Patent application number | Description | Published |
20100316217 | GENERATING A SESSION KEY FOR AUTHENTICATION AND SECURE DATA TRANSFER - A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be determined by the first and second communication partners, includes a first module operable to calculate the session key using a concatenation of at least a part of a random number and a part of the secret information. The device also includes a second module operable to use the session key for communication with the second communication partner. | 12-16-2010 |
20130195266 | Apparatus and Method for Producing a Message Authentication Code - An apparatus for producing a message authentication code based on a first message and an original key is provided. The apparatus includes a key generator configured to produce a generated key based on the original key and the first message. Furthermore, the apparatus includes a message authentication code generator configured to produce the message authentication code based on the generated key and the first message. | 08-01-2013 |
20140019502 | RANDOM BIT STREAM GENERATOR WITH ENHACED BACKWARD SECRECY - A random bit stream generator includes a plurality of feedback shift registers configured to store a plurality of bit values that represent an internal state of the random bit stream generator. Each feedback shift register includes a register input and a register output. The random bit stream generator further includes a Boolean output function configured to receive the plurality of register outputs from the plurality of feedback registers, to perform a first Boolean combination of the plurality of register outputs, and to provide a corresponding output bit, wherein a plurality of successive output bits forms a random bit stream. A feedback loop is configured to perform a second Boolean combination of the output bit with at least one register feedback bit of at least one of the feedback shift registers, so that the register input of the at least one feedback shift register is a function of the output bit. | 01-16-2014 |
20140169557 | Generating a Session Key for Authentication and Secure Data Transfer - A key-generating apparatus is provided for generating a session key which is known to a first communication apparatus and a second communication apparatus, for the first communication apparatus, from secret information which may be determined by the first and second communication apparatuses. The key-generating apparatus includes a first module operable to calculate the session key using a concatenation of at least a part of a random number and a part of the secret information, and a second module operable to use the session key for communication with the second communication apparatus. | 06-19-2014 |
Patent application number | Description | Published |
20090097640 | DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS - A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration includes two modular reductions and has, as an iteration loop result, values obtained by an iteration loop of an extended Euclidean algorithm. | 04-16-2009 |
20090110187 | METHOD AND APPARATUS FOR PROTECTING AN RSA CALCULATION ON AN OUTPUT BY MEANS OF THE CHINESE REMAINDER THEOREM - An apparatus for protecting an RSA calculation of an output based on input values by means of the Chinese remainder theorem, the apparatus comprising for a first determining device adapted to determine a first security parameter based on the input values, a computing device adapted to compute a control value based on the first security parameter and the input values, a calculating device adapted to calculate a modified input parameters based on the input values and the first security parameter, for a performing device adapted to perform the RSA calculation based on the modified input values to obtain a single modified output, and for a second determining device adapted to determine whether the single modified output is in a predetermined relation to the control value and applying a countermeasure in case the predetermined relation is not fulfilled. | 04-30-2009 |
20090158011 | DATA PROCESSING SYSTEM - A data processing system comprising a computer chip having a processing circuit and a chip-internal first memory and a chip-external second memory being coupled to the computer chip, wherein the processing circuit is configured to allow execution of computer programs stored in the first memory and to prevent execution of computer programs stored in the second memory when the data processing system is in a first state, and to allow execution of computer programs stored in the second memory when the data processing system is in a second state. | 06-18-2009 |
20100195821 | APPARATUS FOR CALCULATING A RESULT OF A SCALAR MULTIPLICATION - An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve comprises a point selector and a processor. The point selector is configured to select randomly or pseudo-randomly an auxiliary point on the elliptic curve. The processor is configured to calculate the result of the scalar multiplication with a double-and-always-add process using the auxiliary point. | 08-05-2010 |
20120197956 | CALCULATING UNIT FOR REDUCING AN INPUT NUMBER WITH RESPECT TO A MODULUS - A calculating unit for reducing an input number with respect to a modulus, wherein the input number has input number portions of different significances, wherein the input number portions represent the input number with respect to a division number, wherein the modulus has modulus portions of different significances, and wherein the modulus portions represent the modulus with respect to the division number, includes a unit for estimating a result of an integer division of the input number by the modulus using a stored most significant portion of the number, a stored most significant portion of the modulus and the number, and for storing the estimated result in a memory of the calculating unit, and a unit for calculating a reduction result based on a subtraction of a product of the modulus and a value derived from the estimated result from the number. | 08-02-2012 |
20120213361 | SYSTEMS AND METHODS FOR DEVICE AND DATA AUTHENTICATION - Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can be derived as a byproduct of a challenge-response protocol for authenticating one or both of the devices. | 08-23-2012 |
20120237025 | DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS - A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration includes two modular reductions and has, as an iteration loop result, values obtained by an iteration loop of an extended Euclidean algorithm. | 09-20-2012 |
