Patents by Inventor Alain Rollier
Alain Rollier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8341714Abstract: A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance configured to check said personal data; (c) a key record data memory configured to store at least one identity credential of an authentication server or of an application operator; (d) a transmitter and receiver unit configured to create a secure channel directly or indirectly to said authentication server or application operator to handle said key record relating to said authentication server or application operator, respectively; (e) a control unit configured to control the transmitter and receiver unit and the key record data memory in view of said handling, wherein the control unit is configured to perform one of: interpreting, deciphering, creating, checking, renewing, withdrawing and further key record handling actions. A method for authentication of a user using the security token is also disclosed.Type: GrantFiled: December 20, 2006Date of Patent: December 25, 2012Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 8266434Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: GrantFiled: May 10, 2010Date of Patent: September 11, 2012Inventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 8044947Abstract: A method for transmitting a coded information to a user via a graphical display. The method comprises the step of obtaining coded information by a scanner, which has to be positioned near the graphical display. The coded information is transmitted to a number of code points that are arranged in the direction of the fast refresh rate of the display.Type: GrantFiled: November 22, 2006Date of Patent: October 25, 2011Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20110107093Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: ApplicationFiled: May 10, 2010Publication date: May 5, 2011Applicant: Berner Fachhochschule Hochschule FurInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 7730308Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: GrantFiled: April 11, 2006Date of Patent: June 1, 2010Assignee: Axsionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20100066697Abstract: A pressure measurement device and a pressure measurement method are provided, the pressure to be measured being exerted by an object onto a contact area of the pressure measurement device. The pressure measurement device comprises an image acquisition module having the contact area, image data of an elastically structured subsurface of the object being recorded. The pressure is determined and output according to the color and/or brightness values of selectively recorded image data. In particular, the invention relates to methods and devices for coordinate acquisition, navigation input, authentication of a user and for command and text input, embodied on a basis of the pressure measurement device according to the invention.Type: ApplicationFiled: September 14, 2009Publication date: March 18, 2010Applicant: AXSionics AGInventors: Marcel Jacomet, Lorenz Müller, Josef Goette, Roger Cattin, Andreas Eicher, Alain Rollier
-
Publication number: 20090320118Abstract: A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance configured to check said personal data; (c) a key record data memory configured to store at least one identity credential of an authentication server or of an application operator; (d) a transmitter and receiver unit configured to create a secure channel directly or indirectly to said authentication server or application operator to handle said key record relating to said authentication server or application operator, respectively; (e) a control unit configured to control the transmitter and receiver unit and the key record data memory in view of said handling, wherein the control unit is configured to perform one of: interpreting, deciphering, creating, checking, renewing, withdrawing and further key record handling actions. A method for authentication of a user using the security token is also disclosed.Type: ApplicationFiled: December 20, 2006Publication date: December 24, 2009Applicant: AXSIONICS AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20090039156Abstract: Current electronic cards, such as, for example, proximity cards, smartcards for short, can transmit data to a reader unit over a range of up to about 10 cm. Boosters are used to improve convenience which in essence represent a wireless extension. This is however not adequate with regards to autonomy, function (as a result of termination) and for the differing applications. A method is disclosed in which the transmission of service-specific codes, stored on a number of different smartcards, to a portable device is carried out. The portable device then transmits one or more of the codes via several different communication connections so that access to a service can be activated. By providing services to the corresponding authorized communication connection a modular system is achieved, permitting multiple access for a user to services.Type: ApplicationFiled: December 19, 2006Publication date: February 12, 2009Applicants: AXISONICS AG, SIEMENS SCHWEIZ AGInventors: Willi Brandli, Bruno Wenger, Roger Cattin-Liebl, Marcel Jacomet, Lorenz Muller, Alain Rollier
-
Publication number: 20070133839Abstract: A method for transmitting a coded information to a user via a graphical display. The method comprises the step of obtaining coded information by a scanner, which has to be positioned near the graphical display. The coded information is transmitted to a number of code points that are arranged in the direction of the fast refresh rate of the display.Type: ApplicationFiled: November 22, 2006Publication date: June 14, 2007Applicants: BERNER FACHHOCHSCHULE TECHNIK UND INFORMATIK, AXSIONICS AGInventors: Lorenz Muller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20060230268Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: ApplicationFiled: April 11, 2006Publication date: October 12, 2006Applicants: Berner Fachhochschule Hochschule fur Technik und Architektur Biel, AXSionics AGInventors: Lorenz Muller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier