Nsa Technology Transfer Program
Nsa Technology Transfer Program
Nsa Technology Transfer Program
IGNITING INNOVATION It is our priority to use NSAs research to support technology development that will
advance Agency mission, create jobs, grow our economy, and add dimension, depth,
and strength to our national security.
Patent license agreements with NSA create opportunities for businesses to gain
product differentiation and a competitive edge. Our greatest satisfaction comes from
helping businesses discover new applications for Agency technologies. Whether your
business is a large corporation, a medium-sized business, or an entrepreneurial start-up,
the NSA TTP stands ready to be your committed partner. We hope you will work with
us to ignite innovation at your company!
Sincerely,
Linda Burger
Director, NSA Office of Research & Technology Applications (ORTA)
Technology Transfer Program
NSA Patent Portfolio
V 4.0
Awards
National Security Agency
Technology Transfer Program
Excellence in Tech Transfer, Federal Laboratory Consortium
Office of Research & Technology Applications
NSA Research Directorate 2017, 2015, 2012
9800 Savage Road, Suite 6843
Ft. Meade, MD 20755-6843 American Inhouse Design Awards, Graphic Design USA (2017)
Marylands 2016 Top 100 Women, Daily Record (Linda Burger 2016)
[email protected]
Top 18 Women in Technology, State of Maryland (Linda Burger 2016)
866-680-4539
www.nsa.gov/techtransfer
Our Mission 1
CYBER 21
Leveraging NSA Technology 2
Patent License Agreements (PLAs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Data Port Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
State-Change Detector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
BIG DATA 7
Image-Projection Plus Facial Recognition User Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Single-Image Super Resolution of Low Resolution Images. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Tracking Activity of Removable Electronic Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
SAGA: Measuring Similarity between Data Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 PULSE: MESH Network Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Linear Interpolative Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Measuring Software Integrity with LKIM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Real-Time Simultaneous Identification of Multiple Voices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Dynamic Network Traffic Rerouting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Digital Transmission Decoder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Select High-Level Privileges for Computer Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
ScribeZone: A Multimedia Instructional Design System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Objectively Assessing System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Collision-Free Hashing for Near-Match Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Accelerated Batch Digital Signature Verification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Assessing Language Translation and Interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Reliably Communicating Via Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Identifying Connected Data in a Relational Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Establishing Suitable Master Nodes in Computer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Measuring Voice Signal Enhancement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Computer Stack Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Automatic Topic Identification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Cryptographic Key Exchange Using Efficient Elliptic Curve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
ALADDIN: Database Searching and Identifying Text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Dual Counter Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Realistic Testing and Comparison of Voice Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Random Number Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Identifying Digital Audio Signal Format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Proof of Unsatisfiability Solution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Automated Detection of Duplicate Audio and Voice Recordings. . . . . . . . . . . . . . . . . . . . . . . . . 15 Secure, Efficient Firewall for Connectionless Network Packets . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Modeling Single-Class Data from Multi-Class Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Cryptographic Key Agreement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Recognizing Sounds of Speech of Any Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Cryptographic Identification and Digital Signature Using Elliptic Curve . . . . . . . . . . . . . . . . . . 33
Morphological Text Processing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Enhanced Forward Scattered Electron Imaging (FSEI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Automatic Voice Activity Detection in a Signal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Efficient Acknowledgement of Data Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Automated Separation of Handwritten and Machine-Printed Images. . . . . . . . . . . . . . . . . . . . . 17 NetTop: Secure Computing Using Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Solving a Problem in Pattern Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Self-Authenticating Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Efficient, Compatible Key Escrow (Enabling Third-Party Access to Cryptographic Keys) . . . . . 37 Measuring Voice Signal Enhancement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Cryptography Using Modified Fractional Fourier Transform Kernel . . . . . . . . . . . . . . . . . . . . . . 37 Determining Range and Velocity of an Object. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Hacker-Resistant Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Rapid Encoding and Decoding of Signals with Binary BCH Codes. . . . . . . . . . . . . . . . . . . . . . . . 56
Multi-Dimensional Anomaly Detection and Deviation Identification. . . . . . . . . . . . . . . . . . . . . . 38 Estimating Digital Signal Frequency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Filter System for Information Network Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Code Generation that Minimizes Error Propagation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Transmitter Geolocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Legislation, policy, and guiding principles can be found in the References section of this catalog.
2. Imagine 6. Negotiate
Grow your company with Lets make a deal
our technologies
Now that your business plan has been
Does one of our patents interest you? accepted, its time to negotiate and sign
GOVERNMENT FUNDS FEDERAL LABS, R&D COMMERCIAL MARKETPLACE
Imagine fueling your businesss growth a patent license agreement.
with NSA technology.
7. Acquire
Benefits 3. Connect Put NSA technology to work for you
Create new products or enhance your current products Reach out to NSAs TTP
Bring your idea to life by moving NSA
Launch a company around one of our technologies
Contact us and get help moving your technology from the lab to the commercial
Achieve market advantage by accessing innovative technology ideas to innovation! 866-680-4539 marketplace.
Save time and money by leveraging federal research and development (R&D) resources or [email protected]
8. Create
4. Engage New products, new business, new jobs
Talk with our inventors
Do your part to strengthen the economy
Get first-hand access to the intellect by creating new products, businesses,
behind NSAs inventions. and jobs.
Mobility
Mobility can be generally defined as a technology or methodology that enables the free and
efficient movement of data, things, people, or services. NSA has long applied its intelligence
and expertise to the mobility field by finding new ways to ensure that information is transported
both safely and securely. The technologies in this section have numerous applications in several
fields including signals processing, physical security, and communications.
