Patents by Inventor Paul L. Yu

Paul L. Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9161214
    Abstract: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: October 13, 2015
    Assignees: University of Maryland, The United States of America as represented by the Secretary of the Army
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler
  • Patent number: 8848904
    Abstract: The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.
    Type: Grant
    Filed: October 23, 2009
    Date of Patent: September 30, 2014
    Assignees: University of Maryland, College Park, The United States of America as represented by Secretary of the Army
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler
  • Publication number: 20100272256
    Abstract: The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.
    Type: Application
    Filed: October 23, 2009
    Publication date: October 28, 2010
    Applicants: University of Maryland, College Park, United States as represented by Secretary of the Army
    Inventors: John S. BARAS, Paul L. Yu, Brian M. Sadler
  • Publication number: 20100246825
    Abstract: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.
    Type: Application
    Filed: September 8, 2008
    Publication date: September 30, 2010
    Applicant: UNIVERSITY OF MARYLAND
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler