NSA Technology Transfer Program (TTP) Catalog

download NSA Technology Transfer Program (TTP) Catalog

of 100

Transcript of NSA Technology Transfer Program (TTP) Catalog

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    1/100

    National Security Agency

    TECHNOLOGY TRANSFER PROGRAM

    2014 TECHNOLOGY CATALOG

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    2/100

    2014 Technology Catalog

    V2.0July 2014

    NSA Technology Transfer Program

    National Security Agency9800 Savage Road, Suite 6848Fort Meade, MD 20755-6848

    [email protected]

    www.nsa.gov/research/tech_transfer

    This publication is available in PDF format on the NSA TechnologyTransfer Program website at www.nsa.gov/research/tech_transfer

    mailto:[email protected]:[email protected]
  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    3/100

    Technology Transfer Program

    Overview | Page 1

    WELCOMEThe National Security Agencys Technology Transfer Program

    (TTP) was established to openly share federally fundedtechnologies with industry, academia, and other federal agencies.

    Since 1990, the NSA TTP has provided outside entities access toNSA invented technologies and collaborative research anddevelopment opportunities.

    The patents in this catalog are the NSA invented technologiesthat are available to be shared with U.S. government agencies,industry partners, and academia.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    4/100

    National Security Agency

    Page 2 |

    TABLE OF CONTENTSOverview ............................................................................................... 4

    What is Technology Transfer ........................................................ 4

    Goals of the NSAs TTP Program................................................. 4

    Doing Business with the TTP ................................................................ 6

    Licensing Process .............................................................................. 6

    Typical Agreement Provisions ....................................................... 6

    Available Technologies ....................................................................... 8

    Acoustics ............................................................................................. 9

    Advanced Mathematics ................................................................ 13

    Communications .............................................................................. 20

    Computer Technology ................................................................... 24

    Information Processing .................................................................. 26

    Microelectronics .............................................................................. 41

    Networking...................................................................................... 47

    Optics ............................................................................................... 53

    Security ............................................................................................ 59

    Signal Processing ........................................................................... 70

    Mechanisms for Transferring Technology ...................................... 79

    Patent License Agreement ............................................................ 80

    Cooperative Research and Development Agreement .......... 82

    Education Partnership Agreement ............................................. 84

    Technology Transfer Sharing Agreement ................................. 86

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    5/100

    Technology Transfer Program

    Overview | Page 3

    TABLE OF CONTENTS,CONTINUED

    Legislation ............................................................................................ 88

    Appendix A ......................................................................................... 90

    Acronyms ......................................................................................... 90

    Appendix B.......................................................................................... 92

    Patent Index.................................................................................... 92

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    6/100

    National Security Agency

    Page 4 |

    OVERVIEWWHAT IS TECHNOLOGY TRANSFERIn the context of federal laboratories,

    technology transfer is the sharing ofinformation, intellectual property (IP),expertise, and technology between thelaboratories and non-federal entities (i.e.,private industry, state and local governments,universities, and non-profit organizations). It consistsof transfers at various levels within the technology lifecycle,

    ranging from conception to the actual selling of products orservices in the marketplace.

    GOALS OF THE NSAS TTPPROGRAMThe NSA recognizes the value of itsinvestments in R&D activities and thepotential impact of these activities for

    enhancing the U.S. economy. Moreimportantly, the NSA appreciates thatleveraging its R&D with others can have asignificant impact on its ability to meet the dynamic,time-sensitive requirements of its mission. This recognition iswhy the Agency actively participates, supports, and encouragestechnology transfer through its Technology Transfer Program.

    Goals of the NSA TTP include: Encouraging commercialization of the NSA technologies

    Strengthening the U.S. industrial base

    Accelerating development of emerging technologies throughcooperative research and development activities

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    7/100

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    8/100

    National Security Agency

    Page 6 |

    DOING BUSINESS WITH THE TTPParties interested in partnering with the NSAs Technology

    Transfer Program should contact the program office for additionaldetails. Please note that all companies interested in licensing NSAtechnology must be U.S.-based or have a wholly owned U.S.-basedsubsidiary. The following is a brief description of the requirementsand process.

    LICENSING PROCESSEach license is negotiated individually and license terms may differbased on readiness of the technology, additional developmentrequirements, exclusivity of license, estimated market size, andother factors.

    PATENTBUNDLES

    Patented technologies presented in this catalog may be shown asbeing bundled with a group of similar properties. Please note thatall technologies are available for license individually and patentbundles are presented for convenience only. Patent bundles forlicense purposes are solely at the discretion of the licensee.

