Patents by Inventor Michael Steiner
Michael Steiner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7823487Abstract: A cutting tool for machining by chip removal has a supply of a cold-gas flow for cooling the immediate machine-cutting region. Accordingly, in this case, the cold-gas flow is supplied internally and is generated by a low-temperature generator, which is integrated into the tool main body and which, via a vortex tube, converts compressed gas from normal temperature into a cold-gas flow and a warm-gas flow.Type: GrantFiled: September 5, 2008Date of Patent: November 2, 2010Assignee: Ceratizit Austria Gesellschaft M.B.H.Inventor: Michael Steiner
-
Patent number: 7784880Abstract: A braking system for a floor conveyor, which features at least one travel motor for at least one driven wheel, an electric steering control for at least one steered wheel, a service brake with a braking transmitter generating a braking signal and an electromagnetically releasable spring brake as an emergency stop brake, which is amongst others actuable when an error signal is generated in the steering control or a braking signal otherwise, which further features a superordinated vehicle control for various functions of the floor conveyor and a battery for supplying the individual electric consumers, wherein the steering control actuates a first switch at an error signal, which cuts off the electric connection between the battery and the emergency stop brake, wherein an additional switch is connected in series with the first switch and is actuable by a PWM actuator of the vehicle control, and a control line is connected between the steering control and the vehicle control, such that both switches are switchedType: GrantFiled: February 25, 2009Date of Patent: August 31, 2010Assignee: Jungheinrich AktiengesellschaftInventors: Jens Glaeske, Michael Steiner, Nils von Thienen, Jens Wiegandt, Manfred Zoske
-
Publication number: 20100100927Abstract: Computer implemented methods (200) for protecting web based applications (110, 114) from Cross Site Request Forgery (CSRF) attacks. The methods involve (204) classifying each resource offered by a web server application as a CSRF-protected resource or a not-CSRF-protected resource. The methods also involve (214, . . . , 222) performing a user authentication, (224) initializing an authentication-token, and (226) initializing a CSRF protection secret that is used to validate CSRF protection parameters contained in resource identifiers for the resources. The methods further involve (228) performing a server-side rewriting process (300) to add the CSRF protection parameter to the resource identifiers for the resources and/or (230) performing a client-side rewriting process to add the CSRF protection parameter to a resource identifier for a second resource (e.g., a resource created at a client computer (102)).Type: ApplicationFiled: October 20, 2008Publication date: April 22, 2010Applicant: International Business Machines CorporationInventors: Sumeer K. Bhola, Todd E. Kaplinger, Michael Steiner
-
Publication number: 20090282487Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: ApplicationFiled: July 23, 2009Publication date: November 12, 2009Applicant: International Business Machines CorporationInventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20090250996Abstract: A braking system for a floor conveyor, which features at least one travel motor for at least one driven wheel, an electric steering control for at least one steered wheel, a service brake with a braking transmitter generating a braking signal and an electromagnetically releasable spring brake as an emergency stop brake, which is amongst others actuable when an error signal is generated in the steering control or a braking signal otherwise, which further features a superordinated vehicle control for various functions of the floor conveyor and a battery for supplying the individual electric consumers, wherein the steering control actuates a first switch at an error signal, which cuts off the electric connection between the battery and the emergency stop brake, wherein an additional switch is connected in series with the first switch and is actuable by a PWM actuator of the vehicle control, and a control line is connected between the steering control and the vehicle control, such that both switches are switchedType: ApplicationFiled: February 25, 2009Publication date: October 8, 2009Applicant: Jungheinirch AktiengesellschaftInventors: Jens Glaeske, Michael Steiner, Nils von Thienen, Jens Wiegandt, Manfred Zoske
-
Publication number: 20090234541Abstract: Industrial truck, in particular a lift truck, with a drive axle with drive wheels and a drive motor, a steering axle with two steerable wheels, a target value sensor that is connected to a steering wheel, a steering motor, a steering device which is in effective connection with a steering tie rod, a position transducer magnet whose position is recorded by two magnetic resonance sensors that are arranged in parallel, where the position transducer magnet and the resonance sensors are moved relative to each other during a steering movement of the steering device, and where the magnetic resonance sensors generate counter directional analog signals for the actual value of the steering angle of the steerable wheels, a steering control, connected to the target value sensor, the steering motor, and the magnetic resonance sensors, which evaluates the signals received from the target value sensor and the magnetic resonance sensors, and controls the vehicle steering angle to the target steering angle, where the signalsType: ApplicationFiled: February 25, 2009Publication date: September 17, 2009Applicant: Jungheinrich AktiengesellschaftInventors: Dieter Kramer, Michael Steiner, Nils von Thienen, Jens Wiegandt
