Patents by Inventor Thomas LOCHER

Thomas LOCHER has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10967514
    Abstract: Mechanical condition monitoring of robots can be used to detect unexpected failure of robots. Data taken from a robot operation is processed and compared against a health baseline. Features extracted during the monitoring stage of robot operation are aligned with features extracted during the training stage in which the health baseline is established by projecting both onto a common subspace. A classifier which can include a distance assessment such as an L2-norm is used within the common subspace to assess the condition of the robot. Excursions of the distance assessment from a criteria indicate a failure or potential failure.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: April 6, 2021
    Assignee: ABB Schweiz Ag
    Inventors: Arash Mahyari, Nevroz Sen, Thomas Locher, Wenzhi Gao, Dan Dai, Said Zahrai
  • Publication number: 20210097195
    Abstract: A method can be used to analyze a log of a device or a plurality of devices of a first entity. The method includes generating an encrypted log by encrypting the log at the first entity, generating an encrypted query by encrypting a query at the first entity, transferring the encrypted log and the encrypted query from the first entity to a second entity, analyzing the encrypted log on the second entity by using the encrypted query, generating an encrypted analysis result at the second entity, transferring the encrypted analysis result from the second entity to the first entity, decrypting the encrypted analysis result on the first entity, and verifying the decrypted analysis result at the first entity.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 1, 2021
    Inventors: Carsten Franke, Theo Widmer, Thomas Locher, Yvonne-Anne Pignolet
  • Patent number: 10795990
    Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: October 6, 2020
    Assignee: ABB Schweiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20200228324
    Abstract: A method for offering data with objects to be performed on the basis of the data, providing solutions to the problems and verifying the provided solutions. The method including the steps of providing a digital platform; uploading the data with the object as challenge to the platform; uploading a smart contract relating to the challenge to the platform; transferring the challenge from the platform to at least one solution provider; uploading a signed hash of the solution provider's solution of the challenge to the platform; uploading the solution provider's solution of the challenge to the platform; and evaluating at the platform the uploaded solution based on predefined conditions.
    Type: Application
    Filed: January 15, 2020
    Publication date: July 16, 2020
    Inventors: Thomas Locher, Carsten Franke, Sebastian Obermeier, Yvonne-Anne Pignolet
  • Publication number: 20200218570
    Abstract: A conflict resolution method for a remotely controlled device is provided. The method includes: issuing a command for the device by a remote control center or by the device; determining a criticality level of the command; depending on the criticality level of the command, sending the command to the other one of the device and the control center for acknowledgment or refusal of the command; and executing or disregarding the command by the device depending on the criticality level of the command and, if applicable, on the acknowledgment or refusal of the command.
    Type: Application
    Filed: March 18, 2020
    Publication date: July 9, 2020
    Inventors: Roman Schlegel, Thomas Locher
  • Patent number: 10685141
    Abstract: The invention relates to a method for storing data blocks from client devices to a cloud storage system, the method includes the steps of: d) storing an encrypted first data block and a challenge of the first data block of a first client device on the cloud storage system, e) determining if a hash of a second data block of a second client device stored on the cloud storage system equals the hash of the first data block, f) if yes, transmitting the challenge of the first data block from the cloud storage system to the second client device, g) extracting, at the second client device, the bits at the positions or at the range contained in the challenge, hashing the extracted bits, encrypting the hashed bits with a public key of the first client device or of the second client device and uploading the encrypted bits from the second client device to the cloud storage system, and h) storing the encrypted bits from the second client device on the cloud storage system.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: June 16, 2020
    Assignee: ABB Scheiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Patent number: 10680799
    Abstract: The application relates to a method for aggregation of a performance indicator of a device including: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum computed by summ
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: June 9, 2020
    Assignee: ABB Schweiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20200061833
    Abstract: Mechanical condition monitoring of robots can be used to detect unexpected failure of robots. Data taken from a robot operation is processed and compared against a health baseline. Features extracted during the monitoring stage of robot operation are aligned with features extracted during the training stage in which the health baseline is established by projecting both onto a common subspace. A classifier which can include a distance assessment such as an L2-norm is used within the common subspace to assess the condition of the robot. Excursions of the distance assessment from a criteria indicate a failure or potential failure.
    Type: Application
    Filed: August 22, 2018
    Publication date: February 27, 2020
    Inventors: Arash Mahyari, Nevroz Sen, Thomas Locher, Wenzhi Gao, Dan Dai, Said Zahrai
  • Publication number: 20200007572
    Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.
    Type: Application
    Filed: September 4, 2019
    Publication date: January 2, 2020
    Inventors: Thanikesavan Sivanthi, Thomas Locher
  • Patent number: 10482270
    Abstract: The present disclosure relates to the field of processing data in the stream processing network, such as processing data having data streams associated with multiple owners or entities. A method is disclosed of secure processing of input data by a stream processing network having first and second processing units, wherein the method can include: a) receiving input data from a communication channel, wherein the input data includes a first data stream associated with a first owner and a second data stream associated with a second owner; b) distinguishing data packets of the first data stream from that of the second data stream; and c) processing the first data stream with the first processing unit.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: November 19, 2019
    Assignee: ABS Schweiz AG
    Inventors: Martin Naedele, Thomas Locher
  • Publication number: 20190171847
    Abstract: The invention relates to a method for storing data blocks from client devices to a cloud storage system, the method includes the steps of: d) storing an encrypted first data block and a challenge of the first data block of a first client device on the cloud storage system, e) determining if a hash of a second data block of a second client device stored on the cloud storage system equals the hash of the first data block, f) if yes, transmitting the challenge of the first data block from the cloud storage system to the second client device, g) extracting, at the second client device, the bits at the positions or at the range contained in the challenge, hashing the extracted bits, encrypting the hashed bits with a public key of the first client device or of the second client device and uploading the encrypted bits from the second client device to the cloud storage system, and h) storing the encrypted bits from the second client device on the cloud storage system.
