Patents Assigned to OLogN Technologies AG
-
Publication number: 20180048567Abstract: Methods and systems are provided for latency-oriented router. An incoming packet is received on a first interface. The type of the incoming packet is determined. Upon the detection that the incoming packet belongs to latency-critical traffic, the incoming packet is duplicated into one or more copies. Subsequently, the duplicated copies are sent to a second interface in a delayed fashion where the duplicated copies are spread over a time period. The duplicated copies are received and processed at the second interface.Type: ApplicationFiled: July 2, 2017Publication date: February 15, 2018Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Publication number: 20170366352Abstract: The systems, methods and apparatuses described herein provide a computing device that is configured to attest itself to a communication partner. In one aspect, the computing device may comprise a communication port configured to receive an attestation request from the communication partner, and an application-specific integrated circuit (ASIC). The ASIC may be configured to receive the attestation request, which may include a nonce. The ASIC may be further configured to generate a verification value, capture data representing a state of computation of the ASIC when the verification value is being generated, and send the verification value and captured data to the communication port to be transmitted back to the communication partner. The verification value may be a computation result of a predefined function taking the nonce as an initial value. In another aspect, the communication partner may be configured to attest the computing device using speed of computation attestation.Type: ApplicationFiled: June 28, 2017Publication date: December 21, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Patent number: 9848207Abstract: A system including a source display, externally updatable, an image compression algorithm database, a network connection, and a frame transfer engine. The algorithm database comprises a plurality of image compression algorithms. The frame transfer engine is configured to receive a plurality of updates made to the source display, store at least some of the updates in a queue, and select, based on a bandwidth of the network connection, a size of the update, and sizes and times of updates currently present in the queue, an image compression algorithm in the algorithm database for current transfer over the network connection.Type: GrantFiled: January 8, 2016Date of Patent: December 19, 2017Assignee: OLogN Technologies AGInventors: Sergey Ignatchenko, Dmitri Ligoum
-
Publication number: 20170346803Abstract: The methods, apparatuses and systems described herein provide a system for authenticating users, authorization or information during secure transactions. The system may include a transaction device requiring user authentication, a personal communication device, and a wearable authentication device that communicates with both of the other devices. In one aspect, the wearable authentication device may be configured to communicate with the transaction device requiring authentication and the personal communication device through one or more wireless communication technologies, wherein the wearable authentication device may be configured to act as an intermediary between the transaction device and the personal communication device to facilitate the exchange of at least one authentication information or transaction completion information between the personal communication device and the transaction device.Type: ApplicationFiled: June 26, 2017Publication date: November 30, 2017Applicant: OLogN Technologies AGInventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
-
Publication number: 20170346791Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes a secure zone for executing tasks. An apparatus according to the present disclosure may comprise a screen, a secure zone and an indicator operatively controlled by the secure zone. The secure zone may be configured to execute a task and to assume control over an output to the screen while the apparatus is operating in a secure mode and to transfer control over the output to the screen to a non-secure zone while the apparatus is operating in a non-secure mode.Type: ApplicationFiled: August 17, 2017Publication date: November 30, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Patent number: 9825991Abstract: The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor. The processor may be configured to generate a request, transmit the request through the communication link using the communication port and start counting time using the timer, receive a response via the communication port and stop the timer, receive authentication data via the communication port, authenticate the authentication data, compare the counted time with a predefined threshold, compare a first field within the request with a second field within the response and determine whether there is a relay attack.Type: GrantFiled: September 23, 2016Date of Patent: November 21, 2017Assignee: OLogN Technologies AGInventors: Dmytro Ivanchykhin, Sergey Ignatchenko
-
Publication number: 20170317838Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes secure time management. An apparatus according to the present disclosure may comprise a non-volatile storage to store a synchronization time and a processor. The processor may be configured to generate a request for a current time, transmit the request to a trusted timekeeper, receive a digitally signed response containing a current, real-world time from the trusted timekeeper, verify the digital signature of the response, verify that the response is received within a predefined time, compare a nonce in the request to a nonce in the response, determine that the current, real-world time received from the trusted timekeeper is within a range of a current time calculated at the apparatus and update the synchronization time with the current, real-world time in the response.Type: ApplicationFiled: May 15, 2017Publication date: November 2, 2017Applicant: OLogN Technologies AGInventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
