Patents by Inventor Hubert Jager

Hubert Jager has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240085549
    Abstract: The invention relates to a method and a device for the detection of changes of the geometric arrangement, the nature or the quantity of objects or bodies by means of sensors.
    Type: Application
    Filed: January 10, 2022
    Publication date: March 14, 2024
    Applicant: REAL-CIS GMBH
    Inventors: Hubert JÄGER, Edmund ERNST, Karl-Heinz SCHAINK
  • Patent number: 11809606
    Abstract: A method is provided for monitoring the integrity of a physical object, wherein the object receives a request of a server via a communication network. The request includes a digital character string, and in response to the received request, an electronic system of the object ascertains the digital fingerprint of the object and combines the ascertained digital fingerprint with a digital secret, which is known to the server and is stored in a memory device, and with the received character string (C) in order to form a response. The object transmits the response to the server via the communication network for analysis.
    Type: Grant
    Filed: June 15, 2021
    Date of Patent: November 7, 2023
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Hubert Jäger, Andreas Würl, Christos Karatzas
  • Publication number: 20220134615
    Abstract: A device for forming or molding elements on surfaces of a semi-finished product includes a C-shaped bracket element for displacing using a manipulator to a defined position with respect to a semi-finished product. An arrangement implemented for injection molding is disposed on a first leg and a backing holder is disposed on the second leg of the C-shaped bracket element. A semi-finished product can be disposed between the backing holder and the arrangement. A first molding tool is disposed in the direction toward a surface of the semi-finished product. The arrangement and/or the backing holder is/are displaceable against the corresponding surface of the semi-finished product, such that the open side of the first molding tool applies pressure to the corresponding surface of the semi-finished product and the backing holder contacts and applies pressure to the opposite surface of the semi-finished product.
    Type: Application
    Filed: February 20, 2020
    Publication date: May 5, 2022
    Inventors: Hubert JÄGER, Michael KRAHL, Tony WEBER, Jan LUFT
  • Patent number: 11188668
    Abstract: A system and a method for accessing data in a secure manner are provided, in which the data comprises a number of data sets and each of the data sets is assigned to a user. The data sets are stored in a database in an encrypted manner, and are decryptable by means of a first decryption key assigned to the particular entity. The first decryption keys are stored in a volatile memory unit, and each of the first decryption keys are encrypted separately using a first and at least a second encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory unit. After the volatile memory unit is erased, the encrypted first decryption keys are copied from the permanent memory unit into the volatile memory unit, and the encrypted first decryption keys are decrypted in the volatile memory unit.
    Type: Grant
    Filed: October 31, 2019
    Date of Patent: November 30, 2021
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Hubert Jäger, Juan Quintero
  • Patent number: 11170122
    Abstract: Provided are a system and a method for secure access to data, where the data comprises a number of data records each assigned to an entity, such as a user, and where the data records are stored in encrypted form in a database. A first decryption key assigned to a particular entity is used to decrypt the data records assigned to the particular entity. The first decryption keys are stored in a volatile memory, and the first decryption keys assigned to the particular entity are encrypted by an encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory. After the volatile memory is cleared, the encrypted first decryption keys are copied from the permanent memory into the volatile memory, and in the volatile memory, the first decryption keys are decrypted by a second decryption key assigned to the particular entity.
    Type: Grant
    Filed: August 20, 2019
    Date of Patent: November 9, 2021
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Hubert Jäger, Hans-Christian Perle, Ralf Rieken
  • Patent number: 11163900
    Abstract: A system for reliable data processing is provided, wherein the system is implemented in a sealed infrastructure, wherein the sealed infrastructure comprises at least one processing area and a storage area, wherein the network area, the processing area, and the storage area are separated from each other physically, wherein the processing area is adapted to receive data from the storage area and/or from the network area in encrypted form, to decrypt to process the received data, and to transmit the processed data in encrypted form to the storage area and/or to the network area. Further, a method for reliable processing of data in a system according to the invention is provided.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: November 2, 2021
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Edmund Ernst, Franz Stark, Hubert Jäger, Arnold Monitzer
  • Publication number: 20210312087
    Abstract: A method is provided for monitoring the integrity of a physical object, wherein the object receives a request of a server via a communication network. The request includes a digital character string, and in response to the received request, an electronic system of the object ascertains the digital fingerprint of the object and combines the ascertained digital fingerprint with a digital secret, which is known to the server and is stored in a memory device, and with the received character string (C) in order to form a response. The object transmits the response to the server via the communication network for analysis.
