Patents by Inventor Stephan Krenn

Stephan Krenn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240133587
    Abstract: A PTC heating element for an electric heater having a PTC element, an electrode formed on a surface of the PTC element for electrically contacting the PTC element, at least one additional contact for electrically connecting the electrode of the PTC element, and a carrier layer. The carrier layer is electrically insulating, the thickness of the PTC element is ?500 ?m, and the installation height of the PTC heating element is between 500 ?m and 2500 ?m. Also disclosed is an electric heater and use of the PTC heating element in a motor vehicle.
    Type: Application
    Filed: February 14, 2022
    Publication date: April 25, 2024
    Inventors: Markus Koini, Michael Krenn, Markus Puff, Stephan Bigl
  • Patent number: 11128445
    Abstract: A method creates and distributes cryptographic keys for securing communication at two terminals. Signals for creating correlated values in the two terminals are distributed via a first communication channel burdened with error, and the correlated values are present as keys. A checksum is formed on the basis of the first key present in the first terminal and the checksum is transferred to the second terminal via a second communication channel. A second checksum is formed on the basis of the second key present, and information derived from the two checksums is transferred via the second communication channel to a server. Based on the information derived from the checksums, the server determines a correction value, which, when applied to one or both keys, brings the keys into correspondence. The correction value is transferred to one or both terminals via the second communication channel and is applied to one or both keys.
    Type: Grant
    Filed: March 13, 2018
    Date of Patent: September 21, 2021
    Assignee: AIT Austrian Institute of Technology GmbH
    Inventors: Stephan Krenn, Thomas Loruesner, Bernhard Schrenk, Christoph Pacher
  • Patent number: 10884846
    Abstract: A method for checking the availability and integrity of a data object stored on a plurality of servers and having a number N of data words. For the distributed storage on the servers, the data object is fragmented. Each fragment is transmitted to and stored on one server. To check the availability and integrity of the fragments stored on the servers, the same random number is sent from an auditor unit to the servers. A checksum is created by the servers, in each case modified by application of the random number to the data of the respective fragment, and the checksum is transmitted to the auditor unit. The auditor unit uses the consistency check to determine whether the individual checksums sent by the servers are consistent and, if this is the case, establishes the availability and integrity of the data.
    Type: Grant
    Filed: August 1, 2017
    Date of Patent: January 5, 2021
    Assignee: AIT Austrian Institute of Technology GmbH
    Inventors: Thomas Loruenser, Stephan Krenn
  • Publication number: 20200052891
    Abstract: A method creates and distributes cryptographic keys for securing communication at two terminals. Signals for creating correlated values in the two terminals are distributed via a first communication channel burdened with error, and the correlated values are present as keys. A checksum is formed on the basis of the first key present in the first terminal and the checksum is transferred to the second terminal via a second communication channel. A second checksum is formed on the basis of the second key present, and information derived from the two checksums is transferred via the second communication channel to a server. Based on the information derived from the checksums, the server determines a correction value, which, when applied to one or both keys, brings the keys into correspondence. The correction value is transferred to one or both terminals via the second communication channel and is applied to one or both keys.
    Type: Application
    Filed: March 13, 2018
    Publication date: February 13, 2020
    Inventors: STEPHAN KRENN, THOMAS LORUENSER, BERNHARD SCHRENK, CHRISTOPH PACHER
  • Patent number: 10554419
    Abstract: A method for a re-issuance of an attribute-based credential of an issuer of the attribute-based credential for a user may be provided. The user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair. The method comprises receiving by the issuer from the user a set of values derived from the backup values comprising a second value of the at least one authentication pair, validating by the issuer that the second value is a valid authentication answer with respect to the first value and whether the set of values was derived from a valid first credential, and providing by the issuer a second credential to the user based on the first set of values.
    Type: Grant
    Filed: July 17, 2017
    Date of Patent: February 4, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jan L. Camenisch, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Publication number: 20190188071
    Abstract: A method for checking the availability and integrity of a data object stored on a plurality of servers and having a number N of data words. For the distributed storage on the servers, the data object is fragmented. Each fragment is transmitted to and stored on one server. To check the availability and integrity of the fragments stored on the servers, the same random number is sent from an auditor unit to the servers. A checksum is created by the servers, in each case modified by application of the random number to the data of the respective fragment, and the checksum is transmitted to the auditor unit. The auditor unit uses the consistency check to determine whether the individual checksums sent by the servers are consistent and, if this is the case, establishes the availability and integrity of the data.
