Patents by Inventor Hubert Jaegers
Hubert Jaegers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240085549Abstract: The invention relates to a method and a device for the detection of changes of the geometric arrangement, the nature or the quantity of objects or bodies by means of sensors.Type: ApplicationFiled: January 10, 2022Publication date: March 14, 2024Applicant: REAL-CIS GMBHInventors: Hubert JÄGER, Edmund ERNST, Karl-Heinz SCHAINK
-
Patent number: 11809606Abstract: A method is provided for monitoring the integrity of a physical object, wherein the object receives a request of a server via a communication network. The request includes a digital character string, and in response to the received request, an electronic system of the object ascertains the digital fingerprint of the object and combines the ascertained digital fingerprint with a digital secret, which is known to the server and is stored in a memory device, and with the received character string (C) in order to form a response. The object transmits the response to the server via the communication network for analysis.Type: GrantFiled: June 15, 2021Date of Patent: November 7, 2023Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Hubert Jäger, Andreas Würl, Christos Karatzas
-
Publication number: 20230256553Abstract: The present invention relates to a machine door (2), comprising a door frame (10) having an opening (20), at least three door segments (30), and an actuating means (40), wherein the actuating means (40) can adjust the at least three door segments (30) from a position in the door frame (10) that clears the opening (20) to a position out of the door frame (10) that closes the opening (20). In addition, the present invention relates to a machine (1) having such a machine door (2).Type: ApplicationFiled: June 22, 2021Publication date: August 17, 2023Inventors: Markus KLOKER, Hubert JAEGER
-
Publication number: 20220134615Abstract: A device for forming or molding elements on surfaces of a semi-finished product includes a C-shaped bracket element for displacing using a manipulator to a defined position with respect to a semi-finished product. An arrangement implemented for injection molding is disposed on a first leg and a backing holder is disposed on the second leg of the C-shaped bracket element. A semi-finished product can be disposed between the backing holder and the arrangement. A first molding tool is disposed in the direction toward a surface of the semi-finished product. The arrangement and/or the backing holder is/are displaceable against the corresponding surface of the semi-finished product, such that the open side of the first molding tool applies pressure to the corresponding surface of the semi-finished product and the backing holder contacts and applies pressure to the opposite surface of the semi-finished product.Type: ApplicationFiled: February 20, 2020Publication date: May 5, 2022Inventors: Hubert JÄGER, Michael KRAHL, Tony WEBER, Jan LUFT
-
Patent number: 11188668Abstract: A system and a method for accessing data in a secure manner are provided, in which the data comprises a number of data sets and each of the data sets is assigned to a user. The data sets are stored in a database in an encrypted manner, and are decryptable by means of a first decryption key assigned to the particular entity. The first decryption keys are stored in a volatile memory unit, and each of the first decryption keys are encrypted separately using a first and at least a second encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory unit. After the volatile memory unit is erased, the encrypted first decryption keys are copied from the permanent memory unit into the volatile memory unit, and the encrypted first decryption keys are decrypted in the volatile memory unit.Type: GrantFiled: October 31, 2019Date of Patent: November 30, 2021Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Hubert Jäger, Juan Quintero
-
Patent number: 11170122Abstract: Provided are a system and a method for secure access to data, where the data comprises a number of data records each assigned to an entity, such as a user, and where the data records are stored in encrypted form in a database. A first decryption key assigned to a particular entity is used to decrypt the data records assigned to the particular entity. The first decryption keys are stored in a volatile memory, and the first decryption keys assigned to the particular entity are encrypted by an encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory. After the volatile memory is cleared, the encrypted first decryption keys are copied from the permanent memory into the volatile memory, and in the volatile memory, the first decryption keys are decrypted by a second decryption key assigned to the particular entity.Type: GrantFiled: August 20, 2019Date of Patent: November 9, 2021Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Hubert Jäger, Hans-Christian Perle, Ralf Rieken
-
Patent number: 11163900Abstract: A system for reliable data processing is provided, wherein the system is implemented in a sealed infrastructure, wherein the sealed infrastructure comprises at least one processing area and a storage area, wherein the network area, the processing area, and the storage area are separated from each other physically, wherein the processing area is adapted to receive data from the storage area and/or from the network area in encrypted form, to decrypt to process the received data, and to transmit the processed data in encrypted form to the storage area and/or to the network area. Further, a method for reliable processing of data in a system according to the invention is provided.Type: GrantFiled: December 22, 2017Date of Patent: November 2, 2021Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Edmund Ernst, Franz Stark, Hubert Jäger, Arnold Monitzer
-
Publication number: 20210312087Abstract: A method is provided for monitoring the integrity of a physical object, wherein the object receives a request of a server via a communication network. The request includes a digital character string, and in response to the received request, an electronic system of the object ascertains the digital fingerprint of the object and combines the ascertained digital fingerprint with a digital secret, which is known to the server and is stored in a memory device, and with the received character string (C) in order to form a response. The object transmits the response to the server via the communication network for analysis.Type: ApplicationFiled: June 15, 2021Publication date: October 7, 2021Inventors: Hubert JÄGER, Andreas WÜRL, Christos KARATZAS
-
Publication number: 20210294921Abstract: A method for ensuring the trustworthiness of software source code (source code) is provided, wherein two software developers sign the source code produced by said software developers. A compiling device checks, on the basis of the public signature keys of the software developers, whether the source code is trustworthy and produces a binary code from the source code. The produced binary code is signed by the compiling device, and the signed binary code together with the public signature key of the compiling device is made available for further use. The signed binary code is therefore likewise trustworthy.Type: ApplicationFiled: June 4, 2021Publication date: September 23, 2021Inventors: Hubert JÄGER, Jaro FIETZ
-
Publication number: 20210105136Abstract: A method is provided for enabling a secure data exchange between a number of nodes of a network of nodes, wherein each node has identical cryptographic key pairs for encrypting the data exchange, wherein the key pairs are generated by the respective nodes themselves and automatically. The addition of nodes to a network of nodes takes place with the aid of a temporary public key which is generated by the node to be added and which has to be verified by trustworthy entities. After successful verification, the cryptographic key pair required for the data exchange is made available to the node to be added. After the new node has been added, all nodes of the network again have identical cryptographic key pairs for the encrypted data exchange.Type: ApplicationFiled: November 6, 2020Publication date: April 8, 2021Inventors: Hubert JÄGER, Christos KARATZAS, Sibi ANTONY, Jaro FIETZ, Moritz UEHLING
-
Patent number: 10929313Abstract: A method is provided for securely and efficiently accessing connection data of at least one telecommunication provider is provided, wherein the connection data is ascertained by the telecommunication provider and is encrypted by the telecommunication provider, the encrypted connection data is transmitted from the telecommunication provider to a secured environment, the connection data is decrypted in the secured environment and, for a first predetermined time period, is stored as decrypted connection data exclusively in a volatile memory of the secured environment, and the access to the connection data is exclusively granted as access to the decrypted connection data stored in the volatile memory of the secured environment via a predetermined interface of the secured environment.Type: GrantFiled: February 28, 2018Date of Patent: February 23, 2021Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Ralf Rieken, Michael Kellermann, Hubert Jäger, Edmund Ernst
-
Publication number: 20200207038Abstract: The invention relates to a method for producing a multi-material composite and to a multi-material composite. Due to the stepwise change of material properties at the interface between different materials, in particular metallic and polymeric materials, cracks often develop in multi-material composites, whereby the service life being shortened. The method according to the invention is based on a gradual adaptation of the material properties of the materials of a multi-material composite at the interface.Type: ApplicationFiled: August 17, 2018Publication date: July 2, 2020Applicant: TECHNISCHE UNIVERSITÄT DRESDENInventors: Angelos FILIPPATOS, Daniel Sebastian WOLZ, Hubert JÄGER, Ilja KOCH
-
Publication number: 20200104525Abstract: A system and a method for accessing data in a secure manner are provided, in which the data comprises a number of data sets and each of the data sets is assigned to a user. The data sets are stored in a database in an encrypted manner, and are decryptable by means of a first decryption key assigned to the particular entity. The first decryption keys are stored in a volatile memory unit, and each of the first decryption keys are encrypted separately using a first and at least a second encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory unit. After the volatile memory unit is erased, the encrypted first decryption keys are copied from the permanent memory unit into the volatile memory unit, and the encrypted first decryption keys are decrypted in the volatile memory unit.Type: ApplicationFiled: October 31, 2019Publication date: April 2, 2020Inventors: Hubert JÄGER, Juan QUINTERO
-
Publication number: 20200019724Abstract: Provided are a system and a method for secure access to data, where the data comprises a number of data records each assigned to an entity, such as a user, and where the data records are stored in encrypted form in a database. A first decryption key assigned to a particular entity is used to decrypt the data records assigned to the particular entity. The first decryption keys are stored in a volatile memory, and the first decryption keys assigned to the particular entity are encrypted by an encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory. After the volatile memory is cleared, the encrypted first decryption keys are copied from the permanent memory into the volatile memory, and in the volatile memory, the first decryption keys are decrypted by a second decryption key assigned to the particular entity.Type: ApplicationFiled: August 20, 2019Publication date: January 16, 2020Inventors: Hubert JÄGER, Hans-Christian PERLE, Ralf RIEKEN
