Patents by Inventor Michael Steiner

Michael Steiner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170280029
    Abstract: Improved fluoresced imaging (FI) and other sensor data imaging processes, devices, and systems are provided to enhance display of different secondary types of images and reflected light images together. Reflected light images are converted to a larger color space in a manner that preserves the color information of the reflected light image. FI or secondary images are transformed to a color range within the larger color space, but outside the color area of the reflected light images, allowing the FI or secondary images to be combined with them in a manner with improved distinguishability of color. Hardware designs are provide to enable real-time processing of image streams from medical scopes. The combined images are encoded for an electronic display capable of displaying the larger color space.
    Type: Application
    Filed: March 23, 2016
    Publication date: September 28, 2017
    Applicant: KARL STORZ Imaging, Inc.
    Inventor: Michael Steiner
  • Publication number: 20170242924
    Abstract: A method for searching in an encrypted database includes the following steps. A search is formulated as a conjunct of two or more atomic search queries. One of the conjuncts is selected as a primary atomic search query. Search capabilities are generated for a secondary atomic search query using the primary atomic search query and the secondary atomic search query.
    Type: Application
    Filed: March 31, 2017
    Publication date: August 24, 2017
    Inventors: Charles D. Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo M. Krawczyk, Marcel C. Rosu, Michael Steiner
  • Patent number: 9646166
    Abstract: A method for encrypting a database includes the following step. Keywords in the database are encrypted to obtain encrypted search tags for the keywords. A table of reverse indices is generated for the encrypted search tags. A table of cross keyword indices is generated. A method for searching in an encrypted database includes the following steps. A search is formulated as a conjunct of two or more atomic search queries. One of the conjuncts is selected as a primary atomic search query. Search capabilities are generated for a secondary atomic search query using the primary atomic search query and the secondary atomic search query. Such methods mask query data and the actual composition of the database to reduce computation complexity and privacy leakage.
    Type: Grant
    Filed: August 5, 2013
    Date of Patent: May 9, 2017
    Assignee: International Business Machines Corporation
    Inventors: Charles D. Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo M. Krawczyk, Marcel C. Rosu, Michael Steiner
  • Publication number: 20160267286
    Abstract: Methods and arrangements for protecting enterprise data with respect to a hybrid application in a mobile device that accesses a global computer information network using enterprise infrastructure. A hybrid application is recognized in a mobile device, the hybrid application being configured to communicate with an enterprise network and a non-enterprise network. There are provided, in communication with the hybrid application, controls for segregating data flows from the enterprise network and non-enterprise network. A policy service is provided, which applies a policy for the segregating and governed routing of data flows from the enterprise network and the non-enterprise network. Other variants and embodiments are broadly contemplated herein.
    Type: Application
    Filed: March 13, 2015
    Publication date: September 15, 2016
    Inventors: Palanivel A. Kodeswaran, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri, Michael Steiner
  • Publication number: 20150039885
    Abstract: A method comprises receiving a first cryptographic token for one search term and a second cryptographic token is generated using the one search term and at least another search term. A first search is conducted using the first cryptographic token to generate a first result set, and the second cryptographic token is used for computing a subset of results of the first result set.
    Type: Application
    Filed: August 5, 2013
    Publication date: February 5, 2015
    Inventors: Charles D. Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo M. Krawczyk, Marcel C. Rosu, Michael Steiner
  • Publication number: 20150039903
    Abstract: A method for encrypting a database includes the following step. Keywords in the database are encrypted to obtain encrypted search tags for the keywords. A table of reverse indices is generated for the encrypted search tags. A table of cross keyword indices is generated. A method for searching in an encrypted database includes the following steps. A search is formulated as a conjunct of two or more atomic search queries. One of the conjuncts is selected as a primary atomic search query. Search capabilities are generated for a secondary atomic search query using the primary atomic search query and the secondary atomic search query. Such methods mask query data and the actual composition of the database to reduce computation complexity and privacy leakage.