    Type: Application
    Filed: June 15, 2021
    Publication date: October 7, 2021
    Inventors: Hubert JÄGER, Andreas WÜRL, Christos KARATZAS
  • Publication number: 20210294921
    Abstract: A method for ensuring the trustworthiness of software source code (source code) is provided, wherein two software developers sign the source code produced by said software developers. A compiling device checks, on the basis of the public signature keys of the software developers, whether the source code is trustworthy and produces a binary code from the source code. The produced binary code is signed by the compiling device, and the signed binary code together with the public signature key of the compiling device is made available for further use. The signed binary code is therefore likewise trustworthy.
    Type: Application
    Filed: June 4, 2021
    Publication date: September 23, 2021
    Inventors: Hubert JÄGER, Jaro FIETZ
  • Publication number: 20210105136
    Abstract: A method is provided for enabling a secure data exchange between a number of nodes of a network of nodes, wherein each node has identical cryptographic key pairs for encrypting the data exchange, wherein the key pairs are generated by the respective nodes themselves and automatically. The addition of nodes to a network of nodes takes place with the aid of a temporary public key which is generated by the node to be added and which has to be verified by trustworthy entities. After successful verification, the cryptographic key pair required for the data exchange is made available to the node to be added. After the new node has been added, all nodes of the network again have identical cryptographic key pairs for the encrypted data exchange.
    Type: Application
    Filed: November 6, 2020
    Publication date: April 8, 2021
    Inventors: Hubert JÄGER, Christos KARATZAS, Sibi ANTONY, Jaro FIETZ, Moritz UEHLING
  • Patent number: 10929313
    Abstract: A method is provided for securely and efficiently accessing connection data of at least one telecommunication provider is provided, wherein the connection data is ascertained by the telecommunication provider and is encrypted by the telecommunication provider, the encrypted connection data is transmitted from the telecommunication provider to a secured environment, the connection data is decrypted in the secured environment and, for a first predetermined time period, is stored as decrypted connection data exclusively in a volatile memory of the secured environment, and the access to the connection data is exclusively granted as access to the decrypted connection data stored in the volatile memory of the secured environment via a predetermined interface of the secured environment.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: February 23, 2021
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Ralf Rieken, Michael Kellermann, Hubert Jäger, Edmund Ernst
  • Publication number: 20200207038
    Abstract: The invention relates to a method for producing a multi-material composite and to a multi-material composite. Due to the stepwise change of material properties at the interface between different materials, in particular metallic and polymeric materials, cracks often develop in multi-material composites, whereby the service life being shortened. The method according to the invention is based on a gradual adaptation of the material properties of the materials of a multi-material composite at the interface.
    Type: Application
    Filed: August 17, 2018
    Publication date: July 2, 2020
    Applicant: TECHNISCHE UNIVERSITÄT DRESDEN
    Inventors: Angelos FILIPPATOS, Daniel Sebastian WOLZ, Hubert JÄGER, Ilja KOCH
  • Publication number: 20200104525
    Abstract: A system and a method for accessing data in a secure manner are provided, in which the data comprises a number of data sets and each of the data sets is assigned to a user. The data sets are stored in a database in an encrypted manner, and are decryptable by means of a first decryption key assigned to the particular entity. The first decryption keys are stored in a volatile memory unit, and each of the first decryption keys are encrypted separately using a first and at least a second encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory unit. After the volatile memory unit is erased, the encrypted first decryption keys are copied from the permanent memory unit into the volatile memory unit, and the encrypted first decryption keys are decrypted in the volatile memory unit.
    Type: Application
    Filed: October 31, 2019
    Publication date: April 2, 2020
    Inventors: Hubert JÄGER, Juan QUINTERO
  • Publication number: 20200019724
    Abstract: Provided are a system and a method for secure access to data, where the data comprises a number of data records each assigned to an entity, such as a user, and where the data records are stored in encrypted form in a database. A first decryption key assigned to a particular entity is used to decrypt the data records assigned to the particular entity. The first decryption keys are stored in a volatile memory, and the first decryption keys assigned to the particular entity are encrypted by an encryption key assigned to the particular entity, and the encrypted first decryption keys are stored in a permanent memory. After the volatile memory is cleared, the encrypted first decryption keys are copied from the permanent memory into the volatile memory, and in the volatile memory, the first decryption keys are decrypted by a second decryption key assigned to the particular entity.
    Type: Application
    Filed: August 20, 2019
    Publication date: January 16, 2020
    Inventors: Hubert JÄGER, Hans-Christian PERLE, Ralf RIEKEN
  • Patent number: 10380354
    Abstract: A method is provided for safeguarding values of attributes of a data record that can be stored in a first relational database against unauthorized access, wherein a value of a foreign key attribute of the data record refers to a key for the first relation or for a second relation, and wherein the value of the foreign key attribute is stored in a mapping relation, the values of attributes of the data record that are not foreign key attributes are stored in the first relation, and the mapping relation is stored in a volatile data memory.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: August 13, 2019
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Hubert Jäger, Dau Khiem Nguyen, Christos Karatzas
  • Patent number: 10257168
    Abstract: A method and system are provided for securing telecommunications traffic data. A method is provided for transmitting messages via a telecommunications network between a number of subscribers by means of a telecommunications service, wherein the telecommunications service receives at least one first message of individual first size from at least one first subscriber to the telecommunications service that is intended for at least one second subscriber of the telecommunications service. In reaction to receiving a message, the telecommunications service sends at least one second message to the at least one second subscriber, wherein the at least one second message obtains a second size. The first size cannot be conclusively deduced from the second size.
