Patents by Inventor Holger Assenmacher

Holger Assenmacher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949789
    Abstract: A computer-implemented method is for tamper-evident recording of a plurality of executable items. Each executable item is associated with a data item verification fingerprint. The method includes computing an aggregated verification fingerprint from data item verification fingerprints using a one-way compression function so that the aggregated verification fingerprint has a first bit length. The first bit length is less than a total bit length of a concatenation of the data item verification fingerprints. The method further includes storing the aggregated verification fingerprint in a blockchain, attempting to execute an element of code, validating the element of code against the aggregated verification fingerprint, and, based on the validation, allowing execution or denying execution of the element of code.
    Type: Grant
    Filed: July 6, 2022
    Date of Patent: April 2, 2024
    Assignee: CRYPTOWERK CORP.
    Inventor: Holger Assenmacher
  • Patent number: 11921838
    Abstract: The present invention relates to the secure configuration of electronic devices, such as for example network-connected “smart” devices and appliances, collectively referred to as “IoT devices”. A computer-implemented method of secure configuration of at least one electronic device is provided. According to the method, the electronic device connects to a blockchain database; determines from said blockchain database a configuration block comprising block identification data, where the block identification data corresponds to device identification data, stored with the electronic device; obtains configuration information from said configuration block; and using the configuration information, conducts configuration of the electronic device.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: March 5, 2024
    Assignee: CRYPTOWERK CORP.
    Inventors: Holger Assenmacher, Thomas Dienwiebel
  • Patent number: 11907406
    Abstract: A computer-implemented method and a corresponding system of tamper-evident recording of a plurality of service data items are provided. Each service data item is associated with a data item verification fingerprint. A processing routine is conducted, in which an aggregated verification fingerprint is computed from at least a plurality of data item verification fingerprints using at least one one-way compression function, so that the aggregated verification fingerprint has a bit length, which is less than a bit length of a concatenation of the data item verification fingerprints. The aggregated verification fingerprint is then stored in at least one blockchain, so that a tamper-evident verification of each service data item is possible, while the storage of the aggregated verification fingerprint is decoupled from the service data items.
    Type: Grant
    Filed: July 31, 2017
    Date of Patent: February 20, 2024
    Assignee: CRYPTOWERK CORP.
    Inventor: Holger Assenmacher
  • Publication number: 20230028273
    Abstract: The present invention relates to the secure configuration of electronic devices, such as for example network-connected “smart” devices and appliances, collectively referred to as “IoT devices”. A computer-implemented method of secure configuration of at least one electronic device is provided. According to the method, the electronic device connects to a blockchain database; determines from said blockchain database a configuration block comprising block identification data, where the block identification data corresponds to device identification data, stored with the electronic device; obtains configuration information from said configuration block; and using the configuration information, conducts configuration of the electronic device.
    Type: Application
    Filed: September 30, 2022
    Publication date: January 26, 2023
    Applicant: Cryptowerk Corp.
    Inventors: Holger Assenmacher, Thomas Dienwiebel
  • Publication number: 20220337420
    Abstract: A computer-implemented method is for tamper-evident recording of a plurality of executable items. Each executable item is associated with a data item verification fingerprint. The method includes computing an aggregated verification fingerprint from data item verification fingerprints using a one-way compression function so that the aggregated verification fingerprint has a first bit length. The first bit length is less than a total bit length of a concatenation of the data item verification fingerprints. The method further includes storing the aggregated verification fingerprint in a blockchain, attempting to execute an element of code, validating the element of code against the aggregated verification fingerprint, and, based on the validation, allowing execution or denying execution of the element of code.
    Type: Application
    Filed: July 6, 2022
    Publication date: October 20, 2022
    Applicant: Cryptowerk Corp.
    Inventor: Holger Assenmacher
  • Patent number: 11468038
    Abstract: A method and a system for interfacing a database system with a consensus system are provided. The method comprises at least the steps of creating a shadow table of a table of the database system; and for each row of the shadow table: serialization of data, stored in a current row of the shadow table; generating a data item verification fingerprint of the data; and providing the data item verification fingerprint to the consensus system.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: October 11, 2022
    Assignee: CRYPTOWERK CORP.
    Inventor: Holger Assenmacher
  • Patent number: 11461455
    Abstract: The present invention relates to the secure configuration of electronic devices, such as for example network-connected “smart” devices and appliances, collectively referred to as “IoT devices”. A computer-implemented method of secure configuration of at least one electronic device is provided. According to the method, the electronic device connects to a blockchain database; determines from said blockchain database a configuration block comprising block identification data, where the block identification data corresponds to device identification data, stored with the electronic device; obtains configuration information from said configuration block; and using the configuration information, conducts configuration of the electronic device.
