Patents by Inventor Michael Zunke

Michael Zunke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240080371
    Abstract: Provided is a method for use-case analysis of an application. It includes instrumenting a software application or an environment to generate execution traces at use-case reference points; capturing the execution traces during user interaction with the software application during a use-case scenario; applying a classification model to execution traces correlated to a sequence of interaction steps; and to report a use of the app. A machine learning module automatically adapts, updates and applies the classification model on use-case scenarios, thereby evidencing whether the customer successfully completed these use cases, and helping the product vendor understand if the customer is receiving value delivered by, and built into, the product or application. Other embodiments disclosed.
    Type: Application
    Filed: September 5, 2022
    Publication date: March 7, 2024
    Applicant: THALES DIS CPL USA, INC.
    Inventors: Michael ZUNKE, Marc BOILLOT
  • Patent number: 11706310
    Abstract: The invention relates to a system and a method for adapting a response provided by a first device. The system comprises the first device with means for receiving from at least one client device, as at least one second device, a data access request comprising at least one client identifier and a predetermined application programming interface or service provider interface associated with the first device. The first device comprises means for processing the data access request that provides the response to the data access request and means for sending the response. The system comprises adapting means for intercepting and adapting the response sent by the first device. The adapting means adapts the response while being specific to the client and provides an adapted response. And the system comprises adapted response sending means for sending at least a part of the adapted response to the second or a third device(s).
    Type: Grant
    Filed: March 1, 2018
    Date of Patent: July 18, 2023
    Assignee: THALES DIS CPL USA, INC.
    Inventors: Michael Zunke, Werner Dondl, Alexandre Airvault
  • Patent number: 11687440
    Abstract: Protection of a first software application to be executed on an execution platform by adding at least one check module to the software application, wherein the check module, when being executed, checks at least a part of the code of the protected software application loaded in the memory and carries out a predefined tamper response in case the check module detects that the checked code was changed or ensures that the protected software application continues to function correctly in case the check module detects that the checked code was not changed; selecting a first code region of the first software application, said first code region provides a first functionality when being executed; amending the selected first code region of the first software application such that an amended first code region is generated to provide the protected software application; wherein the amended first code region, when being executed, still provides the first functionality but carries out an access to at least a part of the code
    Type: Grant
    Filed: February 2, 2021
    Date of Patent: June 27, 2023
    Assignee: THALES DIS CPL USA, INC.
    Inventors: Andreas Weber, David Andreas Lange, Michael Zunke
  • Publication number: 20220245052
    Abstract: Protection of a first software application to be executed on an execution platform by adding at least one check module to the software application, wherein the check module, when being executed, checks at least a part of the code of the protected software application loaded in the memory and carries out a predefined tamper response in case the check module detects that the checked code was changed or ensures that the protected software application continues to function correctly in case the check module detects that the checked code was not changed; selecting a first code region of the first software application, said first code region provides a first functionality when being executed; amending the selected first code region of the first software application such that an amended first code region is generated to provide the protected software application; wherein the amended first code region, when being executed, still provides the first functionality but carries out an access to at least a part of the code
    Type: Application
    Filed: February 2, 2021
    Publication date: August 4, 2022
    Inventors: Andreas WEBER, David Andreas LANGE, Michael ZUNKE
  • Publication number: 20220109577
    Abstract: The invention provides a method for verifying the state of a distributed ledger. This method comprises the steps of creating a chain of data blocks, performing an authentication writing operation in the chain of data blocks and checking the authentication time of the last authentication block. Each block comprises a signature which is based on information of the previous block. The authentication writing operation comprises authentication information voted by a plurality of trusted authentication nodes, creating at least one authentication block in an authentication time. The checking step is carried out by a software instance, thus considering the information of the distributed ledger as verified and alive until this authentication time.
    Type: Application
    Filed: October 5, 2020
    Publication date: April 7, 2022
    Inventors: Martin LIEPERT, Michael ZUNKE
  • Patent number: 10922387
    Abstract: A method for controlling execution of a software application a) determining the point in time of at least one installation of an operation system, installation of a computer program, updating of the operation system, updating of the computer program, b) generating platform information based on the installed/updated system/program and the determined point in time, c) generating a first fingerprint based on the platform information, which is characteristic for the execution platform at the determined time, d) generating a license including said first fingerprint, which defines terms of allowed execution of the software application, and e) controlling the execution by—determining platform information used for generating the first fingerprint and generating a second fingerprint based on said platform information—comparing the second fingerprint with the first fingerprint, and—allowing execution of the software application if the second fingerprint complies with the first fingerprint.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: February 16, 2021
    Assignee: SFNT GERMANY GMBH
    Inventors: Werner Dondl, Andreas Lange, Michael Zunke
  • Publication number: 20190273795
    Abstract: The invention relates to a system and a method for adapting a response provided by a first device. The system comprises the first device with means for receiving from at least one client device, as at least one second device, a data access request comprising at least one client identifier and a predetermined application programming interface or service provider interface associated with the first device. The first device comprises means for processing the data access request that provides the response to the data access request and means for sending the response. The system comprises adapting means for intercepting and adapting the response sent by the first device. The adapting means adapts the response while being specific to the client and provides an adapted response. And the system comprises adapted response sending means for sending at least a part of the adapted response to the second or a third device(s).
