Patents by Inventor Mark M. Christiansen

Mark M. Christiansen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10311243
    Abstract: Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: June 4, 2019
    Assignees: Massachusetts Institute of Technology, National University of Ireland Maynooth
    Inventors: Flavio du Pin Calmon, Muriel Medard, Linda M. Zeger, Mark M. Christiansen, Kenneth R. Duffy
  • Publication number: 20180046815
    Abstract: Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.
    Type: Application
    Filed: March 13, 2014
    Publication date: February 15, 2018
    Inventors: Flavio du Pin Calmon, Muriel Medard, Linda M. Zeger, Mark M. Christiansen, Kenneth R. Duffy
  • Publication number: 20160154970
    Abstract: Secrecy scheme systems and associated methods using list source codes for enabling secure communications in communications networks are provided herein. Additionally, improved information-theoretic metrics for characterizing and optimizing said secrecy scheme systems and associated methods are provided herein. One method of secure communication comprises receiving a data file at a first location, encoding the data file using a list source code to generate an encoded file, encrypting a select portion of the data file using a key to generate an encrypted file, and transmitting the encoded file and the encrypted file to an end user at a destination location, wherein the encoded file cannot be decoded at the destination location until the encrypted file has been received and decrypted by the end user, wherein the end user possesses the key.
    Type: Application
    Filed: March 13, 2014
    Publication date: June 2, 2016
    Inventors: Flavio du Pin Calmon, Muriel Medard, Linda M. Zeger, Mark M. Christiansen, Kenneth R. Duffy