Patents by Inventor Sven Bauer
Sven Bauer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240139894Abstract: A safety gate monitoring module is configured to monitor a state of a safety gate. A base device includes an actuator receptacle configured to receive an actuator and generates the safety gate signal in response to the actuator being inserted into the actuator receptacle. The base device includes a first interface, an axis, and a first end face arranged transversely to the axis. A mounting bracket includes a second interface configured to be coupled to the first interface of the base device in a first position, a second position rotated clockwise by 90° with respect to the first position, and a third position rotated clockwise by 90° with respect to the second position. The first and second interfaces include a mechanical blocking device that prevents coupling of the first and second interfaces in a fourth position rotated clockwise by 90° with respect to the third position.Type: ApplicationFiled: October 29, 2023Publication date: May 2, 2024Inventors: Sven Bauer, Joachim Rink, Andreas Veit
-
Patent number: 11920074Abstract: The present invention relates to a liquid crystal (LC) medium comprising a compound of formula I and one or more compounds selected from the group of compounds of the formulae IIA, IIB, IIC and IID, as defined in claim 1, and to the use of the LC medium for optical, electro-optical and electronic purposes, in particular in LC displays, especially in IPS, FFS, VA or PS-VA displays.Type: GrantFiled: December 16, 2020Date of Patent: March 5, 2024Assignee: MERCK PATENT GMBHInventors: Kaja Christina Deing, Sven Christian Laut, Monika Bauer, Sebastian Hofmeyer, Kristin Weiss
-
Patent number: 11823401Abstract: A computer-implemented method for comparing follow-up medical findings includes receiving image data showing a body part of a patient at a first time and retrieving, from a database, reference data associated to the image data. The reference data includes reference biometric data and one or more reference medical findings. Thereby the reference biometric data and the one or more reference medical findings have been extracted from reference image data depicting the body part of the patient at a second time, different than the first time. The method further includes processing the received image data to extract, from the image data, biometric data corresponding to the reference biometric data and one or more medical findings; performing a registration of the extracted biometric data with the reference biometric data; and comparing the extracted medical findings with the reference medical findings using the registration.Type: GrantFiled: November 18, 2020Date of Patent: November 21, 2023Assignee: SIEMENS HEALTHCARE GMBHInventors: Jonathan Sperl, Sven Bauer, Lutz Guendel, Rainer Kaergel
-
Publication number: 20230033417Abstract: Techniques of storing and retrieving medical data and information are provided. Medical result information can be stored on a long-term data repository in a shared network, e.g., the Internet. Pseudonymized identifiers of patients can be used to retrieve such data and information.Type: ApplicationFiled: July 26, 2022Publication date: February 2, 2023Applicant: Siemens Healthcare GmbHInventors: Jens KAFTAN, Jonathan SPERL, Nagineni MURALIDHAR CHOWDARY, Kishan VENKATESAN, Mario AMREHN, Sven BAUER
-
Patent number: 11405190Abstract: A method for setting up a subscriber identity module for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server includes generating one or several exchange keys from keys of the provisioning server and of the subscriber identity module on a production server and are transmitted into the subscriber identity module and stored, so that the subscriber identity module is put particularly into a state as though it had generated the exchange keys itself. In a method for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server, the subscriber identity module sends its public key to the provisioning server, which subsequently generates the exchange keys.Type: GrantFiled: December 14, 2016Date of Patent: August 2, 2022Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Gabriel Goller, Sven Bauer, Jürgen Pulkus, Lars Hoffmann
-
Patent number: 11128436Abstract: A processor device with a white-box masked implementation of the cryptographic algorithm AES implemented thereon, which comprises a SubBytes transformation. The white-box masked implementation is hardened in that white-box round input values x? are supplied at the round input of rounds instead of the round input values x, said white-box round input values being formed from a concatenation of: (i) the round input values x that are masked by means of the invertible masking mapping A and (ii) obfuscation values y that are likewise masked with the invertible masking mapping A; wherein from the white-box round input values x? only the (i) round input values x are fed to the SubBytes transformation T, and (ii) the masked obfuscation values y are not.Type: GrantFiled: July 12, 2017Date of Patent: September 21, 2021Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventor: Sven Bauer
-
Publication number: 20210166406Abstract: A computer-implemented method for comparing follow-up medical findings includes receiving image data showing a body part of a patient at a first time and retrieving, from a database, reference data associated to the image data. The reference data includes reference biometric data and one or more reference medical findings. Thereby the reference biometric data and the one or more reference medical findings have been extracted from reference image data depicting the body part of the patient at a second time, different than the first time. The method further includes processing the received image data to extract, from the image data, biometric data corresponding to the reference biometric data and one or more medical findings; performing a registration of the extracted biometric data with the reference biometric data; and comparing the extracted medical findings with the reference medical findings using the registration.Type: ApplicationFiled: November 18, 2020Publication date: June 3, 2021Applicant: Siemens Healthcare GmbHInventors: Jonathan SPERL, Sven BAUER, Lutz GUENDEL, Rainer KAERGEL
-
Patent number: 10805066Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon, which algorithm is adapted to produce an output text from an input text employing a secret key K. The implementation of the algorithm comprises a key-dependent computing step S which comprises a key combination of input values x derived directly or indirectly from the input text with key values SubK derived directly or indirectly from the key; the key-dependent computing step S is represented by a table which is masked with input masking and/or output masking to form a masked table TabSSubK; and a new masked table TabSKneu is generated in the processor device.Type: GrantFiled: December 7, 2016Date of Patent: October 13, 2020Assignee: GIESECKE + DEVRIENT MOBILE SECURITY GMBHInventors: Sven Bauer, Hermann Drexler, Jürgen Pulkus