This technology improves the readability of optical character recognition (OCR) output Data transmission is no stranger to packet loss, but what can you
for low resolution (LR) scanned documents. Super resolution (SR) images are typically do when the missing information is vital? This technology can
generated using multiple LR images. This invention, however, is a single-image super test the continuity of data packets and predictbased on what
resolution (SISR) method that drastically reduces the character error rate (CER) found came before and after the losswhat information is missing or
when high resolution image estimates obtained with this technology are input to garbled. The tool could be used for debugging, data analysis,
OCR engines, compared with CER found with the original LR images. Moreover, this or error detection for all types of transmissions including sound
technology significantly lowers CER found with competing SISR methods, with speed samples and facsimiles.
comparable to fast SISR interpolation methods.
POTENTIAL APPLICATIONS:
POTENTIAL APPLICATIONS: Data acquisition and forwarding systems
Document archival and retrieval Debugging and/or analysis (e.g., debugging errors in a handshake)
Automated tools for information management Telecom equipment that interfaces with different timing and communication systems
and maintenance
Analog to digital conversion (e.g., digitizing audio, scanning documents)
Document image collection
This invention measures similarities between sets of data. The data could be natural- The technology provides multiple speaker
language documents or articles, product descriptions, queries, computer code, identification by identifying voices (or other sounds)
metadata, or measurements from any real-world objects or processes. The technology in a manner that uniquely mimics the essence of the
is able to determine similarities between data sets without needing to know how they ear-to-brain interconnection through extensive human
interact. Omitting duplicate pieces of data allows the technology to provide more voice identification learning and recognition training.
accurate results. Additionally, this technology can provide patterns over time of the The object is real-time or faster voice identification
data entered. This invention takes a holistic view of the data to make recommendations needing only relatively simple computing resources.
that are more accurate than commonly used methods. Specifically, this invention looks for prosody matches
(spectral patterns over time periods) that were
Critical for managing and sorting through immense quantities of data, this capability
trained into a software Artificial Neural Network
can enhance big data analytics in multiple fields including online shopping, social
(ANN)based model. Although intended to be used
media, genetics, and law enforcement.
together, the Infinite Impulse Response (IIR) filter
REAL-TIME VOICE
POTENTIAL APPLICATIONS: patent can be singularly applied to other uses as well.
IDENTIFICATION
A recommendation system that is more POTENTIAL APPLICATIONS:
accurate and doesnt require ratings
Voice recognition for home automation
Analyze usage patterns in websites or applications
Sound detection for security systems
Social network analysis
Assistive technology
Focused advertising
Audio forensics
Identify correlations in medical documents,
Biomimetic voice systems
articles, or reports
Genetic analysis
Forensic accounting
HASH FUNCTION
identifies the minimum number of messages that must
be decoded to achieve desired results. enabling faster hashing and data retrieval. In this instance,
a near match is one where the number of bit locations that
Encoded messages typically contain redundant data to differ is small and, therefore, could more easily be found than
counteract communications noise that can introduce errors, if the inputs were not near matches. This technology reduces
but the presence of extra information makes decoding the time spent searching for collision-causing inputs.
more difficult. This technology overcomes the problem by
treating redundant data as code words that identify the POTENTIAL APPLICATIONS:
message portion. Big data analytics
POTENTIAL APPLICATIONS: Data processing
Telecommunications Encryption algorithms NO COLLISIONS
Knowledge management
Big data analytics
Assessing Language Translation and Interpretation
Method of Assessing Language Translation and Interpretation
US PATENT # 8,185,373 | EXPIRES JANUARY 17, 2031
ScribeZone: A Multimedia Instructional Design System
This patented method establishes a standard for translation metrics, offering analysis
Device for and Method of Language Processing
US PATENT # 8,380,485 | EXPIRES AUGUST 11, 2031 and feedback for grading and improving translation activities. When translating from
a source language to a target language, word-for-word substitutions are not always
ScribeZone is an educational technology that facilitates development and delivery of adequate due to nuance, cultural variation, and native meaning. This technology
interactive multimedia courseware for the classroom. ScribeZone enables instructors provides user-definable ratings of accuracy, interpretation of intended message, and
to synchronize multimedia files with their corresponding written texts and then divide formatting, enabling effective language translation and interpretation of the source
the media into manageable learning blocks to appropriately focus and challenge their material. By not focusing on specific word choice, the technology is also able to more
learners. Instructors can customize and frame courseware with hints, glossaries, and accurately assess the quality and accuracy translations and interpretations, taking
links to outside resources. ScribeZone presents the multimedia courseware and its concerns such as sentiment and content into account.
sophisticated media playback system in one window, making course materials easy to
develop, access, navigate, and complete. POTENTIAL APPLICATIONS:
Language training and evaluation
POTENTIAL APPLICATIONS:
Language curricula/materials development and assessment
K-12 and higher education
Linguistics
Foreign language and English as a
Second Language (ESL) courseware Speech signal processing
development
Government, military, and law TRANSLATION METRICS
enforcement applications
Medical and legal transcription
IMPROVED TRANSLATION
and translation
Media and broadcasting F E E D B AC K
This technology leverages Structured Query This technology enables automatic identification of topics in machine-readable text
Language (SQL) in relational databases to discover in any language and from any source, including voice transcripts and material scanned
connected data. Because the data does not need for optical character recognition (OCR). This method of topic identification in a machine-
to be transformed, the algorithm is able to operate readable text overcomes the limitations of earlier approaches based on keyword
in the databases natural information storage format. searches, which tend to degrade in performance when dealing with variations in
This also enables efficient discovery of connected keyword spelling without any significant change in meaning.
data and easy identification of common labels.
