Patents by Inventor Willem Bos

Willem Bos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250255316
    Abstract: A joint cutting apparatus for providing a cut in a wing or leg of a poultry carcass which is being moved in a transport direction by a conveyor is disclosed. The wing includes at least a joint connecting at least a first bone and a second bone and joint tissue surrounding the joint. The joint cutting apparatus comprises a joint guide having a guiding surface configured to engage the poultry carcass at the joint tissue, and a blade arranged configured to make a cut in the joint tissue at a cutting location defined by the joint guide, wherein the guiding surface is elongated and corrugated when seen in the transport direction.
    Type: Application
    Filed: October 9, 2023
    Publication date: August 14, 2025
    Applicant: Marel Poultry B.V.
    Inventors: Jan Willem Bos, Marinus Petrus Johannes Thijssen, Paul Godefridus Gerardus Arnts, Maurice Eduardus Theodorus Van Esbroeck
  • Patent number: 12388654
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for digital signature method based in a processor, the instructions, including: performing p1/k iterations of a parallel chained hash function for a first signature calculation, wherein p1 is the total number of chained hashes to be calculated for the first signature and k is the number of parallel hashes performed by the parallel chained hash function; performing a parallel chained hash function on remaining remainder(p1/k) chained hashes from the first signature calculation and X=k?remainder(p1/k) chained hashes from a second signature calculation; and performing (p2?X)/k iterations of a parallel chained hash function for the second signature calculation, wherein p2 is the total number of chained hashes to be calculated for the second signature.
    Type: Grant
    Filed: December 21, 2022
    Date of Patent: August 12, 2025
    Assignee: NXP B.V.
    Inventors: Christine van Vredendaal, Joppe Willem Bos
  • Patent number: 12329169
    Abstract: Deskinning device for removing skin from a poultry leg product, comprising a first leg end which comprises at least a part of an ankle joint, and a second leg end opposite to the first leg end, the first leg end being arranged at a higher level than the second leg end, wherein the device comprises at least one skin removal assembly which is adapted to carry out a deskinning process, a first skinning roller rotatable about an axis of rotation, wherein a first roller end is arranged at a higher level than a second roller end, a counter skinning member arranged adjacent said first skinning roller, a gap between the first skinning roller and the counter skinning member, wherein the skin removal assembly is adapted to pull the skin of the poultry leg product into the gap and towards the first roller end.
    Type: Grant
    Filed: December 17, 2021
    Date of Patent: June 17, 2025
    Assignee: Marel Poultry B.V.
    Inventors: Maurice Eduardus Theodorus Van Esbroeck, Jan Willem Bos
  • Patent number: 12177363
    Abstract: Various embodiments relate to a fault detection system and method for a digital signature algorithm, including: producing a digital signature of a message using a digital signature algorithm; storing parameters from a last round of the digital signature algorithm; executing the last round of the digital signature algorithm using the stored parameters to produce a check signature; comparing the digital signature to the check signature; and outputting the digital signature when the digital signature is the same as the check signature.
    Type: Grant
    Filed: October 11, 2022
    Date of Patent: December 24, 2024
    Assignee: NXP B.V.
    Inventors: Joost Roland Renes, Melissa Azouaoui, Joppe Willem Bos, Björn Fay, Tobias Schneider
  • Publication number: 20240289094
    Abstract: A data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for performing a modular multiplication of a first operand a and a second operand b in a DILITHIUM digital signature algorithm in a processor, the instructions, including: calculate S=c1·213?c1+c0 (mod q) wherein a·b1=c1·223+c0, 0?a·b1<233, the modulus q=223?213+1, and b=b1·213+b0; calculate T=d1?d0·210+d0 (mod q) wherein d=a·b0=d1·213+d0, 0?d<236, 0?d1<223, and 0?d0<213; calculate c=S+T?a·b·2?13 (mod q); and calculate a digital signature of a message using the calculated a·b.
