Patents by Inventor John S. Baras

John S. Baras has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8397062
    Abstract: A method and system for authentication is provided. A central node for issuing certificates to a plurality of nodes associated with the central node in a network is also provided. The central node receives a first key from at least one node from among the plurality of nodes and generates a second key based on the received first key and generates a certificate for the at least one node. The generated certificate is transmitted to the at least one node.
    Type: Grant
    Filed: April 21, 2010
    Date of Patent: March 12, 2013
    Assignee: University of Maryland, College Park
    Inventors: Ayan Roy-Chowdhury, John S. Baras
  • Patent number: 8325746
    Abstract: An apparatus and method are provided for optimizing the link-state information that is to be broadcast in a routing domain of a communication network for QoS rule-based link-state routing. The routers include any device capable of implementing the routing primitives. The apparatus and method involve pruning the link-state information using local neighborhood information that has been discovered. The local link-state is pruned so that the QoS optimal paths are preserved for link-state routing. Pruning of the potential optimal paths is carried out to minimize the information broadcast to the intra domain routers in an autonomous system/routing domain. The apparatus and method also involve broadcasting the selected link-state information.
    Type: Grant
    Filed: October 8, 2010
    Date of Patent: December 4, 2012
    Assignee: University of Maryland, College Park
    Inventors: Kiran K. Somasundaram, Kaustubh Jain, Vahid Tabatabaee, John S. Baras
  • Publication number: 20120300992
    Abstract: Methods and apparatuses for authenticating a biometric scanner, such as swipe type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system.
    Type: Application
    Filed: May 24, 2012
    Publication date: November 29, 2012
    Applicant: The University of Maryland
    Inventors: Vladimir Iankov IVANOV, John S. Baras
  • Publication number: 20120300988
    Abstract: Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeit biometric information on the scanner, or on the user authentication system.
    Type: Application
    Filed: May 24, 2012
    Publication date: November 29, 2012
    Applicant: The University of Maryland
    Inventors: Vladimir Iankov IVANOV, John S. Baras
  • Publication number: 20110289311
    Abstract: A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
    Type: Application
    Filed: April 15, 2011
    Publication date: November 24, 2011
    Applicant: University of Maryland
    Inventors: Ayan ROY-CHOWDHURY, John S. BARAS
  • Publication number: 20110085472
    Abstract: An apparatus and method are provided for optimizing the link-state information that is to be broadcast in a routing domain of a communication network for QoS rule-based link-state routing. The routers include any device capable of implementing the routing primitives. The apparatus and method involve pruning the link-state information using local neighborhood information that has been discovered. The local link-state is pruned so that the QoS optimal paths are preserved for link-state routing. Pruning of the potential optimal paths is carried out to minimize the information broadcast to the intra domain routers in an autonomous system/routing domain. The apparatus and method also involve broadcasting the selected link-state information.
    Type: Application
    Filed: October 8, 2010
    Publication date: April 14, 2011
    Applicant: University of Maryland, College Park
    Inventors: Kiran K. Somasundaram, Kaustubh Jain, Vahid Tabatabaee, John S. Baras
  • Publication number: 20110013814
    Abstract: A method and apparatus for authenticating a biometric scanner involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeited biometric information on the scanner, or on the user authentication system.
    Type: Application
    Filed: July 19, 2010
    Publication date: January 20, 2011
    Applicant: The University of Maryland
    Inventors: Vladimir Iankov Ivanov, John S. Baras
  • Patent number: 7827459
    Abstract: The present invention relates to an improved communications protocol which increases the efficiency of transmission in return channels on a multi-channel slotted Alohas system by incorporating advanced error correction algorithms, selective retransmission protocols and the use of reserved channels to satisfy the retransmission requests.
    Type: Grant
    Filed: January 8, 2007
    Date of Patent: November 2, 2010
    Assignee: University of Maryland, College Park
    Inventors: Xiaoming Zhou, John S. Baras
  • Publication number: 20100272256
    Abstract: The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.
    Type: Application
    Filed: October 23, 2009
    Publication date: October 28, 2010
    Applicants: University of Maryland, College Park, United States as represented by Secretary of the Army
    Inventors: John S. BARAS, Paul L. Yu, Brian M. Sadler
  • Publication number: 20100246825
    Abstract: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.
    Type: Application
    Filed: September 8, 2008
    Publication date: September 30, 2010
    Applicant: UNIVERSITY OF MARYLAND
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler
  • Patent number: 7006568
    Abstract: A video encoding/decoding system based on 3D wavelet decomposition and the human perceptual model is implemented. JND is applied in quantizer design to improve the subjective quality of compressed video. The 3D wavelet decomposition helps to remove spatial and temporal redundancy and provides scalability of video quality. In order to conceal the errors that may, occur under bad wireless channel conditions, a slicing method and a joint source channel coding scenario, that combines RCPC with CRC and utilizes the distortion information to allocate convolutional coding rates are proposed. A new subjective quality index based on JND is presented and used to evaluate the overall system performance at different signal to noise rations (SNR) and at different compression ratios. Due to the wide use of arithmetic coding (AC) in data compression, it is considered as a readily available unit in the video codec system for broadcasting.
    Type: Grant
    Filed: May 26, 2000
    Date of Patent: February 28, 2006
    Assignee: University of Maryland, College Park
    Inventors: Junfeng Gu, Yimin Jiang, John S. Baras
  • Patent number: 6127669
    Abstract: A window and level control tool that operates in real time and can quickly determine initial values for window and level settings such that a displayed image is always presented in a readable format is disclosed. The invention transforms input image data into an image histogram. This histogram is then segmented into a small number of parts corresponding to structures of interest. Segmentation of the histogram is done by a novel Viterbi optimal runlength-constrained approximation nonlinear filter. Window and level settings are calculated to correspond to this optimal segmentation. A readable image of one of the structures of interest is then displayed. In another embodiment, the tool provides a menu of optimal window and level settings corresponding to the different types of information a radiologist may be interested in.
    Type: Grant
    Filed: January 29, 1998
    Date of Patent: October 3, 2000
    Assignee: University of Maryland
    Inventors: Nikolaos D. Sidiropoulos, John S. Baras