20130346461 | APPARATUS FOR CALCULATING A RESULT OF A SCALAR MULTIPLICATION - An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve comprises a point selector and a processor. The point selector is configured to select randomly or pseudo-randomly an auxiliary point on the elliptic curve. The processor is configured to calculate the result of the scalar multiplication with a double-and-always-add process using the auxiliary point. | 12-26-2013 |
20140129837 | SYSTEMS AND METHODS FOR DEVICE AND DATA AUTHENTICATION - Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can be derived as a byproduct of a challenge-response protocol for authenticating one or both of the devices. | 05-08-2014 |
20140129840 | SYSTEMS AND METHODS FOR DEVICE AND DATA AUTHENTICATION - Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can be derived as a byproduct of a challenge-response protocol for authenticating one or both of the devices. | 05-08-2014 |
Patent application number | Description | Published |
20120015696 | Application Audio Announcements Using Wireless Protocols - The present invention relates to methods and apparatus for using a wireless telephone communication protocol to make a non-telephonic audio announcement (NTAA). An apparatus to use a hands-free telephonic device to make a non-telephonic audio announcement (NTAA) includes an announcer module configured to receive the NTAA from an application. The announcer module is configured to send an outgoing call initiation command signal to the hands-free telephonic device using a hands-free communication protocol. After the call initiation command signal is sent, the announcer sends the NTAA to the hands free telephonic device using the hands-free communication protocol. | 01-19-2012 |
20120021729 | Application Audio Announcements Using Wireless Protocols - The present invention relates to methods and apparatus for using a wireless telephone communication protocol to make a non-telephonic audio announcement (NTAA). An apparatus to use a hands-free telephonic device to make a non-telephonic audio announcement (NTAA) includes an announcer module configured to receive the NTAA from an application. The announcer module is configured to send an outgoing call initiation command signal to the hands-free telephonic device using a hands-free communication protocol. After the call initiation command signal is sent, the announcer sends the NTAA to the hands free telephonic device using the hands-free communication protocol. | 01-26-2012 |
20140019518 | Delay the Persistent Memory Storage of Website Data to Control Data That is Stored in the Browser - Embodiments of the invention include a system, computer-implemented method, and a computer-readable medium for delaying the storage of data. Data that manipulates website data is provided from a web server to a client device in response to a request for a webpage. Data is initially stored in a temporary memory storage. The temporary memory storage is associated with a browser and stores data before data is moved to a persistent memory storage. A notification is generated that indicates that data was received and is intended to be stored persistently or manipulate, access or rely on website data in the persistent memory storage. Depending on the response to the notification, the system determines how data in temporary memory storage will be processed and whether data can be stored in the persistent memory storage or manipulate, access and rely on website data in the persistent memory storage. | 01-16-2014 |
Patent application number | Description | Published |
20120089625 | INCREMENTAL CONVERSION OF DATABASE OBJECTS DURING UPGRADE OF AN ORIGINAL SYSTEM - A computer system can include a database comparator configured to identify a first database object from an original system for a complete modification based on a comparison of the first database object with a plurality of target upgrade database objects, and configured to identify a second database object from the original system for a partial modification based on a comparison of the second database object with the plurality of target upgrade database objects. A complete modification module can be configured to designate, in response to the identification of the first database object, the first database object for the complete modification based on an incremental conversion process. A partial modification module can be configured to designate the second database object for the partial modification based on the incremental conversion process when an instruction to implement the partial modification satisfies at least a portion of a modification condition. | 04-12-2012 |
20120137297 | MODIFYING SCHEDULED EXECUTION OF OBJECT MODIFICATION METHODS ASSOCIATED WITH DATABASE OBJECTS - An original schedule module configured to receive an original schedule configured to trigger execution of a first original batch of entries including a set of object modification methods and a corresponding set of database objects before triggering execution of a second original batch of entries including a set of object modification methods and a corresponding set of database objects. An analysis module can be configured to determine logic for execution of each entry from the first original batch of entries based on the original schedule. A schedule generator can be configured to define, based on the logic for execution and based on the original schedule, a modified schedule configured to trigger parallel execution of a first modified batch of entries including less than all of the first original batch of entries, and a second modified batch of entries including less than all of the second original batch of entries. | 05-31-2012 |
20120166393 | SHADOW SYSTEM MIRRORING OF AN ORIGINAL SYSTEM DURING UPTIME OF AN UPGRADE PROCESS - A computer system can include a program database module configured to define, at a shadow system, a shadow program database having a structure defining an upgrade to a structure of an original program database on an original system, and having data defining an upgrade to data of the original program database on the original system. The computer system can include a customization upgrade module configured to select the data of the shadow program database based on a data customization implemented in the original program database of the original system, and configured to define an upgraded program state of the shadow program database based on a combination of the structure of the shadow program database and the data of the shadow program database. | 06-28-2012 |