POTENTIAL APPLICATIONS:
This approach is limited only by the processing
capacity of the database and delivers results faster Search engine enhancement
and more accurately than other methods. Search tools for mobile devices
POTENTIAL APPLICATIONS: Document storage and retrieval TOPIC
Social media
ALADDIN: Database Searching and Identifying Text
Retail
Method of Database Searching
Telecommunications US PATENT # 7,797,152 | EXPIRES FEBRUARY 10, 2028
Natural Language Database Searching Using Morphological Query Term Expansion
US PATENT # 7,761,286 | EXPIRES MARCH 7, 2029
Measuring Voice Signal Enhancement Method of Identifying and Highlighting Text
Method of Measuring Degree of Enhancement to Voice Signal US PATENT # 7,539,611 | EXPIRES MARCH 1, 2027
US PATENT # 7,818,168 | EXPIRES AUGUST 18, 2029
This technology is a combination of three inventions: two natural language database
This technology measures the degree of enhancement made to a voice signal, search methods and a method of identifying and highlighting text. The Tagger searches
reducing the need for human arbitrations and other various listening tests. Statistically, for transliterated terms (such as names) within large data sets using lexical, contextual,
voice signals are non-stationary, changing over time. The more a signal becomes and morphological information. The Matcher is then applied to determine which
corrupted, however, the more stationary its distribution of values becomes. In this candidate terms are known within the database and are therefore of likely increased
technology, the degree of reduction in the signals distribution indicates the degree interest to the reader. This knowledge-based systems ability to work without relying
of enhancement made to the signal. This invention quantifies the voice enhancement on any one query language grants non-expert users access to an extensive collection
by comparing how stationary the distribution of values are between original and of linguistic information and expertise. A typical application for this technology is name
enhanced signals. searching since names have unique linguistic and cultural complications and extracting
POTENTIAL APPLICATIONS: names from data sources can be difficult.
TERMS KNOWN
LARGE DATA SETS TRANSLITERATED TERMS WITHIN DATABASE
This extensible technology isolates data (text, image, and voice) representing a target
class from heterogeneous data representing multiple data categories of the same
Identifying Digital Audio Signal Format type. The method may be applied to identify speech from a speaker of interest in an
Method of Identifying Digital Audio Signal Format audio stream containing speech from several other speakers, and extends naturally to
US PATENT # 7,620,469 | EXPIRES JULY 30, 2028 language and gender identification and more generally to image and text applications.
By automatically selecting data representing a particular class from multi-class data,
This technology identifies the format of a digital audio
nonessential artifacts may be removed from models trained on multi-class data,
signal, including signals that are either self-defining
thereby enhancing detection and identification capabilities. The complexity of
or headerless. Some audio signal file formats include
statistical models is also reduced, eliminating the need for costly memory swapping.
header information indicating the digital encoding
scheme, while other file formatsreferred to as POTENTIAL APPLICATIONS:
headerlessdo not indicate the encoding scheme. Speech applications such as speaker Improved classification accuracy
This technology automatically identifies file format, recognition, gender identification, in pattern recognition scenarios
an improvement over other methods, and reduces or language recognition Biometric data discrimination
or eliminates the need for human listening.
POTENTIAL APPLICATIONS:
Audio forensics
Archiving and cataloguing audio libraries
Media systems
This technology processes spoken sounds, independent of the language used, and This technology eliminates the need to manually search audio files for speech
translates them into text. Using a unique, universal alphabet comprised of phonetic content by automatically locating speech intervals that contain other signals such as
sounds from approximately 15 languages, this technology enables the ability to train music, noise, or empty space. It reports the start and stop times of these intervals
speech recognition systems to recognize sounds from different languages. relative to the beginning of the file, ignoring non-speech portions of the file. By
classifying signal segments as speech or non-speech, this technology improves the
Speech processing applications rely on their corpora for translationthat is, their
performance of speaker recognition systems by reducing the amount of bandwidth
internal database of text that aids in translation. Multi-lingual speech processing
and traffic to be analyzed.
applications typically require corpora from each language to be merged into one large
corpora. This is problematic, as the applications can sometimes produce inaccurate or POTENTIAL APPLICATIONS:
unintelligible results. This technologys built-in corpora, or database of writings, allows Automated transcription services Speaker recognition processing
speech processing applications to identify sounds from multiple languages without
VoIP and mobile telephony Noise suppression systems
the need for manual checking or outside databases.
Audio conferencing Frequency scanning equipment
POTENTIAL APPLICATIONS:
Language training and evaluation of artificial intelligence
Foreign language and English as a Second Language (ESL)
courseware development
Medical and legal transcription and translation
Media and broadcasting
Government, military, and law enforcement applications
This technology works against a core problem known as feature selection, which is KODA is able to quickly process large amounts of textual data sets, extract key phrases
seen in almost every pattern recognition problem. The Geometric Linear Discriminant or sentences, and reduce each document to a few representative passages. The depth
Analysis Pattern Recognition System diminishes the complexity of pattern recognition of detail is user-definable. The results provide users the ability to make rapid, accurate
systems by reducing the dimension of the observation space. System performance is decisions about whether the document is relevant to their needs. This technology
driven by accurate modeling. The ability to build good models is driven by the number can be applied to any search-like application that returns a large number of potential
of model parameters and the amount of data available to obtain reasonable estimates document matches.
of those model parameters. This technologys design enables better modeling and
POTENTIAL APPLICATIONS:
better performing pattern recognition systems. This technology can also provide
a method for ranking and selecting features that are important to the classification Accurate summaries of search results listed
of objects and recognition of patterns. Efficient, accurate summaries of document lists such as transcripts or articles
POTENTIAL APPLICATIONS:
Speech recognition
Machine readable
optical labels
This technology uses a simplified, internal algorithm to extract only those sentences
from text that convey the essential meaning, providing a concise summary of the
full text. The number of sentences is limited to provide a summary of the text with
only enough information for a user to determine whether or not to read the text in its
entirety. This technology produces a concise summary independent of any additional
input or evaluation upon which other mechanisms rely such as seed lists, common
expression information, analysis of number and patterns of stop words, or identification
of component words.
POTENTIAL APPLICATIONS:
Condensed text for mobile applications
Search engine query results
Database entry summarization
Abstract development
This invention enhances electronic network security in the same way that radar
improved weather forecasting improves safety, by providing advanced information
to experts who can then determine what, if any, protective action must be taken.
