Patents by Inventor Franz-Josef Brücklmayr

Franz-Josef Brücklmayr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11080684
    Abstract: An example relates to a method for processing data an on smartcard comprising: (i) obtaining a message; (ii) searching for a rule in at least one file of the smartcard based on the message; and (iii) in case the rule was found, executing the rule.
    Type: Grant
    Filed: December 8, 2014
    Date of Patent: August 3, 2021
    Assignee: Infineon Technologies AG
    Inventors: Bala Nagendra Raja Munjuluri, Franz-Josef Brücklmayr, Narasimha Kumar Vedala, Prakash Nayak
  • Publication number: 20160162881
    Abstract: An example relates to a method for processing data an on smartcard comprising: (i) obtaining a message; (ii) searching for a rule in at least one file of the smartcard based on the message; and (iii) in case the rule was found, executing the rule.
    Type: Application
    Filed: December 8, 2014
    Publication date: June 9, 2016
    Inventors: Bala Nagendra Raja MUNJULURI, Franz-Josef BRUECKLMAYR, Narasimha Kumar VEDALA, Prakash NAYAK
  • Publication number: 20100182147
    Abstract: A security circuit comprising including a sensor located remotely from a central alarm handler and configured to sense an attack, and a phase-change memory cell coupled to and located remotely with the sensor, and configured to store an alarm event when the attack is sensed.
    Type: Application
    Filed: January 20, 2009
    Publication date: July 22, 2010
    Applicant: INFINEON TECHNOLOGIES A.G.
    Inventors: Stefan Rueping, Thomas Nirschl, Ronald Kakoschke, Franz Josef Bruecklmayr, Markus Gail, Berndt Gammel, Gerd Dirscherl
  • Patent number: 7707631
    Abstract: A device for processing a program code with a plurality of subprogram calls, a subprogram corresponding to a subprogram call taking place by means of an allocation table, has a security module having the allocation table and a processor for using the program code. Access to the allocation table in the security module is restricted. The processor for using the program code is formed to retrieve, responsive to a request for subprogram data, using authorization information, subprogram data via the allocation table in the security module.
    Type: Grant
    Filed: November 29, 2005
    Date of Patent: April 27, 2010
    Assignee: Infineon Technologies AG
    Inventors: Franz-Josef Bruecklmayr, Bernhard Lippmann
  • Patent number: 7269671
    Abstract: Systems, methods and computer program products partition a whole program when it does not fit in a device's memory. Minimal, safe program partitions are downloaded from the server on demand into the embedded device just before their execution. Code and data of the program are partitioned such that no information regarding the control flow behavior of the program is leaked out. Thus, by observing the program partitions that are downloaded from the server to the device, an attacker is unable to guess which branches are taken in the program and what is the control flow of the program. This property of tamper resistance is valuable for secure embedded devices, such as smart cards, which could hold sensitive information and/or carry out critical computation such as financial transactions.
    Type: Grant
    Filed: June 4, 2003
    Date of Patent: September 11, 2007
    Assignees: Georgia Tech Research Corporation, Infineon Technologies AG
    Inventors: Santosh Pande, Tao Zhang, Andre Dos Santos, Franz Josef Bruecklmayr
  • Patent number: 7260690
    Abstract: A microprocessor circuit for organizing access to data or programs stored in a memory has a microprocessor, a memory for storing an operating system, and a memory for storing individual external programs. A plurality of memory areas with respective address spaces is provided in the memory for storing the external programs. Each address space is assigned an identifier. The identifier assigned to a memory area is loaded into a first auxiliary register prior to the addressing of the memory area and the identifier of the addressed memory area is loaded into a second auxiliary register. A comparison of the contents of the first and second auxiliary registers is performed. Furthermore, each address space of a memory area is assigned at least one bit sequence defining access rights, whereby code instructions and sensitive data can be protected against write accesses from other external programs.
    Type: Grant
    Filed: August 6, 2003
    Date of Patent: August 21, 2007
    Assignee: Infineon Technologies AG
    Inventors: Franz-Josef Brücklmayr, Hans Friedinger, Holger Sedlak, Christian May
  • Publication number: 20060123403
    Abstract: A device for processing a program code with a plurality of subprogram calls, a subprogram corresponding to a subprogram call taking place by means of an allocation table, has a security module having the allocation table and a processor for using the program code. Access to the allocation table in the security module is restricted. The processor for using the program code is formed to retrieve, responsive to a request for subprogram data, using authorization information, subprogram data via the allocation table in the security module.
    Type: Application
    Filed: November 29, 2005
    Publication date: June 8, 2006
    Applicant: Infineon Technologies AG
    Inventors: Franz-Josef Bruecklmayr, Bernhard Lippmann
  • Patent number: 6839287
    Abstract: In a method of storing a quantity of data in a target memory location, the data quantity is stored first in a non-volatile buffer memory location. It is then examined whether the data are successfully stored in the non-volatile buffer memory location. If the step of examining produces a positive result, the target memory location to which the predetermined quantity of data is to be written is cleared. After the step of clearing of the target memory location, the data are transferred from the non-volatile buffer memory location to the target memory location. To conclude the storage cycle, the non-volatile buffer memory location is then cleared so as to be available for a new storage operation. The effect achieved thereby is a secure and uncomplicated transfer of information from a source memory to the target memory.
    Type: Grant
    Filed: September 2, 2003
    Date of Patent: January 4, 2005
    Assignee: Infineon Technologies AG
    Inventors: Franz-Josef Brücklmayr, Christian May, Wolfgang Pockrandt, Holger Sedlak
  • Publication number: 20040073898
    Abstract: Systems, methods and computer program products partition a whole program when it does not fit in a device's memory. Minimal, safe program partitions are downloaded from the server on demand into the embedded device just before their execution. Code and data of the program are partitioned such that no information regarding the control flow behavior of the program is leaked out. Thus, by observing the program partitions that are downloaded from the server to the device, an attacker is unable to guess which branches are taken in the program and what is the control flow of the program. This property of tamper resistance is valuable for secure embedded devices, such as smart cards, which could hold sensitive information and/or carry out critical computation such as financial transactions.
    Type: Application
    Filed: June 4, 2003
    Publication date: April 15, 2004
    Inventors: Santosh Pande, Tao Zhang, Andre Dos Santos, Franz Josef Bruecklmayr
  • Patent number: 6615351
    Abstract: In a method for checking the authenticity of a data medium, in particular a smart card, the encrypted form of a physical feature of the data medium is stored in the data medium. The encrypted form of the feature is transmitted to a terminal, which also measures the physical feature itself. The physical feature is encrypted using a secret key, and is decrypted in the terminal using a public key. Authenticity is confirmed if a comparison of the decrypted feature and the measured feature match. Since the secret key is not contained in either the data medium or the terminal, a high level of security is provided.
    Type: Grant
    Filed: February 8, 2000
    Date of Patent: September 2, 2003
    Assignee: Infineon Technologies AG
    Inventors: Holger Sedlak, Franz-Josef Brücklmayr
  • Patent number: 6487649
    Abstract: In a microcomputer intended for executing a multiplicity of user programs, a memory management unit ensures that none of the user programs can access other programs. However, in order to be able to use common library programs, and at the same time to prevent unchecked access to them, a vector memory area is provided which contains the start addresses of library programs as jump destinations. A library program is called by specifying the vector number, from which the memory management units determines he corresponding address in the vector memory area.
    Type: Grant
    Filed: September 13, 1999
    Date of Patent: November 26, 2002
    Assignee: Siemens Aktiengesellschaft
    Inventors: Holger Sedlak, Franz-Josef Bruecklmayr