Patents by Inventor Geert Schrijen

Geert Schrijen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100154484
    Abstract: A radio frequency identification, RHD, device (116) for use at an article (114) is described that communicates information with a washing machine (100). The RFID device (116) comprises RFID circuitry (118), an antenna (120) connected to the RFID circuitry (118), as well as switching means (122) connected to any of the RFID circuitry (118) and the antenna (120) and configured to react to contact with a fluid (108) in the washing machine (100) by switching the RFID circuitry (118) from a first mode of operation to a second mode of operation. The two modes of operation comprise at least a respective first and second ability to communicate with the washing machine (100).
    Type: Application
    Filed: March 23, 2007
    Publication date: June 24, 2010
    Applicant: NXP B.V.
    Inventors: Boris Skoric, Stefan Maubach, Geert Schrijen, Antoon Tombeur
  • Publication number: 20070180261
    Abstract: The present invention relates to a method and a system of verifying the identity of an individual by employing biometric data associated with the individual while providing privacy of said biometric data. A basic idea of the present invention is to represent a biometric data set XFP with a feature vector. A number of sets XFP1, XFP2, . . . XFPm of biometric data and hence a corresponding number of feature vectors is derived, and quantized feature vectors X1, X2, . . . , Xm are created. Then, noise robustness of quantized feature components is tested. A set of reliable quantized feature components is formed, from which a subset of reliable quantized feature components is randomly selected. A first set W1 of helper data is created from the subset of selected reliable quantized components. The helper data W1 is subsequently used in a verification phase to verify the identity of the individual.
    Type: Application
    Filed: June 2, 2005
    Publication date: August 2, 2007
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Antonius Akkermans, Geert Schrijen, Pim Tuyls
  • Publication number: 20070118482
    Abstract: A device (1) for decrypting encrypted images comprises an array of sensor elements (11) for sensing a first image, for example an encrypted image, and an array of display elements (12) for displaying a second image, for example a decrypted image. At least some display elements comprise integrated sensor elements, thus reducing the number of parts of the device. The integrated display/sensor elements (13) may be constituted by polymeric LED elements. The sensor function of the integrated elements may also be used for positioning the device relative to a terminal, and/or for checking a biometric feature of the user.
    Type: Application
    Filed: December 13, 2004
    Publication date: May 24, 2007
    Applicant: KONINKLIJKE PHILIPS ELECTRONIC, N.V.
    Inventors: Pim Tuyls, Adrianus Sempel, Geert Schrijen, Pieter Snijder
  • Publication number: 20070058835
    Abstract: A method of verifying the authenticity of an image (1) rendered on a display screen (10) involves using a graphical representation of an authentication code (2) associated with the image. The graphical representation of the authentication code is also rendered on the display screen, while optional guide marks (3) may also be displayed. Both the image (1) and the associated authentication code (2) are read using a scanner (20), preferably a handheld linear scanner. The scanner calculates an authentication code based upon the image and compares the calculated authentication code with the authentication code read from the display.
    Type: Application
    Filed: October 14, 2004
    Publication date: March 15, 2007
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Geert Schrijen, Mark Johnson, Pim Tuyls
  • Publication number: 20070005989
    Abstract: The present invention relates to methods, devices, computer program products as well as a signal for providing privacy to a user in relation to data, which data can be a content identifier (cr_id) for identifying content. For that reason a usage right certificate (UR) generated in relation to the data, includes the data (cr_id), concealed user identifying information (for example by using (H(PK//RAN)) and random data (RAN)) enabling the verification of the user identity in the user identifying information. In this way a user is guaranteed privacy in relation to information, such as content he has purchased.
    Type: Application
    Filed: March 18, 2004
    Publication date: January 4, 2007
    Inventors: Claudine Conrado, Franciscus Lucas Kamperman, Geert Schrijen
  • Publication number: 20060212400
    Abstract: To ensure that digital rights cannot be forged or tampered with, they can be digitally signed. However, this means that updating the digital rights is no longer possible, as this would invalidate the digital signature. The present invention proposes that the issuer of digital rights issues rights which are signed in elementary pieces, rather than as a whole. Rather than issuing a right to play back a piece of content three times, the provider issues for example three rights to play back the content once in a particular AD, of which two may be transferred to other domains. The digital rights are individually protected by signatures and it is no longer possible to forge digital rights. As an enhancement the rights that can be transferred are indicated as such and stored securely to prevent tampering. When the right is transferred, it must be signed by the person who originally received it.
