Sanjay Sarma - Belmont MA, US Daniel W. Engels - Lincoln MA, US Erik L. Nygren - Somerville MA, US Joseph T. Foley - Cambridge MA, US David L. Brock - Natick MA, US Kai-Yeung Sai - Hong Kong, HK
Assignee:
Massachusetts Institute of Technology - Cambridge MA
International Classification:
G06F 15/16
US Classification:
709200, 709245
Abstract:
An object name system (ONS) for locating one or more servers associated with an Electronic Product Code (EPC) is described. The system utilizes translation format strings to translate an EPC to an EPC domain prefix. The ONS server matches the EPC number to the address of a second server which has extensive information about the product. The second server recognizes the incoming EPC's as belonging to a particular object or service.
Single Antenna Single Reader System And Method For Locating A Tag
A single antenna single reader (SASR) system and method for locating a tag. The reader connects to a single antenna that is in motion. The reader transmits an interrogation signal to the tag. The reader receives a response signal from the tag. The reader determines the range of the tag from the reader, the received signal strength (RSS) of the response signal at the reader from the tag, and the maximum correlation of the response signal at the reader from the tag. The reader determines the location of the tag using range of the tag from the reader, received signal strength and maximum correlation of the response signal.
Hybrid Mode Cryptographic Method And System With Message Authentication
Eric Myron Smith - Dallas TX, US Daniel W. Engels - Colleyville TX, US Peter Schweitzer - Watertown MA, US Troy A. Schultz - Cambridge, CA
International Classification:
H04K 1/00 H04K 1/04 H04L 9/00 H04L 9/32
US Classification:
380 28, 380 37, 380263, 380268, 380277, 713170
Abstract:
An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that is the size of the state.
Cryptographic Processor With Dynamic Update Of Encryption State
Daniel W. Engels - Colleyville TX, US Kenneth Alan Lauffenburger - Plano TX, US Eric Myron Smith - Dallas TX, US Troy Hicks - Allen TX, US
International Classification:
H04L 9/28
US Classification:
380 28, 380265
Abstract:
An efficient implementation of a cryptographic processor that dynamically updates the encryption state is described. The cryptographic processor can be implemented with a minimal number of gates, yet still perform cryptographic operations quickly. The cryptographic processor has an interface, a memory, a pseudorandom permutation block and control logic. The interface receives input data blocks and returns cryptographically processed data blocks. The memory is used to store an encryption state of the cryptographic processor. The pseudorandom permutation block transforms a portion of the encryption state that is modified for each input data block by at least the input data block and a previously transformed data block. The control logic routes data in the cryptographic processor to return cryptographically processed data blocks at the interface and update dynamically the encryption state stored in memory using the transformed data blocks from the pseudorandom permutation block.
Method And Apparatus For Routing Data In Automatic Identification System
Sanjay Sarma - Belmont MA, US Daniel Engels - Lincoln MA, US Laxmiprasad Putta - Wellesley MA, US Sridhar Ramachandran - Watertown MA, US James Waldrop - Somerville MA, US
International Classification:
G06K 15/00
US Classification:
235383000
Abstract:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
Method And Apparatus For Routing Data In An Automatic Identification System
Sanjay Sarma - Belmont MA, US Daniel Engels - Lincoln MA, US Sridhar Ramachandran - Watertown MA, US James Waldrop - Somerville MA, US
International Classification:
G06F 17/40 G06F 15/173
US Classification:
707104100, 709238000
Abstract:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
Method And Apparatus For Routing Data In An Automatic Identification System
Sanjay Sarma - Belmont MA, US Daniel W. Engels - Lincoln MA, US Laxmiprasad Putta - Wellesley MA, US Sridhar Ramachandran - Watertown MA, US James L. Waldrop - Somerville MA, US
International Classification:
G05B 19/02 G06F 17/30
US Classification:
700 7, 707639, 707E17005
Abstract:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
Method And Apparatus For Routing Data In An Automatic Identification System
Sanjay Sarma - Belmont MA, US Daniel W. Engels - Lincoln MA, US Laxmiprasad Putta - Wellesley MA, US Sridhar Ramachandran - Watertown MA, US James L. Waldrop - Somerville MA, US
International Classification:
G06F 17/30 G06F 7/00
US Classification:
707639, 707812, 707E17044
Abstract:
A system for routing data in an automatic identification system includes an event management system (EMS), a real-time in-memory data structure (RIED) coupled to the EMS, the RIED for storing event information gathered by the EMS and a task management system (TMS) for ensuring that the RIED is updated by one transaction at a time. With this particular arrangement, a system for managing a large number of real-time events is provided. In one embodiment, the control system can be provided in a distributed hierarchical arrangement. The EMS of each control system can include filters which limit the amount of information provided to the next level in the hierarchy. In this manner the hierarchical control system network acts as a high volume data collector and processor. In some embodiments a level of the hierarchy can be removed spatially and/or temporally from an adjacent level in the hierarchy. This approach results in an intelligent network and also lends itself to scalability. By including optional filters and queues in the EMS, the EMS can be configured as desired.