20120166493 | SHADOW SYSTEM START DURING UPGRADE OF AN ORIGINAL SYSTEM - In one general aspect, a computer system can include instructions stored on a non-transitory computer-readable storage medium. The computer system can include a program database module configured to define, at a shadow system, a shadow program database including data and a structure collectively defining an upgrade to an original program database on an original system. The computer system can include a basis module configured to define at the shadow system a shadow basis database related to start functionality of the shadow system. The computer system can also include a downtime execution module configured to trigger the shadow system to change from a downstate to an upstate based on a combination of data included in the shadow basis database and the data of the shadow program database. | 06-28-2012 |
20130159247 | CHANGE DATA CAPTURING DURING AN UPGRADE - In one general aspect, a computer system can include instructions stored on a non-transitory computer-readable storage medium. The computer system can include a logging table generator configured to generate a logging table corresponding with an original table targeted for an upgrade, and a control table generator configured to generate a control table configured to store a version identifier for changes logged in the logging table. The computer system can include a change recorder configured to receive an indicator of a change to a record of the original table during execution of at least a portion of the upgrade of the original table, and a key recorder configured to store in the logging table a primary key identifying the record of the original table and the version identifier stored in the control table. | 06-20-2013 |
20130238555 | ALIASES FOR ACCESSING SHARED TABLES DURING PROVISION OF CONTINUOUS ACCESS DURING APPLICATION UPGRADE - Continuous access to an application and associated data is provided during a modification (for example, an upgrade) of the application. Shared tables are used to perform parallel changes in databases associated with an original database schema, a temporary database schema, and an upgraded database schema. Aliases are used to access shared tables from some database schemas. The use of shared tables obviates a separate merging of data written by different tools and/or systems during an upgrade of the application. Related methods, apparatuses, systems, techniques and articles are also described. | 09-12-2013 |
20130238577 | PROVIDING CONTINUOUS DATABASE ACCESS DURING DATABASE MODIFICATION - The subject matter described herein relates to providing a continuous access to a database at times, including when the database is being modified or upgraded. Initially, access to an old version of a table is enabled and provided to a user. A copy of the old version is generated. Access is asynchronously redirected from the old version to the copy of the old version. A new version of the table is generated by modifying the structure of the first version of the table. The copy of the old version is accessible when the database is being modified or upgraded. When the structure is being modified, access is asynchronously redirected from the copy of the old version to the new version. | 09-12-2013 |
20130238868 | USING TEMPORARY SYSTEM TO PROVIDE CONTINUOUS ACCESS DURING APPLICATION UPGRADE - A temporary system is described to provide, during an upgrade of an application implemented using an original system, a continuous access to the application. A copy of a first data-set characterizing a first version of the application is generated on the temporary system when the upgrade becomes available. A selective access to the copy on the temporary system is enabled while preventing access to the first data-set on an original system. The first data-set on the original system is upgraded to form a second data-set characterizing a second version of the application, and a testing of the second data-set is performed. When a result of the testing indicates that the second data-set should be implemented, an access to the second data-set on the original system is enabled while preventing access to the copy on the temporary system. Related methods, apparatus, systems, techniques and articles are also described. | 09-12-2013 |
20130290259 | SHADOW SYSTEM MIRRORING OF AN ORIGINAL SYSTEM DURING UPTIME OF AN UPGRADE PROCESS - A computer system includes a shadow system including a shadow program database having a structure defining an upgrade to a structure of an original program database on an original system, and having data defining an upgrade to data of the original program database on the original system. The computer system includes a database replicator configured to perform at least one transfer of data from a portion of the original user database into the structure of the shadow user database during an uptime of the original system and configured to perform a final transfer of data from the portion of the original user database into the structure of the shadow user database during a downtime of the original system, and an upgrade transfer module configured to replace the portion of the original user database with the shadow user database after the final transfer of data has been performed. | 10-31-2013 |
Patent application number | Description | Published |
20120258254 | Methods For Providing High-Surface Area Coatings To Mitigate Hydrocarbon Deposits On Engine And Powertrain Components - Provided are methods related to preventing hydrocarbon residue buildup in engine, exhaust-gas-system or powertrain components. Prevention is achieved by applying coating of a mixed metal oxide via a suspension plasma spray. | 10-11-2012 |
20120258266 | Coatings For Engine And Powertrain Components To Prevent Buildup Of Deposits - Provided are methods and components related to preventing hydrocarbon residue buildup in engine components. Prevention is achieved using a coating of a mixed metal oxide. The mixed metal oxide comprises a mixture of at least two of Gd, Al, Ti, Ce, Pr, La, Y, Nd, and Mn. The coating can also contain amounts of precious metals, eg. Pt, Pd, Rh and/or Au. | 10-11-2012 |
20120301720 | METAL ISLAND COATINGS AND METHOD FOR SYNTHESIS - The present invention relates to methods for synthesis of metallic island coatings with tunable island coverage and morphology on a variety of substrates. Particularly, the present invention relates to substrates coated with one or more metal islands and the use of said island-coated substrates. | 11-29-2012 |
20130022655 | Metal Oxide Nanocomposites for UV Protection - The present invention relates to a method of protecting a substrate against ultraviolet (UV) irradiation by applying to the substrate metal oxide nanocomposite particles showing at the same time high transmittance of visible light and high absorbance of UV light. | 01-24-2013 |