-
Patent number: 7530110Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.Type: GrantFiled: May 6, 2005Date of Patent: May 5, 2009Assignee: International Business Machines CorporationInventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Patent number: 7496616Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.Type: GrantFiled: November 12, 2004Date of Patent: February 24, 2009Assignee: International Business Machines CorporationInventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
-
Publication number: 20090049111Abstract: A random number generator (RNG) resistant to side channel attacks includes an activation pseudo random number generator (APRNG) having an activation output connected to an activation seed input to provide a next seed to the activation seed input. A second random number generator includes a second seed input, which receives the next seed and a random data output, which outputs random data in accordance with the next seed. An input seed memory is connected to the activation seed input and a feedback connection from the activation output so that the next seed is stored in the input seed memory to be used by the APRNG as the activation seed input at a next startup cycle.Type: ApplicationFiled: June 2, 2008Publication date: February 19, 2009Inventors: Suresh Narayana Chari, Vincenzo Valentino Diluoffo, Paul Ashley Karger, Elaine Rivette Palmer, Tal Rabin, Josyula Ramachandra Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David Claude Toll
-
Publication number: 20090003951Abstract: A cutting tool for machining by chip removal has a supply of a cold-gas flow for cooling the immediate machine-cutting region. Accordingly, in this case, the cold-gas flow is supplied internally and is generated by a low-temperature generator, which is integrated into the tool main body and which, via a vortex tube, converts compressed gas from normal temperature into a cold-gas flow and a warm-gas flow.Type: ApplicationFiled: September 5, 2008Publication date: January 1, 2009Applicant: CERATIZIT AUSTRIA GESELLSCHAFT m.b.H.Inventor: Michael Steiner
-
Publication number: 20080295164Abstract: A method, system, and computer program storage device are disclosed for providing security in a mashup comprised of an agglomeration of a plurality of portlets. These portlets are sent from one or more back-end servers, pass through a portal server, and are received by a client browser. The method comprises the steps of developing an isolation boundary between the portlets to isolate each of the portlets from each of the other portlets, and extending said isolation boundary through the portal server and through the browser. Preferably, the portal server bases the isolation boundary on a server-side static analysis and code instrumentation of the portlets. In the preferred embodiment of the invention, each of the portlets is checked for a number of syntactic constraints and marked with a corresponding service domain. The portlets are aggregated into a page-using HTML, and that page is converted into JavaScript.Type: ApplicationFiled: May 24, 2007Publication date: November 27, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Steiner, Krishnaprasad Vikram
-
Publication number: 20080263662Abstract: An access control system and method includes a risk index module which computes a risk index for a dimension contributing to risk. A boundary range defined for a parameter representing each risk index such that the parameter above the range is unacceptable, below the range is acceptable and in the range is acceptable with mitigation measures. A mitigation module determines the mitigation measures which reduce the parameter within the range.Type: ApplicationFiled: June 2, 2008Publication date: October 23, 2008Inventors: Pau-Chen Cheng, Shai Halevi, Trent Ray Jaeger, Paul Ashley Karger, Ronald Perez, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner
-
Publication number: 20080173257Abstract: Apparatus and methods for animal control and restraint. In one embodiment, the apparatus comprises a retractable tether (e.g., leash) having a single-handed grip handle which include a built-in chemical repellent. The handle further includes a mechanism for quickly dispensing chemical repellent directionally by initiating a safety and actuating a trigger mechanism. The repellant can be used to rapidly spray one or more animals (such as during a dogfight) so as to minimize physical trauma to the dogs, and emotional trauma to the owner(s). Also, the handle is optionally equipped with a built in light for effective use of the handle (and repellant) in the dark, as well as a retractable mechanism to manage the dispensing and storage of a leash that can be attached to an animal collar.Type: ApplicationFiled: January 18, 2007Publication date: July 24, 2008Inventors: Michael Steiner, Pattie Steiner
-
