Patents by Inventor Dirk Westhoff

Dirk Westhoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170297369
    Abstract: The present invention relates to a motor vehicle trailer with at least one rigid axle with at least one tubular element. The motor vehicle trailer is characterized in that the tubular element has a yield strength Rp0.2 of at least 600 MPa, a tensile strength Rm of at least 850 MPa, a breaking elongation A5 of at least 14% and the tubular element (10) consists of an air-hardening, mainly bainitic material. In addition, a chassis axle as well as the use of a material for a chassis axle is disclosed.
    Type: Application
    Filed: April 14, 2017
    Publication date: October 19, 2017
    Inventors: Marco Walterfang, Jozef Balun, Dirk Westhoff
  • Patent number: 8510550
    Abstract: A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with each consisting of several sensor nodes, wherein within each cluster a sensor node acts as aggregator node to aggregate the sensed data of the rest of the sensor nodes of the cluster, and wherein always a pre-configurable number of neighbored clusters are combined to groups and the data aggregated within a cluster are stored by the aggregator node of the cluster itself and in addition by another aggregator node of a cluster of the respective group is characterized in that the data is encrypted with homomorphic methods before being stored persistently.
    Type: Grant
    Filed: June 26, 2006
    Date of Patent: August 13, 2013
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Joao Girao, Einar Mykletun
  • Patent number: 8295491
    Abstract: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.
    Type: Grant
    Filed: April 25, 2007
    Date of Patent: October 23, 2012
    Assignee: NEC Europe Ltd.
    Inventors: Frederik Armknecht, Joao Girao, Dirk Westhoff
  • Patent number: 8024573
    Abstract: A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.
    Type: Grant
    Filed: October 5, 2005
    Date of Patent: September 20, 2011
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Joao Girao
  • Publication number: 20110154016
    Abstract: A method for aggregating information values in a network, the network including trusted network nodes and untrusted network nodes, wherein a communication session is established by directing messages through the network along a network path from an originating network node (1) to a destination network node (3) thereby transiting hop-wise several intermediate network nodes (5, 7, 8, 9), wherein the information values are appended to the messages as per-hop information by network nodes (5, 7, 8, 9) along the network path, the appended information values being aggregated from hop to hop, is characterized in that the information values are encrypted before being appended to the messages, wherein the aggregation is performed on the encrypted information values.
    Type: Application
    Filed: June 18, 2008
    Publication date: June 23, 2011
    Applicant: NEC EUROPE LTD.
    Inventors: Saverio Niccolini, Jan Seedorf, Dirk Westhoff, Lindsay Frost
  • Patent number: 7907548
    Abstract: A method for electing aggregator nodes in a network, wherein the network includes a plurality of sensor nodes to measure data, and at least one of the sensor nodes functioning as aggregator node to aggregate sensored data obtained by at least a subset of the sensor nodes, the network further including at least one sink node to collect data aggregated by the aggregator nodes, the method including: establishing pairwise secret keys between a current aggregator node and each sensor node of the subset of sensor nodes; at each of the sensor nodes of the subset, choosing a random number and encrypting the random number using the established key; providing a communication chain between the sensor nodes of the subset and summing the encrypted random numbers of all sensor nodes of the subset; and determining a new aggregator node on the basis of the resulting sum according to a predefined calculation scheme.
    Type: Grant
    Filed: October 6, 2006
    Date of Patent: March 15, 2011
    Assignee: NEC Europe Ltd.
    Inventors: Dirk Westhoff, Frederik Armknecht
  • Publication number: 20100135494
    Abstract: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.
    Type: Application
    Filed: April 25, 2007
    Publication date: June 3, 2010
    Applicant: NEC EUROPE, LTD.
