Patents by Inventor Erik-Oliver Blass
Erik-Oliver Blass has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230311593Abstract: A method of configuring a network of tire monitoring devices using an untrusted device is provided. An untrusted device transmits first configuration data to a first tire monitoring device, and then receives a first input verifying that the first configuration data has been loaded to the first tire monitoring device and matches expected first configuration data. The untrusted device transmits second configuration data to a second tire monitoring device, and receives a second input verifying that the second configuration data has been loaded to the second tire monitoring device and matches expected second configuration data. The untrusted device transmits a command initializing generation of a cryptographic parameter by the first tire monitoring device, and causes the cryptographic parameter to be exchanged with the second tire monitoring device such that secure future communication is established between the first and second tire monitoring devices.Type: ApplicationFiled: March 30, 2023Publication date: October 5, 2023Inventors: Andrew BILL, Stephan MARWEDEL, Christelle DUCHOSSOY, Erik-Oliver BLASS, Kevin STANLEY-ADAMS
-
Patent number: 11706201Abstract: A system and method for secure cloud computing. The cloud based processing system comprises a user interface, allowing a user to enter and edit data, a proxy server, and a cloud based processing server. The user interface sends data entered by a user to the proxy server, which sends the encrypted data to the cloud based processing server. The proxy server receives editing commands from the user interface, and sends those commands to the cloud based processing server along with the encrypted data. The cloud based processing server receives the encrypted data and editing commands, applies the editing commands to the encrypted data, and sends the edited encrypted data back to the proxy server.Type: GrantFiled: July 17, 2019Date of Patent: July 18, 2023Assignees: Airbus Defence and Space Limited, Airbus Defence and Space GmbHInventors: Patrick Francis, Simon Bourne, Erik Oliver Blass
-
Patent number: 11271743Abstract: Methods aiding in proving shuffles of re-encryptions of ciphertexts and a mixnet employing such methods. A method for compacting ciphertexts includes encrypting a plaintext using an asymmetric key encryption scheme for a ciphertext, dividing the ciphertext into partial ciphertexts, encrypting each of the partial ciphertexts using the asymmetric key encryption scheme to obtain re-encrypted partial ciphertexts, creating hash exponents from a digest of a cryptographic hash function taking the partial ciphertexts, the re-encrypted partial ciphertexts and arbitrary salt values as argument of the cryptographic hash function, calculating a compacted ciphertext by multiplying all of the partial ciphertexts exponentiated by a respective one of the plurality of hash exponents, and calculating a compacted re-encrypted ciphertext by multiplying all of the re-encrypted partial ciphertexts exponentiated by a respective one of the hash exponents.Type: GrantFiled: October 1, 2018Date of Patent: March 8, 2022Assignee: Airbus Defence and Space GmbHInventors: Erik-Oliver Blass, Guevara Noubir
-
Patent number: 11106549Abstract: Secure logging systems and methods using cryptography and/or encryption with crash recovery. In some embodiments, the secure logging system includes an initialization module to initialize cells of a logging database, including inserting a pseudorandom number into each cell of the logging database. In some embodiments, the secure logging system includes an addition module to encrypt new log messages and add them to the logging database in a given number of pseudorandom cells of the logging database. In some embodiments, the secure logging system includes a listing module to determine where in the logging database the log message was stored and then to decrypt the encrypted log messages. These systems and methods improve computer related technology including by improving crash reconstruction, root cause analysis, network systems security, and logging system encryption and security.Type: GrantFiled: February 18, 2019Date of Patent: August 31, 2021Assignees: Airbus Defence and Space GmbH, Northeastern UniversityInventors: Erik-Oliver Blass, Guevara Noubir
-
Publication number: 20200264958Abstract: Secure logging systems and methods using cryptography and/or encryption with crash recovery. In some embodiments, the secure logging system includes an initialization module to initialize cells of a logging database, including inserting a pseudorandom number into each cell of the logging database. In some embodiments, the secure logging system includes an addition module to encrypt new log messages and add them to the logging database in a given number of pseudorandom cells of the logging database. In some embodiments, the secure logging system includes a listing module to determine where in the logging database the log message was stored and then to decrypt the encrypted log messages. These systems and methods improve computer related technology including by improving crash reconstruction, root cause analysis, network systems security, and logging system encryption and security.Type: ApplicationFiled: February 18, 2019Publication date: August 20, 2020Inventors: Erik-Oliver BLASS, Guevara NOUBIR
-
