Patents by Inventor Stefan Katzenbeisser
Stefan Katzenbeisser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9684770Abstract: A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.Type: GrantFiled: October 16, 2009Date of Patent: June 20, 2017Assignee: Koninklijke Philips N.V.Inventors: Rafih Berkane, Marijn Christian Damstra, Robert Paul Koster, Stefan Katzenbeisser, Milan Petkovic
-
Patent number: 8726029Abstract: A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.Type: GrantFiled: September 4, 2008Date of Patent: May 13, 2014Assignee: Irdeto Corporate B.V.Inventors: Stefan Katzenbeisser, Wilhelmus P. A. J. Michiels, Paulus M. H. M. A. Gorissen, Aweke N. Lemma, Mehmet U. Celik
-
Patent number: 8627103Abstract: The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.Type: GrantFiled: May 18, 2009Date of Patent: January 7, 2014Assignee: Koninklijke Philips N.V.Inventors: Stefan Katzenbeisser, Milan Petkovic
-
Publication number: 20120108910Abstract: A method of performing measurement of a subject comprises measuring a physiological parameter of a subject, deriving data from the measured parameter, optionally, obtaining metadata relating to the measurement of the physiological parameter, determining the quality of the derived data from the derived data and/or the obtained metadata, and if the determined quality matches a predefined criteria, performing a predefined corrective action. In one embodiment, the method further comprises calculating one or more qualifiers from the derived data and/or from the obtained metadata, and wherein the step of determining the quality of the derived data comprises determining the quality of the derived data from the calculated qualifiers.Type: ApplicationFiled: October 16, 2009Publication date: May 3, 2012Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Rafith Berkane, Marijn Christian Damstra, Robert Paul Koster, Stefan Katzenbeisser, Milan Petkovic
-
Publication number: 20110066863Abstract: The invention uses the concept of identity-based encryption in the context of data-centric protection of electronic health records, where each data item is encrypted by using its own identifier as a public key. The corresponding decryption keys are managed by special trusted entities, which distribute the keys to authorized parties and provide logging facilities. This approach has the particular advantage that emergency access mechanisms can 5 be implemented in a secure and extremely efficient way. In contrast to previous approaches, it requires no large-scale distribution of secret decryption keys. Furthermore, the scheme allows limiting the impact of a compromised decryption key, as one key can only be used to decrypt one single document.Type: ApplicationFiled: May 18, 2009Publication date: March 17, 2011Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Stefan Katzenbeisser, Milan Petkovic
-
Publication number: 20100296649Abstract: A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for being applied according to a predetermined look-up scheme. The look-up scheme prescribes that an output of a first look-up table of the plurality of look-up tables be used to generate an input of a second look-up table of the plurality of look-up tables. The combined cryptographic and watermarking operation comprises a cryptographic operation and a watermarking operation. A control module looks up values in the plurality of look-up tables in dependence on the received content and in accordance to the look-up scheme, thereby applying the combined cryptographic and watermarking operation to the content.Type: ApplicationFiled: September 4, 2008Publication date: November 25, 2010Applicant: Irdeto B.V.Inventors: Stefan Katzenbeisser, Wilhelmus P.A.J. Michiels, Paulus M.H.M.A. Gorissen, Aweke N. Lemma, Mehmet U. Celik
-
Publication number: 20100177888Abstract: A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H-1 (f(H(a),H(b)))=a+b.Type: ApplicationFiled: July 1, 2008Publication date: July 15, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Aweke Negash Lemma, Mehmet Utku Celik, Minne Van Der Veen, Stefan Katzenbeisser
-
Publication number: 20100082478Abstract: The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity (60) to a second entity (70) includes the steps of: a transfer control entity (50) transmitting a transmission key (KA) to the first entity, the first entity storing content data comprising digital content embedded with a first watermark (WA). The first entity applies the transmission key to the content data to remove the first watermark from the digital content and encrypt the digital content. The first entity transmits the encrypted digital content (CX) to the second entity. The transfer control entity transmits a receive key (KB) to the second entity and the second entity applies the receive key to the encrypted digital content to generate decrypted data comprising the decrypted digital content embedded with a second watermark (WB).Type: ApplicationFiled: March 10, 2008Publication date: April 1, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Minne Van Der Veen, Aweke Negash Lemma, Stefan Katzenbeisser, Mehmet Utku Celik
-
Publication number: 20100011441Abstract: Computer programs are preprocessed to produce normalized or standard versions to remove obfuscation that might prevent the detection of embedded malware through comparison with standard malware signatures. The normalization process can provide an unpacking of compressed or encrypted malware, a reordering of the malware into a standard form, and the detection and removal of semantically identified nonfunctional code added to disguise the malware.Type: ApplicationFiled: April 23, 2008Publication date: January 14, 2010Inventors: Mihai Christodorescu, Somesh Jha, Stefan Katzenbeisser, Johannes Kinder, Helmut Veith