Singapore |
Electrical/Electronic Manufacturing

1

Mette Vesterager Petersen, Hans Martin Boesgaard Sørensen:
Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
Cryptico,
Harness Dickey & Pierce,
January 30, 2007:
US07170997
(55 worldwide citation)

A method of performing numerical computations in a mathematical system with at least one function, including expressing the mathematical system in discrete terms, expressing at least one variable of the mathematical system as a fixed-point number, performing the computations in such a way that the c ...

2

Boesgaard, Sørensen Hans Martin:
Fabrication of computer executable program files from source code.
Boesgaard, Sørensen Hans Martin,
INSPICOS,
March 27, 2008:
WO/2008/034900
(8 worldwide citation)

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...

3

Hans Martin Boesgaard Sørensen:
Digital data authentication.
Codesealer APS,
Harness Dickey & Pierce,
June 18, 2013:
US08468351
(3 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...

4

Sørensen Hans Martin Boesgaard:
Methods for generating identification values for identifying electronic messages.
Cryptico, Sørensen Hans Martin Boesgaard,
INSPICOS,
August 18, 2005:
WO/2005/076522
(1 worldwide citation)

In a method for generating an identification value for identifying an electronic message by application of a first hash function with fixed compression that compresses n blocks of data into a number of blocks, which is smaller than n, the hash function is repetitively applied in a tree-structure com ...

5

Boesgaard, Sørensen Hans Martin:
Digital data authentication.
Boesgaard, Sørensen Hans Martin,
INSPICOS,
June 19, 2008:
WO/2008/071795
(1 worldwide citation)

A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another docume ...

6

Martin Boesgaard:
Authenticating a web page with embedded javascript.
Codesealer APS,
Harness Dickey & Pierce,
June 12, 2012:
US08201248

A method for detecting if a digital document (e.g. an HTML document) is changed by others than authenticated script code (e.g. JavaScript code) is presented. The method includes loading the authenticated script code into a trusted computer application and storing a snapshot of the digital document i ...

7

Boesgaard Soerensen Hans Martin:
Fabrication of computer executable program files from source code.
Boesgaard Soerensen Hans Marti,
June 3, 2009:
EP2064648-A1

A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises the creation of individualized program copies to different groups of users, the insertion of or the deriva ...

8

Petersen Mette Vesterager, Sorensen Hans Martin Boesgaard:
A method of performing mathematical operations in an electronic device, a method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
Cryptico,
November 12, 2003:
EP1360767-A2

A method of performing numerical computations in a mathematical system comprises expressing the mathematical system in discrete terms, using fixed-point variables in the computations, and extracting a sub-set of digits of a number. The sub-set of digits may represent a random or pseudo-random number ...

9

Sorensen Hans Martin Boesgaard:
Methods for generating identification values for identifying electronic messages.
Cryptico,
November 2, 2006:
EP1716663-A1

In a method for generating an identification value for identifying an electronic message by application of a first hash function with fixed compression that compresses n blocks of data into a number of blocks, which is smaller than n, the hash function is repetitively applied in a tree-structure com ...

10

Petersen Mette Vesterager, S Rensen Hans Martin Boesgaard:
Method for improving unpredictability of output of pseudo-random number generators.
Cryptico,
May 25, 2005:
EP1532515-A2

A method for performing computations in a mathematical system which exhibits a positive lyapunov exponent, or exhibits chaotic behavior, comprises varying a parameter of the system. When employed in cryptography, such as, e.g., in a pseudo-random number generator of a stream-cipher algorithm, in a b ...