Patents by Inventor Sven Bauer

Sven Bauer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190173257
    Abstract: Disclosed are optical arrangements including: a disk-shaped laser-active medium, a deflecting device, having a plurality of mirror elements on which mirror faces for deflecting a laser beam are formed, and having a base body on which the mirror elements are fastened, the mirror faces of the mirror elements being oriented in such a way that the laser beam is deflected by a respective mirror face via the disk-shaped laser-active medium to another mirror face. The mirror elements are formed in one piece or are monolithically joined, and have a connecting section that is formed rotationally symmetrically with respect to a center axis and is rigidly connected by a material-fit connection or a direct connection to the base body.
    Type: Application
    Filed: January 25, 2019
    Publication date: June 6, 2019
    Inventors: Dominik Bauer, Alexander Killi, Sven-Silvius Schad
  • Publication number: 20190161263
    Abstract: A lid ring (7) for sterilizable containers (1) is proposed which is formed from a metal ring (40) coated on both sides with at least one plastic layer (37, 43), a radially outer cut edge and a radially inner flange (31). The radially inner flange (31) is folded back on itself at least once.
    Type: Application
    Filed: August 2, 2017
    Publication date: May 30, 2019
    Applicant: Amcor Flexibles Singen GMBH
    Inventors: Sven Bauer, Andreas Ziegler
  • Publication number: 20190157846
    Abstract: A connector plug is described for connecting an ignition coil to a spark plug, comprising an electrical conductor, which has a first end for contacting the ignition coil and a second end for contacting the spark plug, and a protective tube, which surrounds the electrical conductor. In accordance with this disclosure it is proposed that the protective tube has a predetermined bending point with a reduced bending stiffness.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 23, 2019
    Inventors: Sven Schumm, Manfred Adolf, Manuel Bauer, Dirk Wüstenhagen, Alexander Stark
  • Patent number: 10249220
    Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented being white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. Multiplicities of sets Mxi, i=1, 2, . . . =Mx11, Mx12, . . . Mx21, Mx22, . . . are formed from the output values a of the affine mapping A.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: April 2, 2019
    Assignee: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventors: Hermann Drexler, Sven Bauer, Jürgen Pulkus
  • Publication number: 20180375649
    Abstract: A method for setting up a subscriber identity module for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server includes generating one or several exchange keys from keys of the provisioning server and of the subscriber identity module on a production server and are transmitted into the subscriber identity module and stored, so that the subscriber identity module is put particularly into a state as though it had generated the exchange keys itself. In a method for agreeing one or several exchange keys, between a subscriber identity module and a provisioning server, the subscriber identity module sends its public key to the provisioning server, which subsequently generates the exchange keys.
    Type: Application
    Filed: December 14, 2016
    Publication date: December 27, 2018
    Applicant: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventors: Gabriel GOLLER, Sven BAUER, Jürgen PULKUS, Lars HOFFMANN
  • Publication number: 20180367297
    Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon, which algorithm is adapted to produce an output text from an input text employing a secret key K. The implementation of the algorithm comprises a key-dependent computing step S which comprises a key combination of input values x derived directly or indirectly from the input text with key values SubK derived directly or indirectly from the key; the key-dependent computing step S is represented by a table which is masked with input masking and/or output masking to form a masked table TabSSubK; and a new masked table TabSKneu is generated in the processor device.
    Type: Application
    Filed: December 7, 2016
    Publication date: December 20, 2018
    Applicant: GIESECKE+DEVRIENT MOBILE SECURITY GMBH
    Inventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS
  • Publication number: 20180309568
    Abstract: A processor device has an executable implementation of the cryptographic algorithm DES implemented with an XOR linkage operation at the round exit and an implemented computation step S arranged to map expanded right input values r? as computation step entry values x=r? onto exit values s=S[x]. The computation step S is implemented as a key-dependent computation step further comprises a key linkage operation for linking input values of the round with key values of the round derived directly or indirectly from the key. The computation step S is implemented as a combined key-dependent computation step T which further comprises: a permutation operation P associated with the round, arranged to be applied to exit values s of the computation step S and to supply the exit values s of the computation step in permutated form to the XOR linkage operation at the round exit.
