Patents Assigned to Applied Communications Sciences
-
Publication number: 20140099104Abstract: A system comprises a source of entangled photon pairs. The source is to place a signal photon and an idler photon in individual unknown quantum states but in a known entangled quantum state. One or more transmission channels are connected to the source. Each of the one or more transmission channels transmits one of the signal photon or the idler photon. Each of the one or more transmission channels is to substantially balance an instantaneous transmission loss with an instantaneous transmission gain distributed over a transmission distance. Analysis interferometers are configured to receive a corresponding one of the signal photon or the idler photon. Each of the one or more analysis interferometers is to perform a basis measurement on one of the signal photon or the idler photon. Single-photon detectors detect one of the signal photon or the idler photon.Type: ApplicationFiled: October 4, 2013Publication date: April 10, 2014Applicant: APPLIED COMMUNICATION SCIENCESInventors: Nicholas A. Peters, Anjali Agarwal, Paul Toliver
-
Patent number: 8693875Abstract: A system and method for optimizing an optical RF photonic link system is presented. The system comprises a modulator subsystem in which nonlinear response is compensated by an envelope precompensation method and employs an optical filter to suppress optical carriers and extract modulated sidebands, an optical amplifier, and an array of photodetectors, each having a plurality of pairs of diodes. The modulator subsystem performs optical filtering on the signal, the signal is amplified by the optical amplifier and sent to the array of photodetectors. The optical amplifier can be an erbium doped fiber amplifier, or a phase sensitive amplifier. The optical power can be delivered to each diode of the array of photodetectors via a photonic integrated circuit.Type: GrantFiled: November 19, 2009Date of Patent: April 8, 2014Assignee: Applied Communications SciencesInventors: Thomas Banwell, Anjali Agarwal, Paul Toliver, Ted K. Woodward
-
Publication number: 20130246791Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.Type: ApplicationFiled: February 25, 2013Publication date: September 19, 2013Applicant: APPLIED COMMUNICATIONS SCIENCESInventor: Giovanni Di Crescenzo
-
Publication number: 20130227273Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server transmits to a client a public key. The server receives from the client a pseudonym of an interest based on a division malleable commitment method applied to the public key, wherein the pseudonym of the interest functions as a commitment of the client. The server encrypts an item with a padded key and encrypting the padded key. The server transmits to the client, the encrypted item and a pseudonym of a topic associated with the item based on a modification of the commitment by the server using a hybrid conditional-oblivious transfer protocol. When the interest of the client equals the topic associated with the item, the client retrieves a correct padded key to decrypt the encrypted data item; otherwise the client retrieves a random key that is unable to decrypt the encrypted data item.Type: ApplicationFiled: February 25, 2013Publication date: August 29, 2013Applicant: APPLIED COMMUNICATIONS SCIENCESInventor: Applied Communications Sciences
-
Publication number: 20130227274Abstract: A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item. The server computes at least one intermediate topic pseudonym for at least one topic associated with the item by applying the function to each of the at least one topic associated with the item. The server transmits the at least one intermediate topic pseudonym, the at least one interest pseudonym, and the encrypted item to a third party. The third party may apply the function to the at least one intermediate topic pseudonym to produce at least one topic pseudonym associated with the item and transmit the encrypted item to the client for decryption when one of the at least one masked topic pseudonym is equal to one of the at least one interest pseudonym of the client.Type: ApplicationFiled: February 25, 2013Publication date: August 29, 2013Applicant: APPLIED COMMUNICATIONS SCIENCESInventor: Applied Communications Sciences
-
Publication number: 20130218817Abstract: A method for active learning using privileged information is disclosed. A processing device receives a set of labeled examples and a set of unlabeled examples. For each unlabeled example in the set of unlabeled examples, the processing device determines whether to query at least one of an oracle to obtain a label for the unlabeled example or a teacher to obtain privileged information about the unlabeled example. The processing device outputs a decision rule based on minimizing a number of queries to the oracle for a label and the teacher for privileged information. Minimizing the number of queries to the teacher and the oracle is based on a cost of querying the teacher or the oracle.Type: ApplicationFiled: February 19, 2013Publication date: August 22, 2013Applicant: APPLIED COMMUNICATION SCIENCESInventor: Applied Communication Sciences
-
Publication number: 20130094444Abstract: A method for automatically provisioning a WiFi-equipped machine-to-machine (M2M) device is disclosed. A WiFi M2M gateway identifies a WiFi network identifier broadcast by a powered-on M2M device in WiFi ad hoc mode through a scanning procedure and joins the ad hoc network defined by the M2M device. The WiFi M2M gateway obtains device information (e.g., MAC address) of the M2M device. The WiFi M2M gateway transmits a command to the M2M device to switch from ad hoc mode to infrastructure mode. The WiFi M2M gateway registers the M2M device with an M2M server associated with a service provider based on the device information of the M2M device. The WiFi M2M gateway receives a fully qualified domain name (FQDN) associated with the M2M device from the M2M server.Type: ApplicationFiled: October 12, 2012Publication date: April 18, 2013Applicant: Applied Communications SciencesInventor: Applied Communications Sciences