    TYPICAL AGREEMENT PROVISIONS

    Although each agreement is individually negotiated, most have thefollowing provisions:

    Exclusive, partially exclusive, or non-exclusive license

    License duration, reporting period, fees, and royalty payments

    Letter of Application and a Business Plan for commercializationand marketing the technology

    Federal Register notice posted by the NSA identifying invention,licensee, and type of license (exclusive and partially exclusivelicenses only)

    Public availability of invention within a reasonable period of time

    Government retention of irrevocable, royalty free, worldwidegovernment purpose rights to the invention

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    9/100

    Technology Transfer Program

    Overview | Page 7

    IDENTIFICATIONProspective licensee

    identifies a specifictechnology.

    DISCLOSUREProspective licenseecontacts theTechnology

    Transfer Program andcompletes Letter of Intent,

    Non-Disclosure Agreement,and Company ValidationForm.

    ASSIGNMENTTTP Director assignsagreement to atransfer agent (TA)

    who facilitates dialoguebetween licensee andinventor(s) / technologist(s).

    SUBMITLicensee decides topursue agreementand submit Letter of

    Application (LOA) and

    Business Plan.

    EVALUATIONLetter of Application

    and Business Planare evaluated fortechnical, business,marketing, and economicunderstanding of intendedproduct.

    AGREEMENTThe TA, in

    cooperation with theOffice of General

    Counsel (OGC), draftsagreement.

    NEGOTIATIONSNegotiations areconducted between

    licensee and the transferagent.

    LICENSINGAfter negotiationsare complete,agreement is

    signed by both parties andexecuted.

    12

    3

    4

    5

    67

    8

    8 STEPS TO LICENSING TECHNOLOGY

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    10/100

    National Security Agency

    Page 8 |

    AVAILABLE TECHNOLOGIESThe NSA has an extensive portfolio of patented technologiesacross multiple technology areas.

    TECHNOLOGY READINESSTechnologies presented in this catalog are at various readinesslevels. Some technologies are only theoretical basic researchwhere others may be demonstrable, fully developed products.Please contact the Technology Transfer Program for more detailson the readiness level of a particular technology.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    11/100

    Technology Transfer Program

    Acoustics | Page 9

    ACOUSTICS

    The NSA is a leader in acoustic research. These advancedacoustic technologies are a cornerstone of the NSAs mission toproduce foreign signals intelligence. With the enormous increasein voice and acoustic data, the demand for faster, more accuratevoice and acoustic signal analysis and filtering has never beengreater. To meet this growing demand for voice signalintelligence, the NSA continually conducts research in acousticssignal analysis, phonetics, audio signal identification, and audio

    transcription.

    Within the acoustics technology area, the NSA has severaltechnologies available for license. These technologies include:methods for identification, extraction, and analysis of voice andvoice signals; foreign language voice recognition; duplicate voiceidentification; and methods of measuring voice enhancement.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    12/100

    National Security Agency

    Page 10 | Acoustics

    REAL-TIME SIMULTANEOUS IDENTIFICATION OF MULTIPLE VOICES

    PATENT:8,442,825

    The invention provides multiple speakeridentification by identifying voices in a manner thatuniquely mimics the essence of ear-to-braininterconnection combined with observed humanvoice identification learning and recognitionprocesses. The object is real-time or faster voiceidentification needing only relatively simple computingresources. Specifically, this invention looks for prosody matches

    (spectral patterns over time periods) that were trained by software inan Artificial Neural Network (ANN) description.

    VALUE

    Excludes non-speech sounds within audio

    Real-time processing

    MEASURING DEGREE OF ENHANCEMENT TO A VOICE SIGNALPATENT: 7,818,168

    This technology is a method of measuring the degreeof enhancement made to a voice signal. Typically,voice signals are statistically non-stationary and themore noise, or other corruption, introduced into asignal, the more stationary its distribution of valuesbecome. In this invention, the degree of reduction instationarity is indicative of the degree of enhancement made to thesignal. The method of determining the degree of enhancement

    begins with receiving and digitizing the signal. A user then identifiesa number of formant regions and computes the stationarity for eachformant. The voice signal is enhanced and formant regions in theenhanced signal are identified. The stationarity for the formants inthe enhanced signal is found. Finally, a comparison is made betweenthe stationarities of the original and enhanced signals.