    Type: Application
    Filed: October 28, 2016
    Publication date: October 25, 2018
    Inventors: Sven BAUER, Hermann DREXLER, Jürgen PULKUS
  • Publication number: 20180022520
    Abstract: A composite film for closing a container by sealing the composite film against a circumferential sealing surface of the container or of a cap ring to be connected to the container has a support layer made of a metal film and a sealing layer connected to the metal film. The sealing layer comprises a coextruded layer with a cohesively breaking intermediate layer and adhesion promoter layers arranged on both sides of the intermediate layer. The composite film is suitable for tight sealing against sealing surfaces made of polished tinplate.
    Type: Application
    Filed: September 8, 2017
    Publication date: January 25, 2018
    Applicant: AMCOR FLEXIBLES SINGEN GMBH
    Inventors: Christoph Dietrich, Klaus Hafner, Sven Bauer
  • Publication number: 20170352298
    Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented being white-box-masked by a function f. The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. Multiplicities of sets Mxi, i=1, 2, . . . =Mx11, Mx12, . . . Mx21, Mx22, . . . are formed from the output values a of the affine mapping A.
    Type: Application
    Filed: October 30, 2015
    Publication date: December 7, 2017
    Applicant: GIESECKE & DEVRIENT GMBH
    Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
  • Publication number: 20170343337
    Abstract: A sensor device (100), for measuring a surface (101), includes a lighting device (103) emitting a light beam (105); an optical device (107) splitting the light beam (105) into partial light beams (109, 111), and emitting the first partial light beam (109) toward a first surface area (113) and emitting the second partial light beam (111) toward a second surface area (115). A light sensor (117) is configured to receive a first surface area reflection (109-1) of the first partial light beam (109) and a second surface area reflection (111-1) of the second partial light beam (111). A processor (119) is configured to detect a distance of the first surface area (113) and of the second surface area (115) to the sensor device (100) based on a position of the first partial light beam reflection (109-1) and the second partial light beam reflection (111-1) on the light sensor (117).
    Type: Application
    Filed: May 25, 2017
    Publication date: November 30, 2017
    Inventors: Klaus Friedrich MÜLLER, Sven BAUER
  • Publication number: 20170324547
    Abstract: Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise while processing the machine commands of the white-box implementation stepwise; (c) repeating the steps (a) and (b) with a further plaintext of the plurality of plaintexts N-times; and (d) statistically evaluating the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts by searching for correlations between the contents of the registers and the plaintexts, the intermediate results and/or the ciphertexts generated from the plaintexts to establish the secret key.
    Type: Application
    Filed: November 9, 2015
    Publication date: November 9, 2017
    Applicant: GIESECKE & DEVRIENT GMBH
    Inventors: Hermann DREXLER, Sven BAUER
  • Publication number: 20170324542
    Abstract: A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f The implementation comprises an implemented computation step S by which input values x are mapped to output values s=S[x], and which is masked to a white-box-masked computation step T? by means of an invertible function f. As a mapping f there is provided a combination (f=(c1, c2, . . . )*A) of an affine mapping A having an entry width BA and a number of one or several invertible mappings c1, c2, . . . having an entry width Bc1, Bc2, . . . respectively, wherein BA=Bc1+Bc2+ . . . . Output values w are generated altogether by the mapping f. The affine mapping A is constructed by a construction method coordinated with the invertible mappings c1, c2, and etc.
    Type: Application
    Filed: October 30, 2015
    Publication date: November 9, 2017
    Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
  • Publication number: 20170324543
    Abstract: The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping A, which is so designed that every bit in the output values w of the affine mapping A depends on at least one bit of the obfuscation values y, thereby attaining that the output values w of the affine mapping A are statistically balanced.
    Type: Application
    Filed: October 30, 2015
    Publication date: November 9, 2017
    Inventors: Hermann DREXLER, Sven BAUER, Jürgen PULKUS
  • Patent number: 9790010
    Abstract: A composite film for closing a container by sealing the composite film against a circumferential sealing surface of the container or of a cap ring to be connected to the container has a support layer made of a metal film and a sealing layer connected to the metal film. The sealing layer comprises a coextruded layer with a cohesively breaking intermediate layer and adhesion promoter layers arranged on both sides of the intermediate layer. The composite film is suitable for tight sealing against sealing surfaces made of polished tinplate.