    Type: Grant
    Filed: July 16, 2018
    Date of Patent: October 4, 2022
    Assignee: CRYPTOWERK CORP.
    Inventors: Holger Assenmacher, Thomas Dienwiebel
  • Patent number: 11394556
    Abstract: A computer-implemented method is for tamper-evident recording of a plurality of executable items. Each executable item is associated with a data item verification fingerprint. The method includes computing an aggregated verification fingerprint from data item verification fingerprints using a one-way compression function so that the aggregated verification fingerprint has a first bit length. The first bit length is less than a total bit length of a concatenation of the data item verification fingerprints. The method further includes storing the aggregated verification fingerprint in a blockchain, attempting to execute an element of code, validating the element of code against the aggregated verification fingerprint, and, based on the validation, allowing execution or denying execution of the element of code.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: July 19, 2022
    Assignee: CRYPTOWERK CORP.
    Inventor: Holger Assenmacher
  • Publication number: 20200366489
    Abstract: A computer-implemented method is for tamper-evident recording of a plurality of executable items. Each executable item is associated with a data item verification fingerprint. The method includes computing an aggregated verification fingerprint from data item verification fingerprints using a one-way compression function so that the aggregated verification fingerprint has a first bit length. The first bit length is less than a total bit length of a concatenation of the data item verification fingerprints. The method further includes storing the aggregated verification fingerprint in a blockchain, attempting to execute an element of code, validating the element of code against the aggregated verification fingerprint, and, based on the validation, allowing execution or denying execution of the element of code.
    Type: Application
    Filed: May 14, 2020
    Publication date: November 19, 2020
    Applicant: Cryptowerk Corp.
    Inventor: Holger Assenmacher
  • Publication number: 20200233950
    Abstract: The present invention relates to the secure configuration of electronic devices, such as for example network-connected “smart” devices and appliances, collectively referred to as “IoT devices”. A computer-implemented method of secure configuration of at least one electronic device is provided. According to the method, the electronic device connects to a blockchain database; determines from said blockchain database a configuration block comprising block identification data, where the block identification data corresponds to device identification data, stored with the electronic device; obtains configuration information from said configuration block; and using the configuration information, conducts configuration of the electronic device.
    Type: Application
    Filed: July 16, 2018
    Publication date: July 23, 2020
    Applicant: Cryptowerk Corp.
    Inventors: Holger Assenmacher, Thomas Dienwiebel
  • Publication number: 20190171849
    Abstract: A computer-implemented method and a corresponding system of tamper-evident recording of a plurality of service data items are provided. Each service data item is associated with a data item verification fingerprint. A processing routine is conducted, in which an aggregated verification fingerprint is computed from at least a plurality of data item verification fingerprints using at least one one-way compression function, so that the aggregated verification fingerprint has a bit length, which is less than a bit length of a concatenation of the data item verification fingerprints. The aggregated verification fingerprint is then stored in at least one blockchain, so that a tamper-evident verification of each service data item is possible, while the storage of the aggregated verification fingerprint is decoupled from the service data items.
    Type: Application
    Filed: July 31, 2017
    Publication date: June 6, 2019
    Applicant: Cryptowerk Corp.
    Inventor: Holger Assenmacher
  • Patent number: 10204031
    Abstract: A remotely accessible integrated development environment, and a sub-system for deploying applications to a remote device is disclosed. The sub-system may further comprise a rendering engine which is configured based upon a platform of the remote device, wherein the rendering engine is configured to communicate with, and receive applications from, a remotely accessible application server.
    Type: Grant
    Filed: August 29, 2016
    Date of Patent: February 12, 2019
    Assignee: BlackBerry Limited
    Inventor: Holger Assenmacher
  • Publication number: 20170052878
    Abstract: A remotely accessible integrated development environment, and a sub-system for deploying applications to a remote device is disclosed. The sub-system may further comprise a rendering engine which is configured based upon a platform of the remote device, wherein the rendering engine is configured to communicate with, and receive applications from, a remotely accessible application server.
    Type: Application
    Filed: August 29, 2016
    Publication date: February 23, 2017
    Applicant: Good Technology Holdings Limited
    Inventor: Holger ASSENMACHER
  • Patent number: 9544398
    Abstract: Systems and methods for managing applications on an appliance are provided. A server is in communication with appliances. The server is also coupled to databases which include appliance information, as well as application data. A user may authenticate using the appliance. A set of permissions may be associated with the user. The server then supervises information exchanged between the appliance and the server, as well as application functionality upon the appliance, by supplementing the applications downloaded to the appliance with supplemental code, referred to hereafter as an AppGuard. The AppGuard is tailored, using information related to the appliance, to the appliance type in order to ensure proper functionality. The AppGuard is executed upon installation, and collects device information for validation. After validation, the application may be run. Additionally, management of the applications may include augmenting, deleting, disabling or authorizing the application.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: January 10, 2017
    Assignee: Good Technology Holdings Limited
    Inventors: Aashin Nagpal, Ken C. Singer, Holger Assenmacher
  • Patent number: 9451009
    Abstract: A remotely accessible integrated development environment, and a sub-system for deploying applications to a remote device is disclosed. The sub-system may further comprise a rendering engine which is configured based upon a platform of the remote device, wherein the rendering engine is configured to communicate with, and receive applications from, a remotely accessible application server.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: September 20, 2016
    Assignee: AppCentral, Inc.