    Inventors: Frederik Armknecht, Joao Girao, Dirk Westhoff
  • Publication number: 20100098090
    Abstract: A method for electing aggregator nodes in a network, wherein the network includes a plurality of sensor nodes to measure data, and at least one of the sensor nodes functioning as aggregator node to aggregate sensored data obtained by at least a subset of the sensor nodes, the network further including at least one sink node to collect data aggregated by the aggregator nodes, the method including: establishing pairwise secret keys between a current aggregator node and each sensor node of the subset of sensor nodes; at each of the sensor nodes of the subset, choosing a random number and encrypting the random number using the established key; providing a communication chain between the sensor nodes of the subset and summing the encrypted random numbers of all sensor nodes of the subset; and determining a new aggregator node on the basis of the resulting sum according to a predefined calculation scheme.
    Type: Application
    Filed: October 6, 2006
    Publication date: April 22, 2010
    Applicant: NEC EUROPE LTD.
    Inventors: Dirk Westhoff, Frederik Armknecht
  • Patent number: 7702905
    Abstract: In a method for distributing keys for encrypted data transmission in a sensor network, nodes store a subset of keys from a set of keys. A sink node triggers the key election procedure and sensor nodes choose from a locally broadcasted keyID list, with one key to be stored on each node. All other initially stored keys are subsequently deleted. The process is repeated until the edge of the network is reached. Such key predistribution is suitable for the encryption of reverse multicast traffic to the sink node which is the predominant traffic pattern in wireless sensor networks.
    Type: Grant
    Filed: November 14, 2005
    Date of Patent: April 20, 2010
    Assignee: NEC Corporation
    Inventors: Joao Girao, Dirk Westhoff, Mithun Puthige Acharya
  • Publication number: 20090282249
    Abstract: A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein one or several inefficient communication partners (B) in comparison to a strong, preferably central communication partner (A) of the network, have reduced power resources, is characterized through the following steps: the strong communication partner (A) transmits a plurality of data pairs, each comprising a possible key (Kj) and an identification (IDi), to the weak communication partner (B) in a concealed manner, the weak communication partner (B) randomly selects a data pair from the plurality of data pairs, reveals the concealment of the data pair and sends the respective identification (IDj) back to the strong communication partner (A), the strong communication partner (A) reconstructs the associated key (Kj) from the received identification (IDj), said key (Kj) then being used as a secret key for the data trans
    Type: Application
    Filed: June 5, 2007
    Publication date: November 12, 2009
    Applicant: NEC EUROPE LTD.
    Inventors: Frederik Aamknecht, Dirk Westhoff
  • Patent number: 7609838
    Abstract: Method to transmit data in an ad hoc network or a sensor network with the network comprising a multitude of sensor nodes to sensor data, at least one aggregator node to aggregate the sensored data of at least a subset of the sensor nodes, and at least one sink node to collect the data of the aggregator node is characterized in—regarding a high level of security against attacks from outside while transmitting data, and regarding an economic energy consumption—that the sensored data is encrypted at the sensor nodes, that the encrypted data is transmitted to one of the aggregator nodes, that at the aggregator node an aggregation function is executed on the encrypted data, and that the result of the aggregation function is transmitted to the sink node and decrypted there.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: October 27, 2009
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Joao Girao
  • Patent number: 7343489
    Abstract: A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.
    Type: Grant
    Filed: October 25, 2002
    Date of Patent: March 11, 2008
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Bernd Lamparter
  • Publication number: 20070171050
    Abstract: A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with each consisting of several sensor nodes, wherein within each cluster a sensor node acts as aggregator node to aggregate the sensed data of the rest of the sensor nodes of the cluster, and wherein always a pre-configurable number of neighbored clusters are combined to groups and the data aggregated within a cluster are stored by the aggregator node of the cluster itself and in addition by another aggregator node of a cluster of the respective group is characterized in that the data is encrypted with homomorphic methods before being stored persistently.
    Type: Application
    Filed: June 26, 2006
    Publication date: July 26, 2007
    Applicant: NEC CORPORATION
    Inventors: Dirk Westhoff, Joao Girao, Einar Mykletun
  • Publication number: 20070078817
    Abstract: A method for distributing keys for encrypted data transmission in a preferably wireless sensor network. Initially nodes store a subset of keys from a set of keys. A powerful sink node located in the centre of the wireless sensor triggers the key election procedure and sensor nodes choose from a locally broadcasted key-ID list one key to be stored on each node. All other initially stored keys are subsequently deleted. The process is iteratively until the edge of the network is achieved. Such key pre-distribution suits for the encryption of reverse multicast traffic to the sink node which is the pre-dominant traffic pattern in wireless sensor networks.
    Type: Application
    Filed: November 14, 2005
    Publication date: April 5, 2007
    Applicant: NEC CORPORATION
    Inventors: Joao Girao, Dirk Westhoff, Mithun Acharya
  • Publication number: 20070067631
    Abstract: A method for authentication between at least two nodes within a network, preferably a wireless sensor network, is disclosed. The sending node computes a t-bit long hash value by using a hash function h. A transmission of possibly few additional data over the network is designed in such a way that from the sending node to the receiving node only t-k bits of the hash value are transferred as truncated hash value, whereby k is a fix but arbitrary natural number between 1 and t-1. The transmitted hash value is compared to a computed hash value at the receiving node.
    Type: Application
    Filed: September 13, 2006
    Publication date: March 22, 2007
    Applicant: NEC Corporation
    Inventor: Dirk Westhoff
  • Publication number: 20060075248
    Abstract: A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.
    Type: Application
    Filed: October 5, 2005
    Publication date: April 6, 2006
    Applicant: NEC CORPORATION
    Inventors: Dirk Westhoff, Joao Girao
  • Publication number: 20050251859
    Abstract: A method of monitoring and protecting a network against attacks from a public network, particularly from the Internet, where the network includes a firewall and an attack detection system on the protected side of the firewall, which inspects data packets passing the firewall and installs protective policies at the firewall in case of detecting data packets representing an attack. Regarding high flexibility and quick adaptability to changing attack situations, the method is characterized in that the firewall is configured by the attack detection system in such a way that the attack detection system or a system co-operating with the attack detection system is provided information about data packets representing an attack.
    Type: Application
    Filed: March 31, 2005
    Publication date: November 10, 2005
    Applicant: NEC CORPORATION
    Inventors: Juergen Quittek, Martin Stiemerling, Dirk Westhoff
  • Publication number: 20050220101
    Abstract: A method of performing charging and rewarding processes in ad hoc networks with the ad hoc network showing a multitude of active nodes and with one node, which sends or receives packets, is charged costs and a node, which forwards packets within the ad hoc network, is rewarded, is characterized in that charging and rewarding data generated within the ad hoc network is transmitted via an access router to a component of the AAA (authentification, authorization, accounting) architecture for subsequent transmission and/or processing purposes.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 6, 2005
    Applicant: NEC CORPORATION
    Inventors: Dirk Westhoff, Bernd Lamparter, Joao Girao
  • Publication number: 20050220306
    Abstract: Method to transmit data in an ad hoc network or a sensor network with the network comprising a multitude of sensor nodes to sensor data, at least one aggregator node to aggregate the sensored data of at least a subset of the sensor nodes, and at least one sink node to collect the data of the aggregator node is characterized in—regarding a high level of security against attacks from outside while transmitting data, and regarding an economic energy consumption—that the sensored data is encrypted at the sensor nodes, that the encrypted data is transmitted to one of the aggregator nodes, that at the aggregator node an aggregation function is executed on the encrypted data, and that the result of the aggregation function is transmitted to the sink node and decrypted there.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 6, 2005
    Applicant: NEC CORPORATION
    Inventors: Dirk Westhoff, Joao Girao
  • Publication number: 20030093687
    Abstract: A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.
    Type: Application
    Filed: October 25, 2002
    Publication date: May 15, 2003
    Inventors: Dirk Westhoff, Bernd Lamparter