Patents by Inventor Wulf Harder
Wulf Harder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11809530Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: April 20, 2021Date of Patent: November 7, 2023Assignee: Whitecryption CorporationInventor: Wulf Harder
-
Publication number: 20210240802Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [Fig. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data -processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: April 20, 2021Publication date: August 5, 2021Applicant: Whitecryption CorporationInventor: Wulf Harder
-
Patent number: 11010455Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: December 13, 2019Date of Patent: May 18, 2021Assignee: Whitecryption CorporationInventor: Wulf Harder
-
Publication number: 20200117775Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: December 13, 2019Publication date: April 16, 2020Applicant: Whitecryption CorporationInventor: Wulf Harder
-
Patent number: 10534897Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: April 13, 2018Date of Patent: January 14, 2020Assignee: Whitecryption CorporationInventor: Wulf Harder
-
Publication number: 20180239881Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: April 13, 2018Publication date: August 23, 2018Inventor: Wulf Harder
-
Patent number: 9946854Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: June 29, 2017Date of Patent: April 17, 2018Assignee: Whitecryption CorporationInventor: Wulf Harder
-
Publication number: 20170364668Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: June 29, 2017Publication date: December 21, 2017Inventor: Wulf Harder
-
Patent number: 9721075Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [Fig 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: February 24, 2016Date of Patent: August 1, 2017Inventor: Wulf Harder
-
Publication number: 20170024550Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: February 24, 2016Publication date: January 26, 2017Inventor: Wulf Harder
-
Patent number: 9275202Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and executed by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: GrantFiled: April 3, 2004Date of Patent: March 1, 2016Assignee: Whitecryption CorporationInventor: Wulf Harder
-
Publication number: 20120011516Abstract: A method for the administration of resources, in which classes or instances, respectively, are assigned to the resources and a program receives a rule assigned to the class or instance, respectively, and applies it to the resource. It is made sure that only rules assigned to the class or instance, respectively, are applied on the resource. In alternative methods, only rules are applied on the resource, which were accepted by a verification rule assigned to the resource.Type: ApplicationFiled: July 27, 2007Publication date: January 12, 2012Applicant: SIA SymcrosoftInventors: Wulf Harder, Uwe Resas
-
Publication number: 20110116626Abstract: A method for processing data in various encoded domains, wherein the encoded domains exchange data by emulating the encodings or decodings, respectively, of other domains.Type: ApplicationFiled: April 14, 2009Publication date: May 19, 2011Applicant: SIA WHITECRYPTIONInventor: Wulf Harder
-
Patent number: 7913310Abstract: A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor, whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.Type: GrantFiled: March 13, 2003Date of Patent: March 22, 2011Assignee: SIA whiteCryptionInventors: Bernd Peeters, Wulf Harder
-
Publication number: 20080028412Abstract: A method for the administration of resources, in which classes or instances, respectively, are assigned to the resources and a program receives a rule assigned to the class or instance, respectively, and applies it to the resource. It is made sure that only rules assigned to the class or instance, respectively, are applied on the resource. In alternative methods, only rules are applied on the resource, which were accepted by a verification rule assigned to the resource.Type: ApplicationFiled: January 11, 2007Publication date: January 31, 2008Applicant: SIA SyncrosoftInventors: Wulf Harder, Uwe Resas
-
Publication number: 20070204152Abstract: A method for the distribution of a content, characterised in that an encoded content is received by at least two receivers and is decoded with the aid of data blocks which differ from each other, wherein the encoding of the content is not receiver specific or receiver group specific, and the data blocks, the assignment thereof to the receivers and the procedure of the direct decoding of the content are receiver specific or receiver group specificType: ApplicationFiled: January 11, 2007Publication date: August 30, 2007Applicant: SIA SyncrosoftInventor: Wulf Harder
-
Publication number: 20070014394Abstract: Method for processing data, in which a Petri net is encoded, written into a memory and read and excuted by at least one instance, wherein transitions of the Petri net read from at least one tape and/or write on at least one tape symbols or symbol strings, with the aid of at least one head. [FIG. 1]. In an alternative, data-processing, co-operating nets are composed, the composition result is encoded, written into a memory and read and executed from the memory by at least one instance. In doing this, components can have cryptological functions. The data-processing nets can receive and process second data from a cryptological function which is executed in a protected manner. The invention enables processing of data which prevents semantic analysis of laid-open, possibly few processing steps and which can produce a linkage of the processing steps with a hardware which is difficult to isolate.Type: ApplicationFiled: April 3, 2004Publication date: January 18, 2007Inventors: Wulf Harder, Bernd Peeters, Uwe Resas, Stefan Weber
-
Publication number: 20050229259Abstract: A device for protecting against unauthorized use of software, characterized in that a first processor emulates a second processor (3), whereby the second processor executes program code and the second processor transmits data to a computing system running the software in a process, whereby the process enters an error condition if the data contain errors.Type: ApplicationFiled: March 13, 2003Publication date: October 13, 2005Inventors: Bernd Peeters, Wulf Harder
-
Publication number: 20050177512Abstract: A device for protecting against unauthorized use of software, whereby a first wireless device exchanges data directly or indirectly with a process running the software on a computing system and the process runs incorrectly or in an error condition if the exchanged data contain errors.Type: ApplicationFiled: March 22, 2003Publication date: August 11, 2005Inventors: Bernd Peeters, Wulf Harder