Publication number: 20080144825Abstract: The present invention relates to a method for protecting user data from unauthorized access, the method comprising the steps of, on a data processing system: maintaining said user data in encrypted form stored on a second storage, when loading an operating system using an operating system loader: receiving in a first disk key transmission step from a first user system a symmetric user key that is only accessible by the data processing system if the operating system loader has been started on behalf of said first user system, wherein the symmetric user key is received sealed to a combination of the operating system loader and a user identifier corresponding to said first user system in said first disk key transmission step; accessing the symmetric user key, if the operating system loader has been started on behalf of said first user system; decrypting in a user data decryption step said user data using the symmetric user key, maintaining said symmetric user key in a volatile memory.Type: ApplicationFiled: December 19, 2006Publication date: June 19, 2008Inventors: Daniel M. Dias, Matthias Schunter, Michael Steiner
-
Publication number: 20080049939Abstract: The invention includes a method for key creation and recovery based on solutions to puzzles solvable by humans and not computers. In some exemplary embodiments, the key is created and recovered based on the solution(s) in conjunction with the password entered by the user. The puzzle(s) is selected based on the password used by the user from a puzzle database containing multiple puzzles that is greater in number to the number of puzzles used in conjunction with a particular password.Type: ApplicationFiled: August 10, 2006Publication date: February 28, 2008Applicant: International Business Machines CorporationInventors: Ran Canetti, Shai Halevi, Michael Steiner
-
Publication number: 20080003378Abstract: Producing magnetic-recording media includes providing a substrate and forming a plurality of functional layers over the substrate to provide a coated substrate adapted for recording. At least one of the layers of the magnetic-recording media is fluid jet printed as a printed layer. In some embodiments, the printed layer provides at least one of load-bearing functionality, head-cleaning functionality, adhesion-promoting functionality, reaction-promoting functionality, lubricating functionality, surface-cleansing functionality, magnetic-recording functionality, and edge-finishing functionality.Type: ApplicationFiled: June 30, 2006Publication date: January 3, 2008Inventors: Mark Serafin, Stephen R. Ebner, David C. Lowery, Neal K. Nelson, Michael Steiner
-
Publication number: 20070162976Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.Type: ApplicationFiled: January 10, 2006Publication date: July 12, 2007Applicant: International Business Machines CorporationInventors: Kay Anderson, Pau-Chen Cheng, Mark Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent Jaeger, Paul Karger, Zhen Liu, Ronald Perez, Anton Riabov, Pankaj Rohatgi, Angela Schuett, Michael Steiner, Grant Wagner
-
Publication number: 20070109219Abstract: An electro-optic display comprises, in order, a backplane comprising a plurality of pixel electrodes; a layer of a solid electro-optic medium; a main adhesive layer; and at least one of a light-transmissive protective layer and a light-transmissive electrically-conductive layer. The electro-optic layer may be in direct contact with the backplane or separated therefrom by a thin auxiliary layer of adhesive. The main adhesive layer may be colored to provide a color filter array. An inverted front plane laminate useful in forming such a display comprises the same layers except that the backplane is replaced by a release sheet. The display combines good low temperature performance and good resolution at higher temperatures.Type: ApplicationFiled: October 17, 2006Publication date: May 17, 2007Applicant: E INK CORPORATIONInventors: Thomas Whitesides, Richard Paolini, Michael Walls, Seungman Sohn, Michael McCreary, Guy Danner, Charles Honeyman, Gregg Duthaler, Michael Steiner, John Ritter
-
Publication number: 20070035808Abstract: An electro-optic display comprises a layer (130) of a solid electro-optic material, at least one electrode disposed adjacent the layer (130) of electro-optic material, and a layer (180) of a lamination adhesive interposed between the layer (130) of electro-optic material and the electrode, the lamination adhesive (180) having a higher electrical conductivity in a direction perpendicular to the layer of lamination adhesive than in the plane of the layer.Type: ApplicationFiled: July 5, 2006Publication date: February 15, 2007Applicant: E INK CORPORATIONInventors: Karl Amundson, Robert Zehner, Richard Webber, Katharine Geramita, Libing Zhang, Andrew Loxley, Gregg Duthaler, John Ritter, Michael Steiner, Mavyn Holman, Justin Abramson, Glen Crossley
-
Patent number: 7149895Abstract: The invention is related to a system which allows a user to authenticate unknown terminals. The invention uses a first authentication step wherein the terminal authenticates itself to a server. Depending on whether the personal device has its own output means, such as a loudspeaker or a screen, the final message, whether the terminal can be trusted or not, can be output on the personal device or on the terminal itself. In the case where the device has no output means of its own, this message can originate in the device and be transmitted from there to the terminal. The user can input authentication information into his personal device, which can then be fully or partially transmitted to the terminal. In the end, the terminal may use the transmitted information to give out the authenticity output message. After the first authentication step follows a second authentication step, wherein the server authenticates itself to the personal device, if there is one.Type: GrantFiled: February 1, 2000Date of Patent: December 12, 2006Assignee: International Business Machines CorporationInventors: Nadarajah Asokan, Herve C. Debar, Michael Steiner, Michael Waidner