Patents by Inventor Yvonne-Anne PIGNOLET

Yvonne-Anne PIGNOLET has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230179409
    Abstract: Embodiments of the invention relate to a computer-implemented method for generating verification keys of a public-key signature scheme in a distributed network. The method comprises performing, by a subset of the nodes of a first subnetwork of nodes, a first distributed key generation protocol, the first distributed key generation protocol being configured to generate jointly a verification key for the first subnetwork and a plurality of corresponding secret key shares for the nodes of the first subnetwork. The method further comprises a step of performing, for a second subnetwork, by a subset of the plurality of nodes of the first subnetwork, a second distributed key generation protocol, the second distributed key generation protocol being configured to generate jointly a verification key of the second subnetwork and a plurality of corresponding secret key shares for the nodes of the second subnetwork.
    Type: Application
    Filed: December 21, 2020
    Publication date: June 8, 2023
    Applicant: DFINITY STIFTUNG
    Inventors: Jan CAMENISCH, Manu DRIJVERS, Johan GRANSTRĂ–M, Roman KASHITSYN, Gregory NEVEN, Yvonne-Anne PIGNOLET, Dominic WILLIAMS
  • Patent number: 11551035
    Abstract: A method for evaluating data is based on a computational model, the computational model comprising model data, a training function and a prediction function. The method includes training the computational model by: receiving training data and training result data for training the computational model, and computing the model data from the training data and the training result data with the training function. The method includes predicting result data by: receiving field data for predicting result data; and computing the result data from the field data and the model data with the prediction function. The training data may be plaintext and the training result data may be encrypted with a homomorphic encryption algorithm, wherein the model data may be computed in encrypted form from the training data and the encrypted training result data with the training function.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: January 10, 2023
    Assignee: ABB SCHWEIZ AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20220271535
    Abstract: A for ensuring grid stability by using a distributed ledger, the method comprising the steps: measuring metrics from a plurality of distributed energy resource, DER, wherein said metrics are related to grid stability; storing (a) said metrics/measurements in the distributed ledger; transferring said metrics from the distributed ledger into a smart contract (2); computing any deviations between said metrics and predetermined values stored in advance in the smart contract (2) by executing the smart contract; transferring and storing results from the computing step in the distributed ledger; and transferring said results from the distributed ledger to the respective DER of the plurality of DERs, wherein said DER receives positive or negative values which regulates the amount of contribution to the grid.
    Type: Application
    Filed: June 27, 2020
    Publication date: August 25, 2022
    Inventors: Thomas LOCHER, Yvonne-Anne PIGNOLET, Alexandre OUDALOV, Sebastian OBERMEIER
  • Publication number: 20220263313
    Abstract: An aspect of the present disclosure relates to a method for providing a data structure comprising a refined energy schedule, the method comprising receiving a plurality of energy demand requests, energy storage offers, and/or energy supply offers from a plurality of participants of a power network; determining by a plurality of distributed computational units the refined energy schedule, using an optimization function, under consideration of the plurality of energy demand requests, energy storage offers, and/or energy supply offers, wherein the refined energy schedule is an at least substantially optimal energy schedule; and appending the refined energy schedule to the data structure. A further aspect of the disclosure relates to a data structure, in particular to the data structure provided in the method.
    Type: Application
    Filed: July 10, 2020
    Publication date: August 18, 2022
    Inventors: Thomas LOCHER, Yvonne-Anne PIGNOLET, Alexandre OUDALOV
  • Publication number: 20220261929
    Abstract: A method for adjusting electrical energy flow schedules of a utility handling a plurality of distributed energy resources. The method comprising the steps of providing information regarding energy flow of the energy resources and storing said information on a distributed ledger; transferring energy schedules from the utility to the distributed ledger; transferring said information regarding the energy flow and the energy schedules from the distributed ledger to a computing means and computing proposed corrections for the energy schedules; transferring said proposed correction to the distributed ledger; transferring said proposed correction to the utility which decides to use or not to use the proposed correction. By deciding to use the proposed correction, the schedules are corrected and information is transferred from the utility to the computing means.
