Patents by Inventor Stefan Letz
Stefan Letz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150100627Abstract: A distributed system includes a client and a server. The client may comprise a serialization module for serializing data into a first communication format to communicate the data to a server. The server may include a communication format parser for de-serializing the data received into a server-internal communication format. The serialization module may also be adapted for transforming the data into the server-internal communication format for a communication to the server. The client may also be adapted for indicating to the server that the client is capable of sending data in the server-internal communication format, and the server may be able to indicate its readiness to receive such data. The data may be sent either in the first or, alternatively, in the server-internal format.Type: ApplicationFiled: September 30, 2014Publication date: April 9, 2015Inventors: Oliver Benke, Stefan Letz
-
Patent number: 8959332Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: GrantFiled: February 21, 2013Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8930686Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: GrantFiled: October 25, 2010Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Publication number: 20140360010Abstract: A method for loading electrical vehicles with batteries may be provided. The battery system may comprise a battery container with an inlet channel for a serially inserting multiple batteries with substantially identical shape into the battery container, and a battery holder with a holding mechanism to selectively hold the inserted battery. For each of the battery holders, electrical connectors for connecting the inserted batteries may be available. An ejection may be possible via an outlet channel and an ejection mechanism.Type: ApplicationFiled: August 22, 2014Publication date: December 11, 2014Inventors: Walter Haug, Stefan Letz, Roland Seiffert
-
Publication number: 20140356670Abstract: A battery system for electrical devices, a battery, a battery loading system may be provided. The battery system may comprise a battery container with an inlet channel for a serially inserting multiple batteries with substantially identical shape into the battery container, and a battery holder with a holding mechanism to selectively hold the inserted battery. For each of the battery holders, electrical connectors for connecting the inserted batteries may be available. An ejection may be possible via an outlet channel and an ejection mechanism.Type: ApplicationFiled: April 23, 2014Publication date: December 4, 2014Applicant: International Business Machines CorporationInventors: WALTER HAUG, Stefan Letz, Roland Seiffert
-
Publication number: 20140325140Abstract: A computer installs an operating system. The computer receives, in a logical partition (LPAR) via a management network, a deploy program configured to download a disk image from an image repository and to write the disk image to a first direct access storage device (DASD) of the LPAR. The disk image includes an operating system, applications, and management components including an upgrade program. The computer receives, in the LPAR via a data network, the disk image, and writes, to the first DASD of the LPAR, the disk image. The computer boots the LPAR into the operating system of the disk image written to the first DASD, and determines whether the installed operating system is a deployment or an upgrade.Type: ApplicationFiled: April 29, 2013Publication date: October 30, 2014Applicant: International Business Machines CorporationInventors: Walter Haug, Steffen Hees, Roland Seiffert, Stefan Letz, Jan-Bernd Themann
-
Publication number: 20140074451Abstract: A simulation environment verifies processor-sparing functions in a simulated processor core. The simulation environment executes a first simulation for a simulated processor core. During the simulation, the simulation environment creates a simulation model dump file. At a later point in time, the simulation environment executes a second simulation for the simulated processor core. The simulation environment saves the state of the simulated processor core. The simulation environment then replaces the state of the simulated processor core by loading the previously created simulation model dump file. The simulation environment then sets the state of the simulated processor core to execute processor-sparing code and resumes the second simulation.Type: ApplicationFiled: November 14, 2013Publication date: March 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stefan Letz, Joerg Deutschle, Bodo Hoppe, Erica Stuecheli, Brian W. Thompto
-
Patent number: 8600724Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.Type: GrantFiled: July 18, 2012Date of Patent: December 3, 2013Assignee: International Business Machines CorporationInventors: Stefan Letz, Kai Weber, Juergen Vielfort
-
Patent number: 8527749Abstract: A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multiple network storage volumes as specified by the volume mapping schema, the data transfer between the user device and the one or multiple network storage volumes being mapped to one or multiple network connections as specified by the connection mapping schema, the driver thereby being operable to provide the user device with a logical storage volume.Type: GrantFiled: November 11, 2010Date of Patent: September 3, 2013Assignee: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Publication number: 20130110490Abstract: A simulation environment verifies processor-sparing functions in a simulated processor core. The simulation environment executes a first simulation for a simulated processor core. During the simulation, the simulation environment creates a simulation model dump file. At a later point in time, the simulation environment executes a second simulation for the simulated processor core. The simulation environment saves the state of the simulated processor core. The simulation environment then replaces the state of the simulated processor core by loading the previously created simulation model dump file. The simulation environment then sets the state of the simulated processor core to execute processor-sparing code and resumes the second simulation.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Applicant: International Business Machines CorporationInventors: Stefan Letz, Joerg Deutschle, Bodo Hoppe, Erica Stuecheli, Brian W. Thompto
-
Patent number: 8402403Abstract: A mechanism is provided for verifying a register-transfer level design of an execution unit. A set of instruction records associated with a test case are generated and stored in a buffer. For each instruction record in the set of instruction records associated with the test case: the instruction record is retrieved from the buffer and sent to both a reference model and an execution unit in the data processing system. Separately, the reference model and the execution unit execute the instruction record and send results of the execution of the instruction record to a result checker in the data processing system. The result checker compares the two results and, responsive to a mismatch in the results, a failure of the test case is indicted, the verification of the test case is stopped, and all data associated with the test case is output from the buffer for analysis.Type: GrantFiled: November 15, 2010Date of Patent: March 19, 2013Assignee: International Business Machines CorporationInventors: Stefan Letz, Michelangelo Masini, Juergen Vielfort, Kai Weber
-
Publication number: 20120330637Abstract: A method is provided for providing a debugging tool for a hardware design specified in a hardware description language. The method includes receiving one or multiple source files of the specified hardware design; processing each source file in a way that hardware description language constructs from the hardware design are directly simulatable; wherein the processing process includes at least one of the following: restructuring procedural source code of the source file; preserving functional equivalence to unaltered source code of the source file; and adding debug information to the hardware description of said source file.Type: ApplicationFiled: June 15, 2012Publication date: December 27, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Udo KRAUTZ, Stefan LETZ
-
Publication number: 20120284007Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.Type: ApplicationFiled: July 18, 2012Publication date: November 8, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stefan Letz, Kai Weber, Juergen Vielfort
-
Patent number: 8249848Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.Type: GrantFiled: July 30, 2008Date of Patent: August 21, 2012Assignee: International Business Machines CorporationInventors: Stefan Letz, Kai Weber, Juergen Vielfort
-
Publication number: 20120204024Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.Type: ApplicationFiled: October 25, 2010Publication date: August 9, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver Augenstein, Stefan A. Letz
-
Publication number: 20120144136Abstract: A method is provided for restoring data from a backup storage volume onto a source storage volume. A content of a memory unit of the backup storage volume and a content of the corresponding memory unit of the source storage volume are loaded into a computer memory, and are compared in the computer memory for identity. The content of the memory unit of the backup storage volume is written to the corresponding memory unit of the source storage volume if the comparison indicates that the content of the compared memory units is not identical. The invention further relates to a system for restoring data from a backup storage volume onto a source storage volume comprising a restore software running on a data processing device, which is connected to the backup storage volume and the source storage volume, whereby the restore software performs the above method.Type: ApplicationFiled: November 29, 2011Publication date: June 7, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 8001212Abstract: A method and systems for providing XML data is disclosed. In accordance with an embodiment of the invention, a second data processing system, which is connected to a first data processing system via a network, receives a first request over the network from the first data processing system. The first request comprises specifications for subsequent transfers of XML data from the second data processing system to the first data processing system. The specifications specify for which type of XML documents to be transferred in subsequent transfers to the first data processing system which excerpts of XML data shall be sent. An acknowledge message, sent to the first data processing system from the second data processing system, indicates the latter's ability to provide the excerpts of XML data for the types of XML documents in the subsequent data transfers.Type: GrantFiled: April 25, 2008Date of Patent: August 16, 2011Assignee: International Business Machines CorporationInventors: Stefan Letz, Roland Seiffert
-
Publication number: 20110154110Abstract: A mechanism is provided for verifying a register-transfer level design of an execution unit a set of instruction records associated with a test case are generated and stored in a buffer. For each instruction record in the set of instruction records associated with the test case: the instruction record is retrieved from the buffer and sent to both a reference model and an execution unit in the data processing system. Separately, the reference model and the execution unit execute the instruction record and send results of the execution of the instruction record to a result checker in the data processing system.Type: ApplicationFiled: November 15, 2010Publication date: June 23, 2011Applicant: International Business Machines CorporationInventors: Stefan Letz, Michelangelo Masini, Juergen Vielfort, Kai Weber
-
Publication number: 20110113234Abstract: A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multiple network storage volumes as specified by the volume mapping schema, the data transfer between the user device and the one or multiple network storage volumes being mapped to one or multiple network connections as specified by the connection mapping schema, the driver thereby being operable to provide the user device with a logical storage volume.Type: ApplicationFiled: November 11, 2010Publication date: May 12, 2011Applicant: International Business Machines CorporationInventors: Oliver Augenstein, Stefan Letz
-
Patent number: 7865793Abstract: A method of generating a test case from a given test case structure, the method including generating instructions for the given test case structure, propagating predefined results in a backwards manner, randomly generating remaining operands of the test case structure in a forwards manner, and calculating a result for the test case by determining missing input operands and storing these input operands in both the temporary register file and the initial register file, and calculating missing results and storing all results in the temporary register file.Type: GrantFiled: April 30, 2008Date of Patent: January 4, 2011Assignee: International Business Machines CorporationInventors: Stefan Letz, Juergen Vielfort, Kai Weber