This technology anticipates network intrusion attempts, detects actual attempts, and
detects both existing and new malware. Improving on existing technology, the system
remedies intrusions by changing network topology, or the way in which constituent parts
are interrelated or arranged, countering computer traffic associated with the various
phases of intrusion and countering the source of the adversarial computer traffic.
POTENTIAL APPLICATIONS:
Intrusion prevention systems (IPS)
Identity theft protection
Malware defense
Popular security assessments of information access systems typically rely on such This invention increases the reliability
subjective labels as low, medium, or high, ignoring specific protection tradeoffs of network communications by adaptively
between intrusion and Denial-of-Service (DoS) attacks. This technology objectively constraining the routing of communications
estimates the total vulnerabilities of an information access system that is protected by within a network. By identifying and
multiple verification mechanisms. The final estimation of system vulnerability is derived communicating between the hub and
from the combination of the error tradeoffs for each specific verification. leaf nodes and between hub nodes, the
technology is able to re-designate leaf
POTENTIAL APPLICATIONS:
nodes as hub nodes and vice versa when RE-DESIGNATE
Technology/cyber security auditing firms needed, freeing up network resources and NODES
This technology protects against malware that attempts Dual Counter Mode is a codebook encryption mode that combines features of several
to gain control by corrupting return addresses kept on previous modes to get the advantages of each while eliminating their flaws. The use
ROP
a computers stack. This is commonly known as return of two keystreams enables the encryption mode to be pipelined in hardware, unlike
oriented programming (ROP). ROP is one of the most vicious other modes that only allow pipelining on decryption. Pipelining is a more efficient
techniques malware authors use and easily encompasses method of encryption that allows packets to be decrypted as soon as they are received,
50% of malware today. This inventions approach modifies the ATTACKS preventing packets from bottlenecking and slowing down network performance.
hardware of a computers central processing unit (CPU) using
POTENTIAL APPLICATIONS:
50%
a second stack to validate return addresses stored on the ENCOMPASS
existing stack. The systems hardware-based approach works High-speed data transmissions
transparently with unmodified binary applications and does Encrypted Asynchronous Transfer Mode (ATM) or other packet-based networks
not degrade processing efficiency.
POTENTIAL APPLICATIONS:
E-commerce security OF
Protection of network-enabled objects
MALWARE
TODAY
Cryptographic Key Exchange Using Efficient Elliptic Curve
Method of Generating Cryptographic Key Using Elliptic Curve and Expansion in Joint Sparse Form
and Using Same
US PATENT # 7,505,585 | EXPIRES MARCH 17, 2026
Random Number Generation
Method of Elliptic Curve Digital Signature Using Expansion in Joint Sparse Form
Device for and Method of Generating Pseudo-Random Sequence Uniformly Distributed over Any Range
US PATENT # 7,024,559 | EXPIRES OCTOBER 15, 2024
US PATENT # 7,379,955 | EXPIRES APRIL 27, 2026
Cryptographic Key Exchange Method Using Efficient Elliptic Curve
US PATENT # 6,993,136 | EXPIRES DECEMBER 28, 2023 This technology enables pseudo-random number generation distributed uniformly
This technology is a combination of three patented methods for generating a crypto- over any arbitrary user-definable range, including a range that is not a power of 2 or
graphic key between two users. The patents include the groundbreaking methods a prime number. Analog components are complex and difficult to implement, and
of identifying a digital signature using an efficient elliptic curve but also builds on multiple clock cycles significantly decrease the performance of the generator. This
previous technologies by adding a binary expansion in joint sparse form and a method technology provides increased performance over similar approaches by operating
of generating and verifying a cryptographic digital signature using coefficient splitting. without analog components and producing a random number sequence with each new
Further innovation includes a method of generating a cryptographic key using clock cycle.
coefficient splitting on two different classes of elliptic curves. This can be implemented POTENTIAL APPLICATIONS:
in both a non-authenticated key exchange method and an authenticated key exchange
Stochastic neural networks
method, minimizing the number of elliptic curve operations.
Gambling industry
POTENTIAL APPLICATIONS:
Interactive gaming
Safeguarding confidential information
Identification generation
Secure digital banking transactions
Authentication methods
Connectionless communications involve transmission of each packet based on routing This group of patented technologies highlight enhanced uses of Elliptic Curve
information within the packet itself, rather than according to pre-established rules as in Cryptography (ECC) for cryptographic identification, cryptographic key generation
a connection-based network. The invention minimizes processing time by making an and exchange, and digital signatures. This approach is more efficient than existing
access determination only on the first occurrence of a new connectionless data flow. approaches due to reduced amount of resource requirements for each operation as
The results of this initial evaluationto approve or reject accessare then applied to well as a reduced number of required operations.
subsequently received packets associated with that flow. Comparison time is spent
POTENTIAL APPLICATIONS:
only on packets that have a flow tag never encountered before. The more effective
processing improves firewall performance and reduces operating costs. Secure web browsing
Identity verification
POTENTIAL APPLICATIONS:
Network management
Firewall security
Secure data transfer
HIGH RESOLUTION
LOW COST
Self-Authenticating Cryptography
Efficient Acknowledgement of Data Packets Self-Authenticating Cryptographic Apparatus
Method of Acknowledging Receipt of Data Packets US PATENT # 6,912,284 | EXPIRES JUNE 28, 2027
US PATENT # 6,957,374 | EXPIRES APRIL 22, 2023
This encryption/decryption system incorporates a linear sequence generator and
This invention is an efficient method of reassembling, acknowledging, and transmitting provides encryption and authentication in a single process. The system enables
data packets by accounting for the received packets in groups rather than individually. self-authentication capability without the need for a parity check code. The result
The groups may be comprised of received data packets or gaps in the received data is an improved autokey cipher using infinite error extension while also possessing
packets. Both groupings provide a more efficient way of processing data packets. a high degree of cryptographic security.
