Patents by Inventor Hugo Straumann

Hugo Straumann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9740847
    Abstract: Methods and systems are provided for authentication in electronic devices using multi-level security schemes. In an electronic device, at each particular level of a plurality of security levels of a multi-level security scheme, one or more identifiers associated with the particular level may be read from a user-specific card; and for each identifier of the one or more identifiers, associated data for use in validating the identifier may be read from the user-specific card. The identifier may then be authenticated within the electronic device, using the associated data; or may be forwarded, based on the associated data, to a particular remote server for verification of the identifier. Each identifier may comprise one of: user identifier, operator identifier, and application identifier. An application associated with each identifier may be identified, and the application may be executed after a positive authentication of the identifier.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: August 22, 2017
    Assignee: SWISSCOM AG
    Inventor: Hugo Straumann
  • Publication number: 20170032116
    Abstract: Methods and systems are provided for authentication in electronic devices using multi-level security schemes. In an electronic device, at each particular level of a plurality of security levels of a multi-level security scheme, one or more identifiers associated with the particular level may be read from a user-specific card; and for each identifier of the one or more identifiers, associated data for use in validating the identifier may be read from the user-specific card. The identifier may then be authenticated within the electronic device, using the associated data; or may be forwarded, based on the associated data, to a particular remote server for verification of the identifier. Each identifier may comprise one of: user identifier, operator identifier, and application identifier. An application associated with each identifier may be identified, and the application may be executed after a positive authentication of the identifier.
    Type: Application
    Filed: July 1, 2016
    Publication date: February 2, 2017
    Inventor: Hugo Straumann
  • Patent number: 9384605
    Abstract: Methods and systems are provided for authentication of a user, such as using a user-specific card, which may provide data for implementing a plurality of security steps in an electronic device (e.g., using a particular application running therein), performed individually or in combination, such as depending on a desired security level and/or the application. The user-specific card may store a user identifier, an operator identifier, and a plurality of application identifiers, and other related data. The user identifier may be read from the user-specific card and may be authenticated. The operator identifier may be read from the user-specific card and may then be forwarded to a server of an operator, which may then verify the operator identifier. Further, additional information for the user may be requested from the server. An application identifier may be read from the user-specific card and may be verified.
    Type: Grant
    Filed: May 6, 2015
    Date of Patent: July 5, 2016
    Assignee: SWISSCOM AG
    Inventor: Hugo Straumann
  • Publication number: 20150235491
    Abstract: Methods and systems are provided for authentication of a user, such as using a user-specific card, which may provide data for implementing a plurality of security steps in an electronic device (e.g., using a particular application running therein), performed individually or in combination, such as depending on a desired security level and/or the application. The user-specific card may store a user identifier, an operator identifier, and a plurality of application identifiers, and other related data. The user identifier may be read from the user-specific card and may be authenticated. The operator identifier may be read from the user-specific card and may then be forwarded to a server of an operator, which may then verify the operator identifier. Further, additional information for the user may be requested from the server. An application identifier may be read from the user-specific card and may be verified.
    Type: Application
    Filed: May 6, 2015
    Publication date: August 20, 2015
    Inventor: Hugo Straumann
  • Patent number: 9047497
    Abstract: A user may be authenticated by an application. The user may be in possession of a user-specific card, which may store a user ID (UID), an operator ID (SID), and a plurality of application IDs (AIDn), and other related data. The card may provide data for implementing a plurality of security steps, performed individually or in combination, as chosen depending on a desired security level and/or the application. In a first security step, the application may read from the card the user ID (UID) from the card. In a second security step, the application may read out the operator ID (SID) and forward it to a server of an operator, which may then verify the operator ID (SID). In a third security step, the application may read out and verify its corresponding application ID (AIDn). The application may request additional information for the user from the server, using the user ID (UID).
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: June 2, 2015
    Assignee: SWISSCOM AG
    Inventor: Hugo Straumann
  • Publication number: 20130119128
    Abstract: A user may be authenticated by an application. The user may be in possession of a user-specific card, which may store a user ID (UID), an operator ID (SID), and a plurality of application IDs (AIDn), and other related data. The card may provide data for implementing a plurality of security steps, performed individually or in combination, as chosen depending on a desired security level and/or the application. In a first security step, the application may read from the card the user ID (UID) from the card. In a second security step, the application may read out the operator ID (SID) and forward it to a server of an operator, which may then verify the operator ID (SID). In a third security step, the application may read out and verify its corresponding application ID (AIDn). The application may request additional information for the user from the server, using the user ID (UID).
    Type: Application
    Filed: November 16, 2012
    Publication date: May 16, 2013
    Inventor: Hugo Straumann
  • Patent number: 7196610
    Abstract: An access control system comprises a plurality of access control devices in each of which is stored an access code. Specific access codes and access rights for a plurality of access control devices are transmitted from an access control central unit over a mobile radio network to the mobile communication terminal of a user. Transmitted to the mobile communication terminal by an access control device to be passed is an access control device identification. In the mobile communication terminal, on the basis of the received identification, the access code and the access rights for the access control device to be passed are determined, and are transmitted to the access control device. The access control device clears the user for access if the received access rights suffice and the received access code agrees with the stored access code.
    Type: Grant
    Filed: January 23, 2003
    Date of Patent: March 27, 2007
    Assignee: Swisscom AG
    Inventors: Hugo Straumann, Felix Baessler
  • Publication number: 20030151493
    Abstract: An access control system comprises a plurality of access control devices in each of which is stored an access code. Specific access codes and access rights for a plurality of access control devices are transmitted from an access control central unit over a mobile radio network to the mobile communication terminal of a user. Transmitted to the mobile communication terminal by an access control device to be passed is an access control device identification. In the mobile communication terminal, on the basis of the received identification, the access code and the access rights for the access control device to be passed are determined, and are transmitted to the access control device. The access control device clears the user for access if the received access rights suffice and the received access code agrees with the stored access code.
    Type: Application
    Filed: January 23, 2003
    Publication date: August 14, 2003
    Applicant: Swisscom AG
    Inventors: Hugo Straumann, Felix Baessler