Philippe Teuwen
Philippe Teuwen, Ixelles BE
Patent application number | Description | Published |
---|---|---|
20080256361 | Watermarking of a Processing Module - The present invention relates to a method, for watermarking a processing module ( | 10-16-2008 |
20090015385 | METHOD AND DEVICE FOR INCREASED RFID TRANSMISSION SECURITY - A method and system for secure RFID system communication is provided. The RFID system comprises an RFID reader ( | 01-15-2009 |
20110055592 | METHOD OF OBFUSCATING A CODE - A method of obfuscating a code is provided, wherein the method comprises performing a first level obfuscating technique on a code to generate a first obfuscated code, and performing a second level obfuscating technique on the first obfuscated code. In particular, the code may be a software code or a software module. Furthermore, the first level obfuscating technique and the second obfuscating may be different. In particular, the second level obfuscating technique may perform a deobfuscation. | 03-03-2011 |
20120131340 | Enrollment of Physically Unclonable Functions - Aspects of the present disclosure are directed toward a method that includes a physically-unclonable function (PUF) device that receives a communication that includes a first challenge value, a second challenge value and a remote message authenticity value. The method includes the generation of additional challenge-response pairs in a secure manner. The additional challenge-response pairs are securely communicated between the PUF device and an authenticating server or other device for subsequent use in authentication. | 05-24-2012 |
20120137088 | ELECTRONIC COMPONENT - An electronic component is provided having a plurality of functionalities. The electronic component comprises a control logic, and a non-volatile storage element. The control logic is coupled to the non-volatile storage element and is adapted for storing values in the non-volatile storage element based on an external input signal to the electronic component, each value being indicative for one or more functionalities of the plurality of functionalities. The control logic is adapted for controlling the availability of the plurality of functionalities based on one or more values stored in the non-volatile storage element and for outputting a confirmation signal being indicative for the availability of the plurality of functionalities. | 05-31-2012 |
Philippe Teuwen, Leuven BE
Patent application number | Description | Published |
---|---|---|
20080320587 | Secure Pairing for Wired or Wireless Communications Devices - Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that th.—device identification displayed on the host device matches that printed on the peripheral diwice, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device. | 12-25-2008 |
20100161994 | METHOD AND APPARATUS FOR AUTHENTICATING STATIC DATA CARRIERS - Method of authenticating optical discs ( | 06-24-2010 |
20150143533 | METHOD OF GENERATING A STRUCTURE AND CORRESPONDING STRUCTURE - Disclosed is a method of generating a structure comprising at least one virtual machine, the method comprising: obfuscating a first virtual machine source code, thereby yielding a first obfuscated virtual machine (OVM) source code; associating a processor identifier with the first OVM source code, thereby yielding a processor-specific first OVM source code; compiling the processor-specific first OVM source code, thereby yielding a processor-specific first OVM. Furthermore, a structure generated by said method is disclosed. | 05-21-2015 |
Philippe Teuwen, Etterbeek BE
Patent application number | Description | Published |
---|---|---|
20140172700 | DIGITAL WALLET DEVICE FOR VIRTUAL WALLET - A reconfigurable digital wallet device such as a smart card containing a secure element and acting as an instantiation of a subset of a virtual wallet stored in the cloud. The digital wallet device is managed and synchronized with the virtual wallet in the cloud using a mobile device such as a smartphone. | 06-19-2014 |
20140291392 | DIGITAL WALLET BRIDGE - A smartcard communicating simultaneously with a smart phone and a point of sale, thereby allowing the smartcard to act as a bridge between the point of sale and the smart phone. The smart card is typically powered by the point of sale and typically communicates with the smart phone using BLUETOOTH Low Energy (BLE). | 10-02-2014 |
20150181422 | BINDING MOBILE DEVICE SECURE SOFTWARE COMPONENTS TO THE SIM - A mobile device, including: a wireless communication interface; a memory storing a secure software application; and a processor in communication with the memory, the processor being configured to: transmit an authentication challenge to the SIM card; receive an authentication response from the SIM card; verify the authentication response from the SIM card; and enable the secure software application when the authentication response from the SIM card is verified. | 06-25-2015 |
20150186627 | SECURE SOFTWARE COMPNENTS ANTI-REVERSE-ENGINEERING BY TABLE INTERLEAVING - A method of securely implementing functions in a secure software application, including: determining, by a processor, two functions to be implemented by the secure software application; generating a first function lookup table; encrypting the first function lookup table; sorting the first function lookup table by encrypted operand; generating a second function lookup table; encrypting the second function lookup table; sorting the second function lookup table by encrypted operand; generating a flattened lookup table from a combination of the encrypted first and second function lookup tables; permutating the flattened table indices e.g. by use of public key cryptography encryption; and sorting the flattened table by the permutated flattened table indices. | 07-02-2015 |
20150261458 | ONE-TIME PROGRAMMING IN REPROGRAMMABLE MEMORY - A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The plurality of electrically erasable memory elements are configured to store data. Each memory element is programmable a number of write cycles before reaching a write failure state. The controller is coupled to the plurality of memory elements. The controller includes a receiver and a write engine. The receiver receives an instruction to drive a selected memory element to the write failure state. The write engine repeatedly writes a data value, in a plurality of write operations, to the selected memory element until the write failure state of the selected memory element is established. | 09-17-2015 |
Philippe Teuwen, Eterbeek BE
Patent application number | Description | Published |
---|---|---|
20150188712 | FLEXIBLE DATA AUTHENTICATION - Various exemplary embodiments relate to a method, device, and storage medium including: receiving an NDEF message by an NFC device including a payload and at least one of a digital signature and a reference to a digital signature; stripping data from the payload to produce a stripped payload; verifying the payload using the digital signature and the stripped payload; and conditionally interpreting the payload based on whether the payload is verified. Various embodiments are described wherein: the payload includes a URI including a fragment denoted by a pound character; and stripping data includes stripping the fragment from the URI. Various embodiments are described wherein the payload is verified, the fragment comprises fragment data, and interpreting the payload comprises: transmitting a message requesting a resource identified by the URI, wherein the request omits the fragment data; executing a received script to transmit the fragment data to a device. | 07-02-2015 |
Philippe Teuwen, Louvain BE
Patent application number | Description | Published |
---|---|---|
20150278489 | CONSTELLATION BASED DEVICE BINDING - A method of binding a software to a device is disclosed. Accordingly, during a setup of the software in the device, a unique identifier is derived from contents stored in the device and the derived unique identifier is encrypted. The derived unique identifier is then stored in a configuration of the software. During a next invocation of the software in the device, a new unique identifier is derived from the contents stored in the device. The newly derived unique identifier is then matched with the stored unique identifier. The execution of the software is terminated if the matching fails. | 10-01-2015 |