POTENTIAL APPLICATIONS: POTENTIAL APPLICATIONS:
Network management Telecommunications
Wide area network (WAN) data transport Secure communication
Quality of Service (QoS) applications Encryption and authentication
Error detection
INCREASED
EFFICIENCY
ENCRYPTION
& DECRYPTION
This technology tests the sufficiency of the output from a random number generator
(or randomizer) by taking samples of the data from within the randomizer, going Cryptography Using Modified Fractional Fourier
beyond traditional randomness tests that use the output from the randomizer. More
Transform Kernel
than just a pass/fail tester, which can produce false positives, this technology shows
Cryptographic Method Using Modified Fractional Fourier Transform Kernel
designers how to improve or fix the design of the randomizer in order to present US PATENT # 6,718,038 | EXPIRES JUNE 24, 2023
sufficiently random results.
This technology is a cryptographic method, using at least one component of a modified
POTENTIAL APPLICATIONS:
fractional Fourier transform (FrFT) kernel, that enables an encrypted message header
Encryption testing, authentication, session keys, public keys to act as an electronic signature. This method encrypts digital signals by the sequential
Secure, private web browsing action of a modified FrFT kernel. The encryptor key is a set of positive numbers
controlling the phase, angle, exponent, FrFT kernel, and wavelet family. Decryption
Network/access security
is achieved by reversing the operations.
Generating identification numbers
POTENTIAL APPLICATIONS:
Data processing and analysis
Secure digital communications
TEMPERATURE
BASED
This technology characterizes the physical layer capabilities of a network device in one This wideband retroreflector provides signal retransmission with low power in a compact
simple measure to dynamically decide the best path based on the performance level design. This invention can significantly improve communications and remote-sensing
of the next-hop neighbor. Traditional wireless ad hoc routing algorithms route traffic applications including air traffic control, ground-to-satellite communications, and
based on whether a path exists and disregard the physical layer limitations of wireless high-rate data transfer from radio-frequency identification (RFID) sensors. The system
communication. With PULSE, however, routing decisions are distributed to individual can also improve communications within or between structures by enhancing signals
nodes on a next-hop basis, eliminating the need to determine the full path through in areas with weak wireless reception.
the network. This method increases throughput by directing traffic to less congested,
The invention consists of an antenna, a circulator, and a mixer, and eliminates the need
more capable paths and drastically reduces the overhead in both routing messages
for a local oscillator and local transmitter. This compact design makes the system easy to
and the required information tracked by each node to direct packets.
deploy and maintain in remote locations. There are minimal power requirements because
POTENTIAL APPLICATIONS: the power comes from an illuminating transmitter and antenna. This technology also
Distributed sensor networks used in upcoming handles high bandwidths more effectively than current systems.
IoT (e.g., electric meters passing usage data back POTENTIAL APPLICATIONS:
to company)
Remote or dangerous area data collection
Range and throughput extension of wireless peer LOW POWER
Vehicle-to-vehicle, or vehicle to stationary COMPACT DESIGN
to peer networks (e.g., disaster relief operations)
object communication and vice versa
Military MESH networks (e.g., updates to/from or between manual
or self-driving vehicles)
Flexible Circuit Unmanned aerial vehicle swarms
Method of Fabricating a Flexible Organic Integrated Circuit Gamification
US PATENT # 7,452,746 | EXPIRES JULY 1, 2027
Method of Thinning Semiconductor Other Publications Wafer of Smaller Diameter
than Thinning Equipment Was Designed for
US PATENT # 6,017,822 | EXPIRES SEPTEMBER 16, 2018
Fabricating and Integrating Decoupling Capacitors
This invention is a method of fabricating flexible Method of Fabricating and Integrating High Quality Decoupling Capacitors
organic integrated circuits (ICs) such as flexible US PATENT # 7,297,613 | EXPIRES JULY 28, 2026
substrates used for large area displays, identification
This technology is a method of fabrication and integration for high-quality decoupling
tags, electronic paper, etc. This technology
capacitors with high capacitance values, low parasitic losses, and long-term reliability.
enables assembly of ICs requiring high
This method produces very high yields, enables other passive elements to be placed
temperature processes, which in turn enables
very close to the processor (or other associated integrated circuit (IC)), and provides
higher system performance at lower power
improved signal integrity between components on ICs.
consumption rates.
POTENTIAL APPLICATIONS:
POTENTIAL APPLICATIONS:
High performance processor systems
Wearable and conformal electronics
Mobile or miniature electronics
Flexible ICs with irregular shapes
Large-area displays
Identification tags
This technology synchronizes time using environmental triggers to ensure that This invention is a method of aligning optical fiber to a photonic integrated chip
nodes (e.g., computer or telecommunication) are working in sync. After the desired that results in lower back reflections.
environmental conditions are set, the node remains in a sleeping state until those
Fiber optic technology is used in a variety of computer and communications
conditions are met. Synchronization can occur without using radio signals, Wi-Fi,
applications due to its high data transmission rates compared to traditional copper
or cellular networks, which reduces susceptibility to loss of service and detectability.
wire. Since computers and communications devices still operate using electrical
Without the need for battery power, the technology is able to conserve energy between
signals, optical signals received must be translated to electrical signals, and vice versa,
intervals of time, making it suitable for potential use in extreme environmental situations.
for communication to take place over optical fibers. For effective signal conversion,
POTENTIAL APPLICATIONS: optical fibers must be precisely aligned with appropriate devices for translation.