    VALUE

    Quantifies voice enhancement

    Reduces human arbitration and various listening tests

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    13/100

    Technology Transfer Program

    Acoustics | Page 11

    COMPARING VOICE SIGNALS

    PATENT: 7,650,281

    This technology tests the robustness of agiven voice-matching algorithm byproviding the algorithm with variants of agiven digital file and testing the originalagainst these variants including time-reversal, segmented re-arrangement, or amixture of both time-reversal and segmented re-arrangement. Ineffect, this increases the corpus of ground truth, thus allowing

    realistic testing under controlled conditions.

    VALUE

    Reduces the Equal Error Rate (EER)

    Larger corpus from fewer files

    IDENTIFYING DIGITAL AUDIO SIGNAL FORMAT

    PATENT: 7,620,469

    This technology identifies the format of a digitalaudio signal including signals that are either self-defining or headerless. In this method, a digitalaudio file is received and converted from anassumed format and bit ordering to a user-definable format. The file is divided into blocks andthe frequencies of occurrence are determined.

    A first set of frequencies of occurrence less than and equal to mostfrequently occurring integer is created. Next, a second set offrequencies of occurrence greater than the most frequently occurringinteger is created. Third and fourth sets of differences are createdand replaced with polarity indicators. These indicators are summedand percentages calculated to determine maximum pairings. Thestatistics are then assigned to the converted file. This process isrepeated with another format and bit ordering to identify the formatwith the maximum statistics.

    VALUE Identifies digital audio formats, including self-defining signals

    Reduces need for human listening

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    14/100

    National Security Agency

    Page 12 | Acoustics

    AUTOMATED DETECTION OF DUPLICATE AUDIO &VOICE RECORDINGS

    PATENT: 7,571,093

    This invention detects duplicate audio and voicerecordings in a collection. A recording is selected,divided into segments, and a pitch value is extractedfor each segment. The total time a voice appears inthe recording is estimated and pitch values that areless than or equal to a user-defined value areremoved. Unique pitch values are identified and the frequency ofoccurrence is determined and normalized. The distribution

    percentiles are then calculated. This method is repeated for eachrecording where it is compared for total voice time, average pitchvalue, and distribution percentile.

    VALUE

    No manual transcription required

    Language and content independent

    DETECTING VOICE ACTIVITYPATENTS: 7,127,392AND 6,556,967

    This technology eliminates the need to manuallysearch audio files for speech content byautomatically locating speech intervals that maycontain other signals such as music, noise, orempty space. It outputs the start and stop times ofthese intervals relative to the beginning of the file, ignoring non-speech portions of the file. This technology classifies signal segments

    as speech or non-speech and employs algorithms which considercharacteristics derived from an audio signals AM envelope.

    VALUE

    Reduces bandwidth and traffic

    Improves performances of speaker recognition systems

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    15/100

    Technology Transfer Program

    Advanced Mathematics | Page 13

    ADVANCED MATHEMATICSIn order to remain a world leader in cryptologic methods, theNSA must continually increase its knowledge base of advancedmathematics. To fulfill its mission to secure U.S. communicationsand maintain the countrys ability to exploit new advanced

    foreign communications systems, the NSA has become one ofthe largest research laboratories in the mathematical sciences.

    NSA mathematicians continually develop new mathematicalmethods and several of these methods are available for license.Technologies available include computerized systems for solvingnon-linear Boolean equations, cryptographic methods, randomnumber generation, geometric pattern recognition, and methodsto display complex mathematics.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    16/100

    National Security Agency

    Page 14 | Advanced Mathematics

    COLLISION FREE HASHING FOR NEAR MATCH INPUTS

    PATENTS NOS: 8,363,825AND 8,355,501

    This technology is a hash function that does notproduce collisions for inputs that are near matches ofeach other, where a near match is one where thenumber of bit locations that differ is small and,therefore, could more easily be found than if theinputs were not near-matches.

    This method allows you to define a minimum number of bitpositions that differ between the first and second inputs, define the

    degree of the first polynomial, define the bit length of the inputs,and define the bit length of the check value.

    VALUE

    Does not produce collisions for near match inputs

    Enables faster hashing and data retrieval

    CODE GENERATION THAT MINIMIZES ERROR PROPAGATION

    PATENT NO.:7,676,725When transmitting binary data, encoding schemesmake the resulting waveform more immune to noiseand interference. One class of transmission codes,block or line codes, are used to modulate binarysymbols 0 and 1. There is a need to minimize errorpropagation in a line code, subject to information rate, onesdensity, and maximum run length. The present method is a method

    generates a line code so that error propagation is minimized.This method selects the number of bits in an unencoded sequence,the number of bits in an encoded sequence, the maximum runlength of an encoded sequence, and a range of ones densities of anencoded sequence. Next, an encoding map is generated that mapseach unencoded sequence to an encoded sequence and generates adecoding that maps sequences. Finally, this an error-propagationscore is determined and returns if a lower error-propagation score is

    required.

