1
Thomas R Gross, Guenter Karjoth: Access control in data processing system. International Business Machines Corporation, Feb Cabrasawan, October 28, 2014: US08875224 (120 worldwide citation)

A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with ...


2
Paul Andrew Moskowitz, Robert J von Gutfeld, Guenter Karjoth: System and method for disabling RFID tags. International Business Machines Corporation, Louis P Herzberg, October 2, 2007: US07277016 (28 worldwide citation)

The invention provides protection to wireless portable transponders from unauthorized interrogation by employing a mechanism for disabling reception by or from the antenna of the transponder. Transponders include RFID tags that are attached to items that a persons may purchase or carry. Such transpo ...


3
Guenter Karjoth, Elsie A Van Herreweghen: Access control policy conversion. International Business Machines Corporation, William Stock, Anne Vachon Dougherty, February 21, 2012: US08122484 (23 worldwide citation)

Methods and apparatus are provided for generating an access control policy data structure for a single-authorization-query access control system from a source policy data structure of an access control system in which primary authorizations can be subject to auxiliary constraints. Authorizations in ...


4
Steven B Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, Jan Camenisch, Arthur M Gilbert, Guenter Karjoth, Dogan Kesdogan, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Martin Joseph Clayton Presler Marshall, Michael Schnyder, Elsie Van Herreweghen, Michael Waidner: Using a rules model to improve handling of personally identifiable information. International Business Machines Corporation, Stephen J Walder Jr, David A Mims Jr, June 27, 2006: US07069427 (14 worldwide citation)

The present invention is a system and method for handling personally identifiable information, using a rules model. The invention involves defining a limited number of privacy-related actions regarding personally identifiable information; constructing a rule for each circumstance in which one of sai ...


5
Guenter Karjoth, Andreas Schade: Serialization of XACML policies. International Business Machines Corporation, Cantor Colburn, Daniel Morris, June 4, 2013: US08458764 (10 worldwide citation)

A computer implemented access control system, the system includes a database for storing a serialized version of an XACML permissions hierarchy. The system also includes a memory for storing an original version of the XACML permissions hierarchy, and an XACML serialization engine configured to conve ...


6
Linda Betz, John C Dayka, Walter B Farrell, Richard H Guski, Guenter Karjoth, Mark A Nelson, Birgit M Pfitzmann, Matthias Schunter, Michael P Waidner: Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets. International Business Machines Corporation, Lily Neff Esq, Kevin P Radigan Esq, Heslin Rothenberg Farley & Mesiti P C, November 27, 2007: US07302569 (7 worldwide citation)

A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving functi ...


7
Thomas R Gross, Guenter Karjoth: Access control in data processing systems. International Business Machines Corporation, Feb R Cabrasawan, October 22, 2013: US08566906 (3 worldwide citation)

A policy data structure defines predetermined authorizations, each relating to authorization of at least one user to access at least one resource as well as to dynamic access requests. Each dynamic access request indicates a condition to be satisfied by a respective set of attributes associated with ...


8
Linda Betz, John C Dayka, Walter B Farrell, Richard H Guski, Guenter Karjoth, Mark A Nelson, Birgit M Pfitzmann, Michael P Waidner, Matthias Schunter: Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets. International Business Machines Corporation, William Kinnaman Esq, Kevin P Radigan Esq, Heslin Rothenberg Farley & Mesiti P C, November 10, 2009: US07617393 (2 worldwide citation)

A data access control facility is implemented by assigning personally identifying information (PII) classification labels to PII data objects, with each PII data object having one PII classification label assigned thereto. The control facility further includes at least one PII purpose serving functi ...


9
Joy Algesheimer, Christian Cachin, Jan Camenisch, Guenter Karjoth: Method and system for processing a request of a customer. International Business Machines Corporation, Ido Tuchman, Kenneth R Corsello, November 30, 2010: US07844496 (2 worldwide citation)

The invention provides methods, apparatus and systems for securely processing an originator request of a customer. This originator request can be sent to at least one first entity. An example of a method for processing the originator request comprises the steps of a) sending from the customer the or ...


10
Paul Andrew Moskowitz, Robert J von Gutfeld, Guenter Karjoth: System and method for disabling RFID tags. International Business Machines Corporation, Cantor Colburn, Vazken Alexanian, June 15, 2010: US07737853 (1 worldwide citation)

The invention provides protection to wireless portable transponders from unauthorized interrogation by employing a mechanical means for disabling reception by or from the antenna of the transponder. Transponders include RFID tags that are attached to items that a persons may purchase or carry. Such ...