    Inventor: Holger Assenmacher
  • Publication number: 20160028853
    Abstract: Systems and methods for managing applications on an appliance are provided. A server is in communication with appliances. The server is also coupled to databases which include appliance information, as well as application data. A user may authenticate using the appliance. A set of permissions may be associated with the user. The server then supervises information exchanged between the appliance and the server, as well as application functionality upon the appliance, by supplementing the applications downloaded to the appliance with supplemental code, referred to hereafter as an AppGuard. The AppGuard is tailored, using information related to the appliance, to the appliance type in order to ensure proper functionality. The AppGuard is executed upon installation, and collects device information for validation. After validation, the application may be run. Additionally, management of the applications may include augmenting, deleting, disabling or authorizing the application.
    Type: Application
    Filed: October 1, 2015
    Publication date: January 28, 2016
    Inventors: Aashin NAGPAL, Ken C. SINGER, Holger ASSENMACHER
  • Patent number: 9185554
    Abstract: Systems and methods for managing applications on an appliance are provided. A server is in communication with appliances. The server is also coupled to databases which include appliance information, as well as application data. A user may authenticate using the appliance. A set of permissions may be associated with the user. The server then supervises information exchanged between the appliance and the server, as well as application functionality upon the appliance, by supplementing the applications downloaded to the appliance with supplemental code, referred to hereafter as an AppGuard. The AppGuard is tailored, using information related to the appliance, to the appliance type in order to ensure proper functionality. The AppGuard is executed upon installation, and collects device information for validation. After validation, the application may be run. Additionally, management of the applications may include augmenting, deleting, disabling or authorizing the application.
    Type: Grant
    Filed: September 6, 2010
    Date of Patent: November 10, 2015
    Assignee: APPCENTRAL, INC.
    Inventors: Aashin Nagpal, Ken C. Singer, Holger Assenmacher
  • Patent number: 9135434
    Abstract: The creation of an application for any mobile appliance, for example Apple's iPhone, requires several elements to be present at compile time. In the Apple example of an enterprise application where an entity wishes to develop applications internally for its staff, two of these elements are the source code and a digital certificate. These must be combined in the compiler so that the application may be properly authorized to run in the appliance. Where the owner of the source code and the owner of the digital certificate are not the same, serious concerns arise because each element must be secured. An intermediating system and method are described that allows each party to cooperate securely through a third party escrow service to produce the complied application while leaving no unwanted residue of the independent parts.
    Type: Grant
    Filed: April 14, 2011
    Date of Patent: September 15, 2015
    Assignee: APPCENTRAL, INC.
    Inventors: Aashin Nagpal, Kenneth Chul Singer, Holger Assenmacher
  • Patent number: 8984657
    Abstract: The present invention relates to a system and method for remote management of applications downloaded to a personal portable appliance. Applications comprising programs and data structures are updated to include a dummy application that can replace the ordinarily executable application and that manipulates the data structure when invoked, so as to limit it. The dummy application is subsequently reduced to have a limited amount of the original functionality and to prompt the user to delete it.
    Type: Grant
    Filed: December 21, 2010
    Date of Patent: March 17, 2015
    Assignee: Appcentral, Inc.
    Inventors: Paul Shelton Nerger, Aashin Nagpal, Holger Assenmacher
  • Publication number: 20110276805
    Abstract: The creation of an application for any mobile appliance, for example Apple's iPhone, requires several elements to be present at compile time. In the Apple example of an enterprise application where an entity wishes to develop applications internally for its staff, two of these elements are the source code and a digital certificate. These must be combined in the compiler so that the application may be properly authorized to run in the appliance. Where the owner of the source code and the owner of the digital certificate are not the same, serious concerns arise because each element must be secured. An intermediating system and method are described that allows each party to cooperate securely through a third party escrow service to produce the complied application whilst leaving no unwanted residue of the independent parts.
    Type: Application
    Filed: April 14, 2011
    Publication date: November 10, 2011
    Inventors: Aashin Nagpal, Kenneth Chul Singer, Holger Assenmacher