Publication number: 20200067908Abstract: A logging device configured to store log messages, includes a storage device having a plurality of log entry locations which can be ordered as a sequence, an encryption device configured to generate the encrypted log messages from log messages, an authentication code generator configured to generate an authentication code from the encrypted log message, a key evolving device, a state storage device configured to store state variables for use by the encryption device, the authentication code generator and/or the key evolving device. Furthermore, a verification device configured to verify log entries stored in log entry locations of the storage device is also described. A method for storing log entries in log entry locations of a storage device of a logging device as well as to a method for verifying the integrity of log entries stored in log entry locations of a storage device is also described.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Applicant: Airbus Defence and Space GmbHInventor: Erik-Oliver Blass
-
Publication number: 20200028835Abstract: A system and method for secure cloud computing. The cloud based processing system comprises a user interface, allowing a user to enter and edit data, a proxy server, and a cloud based processing server. The user interface sends data entered by a user to the proxy server, which sends the encrypted data to the cloud based processing server. The proxy server receives editing commands from the user interface, and sends those commands to the cloud based processing server along with the encrypted data. The cloud based processing server receives the encrypted data and editing commands, applies the editing commands to the encrypted data, and sends the edited encrypted data back to the proxy server.Type: ApplicationFiled: July 17, 2019Publication date: January 23, 2020Inventors: Patrick FRANCIS, Simon BOURNE, Erik Oliver Blass
-
Patent number: 10511588Abstract: A logging device configured to store log messages, includes a storage device having a plurality of log entry locations which can be ordered as a sequence, an encryption device configured to generate the encrypted log messages from log messages, an authentication code generator configured to generate an authentication code from the encrypted log message, a key evolving device, a state storage device configured to store state variables for use by the encryption device, the authentication code generator and/or the key evolving device. Furthermore, a verification device configured to verify log entries stored in log entry locations of the storage device is also described. A method for storing log entries in log entry locations of a storage device of a logging device as well as to a method for verifying the integrity of log entries stored in log entry locations of a storage device is also described.Type: GrantFiled: October 26, 2016Date of Patent: December 17, 2019Assignee: Airbus Defence and Space GmbHInventor: Erik-Oliver Blass
-
Publication number: 20190109712Abstract: Methods aiding in proving shuffles of re-encryptions of ciphertexts and a mixnet employing such methods. A method for compacting ciphertexts includes encrypting a plaintext using an asymmetric key encryption scheme for a ciphertext, dividing the ciphertext into partial ciphertexts, encrypting each of the partial ciphertexts using the asymmetric key encryption scheme to obtain re-encrypted partial ciphertexts, creating hash exponents from a digest of a cryptographic hash function taking the partial ciphertexts, the re-encrypted partial ciphertexts and arbitrary salt values as argument of the cryptographic hash function, calculating a compacted ciphertext by multiplying all of the partial ciphertexts exponentiated by a respective one of the plurality of hash exponents, and calculating a compacted re-encrypted ciphertext by multiplying all of the re-encrypted partial ciphertexts exponentiated by a respective one of the hash exponents.Type: ApplicationFiled: October 1, 2018Publication date: April 11, 2019Inventors: Erik-Oliver BLASS, Guevara NOUBIR
-
Publication number: 20170126663Abstract: A logging device configured to store log messages, includes a storage device having a plurality of log entry locations which can be ordered as a sequence, an encryption device configured to generate the encrypted log messages from log messages, an authentication code generator configured to generate an authentication code from the encrypted log message, a key evolving device, a state storage device configured to store state variables for use by the encryption device, the authentication code generator and/or the key evolving device. Furthermore, a verification device configured to verify log entries stored in log entry locations of the storage device is also described. A method for storing log entries in log entry locations of a storage device of a logging device as well as to a method for verifying the integrity of log entries stored in log entry locations of a storage device is also described.Type: ApplicationFiled: October 26, 2016Publication date: May 4, 2017Applicant: Airbus Defence and Space GmbHInventor: Erik-Oliver Blass
-
Publication number: 20080071900Abstract: A method of managing a communication network comprising a control plane and a network plane, the network comprising nodes and physical connections of the nodes, each of a plurality of nodes being a logical network device, supporting a control plane portion in the control plane and a network plane portion in the network plane, in which method, the control plane portions of the logical network devices form a logical network in a peer to peer fashion, and control data necessary for administering the communication network and/or for managing users of the communication network is contained in at least one database distributed between at least a plurality of control plane portions of the network devices forming the logical network.Type: ApplicationFiled: September 17, 2007Publication date: March 20, 2008Applicants: WAVESTORM, GROUPES DES ECOLES DES TELECOMMUNICATIONS ECOLE NATIONALE SUPERIEURE DES TELECOMMUNICATIONSInventors: Artur Hecker, Erik-Oliver Blass, Houda Labiod