Patents by Inventor Peter Buhler
Peter Buhler has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100125729Abstract: A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received.Type: ApplicationFiled: March 12, 2009Publication date: May 20, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Baentsch, Reto Hermann, Thorsten Kramp, Thomas D. Weigold, Peter Buhler, Thomas Eirich, Tamas Visegrady
-
Publication number: 20100017459Abstract: The invention is directed to a method for a software provider to enable a software-acquiring entity to arrive from an existent first signed piece of code at a second signed piece of code. Both pieces of code were generated at the software provider by use of a first software archive generator under use of generation instructions. The software provider provides to the software-acquiring entity a difference code that comprises the steps necessary to arrive from the first signed piece of code at the second signed piece of code. The difference code is combinable at the software-acquiring entity with the first signed piece of code by a second software archive generator to generate the second signed piece of code. The second software archive generator is therefor to be fed with those generation instructions that were used by the first software archive generator for the generation of both pieces of code.Type: ApplicationFiled: June 25, 2008Publication date: January 21, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thomas D. Weigold
-
Publication number: 20090327732Abstract: The present invention relates to digitally signing of electronic documents which are to be kept secure for a very long time, thereby taking into account future cryptographic developments which could render current cryptographic key-lengths insufficient. In accordance with the invention a double signature is issued for each document. A first digital signature (DTS) ensures the long time security, whilst a second digital signature (DUS) ensures the involvement of an individual user. Thereby, the second digital signature is less computationally intensive in its generation than the first digital signature.Type: ApplicationFiled: May 28, 2008Publication date: December 31, 2009Inventors: Peter Buhler, Klaus Kursawe, Roman Maeder, Michael Osborne
-
Publication number: 20090265776Abstract: Methods and apparatus are provided for authenticating communications between a user computer and a server via a data communications network. A security device has memory containing security data, and security logic to use the security data to generate an authentication response to an authentication message received from the server in use. An interface device communicates with the security device. The interface device has a receiver for receiving from the user computer an authentication output containing the authentication message sent by the server to the user computer in use, and interface logic adapted to extract the authentication message from the authentication output and to send the authentication message to the security device. Includes a communications interface for connecting to the server via a communications channel bypassing the user computer. Either the security device or interface device sends the authentication response to the server via the communications channel bypassing the user computer.Type: ApplicationFiled: April 17, 2009Publication date: October 22, 2009Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Michael Peter Kuyper-Hammond, Michael Charles Osborne, Tamas Visegrady
-
Publication number: 20090248580Abstract: A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents off the inputted data.Type: ApplicationFiled: April 1, 2008Publication date: October 1, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Thomas Weigold
-
Patent number: 7543159Abstract: Provides a data processing system comprising a processor and encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. The second persistent memory stores a cryptographic key for decrypting the encrypted information, generating therefrom unencrypted information that is usable by the processor for executing an operation. The cryptographic key may be used for encrypting the unencrypted information, generating the encrypted information. Also provided is a method of processing such a data-processing system with an operating system, comprising writing unencrypted information into the first persistent memory, encrypting the unencrypted information under use of the first cryptographic key, creating therefrom encrypted information in the first persistent memory, and setting the data-processing system to a state in which writing into the first persistent memory is controlled by the operating system.Type: GrantFiled: November 5, 2002Date of Patent: June 2, 2009Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Publication number: 20090132808Abstract: A system and method of performing electronic transactions between a server computer and a client computer. The method implements a communication protocol with encrypted data transmission and mutual authentication between a server and a hardware device via a network, performs a decryption of encrypted server responses, forwards the decrypted server responses from the hardware device to the client computer, displays the decrypted server responses on a client display, receives requests to be sent from the client computer to the server, parses the client requests for predefined transaction information by the hardware device, encrypts and forwards client requests, displays the predefined transaction information upon detection, forwards and encrypts the client request containing the predefined transaction information to the server if a user confirmation is received, and cancels the transaction if no user confirmation is received.Type: ApplicationFiled: November 19, 2008Publication date: May 21, 2009Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Reto Josef Hermann, Thorsten Kramp, Tamas Visegrady, Thomas Weigold
-
Patent number: 7506175Abstract: A technique for language verification of a Java® card CAP file is provided. The Java® card CAP file is converted from an original Java® code file while conserving its original Java® semantics. The Java® card CAP file is converted into a corresponding converted Java® code file that is semantically identical to the Java® card CAP file. In a language-verification step, the converted Java® code file is then verified if it has been found to comply with a predetermined language specification.Type: GrantFiled: November 5, 2001Date of Patent: March 17, 2009Assignee: International Business Machines CorporationInventors: Michael Baentsch, Thomas Eirich, Peter Buhler, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Publication number: 20080250244Abstract: The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key.Type: ApplicationFiled: April 4, 2008Publication date: October 9, 2008Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Thomas Weigold
-
Publication number: 20080226076Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: ApplicationFiled: May 22, 2008Publication date: September 18, 2008Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas D. Weigold
-
Publication number: 20080222427Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information.Type: ApplicationFiled: May 2, 2008Publication date: September 11, 2008Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas D. Weigold