    Type: Application
    Filed: August 5, 2013
    Publication date: February 5, 2015
    Inventors: Charles D. Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo M. Krawczyk, Marcel C. Rosu, Michael Steiner
  • Patent number: 8239098
    Abstract: Industrial truck, in particular a lift truck, with a drive axle with drive wheels and a drive motor, a steering axle with two steerable wheels, a target value sensor that is connected to a steering wheel, a steering motor, a steering device which is in effective connection with a steering tie rod, a position transducer magnet whose position is recorded by two magnetic resonance sensors that are arranged in parallel, where the position transducer magnet and the resonance sensors are moved relative to each other during a steering movement of the steering device, and where the magnetic resonance sensors generate counter directional analog signals for the actual value of the steering angle of the steerable wheels, a steering control, connected to the target value sensor, the steering motor, and the magnetic resonance sensors, which evaluates the signals received from the target value sensor and the magnetic resonance sensors, and controls the vehicle steering angle to the target steering angle, where the signals
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: August 7, 2012
    Assignee: Jungheinrich Aktiengesellschaft
    Inventors: Dieter Kramer, Michael Steiner, Nils von Thienen, Jens Wiegandt
  • Patent number: 8135766
    Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: March 13, 2012
    Assignee: International Business Machines Corporation
    Inventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
  • Patent number: 8108683
    Abstract: The invention includes a method for key creation and recovery based on solutions to puzzles solvable by humans and not computers. In some exemplary embodiments, the key is created and recovered based on the solution(s) in conjunction with the password entered by the user. The puzzle(s) is selected based on the password used by the user from a puzzle database containing multiple puzzles that is greater in number to the number of puzzles used in conjunction with a particular password.
    Type: Grant
    Filed: August 10, 2006
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ran Canetti, Shai Halevi, Michael Steiner
  • Patent number: 8108940
    Abstract: The present invention relates to a method for protecting user data from unauthorized access, the method comprising the steps of, on a data processing system: maintaining said user data in encrypted form stored on a second storage, when loading an operating system using an operating system loader: receiving in a first disk key transmission step from a first user system a symmetric user key that is only accessible by the data processing system if the operating system loader has been started on behalf of said first user system, wherein the symmetric user key is received sealed to a combination of the operating system loader and a user identifier corresponding to said first user system in said first disk key transmission step; accessing the symmetric user key, if the operating system loader has been started on behalf of said first user system; decrypting in a user data decryption step said user data using the symmetric user key, maintaining said symmetric user key in a volatile memory.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Daniel M Dias, Matthias Schunter, Michael Steiner
  • Patent number: 8099781
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: January 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 8087090
    Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range by mapping the effectiveness of performing the mitigation measures to determine a residual risk after a mitigation measure has been implemented.
    Type: Grant
    Filed: June 2, 2008
    Date of Patent: December 27, 2011
    Assignee: International Business Machines Corporation
    Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 8020193
    Abstract: Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204) classifying each resource offered by a web server application as a CSRF-protected resource or a not-CSRF-protected resource. The methods also involve (214, . . . , 222) performing a user authentication, (224) initializing an authentication-token, and (226) initializing a CSRF protection secret that is used to validate CSRF protection parameters contained in resource identifiers for the resources. The methods further involve (228) performing a server-side rewriting process (300) to add the CSRF protection parameter to the resource identifiers for the resources and/or (230) performing a client-side rewriting process to add the CSRF protection parameter to a resource identifier for a second resource (e.g., a resource created at a client computer (102)).
    Type: Grant
    Filed: October 20, 2008
    Date of Patent: September 13, 2011
    Assignee: International Business Machines Corporation
    Inventors: Sumeer K. Bhola, Todd E. Kaplinger, Michael Steiner
  • Patent number: 7832007
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: January 10, 2006
    Date of Patent: November 9, 2010
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Patent number: 7823487
    Abstract: A cutting tool for machining by chip removal has a supply of a cold-gas flow for cooling the immediate machine-cutting region. Accordingly, in this case, the cold-gas flow is supplied internally and is generated by a low-temperature generator, which is integrated into the tool main body and which, via a vortex tube, converts compressed gas from normal temperature into a cold-gas flow and a warm-gas flow.
    Type: Grant
    Filed: September 5, 2008
    Date of Patent: November 2, 2010
    Assignee: Ceratizit Austria Gesellschaft M.B.H.
