Patents by Inventor Johannes Zwanzger

Johannes Zwanzger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11784790
    Abstract: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set is used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream is output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
    Type: Grant
    Filed: January 13, 2020
    Date of Patent: October 10, 2023
    Inventors: Hans Aschauer, Gökçe Aydos, Markus Heintel, Johannes Zwanzger
  • Patent number: 11657183
    Abstract: A method for providing restricted access to hardware component interfaces of a network device by one or more software components of the network device, wherein an access to a hardware component interface requested by a software component is permitted by a mandatory access control, MAC, mechanism implemented as part of the network device's operating system on the basis of a MAC security policy including access rights defined as access relations between software component security labels assigned to software component types and hardware component interface security labels assigned to hardware component interface types.
    Type: Grant
    Filed: October 18, 2018
    Date of Patent: May 23, 2023
    Inventors: Rainer Falk, Christian Peter Feist, Johannes Zwanzger
  • Patent number: 11341216
    Abstract: Provided is a method for computer-aided obfuscation of program code, wherein a plurality of calculation steps is implemented in the program code, wherein predetermined calculation steps of the plurality of calculation steps are retrieved in a predetermined order with the execution of the program code, and at least some of the predetermined calculation steps are predefined calculation steps in which a respective first table that is stored in the program code and includes of a plurality of digital first tabular values is accessed in order to read a first tabular value required for the respective predefined calculation step from the first table. As part of the obfuscation of the program code, a dynamic mask formed by a plurality of digital mask values is used, wherein, for any predefined calculation step, another mask value is used to replace the first tabular value from the first table with a second tabular value.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: May 24, 2022
    Inventor: Johannes Zwanzger
  • Publication number: 20220159004
    Abstract: A method for granting access to objects by entities in a computerized system includes: providing an access control list (ACL) specifying for each object access rights to the objects of the computerized system; assigning a capability requirement information to at least one of the objects in the ACL; assigning a capability information to at least one entity of the entities in the computerized system; requesting access to an object by an entity; checking if the requesting entity has an access right in accordance with the ACL; and granting access to the requested object by the requesting entity only when the capability information assigned to the requesting entity matches with the capability requirement information assigned to the requested object. The combination of an ACL based access to files with capabilities improves the security of the system.
    Type: Application
    Filed: February 18, 2020
    Publication date: May 19, 2022
    Inventors: Fabrizio De Santis, Rainer Falk, Christian Peter Feist, Aliza Maftun, Johannes Zwanzger
  • Publication number: 20220158822
    Abstract: Keystream generators for secure data transmission, the keystream generators being operated in counter mode, against repeated or improper generation of an already generated keystream and to protect the data transmission against repeated use of a keystream, so-called reuse are provided. The keystream generator is operated, with respect to realization options, selectively in one of two operating modes, an encryption operating mode and a decryption operating mode. In the encryption operating mode, a keystream generated on the basis of a first control data set used to encrypt data, in particular payload data, to form cipher-data, the product of ciphered data or payload data. In the decryption operating mode, a keystream generated on the basis of a second control data set is used to decrypt the cipher-data. The keystream output only if the generation of the keystream from the encryption of a counter value of the keystream generator operated in counter mode with a block cipher key is error-free.
    Type: Application
    Filed: January 13, 2020
    Publication date: May 19, 2022
    Inventors: Hans Aschauer, Gökçe Aydos, Markus Heintel, Johannes Zwanzger
  • Publication number: 20220150056
    Abstract: Provided a method for configuring a security module with at least one derived key, having the following steps: providing a key; deriving a further key from the provided key or from a key previously derived from the provided key, wherein the further key is derived by using an alterable digital fingerprint as key derivation parameter, which is formed on the basis of a measurable current runtime configuration of a runtime environment communicating with the security module.
    Type: Application
    Filed: March 16, 2020
    Publication date: May 12, 2022
    Inventors: Rainer Falk, Christian Peter Feist, Johannes Zwanzger
  • Publication number: 20210192083
    Abstract: A method for providing restricted access to hardware component interfaces of a network device by one or more software components of the network device, wherein an access to a hardware component interface requested by a software component is permitted by a mandatory access control, MAC, mechanism implemented as part of the network device's operating system on the basis of a MAC security policy including access rights defined as access relations between software component security labels assigned to software component types and hardware component interface security labels assigned to hardware component interface types.
    Type: Application
    Filed: October 18, 2018
    Publication date: June 24, 2021
    Inventors: Rainer Falk, Christian Peter Feist, Johannes Zwanzger
  • Patent number: 10715517
    Abstract: A retrieval device for secure retrieval of optical information for a first device from a light source of a second device includes, a housing made from at least one material which is opaque for the light emitted from the light source. The housing is arranged to contain the light from at least a part of the light source. The retrieval device includes an attachment adapted to detachably attach the housing to the second device, a light receiver arranged to receive optical information from the light source, said light receiver located inside the housing, and a connector arranged to transfer an optical and/or electrical signal from the light receiver to the first device.