-
Patent number: 7412480Abstract: The invention is directed to a method for a software provider to enable a software-acquiring entity to arrive from an existent first signed piece of code at a second signed piece of code. Both pieces of code were generated at the software provider by use of a first software archive generator under use of generation instructions. The software provider provides to the software-acquiring entity a difference code that comprises the steps necessary to arrive from the first signed piece of code at the second signed piece of code. The difference code is combinable at the software-acquiring entity with the first signed piece of code by a second software archive generator to generate the second signed piece of code. The second software archive generator is therefor to be fed with those generation instructions that were used by the first software archive generator for the generation of both pieces of code.Type: GrantFiled: June 28, 2001Date of Patent: August 12, 2008Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thomas D. Weigold
-
Publication number: 20080168307Abstract: A method for transactional writing of data into a persistent memory comprising memory cells includes a transactional writing step and a transaction recovery step. The transactional writing step comprises one or more memory cell writing steps comprising the sub-steps of writing in a transaction buffer as transaction buffer entry the current data value and the corresponding address of the respective memory cell, writing a first valid marker for the memory cell in the transaction buffer, and writing a new data value to the memory cell. The transaction recovery step is performed in case of an abortion of the transactional writing step for restoring the current data values of the aborted transaction in the persistent memory, the transaction recovery step comprising the sub-step of writing a transaction recovery marker to the transaction buffer indicating the start of the transaction recovery.Type: ApplicationFiled: December 21, 2007Publication date: July 10, 2008Applicant: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Frank Horing, Thorsten Kramp, Thomas Weigold
-
Publication number: 20070165911Abstract: A method for authentication by biometric data, including receiving a biometric data set; evaluating if the received biometric data set is within a reference region, wherein the reference region represents a region associated with a reference biometric data set; evaluating if the received biometric data set is within a blackout region, wherein the blackout region represents a region associated with at least one previously received and positively authenticated biometric data set; and issuing a positive authentication if the received biometric data set is within the reference region, but outside the blackout region.Type: ApplicationFiled: December 22, 2006Publication date: July 19, 2007Applicant: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Christopher Kenyon
-
Patent number: 7194633Abstract: The invention is directed to a data-processing system comprising a processor, a second encrypted cryptographic key stored in a first persistent memory, and a cryptographic co-processor that comprises a first register and a second register. The cryptographic co-processor serves for decrypting in a decryption step the second encrypted cryptographic key, thereby generating therefrom a second unencrypted cryptographic key that is usable by the processor for executing an operation. For the decryption step the first register is loadable with the second encrypted cryptographic key and the second register is loadable with a first cryptographic key. The resulting second unencrypted cryptographic key is maintainable in one of the registers for being used by the cryptographic co-processor for decrypting encrypted information or encrypting unencrypted information for the operation.Type: GrantFiled: October 30, 2002Date of Patent: March 20, 2007Assignee: International Business Machines CorporationInventors: Matthias Kaiserswerth, Peter Buhler
-
Publication number: 20060288216Abstract: The present invention relates to digitally signing of electronic documents which are to be kept secure for a very long time, thereby taking into account future cryptographic developments which could render current cryptographic key-lengths insufficient. In accordance with the invention a double signature is issued for each document. A first digital signature (DTS) ensures the long time security, whilst a second digital signature (DUS) ensures the involvement of an individual user. Thereby, the second digital signature is less computationally intensive in its generation than the first digital signature.Type: ApplicationFiled: March 3, 2004Publication date: December 21, 2006Inventors: Peter Buhler, Klaus Kursawe, Roman Maeder, Michael Osborne
-
Publication number: 20060168657Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.Type: ApplicationFiled: October 24, 2003Publication date: July 27, 2006Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thorsten Kramp, Marcus Oestreicher, Michael Osborne, Thomas Weigold
-
Publication number: 20060090081Abstract: The invention is directed to a data-processing system comprising a processor and first encrypted information in a first persistent memory whose level of information leakage is higher than that of a second persistent memory. In the second persistent memory is stored a first cryptographic key for decrypting the first encrypted information, thereby generating therefrom first unencrypted information that is usable by the processor for executing an operation. The same cryptographic key may also be used for encrypting the first unencrypted information, thereby generating the first encrypted information.Type: ApplicationFiled: November 5, 2002Publication date: April 27, 2006Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Marcus Oestreicher, Thomas Weigold
-
Patent number: 6889303Abstract: The invention is directed to a method for distinguishing reachable objects and non-reachable objects in an object-based application in a system with a volatile memory and a non-volatile memory. The object-based application operates in the non-volatile memory on the objects, whereof at least one is a root object. Each root object is processed by writing for each object that is reachable from the root object, a positive reachability information into the volatile memory and marking those objects in the non-volatile memory as reusable memory, for which no positive reachability information is present in the volatile memory.Type: GrantFiled: March 9, 2001Date of Patent: May 3, 2005Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Eirich Thomas, Frank Hoering, Marcus Oestreicher
-
Patent number: 6792612Abstract: A Java runtime system is proposed which comprises a stack-based interpreter executing a program that comprises bytecodes and class structures. The system further comprises a modified constant pool with internal information of use only during linking and with external information to be preserved for late code binding. The internal information is removed from the modified constant pool after linking.Type: GrantFiled: September 21, 2000Date of Patent: September 14, 2004Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Marcus Oestreicher