-
Patent number: 10380354Abstract: A method is provided for safeguarding values of attributes of a data record that can be stored in a first relational database against unauthorized access, wherein a value of a foreign key attribute of the data record refers to a key for the first relation or for a second relation, and wherein the value of the foreign key attribute is stored in a mapping relation, the values of attributes of the data record that are not foreign key attributes are stored in the first relation, and the mapping relation is stored in a volatile data memory.Type: GrantFiled: August 12, 2016Date of Patent: August 13, 2019Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Hubert Jäger, Dau Khiem Nguyen, Christos Karatzas
-
Patent number: 10257168Abstract: A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network between a number of subscribers by means of a telecommunications service, wherein the telecommunications service receives at least one first message of individual first size from at least one first subscriber to the telecommunications service that is intended for at least one second subscriber of the telecommunications service. In reaction to receiving a message, the telecommunications service sends at least one second message to the at least one second subscriber, wherein the at least one second message obtains a second size. The first size cannot be conclusively deduced from the second size.Type: GrantFiled: May 6, 2016Date of Patent: April 9, 2019Assignee: Uniscon Universal Identity Control GmbHInventor: Hubert Jäger
-
Publication number: 20180196761Abstract: A method is provided for securely and efficiently accessing connection data of at least one telecommunication provider is provided, wherein the connection data is ascertained by the telecommunication provider and is encrypted by the telecommunication provider, the encrypted connection data is transmitted from the telecommunication provider to a secured environment, the connection data is decrypted in the secured environment and, for a first predetermined time period, is stored as decrypted connection data exclusively in a volatile memory of the secured environment, and the access to the connection data is exclusively granted as access to the decrypted connection data stored in the volatile memory of the secured environment via a predetermined interface of the secured environment.Type: ApplicationFiled: February 28, 2018Publication date: July 12, 2018Inventors: Ralf RIEKEN, Michael KELLERMANN, Hubert JÄGER, Edmund ERNST
-
Publication number: 20180121674Abstract: A system for reliable data processing is provided, wherein the system is implemented in a sealed infrastructure, wherein the sealed infrastructure comprises at least one processing area and a storage area, wherein the network area, the processing area, and the storage area are separated from each other physically, wherein the processing area is adapted to receive data from the storage area and/or from the network area in encrypted form, to decrypt to process the received data, and to transmit the processed data in encrypted form to the storage area and/or to the network area. Further, a method for reliable processing of data in a system according to the invention is provided.Type: ApplicationFiled: December 22, 2017Publication date: May 3, 2018Inventors: Edmund ERNST, Franz STARK, Hubert JÄGER, Arnold MONITZER
-
Patent number: 9961539Abstract: A method is provided for securing telecommunications traffic data that are incurred with the telecommunications service provider of the telecommunications service when at least one telecommunications service is used by a number of subscribers is provided, wherein the telecommunications service is performed in a secure environment, the telecommunications service receives a message from at least one first subscriber of the telecommunications service, the message being intended for at least one second subscriber of the telecommunications service, and the telecommunications service, in response to the receipt of the message, sends a notification to the at least one second subscriber, wherein between the receipt of the message and the sending of the notification, a predetermined time delay is provided. Further, a system is provided for securing telecommunications traffic data is provided being adapted to execute the method according to the invention.Type: GrantFiled: December 4, 2015Date of Patent: May 1, 2018Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBHInventors: Hubert Jäger, Arnold Monitzer, Vesko Mitkov Georgiev, Christos Karatzas, Jaymin Modi, Dau Khiem Nguyen, Dieter Spillmann
-
Publication number: 20160350540Abstract: A method is provided for safeguarding values of attributes of a data record that can be stored in a first relational database against unauthorized access, wherein a value of a foreign key attribute of the data record refers to a key for the first relation or for a second relation, and wherein the value of the foreign key attribute is stored in a mapping relation, the values of attributes of the data record that are not foreign key attributes are stored in the first relation, and the mapping relation is stored in a volatile data memory.Type: ApplicationFiled: August 12, 2016Publication date: December 1, 2016Inventors: Hubert JÄGER, Dau Khiem NGUYEN, Christos KARATZAS