COMPUGROUP HOLDING AG Patent applications |
Patent application number | Title | Published |
20120087494 | METHOD FOR PROVIDING CRYPTOGRAPHICAL KEY PAIRS - The invention relates to a method for creating a second asymmetric cryptographic pair of keys ( | 04-12-2012 |
20120063594 | METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS - The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K | 03-15-2012 |
20120063592 | APPARATUS FOR ENCRYPTING DATA - An apparatus for encrypting data is provided. The apparatus has a means for symmetrically encrypting data and a means for encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. The means for encrypting the symmetrically encrypted data is designed such that a section of the bit string is used for encryption and successive encryption operations are carried out with varying sections of the bit string while the bit string remains unchanged. | 03-15-2012 |
20110185178 | COMMUNICATION METHOD OF AN ELECTRONIC HEALTH INSURANCE CARD WITH A READING DEVICE - The invention relates to a communication method of an electronic health insurance card ( | 07-28-2011 |
20110185177 | Method for generating an asymmetric cryptographic key pair and its application - The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair. | 07-28-2011 |
20110154056 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING AN ACCESS KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the method comprising the steps of:
| 06-23-2011 |
20110154055 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING A PSEUDONYM, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - The invention relates to a method of generating a pseudonym, the method including accessing an input value and calculating a pseudonym by applying a cryptographic one-way function to the input value, where the cryptographic one-way function is an injective function. In alternative embodiments, the cryptographic one-way function is an embedding and/or randomizing function | 06-23-2011 |
20110154054 | COMPUTER IMPLEMENTED METHOD FOR GENERATING A PSEUDONYM, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM - The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym | 06-23-2011 |
20110154044 | COMPUTER IMPLEMENTED METHOD FOR SENDING A MESSAGE TO A RECIPIENT USER, RECEIVING A MESSAGE BY A RECIPIENT USER, A COMPUTER READABLE STORAGE MEDIUM AND A COMPUTER SYSTEM - The invention relates to a computer implemented method for sending a message to a recipient user, wherein a recipient asymmetric cryptographic key pair is associated with the recipient user, said key pair comprising a public recipient key and a private recipient key, the method comprising sending the message to said recipient user with the recipient address to which the message is sent comprising the public recipient key. | 06-23-2011 |
20110154025 | COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER - The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair. | 06-23-2011 |
20110150212 | COMPUTER IMPLEMENTED METHOD FOR GENERATING A SET OF IDENTIFIERS FROM A PRIVATE KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - The invention relates to a computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of: calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair; and outputting the identifiers comprising the public keys. | 06-23-2011 |
20110123027 | USE OF A MOBILE TELECOMMUNICATION DEVICE AS AN ELECTRONIC HEALTH INSURANCE CARD - The invention relates to a method for decoding a medicinal data object ( | 05-26-2011 |