Patents by Inventor Philippe Teuwen

Philippe Teuwen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120137088
    Abstract: An electronic component is provided having a plurality of functionalities. The electronic component comprises a control logic, and a non-volatile storage element. The control logic is coupled to the non-volatile storage element and is adapted for storing values in the non-volatile storage element based on an external input signal to the electronic component, each value being indicative for one or more functionalities of the plurality of functionalities. The control logic is adapted for controlling the availability of the plurality of functionalities based on one or more values stored in the non-volatile storage element and for outputting a confirmation signal being indicative for the availability of the plurality of functionalities.
    Type: Application
    Filed: November 29, 2011
    Publication date: May 31, 2012
    Applicant: NXP B.V.
    Inventor: Philippe Teuwen
  • Publication number: 20120131340
    Abstract: Aspects of the present disclosure are directed toward a method that includes a physically-unclonable function (PUF) device that receives a communication that includes a first challenge value, a second challenge value and a remote message authenticity value. The method includes the generation of additional challenge-response pairs in a secure manner. The additional challenge-response pairs are securely communicated between the PUF device and an authenticating server or other device for subsequent use in authentication.
    Type: Application
    Filed: November 19, 2010
    Publication date: May 24, 2012
    Inventors: Philippe Teuwen, Ventzislav Nikov
  • Publication number: 20110055592
    Abstract: A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation.
    Type: Application
    Filed: August 26, 2010
    Publication date: March 3, 2011
    Applicant: NXP B.V.
    Inventors: Philippe Teuwen, Ventzislav Nikov
  • Publication number: 20100161994
    Abstract: Method of authenticating optical discs (10) to a rendering device (50), wherein the disc (10) comprises media content (90), a second database (80) with second authentication data (81) and a transponder (30), the method comprising the steps of: a) Receiving a challenge (C1) from a rendering device (50) by the transponder (30), b) Determining a response (R1) to the challenge (C1) by the transponder (30), and c) Sending the response (R1) to the rendering device (50) by the transponder (30).
    Type: Application
    Filed: March 15, 2007
    Publication date: June 24, 2010
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Javier Serret Avila, Wim Ton, Philippe Teuwen, Pim Theo Tuyls, Marijke G.C.S. De Soete
  • Publication number: 20090015385
    Abstract: A method and system for secure RFID system communication is provided. The RFID system comprises an RFID reader (101) communicating with an RFID tag (102). The RFID reader (101) sends (116) to the RFID tag (102) a request to write. The RFID tag (102) generates random data (P), and sends (122) the random data (P) to the RFID reader (101). The RFID system encrypts information (M2) by using the random data (P), and the RFID reader (101) sends (124) the encrypted information (E) to the RFID tag (102) which decrypts the information (E) by using the random data (P). Finally the RFID tag (102) stores (126) the decrypted information (M2) on a memory (103) of the RFID tag (102).
    Type: Application
    Filed: June 1, 2006
    Publication date: January 15, 2009
    Applicant: NXP B.V.
    Inventors: Philippe Teuwen, Peter Thueringer
  • Publication number: 20080320587
    Abstract: Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that th.—device identification displayed on the host device matches that printed on the peripheral diwice, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device.
    Type: Application
    Filed: August 31, 2005
    Publication date: December 25, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Marc Vauclair, Javier Serret Avila, Lionel Georges Etienne, Philippe Teuwen
  • Publication number: 20080256361
    Abstract: The present invention relates to a method, for watermarking a processing module (105), said processing module (105) being configured to process an electronic signal thereby forming a processed signal, comprising the steps of applying a first functional operator (104) arranged to cause a significant alternation to said processed signal, said first operator (104) being embedded in said processing module (105), and arranging a second functional operator (109) configured to co-operate with said first operator (104) such that said alternation is essentially cancelled. The second operator (109) is adapted to act as an extractable identifier serving as a watermark for said processing module (105). An advantage with the method is the fact that since the first and the second operators are implemented as functional processing blocks, conventional debugging tools can not be used to attack the processing module.
    Type: Application
    Filed: September 25, 2006
    Publication date: October 16, 2008
    Applicant: NXP B.V.
    Inventor: Philippe Teuwen