Greater Atlanta Area |
Consumer Goods

1

Boesgaard, Sørensen Hans Martin:
Fabrication of computer executable program files from source code.
Boesgaard, Sørensen Hans Martin,
INSPICOS,
March 27, 2008:
WO/2008/034900
(8 worldwide citation)

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...

2

Sørensen Hans Martin Boesgaard:
Methods for generating identification values for identifying electronic messages.
Cryptico, Sørensen Hans Martin Boesgaard,
INSPICOS,
August 18, 2005:
WO/2005/076522
(1 worldwide citation)

In a method for generating an identification value for identifying an electronic message by application of a first hash function with fixed compression that compresses n blocks of data into a number of blocks, which is smaller than n, the hash function is repetitively applied in a tree-structure com ...

3

Boesgaard, Sørensen Hans Martin:
Digital data authentication.
Boesgaard, Sørensen Hans Martin,
INSPICOS,
June 19, 2008:
WO/2008/071795
(1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...

4

Petersen Mette Vesterager, Sørensen Hans Martin Boesgaard:
Computations in a mathematical system.
Cryptico, Petersen Mette Vesterager, Sørensen Hans Martin Boesgaard,
INSPICOS,
December 18, 2003:
WO/2003/104969

A method for performing computations in a mathematical system which exhibits a positive Lyapunov exponent, or exhibits chaotic behavior, comprises varying a parameter of the system. When employed in cryptography, such as, e.g., in a pseudo-random number generator of a stream-cipher algorithm, in a b ...

5

Petersen Mette Vestager, Sørensen Hans Martin Boesgaard:
A method of performing mathematical operations in an electronic device, a method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
Cryptico, Petersen Mette Vestager, Sørensen Hans Martin Boesgaard,
INSPICOS,
June 13, 2002:
WO/2002/047272

A method of performing numerical computations in a mathematical system comprises expressing the mathematical system in discrete terms, using fixed-point variables in the computations, and extracting a sub-set of digits of a number. The sub-set of digits may represent a random or pseudo-random number ...