    Type: Application
    Filed: August 1, 2017
    Publication date: June 20, 2019
    Inventors: THOMAS LORUENSER, STEPHAN KRENN
  • Patent number: 10057060
    Abstract: A user computer generates a secret cryptographic key through communication with a server. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. In response to input of an input password, the user computer encodes the secret user value and the input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first value and check value to check whether the input password equals the user password. If so, the server encodes the first value and secret server value to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Grant
    Filed: August 18, 2017
    Date of Patent: August 21, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jan Camenisch, Robert Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Publication number: 20170373846
    Abstract: A user computer generates a secret cryptographic key through communication with a server. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. In response to input of an input password, the user computer encodes the secret user value and the input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first value and check value to check whether the input password equals the user password. If so, the server encodes the first value and secret server value to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Application
    Filed: August 18, 2017
    Publication date: December 28, 2017
    Inventors: Jan CAMENISCH, Robert ENDERLEIN, Stephan KRENN, Anja LEHMANN, Gregory NEVEN
  • Patent number: 9847877
    Abstract: Methods and apparatus are provided for generating a secret cryptographic key of a user computer connectable to a server via a network. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. The user computer encodes the secret user value and an input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first and the check values to check whether the input password equals the user password. If so, the server encodes the first and the secret server values to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Grant
    Filed: August 26, 2015
    Date of Patent: December 19, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jan Camenisch, Robert Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Publication number: 20170317839
    Abstract: A method for a re-issuance of an attribute-based credential of an issuer of the attribute-based credential for a user may be provided. The user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair. The method comprises receiving by the issuer from the user a set of values derived from the backup values comprising a second value of the at least one authentication pair, validating by the issuer that the second value is a valid authentication answer with respect to the first value and whether the set of values was derived from a valid first credential, and providing by the issuer a second credential to the user based on the first set of values.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: Jan L. Camenisch, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Patent number: 9755840
    Abstract: A method for a re-issuance of an attribute-based credential of an issuer of the attribute-based credential for a user may be provided. The user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair. The method comprises receiving by the issuer from the user a set of values derived from the backup values comprising a second value of the at least one authentication pair, validating by the issuer that the second value is a valid authentication answer with respect to the first value and whether the set of values was derived from a valid first credential, and providing by the issuer a second credential to the user based on the first set of values.
    Type: Grant
    Filed: May 22, 2015
    Date of Patent: September 5, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jan L. Camenisch, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Publication number: 20160065366
    Abstract: Methods and apparatus are provided for generating a secret cryptographic key of a user computer connectable to a server via a network. A secret user value is provided at the user computer. A secret server value is provided at the server with a check value which encodes the secret user value and a user password. The user computer encodes the secret user value and an input password to produce a first value corresponding to said check value, and communicates the first value to the server. The server compares the first and the check values to check whether the input password equals the user password. If so, the server encodes the first and the secret server values to produce a second value and communicates the second value to the user computer. The user computer generates the secret cryptographic key by encoding the second value, the input password and the secret user value.
    Type: Application
    Filed: August 26, 2015
    Publication date: March 3, 2016
    Inventors: Jan CAMENISCH, Robert ENDERLEIN, Stephan KRENN, Anja LEHMANN, Gregory NEVEN
  • Publication number: 20150381373
    Abstract: A method for a re-issuance of an attribute-based credential of an issuer of the attribute-based credential for a user may be provided. The user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair. The method comprises receiving by the issuer from the user a set of values derived from the backup values comprising a second value of the at least one authentication pair, validating by the issuer that the second value is a valid authentication answer with respect to the first value and whether the set of values was derived from a valid first credential, and providing by the issuer a second credential to the user based on the first set of values.
    Type: Application
    Filed: May 22, 2015
    Publication date: December 31, 2015
    Inventors: Jan L. Camenisch, Stephan Krenn, Anja Lehmann, Gregory Neven
  • Patent number: 4858843
    Abstract: A fabric web delivery apparatus is provided with a pivotable and vertically adjustable fabric delivery arm having a driven delivery roller at its outward end and also with an independently reciprocable cuttle arm enabling selective positioning of the delivery arm for disposition of the delivery roller alternatively for feeding a traveling fabric web to the cuttle arm for folding the web in pleats, or for peripheral driving contact with a fabric winding roll of a surface-driven fabric winder, or for guiding a traveling fabric web to a fabric winding roll of an axis-driven fabric winder, or for operation as a support roller for a fabric winding roll of a rising-type fabric winder.
    Type: Grant
    Filed: August 22, 1988
    Date of Patent: August 22, 1989
    Assignee: A. Monforts GmbH & Co.
    Inventors: Franz J. Gierse, Manfred Pabst, Heinz Hermanns, Karl Ippers, Stephan Krenn, Friedrich Huppe, Carl H. Opgenoorth, Conrad Wolters