Patents by Inventor Stefan Letz

Stefan Letz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150100627
    Abstract: A distributed system includes a client and a server. The client may comprise a serialization module for serializing data into a first communication format to communicate the data to a server. The server may include a communication format parser for de-serializing the data received into a server-internal communication format. The serialization module may also be adapted for transforming the data into the server-internal communication format for a communication to the server. The client may also be adapted for indicating to the server that the client is capable of sending data in the server-internal communication format, and the server may be able to indicate its readiness to receive such data. The data may be sent either in the first or, alternatively, in the server-internal format.
    Type: Application
    Filed: September 30, 2014
    Publication date: April 9, 2015
    Inventors: Oliver Benke, Stefan Letz
  • Patent number: 8959332
    Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.
    Type: Grant
    Filed: February 21, 2013
    Date of Patent: February 17, 2015
    Assignee: International Business Machines Corporation
    Inventors: Oliver Augenstein, Stefan Letz
  • Patent number: 8930686
    Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.
    Type: Grant
    Filed: October 25, 2010
    Date of Patent: January 6, 2015
    Assignee: International Business Machines Corporation
    Inventors: Oliver Augenstein, Stefan Letz
  • Publication number: 20140360010
    Abstract: A method for loading electrical vehicles with batteries may be provided. The battery system may comprise a battery container with an inlet channel for a serially inserting multiple batteries with substantially identical shape into the battery container, and a battery holder with a holding mechanism to selectively hold the inserted battery. For each of the battery holders, electrical connectors for connecting the inserted batteries may be available. An ejection may be possible via an outlet channel and an ejection mechanism.
    Type: Application
    Filed: August 22, 2014
    Publication date: December 11, 2014
    Inventors: Walter Haug, Stefan Letz, Roland Seiffert
  • Publication number: 20140356670
    Abstract: A battery system for electrical devices, a battery, a battery loading system may be provided. The battery system may comprise a battery container with an inlet channel for a serially inserting multiple batteries with substantially identical shape into the battery container, and a battery holder with a holding mechanism to selectively hold the inserted battery. For each of the battery holders, electrical connectors for connecting the inserted batteries may be available. An ejection may be possible via an outlet channel and an ejection mechanism.
    Type: Application
    Filed: April 23, 2014
    Publication date: December 4, 2014
    Applicant: International Business Machines Corporation
    Inventors: WALTER HAUG, Stefan Letz, Roland Seiffert
  • Publication number: 20140325140
    Abstract: A computer installs an operating system. The computer receives, in a logical partition (LPAR) via a management network, a deploy program configured to download a disk image from an image repository and to write the disk image to a first direct access storage device (DASD) of the LPAR. The disk image includes an operating system, applications, and management components including an upgrade program. The computer receives, in the LPAR via a data network, the disk image, and writes, to the first DASD of the LPAR, the disk image. The computer boots the LPAR into the operating system of the disk image written to the first DASD, and determines whether the installed operating system is a deployment or an upgrade.
    Type: Application
    Filed: April 29, 2013
    Publication date: October 30, 2014
    Applicant: International Business Machines Corporation
    Inventors: Walter Haug, Steffen Hees, Roland Seiffert, Stefan Letz, Jan-Bernd Themann
  • Publication number: 20140074451
    Abstract: A simulation environment verifies processor-sparing functions in a simulated processor core. The simulation environment executes a first simulation for a simulated processor core. During the simulation, the simulation environment creates a simulation model dump file. At a later point in time, the simulation environment executes a second simulation for the simulated processor core. The simulation environment saves the state of the simulated processor core. The simulation environment then replaces the state of the simulated processor core by loading the previously created simulation model dump file. The simulation environment then sets the state of the simulated processor core to execute processor-sparing code and resumes the second simulation.
    Type: Application
    Filed: November 14, 2013
    Publication date: March 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefan Letz, Joerg Deutschle, Bodo Hoppe, Erica Stuecheli, Brian W. Thompto
  • Patent number: 8600724
    Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.