Southern Methodist University Sep 2018 - May 2020
Professor of Practice, Office of the Provost
Southern Methodist University Jan 2017 - Sep 2018
Director and Director of Curriculum, Master of Science In Data Science Program
Southern Methodist University Sep 1, 2013 - Dec 2016
Associate Professor, Department of Computer Science and Engineering
Southern Methodist University Sep 2010 - Aug 2013
Visiting Fellow
Revere Security Aug 2009 - Aug 2012
Chief Technology Officer
Education:
Massachusetts Institute of Technology 1996 - 2000
Doctorates, Doctor of Philosophy, Electrical Engineering, Electrical Engineering and Computer Science, Computer Science, Philosophy
University of California, Berkeley 1992 - 1995
Master of Science, Masters, Electrical Engineering, Electrical Engineering and Computer Science, Computer Science
University at Buffalo 1988 - 1992
Bachelors, Bachelor of Science, Computer Engineering
Skills:
Rfid+ Wireless Embedded Systems Program Management Mobile Devices Product Management Cloud Computing C Semiconductors Sensors Distributed Systems Start Ups Security System Architecture Rf Product Marketing Algorithms Product Development Wireless Sensor Networks Mobile Technology Systems Engineering Business Strategy Strategic Planning Digital Signal Processors Linux Integration Strategic Partnerships Cryptography Image Processing Entrepreneurship Software Development Artificial Intelligence Programming Java Patents R&D Antennas Mobile Applications Python Software Engineering Automation Latex Simulations Saas Team Leadership Solution Selling Electronics Android Perl Engineering Management
Founder at Dragon Associates, LLC, Visiting Fellow at Southern Methodist University, Member at AIDC 100
Location:
Dallas/Fort Worth Area
Industry:
Computer & Network Security
Work:
Dragon Associates, LLC - Dallas/Fort Worth Area since Aug 2006
Founder
Southern Methodist University - Dallas, Texas since Sep 2010
Visiting Fellow
AIDC 100 since 2006
Member
CRFID 2011 - 2012
Chair
Revere Security Aug 2009 - Aug 2012
Chief Technology Officer
Education:
Massachusetts Institute of Technology 1996 - 2000
Doctor of Philosophy (Ph.D.), Electrical Engineering and Computer Science
University of California, Berkeley 1992 - 1995
Master of Science (M.S.), Electrical Engineering and Computer Science
University at Buffalo 1988 - 1992
Bachelor of Science (B.S.), Electrical and Computer Engineering
Skills:
Embedded Systems Systems Engineering Mobile Applications RFID+ Semiconductors Python Business Strategy SaaS Wireless Integration Program Management Product Development Software Engineering Algorithms Image Processing RF Automation Entrepreneurship Product Management Sensors Strategic Planning Software Development Team Leadership Artificial Intelligence Programming Digital Signal Processors LaTeX Cloud Computing Mobile Devices Linux Java C Product Marketing Start-ups Patents Solution Selling Simulations Electronics Strategic Partnerships Android Perl Cryptography Engineering Management R&D Wireless Sensor Networks