Patents by Inventor Adrian Spalka

Adrian Spalka has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8522011
    Abstract: The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair.
    Type: Grant
    Filed: November 3, 2010
    Date of Patent: August 27, 2013
    Assignee: Compugroup Holding AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Patent number: 8516267
    Abstract: A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the method comprising the steps of: accessing an input value; calculating an asymmetric cryptographic key pair by applying a cryptographic one-way function to the input value, wherein the cryptographic key pair comprises a public key and a private key, wherein the cryptographic one-way function is an injective function; and outputting the public key for providing the access key.
    Type: Grant
    Filed: July 15, 2010
    Date of Patent: August 20, 2013
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Patent number: 8266435
    Abstract: The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: September 11, 2012
    Assignee: CompuGROUP Holding AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Patent number: 8195951
    Abstract: A computer-implemented method for providing authorization keys, where the method includes receiving a further asymmetrical, cryptographic key pair, where the further asymmetrical key pair is part of a key pair sequence, where the further asymmetrical key pair includes a further first and a further second authorization key; retrieving a ciphertext, where the ciphertext is associated with the key pair which immediately precedes the further key pair in the sequence of key pairs, where the ciphertext includes the initial first key encrypted with the second authorization key of the key pair which immediately precedes the further key pair in the sequence of key pairs; decrypting the initial first authorization key using the first authorization key of the key pair which immediately precedes the further key pair in the sequence of key pairs; generating a further ciphertext through encryption of the decrypted initial first authorization key using the second authorization key of the further key pair; and saving the fur
    Type: Grant
    Filed: September 18, 2009
    Date of Patent: June 5, 2012
    Assignee: CompuGroup Medical AG
    Inventor: Adrian Spalka
  • Publication number: 20120110645
    Abstract: The invention relates to a server system for providing at least one service. Said system having an interface for connecting a server to a user's computer, authentication means that are designed and provided for request personal identification data of a user who logs onto the server via the user computer and to permit the user computer access if authentication is successful, and a server protection system. The server protection system is designed and provides to compare additional user's computer specific identification data with identification data stored in advance on the server, after successful authentication by the authentication means, and to grant authorization to the user's computer to access the service or services depending on the comparison of the user's computer specific identification data. The invention also relates to a method for providing at least one service and the method for executing an application program.
    Type: Application
    Filed: September 9, 2009
    Publication date: May 3, 2012
    Inventors: Adrian Spalka, Jan Lehnhardt, Florian Rienhardt
  • Publication number: 20120087494
    Abstract: The invention relates to a method for creating a second asymmetric cryptographic pair of keys (206), wherein a first private key (G0, 154) together with a first public key (O0, 126) forms a first asymmetric cryptographic pair of keys (K0, 218), wherein the method comprises the following steps: receiving a user identifier; calculating a second private key (G1), wherein a random value (z) and the user identifier are considered in the calculation; calculating a second public key (O1) from the second private key using an asymmetric cryptographic key creation method, wherein the second private key and the second public key form the second asymmetric cryptographic pair of keys (K1, 206); creating a first ciphertext (C_G0—O1, 212; 186) by encrypting the first private key (G0) with the second public key (O1); storing the first ciphertext (C_G0—O1, 212; 186).
    Type: Application
    Filed: March 4, 2010
    Publication date: April 12, 2012
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Publication number: 20120063594
    Abstract: The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first key pair is formed by a first private (G1) and a first public key (O1) and the second key pair is formed by a second private (G2) and a second public key (O2), wherein a first cipher (C_G2_O1) is allocated to the first and second key pair, wherein the first cipher is formed by an encryption of the second private key (G2) with the first public key (O1), having the following steps: adding a third asymmetrical cryptographic key pair (K3) to the set of key pairs, wherein the third key pair is formed by a third private (G3) and a third public key (O3); creating a second cipher (C_G3_O1) by encrypting the third private key (G3) with the first public key (O1); storing the second cipher (212; 186), wherein the set of key pairs has a directed graph structure.
    Type: Application
    Filed: March 4, 2010
    Publication date: March 15, 2012
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Publication number: 20120063592
    Abstract: An apparatus for encrypting data is provided. The apparatus has a means for symmetrically encrypting data and a means for encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. The means for encrypting the symmetrically encrypted data is designed such that a section of the bit string is used for encryption and successive encryption operations are carried out with varying sections of the bit string while the bit string remains unchanged.
    Type: Application
    Filed: September 14, 2010
    Publication date: March 15, 2012
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20120036368
    Abstract: A computer-implemented method for providing authorization keys, where the method includes receiving a further asymmetrical, cryptographic key pair, where the further asymmetrical key pair is part of a key pair sequence, where the further asymmetrical key pair includes a further first and a further second authorization key; retrieving a ciphertext, where the ciphertext is associated with the key pair which immediately precedes the further key pair in the sequence of key pairs, where the ciphertext includes the initial first key encrypted with the second authorization key of the key pair which immediately precedes the further key pair in the sequence of key pairs; decrypting the initial first authorization key using the first authorization key of the key pair which immediately precedes the further key pair in the sequence of key pairs; generating a further ciphertext through encryption of the decrypted initial first authorization key using the second authorization key of the further key pair; and saving the fur
    Type: Application
    Filed: September 18, 2009
    Publication date: February 9, 2012
    Applicant: CompuGroup Medical AG
    Inventor: Adrian Spalka
  • Publication number: 20110268269
    Abstract: The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym.
    Type: Application
    Filed: April 4, 2011
    Publication date: November 3, 2011
    Applicant: COMPUGROUP MEDICAL AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Patent number: 8024581
    Abstract: The invention relates to a method of generating a pseudonym, the method including accessing an input value and calculating a pseudonym by applying a cryptographic one-way function to the input value, where the cryptographic one-way function is an injective function. In alternative embodiments, the cryptographic one-way function is an embedding and/or randomizing function.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: September 20, 2011
    Assignee: CompuGROUP Medical AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110185188
    Abstract: The invention relates to a computer implemented method for analyzing data of a first user, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously in a database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising: receiving a set of rules, the set of rules describing data processing steps, receiving the identifier, retrieving the data assigned to the identifier from the database, analyzing the retrieved data by applying the set of rules, providing a result of the analysis.
    Type: Application
    Filed: December 15, 2010
    Publication date: July 28, 2011
    Applicant: COMPUGROUP MEDICAL AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110185177
    Abstract: The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair.
    Type: Application
    Filed: January 25, 2010
    Publication date: July 28, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110179286
    Abstract: The invention relates to a computer implemented method for performing cloud computing on data of a first user employing cloud components, the cloud components comprising a first database and a data processing component, wherein an asymmetric cryptographic key pair is associated with the first user, said asymmetric cryptographic key pair comprising a public key and a private key, the data being stored pseudonymously non-encrypted in the first database with the data being assigned to an identifier, wherein the identifier comprises the public key, the method comprising retrieving the data from the first database by the data processing component, wherein retrieving the data from the first database comprises receiving the identifier and retrieving the data assigned to the identifier from the first database, wherein the method further comprises processing the retrieved data by the data processing component and providing a result of the analysis.
    Type: Application
    Filed: December 15, 2010
    Publication date: July 21, 2011
    Applicant: COMPUGROUP MEDICAL AG
    Inventors: Adrian Spalka, Jan Lehnhardt, Frank Gotthardt
  • Publication number: 20110173455
    Abstract: A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key and a data record private key, wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts, wherein each of the user accounts has a user asymmetric key pair for encryption and decryption, wherein each user asymmetric key pair has a user public key and a user private key; wherein data is added to a data record by encrypting it with the data record public key; wherein access to the data record is granted to a user account by encrypting the data record private key with the public key of an asymmetric cryptographic key pair whose encrypted p
    Type: Application
    Filed: December 15, 2010
    Publication date: July 14, 2011
    Applicant: COMPUGROUP MEDICAL AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110154056
    Abstract: A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the method comprising the steps of: accessing an input value; calculating an asymmetric cryptographic key pair by applying a cryptographic one-way function to the input value, wherein the cryptographic key pair comprises a public key and a private key, wherein the cryptographic one-way function is an injective function; and outputting the public key for providing the access key.
    Type: Application
    Filed: July 15, 2010
    Publication date: June 23, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110154044
    Abstract: The invention relates to a computer implemented method for sending a message to a recipient user, wherein a recipient asymmetric cryptographic key pair is associated with the recipient user, said key pair comprising a public recipient key and a private recipient key, the method comprising sending the message to said recipient user with the recipient address to which the message is sent comprising the public recipient key.
    Type: Application
    Filed: November 3, 2010
    Publication date: June 23, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Publication number: 20110150212
    Abstract: The invention relates to a computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of: calculating a set of public keys, wherein the private key and each public key of the set of public keys form an asymmetric cryptographic key pair; and outputting the identifiers comprising the public keys.
    Type: Application
    Filed: November 3, 2010
    Publication date: June 23, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Publication number: 20110154025
    Abstract: The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair.
    Type: Application
    Filed: November 3, 2010
    Publication date: June 23, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lenhardt
  • Publication number: 20110154055
    Abstract: The invention relates to a method of generating a pseudonym, the method including accessing an input value and calculating a pseudonym by applying a cryptographic one-way function to the input value, where the cryptographic one-way function is an injective function.
    Type: Application
    Filed: March 26, 2010
    Publication date: June 23, 2011
    Applicant: COMPUGROUP HOLDING AG
    Inventors: Adrian Spalka, Jan Lehnhardt