    Type: Grant
    Filed: April 18, 2019
    Date of Patent: July 14, 2020
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Hans Aschauer, Steffen Fries, Markus Heintel, Wolfgang Klasen, Axel Pfau, Franz Sperl, Georg Trummer, Johannes Zwanzger, Rainer Falk
  • Patent number: 10692403
    Abstract: A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.
    Type: Grant
    Filed: May 31, 2017
    Date of Patent: June 23, 2020
    Assignee: Siemens Aktiengesellschaft
    Inventors: Hans Aschauer, Rainer Falk, Kai Fischer, Steffen Fries, Markus Heintel, Anton Sebastian Huber, Wolfgang Klasen, Joachim Koppers, Axel Pfau, Georg Trummer, Johannes Zwanzger, Franz Sperl, Bernhard Quendt
  • Publication number: 20200042677
    Abstract: Provided is a method for computer-aided obfuscation of program code, wherein a plurality of calculation steps is implemented in the program code, wherein predetermined calculation steps of the plurality of calculation steps are retrieved in a predetermined order with the execution of the program code, and at least some of the predetermined calculation steps are predefined calculation steps in which a respective first table that is stored in the program code and includes of a plurality of digital first tabular values is accessed in order to read a first tabular value required for the respective predefined calculation step from the first table. As part of the obfuscation of the program code, a dynamic mask formed by a plurality of digital mask values is used, wherein, for any predefined calculation step, another mask value is used to replace the first tabular value from the first table with a second tabular value.
    Type: Application
    Filed: December 13, 2017
    Publication date: February 6, 2020
    Inventor: Johannes Zwanzger
  • Publication number: 20190334891
    Abstract: Provided is a retrieval device for secure retrieval of optical information for a first device from a light source of a second device, including: a housing made from at least one material which is opaque for the light emitted from the light source, wherein the housing is arranged to contain the light from at least a part of the light source, an attachment adapted to detachably attach the housing to the second device, a light receiver arranged to receive optical information from the light source, said light receiver located inside the housing, a connector arranged to transfer an optical and/or electrical signal from the light receiver to the first device.
    Type: Application
    Filed: April 18, 2019
    Publication date: October 31, 2019
    Inventors: Hans Aschauer, Steffen Fries, Markus Heintel, Wolfgang Klasen, Axel Pfau, Franz Sperl, Georg Trummer, Johannes Zwanzger, Rainer Falk
  • Patent number: 9960913
    Abstract: The invention relates to a first network unit (See) which comprises a secure hardware component (HK) for saving and running software. A second network unit (P) comprises a secure software component (SK) for saving and running software. A method for secure communication comprises: saving a first common secret, a first algorithm and a second algorithm on the network units; sending a first date from the second network unit to the first network unit; running the first algorithm on the first network unit and on the second network unit wherein the input is in each case formed by the second common secret and the first date; sending of a second date from the first network unit to the second network unit; running the second algorithm on the first network unit and on the second network unit; wherein the input is formed in each case by the second common secret and the second date; and use of the third common secret for a secure communication.
    Type: Grant
    Filed: September 16, 2013
    Date of Patent: May 1, 2018
    Assignee: Siemens Aktiengesellschaft
    Inventors: Stefan Pyka, Johannes Zwanzger
  • Publication number: 20170352297
    Abstract: A modular security control device for controlling an apparatus or an installation includes a basic control apparatus which is configured such that an apparatus or an installation which is at least connectable to the basic control apparatus is at least controllable via a sequence of a control program in the basic control apparatus, and includes a security module which is configured to provide or perform a cryptographic functionality for the basic control apparatus, where the security module is connected to the basic control apparatus by a data connection via a data interface, the basic control apparatus is configured to interact with the security module to achieve a security function of the security control device, and where the basic control apparatus is configured to query an identity and/or authenticity of the security module.
    Type: Application
    Filed: May 31, 2017
    Publication date: December 7, 2017
    Inventors: Hans ASCHAUER, Rainer FALK, Kai FISCHER, Steffen FRIES, Markus HEINTEL, Anton Sebastian HUBER, Wolfgang KLASEN, Joachim KOPPERS, Axel PFAU, Georg TRUMMER, Johannes ZWANZGER, Franz SPERL, Bernhard QUENDT
  • Publication number: 20150334096
    Abstract: The invention relates to a first network unit (See) which comprises a secure hardware component (HK) for saving and running software. A second network unit (P) comprises a secure software component (SK) for saving and running software. A method for secure communication comprises: saving a first common secret, a first algorithm and a second algorithm on the network units; sending a first date from the second network unit to the first network unit; running the first algorithm on the first network unit and on the second network unit wherein the input is in each case formed by the second common secret and the first date; sending of a second date from the first network unit to the second network unit; running the second algorithm on the first network unit and on the second network unit; wherein the input is formed in each case by the second common secret and the second date; and use of the third common secret for a secure communication.
    Type: Application
    Filed: September 16, 2013
    Publication date: November 19, 2015
    Inventors: Stefan Pyka, Johannes Zwanzger