSCHAFTInventors: Hendrik Brockhaus, Steffen Fries, Michael Munzert, David Von Oheimb -
Publication number: 20190290652Abstract: The present invention relates to the use of Volasertib or a salt thereof or the hydrate thereof for treating patients suffering from solid malignancies including advanced or metastatic solid malignancies comprising a high frequency administration of Volasertib according to a specific dosage schedule.Type: ApplicationFiled: June 13, 2019Publication date: September 26, 2019Inventors: Tillmann TAUBE, Gerd Michael MUNZERT, Dorothea RUDOLPH
-
Method and system for obtaining and analyzing forensic data in a distributed computer infrastructure
Patent number: 10257216Abstract: A system for obtaining and analyzing forensic data in a distributed computer infrastructure. The system includes a plurality of computing devices and at least one monitoring unit, which are connected to each other via a communication network. Every computing device is configured to detect security events and send same to the monitoring unit. The monitoring unit is configured to evaluate the received security events and assign same to a danger category, wherein if there is a lack of information for assigning a danger category, the computing device is configured in such a manner as to receive instructions for gathering additional forensic data and to send the additional data via an analysis unit to the monitoring unit. The monitoring unit is configured in such a manner as to transmit instructions to the computing device for gathering additional data and to use same for re-evaluation and assigning of a danger category.Type: GrantFiled: April 23, 2015Date of Patent: April 9, 2019Assignee: Siemens AktiengesellschaftInventors: Jens-Uwe Bußer, Jorge Cuellar, Michael Munzert, Heiko Patzlaff, Jan Stijohann -
AUTHORIZATION APPARATUS AND METHOD FOR AN AUTHORIZED ISSUING OF AN AUTHENTICATION TOKEN FOR A DEVICE
Publication number: 20180359241Abstract: Provided is a method for an authorized issuing of an authentication token for a device, including requesting an authentication token for the device by sending a request message and at least one authentication parameter to an authorization apparatus, verifying authenticity of the request message using the authentication parameter, verifying authorization for the request by comparing information on the device obtained with the request message in the authorization apparatus with context information for the device stored in a database, and on success of the verification of the authenticity and of the authorization, authorizing the issuing of the requested authentication token.Type: ApplicationFiled: May 18, 2016Publication date: December 13, 2018Inventors: HENDRIK BROCKHAUS, STEFFEN FRIES, MICHAEL MUNZERT, DAVID VON OHEIMB -
Publication number: 20170149561Abstract: A method for identifying manipulation of data records in a system including a computation apparatus and an external security apparatus, wherein the data records are stored in the computation apparatus, having the method steps of: allocation of a secret to a computation apparatus, generation of a first cryptographic key by a one-way function on the basis of the secret, storage of the secret on a security apparatus that is different from the computation apparatus, use of the first cryptographic key for the purpose of protecting a first data record, and generation of a respective next cryptographic key by the same one-way function on the basis of the respectively preceding cryptographic key for the purpose of protecting a next data record on the computation apparatus and simultaneous erasure or overwriting of the respectively preceding cryptographic key.Type: ApplicationFiled: May 8, 2015Publication date: May 25, 2017Inventors: Jens-Uwe Bußer, Jorge Cuellar, Michael Munzert, Heiko Patzlaff, Jan Stijohann
-
METHOD AND SYSTEM FOR OBTAINING AND ANALYZING FORENSIC DATA IN A DISTRIBUTED COMPUTER INFRASTRUCTURE
Publication number: 20170142148Abstract: A system for obtaining and analyzing forensic data in a distributed computer infrastructure. The system includes a plurality of computing devices and at least one monitoring unit, which are connected to each other via a communication network. Every computing device is configured to detect security events and send same to the monitoring unit. The monitoring unit is configured to evaluate the received security events and assign same to a danger category, wherein if there is a lack of information for assigning a danger category, the computing device is configured in such a manner as to receive instructions for gathering additional forensic data and to send the additional data via an analysis unit to the monitoring unit. The monitoring unit is configured in such a manner as to transmit instructions to the computing device for gathering additional data and to use same for re-evaluation and assigning of a danger category.Type: ApplicationFiled: April 23, 2015Publication date: May 18, 2017Inventors: Jens-Uwe BUßER, Jorge CUELLAR, Michael MUNZERT, Heiko PATZLAFF, Jan STIJOHANN -
Publication number: 20170142145Abstract: A computing device is proposed for detecting attacks on a technical system based on events of an event sequence is provided. The computing device has a receiving unit for receiving the event sequence which includes a plurality of events, wherein an attack is determined by a specific sequence in the events in the received event sequence, and a checking unit for checking the received event sequence based on a main event which is contained in the specific sequence in events, wherein the checking unit is additionally designed to carry out a pattern recognition in the received event sequence based on the specific sequence in events if the main event has occurred. As the checking unit merely checks the received event sequence for the occurrence of a main event, and the more exact pattern recognition is only carried out after the main event occurs, the necessary computing expense can be reduced.Type: ApplicationFiled: July 6, 2015Publication date: May 18, 2017Inventors: Jens-Uwe Bußer, Jorge Cuellar, Michael Munzert, Heiko Patzlaff, Jan Stijohann
-
Publication number: 20160303131Abstract: The present invention relates to the use of Volasertib or a salt thereof or the hydrate thereof for treating patients suffering from solid malignancies including advanced or metastatic solid malignancies comprising a high frequency administration of Volasertib according to a specific dosage schedule.Type: ApplicationFiled: June 22, 2016Publication date: October 20, 2016Applicant: Boehringer Ingelheim International GmbHInventors: Tillmann TAUBE, Gerd Michael MUNZERT, Dorothea RUDOLPH
-
Publication number: 20160243124Abstract: The present invention relates to the use of BI 6727 or a salt thereof or the hydrate thereof for treating patients suffering from acute myeloid leukemia (AML) comprising the administration of a high dose of BI 6727 according to a specific dosage schedule, optionally in combination with cytarabine.Type: ApplicationFiled: May 5, 2016Publication date: August 25, 2016Inventors: Tillmann TAUBE, Gerd Michael MUNZERT, Dorothea Ingrid RUDOLPH
-
Patent number: 9370535Abstract: The present invention relates to the use of Volasertib or a salt thereof or a hydrate thereof in combination with Cisplatin or Carboplatin or a salt thereof or a hydrate thereof for treating patients suffering from advanced and/or metastatic solid tumors.Type: GrantFiled: May 9, 2012Date of Patent: June 21, 2016Assignee: BOEHRINGER INGELHEIM INTERNATIONAL GMBHInventors: Tillmann Taube, Gerd Michael Munzert, Dorothea Rudolph
-
Patent number: 9197652Abstract: A method for monitoring and controlling, industrial or building automation to detect anomalies in a control network, wherein a technology of an intrusion detection system (IDS) is configured to analyze a time sequence and time intervals of correct messages in the network traffic and to use the messages to train an anomaly detection system. Detecting a time sequence and a rhythm of correct messages allows for the detection of malfunctions or manipulations of devices and attacks that are performed using regular monitoring or control stations that have been taken over by attackers or that are defect, and that cannot be detected using content-based methods or by a considerable increase of data traffic. An additional security barrier is thus provided that can continue monitoring and protecting a technical unit from possible acts of sabotage, even if the control network of the technical unit has already been corrupted.Type: GrantFiled: August 12, 2010Date of Patent: November 24, 2015Assignee: Siemens AktiengesellschaftInventors: Jens-Uwe Busser, Jan Kästner, Michael Munzert, Christof Störmann
-
Publication number: 20130131069Abstract: The present invention relates to the use of Volasertib or a salt thereof or the hydrate thereof for treating patients suffering from solid malignancies including advanced or metastatic solid malignancies comprising a high frequency administration of Volasertib according to a specific dosage schedule.Type: ApplicationFiled: May 9, 2012Publication date: May 23, 2013Applicant: Boehringer Ingelheim International GmbHInventors: Tillmann TAUBE, Gerd Michael MUNZERT, Dorothea RUDOLPH
-
Publication number: 20130122111Abstract: The present invention relates to the use of Volasertib or a salt thereof or a hydrate thereof in combination with Cisplatin or Carboplatin or a salt thereof or a hydrate thereof for treating patients suffering from advanced and/or metastatic solid tumours.Type: ApplicationFiled: May 9, 2012Publication date: May 16, 2013Applicant: BOEHRINGER INGELHEIM INTERNATIONAL GMBHInventors: Tillmann TAUBE, Gerd Michael MUNZERT, Dorothea RUDOLPH
-
Publication number: 20120198277Abstract: A method for monitoring and controlling, industrial or building automation to detect anomalies in a control network, wherein a technology of an intrusion detection system (IDS) is configured to analyze a time sequence and time intervals of correct messages in the network traffic and to use the messages to train an anomaly detection system. Detecting a time sequence and a rhythm of correct messages allows for the detection of malfunctions or manipulations of devices and attacks that are performed using regular monitoring or control stations that have been taken over by attackers or that are defect, and that cannot be detected using content-based methods or by a considerable increase of data traffic. An additional security barrier is thus provided that can continue monitoring and protecting a technical unit from possible acts of sabotage, even if the control network of the technical unit has already been corrupted.Type: ApplicationFiled: August 12, 2010Publication date: August 2, 2012Applicant: SIEMENS AKTIENGESELLSCHAFTInventors: Jens-Uwe Busser, Jan Kästner, Michael Munzert, Christof Störmann
-
Patent number: 7321968Abstract: A method and apparatus wherein, for a network protocol a message is encoded in a first computer unit upon employment of the encoding format of the network protocol, being encoded to form an encoded message. The encoded message is subjected to a cryptographic process. The cryptographically processed message thereby formed is again encoded upon employment of the encoding format of the network protocol. The cryptographically processed message encoded in this way is transmitted from the first computer unit to the second computer unit. In the second computer unit, the received message is decoded according to the encoding format of the network protocol, and an inverse cryptographic process is applied to the decoded message. The inversely cryptographically processed message is again decoded according to the encoding format of the network protocol.Type: GrantFiled: June 19, 1998Date of Patent: January 22, 2008Assignee: Fujitsu Siemens ComputerInventors: Christoph Capellaro, Gerhard Hoffmann, Klaus Lukas, Michael Munzert