    Type: Grant
    Filed: July 18, 2012
    Date of Patent: December 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Stefan Letz, Kai Weber, Juergen Vielfort
  • Patent number: 8527749
    Abstract: A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multiple network storage volumes as specified by the volume mapping schema, the data transfer between the user device and the one or multiple network storage volumes being mapped to one or multiple network connections as specified by the connection mapping schema, the driver thereby being operable to provide the user device with a logical storage volume.
    Type: Grant
    Filed: November 11, 2010
    Date of Patent: September 3, 2013
    Assignee: International Business Machines Corporation
    Inventors: Oliver Augenstein, Stefan Letz
  • Publication number: 20130110490
    Abstract: A simulation environment verifies processor-sparing functions in a simulated processor core. The simulation environment executes a first simulation for a simulated processor core. During the simulation, the simulation environment creates a simulation model dump file. At a later point in time, the simulation environment executes a second simulation for the simulated processor core. The simulation environment saves the state of the simulated processor core. The simulation environment then replaces the state of the simulated processor core by loading the previously created simulation model dump file. The simulation environment then sets the state of the simulated processor core to execute processor-sparing code and resumes the second simulation.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 2, 2013
    Applicant: International Business Machines Corporation
    Inventors: Stefan Letz, Joerg Deutschle, Bodo Hoppe, Erica Stuecheli, Brian W. Thompto
  • Patent number: 8402403
    Abstract: A mechanism is provided for verifying a register-transfer level design of an execution unit. A set of instruction records associated with a test case are generated and stored in a buffer. For each instruction record in the set of instruction records associated with the test case: the instruction record is retrieved from the buffer and sent to both a reference model and an execution unit in the data processing system. Separately, the reference model and the execution unit execute the instruction record and send results of the execution of the instruction record to a result checker in the data processing system. The result checker compares the two results and, responsive to a mismatch in the results, a failure of the test case is indicted, the verification of the test case is stopped, and all data associated with the test case is output from the buffer for analysis.
    Type: Grant
    Filed: November 15, 2010
    Date of Patent: March 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Stefan Letz, Michelangelo Masini, Juergen Vielfort, Kai Weber
  • Publication number: 20120330637
    Abstract: A method is provided for providing a debugging tool for a hardware design specified in a hardware description language. The method includes receiving one or multiple source files of the specified hardware design; processing each source file in a way that hardware description language constructs from the hardware design are directly simulatable; wherein the processing process includes at least one of the following: restructuring procedural source code of the source file; preserving functional equivalence to unaltered source code of the source file; and adding debug information to the hardware description of said source file.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Udo KRAUTZ, Stefan LETZ
  • Publication number: 20120284007
    Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.
    Type: Application
    Filed: July 18, 2012
    Publication date: November 8, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stefan Letz, Kai Weber, Juergen Vielfort
  • Patent number: 8249848
    Abstract: An improved method of verifying a processor design using a processor simulation model in a simulation environment is disclosed, wherein the processor simulation model includes at least one execution unit for executing at least one instruction of a test file. The method includes tracking each execution of each of the at least one instruction, monitoring relevant signals in each simulation cycle, maintaining information about the execution of the at least one instruction, wherein the maintained information includes a determination of an execution length of a completely executed instruction, matching the maintained information about the completely executed instruction against a set of trap elements provided by the user through a trap file, and collecting the maintained information about the completely executed instruction in a monitor file in response to a match found between the maintained information and at least one of the trap elements.
    Type: Grant
    Filed: July 30, 2008
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Stefan Letz, Kai Weber, Juergen Vielfort
  • Publication number: 20120204024
    Abstract: A mechanism is provided which allows to de-duplicate encrypted data such that the de-duplication ratio for encrypted data is similar to the de-duplication ration of the corresponding un-encrypted data and the purpose of encryption is not obfuscated, i.e. only the originator of the data (the client) can decrypt—and hence read—the data. This is achieved by interwoven the de-duplication algorithm with the encryption algorithm in a way that the data are encrypted with a key that is generated from the unencrypted data. Afterwards, that key is itself encrypted with an encryption key being private to a particular client. Due to the fact that the private key is not effecting the encrypted data stream, it can still be de-duplicated efficiently.