    Type: Grant
    Filed: May 6, 2016
    Date of Patent: April 9, 2019
    Assignee: Uniscon Universal Identity Control GmbH
    Inventor: Hubert Jäger
  • Publication number: 20180196761
    Abstract: A method is provided for securely and efficiently accessing connection data of at least one telecommunication provider is provided, wherein the connection data is ascertained by the telecommunication provider and is encrypted by the telecommunication provider, the encrypted connection data is transmitted from the telecommunication provider to a secured environment, the connection data is decrypted in the secured environment and, for a first predetermined time period, is stored as decrypted connection data exclusively in a volatile memory of the secured environment, and the access to the connection data is exclusively granted as access to the decrypted connection data stored in the volatile memory of the secured environment via a predetermined interface of the secured environment.
    Type: Application
    Filed: February 28, 2018
    Publication date: July 12, 2018
    Inventors: Ralf RIEKEN, Michael KELLERMANN, Hubert JÄGER, Edmund ERNST
  • Publication number: 20180121674
    Abstract: A system for reliable data processing is provided, wherein the system is implemented in a sealed infrastructure, wherein the sealed infrastructure comprises at least one processing area and a storage area, wherein the network area, the processing area, and the storage area are separated from each other physically, wherein the processing area is adapted to receive data from the storage area and/or from the network area in encrypted form, to decrypt to process the received data, and to transmit the processed data in encrypted form to the storage area and/or to the network area. Further, a method for reliable processing of data in a system according to the invention is provided.
    Type: Application
    Filed: December 22, 2017
    Publication date: May 3, 2018
    Inventors: Edmund ERNST, Franz STARK, Hubert JÄGER, Arnold MONITZER
  • Patent number: 9961539
    Abstract: A method is provided for securing telecommunications traffic data that are incurred with the telecommunications service provider of the telecommunications service when at least one telecommunications service is used by a number of subscribers is provided, wherein the telecommunications service is performed in a secure environment, the telecommunications service receives a message from at least one first subscriber of the telecommunications service, the message being intended for at least one second subscriber of the telecommunications service, and the telecommunications service, in response to the receipt of the message, sends a notification to the at least one second subscriber, wherein between the receipt of the message and the sending of the notification, a predetermined time delay is provided. Further, a system is provided for securing telecommunications traffic data is provided being adapted to execute the method according to the invention.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: May 1, 2018
    Assignee: UNISCON UNIVERSAL IDENTITY CONTROL GMBH
    Inventors: Hubert Jäger, Arnold Monitzer, Vesko Mitkov Georgiev, Christos Karatzas, Jaymin Modi, Dau Khiem Nguyen, Dieter Spillmann
  • Publication number: 20160350540
    Abstract: A method is provided for safeguarding values of attributes of a data record that can be stored in a first relational database against unauthorized access, wherein a value of a foreign key attribute of the data record refers to a key for the first relation or for a second relation, and wherein the value of the foreign key attribute is stored in a mapping relation, the values of attributes of the data record that are not foreign key attributes are stored in the first relation, and the mapping relation is stored in a volatile data memory.
    Type: Application
    Filed: August 12, 2016
    Publication date: December 1, 2016
    Inventors: Hubert JÄGER, Dau Khiem NGUYEN, Christos KARATZAS
  • Publication number: 20160255498
    Abstract: A method is provided for securing telecommunications traffic data that are incurred with the telecommunications service provider of the telecommunications service when at least one telecommunications service is used by a number of subscribers is provided, wherein the telecommunications service is performed in a secure environment, the telecommunications service receives a message from at least one first subscriber of the telecommunications service, the message being intended for at least one second subscriber of the telecommunications service, and the telecommunications service, in response to the receipt of the message, sends a notification to the at least one second subscriber, wherein between the receipt of the message and the sending of the notification, a predetermined time delay is provided. Further, a system is provided for securing telecommunications traffic data is provided being adapted to execute the method according to the invention.
    Type: Application
    Filed: December 4, 2015
    Publication date: September 1, 2016
    Inventors: Hubert JÄGER, Arnold MONITZER, Vesko Mitkov GEORGIEV, Christos KARATZAS, Jaymin MODI, Dau Khiem NGUYEN, Dieter SPILLMANN