Sensors This easily scalable and inexpensive method results in lower insertion losses, easier
Triggering recording equipment alignment, and a more rugged package.
for studies or documentaries POTENTIAL APPLICATIONS:
Military and emergency operations
Synchronizing resource constrained
Telecommunications
Computer networking SCALABLE
INEXPENSIVE
embedded systems
Medical tools, such as magnetic
resonance imaging (MRI) machines
These semiconductor analysis techniques allow clear imaging of the components in an Optical Clock Recovery Device Using Non-Linear
integrated circuit (IC) to be obtained from the top and backside perspectives without Optical Waveguides
adding, altering, or removing elements to the IC. Optical Clock Recovery Device Using Non-Linear Optical Waveguides
US PATENT # 6,701,049 | EXPIRES MAY 13, 2023
These techniques enable clear imaging without staining or
removing the upper layers of metal on the chip. This allows This technology provides an all-optical timing extraction device using the non-linear
enhanced viewing of the interconnects, which reside characteristics of optical waveguides for counter-propagating pulses. This invention
at the lowest level of the chip, and analysis by multiple can resolve timing delays between pulses on the order of a few picoseconds, keeping
conventional imaging techniques. the signal intact.
This technology is a timer circuit that utilizes the thermal runaway effect. The timer
circuit includes a switch, resistor, transistor, and protective device. While the use of
similar circuits may be necessary for situations requiring high precision, many of them
contain additional components, such as clocks, which make the timer circuit more
complicated, larger, and more susceptible to failure.
In this technology, the cycle of current flow
is designed to activate a protective device,
which acts as a time indicator and disconnects
the power to protect the transistor from
damage. The result is a process that is less
complicated and more reliable than other
INCREASE IN EXOTHERMIC
existing methods. Its typical limits are from REACTION RATE REACTION
0.1 seconds to 5 seconds of delay, set by the
operating parameters.
POTENTIAL APPLICATIONS:
Thermal trigger and timer for home automation
HEAT
Timer circuit for door locks for home, office,
HEAT
or vehicles
ESCAPE
Integrated circuit for a startup delay or watchdog timer
This technology is designed to protect cargo shipments This technology measures the degree of enhancement made to a voice signal,
from tampering, theft, counterfeiting, and introduction reducing the need for human arbitrations and other various listening tests.
of hazardous or other unwanted material. A hasp closure Statistically, voice signals are non-stationary, changing over time. The more a signal
secures access to containers like bulk cargo containers or becomes corrupted, however, the more stationary its distribution of values becomes.
storage building doors, and a reusable, serialized tamper- In this technology, the degree of reduction in the signals distribution indicates
indicating seal provides easy visual tamper indication. the degree of enhancement made to the signal. This invention quantifies the voice
enhancement by comparing how stationary the distribution of values are between
POTENTIAL APPLICATIONS:
original and enhanced signals.
Industrial security
POTENTIAL APPLICATIONS:
International shipments
Law enforcement
Awareness of unauthorized entry to a secured area such
as a room, cargo area, or luggage compartment Audio forensics
Medical analysis
Wideband Signal Geolocation
Device for and Method of Geolocation
US PATENT # 7,893,875 | EXPIRES SEPTEMBER 12, 2029
This patented device processes large-length, wideband signals, even at very low
signal-to-noise ratio (SNR), to geolocate an electromagnetic transmitter. The method
also extends methods for real-valued signals to handle complex-valued signals,
which simplifies geolocation modeling of electromagnetic signals (e.g., when Determining Range and Velocity of an Object
base-banding is required). Method of Signal Processing for Determining Range and Velocity of an Object
US PATENT # 7,755,536 | EXPIRES MAY 14, 2029
Two receivers, whose locations and velocities are known, receive a real-valued
Method of Signal Processing
transmitted signal. The signals are digitized, converted to complex-valued, and the US PATENT # 7,545,325 | EXPIRES JULY 28, 2027
method computes the difference in radial velocities of the receivers relative to the
transmitter. The difference in radial velocities and the difference in arrival times of the This technology combines two patented methods to finding range and velocity of a
signal at the receivers are used to geolocate the transmitter with precision exceeding transmitter in a radar system using a time scale factor. The first technology (7,545,325)
standard cross ambiguity function (CAF)based methods. determines the position and velocity of a transmitter over a wide range of bandwidths,
wherein the position and velocity are determined using a scalar relationship
POTENTIAL APPLICATIONS: dependent on the radial velocity of the transmitter with respect to the receiver.
Electromagnetic transmitter geolocation The second technology (7,755,536) models the Doppler process as a time shift and
Search and recovery applications change of scale of the original signal. Unlike other methods, this combined process
resamples the signal at a rational multiple of the original sample rate, enabling efficient
Geolocation of mobile phones
implementation of the scale correlation function.
Wildlife tracking
POTENTIAL APPLICATIONS:
Geolocation
Radar processing application
Fixed transceiver tracking applications
REDUCES
US PATENT # 7,734,991 | EXPIRES APRIL 9, 2029
When transmitting binary data, encoding schemes make the resulting waveform more
Method of Decoding Signals Having Binary BCH Codes
US PATENT # 7,694,207 | EXPIRES FEBRUARY 4, 2029 immune to noise and interference. One class of transmission codes, block or line codes, are
These inventions embody methods of rapidly encoding ERROR used to modulate binary symbols 0 and 1. There is a need to minimize error propagation
in a line code, subject to information rate, ones density, and maximum run length. This
and decoding block codes in communications signals
for the purpose of error detection and correction. By
CORRECTION technology generates a line code so that error propagation is minimized. Other alternatives
TIME
create more work by increasing the output error rate; this method, however, works with
taking advantage of the fast binary syndrome calculations existing error Correction Codes by presenting a lower number of errors.
to identify error-free blocks at initiation, the decoding
POTENTIAL APPLICATIONS:
40%
technology reduces the overall time in software error BY
correction of long binary Bose Chaudhuri Hocquenghem Satellite communications
(BCH) codes by as much as 40% over other known Free space optical communications
methods. The encoding technology uses the decoding
Fiber optics
methods first step results to derive check values. The
method applies to any binary cyclic codes, including Integrated circuits
cyclic redundancy checks (CRCs), and requires no branch
processing as it is data independent.