    Type: Application
    Filed: March 1, 2018
    Publication date: September 5, 2019
    Applicant: SFNT Germany GmbH
    Inventors: Michael Zunke, Werner Dondl, Alexandre Airvault
  • Patent number: 10120986
    Abstract: A method for controlling an execution of a software application on an execution platform in a first local network comprises: determining a first environment fingerprint including a first network fingerprint characteristic for the first local network using predetermined rules; generating a license including the first environment fingerprint and defining terms of allowed execution of the software application; and controlling the execution by: determining a second environment fingerprint including a second network fingerprint of a local network in which an execution platform for the software application is included using the predetermined rules; comparing the second environment fingerprint with the first environment fingerprint of the license; allowing execution of the software application according to the terms of the license where the second environment fingerprint complies with the first environment fingerprint, and preventing the execution of the software application where the second environment fingerprint
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: November 6, 2018
    Assignee: SFNT GERMANY GmbH
    Inventors: Andreas Lange, Pratyush Kumar, Michael Zunke
  • Publication number: 20170372045
    Abstract: A method for controlling execution of a software application a) determining the point in time of at least one installation of an operation system, installation of a computer program, updating of the operation system, updating of the computer program, b) generating platform information based on the installed/updated system/program and the determined point in time, c) generating a first fingerprint based on the platform information, which is characteristic for the execution platform at the determined time, d) generating a license including said first fingerprint, which defines terms of allowed execution of the software application, and e) controlling the execution by—determining platform information used for generating the first fingerprint and generating a second fingerprint based on said platform information—comparing the second fingerprint with the first fingerprint, and—allowing execution of the software application if the second fingerprint complies with the first fingerprint.
    Type: Application
    Filed: December 9, 2015
    Publication date: December 28, 2017
    Applicant: SFNT GERMANY GMBH
    Inventors: Werner DONDL, Andreas LANGE, Michael ZUNKE
  • Publication number: 20150169852
    Abstract: A method for controlling an execution of a software application on an execution platform in a first local network comprises: determining a first environment fingerprint including a first network fingerprint characteristic for the first local network using predetermined rules; generating a license including the first environment fingerprint and defining terms of allowed execution of the software application; and controlling the execution by: determining a second environment fingerprint including a second network fingerprint of a local network in which an execution platform for the software application is included using the predetermined rules; comparing the second environment fingerprint with the first environment fingerprint of the license; allowing execution of the software application according to the terms of the license where the second environment fingerprint complies with the first environment fingerprint, and preventing the execution of the software application where the second environment fingerprint
    Type: Application
    Filed: June 16, 2014
    Publication date: June 18, 2015
    Inventors: Andreas Lange, Pratyush Kumar, Michael Zunke
  • Patent number: 8655785
    Abstract: An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the installation/update was carried out as intended, and conveying relevant details of the installation/update. The installation/updating facility (internal software, external hardware device, or combination thereof) examines and documents the pre-installation/update state of the target computer system, performs the installation/update, examines and documents the post-installation/update state, and generates the confirmation, which is a summary or digest of the process and the status thereof. The confirmation is securely authenticated and sent to the licensor for validation, to be used for order fulfillment, billing and accounting, and other purposes.
    Type: Grant
    Filed: February 10, 2008
    Date of Patent: February 18, 2014
    Assignee: SafeNet Data Security (Israel) Ltd.
    Inventor: Michael Zunke
  • Patent number: 8495388
    Abstract: A program comprises a functional block. The functional block is encrypted, additional code is added to the program and a protected program is generated that is executable only in the presence of a predetermined license in a computer system which comprises a protection module for protection against unauthorized execution of the protected program. If the encrypted functional block is to be executed, the additional code is executed. If a license is present, the additional code and/or the protection module causes decryption of the functional block, allows execution of the decrypted functional block, and upon completion of execution of the functional block, causes removal of the decrypted functional block from the working memory.
    Type: Grant
    Filed: December 17, 2006
    Date of Patent: July 23, 2013
    Assignee: SFNT Germany GmbH
    Inventor: Michael Zunke
  • Publication number: 20130179984
    Abstract: A method for controlling the execution of a software application on a computer system. The method includes the steps of generating a license map based on a given license for the application, the license map including the information on which user is allowed to execute the application, providing a license client on the computer system and providing a license server delivering the license map to the license client. When a user requests execution of the application, the license client decides whether the user is allowed to execute the application based on the license map.
    Type: Application
    Filed: March 30, 2011
    Publication date: July 11, 2013
    Inventors: Pratyush Kumar, Sebastian Mahr, Michael Zunke, Sandeep Suri, Navin Kaushik, Ranjan Sinha, Manish Gupta, Jake Fox, Seth Shlomo Weiss, Haim Hemi Ramon
  • Publication number: 20120266249
    Abstract: An apparatus, computer readable medium, and method of protecting an application, the method including responding to receiving a level of security for the application by evaluating each of a plurality of routines of the application to generate an evaluation for each of the plurality of routines of the application; selecting a number of the plurality of routines to protect based on the evaluation for each of the plurality of routines and the received level of security; and protecting the selected number of the plurality of routines.
    Type: Application
    Filed: April 13, 2011
    Publication date: October 18, 2012
    Inventors: Michael Zunke, Andreas Lange, Laszlo Elteto
  • Publication number: 20110029774
    Abstract: A group of secret sets is provided, each set including a key and an assigned identifier. The sets are stored in a secure hardware device that can retrieve the key of any of the sets using the key's corresponding identifier. A set is stored in an application, and the application is executed on a computer coupled to the secure device. The application defines a session key, encrypts the session key using the key from the set stored in the application, generates session data including the stored set's identifier and the encrypted session key, and sends the session data to the secure device. The secure device obtains from the session data the encrypted session key and the identifier, retrieves the key corresponding to the identifier, and uses the retrieved key to decrypt the session key. The session key is then used to encrypt and decrypt communications between the secure device and the computer.
    Type: Application
    Filed: October 12, 2010
    Publication date: February 3, 2011
    Inventor: Michael ZUNKE
  • Patent number: 7831051
    Abstract: A group of sets is provided, each including a secret and an assigned identifier. The sets are stored in a hardware device that can retrieve the secret of any of the sets using the secret's corresponding identifier. A set is stored in an application, and the application is delivered to a user who runs it on a computer coupled to the device. The application defines a session key, generates session data including the stored set's identifier and the session key encrypted with the stored set's corresponding secret, and sends the session data to the device. The device retrieves from the session data the encrypted session key and the identifier, retrieves from its storage the secret corresponding to the identifier, and uses the secret to decrypt the session key. The session key is then used as a shared key for secure communications between the hardware device and the computer.
    Type: Grant
    Filed: March 13, 2007
    Date of Patent: November 9, 2010
    Assignee: Aladdin Europe GmbH
    Inventor: Michael Zunke
  • Patent number: 7773753
    Abstract: An efficient symmetrical-cryptographic method for using a fast but insecure host to perform encryption/decryption based on a secret key in a secure, but slow hardware token, such as a smartcard or similar device, without revealing the secret key to the host, and such that the ciphertext and plaintext are exactly the same size. The present method is suitable for use in Digital Rights Management and Software Rights Management applications which require precise interchangeability of ciphertext and plaintext in pre-allocated areas of data storage.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: August 10, 2010
    Assignee: Aladdin Knowledge Systems Ltd.
    Inventors: Michael Zunke, Yanki Margalit, Dani Margalit
  • Patent number: 7757230
    Abstract: A method of executing a program (2) on a computer (3) comprising a main memory (6) divided into pages comprises the steps of: loading a main section (7) of the program comprising a manipulating module into the main memory (6) and executing the main section (7), whose manipulating module (12) effects a manipulation of a first of a plurality of program blocks (8, 9, 10) of the program every time a predetermined page error is generated upon an attempt to access the first program block (8, 9, 10).
    Type: Grant
    Filed: March 21, 2002
    Date of Patent: July 13, 2010
    Assignee: Aladdin Europe GmbH
    Inventors: Adrian Jascau, Horatiu Guja, Michael Zunke
  • Patent number: 7730529
    Abstract: A method of operating a computer system comprises the following steps: installing an executable main module of a program on the computer system, storing module data for the main module and/or for an additional module (A, B, C, D) of the program in the computer system, said stored module data comprising a license part required to determine the presence of the use authorization of the main module and/or of the additional module, and preferably also comprising an information part, evaluating the stored module data for acquisition of a further use authorization for the additional module (A-D) or for a further additional module (A-D), and providing information for the acquisition of a use authorization as a function of the result of evaluation.
    Type: Grant
    Filed: April 8, 2003
    Date of Patent: June 1, 2010
    Assignee: Aladdin Europe GmbH
    Inventor: Michael Zunke
  • Publication number: 20090205040
    Abstract: An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the installation/update was carried out as intended, and conveying relevant details of the installation/update. The installation/updating facility (internal software, external hardware device, or combination thereof) examines and documents the pre-installation/update state of the target computer system, performs the installation/update, examines and documents the post-installation/update state, and generates the confirmation, which is a summary or digest of the process and the status thereof. The confirmation is securely authenticated and sent to the licensor for validation, to be used for order fulfillment, billing and accounting, and other purposes.
    Type: Application
    Filed: February 10, 2008
    Publication date: August 13, 2009
    Applicant: Aladdin Knowledge Systems Ltd.
    Inventor: Michael Zunke