Patents by Inventor Rainer URIAN

Rainer URIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11882101
    Abstract: According to one embodiment, a method performed by a first communication device for generating a symmetric session key for encrypted communication with a second communication device is described comprising generating a blinding value for each of a first and a second private key component, generating a blinded public key from the first private key component, the second private key component, and the blinding values using a public key generation function, transmitting the blinded public key to the second communication device for encryption of a shared secret, receiving the shared secret, generating a session key for encrypted communication with the second communication device from the shared secret, encrypting, using the session key, an information from which the blinding values are derivable and transmitting the encrypted information to the second communication device.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: January 23, 2024
    Assignee: INFINEON TECHNOLOGIES AG
    Inventor: Rainer Urian
  • Patent number: 11838431
    Abstract: A method is suggested for providing a response, wherein the method comprises: obtaining a challenge from a host, determining the response based on the challenge, determining an auxiliary value based on the response or the challenge, providing the auxiliary value to the host, obtaining a random value from the host, checking the validity of the challenge based on the random value, and providing the response to the host only if the challenge is valid. Also, corresponding methods running on the host and system are provided. Further, corresponding devices, hosts and systems are suggested.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: December 5, 2023
    Assignee: Infineon Technologies AG
    Inventors: Thomas Poeppelmann, Rainer Urian
  • Patent number: 11627002
    Abstract: A method is suggested for providing a response, wherein the method comprises: obtaining a challenge from a host, determining the response based on the challenge, determining an auxiliary value based on the response or the challenge, providing the auxiliary value to the host, obtaining a random value from the host, checking the validity of the challenge based on the random value, and providing the response to the host only if the challenge is valid. Also, according methods running on the host and system are provided. Further, corresponding devices, hosts and systems are suggested.
    Type: Grant
    Filed: May 10, 2021
    Date of Patent: April 11, 2023
    Assignee: Infineon Technologies AG
    Inventors: Thomas Poeppelmann, Rainer Urian
  • Publication number: 20230048825
    Abstract: According to various embodiments, a method for code-based generation of a key pair for asymmetric cryptography is described including generating a private key defining a linear code, determining a parity check or generator matrix for the linear code, blinding a sub-matrix of the parity check or generator matrix, generating a blinded inverse matrix by inverting the blinded sub-matrix or by inverting a quadratic matrix contained in the blinded sub-matrix, de-blinding the blinded inverse matrix to generate an inverse matrix and generating a public key for the private key using the inverse matrix.
    Type: Application
    Filed: July 5, 2022
    Publication date: February 16, 2023
    Inventor: Rainer Urian
  • Publication number: 20230037491
    Abstract: A method is suggested for providing a response, wherein the method comprises: obtaining a challenge from a host, determining the response based on the challenge, determining an auxiliary value based on the response or the challenge, providing the auxiliary value to the host, obtaining a random value from the host, checking the validity of the challenge based on the random value, and providing the response to the host only if the challenge is valid. Also, corresponding methods running on the host and system are provided. Further, corresponding devices, hosts and systems are suggested.
    Type: Application
    Filed: October 20, 2022
    Publication date: February 9, 2023
    Inventors: Thomas Poeppelmann, Rainer Urian
  • Publication number: 20220050927
    Abstract: A method is described for checking a Generalized Discrete Fourier Transform (GDFT) operation on a secured domain, the method comprising (i) calculating a first checksum based on an input, (ii) determining a result of an GDFT-based operation based on the input, (iii) calculating a second checksum based on the result, (iv) comparing the first checksum and the second checksum and (v) proceeding if the first checksum correspond to the second checksum and otherwise triggering a predefined action if the first checksum does not correspond to the second checksum. Also, an according security device is provided.
    Type: Application
    Filed: August 5, 2021
    Publication date: February 17, 2022
    Inventor: Rainer Urian
  • Publication number: 20210359868
    Abstract: A method is suggested for providing a response, wherein the method comprises: obtaining a challenge from a host, determining the response based on the challenge, determining an auxiliary value based on the response or the challenge, providing the auxiliary value to the host, obtaining a random value from the host, checking the validity of the challenge based on the random value, and providing the response to the host only if the challenge is valid. Also, according methods running on the host and system are provided. Further, corresponding devices, hosts and systems are suggested.
    Type: Application
    Filed: May 10, 2021
    Publication date: November 18, 2021
    Inventors: Thomas Poeppelmann, Rainer Urian
  • Publication number: 20210352054
    Abstract: According to one embodiment, a method performed by a first communication device for generating a symmetric session key for encrypted communication with a second communication device is described comprising generating a blinding value for each of a first and a second private key component, generating a blinded public key from the first private key component, the second private key component, and the blinding values using a public key generation function, transmitting the blinded public key to the second communication device for encryption of a shared secret, receiving the shared secret, generating a session key for encrypted communication with the second communication device from the shared secret, encrypting, using the session key, an information from which the blinding values are derivable and transmitting the encrypted information to the second communication device.
    Type: Application
    Filed: March 11, 2021
    Publication date: November 11, 2021
    Inventor: Rainer URIAN
  • Patent number: 10630475
    Abstract: A pseudonymous Diffie-Hellman protocol is provided by means of a combination of the CA protocol with the RI protocol. According to the invention the determining of the pseudonym from the RI protocol and the forming of the secure communication channel from the CA protocol occur substantially in parallel. According to the invention there is likewise employed a group key for the CA part of the protocol according to the invention. Due to the configuration of the protocol according to the invention it is not possible, in contrast to the known protocols, for an attacker who should succeed in establishing the group key of a portable data carrier according to the invention, to generate the pseudonym of another user.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: April 21, 2020
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventor: Rainer Urian
  • Publication number: 20180270061
    Abstract: A pseudonymous Diffie-Hellman protocol is provided by means of a combination of the CA protocol with the RI protocol. According to the invention the determining of the pseudonym from the RI protocol and the forming of the secure communication channel from the CA protocol occur substantially in parallel. According to the invention there is likewise employed a group key for the CA part of the protocol according to the invention. Due to the configuration of the protocol according to the invention it is not possible, in contrast to the known protocols, for an attacker who should succeed in establishing the group key of a portable data carrier according to the invention, to generate the pseudonym of another user.
    Type: Application
    Filed: December 15, 2015
    Publication date: September 20, 2018
    Inventor: Rainer URIAN
  • Publication number: 20170351867
    Abstract: A method for securely storing data on a terminal by means of a portable data carrier, wherein an attribute vector and a master key are deposited on the portable data carrier. The method comprises deriving a key from a predicate and the master key by means of a key derivation function, wherein the predicate is a Boolean function of the attribute vector; encrypting the data with the key; and storing the encrypted data together with the predicate on the terminal. Another method comprises: extracting the predicate from the encrypted data and the predicate; applying the predicate to the attribute vector; and if the attribute vector satisfies the predicate, deriving the key from the predicate and the master key by means of the key derivation function and decrypting the encrypted data.
    Type: Application
    Filed: December 14, 2015
    Publication date: December 7, 2017
    Inventor: Rainer URIAN