Patents by Inventor Franz-Josef Brücklmayr
Franz-Josef Brücklmayr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11080684Abstract: An example relates to a method for processing data an on smartcard comprising: (i) obtaining a message; (ii) searching for a rule in at least one file of the smartcard based on the message; and (iii) in case the rule was found, executing the rule.Type: GrantFiled: December 8, 2014Date of Patent: August 3, 2021Assignee: Infineon Technologies AGInventors: Bala Nagendra Raja Munjuluri, Franz-Josef Brücklmayr, Narasimha Kumar Vedala, Prakash Nayak
-
Publication number: 20160162881Abstract: An example relates to a method for processing data an on smartcard comprising: (i) obtaining a message; (ii) searching for a rule in at least one file of the smartcard based on the message; and (iii) in case the rule was found, executing the rule.Type: ApplicationFiled: December 8, 2014Publication date: June 9, 2016Inventors: Bala Nagendra Raja MUNJULURI, Franz-Josef BRUECKLMAYR, Narasimha Kumar VEDALA, Prakash NAYAK
-
Publication number: 20100182147Abstract: A security circuit comprising including a sensor located remotely from a central alarm handler and configured to sense an attack, and a phase-change memory cell coupled to and located remotely with the sensor, and configured to store an alarm event when the attack is sensed.Type: ApplicationFiled: January 20, 2009Publication date: July 22, 2010Applicant: INFINEON TECHNOLOGIES A.G.Inventors: Stefan Rueping, Thomas Nirschl, Ronald Kakoschke, Franz Josef Bruecklmayr, Markus Gail, Berndt Gammel, Gerd Dirscherl
-
Patent number: 7707631Abstract: A device for processing a program code with a plurality of subprogram calls, a subprogram corresponding to a subprogram call taking place by means of an allocation table, has a security module having the allocation table and a processor for using the program code. Access to the allocation table in the security module is restricted. The processor for using the program code is formed to retrieve, responsive to a request for subprogram data, using authorization information, subprogram data via the allocation table in the security module.Type: GrantFiled: November 29, 2005Date of Patent: April 27, 2010Assignee: Infineon Technologies AGInventors: Franz-Josef Bruecklmayr, Bernhard Lippmann
-
Patent number: 7269671Abstract: Systems, methods and computer program products partition a whole program when it does not fit in a device's memory. Minimal, safe program partitions are downloaded from the server on demand into the embedded device just before their execution. Code and data of the program are partitioned such that no information regarding the control flow behavior of the program is leaked out. Thus, by observing the program partitions that are downloaded from the server to the device, an attacker is unable to guess which branches are taken in the program and what is the control flow of the program. This property of tamper resistance is valuable for secure embedded devices, such as smart cards, which could hold sensitive information and/or carry out critical computation such as financial transactions.Type: GrantFiled: June 4, 2003Date of Patent: September 11, 2007Assignees: Georgia Tech Research Corporation, Infineon Technologies AGInventors: Santosh Pande, Tao Zhang, Andre Dos Santos, Franz Josef Bruecklmayr
-
Microprocessor circuit for data carriers and method for organizing access to data stored in a memory
Patent number: 7260690Abstract: A microprocessor circuit for organizing access to data or programs stored in a memory has a microprocessor, a memory for storing an operating system, and a memory for storing individual external programs. A plurality of memory areas with respective address spaces is provided in the memory for storing the external programs. Each address space is assigned an identifier. The identifier assigned to a memory area is loaded into a first auxiliary register prior to the addressing of the memory area and the identifier of the addressed memory area is loaded into a second auxiliary register. A comparison of the contents of the first and second auxiliary registers is performed. Furthermore, each address space of a memory area is assigned at least one bit sequence defining access rights, whereby code instructions and sensitive data can be protected against write accesses from other external programs.Type: GrantFiled: August 6, 2003Date of Patent: August 21, 2007Assignee: Infineon Technologies AGInventors: Franz-Josef Brücklmayr, Hans Friedinger, Holger Sedlak, Christian May -
Publication number: 20060123403Abstract: A device for processing a program code with a plurality of subprogram calls, a subprogram corresponding to a subprogram call taking place by means of an allocation table, has a security module having the allocation table and a processor for using the program code. Access to the allocation table in the security module is restricted. The processor for using the program code is formed to retrieve, responsive to a request for subprogram data, using authorization information, subprogram data via the allocation table in the security module.Type: ApplicationFiled: November 29, 2005Publication date: June 8, 2006Applicant: Infineon Technologies AGInventors: Franz-Josef Bruecklmayr, Bernhard Lippmann
-
Patent number: 6839287Abstract: In a method of storing a quantity of data in a target memory location, the data quantity is stored first in a non-volatile buffer memory location. It is then examined whether the data are successfully stored in the non-volatile buffer memory location. If the step of examining produces a positive result, the target memory location to which the predetermined quantity of data is to be written is cleared. After the step of clearing of the target memory location, the data are transferred from the non-volatile buffer memory location to the target memory location. To conclude the storage cycle, the non-volatile buffer memory location is then cleared so as to be available for a new storage operation. The effect achieved thereby is a secure and uncomplicated transfer of information from a source memory to the target memory.Type: GrantFiled: September 2, 2003Date of Patent: January 4, 2005Assignee: Infineon Technologies AGInventors: Franz-Josef Brücklmayr, Christian May, Wolfgang Pockrandt, Holger Sedlak
-
Publication number: 20040073898Abstract: Systems, methods and computer program products partition a whole program when it does not fit in a device's memory. Minimal, safe program partitions are downloaded from the server on demand into the embedded device just before their execution. Code and data of the program are partitioned such that no information regarding the control flow behavior of the program is leaked out. Thus, by observing the program partitions that are downloaded from the server to the device, an attacker is unable to guess which branches are taken in the program and what is the control flow of the program. This property of tamper resistance is valuable for secure embedded devices, such as smart cards, which could hold sensitive information and/or carry out critical computation such as financial transactions.Type: ApplicationFiled: June 4, 2003Publication date: April 15, 2004Inventors: Santosh Pande, Tao Zhang, Andre Dos Santos, Franz Josef Bruecklmayr
-
Patent number: 6615351Abstract: In a method for checking the authenticity of a data medium, in particular a smart card, the encrypted form of a physical feature of the data medium is stored in the data medium. The encrypted form of the feature is transmitted to a terminal, which also measures the physical feature itself. The physical feature is encrypted using a secret key, and is decrypted in the terminal using a public key. Authenticity is confirmed if a comparison of the decrypted feature and the measured feature match. Since the secret key is not contained in either the data medium or the terminal, a high level of security is provided.Type: GrantFiled: February 8, 2000Date of Patent: September 2, 2003Assignee: Infineon Technologies AGInventors: Holger Sedlak, Franz-Josef Brücklmayr
-
Patent number: 6487649Abstract: In a microcomputer intended for executing a multiplicity of user programs, a memory management unit ensures that none of the user programs can access other programs. However, in order to be able to use common library programs, and at the same time to prevent unchecked access to them, a vector memory area is provided which contains the start addresses of library programs as jump destinations. A library program is called by specifying the vector number, from which the memory management units determines he corresponding address in the vector memory area.Type: GrantFiled: September 13, 1999Date of Patent: November 26, 2002Assignee: Siemens AktiengesellschaftInventors: Holger Sedlak, Franz-Josef Bruecklmayr