Patents by Inventor Paul El Khoury

Paul El Khoury has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130283400
    Abstract: Secure configuration of a mobile application (“app”) includes sending the required configuration data for the app to the user's mobile computing device in a communication, for example an email with an attachment. A verification value is included in the attachment to protect the authenticity and integrity of the configuration data. A challenge code is issued to the user (or group of users). The challenge code is used to verify the configuration data.
    Type: Application
    Filed: April 23, 2012
    Publication date: October 24, 2013
    Applicant: SAP AG
    Inventors: Juergen Schneider, Paul El Khoury, Sami Lechner
  • Patent number: 8555085
    Abstract: Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software application executing on a mobile device from a foreground state of the mobile device to a background state of the mobile device is received. In response, noise data based on application data associated with the application is generated. Both the application data and the noise data are encrypted using the same encryption mechanism, but using different keys. When another input to transfer the application from the background state to the foreground state is received, then the encryption mechanism is executed on the application data and the noise data using a key requested in response to the other input. The application is transferred to the foreground state if the received key matches the key with which the application data was previously encrypted. Other items of data are discarded.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: October 8, 2013
    Assignee: SAP AG
    Inventor: Paul El Khoury
  • Publication number: 20130238906
    Abstract: Methods, computer-readable media, and systems for enhancing useability of mobile devices that securely store data. An input to transfer a computer software application executing on a mobile device from a foreground state of the mobile device to a background state of the mobile device is received. In response, noise data based on application data associated with the application is generated. Both the application data and the noise data are encrypted using the same encryption mechanism, but using different keys. When another input to transfer the application from the background state to the foreground state is received, then the encryption mechanism is executed on the application data and the noise data using a key requested in response to the other input. The application is transferred to the foreground state if the received key matches the key with which the application data was previously encrypted. Other items of data are discarded.
    Type: Application
    Filed: March 9, 2012
    Publication date: September 12, 2013
    Inventor: Paul El Khoury
  • Patent number: 8527954
    Abstract: A method is provided for creating a behavior pattern of a computer program which comprises at least one source code with a plurality of program operations which are arranged in a logical succession and the source code is provided with annotations. Each annotation is referencing to a respective program operation and the annotations are read out automatically by a modeling tool, which is running on a processing unit and generating the behavior pattern of the computer program by arranging the annotations which have been read out according to the logical succession of the program operations and providing the generated behavior pattern, so that the generated behavior pattern can be represented via a representing unit. Furthermore, an appropriate server and an appropriate network system are provided.
    Type: Grant
    Filed: July 25, 2008
    Date of Patent: September 3, 2013
    Assignee: SAP AG
    Inventors: Azzedine Benameur, Paul El Khoury
  • Patent number: 8495744
    Abstract: A method and a system for evaluation of risk of conflict between a number of integrating security solutions. In a computer system, a number of fragmentary security solutions are received. A set of the received fragmentary security solutions is integrated to form a composite security solution to satisfy a number of security requirements. In one aspect, the security requirements are established during a design of a computer system. A risk of conflict between the set of integrating fragmentary security solutions is evaluated. In another aspect, the risk of conflict between the set of integrating fragmentary security solutions exists at authority level and at configuration level. Conflict at authority level arises when different authorities control the same fragmentary security solution. Conflict at configuration level arises when integrating fragmentary security solutions share configuration data.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: July 23, 2013
    Assignee: SAP AG
    Inventors: Paul El Khoury, Azzedine Benameur, Smriti Kumar Sinha
  • Patent number: 8245045
    Abstract: The present description refers in particular to example computer-implemented methods, example computer program products, and example computer systems for automatically generating or verifying a digital signature for a message. The message may be representable in a hierarchical tree structure. An example computer-implemented method may comprise: selecting, from a message MT, a sub-message M to be signed, the sub-message M comprising at least one element; generating a well-formed context CMt for the sub-message M, wherein the well-formed context CMt defines a derivation path to the element in the message MT at a time t, the element being marked [M] in the well-formed context CMt; generating a message digest ?M from the sub-message M and a context digest ?C from the well-formed context CMt; and generating a signature S by applying a secret key SA of a user A to the message digest ?M and to the context digest ?C.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 14, 2012
    Assignee: SAP AG
    Inventors: Azzedine Benameur, Smriti Kumar Sinha, Paul El Khoury
  • Publication number: 20100250476
    Abstract: A method and a system for evaluation of risk of conflict between a number of integrating security solutions. In a computer system, a number of fragmentary security solutions are received. A set of the received fragmentary security solutions is integrated to form a composite security solution to satisfy a number of security requirements. In one aspect, the security requirements are established during a design of a computer system. A risk of conflict between the set of integrating fragmentary security solutions is evaluated. In another aspect, the risk of conflict between the set of integrating fragmentary security solutions exists at authority level and at configuration level. Conflict at authority level arises when different authorities control the same fragmentary security solution. Conflict at configuration level arises when integrating fragmentary security solutions share configuration data.
    Type: Application
    Filed: March 25, 2009
    Publication date: September 30, 2010
    Inventors: PAUL EL KHOURY, Azzedine BENAMEUR, Smriti Kumar SINHA
  • Publication number: 20100162406
    Abstract: The present description refers in particular to a computer implemented method, computer program product, and computer system for dynamic separation of duties (SoD) during workflow execution. Based on at least one policy file, at a monitoring module, at least one node to be logged from a message in a message pipe of one or more messages exchanged when executing a workflow instance may be specified. Information on the at least one logged node may be passed to an enforcer. SoD violation for the at least one logged node may be checked at the enforcer. If, for the at least one logged node, SoD is violated, action may be taken based on the at least one policy file.
    Type: Application
    Filed: June 12, 2009
    Publication date: June 24, 2010
    Applicant: SAP AG
    Inventors: Azzedine Benameur, Paul El Khoury, Joana Da Trindade
  • Publication number: 20100082993
    Abstract: The present description refers in particular to a computer-implemented method, a computer program product, and a computer system for automatically generating a digital signature for a message, the message being representable in a hierarchical tree structure and to a computer-implemented method, a computer program product, and a computer system for automatically verifying a digital signature of a message, the message being representable in a hierarchical tree structure.
    Type: Application
    Filed: September 28, 2009
    Publication date: April 1, 2010
    Applicant: SAP AG
    Inventors: Azzedine Benameur, Smriti Kumar Sinha, Paul El Khoury
  • Publication number: 20090044271
    Abstract: The present description refers in particular to a computer-implemented method, a computer system, and a computer program product for input validation and output validation to prevent SQL injections. In one aspect, an embodiment of the invention involves a service (e.g., a web service operating on a server) receiving a request message from a client over a network. The server includes a handler for checking the request message according to a first method, prior to sending the request message to the service. In addition, the handler checks a response message (from the service) according to the first method, prior to sending the response message to the client.
    Type: Application
    Filed: July 17, 2008
    Publication date: February 12, 2009
    Applicant: SAP AG
    Inventors: Azzedine Benameur, Paul El Khoury
  • Publication number: 20090037884
    Abstract: A method is provided for creating a behavior pattern of a computer program which comprises at least one source code with a plurality of program operations which are arranged in a logical succession and the source code is provided with annotations. Each annotation is referencing to a respective program operation and the annotations are read out automatically by a modeling tool, which is running on a processing unit and generating the behavior pattern of the computer program by arranging the annotations which have been read out according to the logical succession of the program operations and providing the generated behavior pattern, so that the generated behavior pattern can be represented via a representing unit. Furthermore, an appropriate server and an appropriate network system are provided.
    Type: Application
    Filed: July 25, 2008
    Publication date: February 5, 2009
    Inventors: Azzedine Benameur, Paul El Khoury
  • Publication number: 20090025068
    Abstract: The present description refers in particular to a computer-implemented method, a computer system, and a computer program product. The method may comprise providing authentication enforcement at resource level by specifying at design time at least one authentication key for at least one data storage unit of a resource. A request may be received at a server from a requester through a client to access the resource. Authentication of the requester may be enforced through the at least one authentication key at the at least one data storage unit of the resource.
    Type: Application
    Filed: November 28, 2007
    Publication date: January 22, 2009
    Applicant: SAP AG
    Inventors: Azzedine Benameur, Paul El Khoury, Cedric S.P. Ulmer