Patents by Inventor Bozena Erdmann
Bozena Erdmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120066369Abstract: The present invention relates to a method for assigning a network address to a first node in a network comprising a plurality of second nodes, the method comprising the steps of: (a) assigning a stochastic address to the first node, (b) the first node transmitting an announcement message to a first control device, (c) the first control device checking whether the assigned network address is available, and (d) upon detecting that the assigned address is not available, the first control device transmitting a message requesting the change of the assigned addressType: ApplicationFiled: April 30, 2010Publication date: March 15, 2012Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Armand Michel Marie Lelkens, Bozena Erdmann
-
Publication number: 20120056728Abstract: The present invention relates to a method for controlling transmissions of a batteryless device (1) operating in a wireless network, the method comprising the following steps: the batteryless device (1) transmitting a frame including elements for controlling operation of a remote device (2a), or controlled device, the batteryless device being configured with a predetermined number of planned retransmissions of the control frame, the batteryless device sensing a change in the physical phenomenon induced by operation of the controlled device (2a), the batteryless device determining, based on the sensing step, the success or failure of the frame transmission, in case the transmission has succeeded, the batteryless device omitting further retransmissions of the control frame. The present invention also relates to a batteryless device carrying out such method.Type: ApplicationFiled: April 26, 2010Publication date: March 8, 2012Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Lelkens Michel Marie Lelkens, Ludovicus Marinus Gerardus Marie Tolhuizen, Wei Yuan
-
Publication number: 20120047361Abstract: The present invention relates to a method for securing communications between a resource-restricted device (1) and a receiving device (2) according to a wireless protocol, the method comprising the following steps: -storing, in a first part (11) of a non-volatile memory of the resource-restricted device (1), at least one encrypted payload, -storing, in a second part (12) of the non-volatile memory of the resource-restricted device (1), a pointer pointing towards an encrypted payload stored in the memory, -when a transmission is to be performed by the resource-restricted device (1), sending the encrypted payload indicated by the pointer, and storing, in the second part (12) of the non-volatile memory an updated pointer indicating a next-to-be-used encrypted payload stored in the memory.Type: ApplicationFiled: April 26, 2010Publication date: February 23, 2012Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Philip Andrew Rudland, Klaus Kursawe, Oscar Garcia Morchon
-
Publication number: 20110317838Abstract: A method for securing communications between a first node (N1) and a second node (N2) in a network (1) further comprising a management device (2) provided with root keying materials, the method comprising the following steps: the management device generating, based on root keying materials, a first node keying material shares comprising a number of sub-elements and the first node keying material shares being arranged for generating a first complete key, the management device selecting a subset of sub-elements of the first keying material shares, the number of sub-elements selected being less or equal than the total number of sub-elements of the first keying material shares, and the selected sub-elements forming a first node partial keying material shares or symmetric-key generation engine, the first node generating, based on the first node symmetric-key generation engine and on an identifier of the second node, a first key, used for securing communications with the second node.Type: ApplicationFiled: March 16, 2010Publication date: December 29, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann, Klaus Kursawe
-
Publication number: 20110304219Abstract: System for configuring and powering a wireless batteryless device, the system comprising: a wireless batteryless device (A) comprising: a built-in harvester (12) for harvesting energy from a first energy source, for example ambient energy, means for communicating wirelessly, and an external device (B) comprising: a second power source (16), means (17) for converting energy supplied by the second power source into energy suitable for being harvested in the harvester of the batteryless device, means (18) for wirelessly supplying the batteryless device with the converted energy via the built-in harvester, and means for communicating with the batteryless device. The invention also relates to an external device therefore, and a method for configuring and powering a batteryless device.Type: ApplicationFiled: February 23, 2010Publication date: December 15, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens, Willem Franke Pasveer, Eberhard Waffenschmidt, Achim Hilgers, Biju Kumar Sreedharan Nair
-
Publication number: 20110299451Abstract: The present invention relates to a method for wireless communication in a network comprising a resource-restricted end device (ZBLD), and at least one router device (R5), wherein the method comprises the following steps: the end device (ZBLD) transmitting a data frame to be forwarded to a destination device in the network, —the router device (R5) receiving the data frame, the router device associating a delay to the data frame and scheduling transmission of the frame after this delay, in case the router device listening that the data frame has been forwarded by another router device, cancelling the scheduled transmission of the data frame. The invention also relates to a router device and a network therefor.Type: ApplicationFiled: February 10, 2010Publication date: December 8, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens, Willem Franke Pasveer
-