POTENTIAL APPLICATIONS:
Applications conforming to interoperability standards (such as FNBDT/SCIP)
Networks using multiple communication protocols such as ISDN, PTSN, and IP
Removing Noise and Interference from a Signal
Method of Removing Noise and Interference from Signal
US PATENT # 7,676,046 | EXPIRES JANUARY 7, 2034
Estimating Digital Signal Frequency Method of Removing Noise and Interference from Signal Using Peak Picking
US PATENT # 7,492,814 | EXPIRES AUGUST 16, 2027
Method of Estimating Digital Signal Frequency
US PATENT # 7,715,996 | EXPIRES JUNE 25, 2028 Method of Generating Time-Frequency Signal Representation Preserving Phase Information
US PATENT # 7,457,756 | EXPIRES FEBRUARY 16, 2027
This technology uses a simple differentiation operation to estimate frequency
compared to other processes. This technique is free of localization constraints This technology is a combination of three patents that remove noise and interference
and can resolve time and frequency equally well. This technology improves upon from speech signals. Unlike previous noise and interference removal methods, this
existing technology by having all operations performed in the time domain and technology is able to preserve phase information contained in a signal, which is critical
without any filtering. for reconstructing the waveform after noise removal, and adequately identify and
separate the signal and non-stationary interference components.
POTENTIAL APPLICATIONS:
POTENTIAL APPLICATIONS:
Digital spectral estimations
Mobile telecommunications
Radar, sonar, and telephony signal processing
Voice-over-IP applications
Complex modulation structures
This technology tests the robustness of a given voice- This technology estimates the carrier frequency of a mistuned high frequency (HF)
matching algorithm by providing the algorithm with single sideband signal from the structure of the underlying speech signal. Relying on
variants of a digital file. The testing done against the the structure found in voiced speech signals, this technology processes the observed
original voice sample could include time-reversal, pitch harmonics to estimate the signal carrier frequency, which eliminates the need for
segmented re-arrangement, or a mixture of both ORIGINAL manual tuning of the receiver and ensures that the signal is tuned correctly each time.
time-reversal and segmented re-arrangement.
POTENTIAL APPLICATIONS:
This approach produces a larger corpus from fewer
files, allowing for realistic testing under controlled Ham (radio) operators
conditions. It also reduces the Equal Error Rate (EER)
i.e., the rates of false acceptance and false rejection,
increasing performance in voice comparison methods.
TIME-REVERSAL
Military use
Linguistic analysis NO
POTENTIAL APPLICATIONS:
Voice matching systems
MANUAL
Authentication systems
Biometric systems
SEGMENTED
RE-ARRANGEMENT
TUNING
Range Limited Antenna N E E DE D
Range Limited Antenna
US PATENT # 7,642,986 | EXPIRES JULY 18, 2028
Range Limited Antenna
US PATENT # 7,292,202 | EXPIRES JANUARY 15, 2026
Amplifying a Digital Signal
This technology is a Range Limited Antenna (RLA) containing two or more antenna Method of Amplifying a Digital Signal and Device Therefor
elements arranged in sets. The technology features a radio frequency (RF) signal US PATENT # 7,400,194 | EXPIRES OCTOBER 24, 2026
processing network connected to paired sets of antenna elements so the antenna is This technology enables all-digital power amplification suited for small, battery-
sensitive to signals within a Region of Interest (ROI) and insensitive to signals outside operated devices. Utilizing a sleep mode for the switching amplifier prolongs the
the ROI. Since the impinging signal sources in most RF environments are distributed battery life and increases efficiency in power usage. Reduced electromagnetic
over a very wide physical area, each signal must be analyzed and identified interference (EMI), which can degrade performance in surrounding elements, allows
manually, though much of the spectrum is dynamic and cannot be easily classified. the amplifier to be employed without additional shielding. Both of these qualities make
This technology solves this problem, allowing users to determine the approximate the system easier to conceal and reduce the cost of production.
range of the signal source from the antenna array. The design supports an operating
frequency range of 1MHz to 3GHz and allows adjustments to cut-off, radius- POTENTIAL APPLICATIONS:
attenuation rate, frequency band, and sensitivity. MP3 players
POTENTIAL APPLICATIONS: Hearing aids
Small-radius radio operations
(airport towers, special ops command vehicles)
Warehousing a close-range radio-frequency
identification (RFID) tracking
Detecting, monitoring, and locating
unlicensed emitters
Broadcast systems that deal with
cross-interference from competing signals
This wideband retroreflector provides signal retransmission with low power in a This technology is a single frequency repeater that retransmits a signal at the same
compact design. This invention can significantly improve communications and remote- frequency and at a higher power level. The repeater is also designed to avoid problems
sensing applications including air traffic control, ground-to-satellite communications, associated with feedback and concurrent oscillation. This technique requires less
and high-rate data transfer from radio-frequency identification (RFID) sensors. The spectrum than retransmitting at a second frequency while still eliminating feedback.
system can also improve communications within or between structures by enhancing
The single plane design of this technology makes it adaptable to different locations,
signals in areas with weak wireless reception.
and its ability to adjust to different frequencies enable it to be useful to a large variety
The invention consists of an antenna, a circulator, and a mixer, and eliminates the need of communication devices.