    Type: Application
    Filed: February 17, 2023
    Publication date: August 29, 2024
    Inventors: Joppe Willem Bos, Yulia Kuzovkova
  • Patent number: 12047491
    Abstract: Various embodiments relate to a hardware device configured to compute a plurality of chained hash functions in parallel, including: a processor implementing p hash functions configured to operate on a small input, where p is an integer; a data unit connected to the plurality of hash functions, configured to store the outputs of plurality of hash functions that are then used as the input to a next round of computing the hash function, wherein the processor receives a single instruction and p small data inputs, and wherein each of the p hash functions are used to perform a chained hash function operation on a respective small input of the p small inputs.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: July 23, 2024
    Assignee: NXP B.V.
    Inventors: Joppe Willem Bos, Mario Lamberger, Joost Roland Renes, Tobias Schneider, Christine van Vredendaal
  • Publication number: 20240223380
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for digital signature method based in a processor, the instructions, including: performing p1/k iterations of a parallel chained hash function for a first signature calculation, wherein p1 is the total number of chained hashes to be calculated for the first signature and k is the number of parallel hashes performed by the parallel chained hash function; performing a parallel chained hash function on remaining remainder(p1/k) chained hashes from the first signature calculation and X=k?remainder(p1/k) chained hashes from a second signature calculation; and performing (p2?X)/k iterations of a parallel chained hash function for the second signature calculation, wherein p2 is the total number of chained hashes to be calculated for the second signature.
    Type: Application
    Filed: December 21, 2022
    Publication date: July 4, 2024
    Inventors: Christine van Vredendaal, Joppe Willem Bos
  • Publication number: 20240202273
    Abstract: Various embodiments relate to a fault detection system and method for polynomial operations, including: selecting a plurality of evaluation points; evaluating a first polynomial at the plurality of evaluation points to produce first results; applying a first function to the first polynomial to produce a second polynomial; evaluating the second polynomial at the plurality of evaluation points second results; evaluating a second scalar function on the first results to produce third results; comparing the second results to the third results; and performing a polynomial operation using the second polynomial when the second results match the third results.
    Type: Application
    Filed: December 15, 2022
    Publication date: June 20, 2024
    Inventors: Björn FAY, Tobias SCHNEIDER, Joost Roland Renes, Melissa Azouaoui, Joppe Willem Bos
  • Publication number: 20240146535
    Abstract: Various embodiments relate to a fault detection system and method for a digital signature algorithm, including: producing a digital signature of a message using a digital signature algorithm; storing parameters from a last round of the digital signature algorithm; executing the last round of the digital signature algorithm using the stored parameters to produce a check signature; comparing the digital signature to the check signature; and outputting the digital signature when the digital signature is the same as the check signature.
    Type: Application
    Filed: October 11, 2022
    Publication date: May 2, 2024
    Inventors: Joost Roland Renes, Melissa Azouaoui, Joppe Willem Bos, Björn Fay, Tobias Schneider
  • Publication number: 20240137214
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for a cryptographic operation including matrix multiplication for lattice-based cryptography in a processor, the instructions, including: applying a first function to the rows of a matrix of polynomials to generate first outputs, wherein the first function excludes the identity function; adding an additional row to the matrix of polynomials to produce a modified matrix, wherein each element in the additional row is generated by a second function applied to a column of outputs associated with each element in the additional row; multiplying the modified matrix with a vector of polynomials to produce an output vector of polynomials; applying a verification function to the output vector that produces an indication of whether a fault occurred in the multiplication of the modified matrix with the vector of polynomials; and carrying out a cryptographic operation using
    Type: Application
    Filed: October 6, 2022
    Publication date: April 25, 2024
    Inventors: Melissa Azouaoui, Joppe Willem Bos, Tobias Schneider, Joost Roland Renes, Björn Fay
  • Publication number: 20240016167
    Abstract: Deskinning device for removing skin from a poultry leg product, comprising a first leg end which comprises at least a part of an ankle joint, and a second leg end opposite to the first leg end, the first leg end being arranged at a higher level than the second leg end, wherein the device comprises at least one skin removal assembly which is adapted to carry out a deskinning process, a first skinning roller rotatable about an axis of rotation, wherein a first roller end is arranged at a higher level than a second roller end, a counter skinning member arranged adjacent said first skinning roller, a gap between the first skinning roller and the counter skinning member, wherein the skin removal assembly is adapted to pull the skin of the poultry leg product into the gap and towards the first roller end.
