Patents by Inventor Susanne Gudrun Wetzel

Susanne Gudrun Wetzel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6981157
    Abstract: Master and slave Bluetooth-enabled devices communicate with other by sending messages using a carrier frequency that is constantly hopping from one frequency to another. In the prior art, each frequency in the sequence of frequencies, known as a hopping sequence, is determined as a known function of the master's Bluetooth address (BD_ADDR) and a universal time parameter. A computer-strong eavesdropper who is listening to one or more frequency bands over a period of time and within range of a user's piconet could determine the BD_ADDR of the user's device by comparing a detected hopping sequence with the hopping sequence associated with each possible BD_ADDR. Once the BD_ADDR of a user's device is determined, the user's location can thereafter be tracked as he moves from location to location using that device.
    Type: Grant
    Filed: May 8, 2001
    Date of Patent: December 27, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel
  • Patent number: 6950937
    Abstract: An exponentiation operation or other computational task associated with a cryptographic protocol is performed in a secure distributed manner using multiple machines, e.g., a client device and multiple servers of a computer network. The computational task is transformed by an originator machine before being sent to one or more external servers for execution. The transformation may include replication and dependency operations to provide robustness to errors in the computations performed by the external servers, and blinding and permutation operations to provide privacy for secret information associated with the computational task. The transformed computational task is executed by the one or more external servers, and the results of the transformed computational task are transmitted back to the originator machine. The originator machine transforms the results of the transformed computational task in a manner which permits verification that the one or more results are appropriate results for a given input.
    Type: Grant
    Filed: May 30, 2001
    Date of Patent: September 27, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel
  • Patent number: 6901145
    Abstract: A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered.
    Type: Grant
    Filed: February 10, 2000
    Date of Patent: May 31, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Philip L. Bohannon, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter, Susanne Gudrun Wetzel
  • Patent number: 6574455
    Abstract: Rather than including a static network descriptor in messages transmitted between master and slave Bluetooth-enabled devices communicating on a piconet, which network descriptor is computed as a known function of the master's Bluetooth address (BD_ADDR), the network descriptor is changed each time a new session beings on one of the devices. This prevents an intentional eavesdropper, who may be in proximity to the piconet and who may be listening for and detecting the network descriptor included within these messages, from associating a detected network descriptor with a particular device of a user and thereafter using that network descriptor to track the location of the user who is carrying and using that device. The network descriptor, the channel access code (CAC), is changed each time a new session begins by computing it as a known function of a seed and the master's BD_ADDR, wherein the seed is a random number chosen at the beginning of each new session by the master.
    Type: Grant
    Filed: May 8, 2001
    Date of Patent: June 3, 2003
    Assignee: Lucent Technologies Inc.
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel
  • Publication number: 20030046547
    Abstract: An exponentiation operation or other computational task associated with a cryptographic protocol is performed in a secure distributed manner using multiple machines, e.g., a client device and multiple servers of a computer network. The computational task is transformed by an originator machine before being sent to one or more external servers for execution. The transformation may include replication and dependency operations to provide robustness to errors in the computations performed by the external servers, and blinding and permutation operations to provide privacy for secret information associated with the computational task. The transformed computational task is executed by the one or more external servers, and the results of the transformed computational task are transmitted back to the originator machine. The originator machine transforms the results of the transformed computational task in a manner which permits verification that the one or more results are appropriate results for a given input.
    Type: Application
    Filed: May 30, 2001
    Publication date: March 6, 2003
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel
  • Publication number: 20020044661
    Abstract: Rather than including a static network descriptor in messages transmitted between master and slave Bluetooth-enabled devices communicating on a piconet, which network descriptor is computed as a known function of the master's Bluetooth address (BD_ADDR), the network descriptor is changed each time a new session beings on one of the devices. This prevents an intentional eavesdropper, who may be in proximity to the piconet and who may be listening for and detecting the network descriptor included within these messages, from associating a detected network descriptor with a particular device of a user and thereafter using that network descriptor to track the location of the user who is carrying and using that device. The network descriptor, the channel access code (CAC), is changed each time a new session begins by computing it as a known function of a seed and the master—s BD_ADDR, wherein the seed is a random number chosen at the beginning of each new session by the master.
    Type: Application
    Filed: May 8, 2001
    Publication date: April 18, 2002
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel
  • Publication number: 20020025780
    Abstract: Rather than including a static network descriptor in messages transmitted between master and slave Bluetooth-enabled devices communicating on a piconet, which network descriptor is computed as a known function of the master's Bluetooth address (BD_ADDR), the network descriptor is changed each time a new session beings on one of the devices. This prevents an intentional eavesdropper, who may be in proximity to the piconet and who may be listening for and detecting the network descriptor included within these messages, from associating a detected network descriptor with a particular device of a user and thereafter using that network descriptor to track the location of the user who is carrying and using that device. The network descriptor, the channel access code (CAC), is changed each time a new session begins by computing it as a known function of a seed and the master's BD_ADDR, wherein the seed is a random number chosen at the beginning of each new session by the master.
    Type: Application
    Filed: May 8, 2001
    Publication date: February 28, 2002
    Inventors: Bjorn Markus Jakobsson, Susanne Gudrun Wetzel