for a local oscillator and local transmitter. This compact design makes the system easy to
POTENTIAL APPLICATIONS:
deploy and maintain in remote locations. There are minimal power requirements because
the power comes from an illuminating transmitter and antenna. This technology also SCADA range extension applications (e.g., power plants or refineries)
handles high bandwidths more effectively than current systems. Local Area Network (LAN) repeaters
POTENTIAL APPLICATIONS: Cellular applications
Remote or dangerous area data collection
Vehicle-to-vehicle, or vehicle to stationary
LOW POWER
object communication and vice versa COMPACT DESIGN
(e.g., updates to/from or between manual REPEATER
or self-driving vehicles)
Unmanned aerial vehicle swarms
Gamification Impedance Matching RF Open Wire Transmission Lines
Device for Impedance Matching Radio Frequency Open Wire Transmission Lines
vehicle swarms US PATENT # 7,283,015 | EXPIRES DECEMBER 13, 2025
Gamification
This technology is an innovative device for impedance matching along open wire
lines. The invention is adjustable, easy to manufacture, and doesnt have issues such
Reusable Tamper-Evident Bag as sliding contact noise. The device is engineered with a balanced transmission line
Reusable Tamper Evident Envelope and a movable dielectric plate that, when moved, is able to increase or decrease
US PATENT # 7,350,689 | EXPIRES OCTOBER 17, 2026 impedance and linearly change the phase. As a result, this device matches impedance
This invention provides the ability to initiate roundtrip courier services without during transmission in a manner that significantly reduces noise.
including supplemental supplies or complex procedures. The technology provides POTENTIAL APPLICATIONS:
couriers a tamper-indicating bag that can be reused while still maintaining a
Applications with a practical frequency range of 100 MHz to 5 GHz
characteristic level of confidentiality and security.
(i.e., cell phones, GPS, Wi-Fi, etc.)
The dual-seal characteristic of this container allows items to be outbound couriered, Antenna applications
the primary seal inspected and certified by a recipient, and a return trip initiated using
Any radio frequency transmission applications
the containers secondary seal.
POTENTIAL APPLICATIONS:
Courier services MATCHES SIGNIFICANTLY
Industrial or medical packaging
IMPEDANCE REDUCES
NOISE
Sealed court/medical/banking documents
DURING
Transporting proprietary or confidential documents
Situations requiring return-receipt completion TRANSMISSION
evidence and certification
This technology synchronizes time using environmental triggers to ensure that This shredder residue dispersion system directs shredded document residue into
nodes (e.g., computer or telecommunication) are working in sync. After the desired multiple residue receptacles in order to thwart reassembly. The system increases the
environmental conditions are set, the node remains in a sleeping state until those security of a standard shredder by dispersing the shredded paper into multiple bins
conditions are met. Synchronization can occur without using radio signals, Wi-Fi, on a continuous basis, ensuring that no one document will be complete in any one
or cellular networks, which reduces susceptibility to loss of service and detectability. residue bag.
Without the need for battery power, the technology is able to conserve energy between
POTENTIAL APPLICATIONS:
intervals of time, making it suitable for potential use in extreme environmental situations.
Safeguarding propriety information
POTENTIAL APPLICATIONS:
Financial or banking industry
Sensors
Medical recordkeeping
Triggering recording equipment
for studies or documentaries
Military and emergency operations
Synchronizing resource constrained
embedded systems
HIGH TEMPS
LOW TEMPS
SOLVENTS
This device converts data signals in a Non-Return-To-Zero (NRZ) format into one
of a variety of other user-selectable signal formats. Signals are transmitted in a wide
range of formats, voltage levels, and speeds, which can result in signal format
compatibility issues. The design of this technology eliminates the need and expense
for additional procedures, equipment, and/or training typically needed to process
varying signal formats.
EFFICIENT POTENTIAL APPLICATIONS:
ERROR DETECTION Coded data generation or conversion
& CORRECTION
COMMUNICATION COMMUNICATION
DEVICE DEVICE
Design Patent
United States Patent and Trademark Office (USPTO)
A form of legal protection granted to the ornamental design of a functional item.
An agency within the U.S. Department of Commerce that grants patents and registers
trademarks. (www.uspto.gov)
Education Partnership Agreement (EPA)
An agreement between a federal lab and an educational institution or non-profit organization Utility Patent
to transfer or enhance technology and provide technology assistance to the institution
A patent issued for the invention of a new and useful process, machine, manufacture
or organization.
or composition of matter, or a new and useful improvement thereof.
Expiration of a Patent
The end of the enforceable term of a patent. At this time, anyone can practice the invention.
B E
biomedical applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 electron microscopy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
biometrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14, 15, 23, 24, 25, 58 elliptic curve. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30, 33, 36
Boolean equations encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 23, 33, 35, 36
satisfiability algorithms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 packet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Bose Chaudhuri Hocquenghem (BCH) codes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 error detection/reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56, 64
ESL courseware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10, 16
C
capacitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 F
CICADA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44, 62 facial recognition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 25
circuits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 42, 44, 45, 46, 47, 57 Fast Fourier Transform (FFT) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64, 65
clocks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . see timer circuit fiber optics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45, 46, ee optics
communication signals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43, 44, 51, 56, 60, 62 Field Programmable Gate Arrays (FPGA). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
communications system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 39, 46, 51
computer security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22, 24, 25, 26, 30, 35, 50, see malware financial/banking applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13, 24, 28, 30, 33, 35, 60, 63
cryptography. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30, 33, 35, 36, 37 finding text. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
fingerprinting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
D
firewall security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 38
data
analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 9, 11, 12, 15, 55 forensics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8, 9, 12, 14, 23, 26, 51, 55
collection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43, 60
frequency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . see signals frequency
communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 34
geolocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 54, 55, 58 malware . . . . . . . . . . . . . . . . . . . . . . . . . . . 23, 26, 30, see computer security, network security
impedance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
N
indexing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
nanotechnology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
integrated circuits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42, 43, 44, 46, 47, 57
netlists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Internet Protocol (IP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32, 38, 56
NetTop. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
intrusion detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23, 25, 30, 38, 50
network
administration. . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 27, 29, 31, 32, 34, 35, 38, 39, 42
K communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29, 32
kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26, 37 security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24, 26, 33, 36, 38
IGNITING INNOVATION
CONTACT US
Office of Research & Technology Applications (866) 680-4539
NSA Research Directorate [email protected]
9800 Savage Road, Suite 6843 www.nsa.gov/techtransfer
Ft. Meade, MD 20755-6843