1

2
Lorenzo Feri, Dragan Sekulovski, Sel Brian Colak, Johan Paul Marie Gerard Linnartz, Paulus Henricus Antonius Damink, Jorge Guajardo Merchan: Method and a system for controlling a lighting system. Koninklijke Philips Electronics, Mark L Beloborodov, September 11, 2012: US08264168 (21 worldwide citation)

A location commissioning method for a lighting system, having several lighting arrangements, includes selecting an illuminated position, assigning the position a position id, measuring light at the position, deriving light data associated with each lighting arrangement from the measured light, assoc ...


3
Jorge Guajardo Merchan, Milan Petkovic: Authenticating a device and a user. Koninklijke Philips, October 13, 2015: US09158906 (7 worldwide citation)

A method of authenticating a device and a user comprises receiving a user input, generating a first key from the user input, performing a physical measurement of the device, obtaining helper data for the device, computing a second key from the physical measurement and the helper data, and performing ...


4
Jorge Guajardo Merchan, Geert Jan Schrijen, Claudine Viegas Conrado, Antoon Marie Henrie Tombeur, Pim Theo Tuyls: Extended functionality of RFID devices. Koninklijke Philips, August 6, 2013: US08502669 (5 worldwide citation)

It is described a RFID device (231a, 231b, 231c, 331) comprising a data memory (236) and an electronic circuit arrangement (237, 238, 239, 247) coupled thereto. The electronic circuit arrangement has a first and a second operational configuration, wherein by receiving a control command (250a) the el ...


5
Jorge Guajardo Merchan, Emmanuel Kwame Owusu, Jonathan McCarrell McCune, James Duran Newsome Jr, Amit Vasudevan, Adrian Perrig: Systems and methods for maintaining integrity and secrecy in untrusted computing platforms. Robert Bosch, Maginot Moore & Beck, June 14, 2016: US09367701 (3 worldwide citation)

A method for operating a computing system with a trusted processor include generating a secret cryptographic key based on a physically unclonable function in at least one hardware component in the trusted processor, generating a first public key and first private key using first secret cryptographic ...


6
Jorge Guajardo Merchan, Attila A Yavuz, Benjamin Glas, Markus Ihle, Hamit Hacioglu, Karsten Wehefritz: System and method for counter mode encrypted communication with reduced bandwidth. Robert Bosch, Maginot Moore & Beck, March 17, 2015: US08983069 (3 worldwide citation)

In a counter mode encryption scheme, a sending device sends a first message including first cipher text and a first counter used to generate the first cipher text to a receiving device for decryption. The sending device subsequently generates a second counter for generating second cipher text. The s ...


7
Attila Altay Yavuz, Jorge Guajardo Merchan, Anvesh Ragi: System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption. Robert Bosch, Maginot Moore & Beck, May 31, 2016: US09355271 (1 worldwide citation)

A method of searching encrypted data includes generating with a client computing device a search index identifier corresponding to a search term in an encrypted search table and transmitting the search index identifier, a first single use key and a second single use key to a server. The method inclu ...


8
Matthew Lewis, Jorge Guajardo Merchan: System and method for cryptographic key identification. Robert Bosch, Maginot Moore & Beck, October 31, 2017: US09806884

A system includes a MEMS device and a key generating device formed over the substrate. The key generating device is configured to generate a cryptographic key based on a property of the MEMS device and the MEMS device is configured to output a signal indicative of a sensed parameter. The generated c ...


9
Daniel Sanwald, Jorge Guajardo Merchan, Andreas Müller: Method for generating a unique package identifier based on physical properties of a package. Robert Bosch, Maginot Moore & Beck, October 16, 2018: US10102407

A method for generating a package identifier includes generating an image of a portion of a surface of a substrate of the package, generating a serial number of the package from the image, the serial number being based on at least one surface feature of the portion of the surface, and affixing a vis ...


10
Jorge Guajardo Merchan, Claudine Viegas Conrado: Controlling data access to and from an RFID device. Koninklijke Philips Electronics, December 18, 2012: US08334757

A method for controlling data access to and from an RFID device wherein the RFID reading device authenticates himself to the RFID device before the RFID device communicates with the RFID reading device. The RFID device is equipped with a physically uncloneable function, which is adapted to produce a ...