    Type: Grant
    Filed: February 20, 2012
    Date of Patent: October 17, 2017
    Assignee: AMCOR FLEXIBLES SINGEN GMBH
    Inventors: Christoph Dietrich, Klaus Hafner, Sven Bauer
  • Patent number: 9147064
    Abstract: A method for carrying out an application with the help of a portable data carrier, wherein the data carrier includes two separated communication interfaces. According to the method, a user transmits via a first terminal specified input data for processing by the application to a server via a first data connection between the first terminal and the server. Then, authentication data for authenticating the application based on the input data of the server are transmitted via a second data connection between the server and the data carrier which is connected via the first communication interface with the first terminal. The authentication data are then transmitted from the data carrier via a third data connection to the second terminal. The third data connection is realized by means of the second communication interface.
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: September 29, 2015
    Assignee: GIESCKE & DEVRIENT GMBH
    Inventor: Sven Bauer
  • Patent number: 9074586
    Abstract: A hydrostatic machine, has first and second axial-piston units arranged on a common axis and having pistons which cooperate with an adjustable swash plates, wherein the first axial-piston unit has a first one of the swash plates associated with it while the second axial-piston unit has a second one of the swash plates associated with it, and a coupling mechanism which couples the first and the second swash plates mechanically and adjustably.
    Type: Grant
    Filed: May 25, 2011
    Date of Patent: July 7, 2015
    Assignee: CLAAS Selbstfahrende Erntemaschinen GmbH
    Inventors: Heinrich Dueckinghaus, Burkhard Seibel, Sven Bauer
  • Patent number: 9058484
    Abstract: A method and a system for checking whether program instructions have been executed by an end device, wherein, the end device calls for program instructions and the program instructions are stored in executable form in a trustworthy entity, in particular a chip card. Subsequently, the program instructions are variably modified in the trustworthy entity such that the modified program instructions vary upon each execution of the method. Through execution of the instructions in the end device there is obtained a check value which is in turn transferred to the trustworthy entity and verified in the trustworthy entity.
    Type: Grant
    Filed: May 6, 2011
    Date of Patent: June 16, 2015
    Assignee: GIESECKE & DEVRIENT GMBH
    Inventor: Sven Bauer
  • Publication number: 20140231434
    Abstract: A composite film for closing a container by sealing the composite film against a circumferential sealing surface of the container or of a cap ring to be connected to the container has a support layer made of a metal film and a sealing layer connected to the metal film. The sealing layer comprises a coextruded layer with a cohesively breaking intermediate layer and adhesion promoter layers arranged on both sides of the intermediate layer. The composite film is suitable for tight sealing against sealing surfaces made of polished tinplate.
    Type: Application
    Filed: February 20, 2012
    Publication date: August 21, 2014
    Applicant: AMCOR FLEXIBLE SINGEN GMBH
    Inventors: Christoph Dietrich, Klaus Hafner, Sven Bauer
  • Publication number: 20130060939
    Abstract: A method and a system for checking whether program instructions have been executed by an end device, wherein, the end device calls for program instructions and the program instructions are stored in executable form in a trustworthy entity, in particular a chip card. Subsequently, the program instructions are variably modified in the trustworthy entity such that the modified program instructions vary upon each execution of the method. Through execution of the instructions in the end device there is obtained a check value which is in turn transferred to the trustworthy entity and verified in the trustworthy entity.
    Type: Application
    Filed: May 6, 2011
    Publication date: March 7, 2013
    Applicant: Giesecke & Devrient GmbH
    Inventor: Sven Bauer
  • Publication number: 20120030745
    Abstract: A method for carrying out an application with the help of a portable data carrier, wherein the data carrier includes two separated communication interfaces. According to the method, a user transmits via a first terminal specified input data for processing by the application to a server via a first data connection between the first terminal and the server. Then, authentication data for authenticating the application based on the input data of the server are transmitted via a second data connection between the server and the data carrier which is connected via the first communication interface with the first terminal, The authentication data are then transmitted from the data carrier via a third data connection to the second terminal. The third data connection is realized by means of the second communication interface.
    Type: Application
    Filed: March 31, 2010
    Publication date: February 2, 2012
    Inventor: Sven Bauer