Patents by Inventor Dirk Westhoff
Dirk Westhoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170297369Abstract: The present invention relates to a motor vehicle trailer with at least one rigid axle with at least one tubular element. The motor vehicle trailer is characterized in that the tubular element has a yield strength Rp0.2 of at least 600 MPa, a tensile strength Rm of at least 850 MPa, a breaking elongation A5 of at least 14% and the tubular element (10) consists of an air-hardening, mainly bainitic material. In addition, a chassis axle as well as the use of a material for a chassis axle is disclosed.Type: ApplicationFiled: April 14, 2017Publication date: October 19, 2017Inventors: Marco Walterfang, Jozef Balun, Dirk Westhoff
-
Patent number: 8510550Abstract: A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with each consisting of several sensor nodes, wherein within each cluster a sensor node acts as aggregator node to aggregate the sensed data of the rest of the sensor nodes of the cluster, and wherein always a pre-configurable number of neighbored clusters are combined to groups and the data aggregated within a cluster are stored by the aggregator node of the cluster itself and in addition by another aggregator node of a cluster of the respective group is characterized in that the data is encrypted with homomorphic methods before being stored persistently.Type: GrantFiled: June 26, 2006Date of Patent: August 13, 2013Assignee: NEC CorporationInventors: Dirk Westhoff, Joao Girao, Einar Mykletun
-
Patent number: 8295491Abstract: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.Type: GrantFiled: April 25, 2007Date of Patent: October 23, 2012Assignee: NEC Europe Ltd.Inventors: Frederik Armknecht, Joao Girao, Dirk Westhoff
-
Patent number: 8024573Abstract: A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.Type: GrantFiled: October 5, 2005Date of Patent: September 20, 2011Assignee: NEC CorporationInventors: Dirk Westhoff, Joao Girao
-
Publication number: 20110154016Abstract: A method for aggregating information values in a network, the network including trusted network nodes and untrusted network nodes, wherein a communication session is established by directing messages through the network along a network path from an originating network node (1) to a destination network node (3) thereby transiting hop-wise several intermediate network nodes (5, 7, 8, 9), wherein the information values are appended to the messages as per-hop information by network nodes (5, 7, 8, 9) along the network path, the appended information values being aggregated from hop to hop, is characterized in that the information values are encrypted before being appended to the messages, wherein the aggregation is performed on the encrypted information values.Type: ApplicationFiled: June 18, 2008Publication date: June 23, 2011Applicant: NEC EUROPE LTD.Inventors: Saverio Niccolini, Jan Seedorf, Dirk Westhoff, Lindsay Frost
-
Patent number: 7907548Abstract: A method for electing aggregator nodes in a network, wherein the network includes a plurality of sensor nodes to measure data, and at least one of the sensor nodes functioning as aggregator node to aggregate sensored data obtained by at least a subset of the sensor nodes, the network further including at least one sink node to collect data aggregated by the aggregator nodes, the method including: establishing pairwise secret keys between a current aggregator node and each sensor node of the subset of sensor nodes; at each of the sensor nodes of the subset, choosing a random number and encrypting the random number using the established key; providing a communication chain between the sensor nodes of the subset and summing the encrypted random numbers of all sensor nodes of the subset; and determining a new aggregator node on the basis of the resulting sum according to a predefined calculation scheme.Type: GrantFiled: October 6, 2006Date of Patent: March 15, 2011Assignee: NEC Europe Ltd.Inventors: Dirk Westhoff, Frederik Armknecht
-
Publication number: 20100135494Abstract: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each sensor node (Ni) encrypts its measured data with a key k and forwards the result towards the sink node (S), is characterized in that, in the context of a key distribution within the network (1), a master key K is chosen, and that the master key K is autonomously split up by the network (1) into individual keys ki to be used by the sensor nodes (Ni) for encrypting measured data, with the sum of all individual keys ki being equal to the master key K.Type: ApplicationFiled: April 25, 2007Publication date: June 3, 2010Applicant: NEC EUROPE, LTD.Inventors: Frederik Armknecht, Joao Girao, Dirk Westhoff
-
