Patents by Inventor Steven William McLaughlin
Steven William McLaughlin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8781125Abstract: Systems and methods of securely communicating from a sender device to a receiver device on a communication channel are disclosed. One disclosed method is for securely communicating from a sender device to a receiver device on a main channel when an eavesdropper device is listening on an eavesdropper channel. The main channel has an signal-to-noise ratio SNRM, and the eavesdropper channel has a signal-to-noise ratio SNRE. The method comprises encoding a message at a physical layer with a secure error correcting code (SECC) to produce an encoded message, and transmitting the encoded message on the main channel. The SECC has a set of defined characteristics such that when the eavesdropper device is more than a predetermined distance Z from the sender, at least a predefined fraction of the message is unreliable, where the predefined fraction of unreliable bits renders the eavesdropper unable to reliable decode messages on the main channel.Type: GrantFiled: March 7, 2008Date of Patent: July 15, 2014Assignee: Georgia Tech Research CorporationInventor: Steven William McLaughlin
-
Patent number: 8667380Abstract: A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply a non-systematic error correcting code (NS ECC) to a message, thus producing encoded bits with no clear message bits; and a transceiver (720) configured to transmit the encoded bits over a main channel to a receiver. A method for secure communication includes: encoding a message with an NS ECC to produce an encoded message carrying no message bits in the clear; and transmitting the encoded message over a main channel (120). The NS ECC characteristics result in an eavesdropper channel error probability under a security threshold (320) and a main channel error probability over a reliability threshold (310), whenever an eavesdropper (140) listening on an eavesdropper channel (150) is more than distance Z (220) from the transmitter. Unreliable bits in the encoded bits render the eavesdropper unable to reliably decode messages on the main channel.Type: GrantFiled: October 8, 2009Date of Patent: March 4, 2014Assignees: Georgia Tech Research Corporation, Korea Advanced Institute of Science and Technology (KAIST)Inventors: Steven William McLaughlin, Demijan Klinc, Jeongseok Ha
-
Patent number: 8484545Abstract: Systems and methods for selecting a puncturing pattern for a low density parity check (LDPC) code are disclosed. One such method comprises: selecting a puncture pattern distribution for the LDPC code; calculating a security threshold and a reliability threshold for the LDPC, the LDPC having the selected puncture pattern distribution and also described by a degree distribution; storing the selected puncture pattern distribution responsive to a security gap for the LDPC being a lowest value encountered in any prior iterations; selecting another puncture pattern distribution for the LDPC code; and repeating the calculating, the storing, and the selecting another puncture pattern distribution steps.Type: GrantFiled: April 23, 2010Date of Patent: July 9, 2013Assignees: Georgia Tech Research Corporation, Electronic and Telecommunications Research InstituteInventors: Steven William McLaughlin, Demijan Klinc, Byung-Jae Kwak, Dong Seung Kwon
-
Publication number: 20120174187Abstract: The present invention describes systems and methods for providing physical layer security. An exemplary embodiment of the present invention provides a method of providing physical layer security involving receiving message data at a pre-processing device in a wireless transmission device. Furthermore, the method of providing physical layer security involves pre-processing the message data into channel data with the pre-processing device and transmitting the channel data from the wireless transmission device over a wireless transmission link having a path loss. Subsequently, the method of providing physical layer security involves receiving the channel data at a post-processing module in a reception device. Additionally, the method involves post-processing the channel data into the message data with the post-processing module, such that an unauthorized reception device is unable to post-process the channel data when a path loss experienced over the transmission link is greater than a predetermined value.Type: ApplicationFiled: July 9, 2010Publication date: July 5, 2012Applicant: GEORGIA TECH RESEARCH CORPORATIONInventors: Cenk Argon, Steven William Mclaughlin, Demijan Kling
-
Patent number: 8213616Abstract: Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly selected from a set of symbols. The method also includes transmitting, in a second time period in which signal quality on the main channel is not better than signal quality on the eavesdropper channel, coding information associated with the randomly selected symbols. The method also includes reconciling the randomly selected symbols using the coding information.Type: GrantFiled: September 18, 2007Date of Patent: July 3, 2012Assignees: Georgia Tech Research Corporation, Cambridge Enterprise Limited, Universidade Do PortoInventors: Matthieu Ratislav Bloch, Miguel Raul Dias Rodrigues, Joao Francisco Cordeiro de Oliveira Barros, Steven William McLaughlin
-
Publication number: 20110246854Abstract: A transmitter device (110T) for secure communication includes: an encoder (170) configured to apply a non-systematic error correcting code (NS ECC) to a message, thus producing encoded bits with no clear message bits; and a transceiver (720) configured to transmit the encoded bits over a main channel to a receiver. A method for secure communication includes: encoding a message with an NS ECC to produce an encoded message carrying no message bits in the clear; and transmitting the encoded message over a main channel (120). The NS ECC characteristics result in an eavesdropper channel error probability under a security threshold (320) and a main channel error probability over a reliability threshold (310), whenever an eavesdropper (140) listening on an eavesdropper channel (150) is more than distance Z (220) from the transmitter. Unreliable bits in the encoded bits render the eavesdropper unable to reliably decode messages on the main channel.Type: ApplicationFiled: October 8, 2009Publication date: October 6, 2011Inventors: Steven William McLaughlin, Demijan Klinc, Jeongseok Ha