    Type: Application
    Filed: December 17, 2021
    Publication date: January 18, 2024
    Applicant: Marel Poultry B.V.
    Inventors: Maurice Eduardus Theodorus Van Esbroeck, Jan Willem Bos
  • Patent number: 11847545
    Abstract: A combination of machine learning models is provided, according to certain aspects, by a data-aggregation circuit, and a computer server. The data-aggregation circuit is used to assimilate respective sets of output data from at least one of a plurality of circuits to create a new data set, the respective sets of output data being related in that each set of output data is in response to a common data set processed by the machine learning circuitry in the at least one of the plurality of circuits. The computer server uses the new data set to train machine learning operations in at least one of the plurality of circuits.
    Type: Grant
    Filed: September 9, 2019
    Date of Patent: December 19, 2023
    Assignee: NXP B.V.
    Inventors: Nikita Veshchikov, Joppe Willem Bos
  • Patent number: 11847938
    Abstract: Various embodiments relate to a method for multiplying a first and a second polynomial in a ring q [X]/(Xn+1) where q is a positive integer.
    Type: Grant
    Filed: August 3, 2021
    Date of Patent: December 19, 2023
    Assignee: NXP B.V.
    Inventors: Joost Roland Renes, Joppe Willem Bos, Christine van Vredendaal, Tobias Schneider
  • Publication number: 20230353383
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for signing messages using a plurality of one-time signing (OTS) keys and a binary-hash-tree structure having a height h and a plurality of nodes configured to provide a public key having, including: generating and storing an authentication path A[d:h?1] for a first 2d signatures corresponding to the first 2d OTS keys of the plurality of OTS keys, where d is the height of a sub-tree associated with first 2d OTS keys; initiating a signature counter; signing a first message using the first OTS key of the plurality of OTS keys; incrementing the signature counter; determining if 2d messages have been signed; signing a second message and incrementing the signature counter when 2d messages have not been signed; and updating authentication path A[d:h?1] for a second 2d signatures corresponding to the second 2d OTS keys of the plurality of OTS keys when 2d messages hav
    Type: Application
    Filed: April 29, 2022
    Publication date: November 2, 2023
    Inventors: Christine van Vredendaal, Joppe Willem Bos, Babette Anne Margaretha Lips, Joost Roland Renes
  • Patent number: 11687678
    Abstract: A device and methods are described that comprise at least one host application and a rich execution environment. At least one interface is operably coupled to the REE for communicating with a remote server. A security sub-system comprises a security monitoring and control circuit coupled to the REE and connectable to the remote server via the REE and the at least one interface. The security monitoring and control circuit comprises an analytics circuit configured to detect an anomaly following a compromisation of the device. The security monitoring and control circuit is arranged to treat the REE as an untrusted component and in response to a detection of a compromisation of the REE or a component in the device that is accessible by the REE by the analytics circuit, the security monitoring and control circuit is configured to re-establish a secure connection to the remote server that tunnels through the REE and at least partially removes the compromisation from the device.
    Type: Grant
    Filed: October 27, 2020
    Date of Patent: June 27, 2023
    Assignee: NXP B.V.
    Inventors: Marcel Medwed, Tobias Schneider, Ventzislav Nikov, Jorge Miguel Ventuzelos Pereira, Rudi Verslegers, Nikita Veshchikov, Joppe Willem Bos, Jan Hoogerbrugge
  • Patent number: 11595195
    Abstract: Various embodiments relate to a method for masked decoding of a polynomial a using an arithmetic sharing a to perform a cryptographic operation in a data processing system using a modulus q, the method for use in a processor of the data processing system, including: subtracting an offset ? from each coefficient of the polynomial a; applying an arithmetic to Boolean (A2B) function on the arithmetic shares of each coefficient ai of the polynomial a to produce Boolean shares âi that encode the same secret value ai; and performing in parallel for all coefficients a shared binary search to determine which of coefficients ai are greater than a threshold t to produce a Boolean sharing value {circumflex over (b)} of the bitstring b where each bit of b decodes a coefficient of the polynomial a.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: February 28, 2023
    Assignee: NXP B.V.
    Inventors: Tobias Schneider, Joppe Willem Bos, Björn Fay, Marc Gourjon, Joost Roland Renes, Christine van Vredendaal
  • Patent number: 11586989
    Abstract: A method is provided for detecting copying of a machine learning model. In the method, the first machine learning model is divided into a plurality of portions. Intermediate outputs from a hidden layer of a selected one of the plurality of portions is compared to corresponding outputs from a second machine learning model to detect the copying. Alternately, a first seal may be generated using the plurality of inputs and the intermediate outputs from nodes of the selected portion. A second seal from a suspected copy that has been generated the same way is compared to the first seal to detect the copying. If the first and second seals are the same, then there is a high likelihood that the suspected copy is an actual copy. By using the method, only the intermediate outputs of the machine learning model outputs have to be disclosed to others, thus protecting the confidentiality of the model.
    Type: Grant
    Filed: July 15, 2019
    Date of Patent: February 21, 2023
    Assignee: NXP B.V.
    Inventors: Joppe Willem Bos, Simon Johann Friedberger, Nikita Veshchikov, Christine Van Vredendaal
  • Publication number: 20230047965
    Abstract: Various embodiments relate to a method for multiplying a first and a second polynomial in a ring q[X]/(Xn+1) to perform a cryptographic operation in a data processing system where q is a positive integer, the method for use in a processor of the data processing system, comprising: receiving the first polynomial and the second polynomial by the processor; mapping the first polynomial into k smaller third polynomials over k smaller rings based upon primitive roots of unity, where k is a positive integer; mapping the second polynomial into k smaller fourth polynomials over the k smaller rings based upon primitive roots of unity; applying an isomorphism to the k third polynomials resulting in k fifth polynomials; applying the isomorphism to the k fourth polynomials resulting in k sixth polynomials; applying a Kronecker substitution on the k fifth polynomials and the k sixth polynomials and perform the multiplication of the k fifth polynomials and the k sixth polynomials to produce a multiplication result; applyin
    Type: Application
    Filed: August 3, 2021
    Publication date: February 16, 2023
    Inventors: Joost Roland RENES, Joppe Willem Bos, Christine van Vredendaal, Tobias Schneider
  • Publication number: 20230004831
    Abstract: Embodiments address the problem of detecting anomalies in data sets with respect to well-defined normal behavior. Deviations of data collected in real-time are detected using a previously observed distribution of data known to be benign. Embodiments provide techniques to detect varying types of anomalies by creating multiple aggregation layers having varying granularities on top of the lowest level of data collection. This allows detection of fine anomalies that strongly impact single data points, as well as coarse anomalies that detect multiple data points less strongly. Machine learning models are trained and used to compare real-time data sets against behavior of a benign data set in order to detect differences and to flag anomalous behavior.
    Type: Application
    Filed: June 30, 2021
    Publication date: January 5, 2023
    Applicant: NXP B.V.
    Inventors: Joost Roland Renes, Joppe Willem Bos, Nikita Veshchikov
  • Patent number: 11528124
    Abstract: Various embodiments relate to a method for securely comparing a first polynomial represented by a plurality of arithmetic shares and a second compressed polynomial represented by a bitstring where the bits in the bitstring correspond to coefficients of the second polynomial, including: performing a first masked shift of the shares of the coefficients of the first polynomial based upon the start of the interval corresponding to the compressed coefficient of the second polynomial and a modulus value; performing a second masked shift of the shares of the coefficients of the first polynomial based upon the end of the interval corresponding to the compressed coefficient of the second polynomial; bitslicing the most significant bit of the first masked shift of the shares coefficients of the first polynomial; bitslicing the most significant bit of the second masked shift of the shares coefficients of the first polynomial; and combining the first bitsliced bits and the second bitsliced bits using an AND function to p
    Type: Grant
    Filed: April 7, 2021
    Date of Patent: December 13, 2022
    Assignee: NXP B.V.
    Inventors: Marc Gourjon, Joppe Willem Bos, Joost Roland Renes, Tobias Schneider, Christine van Vredendaal