Patent application number | Description | Published |
20100026461 | EXTENDED FUNCTIONALITY OF RFID DEVICES - It is described a RFID device ( | 02-04-2010 |
20100073147 | CONTROLLING DATA ACCESS TO AND FROM AN RFID DEVICE - It is described a method for controlling data access to and from an RFID device ( | 03-25-2010 |
20100301776 | METHOD AND A SYSTEM FOR CONTROLLING A LIGHTING SYSTEM - The present invention relates to a location commissioning method for a lighting system, which comprises several lighting arrangements. Thus, an illuminated position, of for example a room, is selected for the performing the commissioning, which is then associated with that position. This commissioning is called Luxissioning™. The position is assigned a position id, and the light at the position is measured. Light data associated with each one of the lighting arrangements is derived from the measured light, and the light data is associated with the position id. Light transfer data is determined on basis of the light data and current drive data for the lighting arrangements and stored in a light effect setting array for the position id. A light effect setting method is also present, where there is requested a selected light effect at a selected position. For each such request data comprising a position id and a target light effect setting associated with the position is received. The associated initial light effect setting array is derived, for example by retrieving a stored one. Required drive data for the relevant light arrangements, for obtaining the target light effect setting, is determined by means of the light transfer data held in the array, and adjustments are made accordingly, if necessary. Devices and systems for performing the above methods are also addressed by this invention. | 12-02-2010 |
20110191837 | AUTHENTICATING A DEVICE AND A USER - A method of authenticating a device and a user comprises receiving a user input, generating a first key from the user input, performing a physical measurement of the device, obtaining helper data for the device, computing a second key from the physical measurement and the helper data, and performing an operation using the first and second keys. In a preferred embodiment, the method comprises performing a defined function on the first and second keys to obtain a third key. Additionally security can be provided by the step of receiving a user input comprising performing a biometric measurement of the user and the step of generating a first key from the user input comprises obtaining helper data for the user and computing the first key from the biometric measurement and the user helper data. | 08-04-2011 |
20110215829 | IDENTIFICATION OF DEVICES USING PHYSICALLY UNCLONABLE FUNCTIONS - A method of generating a response to a physically unclonable function, said response being uniquely representative of the identity of a device having challengeable memory, the memory comprising a plurality of logical locations each having at least two possible logical states, the method comprising applying a challenge signal to an input of said memory so as to cause each of said logical locations to enter one of said two possible logical states and thereby generate a response pattern of logical states, said response pattern being dependent on said physically unclonable function which is defined by, the physical characteristics of said memory, the method further comprising reading out said response pattern. | 09-08-2011 |
20120033807 | DEVICE AND USER AUTHENTICATION - A method of authenticating a device and a user comprises obtaining a device ID for the device, performing a biometric measurement of the user, obtaining helper data for the user, and generating a key from the biometric measurement and helper data. There is then generated a message comprising the key or a component derived from the key, which transmitted to a remote service, and at the service there is carried out the step of authenticating the device and the user with the message. In a preferred embodiment, the generating of the key further comprises generating the key from the device ID. | 02-09-2012 |
Patent application number | Description | Published |
20100177898 | DEVICE AND METHOD FOR PROVIDING AUTHENTICATION - The present invention relates to an electronic device, comprising a physical uncloneable function (PUF) module, and circuitry adapted to receive a cryptographic query (α) from an electronic unit, read, from the PUF module, data generated at a challenge of the PUF module, and generate a cryptographic response (β) based on the data, a random noise component comprised in the data, and the cryptographic query (α), thereby enabling authentication of the electronic device. An advantage with the invention is that it will not be necessary to include an additional random generator together with the electronic device, as the fuzzy output provided by the PUF module can be seen as already containing a random noise component. In some cryptographic schemes, the random noise provides for a possibility to reach a higher level of security and to minimize the possibility for a third party to find patterns in cryptographic responses generated during use of the electronic device. The present invention also relates to a similar authentication method. | 07-15-2010 |
20120319618 | Method and a system for controlling a lighting system - A location commissioning method for a lighting system, having several lighting arrangements, includes selecting an illuminated position, assigning the position a position id, measuring light at the position, deriving light data associated with each lighting arrangement from the measured light, associating the light data with the position id, determining light transfer data from the light data and current drive data for the lighting arrangements, and storing in a light effect setting array for the position id. A light effect setting method includes requesting a selected light effect at a selected position, receiving a position id and a target light effect setting associated with the position, deriving the associated initial light effect setting array, for example by retrieving a stored one, determining the drive data for obtaining the target light effect setting, via the light transfer data in the array. | 12-20-2012 |