Patents by Inventor Paul L. Yu

Paul L. Yu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11969309
    Abstract: A system for repositioning teeth a patient from an initial tooth arrangement to a final tooth arrangement includes a plurality of incremental position adjustment appliances, each having an arrangement of cavities shaped to receive and reposition teeth of the patient. The cavities in at least one appliance in the system have a different geometry than that of at least one other appliance in the system. At least some of the appliances in the system are successively worn by the patient to exert force on at least one tooth and move the teeth of the patient from a first arrangement to a successive arrangement different from the first arrangement. The system includes a first multilayer shell with a bending stiffness factor less than about 0.1 GPa*mm3 and an elastic modulus no greater than about 1.5 GPa; and a second shell with a bending stiffness factor greater than 0.1 GPa*mm3.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: April 30, 2024
    Assignee: Solventum Intellectual Properties Company
    Inventors: Ta-Hua Yu, Jennifer L. Cook, Karl J. L. Geisler, Paul A. Sevcik, Bruce R. Broyles, Jennifer K. Tully
  • Patent number: 9161214
    Abstract: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.
    Type: Grant
    Filed: February 19, 2013
    Date of Patent: October 13, 2015
    Assignees: University of Maryland, The United States of America as represented by the Secretary of the Army
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler
  • Patent number: 8848904
    Abstract: The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.
    Type: Grant
    Filed: October 23, 2009
    Date of Patent: September 30, 2014
    Assignees: University of Maryland, College Park, The United States of America as represented by Secretary of the Army
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler
  • Publication number: 20100272256
    Abstract: The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.
    Type: Application
    Filed: October 23, 2009
    Publication date: October 28, 2010
    Applicants: University of Maryland, College Park, United States as represented by Secretary of the Army
    Inventors: John S. BARAS, Paul L. Yu, Brian M. Sadler
  • Publication number: 20100246825
    Abstract: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message signal). The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed. The use of the authentication for channel estimation is also considered, and improved bit errors are demonstrated for time-varying channels. With a long enough authentication code word an authentication system is achieved with very slight data degradation. Additionally, by treating the authentication tag as a sequence of pilot symbols, the data recovery may be improved by the aware receiver.
    Type: Application
    Filed: September 8, 2008
    Publication date: September 30, 2010
    Applicant: UNIVERSITY OF MARYLAND
    Inventors: John S. Baras, Paul L. Yu, Brian M. Sadler