Patent application number | Description | Published |
20090024352 | Method, Device and System For Verifying Points Determined on an Elliptic Curve - Conventional cryptographic methods that are based on elliptic curves are prone to side-channel attacks. Previously known methods for preventing side-channel attacks have the disadvantage of requiring high arithmetic capacity and a large amount of available memory space. The proposed method overcomes said disadvantage by using a process for verifying points on elliptic curves which saves arithmetic capacity and memory space. | 01-22-2009 |
20090235073 | Authentication method and communications system used for authentication - An authentication method authenticates between subscribers of a communications system using an asymmetric elliptic curve encryption algorithm. The method involves providing a first and at least one second subscriber having a first or second secret key known only to the respective subscriber and a public key; authenticating an inquiry transmitted by the first subscriber with respect to the validity of the first certificate contained therein and associated with the first subscriber; calculating the response of the second subscriber associated with the inquiry; randomized encryption of the calculated response and a second certificate associated with the second subscriber using the public key; decryption and authentication of the response transmitted by the second subscriber with respect to the validity of the second certificate contained therein. | 09-17-2009 |
20090292921 | METHOD FOR THE ENCRYPTED DATA EXCHANGE AND COMMUNICATION SYSTEM - The embodiments relate to a method for the encrypted data exchange between subscribers of a communication system using cryptography based on elliptical curves, wherein upon a query by a first subscriber a scalar multiplication is calculated by the second subscriber, wherein merely part of the result of the scalar multiplication is returned to the first subscriber as a response. The invention relates to a communication system. | 11-26-2009 |
20100172490 | METHOD FOR THE SECURE DETERMINATION OF DATA - The aim of the embodiments is to provide a method for the secure processing of data, in which security is increased in relation to side channel attacks. To achieve this, operation codes for commanding co-processors are determined, for example for the bit-dependent transposition of register contents. The solution exploits the fact that as a result of the technical configuration for the co-processor, a shift of register contents, for example from register A to register B cannot be differentiated from the exterior from a shift from register A to register C. | 07-08-2010 |
20110068894 | METHOD FOR AUTHENTICATING AN RFID TAG - To ensure data protection in an authentication method for use in an RFID system in accordance with the challenge-response protocol, the data communication between RFID reader and RFID tag is usually encrypted in addition. Such an authentication can be designed to an arbitrary degree of complexity and therefore inevitably requires a high level of investment in hardware and software resources. An RFID tag has a display, wherein the response is displayed on the display of the RFID tag and is read in by the RFID reader by an optical scanner. The response of the RFID tag can therefore be read out only when there is direct visual contact. | 03-24-2011 |
20110107097 | METHOD FOR ENCODED DATA EXCHANGE AND COMMUNICATION SYSTEM - In a system and method for encrypted data exchange between entities (users) of a communication system using cryptography based on elliptic curves, in response to a challenge of a first user a scalar multiplication is calculated by the second user, wherein only part of the result of the scalar multiplication is sent back as response to the first user. | 05-05-2011 |
20120128157 | AUTHENTICATION OF AN RFID TAG USING AN ASYMMETRIC CRYPTOGRAPHY METHOD - A method for the authentication of an RFID tag uses an asymmetric cryptography method which ensures protection against the recycling of authentication RFID tags and needs no deactivation of the corresponding RFID tag for this purpose. To this end, the certificate of an RFID tag to be checked is not stored on the RFID tag but is stored physically separately from the RFID tag. Firstly, the RFID reader reads the certificate of the RFID tag to be checked before the challenge-response protocol is carried out successfully with the RFID tag to be checked. Consequently, an RFID tag can be reused for authentication only when the certificate relating to this RFID tag is known. | 05-24-2012 |