    Type: Application
    Filed: November 21, 2003
    Publication date: September 21, 2006
    Inventors: Franciscus Kamperman, Geert Schrijen, Sebastiaan Van Den Heuvel
  • Publication number: 20060190621
    Abstract: This invention relates to a system and a method of generating an Authorized Domain (AD) by selecting a domain identifier, and binding at least one user (P1, P, PN1), at least one device (D1, D2, . . . , DM), and at least one content item (C1, C2, . . . , CNZ) to the Authorized Domain (AD) given by the domain identifier (Domain ID). Hereby, a number of verified devices (D1, D2, . . . , DM) and a number of verified persons (P1, P2, . . . , PN1) that is authorized to access a content item of said Authorized Domain (100) is obtained. In this way, access to a content item of an authorized domain by a user operating a device is obtained either by verifying that the content item and the user is linked the same domain or by verifying that the device and the content item is linked to the same domain. Thereby, enhanced flexibility for one or more users when accessing content in an authorized domain is obtained while security of the content is still maintaining. This is further done in a simple, secure and reliable way.
    Type: Application
    Filed: July 14, 2004
    Publication date: August 24, 2006
    Inventors: Franciscus Kamperman, Robert Koster, Geert Schrijen
  • Publication number: 20060177060
    Abstract: An image decryption device (1) comprises a screen (10) on which a decrypted image may be visible. The decrypted image may the combination of two partial images, an encrypted image (A) displayed by a display device (2) and a key image or decrypting image (B) superimposed on the encrypted image by the decryption device. To properly align the encrypted image (A) and the key image (B), the decryption device is provided with sensors (11) capable of sensing the position of the decryption device relative to the display device. Corresponding alignment images (22) may be arranged around the screen (20 of the display device, or may be part of the encrypted image. Manual or automatic alignment may be provided.
    Type: Application
    Filed: July 12, 2004
    Publication date: August 10, 2006
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Mark Johnson, Pim Tuyls, Thomas Kevenaar, Geert Schrijen
  • Publication number: 20060179407
    Abstract: A trusted display device (1) for, upon being superimposed on an untrusted display (2), reconstructing a graphical message, said device comprising a display screen (1a) having a plurality of independently addressable pixels. A plurality of sensors (1c) are associated with at least a subset of the pixels of said display screen (1a) and arranged such that they, when the displays (1, 2) are superimposed, are able to detect optically encoded information presented by an underlying pixel of the untrusted display (2) and adapt the activation of its pixels based on said information sensed.
    Type: Application
    Filed: March 15, 2004
    Publication date: August 10, 2006
    Inventors: Pim Tuyls, Mark Johnson, Thomas Kevenaar, Geert Schrijen
  • Publication number: 20060115082
    Abstract: An authentication system 600 includes optical authentication devices 620, 630, 640. Each optical authentication device includes an optical layer 622, 632, 642. The optical layer includes a representation of a first image visually encrypted under control of an encryption key. The encrypted first image uniquely identifies the respective authentication device. An inspection device 610 decrypts the optical layer of the optical authentication device under control of the encryption key and visualizes the first image to enable verification of the unique identification of the authentication device.
    Type: Application
    Filed: November 17, 2003
    Publication date: June 1, 2006
    Inventors: Thomas Kevenaar, Pim Tuyls, Geert Schrijen
  • Publication number: 20060098841
    Abstract: A method of and server (100) for enabling composition of a message at a remote terminal (101). The method comprises generating an image comprising a plurality of symbols representing input means, the symbols having an associated particular visual characteristic which is mutually different for at least two of the symbols, transmitting the image for display on the remote terminal (101), receiving a sequence of coordinates from the remote terminal (101), reconstructing the message as a sequence of input means represented by the symbols comprised in the image at the received coordinates, constructing an authentication code as a sequence of visual characteristics associated with the symbols comprised in the image at the received coordinates, and accepting the message as authentic if the authentication code matches a predetermined sequence of visual characteristics.
    Type: Application
    Filed: March 1, 2004
    Publication date: May 11, 2006
    Inventors: Pim Tuyls, Thomas Kevenaar, Geert Schrijen
  • Publication number: 20060026428
    Abstract: A system for visual cryptography comprises a server (1) for encrypting a series of images using a set of keys, a terminal (2) for displaying the encrypted images, a transmission medium (4) for transmitting the encrypting images from the server to the terminal (2), and a decryption device (3) for decrypting the encrypted image displayed on the terminal. Subsequent images are encrypted using different keys chosen from the set of keys. These encrypted images and a feedback mechanism are provided to test whether the server and the terminal utilize the same keys at a particular instant. Preferably at least two encrypted images are provided simultaneously as parts of a larger image, thus allowing a user of the decryption device to indicate which key decrypts the image correctly.