Publication number: 20110294431Abstract: The present invention relates to method for wireless communicating in a network comprising a resource-constrained end device, and a first router device, wherein the method comprises the following steps:—the end device (ZBLD) sending a trigger for proxy search procedure,—the first router (R1) device receiving the trigger for proxy search procedure, the first router (R1) determining whether it fulfills conditions for acting as a router for the end device, and in case conditions are fulfilled, the first router appointing itself as a proxy router for the end device, for relaying communication between the end device and the rest of the network. The invention also relates to an end device, a router device, and net work therefor.Type: ApplicationFiled: February 10, 2010Publication date: December 1, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens, Willem Franke Pasveer
-
Publication number: 20110206201Abstract: The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share based on a root keying material and the method comprising the following steps: a) the first node receiving an identifier of the second node, b) the first node evaluating the first node keying material share at a second node's identifier, to generate the shared key, wherein the first node keying material share is a polynomial-based keying material over a finite field Fq and step b) comprises: b1) the first node applying a Horner's rule to factorize the first node keying material under the form of a combination of monomials, b2) the first node computing the result of each monomial operation by evaluating at a predetermined point a polynomial of degree r?1 with coefficients in a sub-field of Fq.Type: ApplicationFiled: October 8, 2009Publication date: August 25, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann
-
Publication number: 20110197064Abstract: The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network (1), comprising a node (D1) and a system management device (3), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of, and the node being provided with a node keying material share of degree of complexity ? derived from the root keying material.Type: ApplicationFiled: September 28, 2009Publication date: August 11, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann
-
Patent number: 7994723Abstract: A lighting system, a lighting unit and a method for controlling a plurality of light sources are described. A lighting system comprises an intelligent electrical current supply 12 to supply an electrical current with modulated command data. A plurality of lighting units 4, 6, 8 are connected in series to the current supply 12. Each lighting unit comprises a light source 22, a controllable bypassing switch 24 to selectively bypass the light source and a control unit 26. The control unit receives the modulated command data and controls the bypassing switch 24 accordingly.Type: GrantFiled: July 18, 2006Date of Patent: August 9, 2011Assignee: Koninklijke Philips Electronics N.V.Inventors: Wolfgang Otto Budde, Bozena Erdmann
-
Publication number: 20110119489Abstract: The invention relates to a network with a first node (102) comprising first pre-distributed keying material being assigned to the first node before the first node is connected to the network and a second node (104) comprising second pre-distributed keying material being assigned to the second node before the second node is connected to the network. The first node is configured to establish a secure communication (112) to the second node based on the first and second pre-distributed keying materials, without relying on a trust center (108). Pre-distributed keying materials can be replaced in a secure manner with post-deployed keying materials by the network trust center. Nodes can establish further secure communications based on post-deployed keying materials.Type: ApplicationFiled: September 4, 2008Publication date: May 19, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Heribert Baldus, Axel Guenther Huebner, Bozena Erdmann
-
Publication number: 20110113475Abstract: The invention relates to a node (100) for a network such as a wireless control network or the like. In this network, each node (100) comprises a identifier (104) and keying material (102), means for authenticating (112) the node's identifier based on the node's keying material and means for checking (114) the access control rights of the node in a distributed manner based on the node's multidimensional identity and access rights corresponding to the node's identity. Additionally, the invention allows the node to generate a common key with any other node in the first keying first network that can be used to enable further material identifier secure communications.Type: ApplicationFiled: September 4, 2008Publication date: May 12, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann, Axel Guenther Huebner, Heribert Baldus
-
Publication number: 20110069665Abstract: The invention describes a network interface unit (10) for a node (D, D 1, D 2, D 3, D a, D b, D c) in a wireless multi-hop network (WN) comprising a plurality of nodes (D, D 1, D 2, D 3, D a, D b, D c) that can be connected by means of network paths between source nodes and destination nodes, which network interface unit (10) comprises a multiple route request assembly module (11) for assembling a multiple route request message (MREQ) such that the multiple route request message (MREQ) of a source node (D) includes a plurality of addresses (41, 43, 45) for specific multiple destination nodes (D 1, D 2, D 3) to which network paths are to be established. The network interface (10) further comprises a transmit unit (12) for transmitting the message (MREQ) to other nodes (D 1, D 2, D 3, D a, D b, D c) in the wireless multi-hop network (WN).Type: ApplicationFiled: May 27, 2009Publication date: March 24, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens
-