    Type: Application
    Filed: October 25, 2010
    Publication date: August 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Oliver Augenstein, Stefan A. Letz
  • Publication number: 20120144136
    Abstract: A method is provided for restoring data from a backup storage volume onto a source storage volume. A content of a memory unit of the backup storage volume and a content of the corresponding memory unit of the source storage volume are loaded into a computer memory, and are compared in the computer memory for identity. The content of the memory unit of the backup storage volume is written to the corresponding memory unit of the source storage volume if the comparison indicates that the content of the compared memory units is not identical. The invention further relates to a system for restoring data from a backup storage volume onto a source storage volume comprising a restore software running on a data processing device, which is connected to the backup storage volume and the source storage volume, whereby the restore software performs the above method.
    Type: Application
    Filed: November 29, 2011
    Publication date: June 7, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Oliver Augenstein, Stefan Letz
  • Patent number: 8001212
    Abstract: A method and systems for providing XML data is disclosed. In accordance with an embodiment of the invention, a second data processing system, which is connected to a first data processing system via a network, receives a first request over the network from the first data processing system. The first request comprises specifications for subsequent transfers of XML data from the second data processing system to the first data processing system. The specifications specify for which type of XML documents to be transferred in subsequent transfers to the first data processing system which excerpts of XML data shall be sent. An acknowledge message, sent to the first data processing system from the second data processing system, indicates the latter's ability to provide the excerpts of XML data for the types of XML documents in the subsequent data transfers.
    Type: Grant
    Filed: April 25, 2008
    Date of Patent: August 16, 2011
    Assignee: International Business Machines Corporation
    Inventors: Stefan Letz, Roland Seiffert
  • Publication number: 20110154110
    Abstract: A mechanism is provided for verifying a register-transfer level design of an execution unit a set of instruction records associated with a test case are generated and stored in a buffer. For each instruction record in the set of instruction records associated with the test case: the instruction record is retrieved from the buffer and sent to both a reference model and an execution unit in the data processing system. Separately, the reference model and the execution unit execute the instruction record and send results of the execution of the instruction record to a result checker in the data processing system.
    Type: Application
    Filed: November 15, 2010
    Publication date: June 23, 2011
    Applicant: International Business Machines Corporation
    Inventors: Stefan Letz, Michelangelo Masini, Juergen Vielfort, Kai Weber
  • Publication number: 20110113234
    Abstract: A technique for providing secure network storage by a user device that includes one or multiple network interfaces, a driver configuration component comprising a volume mapping schema and a connection mapping schema, and a driver operable to map I/O requests for logical data blocks to one or multiple network storage volumes as specified by the volume mapping schema, the data transfer between the user device and the one or multiple network storage volumes being mapped to one or multiple network connections as specified by the connection mapping schema, the driver thereby being operable to provide the user device with a logical storage volume.
    Type: Application
    Filed: November 11, 2010
    Publication date: May 12, 2011
    Applicant: International Business Machines Corporation
    Inventors: Oliver Augenstein, Stefan Letz
  • Patent number: 7865793
    Abstract: A method of generating a test case from a given test case structure, the method including generating instructions for the given test case structure, propagating predefined results in a backwards manner, randomly generating remaining operands of the test case structure in a forwards manner, and calculating a result for the test case by determining missing input operands and storing these input operands in both the temporary register file and the initial register file, and calculating missing results and storing all results in the temporary register file.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: January 4, 2011
    Assignee: International Business Machines Corporation
    Inventors: Stefan Letz, Juergen Vielfort, Kai Weber