    Type: Application
    Filed: October 31, 2003
    Publication date: February 2, 2006
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Geert Schrijen, Pim Tuyls
  • Publication number: 20060021065
    Abstract: Methods of and devices (D1) for authorizing an operation requested by a first user (P2) on a content item (C1) in accordance with a user right (UR1). The user right may identify the first user or a second user (P) and authorizes the user in question to perform the requested operation on the content item. If the user right identifies the second user, the operation is authorized upon receipt of information linking a user right of the first user and the user right of the second user. Preferably the information comprises one or more domain certificates (DC1, DC2) identifying the first and second users as members of the same authorized domain (AD). Preferably a content right (CR1) enabling the operation is used, whereby the user right authorizes the second user to employ the content right.
    Type: Application
    Filed: October 15, 2003
    Publication date: January 26, 2006
    Inventors: Franciscus Lucas Kamperman, Geert Schrijen
  • Publication number: 20060008086
    Abstract: A method of encoding a graphical message (220, 221) based on a key sequence as an encoded sequence of information units. For each pixel of the message, said pixel having a normalized intensity I, a total rotation ? which results in a liquid crystal display in a pixel with substantially the intensity I is determined. The key sequence contains arbitrary rotations. The difference between the total rotation a and a corresponding rotation in the key sequence is output as an element of the encoded sequence. A device (201) presents pixels with rotations indicated by the encoded sequence on a first display (701) and pixels with rotations indicated by the key sequence on a second display (211). Superimposing the two displays reveals the graphical message. The method can be repeated for red, green and blue intensities of color pixels, allowing colored graphical messages to be encoded and reconstructed.
    Type: Application
    Filed: August 27, 2003
    Publication date: January 12, 2006
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Thomas Andreas Kevenaar, Mark Johnson, Geert Schrijen, Pim Tuyls
  • Publication number: 20050265550
    Abstract: A method of generating a common secret between a first party and a second party, preferably devices (101-105) in a home network (100) that operate in accordance with a Digital Rights Management (DRM) framework. The devices calculate the common secret by evaluating the product of two polynomials P(x, y) and Q(x, z) using parameters previously distributed by a Trusted Third Party (TTP) and parameters obtained from the other party. Preferably the parties subsequently verify that the other party has generated the same secret using a zero-knowledge protocol or a commitment-based protocol. The method is particularly suitable for very low power devices such as Chip-In-Disc type devices.
    Type: Application
    Filed: February 14, 2003
    Publication date: December 1, 2005
    Inventors: Pim Tuyls, Thomas Kevenaar, Geert Schrijen, Marten Van Dijk
  • Publication number: 20050180569
    Abstract: A method of visually encrypting a graphical message (100), in which a first share (110) is produced based on the graphic message (100) and a key sequence, the method comprising inserting a filler in a monochromatic area of the graphical message (100) before producing the first share (110). The filler may represent a regularly spaced grid, a pseudo-random pattern, a predetermined graphical image or, in case of a color message, a colorful background. Also a device (500) and a computer program product arranged for carrying out the method.
    Type: Application
    Filed: May 20, 2003
    Publication date: August 18, 2005
    Inventors: Thomas Andreas Kevenaar, Geert Schrijen, Pim Tuyls
  • Publication number: 20050117748
    Abstract: A method of and a device (501) for reconstructing a graphical message (520) using visual cryptography. Cells (303, 304) in a first liquid crystal display (701) are activated if a bit in a message sequence represents ‘1’, and not activated if said bit represents ‘0’. Cells (303, 304) in a second liquid crystal display (511) are activated if a bit in a key sequence represents ‘0’, and not activated if said bit represents ‘1’. The first and second displays (701, 511) are then superimposed so as to visually reconstruct the graphical message (520). Preferably a portion of a polarization filter (305) in an area of the first liquid crystal display (701), and a corresponding portion of a polarization filter (302) in an area of the second liquid crystal display (511) have been omitted to allow superimposition of the first and second liquid crystal displays (701, 511) at said areas.
    Type: Application
    Filed: January 27, 2003
    Publication date: June 2, 2005
    Applicant: Koninklijke Philips Electronics N. V.
    Inventors: Geert Schrijen, Pim Tuyls, Thomas Kevenaar, Mark Johnson