20120144190 | DEVICES AND METHODS FOR ESTABLISHING AND VALIDATING A DIGITAL CERTIFICATE - A digital certificate is configured to confirm the association of a public key assigned to a device as the owner of the public key to the device. The digital certificate further has an additional digital certificate, the additional digital certificate being a certificate of an additional device configured to digitally sign the digital certificate of the device. The certification process can be improved, wherein particularly the verification of digital certificates is improved. The various embodiments are particularly useful for applications where a secure communication of information or data is desired and/or should be made possible. | 06-07-2012 |
20120321088 | Method And System For The Accelerated Decryption Of Cryptographically Protected User Data Units - A method and system for accelerated decryption of a cryptographically protected user data unit, wherein a transmitter initially generates a cryptographic key that is provided with a related key identification. The transmitter then performs asymmetrical encryption of the generated cryptographic key using a public cryptographic key and encryption of at least one user data unit using the generated cryptographic key. The encrypted user data unit, the asymmetrically encrypted cryptographic key and the related key identification of the cryptographic key are transported to a receiver that decrypts the received asymmetrically encrypted key using a private key, if verification of the received related key identification of the cryptographic key indicates the cryptographic key is not present in a decrypted state in the receiver. The receiver then decrypts the received cryptographically encrypted user data unit using the cryptographic key in the receiver or with the cryptographic key decrypted using the private key. | 12-20-2012 |
20120321089 | Method and System for Confidentially Providing Software Components - A method and system for confidentially providing a software component which is encrypted using a secret cryptographic key of a software component manufacturer, and the key is then encrypted using a first cryptographic system key, wherein the encrypted software component and the encrypted key are transported by the software component manufacturer to a destination system device. After decrypting the transported encrypted key using a second cryptographic system key, the transported encrypted software component is decrypted using the decrypted key, wherein the decrypted software component is provided for execution on the destination system device. The method can be used to protect source codes or object codes of a developed software component from access by a third party and still allows for processing using standard tools. | 12-20-2012 |
20120324219 | Method and System for Resolving a Naming Conflict - A method and a system for naming-conflict-free integration of software components originating from software component manufacturers (OEM), comprising software development devices from different software component manufacturers (OEM) that manufacture and encrypt software components with the respective cryptographic key, wherein when a naming conflict occurs during the integration of encrypted software components, at least one of the encrypted software components in which the naming conflict occurred is expanded by a naming conflict resolution rule to thereby allows for the resolution of naming conflicts in encrypted software components that can originate from different software component manufacturers without the source code of the software components becoming visible to third parties. | 12-20-2012 |
20130326639 | VIRTUAL MACHINE FOR PROCESSING MEDICAL DATA - The present invention relates to a virtual machine (VM) for processing digital data, in particular medical data, by executing a digital data processing application program, in particular a medical data processing application program (MeDPAP), the virtual machine (VM) being a simulation of a computer, a) the virtual machine (VM) comprising a volatile memory (ViMStor) configured to comprise a storage space for temporary data (TEMP) for temporarily storing the digital data; b) the virtual machine (VM) being configured to be accessed by any virtual machine user activated on a virtual machine user list, wherein any activated maintenance virtual machine user is denied any permission regarding the storage space for temporary data (TEMP), wherein denying any permissions is performed by logging into the virtual machine (VM) as an administrator and setting corresponding options; c) wherein any administrator has been deactivated on the virtual machine user list, wherein deactivating any administrator has been performed by logging into the virtual machine (VM) as an administrator and setting corresponding options for each administrator in the virtual machine user list; d) wherein the virtual machine (VM) is in a state in which the administrator has been logged off after deactivating the administrator on the virtual machine user list. | 12-05-2013 |
Patent application number | Description | Published |
20110091921 | NOVEL 12 ALPHA-HYDROXYSTEROID DEHYDROGENASES, PRODUCTION AND USE THEREOF - The invention relates to 12 α-hydroxysteroid dehydrogenases, nucleic acid sequences coding for the same, expression cassettes and vectors, recombinant microorganisms containing the corresponding coding nucleic acid sequences, a method for producing said 12 α-hydroxysteroid dehydrogenases, a method for enzymatic oxidation of 12 α-hydroxysteroids using said enzyme, a method for enzymatic reduction of 12-ketosteroids using said enzyme, a method for qualitative or quantitative determination of 12-ketosteroids and/or 12α-hydroxysteroids using said 12α-hydroxysteroid dehydrogenases and a method for production of ursodesoxycholic acid, comprising the enzyme-catalysed cholic acid oxidation using said 12 α-hydroxysteroid dehydrogenases. | 04-21-2011 |
20130224792 | Novel 7 alpha-Hydroxysteroid Dehydrogenase Knockout Mutants and Use Therefor - The invention relates to novel microbial 7α-hydroxysteroid dehydrogenase (7α-HSDH) knockout mutants and to the use thereof for producing other HSDHs having various functionalities, such as 3α-, 7β- or 12α-HSDH, and to the use of thus-produced HSDH enzymes in enzymatic reactions of cholic acid compounds, and in particular for producing ursodeoxycholic acid (UDCS). The invention relates in particular to novel methods for synthesizing UDCS. | 08-29-2013 |
20140087421 | NOVEL 7Beta-HYDROXYSTEROID DEHYDROGENASE MUTANTS AND PROCESS FOR THE PREPARATION OF URSODEOXYCHOLIC ACID - The invention relates to novel 7β-hydroxysteroid dehydrogenase mutants, to the sequences which encode these enzyme mutants, to processes for the preparation of the enzyme mutants and to their use in enzymatic reactions of cholic acid compounds, in particular in the preparation of ursodeoxycholic acid (UDCS). The invention also relates to novel processes for the synthesis of UDCS using the enzyme mutants; and to the preparation of UDCS using recombinant, multiply-modified microorganisms. | 03-27-2014 |
20140147887 | NOVEL 12 ALPHA-HYDROXYSTEROID DEHYDROGENASES, PRODUCTION AND USE THEREOF - The invention provides 12α-hydroxysteroid dehydrogenases, nucleic acid sequences coding for the same, expression cassettes and vectors, recombinant microorganisms containing the corresponding coding nucleic acid sequences, methods for producing said 12α-hydroxysteroid dehydrogenases, methods for enzymatic oxidation of 12α-hydroxysteroids using said enzyme, methods for enzymatic reduction of 12-ketosteroids using said enzyme, methods for qualitative or quantitative determination of 12-ketosteroids and/or 12α-hydroxysteroids using said 12α-hydroxysteroid dehydrogenases and methods for production of ursodesoxycholic acid, comprising the enzyme-catalysed cholic acid oxidation using said 12α-hydroxysteroid dehydrogenases. | 05-29-2014 |
Patent application number | Description | Published |
20110075166 | PREVIEW OF A DOCUMENT WITH PRINTABLE COMPONENTS AT A PRINTING DEVICE BASED ON ITS PRINTING CAPABILITY - An apparatus, method, system and medium are described that support functionality to receive document(s) to be printed at a printing device, and enable editing the document(s) prior to printing. Modifications to the document(s) may be generated based on the user edits, and a print preview of the modified documents may be displayed and may enable further edits. In some embodiments, the print preview may be provided to the user on a display that is part of the printing device. In some embodiments, the print preview may be provided to the user through a UI presented on a client device. Display of the modified document(s) may be a rasterized image of the modified document(s), generated based on capabilities of a selected printing device. In some embodiments, modifications may be made to an intermediate version of the document(s), and that intermediate version may be cached. | 03-31-2011 |
20110075200 | PREVIEW AND MODIFICATION OF PRINTABLE COMPONENTS OF A DOCUMENT AT A PRINTING DEVICE - An apparatus, method, system and medium are described that support functionality to receive document(s) to be printed at a printing device, and enable editing the document(s) prior to printing. Modifications to the document(s) may be generated based on the user edits, and a print preview of the modified documents may be displayed and may enable further edits. In some embodiments, the print preview may be provided to the user on a display that is part of the printing device. In some embodiments, the print preview may be provided to the user through a UI presented on a client device. Display of the modified document(s) may be a rasterized image of the modified document(s), generated based on capabilities of a selected printing device. In some embodiments, modifications may be made to an intermediate version of the document(s), and that intermediate version may be cached. | 03-31-2011 |
20150186759 | DIRECT PRINTING OF OFFICE DOCUMENTS - Embodiments are directed towards employing a printer to convert a document from its native file format into an image representation printable by the printer. A document may be provided to the printer in a native file format (e.g., .doc, .docx, .xls, .xlsx, .ppt, or .pptx) that is editable by a document-processing application. A page representation of each of page of the document to be printed may be determined. Each page representation (which may include a plurality of graphics primitives) may be determined straight from the native file format of the document independent of an intermediate page description language. From each page representation, an image representation (e.g., a bitmap) may be determined based on the plurality of graphics primitives of a corresponding page representation. At least one page of the document may be printed based on the determined image representations. | 07-02-2015 |
Patent application number | Description | Published |
20080196313 | Door and Door Frame Assembly - Door and frame assemblies are disclosed by the present application. In one exemplary embodiment, the a door is connected to a door frame, such that the door is moveable between an open position and a closed position. Activation of a trigger causes a door frame coupling arrangement to couple the door frame to the door in a closed position to thereby inhibit movement of the door relative to the frame. In another exemplary embodiment, a door is coupled to a door frame by a hinge. The hinge is configured to move the door in translation as the door is rotated from the open position to the closed position. For example, the hinge may move the door downward, toward the sill, when the door is moved from the open position to the closed position. | 08-21-2008 |
20100251620 | ENTRY SYSTEM WITH WATER INFILTRATION BARRIER - The present application discloses embodiments of entry systems that minimize water infiltration due to a wind driven rain. In one embodiment, the entry system includes a corner pad that includes an upper portion that seals against the weather strip when the door is closed and a lower portion that is spaced apart from the weather strip to form a gap between the lower portion and the weather strip. The lower portion seals against the door when the door is closed. | 10-07-2010 |
20130118080 | DOOR AND DOOR FRAME ASSEMBLY - Door and frame assemblies are disclosed by the present application. In one exemplary embodiment, the a door is connected to a door frame, such that the door is moveable between an open position and a closed position. Activation of a trigger causes a door frame coupling arrangement to couple the door frame to the door in a closed position to thereby inhibit movement of the door relative to the frame. In another exemplary embodiment, a door is coupled to a door frame by a hinge. The hinge is configured to move the door in translation as the door is rotated from the open position to the closed position. For example, the hinge may move the door downward, toward the sill, when the door is moved from the open position to the closed position. | 05-16-2013 |
Patent application number | Description | Published |
20080205639 | Method for securely encrypting or decrypting a message - A method for securely encrypting or decrypting a message or for generating or verifying a digital signature in a message, in which the message is subjected, with the aid of a processor, to a mathematical operation using a key (k) which can be represented in the form of a binary number with a sequence of bits, and computational operations are sequentially carried out on auxiliary variables for each bit. The dependence of the computational result on the values of individual bits is taken into account by reading the memory addresses from the auxiliary variables and assigning them to address variables. The difference between the addresses is calculated and, depending on the respective current bit, is added to, or subtracted from, the computer addresses. The assignment of the auxiliary variables to the address variables can thus be interchanged. As a result, the order and selection of the computational operations is controlled on the basis of bits without the program sequence having to contain jump instructions. | 08-28-2008 |
