Patents by Inventor Wulf Harder

Wulf Harder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11809530
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: April 20, 2021
    Date of Patent: November 7, 2023
    Assignee: Whitecryption Corporation
    Inventor: Wulf Harder
  • Publication number: 20210240802
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [Fig. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data -processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: April 20, 2021
    Publication date: August 5, 2021
    Applicant: Whitecryption Corporation
    Inventor: Wulf Harder
  • Patent number: 11010455
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: May 18, 2021
    Assignee: Whitecryption Corporation
    Inventor: Wulf Harder
  • Publication number: 20200117775
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: December 13, 2019
    Publication date: April 16, 2020
    Applicant: Whitecryption Corporation
    Inventor: Wulf Harder
  • Patent number: 10534897
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: April 13, 2018
    Date of Patent: January 14, 2020
    Assignee: Whitecryption Corporation
    Inventor: Wulf Harder
  • Publication number: 20180239881
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: April 13, 2018
    Publication date: August 23, 2018
    Inventor: Wulf Harder
  • Patent number: 9946854
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: April 17, 2018
    Assignee: Whitecryption Corporation
    Inventor: Wulf Harder
  • Publication number: 20170364668
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: June 29, 2017
    Publication date: December 21, 2017
    Inventor: Wulf Harder
  • Patent number: 9721075
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [Fig 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: February 24, 2016
    Date of Patent: August 1, 2017
    Inventor: Wulf Harder
  • Publication number: 20170024550
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: February 24, 2016
    Publication date: January 26, 2017
    Inventor: Wulf Harder
  • Patent number: 9275202
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Grant
    Filed: April 3, 2004
    Date of Patent: March 1, 2016
    Assignee: Whitecryption Corporation
    Inventor: Wulf Harder
  • Publication number: 20120011516
    Abstract: A method for the administration of resources, in which classes or instances, respectively, are assigned to the resources and a program receives a rule assigned to the class or instance, respectively, and applies it to the resource. It is made sure that only rules assigned to the class or instance, respectively, are applied on the resource. In alternative methods, only rules are applied on the resource, which were accepted by a verification rule assigned to the resource.
    Type: Application
    Filed: July 27, 2007
    Publication date: January 12, 2012
    Applicant: SIA Symcrosoft
    Inventors: Wulf Harder, Uwe Resas
  • Publication number: 20110116626
    Abstract: A method for processing data in various encoded domains, wherein the encoded domains exchange data by emulating the encodings or decodings, respectively, of other domains.
    Type: Application
    Filed: April 14, 2009
    Publication date: May 19, 2011
    Applicant: SIA WHITECRYPTION
    Inventor: Wulf Harder
  • Patent number: 7913310
    Abstract: A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor, whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.
    Type: Grant
    Filed: March 13, 2003
    Date of Patent: March 22, 2011
    Assignee: SIA whiteCryption
    Inventors: Bernd Peeters, Wulf Harder
  • Publication number: 20080028412
    Abstract: A method for the administration of resources, in which classes or instances, respectively, are assigned to the resources and a program receives a rule assigned to the class or instance, respectively, and applies it to the resource. It is made sure that only rules assigned to the class or instance, respectively, are applied on the resource. In alternative methods, only rules are applied on the resource, which were accepted by a verification rule assigned to the resource.
    Type: Application
    Filed: January 11, 2007
    Publication date: January 31, 2008
    Applicant: SIA Syncrosoft
    Inventors: Wulf Harder, Uwe Resas
  • Publication number: 20070204152
    Abstract: A method for the distribution of a content, characterised in that an encoded content is received by at least two receivers and is decoded with the aid of data blocks which differ from each other, wherein the encoding of the content is not receiver specific or receiver group specific, and the data blocks, the assignment thereof to the receivers and the procedure of the direct decoding of the content are receiver specific or receiver group specific
    Type: Application
    Filed: January 11, 2007
    Publication date: August 30, 2007
    Applicant: SIA Syncrosoft
    Inventor: Wulf Harder
  • Publication number: 20070014394
    Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and excuted by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.
    Type: Application
    Filed: April 3, 2004
    Publication date: January 18, 2007
    Inventors: Wulf Harder, Bernd Peeters, Uwe Resas, Stefan Weber
  • Publication number: 20050229259
    Abstract: A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor (3), whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.
    Type: Application
    Filed: March 13, 2003
    Publication date: October 13, 2005
    Inventors: Bernd Peeters, Wulf Harder
  • Publication number: 20050177512
    Abstract: A device for protecting against unauthorized use of software, whereby a first wireless device exchanges data directly or indirectly with a process running the software on a computing system and the process runs incorrectly or in an error condition if the exchanged data contain errors.
    Type: Application
    Filed: March 22, 2003
    Publication date: August 11, 2005
    Inventors: Bernd Peeters, Wulf Harder