Patents by Inventor Roger Kilian-Kehr

Roger Kilian-Kehr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8862493
    Abstract: In a computer-implemented process modeling and simulating environment, an analyzer receives a process model with parameters in combination with data from previous or planned process performances. An analyzer receives a simulation target from a user, calculates evaluation results that represent the influence of the parameters in view of the simulation target, and presents the evaluation results as indicators to the user. Upon receiving modifications to the performance data, the process is simulated with modified performance data. Alternatively, the evaluation results are converted to computer instructions to automatically modify the process parameters.
    Type: Grant
    Filed: August 31, 2009
    Date of Patent: October 14, 2014
    Assignee: SAP AG
    Inventors: Mathias Fritzsche, Roger Kilian-Kehr, Wasif Gilani, Ralph Gerbig
  • Patent number: 8146100
    Abstract: A method including receiving a plurality of event descriptors, each event descriptor of the plurality of event descriptors corresponding to a respective event relevant to a software development process, transmitting the plurality of event descriptors to a subscriber; and receiving a subscription message from a subscriber, the subscription message including an indication of an event descriptor selected from the plurality of event descriptors.
    Type: Grant
    Filed: March 21, 2006
    Date of Patent: March 27, 2012
    Assignee: SAP AG
    Inventor: Roger Kilian-Kehr
  • Patent number: 7904111
    Abstract: A mobile exchange infrastructure, in which a request to invoke functionality provided by a first of two services is accessed. If the request is incompatible with the first service, the accessed request is affected. The functionality is invoked using the affected request.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: March 8, 2011
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Jochen Haller
  • Publication number: 20110054865
    Abstract: In a computer-implemented process modeling and simulating environment, an analyzer receives a process model with parameters in combination with data from previous or planned process performances. An analyzer receives a simulation target from a user, calculates evaluation results that represent the influence of the parameters in view of the simulation target, and presents the evaluation results as indicators to the user. Upon receiving modifications to the performance data, the process is simulated with modified performance data. Alternatively, the evaluation results are converted to computer instructions to automatically modify the process parameters.
    Type: Application
    Filed: August 31, 2009
    Publication date: March 3, 2011
    Applicant: SAP AG
    Inventors: Mathias Fritzsche, Roger Kilian-Kehr, Wasif Gilani, Ralph Gerbig
  • Patent number: 7865731
    Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.
    Type: Grant
    Filed: August 8, 2007
    Date of Patent: January 4, 2011
    Assignee: SAP Aktiengesellschaft
    Inventor: Roger Kilian-Kehr
  • Patent number: 7818585
    Abstract: Systems, methods, and computer program products for secure license management. A host computer runs in a trusted state. A license manager is installed on the host computer. The license manager is configured to provide access to one or more software programs. The one or more software programs are accessible only through the license manager. The license manager is bound to the trusted state of the host computer, such that if the trusted state ceases to exist, then the license manager is not executable and the one or more software programs are not accessible. The host computer can be a TCPA (Trusted Computing Platform Alliance) enabled computer.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: October 19, 2010
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Jan Kuemmerle
  • Patent number: 7761850
    Abstract: This document discusses, among other things, a system and a method for using a meta-model to manage relationships between software artifacts, the method comprising determining a meta-model; identifying one or more available artifacts in one or more software applications; using the meta-model to define one or more relationships between the one or more available artifacts, wherein each relationship is a specific instance of a possible association defined in the meta-model; and providing the one or more relationships as one or more configurations to the one or more software applications.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: July 20, 2010
    Assignee: SAP AG
    Inventor: Roger Kilian-Kehr
  • Patent number: 7673141
    Abstract: A system for providing secured access to an application service includes a challenge provider that uses a first cryptographic technique to provide a challenge to a client seeking access to an application service. The client uses a second cryptographic technique to generate a response, and provides the response to an authentication service. The authentication service grants the client access to the application service only if the challenge and response are authenticated using a first authentication technique complementary to the first cryptographic technique and a second authentication technique complementary to the second cryptographic technique, respectively.
    Type: Grant
    Filed: October 7, 2004
    Date of Patent: March 2, 2010
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Jochen Haller, Laurent Gomez, Cedric Hebert
  • Patent number: 7603466
    Abstract: A mobile computer system hosts mobile application and a collaboration module. The collaboration module is adapted to enable the mobile application to communicate with a further mobile application, hosted on a further mobile computer system, and to access functionality of an enterprise application, hosted on an enterprise system.
    Type: Grant
    Filed: July 19, 2004
    Date of Patent: October 13, 2009
    Assignee: SAP (AG)
    Inventors: Roger Kilian-Kehr, Jochen Haller
  • Patent number: 7487177
    Abstract: Set identifiers for objects are determined based on individual identifiers of the objects. A first identifier is received from a first identification tag associated with a first object. A second identifier is received from a second identification tag associated with a second object. A set identifier corresponding to a set of objects that includes the first object and the second object is determined, based on the first identifier and the second identifier. The set identifier is associated with a virtual object that corresponds to the set.
    Type: Grant
    Filed: November 8, 2004
    Date of Patent: February 3, 2009
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Julien Vayssiere
  • Publication number: 20080215706
    Abstract: A mobile exchange infrastructure, in which a request to invoke functionality provided by a first of two services is accessed. If the request is incompatible with the first service, the accessed request is affected. The functionality is invoked using the affected request.
    Type: Application
    Filed: March 17, 2008
    Publication date: September 4, 2008
    Inventors: Roger Kilian-Kehr, Jochen Haller
  • Patent number: 7392060
    Abstract: A mobile exchange infrastructure provides for dynamic mediation between services and applications, particularly in a mobile environment. Such services include Web services that are designed to provide functionality to an application that is not native to that application. The mobile exchange infrastructure ensures that the services and applications may interact with one another, even when they have been constructed in different development environments, have multiple associated messaging protocols, or are running in different application frameworks. As a result, mobile users may experience increased efficiency and use of available applications and services.
    Type: Grant
    Filed: July 28, 2004
    Date of Patent: June 24, 2008
    Assignee: SAP Aktiengesellschaft
    Inventors: Roger Kilian-Kehr, Jochen Haller
  • Publication number: 20080046734
    Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A. proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.
    Type: Application
    Filed: August 8, 2007
    Publication date: February 21, 2008
    Applicant: SAP AKTIENGESELLSCHAFT
    Inventor: Roger Kilian-Kehr
  • Publication number: 20070226755
    Abstract: A method including receiving a plurality of event descriptors, each event descriptor of the plurality of event descriptors corresponding to a respective event relevant to a software development process, transmitting the plurality of event descriptors to a subscriber; and receiving a subscription message from a subscriber, the subscription message including an indication of an event descriptor selected from the plurality of event descriptors.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 27, 2007
    Inventor: Roger Kilian-Kehr
  • Patent number: 7269732
    Abstract: A system for providing secured access to an application service includes a security token that couples to the application service. The security token performs a first element of a cryptographic technique, such as, for example, encryption or decryption. A proximity token is provided that is associated with the security token. The proximity token performs a second element of the cryptographic technique to validate a communication between the application service and the security token. The proximity token is operable to validate the communication only when the proximity token is located within a predetermined validation distance from the security token or the application service. The security token may perform the first element of the cryptographic technique to verify that the proximity token has validated the communication between the application service and the security token.
    Type: Grant
    Filed: June 5, 2003
    Date of Patent: September 11, 2007
    Assignee: SAP Aktiengesellschaft
    Inventor: Roger Kilian-Kehr
  • Publication number: 20070150490
    Abstract: This document discusses, among other things, a system and a method for using a meta-model to manage relationships between software artifacts, the method comprising determining a meta-model; identifying one or more available artifacts in one or more software applications; using the meta-model to define one or more relationships between the one or more available artifacts, wherein each relationship is a specific instance of a possible association defined in the meta-model; and providing the one or more relationships as one or more configurations to the one or more software applications.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Inventor: Roger Kilian-Kehr
  • Publication number: 20060137022
    Abstract: Systems, methods, and computer program products for secure license management. A host computer runs in a trusted state. A license manager is installed on the host computer. The license manager is configured to provide access to one or more software programs. The one or more software programs are accessible only through the license manager. The license manager is bound to the trusted state of the host computer, such that if the trusted state ceases to exist, then the license manager is not executable and the one or more software programs are not accessible. The host computer can be a TCPA (Trusted Computing Platform Alliance) enabled computer.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 22, 2006
    Inventors: Roger Kilian-Kehr, Jan Kuemmerle
  • Publication number: 20060101067
    Abstract: Set identifiers for objects are determined based on individual identifiers of the objects. A first identifier is received from a first identification tag associated with a first object. A second identifier is received from a second identification tag associated with a second object. A set identifier corresponding to a set of objects that includes the first object and the second object is determined, based on the first identifier and the second identifier. The set identifier is associated with a virtual object that corresponds to the set.
    Type: Application
    Filed: November 8, 2004
    Publication date: May 11, 2006
    Inventors: Roger Kilian-Kehr, Julien Vayssiere
  • Publication number: 20060047944
    Abstract: Systems, methods, and computer program products implementing techniques for secure booting of a computing device. In one aspect, the techniques include verifying the trustworthiness of the target computing system and only after the trustworthiness of the target computing system has been verified, loading user data onto the target computing system. Verifying the trustworthiness of the target computing system includes establishing communication between the target computing system and a third party system, proving the trustworthiness of the target computing system to the third party system, receiving a decryption key from the third party system once the trustworthiness of the target computing system has been verified by the third party system, and using the decryption key to decrypt user data, the user data being stored in the boot device or at another location accessible to the target computing system.
    Type: Application
    Filed: September 1, 2004
    Publication date: March 2, 2006
    Inventor: Roger Kilian-Kehr
  • Publication number: 20060023688
    Abstract: A mobile exchange infrastructure provides for dynamic mediation between services and applications, particularly in a mobile environment. Such services include Web services that are designed to provide functionality to an application that is not native to that application. The mobile exchange infrastructure ensures that the services and applications may interact with one another, even when they have been constructed in different development environments, have multiple associated messaging protocols, or are running in different application frameworks. As a result, mobile users may experience increased efficiency and use of available applications and services.
    Type: Application
    Filed: July 28, 2004
    Publication date: February 2, 2006
    Inventors: Roger Kilian-Kehr, Jochen Haller