Patents by Inventor Stefan Katzenbeisser

Stefan Katzenbeisser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9684770
    Abstract: A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.
    Type: Grant
    Filed: October 16, 2009
    Date of Patent: June 20, 2017
    Assignee: Koninklijke Philips N.V.
    Inventors: Rafih Berkane, Marijn Christian Damstra, Robert Paul Koster, Stefan Katzenbeisser, Milan Petkovic
  • Patent number: 8726029
    Abstract: A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.
    Type: Grant
    Filed: September 4, 2008
    Date of Patent: May 13, 2014
    Assignee: Irdeto Corporate B.V.
    Inventors: Stefan Katzenbeisser, Wilhelmus P. A. J. Michiels, Paulus M. H. M. A. Gorissen, Aweke N. Lemma, Mehmet U. Celik
  • Patent number: 8627103
    Abstract: The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
    Type: Grant
    Filed: May 18, 2009
    Date of Patent: January 7, 2014
    Assignee: Koninklijke Philips N.V.
    Inventors: Stefan Katzenbeisser, Milan Petkovic
  • Publication number: 20120108910
    Abstract: A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.
    Type: Application
    Filed: October 16, 2009
    Publication date: May 3, 2012
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Rafith Berkane, Marijn Christian Damstra, Robert Paul Koster, Stefan Katzenbeisser, Milan Petkovic
  • Publication number: 20110066863
    Abstract: The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can 5 be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.
    Type: Application
    Filed: May 18, 2009
    Publication date: March 17, 2011
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Stefan Katzenbeisser, Milan Petkovic
  • Publication number: 20100296649
    Abstract: A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.
    Type: Application
    Filed: September 4, 2008
    Publication date: November 25, 2010
    Applicant: Irdeto B.V.
    Inventors: Stefan Katzenbeisser, Wilhelmus P.A.J. Michiels, Paulus M.H.M.A. Gorissen, Aweke N. Lemma, Mehmet U. Celik
  • Publication number: 20100177888
    Abstract: A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H-1 (f(H(a),H(b)))=a+b.
    Type: Application
    Filed: July 1, 2008
    Publication date: July 15, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Aweke Negash Lemma, Mehmet Utku Celik, Minne Van Der Veen, Stefan Katzenbeisser
  • Publication number: 20100082478
    Abstract: The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity (60) to a second entity (70) includes the steps of: a transfer control entity (50) transmitting a transmission key (KA) to the first entity, the first entity storing content data comprising digital content embedded with a first watermark (WA). The first entity applies the transmission key to the content data to remove the first watermark from the digital content and encrypt the digital content. The first entity transmits the encrypted digital content (CX) to the second entity. The transfer control entity transmits a receive key (KB) to the second entity and the second entity applies the receive key to the encrypted digital content to generate decrypted data comprising the decrypted digital content embedded with a second watermark (WB).
    Type: Application
    Filed: March 10, 2008
    Publication date: April 1, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Minne Van Der Veen, Aweke Negash Lemma, Stefan Katzenbeisser, Mehmet Utku Celik
  • Publication number: 20100011441
    Abstract: Computer programs are preprocessed to produce normalized or standard versions to remove obfuscation that might prevent the detection of embedded malware through comparison with standard malware signatures. The normalization process can provide an unpacking of compressed or encrypted malware, a reordering of the malware into a standard form, and the detection and removal of semantically identified nonfunctional code added to disguise the malware.
    Type: Application
    Filed: April 23, 2008
    Publication date: January 14, 2010
    Inventors: Mihai Christodorescu, Somesh Jha, Stefan Katzenbeisser, Johannes Kinder, Helmut Veith