20130090884 | Cooperative Pulses - A method is proposed for the simultaneous optimization of an arbitrary number of electromagnetic pulses, which act in a cooperative way, or mutually compensate each other's errors. The method generally relates to pulses which can have improved properties when cooperating with each other compared to single pulses. In experiments with several scans, undesired signal contributions can be suppressed by COOP pulses, which complements and generalizes the concept of phase cycling. COOP pulses can also be used in individual scans. COOP pulses can be optimized efficiently with the aid of an extended version of the optimal-control-theory-based gradient ascent pulse engineering (GRAPE) algorithm. The advantage of the COOP pulse method is demonstrated theoretically and experimentally for broadband and band-selective excitation and saturation pulses. | 04-11-2013 |
20130339958 | PROCESSING OF DIGITAL DATA, IN PARTICULAR MEDICAL DATA BY A VIRTUAL MACHINE - The present invention relates to a virtual machine (VM) for processing digital data (MD), in particular medical data by executing a digital data processing application program, in particular a medical data application program called MeDPAP, the virtual machine (VM) being a simulation of a computer, the virtual machine comprising at least the following components: a MeDPAP controller (MC) which is constituted—so that it can be addressed by a Uniform Resource Identifier called VM-URI via a wide area network (WAN), —to support direct interoperable interaction with a client application (MCA) over the wide area network (WAN), —to assign a Uniform Resource Identifier called MeDPAP-URI to the MeDPAP, and —to send the assigned MeDPAP-URI to the client application via the wide area network (WAN); and the MeDPAP which is constituted—to process the digital data (MD), —so that it can be addressed by the client application via the wide area network (WAN) by using the MeDPAP-URI, and —to support direct interaction with the client application over the wide area network for receiving instructions from the client application (MCA) to process the digital data. | 12-19-2013 |
Patent application number | Description | Published |
20120107632 | METHOD FOR PRODUCING A COMPONENT FROM AN AIR-HARDENABLE STEEL AND COMPONENT PRODUCED THEREWITH - A component of an air-hardenable steel composed of (contents in mass %): C<0.20; Al<0.08; Si<1.00; Mn 1.20 to <2.50; P<0.020; S<0.015; N<0.0150; Cr 0.30 to <1.5; Mo 0.10 to <0.80; Ti 0.010 to <0.050; V 0.03 to <0.20; B 0.0015 to <0.0060, with the remainder being iron including the usual elements present in steel, is produced by heating a hot- or cold-rolled steel sheet or steel tube section to a temperature of θ | 05-03-2012 |
20130240520 | ENERGY-STORING CONTAINER MADE OF LIGHTWEIGHT STEEL - An energy-storing container is made of a lightweight steel having the following chemical composition (in wt %): C 0.04-2%; Mn 14-30%; Al 1.5-12%; Si 0.3-3%; Cr 0.12-6%, and additionally one or more of the following elements: Ti, V, Nb, B, Zr, Mo, Ni, Cu, W, Co, P, N, each at up to 5% and in total at up to 10%, wherein the remainder is Fe including common steel tramp elements, wherein the concrete alloy composition is selected in order to limit the a′-martensite fraction before or after a forming process to no more than 3%, with the stipulation that the a′-martensite equivalent according to 0.1*wt % Mn+wt % C+0.05*wt % Si is between 3.4 and 10.5. | 09-19-2013 |
20140290322 | METHOD FOR PRODUCING A COMPONENT BY HOT FORMING A PRE-PRODUCT MADE OF STEEL - In a method for producing a component by hot forming of a pre-product made of steel, the pre-product is heated to forming temperature and subsequently formed. The product is heated to a temperature below the AC | 10-02-2014 |
20150047753 | METHOD FOR PRODUCING A COMPONENT FROM STEEL BY HOT FORMING - The invention relates to a method for producing a component from transformable steel by hot forming, in which a plate first is cut out of a strip or sheet as the pre-material, and is then heated to forming temperature and pre-formed, having an at least partially martensitic transformation structure after forming. Instead of a press mould hardening, the at least partially martensitic transformation structure is created in the pre-material, or in the plate to be formed, by austenitisation and quenching already before forming, and then the thus-conditioned plate is reheated after forming, while maintaining the at least partially martensitic transformation structure, to a temperature below the Ac1 transformation temperature, and formed at this temperature. | 02-19-2015 |