    Inventor: Michael Steiner
  • Patent number: 7784880
    Abstract: A braking system for a floor conveyor, which features at least one travel motor for at least one driven wheel, an electric steering control for at least one steered wheel, a service brake with a braking transmitter generating a braking signal and an electromagnetically releasable spring brake as an emergency stop brake, which is amongst others actuable when an error signal is generated in the steering control or a braking signal otherwise, which further features a superordinated vehicle control for various functions of the floor conveyor and a battery for supplying the individual electric consumers, wherein the steering control actuates a first switch at an error signal, which cuts off the electric connection between the battery and the emergency stop brake, wherein an additional switch is connected in series with the first switch and is actuable by a PWM actuator of the vehicle control, and a control line is connected between the steering control and the vehicle control, such that both switches are switched
    Type: Grant
    Filed: February 25, 2009
    Date of Patent: August 31, 2010
    Assignee: Jungheinrich Aktiengesellschaft
    Inventors: Jens Glaeske, Michael Steiner, Nils von Thienen, Jens Wiegandt, Manfred Zoske
  • Publication number: 20100100927
    Abstract: Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204) classifying each resource offered by a web server application as a CSRF-protected resource or a not-CSRF-protected resource. The methods also involve (214, . . . , 222) performing a user authentication, (224) initializing an authentication-token, and (226) initializing a CSRF protection secret that is used to validate CSRF protection parameters contained in resource identifiers for the resources. The methods further involve (228) performing a server-side rewriting process (300) to add the CSRF protection parameter to the resource identifiers for the resources and/or (230) performing a client-side rewriting process to add the CSRF protection parameter to a resource identifier for a second resource (e.g., a resource created at a client computer (102)).
    Type: Application
    Filed: October 20, 2008
    Publication date: April 22, 2010
    Applicant: International Business Machines Corporation
    Inventors: Sumeer K. Bhola, Todd E. Kaplinger, Michael Steiner
  • Publication number: 20090282487
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Application
    Filed: July 23, 2009
    Publication date: November 12, 2009
    Applicant: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
  • Publication number: 20090250996
    Abstract: A braking system for a floor conveyor, which features at least one travel motor for at least one driven wheel, an electric steering control for at least one steered wheel, a service brake with a braking transmitter generating a braking signal and an electromagnetically releasable spring brake as an emergency stop brake, which is amongst others actuable when an error signal is generated in the steering control or a braking signal otherwise, which further features a superordinated vehicle control for various functions of the floor conveyor and a battery for supplying the individual electric consumers, wherein the steering control actuates a first switch at an error signal, which cuts off the electric connection between the battery and the emergency stop brake, wherein an additional switch is connected in series with the first switch and is actuable by a PWM actuator of the vehicle control, and a control line is connected between the steering control and the vehicle control, such that both switches are switched
    Type: Application
    Filed: February 25, 2009
    Publication date: October 8, 2009
    Applicant: Jungheinirch Aktiengesellschaft
    Inventors: Jens Glaeske, Michael Steiner, Nils von Thienen, Jens Wiegandt, Manfred Zoske
  • Publication number: 20090234541
    Abstract: Industrial truck, in particular a lift truck, with a drive axle with drive wheels and a drive motor, a steering axle with two steerable wheels, a target value sensor that is connected to a steering wheel, a steering motor, a steering device which is in effective connection with a steering tie rod, a position transducer magnet whose position is recorded by two magnetic resonance sensors that are arranged in parallel, where the position transducer magnet and the resonance sensors are moved relative to each other during a steering movement of the steering device, and where the magnetic resonance sensors generate counter directional analog signals for the actual value of the steering angle of the steerable wheels, a steering control, connected to the target value sensor, the steering motor, and the magnetic resonance sensors, which evaluates the signals received from the target value sensor and the magnetic resonance sensors, and controls the vehicle steering angle to the target steering angle, where the signals
    Type: Application
    Filed: February 25, 2009
    Publication date: September 17, 2009
    Applicant: Jungheinrich Aktiengesellschaft
    Inventors: Dieter Kramer, Michael Steiner, Nils von Thienen, Jens Wiegandt