Publication number: 20110063999Abstract: The invention describes a method of establishing a wireless multi-hop network (NW), in particular a ZigBee-type network, comprising a plurality of devices (0, 1, 2, . . . , 96) of a device arrangement (D), in which method devices (1, 2, 3, . . . , 96) establish a physical wireless connection to at least another device (0, 1, 11, 16, 17, 29, 30, 39, 48, 52, 53, 55, 64, 71, 73, 79, 88) of the network (NW) in a self-organizing process. In the self-organizing process a seeking device, intending to join the network, listens for beacon signals emitted by candidate parent devices already in the network comprising a network identifier and a device identifier of the emitting devices.Type: ApplicationFiled: May 27, 2009Publication date: March 17, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens
-
Publication number: 20110033054Abstract: The present invention relates to method for operating a trust centre for distributing key material to at least one radio station, comprising the steps of at the trust centre, dividing an identifier of the radio station, said identifier being a code word consisting a first number of bits, into a plurality of subidentifiers, and generating for each subidentifier, an keying material function selected out of a set of keying material functions on the basis of the considered subidentifier at the trust centre, transmitting to the radio station the identifier and the key material comprising the generated encryption functions.Type: ApplicationFiled: April 10, 2009Publication date: February 10, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia morchon, Mark Patrick Sillner, Bozena Erdmann
-
Publication number: 20110029778Abstract: The present invention relates to a method for identifying and/or, authenticating, and/or authorizing a first radio station in a radio network, comprising the steps of (a) at the first radio station, transmitting to a second radio station a first radio station identifier computed from a set of identity parameters based on the identity of the first radio station, comprising at least one identity parameter, (b) at the first radio station, transmitting at least one identity parameter from the set of identity parameters, (c) at the second radio station, comparing an authentication identifier computed on the basis of the transmitted identity parameter to the first radio station identifier for enabling a subsequent communication between the first and second radio stations.Type: ApplicationFiled: April 10, 2009Publication date: February 3, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann, Heribert Baldus
-
Publication number: 20110025469Abstract: The invention describes a method of commissioning a device arrangement comprising a number of devices (L1, L2, L3,) communicating with each other over a wireless networked control system (WN). This method comprises the steps of—reading a unique identifier (ID1, ID2, ID3) from an electronic identification tag (T) which is tagged to a device (L1, L2, L3) currently to be installed by means of a reading device (3) carried by an installer who is to install the device (L1, L2, L3), and—compiling an inventory (IV) of the installed devices (L1, L2, L3) using the read unique identifiers (ID1, ID2, ID3),—commissioning of the devices (L1, L2, L3) using the inventory (IV). The invention further describes a commissioning system (100) for commissioning such a device arrangement, a data logger and an installation tool (1) for installing devices (L1, L2, L3,) usable in such a commissioning system (100).Type: ApplicationFiled: April 9, 2009Publication date: February 3, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michael Marie Lelkens, Oliver Schreyer
-
Publication number: 20100325456Abstract: An average power consumption of receiving units (3,5,7) for controlling apparatuses (4,6,8) in response to operation control signals from transmitting units (2) may be reduced by introducing devices (1,21) for controlling the power consumption of the receiving units (3,5,7) in response to detections of states of the apparatuses (4,6,8). The devices (1) may comprise controllers (30) for controlling the power consumption in a wireless, non-wireless, physical and/or logical manner. The devices (1) may comprise monitors (33) for monitoring power consumption, currents and/or voltages at the receiving units (3,5,7) and/or the apparatuses (4,6,8).Type: ApplicationFiled: February 2, 2009Publication date: December 23, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Matthias Wendt, Bozena Erdmann, Carsten Deppe, Georg Sauerlaender
-
Publication number: 20100306748Abstract: The invention relates to a compiler and a method for compiling control logic for a plurality of devices of a networked control system, particularly to the automated assignment of control logic to devices. The invention provides with a compilation an automatic assignment procedure of an executable runtime code to devices of a networked control system. The assignment process of control logic to the devices may take various optimization criteria into account which include various distribution aspects, e.g. network resources or capabilities, such as available bandwidth or reliability of the network links, and device resources or capabilities, e.g. CPU, memory, power source or sleeping behaviour which may influence the observed behaviour of the devices, e.g. due to transmission delay or data packet loss.Type: ApplicationFiled: May 19, 2008Publication date: December 2, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Bozena Erdmann, Armand Michel Marie Lelkens, Oliver Schreyer
-
Publication number: 20100290622Abstract: A wireless system and method to control the cryptographic keying material that has been compromised in the network; exclude captured nodes from the network; and update compromised keying material in uncompromised devices are described. This system and method is useful in alpha-secure key distribution systems comprising a multitude of alpha-secure keying material shares to be controlled, revoked or updated.Type: ApplicationFiled: January 16, 2009Publication date: November 18, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Oscar Garcia Morchon, Bozena Erdmann, Martijn Maas