Patents by Inventor Kristian Bäckström

Kristian Bäckström has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11343107
    Abstract: A system for secured logging of a second event. The system includes a logging device and a triggering device The triggering device receives an input related to the second event, creates second event message based on received input related to the second event, and receives the first set of data related to first logged event from the logging device. The triggering device further creates a first position-lock data from the first set of data, creates a second append request, and provides the second append request to the logging device. The logging device is configured to verify the second append request. Based on positive verification, the logging device creates a logging device signature over a second log-append-approval, and combines the created logging device signature with the provided second append request to form a second logged event.
    Type: Grant
    Filed: April 26, 2019
    Date of Patent: May 24, 2022
    Assignee: CONTROLTHINGS OY AB
    Inventors: Kary Främling, Kristian Bäckström, Jan Nyman, Jesper Lökfors
  • Patent number: 11184181
    Abstract: A system for assigning access rights to a user device. The system includes a source configured to serve the executable code to the user device and a target device. The target device is configured to perform at least one of creating a target device crypto-identity, which is an asymmetric cryptographic keypair consisting of a public key and a corresponding private key; and assigning itself a target device crypto-identity. Upon receiving a connection from the user device having an executable code for connecting and authenticating with a cryptographic algorithm, the target device is configured to receive a user device contact information in an executing environment of the target device and determine whether admin rights have been set in the target device. The system also includes the user device configured to use a resource identifier for obtaining the executable code from the source and executing the executable code in the user device.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: November 23, 2021
    Assignee: ControlThings Oy Ab
    Inventors: Jan Nyman, Kristian Bäckström, Jesper Lökfors
  • Publication number: 20200344074
    Abstract: A system for secured logging of a second event. The system includes a logging device and a triggering device The triggering device receives an input related to the second event, creates second event message based on received input related to the second event, and receives the first set of data related to first logged event from the logging device. The triggering device further creates a first position-lock data from the first set of data, creates a second append request, and provides the second append request to the logging device. The logging device is configured to verify the second append request. Based on positive verification, the logging device creates a logging device signature over a second log-append-approval, and combines the created logging device signature with the provided second append request to form a second logged event.
    Type: Application
    Filed: April 26, 2019
    Publication date: October 29, 2020
    Inventors: Kary Främling, Kristian Bäckström, Jan Nyman, Jesper Lökfors
  • Publication number: 20200267006
    Abstract: A system for assigning access rights to a user device. The system includes a source configured to serve the executable code to the user device and a target device. The target device is configured to perform at least one of creating a target device crypto-identity, which is an asymmetric cryptographic keypair consisting of a public key and a corresponding private key; and assigning itself a target device crypto-identity. Upon receiving a connection from the user device having an executable code for connecting and authenticating with a cryptographic algorithm, the target device is configured to receive a user device contact information in an executing environment of the target device and determine whether admin rights have been set in the target device. The system also includes the user device configured to use a resource identifier for obtaining the executable code from the source and executing the executable code in the user device.
    Type: Application
    Filed: February 20, 2019
    Publication date: August 20, 2020
    Inventors: Jan Nyman, Kristian Bäckström, Jesper Lökfors