Publication number: 20100098090Abstract: A method for electing aggregator nodes in a network, wherein the network includes a plurality of sensor nodes to measure data, and at least one of the sensor nodes functioning as aggregator node to aggregate sensored data obtained by at least a subset of the sensor nodes, the network further including at least one sink node to collect data aggregated by the aggregator nodes, the method including: establishing pairwise secret keys between a current aggregator node and each sensor node of the subset of sensor nodes; at each of the sensor nodes of the subset, choosing a random number and encrypting the random number using the established key; providing a communication chain between the sensor nodes of the subset and summing the encrypted random numbers of all sensor nodes of the subset; and determining a new aggregator node on the basis of the resulting sum according to a predefined calculation scheme.Type: ApplicationFiled: October 6, 2006Publication date: April 22, 2010Applicant: NEC EUROPE LTD.Inventors: Dirk Westhoff, Frederik Armknecht
-
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network
Patent number: 7702905Abstract: In a method for distributing keys for encrypted data transmission in a sensor network, nodes store a subset of keys from a set of keys. A sink node triggers the key election procedure and sensor nodes choose from a locally broadcasted keyID list, with one key to be stored on each node. All other initially stored keys are subsequently deleted. The process is repeated until the edge of the network is reached. Such key predistribution is suitable for the encryption of reverse multicast traffic to the sink node which is the predominant traffic pattern in wireless sensor networks.Type: GrantFiled: November 14, 2005Date of Patent: April 20, 2010Assignee: NEC CorporationInventors: Joao Girao, Dirk Westhoff, Mithun Puthige Acharya -
Publication number: 20090282249Abstract: A method for establishing a secret key for a data transmission between communication partners in a network, in particular in a personal area network (PAN), or in a body area network (BAN), wherein one or several inefficient communication partners (B) in comparison to a strong, preferably central communication partner (A) of the network, have reduced power resources, is characterized through the following steps: the strong communication partner (A) transmits a plurality of data pairs, each comprising a possible key (Kj) and an identification (IDi), to the weak communication partner (B) in a concealed manner, the weak communication partner (B) randomly selects a data pair from the plurality of data pairs, reveals the concealment of the data pair and sends the respective identification (IDj) back to the strong communication partner (A), the strong communication partner (A) reconstructs the associated key (Kj) from the received identification (IDj), said key (Kj) then being used as a secret key for the data transType: ApplicationFiled: June 5, 2007Publication date: November 12, 2009Applicant: NEC EUROPE LTD.Inventors: Frederik Aamknecht, Dirk Westhoff
-
Patent number: 7609838Abstract: Method to transmit data in an ad hoc network or a sensor network with the network comprising a multitude of sensor nodes to sensor data, at least one aggregator node to aggregate the sensored data of at least a subset of the sensor nodes, and at least one sink node to collect the data of the aggregator node is characterized in—regarding a high level of security against attacks from outside while transmitting data, and regarding an economic energy consumption—that the sensored data is encrypted at the sensor nodes, that the encrypted data is transmitted to one of the aggregator nodes, that at the aggregator node an aggregation function is executed on the encrypted data, and that the result of the aggregation function is transmitted to the sink node and decrypted there.Type: GrantFiled: March 31, 2005Date of Patent: October 27, 2009Assignee: NEC CorporationInventors: Dirk Westhoff, Joao Girao
-
Patent number: 7343489Abstract: A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.Type: GrantFiled: October 25, 2002Date of Patent: March 11, 2008Assignee: NEC CorporationInventors: Dirk Westhoff, Bernd Lamparter
-
Publication number: 20070171050Abstract: A method for managing data in a preferably non real-time sensor network, wherein the network comprises a multitude of sensor nodes to sense data, wherein the network is divided into clusters with each consisting of several sensor nodes, wherein within each cluster a sensor node acts as aggregator node to aggregate the sensed data of the rest of the sensor nodes of the cluster, and wherein always a pre-configurable number of neighbored clusters are combined to groups and the data aggregated within a cluster are stored by the aggregator node of the cluster itself and in addition by another aggregator node of a cluster of the respective group is characterized in that the data is encrypted with homomorphic methods before being stored persistently.Type: ApplicationFiled: June 26, 2006Publication date: July 26, 2007Applicant: NEC CORPORATIONInventors: Dirk Westhoff, Joao Girao, Einar Mykletun
-
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network