-
Patent number: 10615962Abstract: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r? as computation step entry values x=r? onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.Type: GrantFiled: October 28, 2016Date of Patent: April 7, 2020Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Sven Bauer, Hermann Drexler, Jürgen Pulkus
-
Patent number: 10466040Abstract: A sensor device (100), for measuring a surface (101), includes a lighting device (103) emitting a light beam (105); an optical device (107) splitting the light beam (105) into partial light beams (109, 111), and emitting the first partial light beam (109) toward a first surface area (113) and emitting the second partial light beam (111) toward a second surface area (115). A light sensor (117) is configured to receive a first surface area reflection (109-1) of the first partial light beam (109) and a second surface area reflection (111-1) of the second partial light beam (111). A processor (119) is configured to detect a distance of the first surface area (113) and of the second surface area (115) to the sensor device (100) based on a position of the first partial light beam reflection (109-1) and the second partial light beam reflection (111-1) on the light sensor (117).Type: GrantFiled: May 25, 2017Date of Patent: November 5, 2019Assignee: BAUMER ELECTRIC AGInventors: Klaus Friedrich Müller, Sven Bauer
-
Patent number: 10438513Abstract: The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.Type: GrantFiled: October 30, 2015Date of Patent: October 8, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Publication number: 20190305930Abstract: A processor device with a white-box masked implementation of the cryptographic algorithm AES implemented thereon, which comprises a SubBytes transformation. The white-box masked implementation is hardened in that white-box round input values x? are supplied at the round input of rounds instead of the round input values x, said white-box round input values being formed from a concatenation of: (i) the round input values x that are masked by means of the invertible masking mapping A and (ii) obfuscation values y that are likewise masked with the invertible masking mapping A; wherein from the white-box round input values x? only the (i) round input values x are fed to the SubBytes transformation T, and (ii) the masked obfuscation values y are not.Type: ApplicationFiled: July 12, 2017Publication date: October 3, 2019Inventor: Sven BAUER
-
Patent number: 10431123Abstract: Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.Type: GrantFiled: November 9, 2015Date of Patent: October 1, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer
-
Patent number: 10403174Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. The affine mapping A is constructed by a construction method coordinated with the invertible mappings c1, c2, and etc.Type: GrantFiled: October 30, 2015Date of Patent: September 3, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Patent number: 10370164Abstract: A composite film for closing a container by sealing the composite film against a circumferential sealing surface of the container or of a cap ring to be connected to the container has a support layer made of a metal film and a sealing layer connected to the metal film. The sealing layer comprises a coextruded layer with a cohesively breaking intermediate layer and adhesion promoter layers arranged on both sides of the intermediate layer. The composite film is suitable for tight sealing against sealing surfaces made of polished tinplate.Type: GrantFiled: September 8, 2017Date of Patent: August 6, 2019Assignee: AMCOR FLEXIBLES SINGEN GMBHInventors: Christoph Dietrich, Klaus Hafner, Sven Bauer
-
Publication number: 20190161263Abstract: A lid ring (7) for sterilizable containers (1) is proposed which is formed from a metal ring (40) coated on both sides with at least one plastic layer (37, 43), a radially outer cut edge and a radially inner flange (31). The radially inner flange (31) is folded back on itself at least once.Type: ApplicationFiled: August 2, 2017Publication date: May 30, 2019Applicant: Amcor Flexibles Singen GMBHInventors: Sven Bauer, Andreas Ziegler
-
Patent number: 10249220Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented being white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. Multiplicities of sets Mxi, i=1, 2, . . . =Mx11, Mx12, . . . Mx21, Mx22, . . . are formed from the output values a of the affine mapping A.Type: GrantFiled: October 30, 2015Date of Patent: April 2, 2019Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
-
Publication number: 20180375649Abstract: A method for setting up a subscriber identity module for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server includes generating one or several exchange keys from keys of the provisioning server and of the subscriber identity module on a production server and are transmitted into the subscriber identity module and stored, so that the subscriber identity module is put particularly into a state as though it had generated the exchange keys itself. In a method for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server, the subscriber identity module sends its public key to the provisioning server, which subsequently generates the exchange keys.Type: ApplicationFiled: December 14, 2016Publication date: December 27, 2018Applicant: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Gabriel GOLLER, Sven BAUER, Jürgen PULKUS, Lars HOFFMANN
-
Publication number: 20180367297Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon, which algorithm is adapted to produce an output text from an input text employing a secret key K. The implementation of the algorithm comprises a key-dependent computing step S which comprises a key combination of input values x derived directly or indirectly from the input text with key values SubK derived directly or indirectly from the key; the key-dependent computing step S is represented by a table which is masked with input masking and/or output masking to form a masked table TabSSubK; and a new masked table TabSKneu is generated in the processor device.Type: ApplicationFiled: December 7, 2016Publication date: December 20, 2018Applicant: GIESECKE+DEVRIENT MOBILE SECURITY GMBHInventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS
-
Publication number: 20180309568Abstract: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r? as computation step entry values x=r? onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.Type: ApplicationFiled: October 28, 2016Publication date: October 25, 2018Inventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS