Patents by Inventor Marcel Jacomet
Marcel Jacomet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220047845Abstract: A catheter includes a catheter tube and a Flexible Printed Circuit Board, FPCB, wherein the FPCB covers essentially the catheter circumference for predetermined FPCB transducer segment length, especially at the distal portion, wherein the FPCB in the FPCB transducer segment includes a scaffold structure with a plurality of FPCB free spaces and one FPCB free surface portion creating maximum mechanical stability with the least amount of material and a FPCB scaffold structure which ensures maximum flexibility. The FPCB includes transducer patches which are connected by traces on the straight scaffolds of the scaffold structure. The FPCB free spaces are configured for preventing, circumventing and/or compensating the kinking behavious of the catheter tube.Type: ApplicationFiled: August 13, 2021Publication date: February 17, 2022Inventors: Thomas Niederhauser, Gerhard Kuert, Marcel Jacomet, Reto Andreas Wildhaber
-
Patent number: 8341714Abstract: A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance configured to check said personal data; (c) a key record data memory configured to store at least one identity credential of an authentication server or of an application operator; (d) a transmitter and receiver unit configured to create a secure channel directly or indirectly to said authentication server or application operator to handle said key record relating to said authentication server or application operator, respectively; (e) a control unit configured to control the transmitter and receiver unit and the key record data memory in view of said handling, wherein the control unit is configured to perform one of: interpreting, deciphering, creating, checking, renewing, withdrawing and further key record handling actions. A method for authentication of a user using the security token is also disclosed.Type: GrantFiled: December 20, 2006Date of Patent: December 25, 2012Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 8266434Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: GrantFiled: May 10, 2010Date of Patent: September 11, 2012Inventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 8044947Abstract: A method for transmitting a coded information to a user via a graphical display. The method comprises the step of obtaining coded information by a scanner, which has to be positioned near the graphical display. The coded information is transmitted to a number of code points that are arranged in the direction of the fast refresh rate of the display.Type: GrantFiled: November 22, 2006Date of Patent: October 25, 2011Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20110107093Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: ApplicationFiled: May 10, 2010Publication date: May 5, 2011Applicant: Berner Fachhochschule Hochschule FurInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 7730308Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: GrantFiled: April 11, 2006Date of Patent: June 1, 2010Assignee: Axsionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20100066697Abstract: A pressure measurement device and a pressure measurement method are provided, the pressure to be measured being exerted by an object onto a contact area of the pressure measurement device. The pressure measurement device comprises an image acquisition module having the contact area, image data of an elastically structured subsurface of the object being recorded. The pressure is determined and output according to the color and/or brightness values of selectively recorded image data. In particular, the invention relates to methods and devices for coordinate acquisition, navigation input, authentication of a user and for command and text input, embodied on a basis of the pressure measurement device according to the invention.Type: ApplicationFiled: September 14, 2009Publication date: March 18, 2010Applicant: AXSionics AGInventors: Marcel Jacomet, Lorenz Müller, Josef Goette, Roger Cattin, Andreas Eicher, Alain Rollier
-
Publication number: 20090320118Abstract: A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance configured to check said personal data; (c) a key record data memory configured to store at least one identity credential of an authentication server or of an application operator; (d) a transmitter and receiver unit configured to create a secure channel directly or indirectly to said authentication server or application operator to handle said key record relating to said authentication server or application operator, respectively; (e) a control unit configured to control the transmitter and receiver unit and the key record data memory in view of said handling, wherein the control unit is configured to perform one of: interpreting, deciphering, creating, checking, renewing, withdrawing and further key record handling actions. A method for authentication of a user using the security token is also disclosed.Type: ApplicationFiled: December 20, 2006Publication date: December 24, 2009Applicant: AXSIONICS AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 7636854Abstract: The invention concerns a security device (10) for online transaction between a service provider equipped with a computer (15) and operator equipped with a computerized station comprising a display (16) and a keyboard (18). The device essentially comprises: a signal receiving element (22) designed to be pressed against said display (16) for receiving a signal coming from said computer (15), said signal being processed to generate a code, and communication means (24) to provide the operator with access to said code. It further comprises a biometric sensor (26) adapted to acquire data concerning the operator, and a locking and unlocking member arranged between the signal receiving element (22) and the communication means (24), the code being accessible only in case of conformity between the read fingerprint and the stored imprint.Type: GrantFiled: May 2, 2002Date of Patent: December 22, 2009Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet
-
Publication number: 20090039156Abstract: Current electronic cards, such as, for example, proximity cards, smartcards for short, can transmit data to a reader unit over a range of up to about 10 cm. Boosters are used to improve convenience which in essence represent a wireless extension. This is however not adequate with regards to autonomy, function (as a result of termination) and for the differing applications. A method is disclosed in which the transmission of service-specific codes, stored on a number of different smartcards, to a portable device is carried out. The portable device then transmits one or more of the codes via several different communication connections so that access to a service can be activated. By providing services to the corresponding authorized communication connection a modular system is achieved, permitting multiple access for a user to services.Type: ApplicationFiled: December 19, 2006Publication date: February 12, 2009Applicants: AXISONICS AG, SIEMENS SCHWEIZ AGInventors: Willi Brandli, Bruno Wenger, Roger Cattin-Liebl, Marcel Jacomet, Lorenz Muller, Alain Rollier
-
Publication number: 20070133839Abstract: A method for transmitting a coded information to a user via a graphical display. The method comprises the step of obtaining coded information by a scanner, which has to be positioned near the graphical display. The coded information is transmitted to a number of code points that are arranged in the direction of the fast refresh rate of the display.Type: ApplicationFiled: November 22, 2006Publication date: June 14, 2007Applicants: BERNER FACHHOCHSCHULE TECHNIK UND INFORMATIK, AXSIONICS AGInventors: Lorenz Muller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20060230268Abstract: A method for setting up a secure communication line between a user and a service provider using non-secure communication channels within an insecure network, comprising the steps of transmitting an identity token from a user station to a service provider station both coupled to the insecure network; upon reception of the identity token, triggering the creation of a secret URL by the service provider station; transmitting the secret URL within a secure side channel to the user station; obtaining, within the user station, the secret URL, and setting-up a new communication path in the insecure network linking the user and the service provider station based on said secret URL. Beside discarding a man-in-the-middle by denying him access to the data flow it is also possible to stop him through denying him access to the content of the data flow. Such access can be denied through use of a one-time codebook with semantics only known to the User and the authentication service provider.Type: ApplicationFiled: April 11, 2006Publication date: October 12, 2006Applicants: Berner Fachhochschule Hochschule fur Technik und Architektur Biel, AXSionics AGInventors: Lorenz Muller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Publication number: 20040230812Abstract: The invention relates to an authentication system having a security apparatus which can check all three authenticating factor types for authentications (personal subject matter, secret, biometric characteristic), having an authorizing device and having a certifying institution, in which case their private keys, the public keys on the subscribing authorizing devices and the public keys of the connected users can be stored in this certifying institution. Furthermore, authentication means are provided there, by means of which an appropriately coded report can be produced, which can be passed via the authorizing device to the user. The user decodes this message and transmits the resultant authorization code via the authorizing device to the certifying institution. After checking the code in this certifying institution, a response which comprises confirmation or rejection is transmitted to the authorizing device.Type: ApplicationFiled: May 14, 2004Publication date: November 18, 2004Applicant: BERNER FACHHOCHSCHULEInventors: Lorenz Muller, Marcel Jacomet, Roger Cattin-Liebl
-
Publication number: 20040148510Abstract: The invention concerns a security device (10) for online transaction between a service provider equipped with a computer (15) and operator equipped with a computerised station comprising a display (16) and a keyboard (18). The device essentially comprises: a signal receiving element (22) designed to be pressed against said display (16) for receiving a signal coming from said computer (15), said signal being processed to generate a code, and communication means (24) to provide the operator with access to said code. It further comprises a biometric sensor (26) adapted to acquire data concerning the operator, and a locking and unlocking member arranged between the signal receiving element (22) and the communication means (24), the code being accessible only in case of conformity between the read fingerprint and the stored imprint.Type: ApplicationFiled: November 3, 2003Publication date: July 29, 2004Inventors: Lorenz Muller, Marcel Jacomet