Patents by Inventor Ben Smeets
Ben Smeets has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10990428Abstract: A method of verifying the integrity of a virtual machine in a cloud computing deployment comprises: creating a virtual machine image derived from a trusted virtual machine, wherein the trusted virtual machine has a Keyless Signature Infrastructure signature stored in a signature store; and verifying that a computation resource can be trusted. If it is verified that a computation resource can be trusted, the method further comprises: submitting the virtual machine image to the trusted computation resource; checking a signature of the virtual machine image against the stored signature of the trusted virtual machine; launching the virtual machine image on the trusted computation resource, and creating a Keyless Signature Infrastructure signature of the virtual machine image; and storing the signature of the virtual machine image in a signature store.Type: GrantFiled: July 3, 2015Date of Patent: April 27, 2021Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Harri Hakala, Ari Pietikäinen, Ben Smeets
-
Patent number: 10615961Abstract: A method and encryption node (300) for providing encryption of a message m according to a selected encryption scheme. A noise computation engine (300a) in the encryption node (300) computes (3:1) a noise factor F as a function of a predefined integer parameter n of the selected encryption scheme and a random number r. When the message m is received (3:3) from a client (302) for encryption, an encryption engine (300b) in the encryption node (300), encrypts (3:4) the message m by computing a cipher text c as e=gm·F mod n2, where g is another predefined integer parameter of the selected encryption scheme. The cipher text c is then delivered (3:5) as an encryption of the message m, e.g. to the client (302) or to a cloud of processing resources (304).Type: GrantFiled: June 2, 2015Date of Patent: April 7, 2020Assignee: TELEFONATIEBOLAGET LM ERICSSON (PUBL)Inventors: Bernard (Ben) Smeets, Christine Jost, Alexander Maximov
-
Patent number: 10511440Abstract: A device provides a one-time proof of knowledge about a one-time signing key to a server without revealing the one-time signing key by computing a hash as a hash function from the one-time signing key, and transmitting, to the server, the computed hash, an identity associated with the electronic device and a hash path of the hash. The server receives the message from the device and checks whether the hash corresponds to a one-time signing key for a root hash included in a public certificate associated with the identity, checks whether an index corresponding to the hash path from the one-time signing key to the root hash corresponds to a correct time slot, and determines it to be proven that the device is in possession of the correct one-time signing key when the checks are fulfilled.Type: GrantFiled: January 18, 2016Date of Patent: December 17, 2019Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)Inventors: Alexander Maximov, Martin Hell, Bernard Ben Smeets
-
Patent number: 10511441Abstract: A client provides a hash value that provides for a time-stamp for data upon verification, by deriving a one-time signing key, OTSK, of a OTSK hash chain by applying a time fraction hash tree splitting a time slot corresponding to an index into time fractions such that the time slot is divided into fractions according to the number of leafs of the time fraction hash tree, forming a signing request by applying the OTSK for the fraction for the data to calculate hash values, and transmitting the signing request comprising the hash values to a server of a signing authority. The server receives the signing request from the client, derives a time stamp for the data including a hash path of the time fraction hash tree as a sub-tree of hash tree of the OTSK, and transmits the time stamp for the data.Type: GrantFiled: January 18, 2016Date of Patent: December 17, 2019Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)Inventors: Alexander Maximov, Bernard Ben Smeets
-
Patent number: 10447479Abstract: A hash value provides for a time-stamp for a piece of data upon verification. Providing the hash value includes deriving one-time signing keys of signer's one-time signing key hash chain by a one-way function of a secret key of the signer and a function of an index of the one-time signing key, and providing the hash value for the piece of data by a hash function including the piece of data and the derived one-time signing key. An electronic device having a processor arranged to implement a functional module for deriving a one-time signing key and providing a hash value for a piece of data by a hash function including the piece of data and the derived one-time signing key is also disclosed. The functional module is arranged to perform the method. A computer program for implementing the method on the electronic device is also disclosed.Type: GrantFiled: January 8, 2016Date of Patent: October 15, 2019Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Alexander Maximov, Martin Hell, Bernard Ben Smeets
-
Patent number: 10389534Abstract: A server receives a client's signing request comprising a hash value of data, the hash value being formed using a time-forwarded one-time signing key that comprises a time-forwarded index The server queues the signing request, pushes the hash value to a signature infrastructure entity at the time-forwarded time, and receives a time stamp in return. A client obtains a time stamp for each piece of a stream of pieces of data by collecting the pieces of data and deriving one-time signing keys of a one-time signing key hash chain, forming a stream of signing requests for the pieces of data by applying the one-time signing keys with time-forwarded indices for the respective piece of data to calculate hash values of the respective pieces of data, and transmitting the stream of signing requests comprising the hash values to a server for deriving time stamps for the pieces of data, respectively.Type: GrantFiled: January 18, 2016Date of Patent: August 20, 2019Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (publ)Inventors: Alexander Maximov, Bernard Ben Smeets
