Patents by Inventor Andreas Kopf
Andreas Kopf has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230084703Abstract: A sealing device for sealing a pipeline arrangement, a method for the production of a sealing device, and a pipeline system including a sealing device and a pipeline arrangement. The sealing device includes a seal and data medium assigned to the seal with electronic data memory to which seal specific information can be or is written.Type: ApplicationFiled: December 16, 2020Publication date: March 16, 2023Inventors: Reinhard Nowak, Julian Keser, René Thal, Stefan Mühlhans, Lars Steinke, Andreas Kopf
-
Patent number: 9235204Abstract: A method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure. A service certificate is required for establishing the secure connection, wherein a secure initial connection is first established to the automation environment by the service technician using a one-time password. With the initial connection, a service certificate required for establishing the secure connection to the component of the automation environment experiencing the failure is subsequently transmitted from the automation environment to the service technician. The secure connection from the service technician to the component experiencing the failure is then established by means of the service certificate. The invention further relates to an automation environment that is suitable for carrying out a method of said kind.Type: GrantFiled: August 28, 2008Date of Patent: January 12, 2016Assignee: Siemens AktiengesellschaftInventors: Steffen Fries, Andreas Köpf
-
Patent number: 8981935Abstract: In a method and a system (1) for providing target information of an event message for an event occurring at a tag reader (2), the target information is extracted from a signed digital certificate of a tag (4). The event is triggered at a tag reader (2) and can be evaluated by a target computer (6), for example a server. The method and system enhance reconfiguration flexibility and also increase security against manipulation.Type: GrantFiled: September 8, 2009Date of Patent: March 17, 2015Assignee: Siemens AktiengesellschaftInventors: Rainer Falk, Andreas Köpf, Hermann Seuschek
-
Publication number: 20150074423Abstract: The present embodiments disclose methods and devices for digitizing documents. The device includes a document-scanning device designed to digitize at least one document existing as a hard copy, and having a security device that is designed to protect the at least one digitize document against unauthorized access on the basis of an identifier that is only valid once.Type: ApplicationFiled: March 18, 2013Publication date: March 12, 2015Inventors: Florian Kreitmaier, Andreas Köpf
-
Publication number: 20150033009Abstract: The invention relates to a method for authenticating a user by an application by means of a challenge-response method. In this case, the challenge (5) is displayed in the form of a barcode on a display (6) and is transmitted to a communication device (3) associated with the user. The determined response (8) is input by the user at a user interface (10) of the application.Type: ApplicationFiled: February 6, 2013Publication date: January 29, 2015Inventor: Andreas Köpf
-
Patent number: 8933780Abstract: In a system (1) for transmitting RFID identifiers, which can be read from RFID tags (4), to an authentication server (6), at least one RFID protocol message, which is encoded in authentication messages, can be transmitted from an RFID reading unit (2A) to the authentication server (6).Type: GrantFiled: February 14, 2008Date of Patent: January 13, 2015Assignee: Siemens AktiengesellschaftInventors: Rainer Falk, Florian Kohlmayer, Andreas Köpf
-
Patent number: 8890652Abstract: In a method for the access control to an automation unit (01), access rights predetermined by the access control are dependant on the operating state of the automation unit (01), wherein at least during an emergency, expanded access rights in relation to normal operation are granted independently of the access rights during normal operation.Type: GrantFiled: August 28, 2008Date of Patent: November 18, 2014Assignee: Siemens AktiengesellschaftInventors: Rainer Falk, Florian Kohlmayer, Andreas Köpf
-
Patent number: 8556739Abstract: A main shaft for a transmission or a countershaft for a transmission shall be constructed in an especially light-weight manner. The transmission of high torques, such as is the case for the main shaft or countershaft for a transmission, is problematic when the base body of the shaft consists of a fiber composite material. A metal element (20, 22) is now laminated into the base body, and a gearwheel (28, 30) can then be connected to this metal element (20, 22) in a force-fit manner, so that high torques can be transmitted.Type: GrantFiled: September 9, 2008Date of Patent: October 15, 2013Assignee: Daimler AGInventors: Andreas Kopf, Alexander Weidler
-
Patent number: 8320905Abstract: The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data.Type: GrantFiled: February 6, 2009Date of Patent: November 27, 2012Assignee: Siemens Enterprise Communications GmbH & Co. KGInventors: Kai Fischer, Steffen Fries, Andreas Köpf
-
Patent number: 8224852Abstract: In a method for protecting at least parts of product data, which are stored on at least one server and/or in at least one database and associated with a product identified by an RFID tag, from unauthorized access, an authentication and authorization check of an accessing party is performed upon access to a server and/or database, additionally proof being required upon access that the product is located within the discretionary area of the accessing party, the proof being provided by the RFID tag upon detection by an RFID reader by an access token in the form of a data structure, by which the RFID tag authorizes the accessing party to access at least parts of the product data associated with the product identified by the RFID tag, and stored on the server and/or in the database, wherein the product data can be queried and/or changed depending on the application.Type: GrantFiled: September 16, 2008Date of Patent: July 17, 2012Assignee: Siemens AktiengesellschaftInventors: Rainer Falk, Florian Kohlmayer, Andreas Köpf
-
Publication number: 20120144190Abstract: A digital certificate is configured to confirm the association of a public key assigned to a device as the owner of the public key to the device. The digital certificate further has an additional digital certificate, the additional digital certificate being a certificate of an additional device configured to digitally sign the digital certificate of the device. The certification process can be improved, wherein particularly the verification of digital certificates is improved. The various embodiments are particularly useful for applications where a secure communication of information or data is desired and/or should be made possible.Type: ApplicationFiled: May 3, 2010Publication date: June 7, 2012Inventors: Michael Braun, Andreas Köpf
-
Publication number: 20110248852Abstract: In a method and a system (1) for providing target information of an event message for an event occurring at a tag reader (2), the target information is extracted from a signed digital certificate of a tag (4). The event is triggered at a tag reader (2) and can be evaluated by a target computer (6), for example a server. The method and system enhance reconfiguration flexibility and also increase security against manipulation.Type: ApplicationFiled: September 8, 2009Publication date: October 13, 2011Inventors: Rainer Falk, Andreas Köpf, Hermann Seuschek
-
Publication number: 20110014895Abstract: The invention relates to a method for exchanging data between a mobile telephone and a fixed line telephone. According to the invention, a mobile telephone equipped with Near Field Communication (NFC) technology and a fixed line telephone that is also equipped with NFC technology are initially placed in a reception range, subsequently the mobile telephone and the fixed line telephone are coupled by means of the NFC technology, and then data is transmitted between the mobile telephone and the fixed line telephone by means of the NFC technology. Said coupling occurs when the mobile telephone and the fixed line telephone are authenticated, and two different NFC technologies are used for the authentication of the mobile telephone and the fixed line telephone, and the subsequent transmission of data.Type: ApplicationFiled: February 6, 2009Publication date: January 20, 2011Inventors: Kai Fischer, Steffen Fries, Andreas Köpf
-
Publication number: 20100313259Abstract: A method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure. A service certificate is required for establishing the secure connection, wherein a secure initial connection is first established to the automation environment by the service technician using a one-time password. With the initial connection, a service certificate required for establishing the secure connection to the component of the automation environment experiencing the failure is subsequently transmitted from the automation environment to the service technician. The secure connection from the service technician to the component experiencing the failure is then established by means of the service certificate. The invention further relates to an automation environment that is suitable for carrying out a method of said kind.Type: ApplicationFiled: August 28, 2008Publication date: December 9, 2010Applicant: Siemens AGInventors: Steffen Fries, Andreas Köpf
-
Publication number: 20100307275Abstract: A main shaft for a transmission or a countershaft for a transmission shall be constructed in an especially light-weight manner. The transmission of high torques, such as is the case for the main shaft or countershaft for a transmission, is problematic when the base body of the shaft consists of a fiber composite material. A metal element (20, 22) is now laminated into the base body, and a gearwheel (28, 30) can then be connected to this metal element (20, 22) in a force-fit manner, so that high torques can be transmitted.Type: ApplicationFiled: September 9, 2008Publication date: December 9, 2010Applicant: DAIMLER AGInventors: Andreas Kopf, Alexander Weidler
-
Publication number: 20100201480Abstract: In a method for the access control to an automation unit (01), access rights predetermined by the access control are dependant on the operating state of the automation unit (01), wherein at least during an emergency, expanded access rights in relation to normal operation are granted independently of the access rights during normal operation.Type: ApplicationFiled: August 28, 2008Publication date: August 12, 2010Inventors: Rainer Falk, Florian Kohlmayer, Andreas Köpf
-
Publication number: 20100079237Abstract: In a system (1) for transmitting RFID identifiers, which can be read from RFID tags (4), to an authentication server (6), at least one RFID protocol message, which is encoded in authentication messages, can be transmitted from an RFID reading unit (2A) to the authentication server (6).Type: ApplicationFiled: February 14, 2008Publication date: April 1, 2010Inventors: Rainer Falk, Florian Kohlmayer, Andreas Köpf
-
Publication number: 20020089985Abstract: An access control unit to interface one ATM core network and at least one bidirectional access network is provided, which includes means to perform ATM signalling and resource management to provide dynamically adjustable ATM switched virtual connections (SVC) for subscribers connected to the access network. The central access control unit processes ATM signalling and resource management to enable e.g. switched virtual connection over HFC. During the ATM signalling phase the applications negotiate the required resources which the central access control unit of HFC extracts. The central access control unit has the ability to allow or reject a connection (SVC) setup. As soon as the a new SVC is established the access control unit performs on the ATM layer the installation of the negotiated ATM connection values (VPI (virtual path identifier), VCI (virtual channel identifier), . . . ) at the different involved HFC network elements.Type: ApplicationFiled: October 16, 2001Publication date: July 11, 2002Applicant: ALCATELInventors: Stefan Wahl, Andreas Kopf, Wolfram Seibold
-
Publication number: 20020052956Abstract: In a communications system the allocation of available resources is done by means of time frames of variable length. Adaptive reserving of resources is carried out in cycles. Calculation of the current time frame length is based, for example, on the current amount of traffic. In a communications system with low traffic volume short time frames are used for short access delays and short access times. In a communications system with high traffic volume long time frames are used taking into account a predetermined maximum time frame length, in order on the one hand to increase fairness and on the other hand to increase the system performance. A resources allocating or assigning algorithm is used, which carries out dynamic allocation or assignment of resources by suitable choice of time frame lengths. A time slot of a predetermined length, for example, acts as basic unit.Type: ApplicationFiled: October 26, 2001Publication date: May 2, 2002Applicant: ALCATELInventors: Wolfram Seibold, Stefan Wahl, Andreas Kopf