-
Publication number: 20100275093Abstract: Systems and methods for selecting a puncturing pattern for a low density parity check (LDPC) code are disclosed. One such method comprises: selecting a puncture pattern distribution for the LDPC code; calculating a security threshold and a reliability threshold for the LDPC, the LDPC having the selected puncture pattern distribution and also described by a degree distribution; storing the selected puncture pattern distribution responsive to a security gap for the LDPC being a lowest value encountered in any prior iterations; selecting another puncture pattern distribution for the LDPC code; and repeating the calculating, the storing, and the selecting another puncture pattern distribution steps.Type: ApplicationFiled: April 23, 2010Publication date: October 28, 2010Inventors: Steven William McLaughlin, Demijan Klinc, Byung-Jae Kwak, Dong Seung Kwon
-
Publication number: 20100128877Abstract: Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly selected from a set of symbols. The method also includes transmitting, in a second time period in which signal quality on the main channel is not better than signal quality on the eavesdropper channel, coding information associated with the randomly selected symbols. The method also includes reconciling the randomly selected symbols using the coding information.Type: ApplicationFiled: September 18, 2007Publication date: May 27, 2010Applicants: GEORGIA TECH RESEARCH CORPORATION, UNIVERSIDADE DO PORTO, CAMBRIDGE ENTERPRISE LIMITEDInventors: Matthieu Ratislav Bloch, Miguel Raul Dias Rodrigues, Joao Francisco Cordeiro de Oliveira Barros, Steven William McLaughlin
-
Publication number: 20080219447Abstract: Systems and methods of securely communicating from a sender device to a receiver device on a communication channel are disclosed. One disclosed method is for securely communicating from a sender device to a receiver device on a main channel when an eavesdropper device is listening on an eavesdropper channel. The main channel has an signal-to-noise ratio SNRM, and the eavesdropper channel has a signal-to-noise ratio SNRE. The method comprises encoding a message at a physical layer with a secure error correcting code (SECC) to produce an encoded message, and transmitting the encoded message on the main channel. The SECC has a set of defined characteristics such that when the eavesdropper device is more than a predetermined distance Z from the sender, at least a predefined fraction of the message is unreliable, where the predefined fraction of unreliable bits renders the eavesdropper unable to reliable decode messages on the main channel.Type: ApplicationFiled: March 7, 2008Publication date: September 11, 2008Applicant: GEORGIA TECH RESEARCH CORPORATIONInventor: Steven William McLaughlin
-
Patent number: 6847760Abstract: A system is described that includes a system for correcting modal dispersion and errors in an optical fiber system. The system includes a multisegment photodetector coupled to an end of an optical fiber for detecting optical signals exiting the optical fiber and for converting the optical signals to an electrical output, the multisegment photodetector including a plurality of photodetector regions configured such that one of the plurality of photodetectors regions intercepts a mode in a manner distinct from another of the plurality of photodetectors. The system also includes logic configured to receive a resultant signal output from the photodetector regions and provide forward error correction decoding of the resultant signal.Type: GrantFiled: July 24, 2002Date of Patent: January 25, 2005Assignee: Georgia Tech Research CorporationInventors: Cenk Argon, Steven William McLaughlin, Ketan Patel, Stephen E. Ralph
-
Publication number: 20040247238Abstract: A system is described that includes a system for correcting modal dispersion and errors in an optical fiber system. The system includes a multisegment photodetector coupled to an end of an optical fiber for detecting optical signals exiting the optical fiber and for converting the optical signals to an electrical output, the multisegment photodetector including a plurality of photodetector regions configured such that one of the plurality of photodetectors regions intercepts a mode in a manner distinct from another of the plurality of photodetectors. The system also includes logic configured to receive a resultant signal output from the photodetector regions and provide forward error correction decoding of the resultant signal.Type: ApplicationFiled: July 24, 2002Publication date: December 9, 2004Applicant: Georgia Tech Research CorporationInventors: Cenk Argon, Steven William McLaughlin, Ketan Patel, Stephen E. Ralph
-
Publication number: 20030093741Abstract: A system is described for decoding product codes. The system includes logic configured to pass reliability determinations made while decoding symbols using first parity information, to use in decoding the symbols using second parity information, while substantially simultaneously passing the reliability determinations made while decoding the symbols using the second parity information, to use in decoding the symbols using the first parity information.Type: ApplicationFiled: July 24, 2002Publication date: May 15, 2003Inventors: Cenk Argon, Steven William McLaughlin
-
Patent number: 6246346Abstract: A storage system employs a method for encoding a sequence of input data blocks into a sequence of codewords. Each input data block includes a first predetermined number of bits (the data block length). Each codeword includes a second predetermined number of bits (the codeword length). The code rate, i.e., the ratio of the first number to the second number, is greater than ¾. The method is performed in a sampled-data channel in a storage system; and the channel includes a circuit the performance of which is adversely affected by an excessive run length of bits between occurrences of a predetermined influential pattern. Preferably, the influential pattern is a two-bit sequence of adjacent 1's, which favorably influences the performance of a timing recovery circuit. The method includes receiving the sequence of input data blocks and generating the sequence of codewords responsive to the received sequence of input data blocks.Type: GrantFiled: October 24, 1997Date of Patent: June 12, 2001Assignee: Western Digital CorporationInventors: Robert Leslie Cloke, Patrick James Lee, Steven William McLaughlin