-
Patent number: 9055427Abstract: A method of updating/recovering a configuration parameter of a mobile terminal having stored thereon a public key of a public-key cryptosystem and a current terminal identifier, the method comprising determining an updated configuration parameter by an update/recovery server in response to a received current terminal identifier from the mobile terminal; generating an update/recovery data package by a central signing server, the update/recovery data package including the current terminal identifier, the updated configuration parameter, and a digital signature based on a private key, where the digital signature is verifiable by said public key; storing the current terminal identifier and the updated configuration parameter by the central signing server; sending the update/recovery data package by the update/recovery server to the mobile terminal causing the mobile terminal to verify the received update/recovery data package and to store the! updated configuration parameter of the verified update/recovery data pType: GrantFiled: October 12, 2005Date of Patent: June 9, 2015Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Christian Gehrmann, Ben Smeets
-
Patent number: 8880898Abstract: A method of maintaining a version counter indicative of a version of memory content stored in a processing device. The method comprises selectively operating the device in a first or second mode. Access to the first mode is limited to authorized users and controlled separately from access to the second mode. In the first mode at least an initial integrity protection value is generated for cryptographically protecting an initial counter value of said version counter during operation of the processing device in the second mode; wherein the initial counter value is selected from a sequence of counter values, and the initial integrity protection value is stored as a current integrity protection value in a storage medium. In the second mode, a current counter value is incremented to a subsequent counter value; wherein incrementing includes removing the current integrity protection value from said storage medium.Type: GrantFiled: April 18, 2007Date of Patent: November 4, 2014Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventor: Ben Smeets
-
Publication number: 20120131348Abstract: A method for obtaining a digital signature is disclosed. Upon receipt of request for a digital signature within a customer computer, a Mobile electronic transaction proxy within the customer PC notifies a web browser of the request for the digital signature and assists in obtaining a digital signature on a data string included within the request. After the digital signature is obtained, the data string along with an appended digital signature is transmitted back to a requesting party.Type: ApplicationFiled: February 1, 2012Publication date: May 24, 2012Inventors: Janez Skubic, Paul Dent, Ben Smeets, Stefan Andersson, Mikael Nilsson, Helena Lindskog
-
Publication number: 20080107269Abstract: A method of updating/recovering a configuration parameter of a mobile terminal having stored thereon a public key of a public-key cryptosystem and a current terminal identifier, the method comprising determining an updated configuration parameter by an update/recovery server in response to a received current terminal identifier from the mobile terminal; generating an update/recovery data package by a central signing server, the update/recovery data package including the current terminal identifier, the updated configuration parameter, and a digital signature based on a private key, where the digital signature is verifiable by said public key; storing the current terminal identifier and the updated configuration parameter by the central signing server; sending the update/recovery data package by the update/recovery server to the mobile terminal causing the mobile terminal to verify the received update/recovery data package and to store the updated configuration parameter of the verified update/recovery data paType: ApplicationFiled: October 12, 2005Publication date: May 8, 2008Inventors: Christian Gehrmann, Ben Smeets
-
Publication number: 20060242216Abstract: An electrical device for generating a multi-rate pseudo random noise (PN) sequence. A sequence generator is adapted to output a plurality of sequence values based on a step control signal (St). A selection system is adapted to select one of a plurality of sequence values based on a select value (Mt). A step control is adapted to provide the step control signal (St). Also disclosed is a method of generating a multi-rate PN sequence.Type: ApplicationFiled: June 14, 2006Publication date: October 26, 2006Inventor: Ben Smeets
-
Patent number: 7113593Abstract: A method and apparatus for performing cryptographic computations employing recursive algorithms to accelerate multiplication and squaring operations. Products and squares of long integer values are recursively reduced to a combination of products and squares reduced-length integer values in a host processor. The reduced-length integer values are passed to a co-processor. The values may be randomly ordered to prevent disclosure of secret data.Type: GrantFiled: March 6, 2001Date of Patent: September 26, 2006Assignee: Ericsson Inc.Inventors: Paul W. Dent, Ben Smeets, William J. Croughwell, III
-
Patent number: 7089274Abstract: An electrical device for generating a multi-rate pseudo random noise (PN) sequence. A sequence generator is adapted to output a plurality of sequence values based on a step control signal (St). A selection system is adapted to select one of a plurality of sequence values based on a select value (Mt). A step control is adapted to provide the step control signal (St). Also disclosed is a method of generating a multi-rate PN sequence.Type: GrantFiled: December 20, 2000Date of Patent: August 8, 2006Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Ben Smeets
