Patents by Inventor Stephan Zlatarev
Stephan Zlatarev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10873611Abstract: Systems and methods are provided for generating a meeting display comprising an indicator for each participant for a meeting, at least a first dashboard, and an event log and causing the meeting display to be displayed on each computing device associated with each participant for the meeting. The systems and methods further providing for generating events based on each computing device interaction with the meeting display and interactions between one or more computing devices via the meeting display, and causing events to be displayed as part of the meeting display on each computing device associated with each participant for the meeting.Type: GrantFiled: May 15, 2018Date of Patent: December 22, 2020Assignee: SAP SEInventor: Stephan Zlatarev
-
Patent number: 10789158Abstract: Capability information for a sensor agent is received. The capability information includes one or more metrics that the sensor agent is configured to provide. The sensor agent is configured in accordance with an initial configuration including a first level of granularity for test data. When the test data is received from the sensor agent, a value of at least one metric from the one or more metrics is tested in a machine learning module. The value is classified based on an output from the machine learning module. The initial configuration of the sensor agent is automatically adjusted to adaptively define a second level of granularity for the test data provided by the sensor agent.Type: GrantFiled: March 21, 2018Date of Patent: September 29, 2020Assignee: SAP SEInventors: Stephan Zlatarev, Dimitar Valov
-
Publication number: 20190356709Abstract: Systems and methods are provided for generating a meeting display comprising an indicator for each participant for a meeting, at least a first dashboard, and an event log and causing the meeting display to be displayed on each computing device associated with each participant for the meeting. The systems and methods further providing for generating events based on each computing device interaction with the meeting display and interactions between one or more computing devices via the meeting display, and causing events to be displayed as part of the meeting display on each computing device associated with each participant for the meeting.Type: ApplicationFiled: May 15, 2018Publication date: November 21, 2019Inventor: Stephan Zlatarev
-
Publication number: 20190294538Abstract: Capability information for a sensor agent is received. The capability information includes one or more metrics that the sensor agent is configured to provide. The sensor agent is configured in accordance with an initial configuration including a first level of granularity for test data. When the test data is received from the sensor agent, a value of at least one metric from the one or more metrics is tested in a machine learning module. The value is classified based on an output from the machine learning module. The initial configuration of the sensor agent is automatically adjusted to adaptively define a second level of granularity for the test data provided by the sensor agent.Type: ApplicationFiled: March 21, 2018Publication date: September 26, 2019Inventors: Stephan Zlatarev, Dimitar Valov
-
Patent number: 9240991Abstract: A system and method for cross-domain web browser single sign-on is described. A client accesses a workflow view from a service provider. An identity provider of the service provider generates an authentication process view. The authentication process view has the workflow view provided by the service provider and a logon form view provided by the identity provider.Type: GrantFiled: December 13, 2012Date of Patent: January 19, 2016Assignee: SAP SEInventor: Stephan Zlatarev
-
Patent number: 9021558Abstract: Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution. In response to the command, a determination is made whether a network address corresponding to the request matches at least one network address associated with a protected network. Based on the network address corresponding to the request not matching the at least one network address associated with the protected network, authentication of the user is initiated at an identity provider corresponding to the computing solution. Otherwise, based on the network address corresponding to the request matching the at least one network address associated with the protected network, authentication of the user is delegated to an identity management system located within the protected network.Type: GrantFiled: January 22, 2013Date of Patent: April 28, 2015Assignee: SAP SEInventor: Stephan Zlatarev
-
Patent number: 9021552Abstract: The present description refers to a computer implemented method, computer program product, and computer system for receiving a resource request at a representational state transfer (REST) client from a user, the resource request including a user ID, determining, by the REST client, a key pair including a public key and a corresponding private key that are associated with the user ID, obtaining, by the REST client, a certificate associated with the user ID that is signed by a certificate authority and based on at least the user ID and the public key associated with the user ID, impersonating, by the REST client, the user to a REST server using the certificate and the private key associated with the user ID, and accessing, by the REST client on behalf of the user, using a stateless protocol with the REST server, the requested resource.Type: GrantFiled: April 5, 2011Date of Patent: April 28, 2015Assignee: SAP SEInventors: Stephan Zlatarev, Uwe Steigmann, Michael Engler, Wolfgang Janzen