Publication number: 20070078817Abstract: A method for distributing keys for encrypted data transmission in a preferably wireless sensor network. Initially nodes store a subset of keys from a set of keys. A powerful sink node located in the centre of the wireless sensor triggers the key election procedure and sensor nodes choose from a locally broadcasted key-ID list one key to be stored on each node. All other initially stored keys are subsequently deleted. The process is iteratively until the edge of the network is achieved. Such key pre-distribution suits for the encryption of reverse multicast traffic to the sink node which is the pre-dominant traffic pattern in wireless sensor networks.Type: ApplicationFiled: November 14, 2005Publication date: April 5, 2007Applicant: NEC CORPORATIONInventors: Joao Girao, Dirk Westhoff, Mithun Acharya -
Publication number: 20070067631Abstract: A method for authentication between at least two nodes within a network, preferably a wireless sensor network, is disclosed. The sending node computes a t-bit long hash value by using a hash function h. A transmission of possibly few additional data over the network is designed in such a way that from the sending node to the receiving node only t-k bits of the hash value are transferred as truncated hash value, whereby k is a fix but arbitrary natural number between 1 and t-1. The transmitted hash value is compared to a computed hash value at the receiving node.Type: ApplicationFiled: September 13, 2006Publication date: March 22, 2007Applicant: NEC CorporationInventor: Dirk Westhoff
-
Publication number: 20060075248Abstract: A method for authentication of elements of a group, especially for authentication of sensor nodes in a preferably wireless sensor network is disclosed. The group has one specific element—leading element—with which each of the group elements can exchange information and wherein the authentication of the group elements takes place with regard to the leading element. The leading element sends an authentication request to the group elements wherein the authentication request is the same for all the group elements. The group elements each send authentication responses—based on the authentication request—to the leading element, with the authentication responses being different for each group element.Type: ApplicationFiled: October 5, 2005Publication date: April 6, 2006Applicant: NEC CORPORATIONInventors: Dirk Westhoff, Joao Girao
-
Publication number: 20050251859Abstract: A method of monitoring and protecting a network against attacks from a public network, particularly from the Internet, where the network includes a firewall and an attack detection system on the protected side of the firewall, which inspects data packets passing the firewall and installs protective policies at the firewall in case of detecting data packets representing an attack. Regarding high flexibility and quick adaptability to changing attack situations, the method is characterized in that the firewall is configured by the attack detection system in such a way that the attack detection system or a system co-operating with the attack detection system is provided information about data packets representing an attack.Type: ApplicationFiled: March 31, 2005Publication date: November 10, 2005Applicant: NEC CORPORATIONInventors: Juergen Quittek, Martin Stiemerling, Dirk Westhoff
-
Publication number: 20050220101Abstract: A method of performing charging and rewarding processes in ad hoc networks with the ad hoc network showing a multitude of active nodes and with one node, which sends or receives packets, is charged costs and a node, which forwards packets within the ad hoc network, is rewarded, is characterized in that charging and rewarding data generated within the ad hoc network is transmitted via an access router to a component of the AAA (authentification, authorization, accounting) architecture for subsequent transmission and/or processing purposes.Type: ApplicationFiled: March 31, 2005Publication date: October 6, 2005Applicant: NEC CORPORATIONInventors: Dirk Westhoff, Bernd Lamparter, Joao Girao
-
Publication number: 20050220306Abstract: Method to transmit data in an ad hoc network or a sensor network with the network comprising a multitude of sensor nodes to sensor data, at least one aggregator node to aggregate the sensored data of at least a subset of the sensor nodes, and at least one sink node to collect the data of the aggregator node is characterized in—regarding a high level of security against attacks from outside while transmitting data, and regarding an economic energy consumption—that the sensored data is encrypted at the sensor nodes, that the encrypted data is transmitted to one of the aggregator nodes, that at the aggregator node an aggregation function is executed on the encrypted data, and that the result of the aggregation function is transmitted to the sink node and decrypted there.Type: ApplicationFiled: March 31, 2005Publication date: October 6, 2005Applicant: NEC CORPORATIONInventors: Dirk Westhoff, Joao Girao
-
Publication number: 20030093687Abstract: A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.Type: ApplicationFiled: October 25, 2002Publication date: May 15, 2003Inventors: Dirk Westhoff, Bernd Lamparter