    Type: Application
    Filed: February 4, 2019
    Publication date: June 6, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20190130113
    Abstract: The present invention generally relates to a context-aware security self-assessment method or module that determines the context in which the device is used and based on this, assesses the devices security settings. The context may refer to the system environment, the applications the device is used for, and/or the current life-cycle stage of the device, without being limited to said contexts. The method of the present invention preferably prioritizes and rates the security relevant findings and presents them in combination with mitigation options through a web interface, a configuration tool, or through notifications in the control system.
    Type: Application
    Filed: September 18, 2018
    Publication date: May 2, 2019
    Inventors: Sebastian Obermeier, Roman Schlegel, Johannes Schneider, Thomas Locher, Matus Harvan
  • Patent number: 10274918
    Abstract: A programmable logic controller for an industrial control system is disclosed which includes an application logic execution layer and at least one of an update checking layer and an output checking layer. The application logic layer is configured for processing sensor input data to generate an output parameter for an actuator. The output checking layer is configured for outputting only an allowed output parameter to the actuator. The update checking layer is configured for verifying whether application logic update defined by application logic update data corresponds to an application logic update in a list of allowed logic updates, and the application logic is updated only if the update data is allowed application logic update data.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: April 30, 2019
    Assignee: ABB Research Ltd.
    Inventors: Sebastian Obermeier, Michael Wahler, Thomas Locher, Sascha Stoeter
  • Publication number: 20190116189
    Abstract: A method for controlling a device includes: sending a command signed by an operator's signature to a server; verifying, in the server, that the operator is authenticated to transmit the command; assigning, in the server, a criticality level and an authorization level to the command; depending on the criticality level and the authorization level, sending an approval request relating to the command to at least one control user; approving or denying the approval request by at least a subset of the at least one control user; sending the denied or approved approval request back to the server; determining, in the server, whether the command was approved by sufficiently many control users based on the criticality level and the authorization level; and sending the command to the device for being carried out by the device in case the command was approved by sufficiently many control users, wherein at last one of the at least one control user and the operator is remote from each other.
    Type: Application
    Filed: October 16, 2018
    Publication date: April 18, 2019
    Inventors: Roman Schlegel, Thomas Locher
  • Publication number: 20190097787
    Abstract: The invention relates to a method for aggregation of a performance indicator of a device comprising the steps of: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum comp
    Type: Application
    Filed: November 13, 2018
    Publication date: March 28, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20190089526
    Abstract: The application relates to a method for computing a probabilistic encryption scheme for encrypting a data item in an electronic device including: computing a plurality of random bit strings in a computation cluster; sending the computed plurality of random strings to the electronic device; generating a random string (rE) for using in the encryption scheme in the electronic device using a subset of the plurality of the random strings computed in the computation cluster and encrypting the data item using the random string computed in the electronic device. The present application also relates to a corresponding system and corresponding computer program product including one or more computer readable media having computer executable instructions for performing the steps of the method.
    Type: Application
    Filed: November 13, 2018
    Publication date: March 21, 2019
    Inventors: Thomas Locher, Johannes Schneider, Matus Harvan, Sebastian Obermeier, Yvonne-Anne Pignolet
  • Publication number: 20190081984
    Abstract: To commission an industrial automation control system, IACS, a computing device generates commands to automatically set or verify a security configuration of the IACS. The commands are generated by the computing device based on a machine-readable security baseline, and, optionally, based on a machine-readable configuration file of the IACS.
    Type: Application
    Filed: September 14, 2018
    Publication date: March 14, 2019
    Inventors: Thomas Locher, Thanikesavan Sivanthi
  • Publication number: 20190005233
    Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
    Type: Application
    Filed: August 13, 2018
    Publication date: January 3, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20180349740
    Abstract: A method for evaluating data is based on a computational model, the computational model comprising model data, a training function and a prediction function. The method includes training the computational model by: receiving training data and training result data for training the computational model, and computing the model data from the training data and the training result data with the training function. The method includes predicting result data by: receiving field data for predicting result data; and computing the result data from the field data and the model data with the prediction function. The training data may be plaintext and the training result data may be encrypted with a homomorphic encryption algorithm, wherein the model data may be computed in encrypted form from the training data and the encrypted training result data with the training function.
    Type: Application
    Filed: August 6, 2018
    Publication date: December 6, 2018
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20180227121
    Abstract: The present invention discloses a method for computing a secret value including a first secret using a function including an operation, comprising: computing, by a host, a first encrypted value of the first secret with a first key; sending, by the host, the first encrypted value to a value holder and the first key to a key holder, wherein the value holder and the key holder are independently trusted by the host; computing, by the value holder, a computed encrypted value from the first encrypted value using the function; and computing, by the key holder, a computed key from the first key using the function.
    Type: Application
    Filed: January 16, 2018
    Publication date: August 9, 2018
    Inventors: Johannes Schneider, Matus Harvan, Roman Schlegel, Sebastian Obermeier, Thomas Locher