    Type: Application
    Filed: July 17, 2020
    Publication date: August 18, 2022
    Inventors: Carsten FRANKE, Thomas LOCHER, Yvonne-Anne PIGNOLET
  • Patent number: 11411807
    Abstract: The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
    Type: Grant
    Filed: June 17, 2019
    Date of Patent: August 9, 2022
    Assignees: ABB Schweiz AG, Hitachi Energy Switzerland AG
    Inventors: David Kozhaya, Thanikesavan Sivanthi, Yvonne-Anne Pignolet
  • Publication number: 20220245096
    Abstract: To facilitate storage of data from plural data sources of an industrial automation control system, power distribution system or power generation system, a decision making device executes a machine learning algorithm to determine a compression technique in dependence on the data source from which data originates.
    Type: Application
    Filed: June 5, 2020
    Publication date: August 4, 2022
    Inventors: Ettore FERRANTI, Carsten FRANKE, Thomas LOCHER, Yvonne-Anne PIGNOLET, Sandro SCHOENBORN, Thanikesavan SIVANTHI, Theo WIDMER
  • Publication number: 20220131741
    Abstract: The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
    Type: Application
    Filed: June 17, 2019
    Publication date: April 28, 2022
    Inventors: David Kozhaya, Thanikesavan Sivanthi, Yvonne-Anne Pignolet
  • Publication number: 20210406770
    Abstract: A method for adjusting machine learning models in a system including a plurality of devices is suggested. The method includes providing a system including a plurality of devices, wherein the devices have computational resource capacities; providing one or more machine learning tasks; providing a repository of ML models for the one or more tasks, wherein a plurality of the ML models of a single task solve the same task with different computational resources requirements and different quality metrics; selecting a device of the plurality of devices of the system to execute a task, wherein the selected device has available computational resource capacities; and selecting, from the repository of ML models of the task to be executed, one of the ML models, wherein the computational resources requirements of the selected ML model do not exceed the available computational resource capacities of the selected device. Systems configured to perform the methods as disclosed herein are also suggested.
    Type: Application
    Filed: June 23, 2021
    Publication date: December 30, 2021
    Inventors: Robert BIRKE, Raphael EIDENBENZ, Yvonne-Anne PIGNOLET, Alexandru MOGA, Srini RAMASWAMY
  • Publication number: 20210409482
    Abstract: A method for allocating fog applications in a fog network with a plurality of fog nodes is suggested. The method includes: providing an application model; providing a fog network image that reflects the properties of the fog network; performing a resource usage test of the application model on the fog network image, and receiving resource requirements for the fog network; creating a concrete application model based on the application model, wherein the concrete application model contains the received resource requirements; and performing allocation of the concrete application model on one or more of the fog nodes of the fog network.
    Type: Application
    Filed: June 24, 2021
    Publication date: December 30, 2021
    Inventors: Raphael EIDENBENZ, Yvonne-Anne PIGNOLET, Ognjen VUKOVIC, Alexandru MOGA, David KOZHAYA, Robert BIRKE, Mallikarjun KANDE
  • Patent number: 11075748
    Abstract: The application relates to a method for computing a probabilistic encryption scheme for encrypting a data item in an electronic device including: computing a plurality of random bit strings in a computation cluster; sending the computed plurality of random strings to the electronic device; generating a random string (rE) for using in the encryption scheme in the electronic device using a subset of the plurality of the random strings computed in the computation cluster and encrypting the data item using the random string computed in the electronic device. The present application also relates to a corresponding system and corresponding computer program product including one or more computer readable media having computer executable instructions for performing the steps of the method.
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: July 27, 2021
    Assignee: ABB SCHWEIZ AG
    Inventors: Thomas Locher, Johannes Schneider, Matus Harvan, Sebastian Obermeier, Yvonne-Anne Pignolet
  • Publication number: 20210097195
    Abstract: A method can be used to analyze a log of a device or a plurality of devices of a first entity. The method includes generating an encrypted log by encrypting the log at the first entity, generating an encrypted query by encrypting a query at the first entity, transferring the encrypted log and the encrypted query from the first entity to a second entity, analyzing the encrypted log on the second entity by using the encrypted query, generating an encrypted analysis result at the second entity, transferring the encrypted analysis result from the second entity to the first entity, decrypting the encrypted analysis result on the first entity, and verifying the decrypted analysis result at the first entity.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 1, 2021
    Inventors: Carsten Franke, Theo Widmer, Thomas Locher, Yvonne-Anne Pignolet
  • Patent number: 10795990
    Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
    Type: Grant
    Filed: August 13, 2018
    Date of Patent: October 6, 2020
    Assignee: ABB Schweiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20200228324
    Abstract: A method for offering data with objects to be performed on the basis of the data, providing solutions to the problems and verifying the provided solutions. The method including the steps of providing a digital platform; uploading the data with the object as challenge to the platform; uploading a smart contract relating to the challenge to the platform; transferring the challenge from the platform to at least one solution provider; uploading a signed hash of the solution provider's solution of the challenge to the platform; uploading the solution provider's solution of the challenge to the platform; and evaluating at the platform the uploaded solution based on predefined conditions.
    Type: Application
    Filed: January 15, 2020
    Publication date: July 16, 2020
    Inventors: Thomas Locher, Carsten Franke, Sebastian Obermeier, Yvonne-Anne Pignolet
  • Patent number: 10685141
    Abstract: The invention relates to a method for storing data blocks from client devices to a cloud storage system, the method includes the steps of: d) storing an encrypted first data block and a challenge of the first data block of a first client device on the cloud storage system, e) determining if a hash of a second data block of a second client device stored on the cloud storage system equals the hash of the first data block, f) if yes, transmitting the challenge of the first data block from the cloud storage system to the second client device, g) extracting, at the second client device, the bits at the positions or at the range contained in the challenge, hashing the extracted bits, encrypting the hashed bits with a public key of the first client device or of the second client device and uploading the encrypted bits from the second client device to the cloud storage system, and h) storing the encrypted bits from the second client device on the cloud storage system.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: June 16, 2020
    Assignee: ABB Scheiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Patent number: 10680799
    Abstract: The application relates to a method for aggregation of a performance indicator of a device including: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum computed by summ
    Type: Grant
    Filed: November 13, 2018
    Date of Patent: June 9, 2020
    Assignee: ABB Schweiz AG
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20190171847
    Abstract: The invention relates to a method for storing data blocks from client devices to a cloud storage system, the method includes the steps of: d) storing an encrypted first data block and a challenge of the first data block of a first client device on the cloud storage system, e) determining if a hash of a second data block of a second client device stored on the cloud storage system equals the hash of the first data block, f) if yes, transmitting the challenge of the first data block from the cloud storage system to the second client device, g) extracting, at the second client device, the bits at the positions or at the range contained in the challenge, hashing the extracted bits, encrypting the hashed bits with a public key of the first client device or of the second client device and uploading the encrypted bits from the second client device to the cloud storage system, and h) storing the encrypted bits from the second client device on the cloud storage system.
    Type: Application
    Filed: February 4, 2019
    Publication date: June 6, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20190097787
    Abstract: The invention relates to a method for aggregation of a performance indicator of a device comprising the steps of: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum comp
    Type: Application
    Filed: November 13, 2018
    Publication date: March 28, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet
  • Publication number: 20190089526
    Abstract: The application relates to a method for computing a probabilistic encryption scheme for encrypting a data item in an electronic device including: computing a plurality of random bit strings in a computation cluster; sending the computed plurality of random strings to the electronic device; generating a random string (rE) for using in the encryption scheme in the electronic device using a subset of the plurality of the random strings computed in the computation cluster and encrypting the data item using the random string computed in the electronic device. The present application also relates to a corresponding system and corresponding computer program product including one or more computer readable media having computer executable instructions for performing the steps of the method.
    Type: Application
    Filed: November 13, 2018
    Publication date: March 21, 2019
    Inventors: Thomas Locher, Johannes Schneider, Matus Harvan, Sebastian Obermeier, Yvonne-Anne Pignolet
  • Publication number: 20190005233
    Abstract: A method of automatically generating secure code includes: receiving source code and security constraints for the source code, the security constraints encoding, to what extend a variable in the source code is considered secure; and generating secure code from the source code and the security constraints by replacing non-secure operations in the source code, which operate on the variables considered as secure, with secure operations; wherein a secure operation is an operation, which, when applied to at least one encrypted variable, generates an encrypted result, which, when decrypted, is the result of the non-secure operation applied to the not encrypted variable.
    Type: Application
    Filed: August 13, 2018
    Publication date: January 3, 2019
    Inventors: Johannes Schneider, Matus Harvan, Sebastian Obermeier, Thomas Locher, Yvonne-Anne Pignolet