-
Publication number: 20140208382Abstract: Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a request transmitted from the computing device to access a computing solution. In response to the command, a determination is made whether a network address corresponding to the request matches at least one network address associated with a protected network. Based on the network address corresponding to the request not matching the at least one network address associated with the protected network, authentication of the user is initiated at an identity provider corresponding to the computing solution. Otherwise, based on the network address corresponding to the request matching the at least one network address associated with the protected network, authentication of the user is delegated to an identity management system located within the protected network.Type: ApplicationFiled: January 22, 2013Publication date: July 24, 2014Applicant: SAP AGInventor: Stephan Zlatarev
-
Publication number: 20140173711Abstract: A system and method for cross-domain web browser single sign-on is described. A client accesses a workflow view from a service provider. An identity provider of the service provider generates an authentication process view. The authentication process view has the workflow view provided by the service provider and a logon form view provided by the identity provider.Type: ApplicationFiled: December 13, 2012Publication date: June 19, 2014Applicant: SAP AGInventor: Stephan Zlatarev
-
Publication number: 20120260330Abstract: The present description refers to a computer implemented method, computer program product, and computer system for receiving a resource request at a representational state transfer (REST) client from a user, the resource request including a user ID, determining, by the REST client, a key pair including a public key and a corresponding private key that are associated with the user ID, obtaining, by the REST client, a certificate associated with the user ID that is signed by a certificate authority and based on at least the user ID and the public key associated with the user ID, impersonating, by the REST client, the user to a REST server using the certificate and the private key associated with the user ID, and accessing, by the REST client on behalf of the user, using a stateless protocol with the REST server, the requested resource.Type: ApplicationFiled: April 5, 2011Publication date: October 11, 2012Applicant: SAP AGInventors: Stephan Zlatarev, Uwe Steigmann, Michael Engler, Wolfgang Janzen
-
Patent number: 7823190Abstract: A keystore is described which provides unique views of certificates and keys to particular application components and/or users. Upon receiving a request from a user and/or an application component to view keystore data, the keystore system implements a first set of security restrictions associated with the request and provides a limited view of the keystore data to the requesting user and/or application component based on the results of the first set of security restrictions. Then, upon detecting an attempt by the user and/or application component to access specified portions of the keystore data provided in the view, the keystore system implements a second set of security restrictions associated with the attempt to access the specified portions of the keystore data, and provides access to the keystore data to the user and/or application component based on the results of the second set of security restrictions.Type: GrantFiled: June 2, 2004Date of Patent: October 26, 2010Assignee: SAP AGInventors: Ilia Kacarov, Hiltrud Jaeschke, Stephan Zlatarev
-
Patent number: 7650627Abstract: A method is described that involves identifying a configuration file in response to a desire to obtain security services. The configuration file describes a security policy tailored for use in the environmental condition set under which the desire arose. The identifying is based upon at least a portion of the environmental condition set. The method also involves using information found within the configuration file to configure code that performs authentication and authorization services so that the code will implement the security policy.Type: GrantFiled: May 28, 2004Date of Patent: January 19, 2010Assignee: SAP AGInventors: Svetlana Stancheva, Jako Blagoev, Ekaterina Zheleva, Ilia Kacarov, Stephan Zlatarev, Hiltrud Jaeschke
-
Patent number: 7584355Abstract: Improved authentication service schemes are described. A first technique enables application specific authentication services even if container-wide authentication services are made available. A second technique prevents an authentication service from being performed if an attempt is made to reach an item of insensitivity within a protected area. A third technique introduces “get/set” functions into a login module callback handler arrangement for retrieving/imposing information from/to a communication session with a user that the login module is authenticating. A fourth technique distributes a login context function so that a network resides between separate portions of the login context function. A fifth technique uses a fallback handler in an application based authentication service so that a container-wide authentication service can be used.Type: GrantFiled: April 30, 2004Date of Patent: September 1, 2009Assignee: SAP AGInventors: Svetlana Stancheva, Stephan Zlatarev, Maria Jurova, Hiltrud Jaeschke, Jako Blagoev