Patents by Inventor Jan ZIBUSCHKA

Jan ZIBUSCHKA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180123822
    Abstract: A method for processing user information detected by at least one detection device of a device, in which information concerning at least one user detected by the at least one detection device is transmitted to a number of databases, and in which the information detected by the at least one detection device is at least partially associated with a user profile, and in which all information stored on the number of databases which has been detected by the at least one detection device and associated with the user profile is retrieved from the number of databases, and as a function of a result of an authentication of the user is output to the user on at least one output unit for processing.
    Type: Application
    Filed: October 23, 2017
    Publication date: May 3, 2018
    Inventors: Jan Zibuschka, Oliver Rogalla
  • Publication number: 20180124076
    Abstract: A method for protecting a device from information attacks, in which received from the at least one device are checked by a security device, included in the at least one device, for an information attack, and for the case that the received data are associated with an information attack, characteristic data concerning the information attack are stored in the at least one device and transmitted via a communication interface to a unit in communicative connection with a plurality of devices, and the unit evaluates the characteristic data transmitted from the at least one device and outputs a warning message to at least a portion of the devices in communicative connection with the unit as a function of at least one predefined criterion.
    Type: Application
    Filed: October 30, 2017
    Publication date: May 3, 2018
    Inventors: Jan Zibuschka, Ralph Retter
  • Publication number: 20180109623
    Abstract: A telecommunication network, an authentication node, and a method for commissioning an electronically controllable vehicle component of a telecommunication network. For commissioning, the vehicle component requires a verification of authentication data that are to be acquired. For this purpose, the following is carried out: positioning a mobile data carrier in the authentication node of the traffic network, in particular in a vehicle; reading in authentication data of the mobile data carrier within the authentication node; verifying the read-in authentication data and, if verification is successful: producing a verification signal; triggering a verified commissioning of the component if the verification signal is acquired at the vehicle component or at a control device of the node at which the component is situated.
    Type: Application
    Filed: October 2, 2017
    Publication date: April 19, 2018
    Inventors: Jan Zibuschka, David Foerster, Hans Loehr
  • Publication number: 20170127266
    Abstract: Method for activating a configuration mode in a device which has a communications unit and a sensor unit, a configuration mode of the device being activated when the device detects a measured value outside a predefined measuring range via the sensor unit, and a configuration of the device by a second device via the communications unit being allowed only in the configuration mode.
    Type: Application
    Filed: October 26, 2016
    Publication date: May 4, 2017
    Inventors: Jan Zibuschka, Paulius Duplys
  • Publication number: 20170046533
    Abstract: A method is described for processing of user-specific data in a vehicle; in particular, the processing of user-specific data in control systems of a vehicle, such as a navigation system or an entertainment system, for example. For this purpose, the device for processing user-specific data is expanded by a private operating mode. In this private operating mode, there is no persistent storage of user inputs and/or the resulting processing results. After termination of the newly created private operating mode, the data stored during the private operating mode are deleted immediately.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 16, 2017
    Inventors: Ralph Retter, Stefan Schmid, Jan Zibuschka
  • Publication number: 20160330194
    Abstract: A method for excluding a participant from a group of multiple participants, in which certificates are used for an authorized communication of the participants among each other, a withdrawal request being received by one participant of the group, the withdrawal request making an identification of the participant to be excluded possible by the participant to be excluded itself, and the authorized communication being terminated by the participant when it is identifiable as the participant to be excluded based on the withdrawal request, as well as a communication system for carrying it out.
    Type: Application
    Filed: April 25, 2016
    Publication date: November 10, 2016
    Inventors: Hans Loehr, Jan Zibuschka, David Foerster
  • Publication number: 20160241404
    Abstract: A method and a device for manipulation protection, including receiving a first data packet sent from a first device by a second device, the first data packet including a first time-variant parameter; signing a concatenation of a first hash value with the first time-variant parameter and an identification of the second device with the aid of a private key of an asymmetric encryption method which is assigned to the second device, program instructions or data, which are stored on the second device and provided to be carried out during the operation of the second device, being used to determine the hash value; generating a second data packet including the signature and the concatenation; and sending the second data packet from the second device to the first device.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 18, 2016
    Inventors: Jamshid Shokrollahi, Jan Zibuschka
  • Publication number: 20160127357
    Abstract: A method for safeguarding a network made up of at least one first device and one second device. The first device derives a first challenge from physical properties of a first communication channel between the first device and the third device. In addition, the first device transmits the first challenge to the second device via a second communication channel between the first device and the second device. The first device receives a first response, corresponding to the first challenge, from the third device via the first communication channel and receives a second response, corresponding to the first challenge, from the second device via the second communication channel. The first device compares the first response and the second response to one another to verify that the second device is communicating with the third device.
    Type: Application
    Filed: October 13, 2015
    Publication date: May 5, 2016
    Inventors: Jan Zibuschka, Paulius Duplys
  • Publication number: 20150381372
    Abstract: For communication of a first participant with at least one additional participant in a communication system via multiple protocols, the protocols using at least two different certificate formats, the first participant uses different certificates with the respective certificate formats for the communication via the different protocols, the different certificates being based on a shared public key. The first participant holds a shared associated private key for the different certificates. Provision of the certificates for the first participant includes generating the public key and the associated private key, signing the public key for provision of the first certificate, and signing the public key for provision of the second certificate.
    Type: Application
    Filed: June 12, 2015
    Publication date: December 31, 2015
    Inventors: David FOERSTER, Jan ZIBUSCHKA, Jamshid SHOKROLLAHI, Hans LOEHR