1
Boesgaard, Sørensen Hans Martin: Fabrication of computer executable program files from source code. Boesgaard, Sørensen Hans Martin, INSPICOS, March 27, 2008: WO/2008/034900 (8 worldwide citation)

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...


2
Sørensen Hans Martin Boesgaard: Methods for generating identification values for identifying electronic messages. Cryptico, Sørensen Hans Martin Boesgaard, INSPICOS, August 18, 2005: WO/2005/076522 (1 worldwide citation)

In a method for generating an identification value for identifying an electronic message by application of a first hash function with fixed compression that compresses n blocks of data into a number of blocks, which is smaller than n, the hash function is repetitively applied in a tree-structure com ...


3
Boesgaard, Sørensen Hans Martin: Digital data authentication. Boesgaard, Sørensen Hans Martin, INSPICOS, June 19, 2008: WO/2008/071795 (1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...


4
Improvements in or relating to venting arrangements for oil cargo tanks. Frede Boesgaard Larsen, Aage Christian Larsen, August 22, 1951: GB656513-A

656,513. Venting. LARSEN, F. B., and LARSEN, A. C. March 13, 1947, No. 7019. [Class 21] [Also in Group XXIX] In a venting arrangement for oil tanks on board ship of the kind comprising a housing with a compartment connected to a tank and containing vacuum and pressure relief valves 9, 5 to permit co ...


5
Boesgaard Soerensen Hans Martin: Fabrication of computer executable program files from source code. Boesgaard Soerensen Hans Marti, June 3, 2009: EP2064648-A1

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...


6
Petersen Mette Vesterager, Sørensen Hans Martin Boesgaard: Computations in a mathematical system. Cryptico, Petersen Mette Vesterager, Sørensen Hans Martin Boesgaard, INSPICOS, December 18, 2003: WO/2003/104969

A method for performing computations in a mathematical system which exhibits a positive Lyapunov exponent, or exhibits chaotic behavior, comprises varying a parameter of the system. When employed in cryptography, such as, e.g., in a pseudo-random number generator of a stream-cipher algorithm, in a b ...


7
Petersen Mette Vestager, Sørensen Hans Martin Boesgaard: A method of performing mathematical operations in an electronic device, a method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data. Cryptico, Petersen Mette Vestager, Sørensen Hans Martin Boesgaard, INSPICOS, June 13, 2002: WO/2002/047272

A method of performing numerical computations in a mathematical system comprises expressing the mathematical system in discrete terms, using fixed-point variables in the computations, and extracting a sub-set of digits of a number. The sub-set of digits may represent a random or pseudo-random number ...


8

9
Boesgaard Martin: Authenticating a web page with embedded javascript. Boesgaard Martin, Inspicos, August 27, 2009: WO/2009/103742

A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method comprises loading the authenticated script code into a trusted computer application and storing a snapshot of the digital document ...


10


Click the thumbnails below to visualize the patent trend.