-
Publication number: 20170310481Abstract: The systems, methods and apparatuses described herein provide a computing environment for authenticating a user. An apparatus according to the present disclosure may comprise a non-volatile storage, a user interface, and a password engine. The password engine is configured to retrieve two or more predetermined prompts from the non-volatile storage, present the two or more predetermined prompts on the user interface to a user in a random order, receive a first set of input(s) in response to the two or more predetermined prompts, create an encryption keyword from the received first set of input(s) according to an original order of the two or more predetermined prompts stored in the non-volatile storage, and use the encryption keyword to authenticate the user.Type: ApplicationFiled: May 15, 2017Publication date: October 26, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Patent number: 9742735Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes a secure zone for executing tasks. An apparatus according to the present disclosure may comprise a screen, a secure zone and an indicator operatively controlled by the secure zone. The secure zone may be configured to execute a task and to assume control over an output to the screen while the apparatus is operating in a secure mode and to transfer control over the output to the screen to a non-secure zone while the apparatus is operating in a non-secure mode.Type: GrantFiled: April 12, 2013Date of Patent: August 22, 2017Assignee: OLogN Technologies AGInventor: Sergey Ignatchenko
-
Publication number: 20170237772Abstract: The systems, methods and apparatuses described herein provide an apparatus configured for preventing relay attacks on a communication link between the apparatus and a communication partner. The apparatus may comprise a communication port, a timer and a processor. The processor may be configured to generate a request, transmit the request through the communication link using the communication port and start counting time using the timer, receive a response via the communication port and stop the timer, receive authentication data via the communication port, authenticate the authentication data, compare the counted time with a predefined threshold, compare a first field within the request with a second field within the response and determine whether there is a relay attack.Type: ApplicationFiled: September 23, 2016Publication date: August 17, 2017Applicant: OLogN Technologies AGInventors: Dmytro IVANCHYKHIN, Sergey IGNATCHENKO
-
Publication number: 20170201384Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages application specific identification of devices. An apparatus according to the present disclosure may comprise a non-volatile storage storing identifier (ID) base data and a processor. The processor may be configured to validate a certificate of an application being executed on the apparatus. The certificate may contain a code signer ID for a code signer of the application. The processor may further be configured to receive a request for a unique ID of the application, generate the unique ID from the code signer ID and the ID base data and return the generated unique ID.Type: ApplicationFiled: March 28, 2017Publication date: July 13, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Patent number: 9699159Abstract: The methods, apparatuses and systems described herein provide a system for authenticating users, authorization or information during secure transactions. The system may include a transaction device requiring user authentication, a personal communication device, and a wearable authentication device that communicates with both of the other devices. In one aspect, the wearable authentication device may be configured to communicate with the transaction device requiring authentication and the personal communication device through one or more wireless communication technologies, wherein the wearable authentication device may be configured to act as an intermediary between the transaction device and the personal communication device to facilitate the exchange of at least one authentication information or transaction completion information between the personal communication device and the transaction device.Type: GrantFiled: March 13, 2014Date of Patent: July 4, 2017Assignee: OLogN Technologies AGInventors: Sergey Ignatchenko, Dmytro Ivanchykhin
-
Patent number: 9698991Abstract: The systems, methods and apparatuses described herein provide a computing device that is configured to attest itself to a communication partner. In one aspect, the computing device may comprise a communication port configured to receive an attestation request from the communication partner, and an application-specific integrated circuit (ASIC). The ASIC may be configured to receive the attestation request, which may include a nonce. The ASIC may be further configured to generate a verification value, capture data representing a state of computation of the ASIC when the verification value is being generated, and send the verification value and captured data to the communication port to be transmitted back to the communication partner. The verification value may be a computation result of a predefined function taking the nonce as an initial value. In another aspect, the communication partner may be configured to attest the computing device using speed of computation attestation.Type: GrantFiled: March 11, 2014Date of Patent: July 4, 2017Assignee: OLogN Technologies AGInventor: Sergey Ignatchenko
-
Patent number: 9654297Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes secure time management. An apparatus according to the present disclosure may comprise a non-volatile storage to store a synchronization time and a processor. The processor may be configured to generate a request for a current time, transmit the request to a trusted timekeeper, receive a digitally signed response containing a current, real-world time from the trusted timekeeper, verify the digital signature of the response, verify that the response is received within a predefined time, compare a nonce in the request to a nonce in the response, determine that the current, real-world time received from the trusted timekeeper is within a range of a current time calculated at the apparatus and update the synchronization time with the current, real-world time in the response.Type: GrantFiled: May 6, 2016Date of Patent: May 16, 2017Assignee: OLogN Technologies AGInventors: Sergey Ignatchenko, Dmytro Ivanchykhin