-
Patent number: 7043636Abstract: The integrity of a dynamic data object that comprises one or more dynamic data items is ensured by storing the dynamic data object and dynamic authorization data in a memory. The dynamic authorization data may, for example, be a count of how many failed attempts to gain authorization have previously been made, and this is modified at least whenever another failed attempt is made. Whenever the dynamic data object or the dynamic authorization data is changed, its corresponding hash value is recomputed and stored into the memory. The dynamic data object is considered authentic only if newly-generated values of the two hash signatures match those that were previously stored into the memory. Changes to the dynamic data object are permitted only after the user has executed passed an authorization procedure.Type: GrantFiled: September 14, 2001Date of Patent: May 9, 2006Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventor: Ben Smeets
-
Patent number: 7020456Abstract: A method of granting, to a user communications device, access to a service provided by a plurality of service communications devices where an access key code is generated during an initial communications session between the user communications device and one of the service communications devices. The established access key code is subsequently stored in the user communications device and made available to the service communications devices for use in subsequent communications sessions between the user communications device and any one of the service communications devices. The invention further relates to a communications system and a user communications device.Type: GrantFiled: December 7, 2001Date of Patent: March 28, 2006Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Ben Smeets, Christian Gehrmann, Allan Bøgeskov
-
Patent number: 6947560Abstract: The present invention includes a method and device for calculating an encryption key, K?c, for use in the initialization of an encryption algorithm. The present invention discloses a method for calculating the encryption key, K?c(x), by obtaining a ciphering key, Kc(x), determining a maximum ciphering key length, L, based on the requirements of the two devices wishing to communicate, and determining a maximum usable encryption key length, Lmax. The ciphering key, Kc(x), is then manipulated through an addition function or an exclusively-or function with a polynomial g1(x). The result is multiplied with a polynomial g2(x), which spreads the starting points of said encryption key, K?c(x). The encryption key is thus determined according to K?c(x)=g2(L)(x)[Kc(x) mod g1(L)(x)]. The method of calculating the encryption key, K?c, ensures that a maximum ciphering key length is not exceeded. In addition, the method provides new possible starting points each time a new encryption key, K?c, is generated.Type: GrantFiled: December 15, 1999Date of Patent: September 20, 2005Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Ben Smeets, Mattias Hansson, Joakim Persson
-
Patent number: 6857068Abstract: Device for processing data includes a processor for executing program routines, and a memory for storing program routines to be executed by the processor. Part of the memory includes a protected part from which data can be read but which is protected against being written into. The processor is arranged to necessarily execute a program routine stored in the protected part of the memory upon start-up.Type: GrantFiled: June 21, 2000Date of Patent: February 15, 2005Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Bernd Möller, Harro Osthoff, Ben Smeets, Kar-Fat Poon
-
Patent number: 6813625Abstract: A method and device for use, e.g., in a mobile telephone, for self-clocked controlled pseudo random noise (PN) sequence generation comprises a plurality of sequence generator units for outputting a plurality of sequence values (Zt) on the basis of a plurality of clock values (Ct), and step pattern generators for selecting a step pattern, comprising said plurality of clock values (Ct), from a plurality of possible step patterns on the basis of a step pattern select signal (Wt). Thus, a flexible and efficient self-clocked controlled pseudo random noise (PN) sequence generation is obtained.Type: GrantFiled: December 20, 2000Date of Patent: November 2, 2004Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventor: Ben Smeets
-
Patent number: 6769062Abstract: A method and system for performing cryptographic calculations on a bitstring using secret information. A cipher key is manipulated to obtain a modified cipher key. An indicator word is generated that corresponds to the modified cipher key and includes a plurality of indicator bits. A first product is computed with an insecure processor as a function of the bitstring and the modified cipher key. A second product is computed with a secure processor as a function of the bitstring and the indicator. A final product is then computed as a function of the first and second products.Type: GrantFiled: October 25, 2000Date of Patent: July 27, 2004Assignee: Ericsson Inc.Inventors: Ben Smeets, Michael Kornby, Paul W. Dent
-
Patent number: 6754824Abstract: A telecommunications system and method is disclosed for implementing a message authentication code (MAC) for transmitted digital information signals. Digital information signals typically include an error detecting code, such as a Cyclic Redundancy Check (CRC) code, to ensure reliable delivery of the information. In order to verify the identity of the sending node, the CRC code can be modulated by a sequence known only to the participating nodes. Thus, the CRC code not only provides an error detecting function, but also serves as a message authentication code.Type: GrantFiled: October 8, 1999Date of Patent: June 22, 2004Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Joakim Persson, Ben Smeets