-
Patent number: 9654292Abstract: The systems, methods and apparatuses described herein provide a computing environment for authenticating a user. An apparatus according to the present disclosure may comprise a non-volatile storage, a user interface, and a password engine. The password engine is configured to retrieve two or more predetermined prompts from the non-volatile storage, present the two or more predetermined prompts on the user interface to a user in a random order, receive a first set of input(s) in response to the two or more predetermined prompts, create an encryption keyword from the received first set of input(s) according to an original order of the two or more predetermined prompts stored in the non-volatile storage, and use the encryption keyword to authenticate the user.Type: GrantFiled: July 8, 2016Date of Patent: May 16, 2017Assignee: OLogN Technologies AGInventor: Sergey Ignatchenko
-
Publication number: 20170099569Abstract: The systems, methods and apparatuses described herein provide an apparatus configured for ensuring proximity of a communication partner. In one aspect, the apparatus may comprise a communication port and a processor. The processor may be configured to send a request to and receive a response from the communication partner via the communication port using modulated signals, measure a time period between sending and receiving using timings of modulated signals' symbols, and receive a secondary value from the communication partner. The secondary value may be verified to include at least a portion of the request and a portion of the response, and may have been sent with authenticating data to authenticate it. The time period may be compared with a predefined threshold calculated based on a predefined maximum allowed distance to the communication partner. In another aspect, an apparatus may be configured to ensure its proximity to a communication partner.Type: ApplicationFiled: October 10, 2016Publication date: April 6, 2017Applicant: OLogN Technologies AGInventors: Sergey IGNATCHENKO, Georgii IGNATCHENKO
-
Patent number: 9614836Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages application specific identification of devices. An apparatus according to the present disclosure may comprise a non-volatile storage storing identifier (ID) base data and a processor. The processor may be configured to validate a certificate of an application being executed on the apparatus. The certificate may contain a code signer ID for a code signer of the application. The processor may further be configured to receive a request for a unique ID of the application, generate the unique ID from the code signer ID and the ID base data and return the generated unique ID.Type: GrantFiled: September 8, 2015Date of Patent: April 4, 2017Assignee: OLogN Technologies AGInventor: Sergey Ignatchenko
-
Publication number: 20170078263Abstract: The systems, methods and apparatuses described herein provide a computing device configured for ensuring its proximity to a communication partner. In one aspect, the computing device may comprise a communication port and a processor. The processor may be configured to receive a request from the communication partner via the communication port, send a response to the request to the communication partner, generate a secondary value that includes a selected portion of the request and a selected portion of the response, generate authenticating data to authenticate the secondary value and send the generated secondary value and authenticating data to the communication partner via the communication port. In another aspect, the communication partner is configured to ensure proximity of the computing device.Type: ApplicationFiled: September 23, 2016Publication date: March 16, 2017Applicant: OLogN Technologies AGInventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
-
Publication number: 20170048071Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages private key storage. An apparatus according to the present disclosure may comprise a first non-volatile storage for storing a private root key for signing digital certificates, an input device for receiving manual input from an operator, a communication interface consisting of a one-way transmitter for transmitting information from the apparatus, and a processor. The processor may be configured to retrieve the private root key from the first non-volatile storage, receive information for a new digital certificate through the input device, generate the new digital certificate according to the received information, sign the new digital certificate using the private root key and transmit the new digital certificate from the apparatus using the transmitter.Type: ApplicationFiled: July 14, 2016Publication date: February 16, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO
-
Publication number: 20170048068Abstract: The systems, methods and apparatuses described herein provide a computing environment for authenticating a user. An apparatus according to the present disclosure may comprise a non-volatile storage, a user interface, and a password engine. The password engine is configured to retrieve two or more predetermined prompts from the non-volatile storage, present the two or more predetermined prompts on the user interface to a user in a random order, receive a first set of input(s) in response to the two or more predetermined prompts, create an encryption keyword from the received first set of input(s) according to an original order of the two or more predetermined prompts stored in the non-volatile storage, and use the encryption keyword to authenticate the user.Type: ApplicationFiled: July 8, 2016Publication date: February 16, 2017Applicant: OLogN Technologies AGInventor: Sergey IGNATCHENKO