    VALUE

    Minimizes error propagation in block or line codes

    Sets information rate, ones density, and maximum run length

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    17/100

    Technology Transfer Program

    Advanced Mathematics | Page 15

    CRYPTOGRAPHIC KEY EXCHANGE USING EFFICIENT ELLIPTIC CURVE

    PATENTS: 7,505,585/7,024,559/6,993,136

    This technology is a combination of six patentedmethods for generating a cryptographic keybetween two users. The original methods includethe groundbreaking technology of identificationand digital signature using efficient elliptic curve.

    Additional patented innovations build on the prior artby adding a binary expansion in joint sparse form and amethod of generating and verifying a cryptographic digital signature

    using coefficient splitting. Further innovation includes a method ofgenerating a cryptographic key using coefficient splitting on twodifferent classes of elliptic curves which can be implemented in botha non-authenticated key exchange method and an authenticated keyexchange method.

    VALUE

    Uses fewer steps for cryptographic key exchange

    Coefficient splitting minimizes number of elliptic curve operations

    METHOD &SYSTEM FOR NON-LINEAR STATE-BASED SATISFIABILITYPATENT NOS.:7,380,224AND 6,912,700

    This invention is a method of solving a system ofgeneralized non-linear Boolean equations.Proving that a solution exists is called Satisfiabilityand if no solution exists called Unsatisfiability.

    This method does not require the translation ofthe system of equations into Conjunctive Normal Form(CNF) such as CNF SAT solvers or solve for all inputs such asBinary Decision Diagrams (BDDs).

    This technology consists of a computerized method for solving non-linear Boolean equations that consist of partially solving the non-linear Boolean equation and stringing a pre-computed searchinference relating to the equation in a state machine. Next, the user

    accesses a search inference from the state machine to develop aheuristic for solving the non-linear Boolean equation. Finally, it canbe determined if the Boolean equation is satisfiable using at least oneheuristic.

    VALUE

    Computerized determination of Boolean equation satisfiability

    Equation translation into Conjunctive Normal Form not required

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    18/100

    National Security Agency

    Page 16 | Advanced Mathematics

    CRYPTOGRAPHIC IDENTIFICATION AND DIGITAL SIGNATURE USINGELLIPTIC CURVE

    PATENT NO.:7,062,043/7,024,559/6,898,284The patents presented here highlight enhanced usesof ECC for cryptographic identification,cryptographic key generation and exchange, anddigital signatures, and describe how to improve theefficiency of this approach by reducing resourcerequirements for each operation as well as by reducing the numberof required operations.

    VALUE

    Requires fewer operations than other forms of ECC.

    Increases system efficiency and performance.

    TESTING A RANDOMIZERPATENT NO.:6,798,883

    Devices that produce a random number are often

    referred to as randomizers and most rely on one ormore sources of random data (e.g., timing of randomevents as compared to a threshold, random naturalprocesses, etc.). The sources of random data areusually connected to a scrambling device that mixesthe random data in some complex fashion to achieve a degreeof uniformity in the distribution of the output of the randomizer.

    This invention tests the sufficiency of an output of a randomizer,

    that is based on at least one source of random data, by determiningthe probability that an output of the randomizer will reoccur and bydetermining the minimum number of guesses one would expect tohave to make to correctly determine an output of the randomizer.

    VALUE

    Tests the sufficiency of an output of a randomizer

    Provides device mix probabilistic data to form random data

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    19/100

    Technology Transfer Program

    Advanced Mathematics | Page 17

    PASSING A CRYPTOGRAPHIC KEY AND ALLOWING THIRD-PARTYACCESS TO THE KEY

    PATENT NO.:6,724,893This invention is a method of passing acryptographic key between users so an authorizedthird party (i.e. law enforcement) can access thekey. This method is called key escrow.

    With this method, a key recovery access field isembedded into the key pass method. The access field isembedded into a parameter z. The access field allows an authorized

    third party to recover the key with the help of an escrow agent.Alternate methods adds steps that would allow the second user todetermine if the first user is complying with escrow aspects of themethod.

    VALUE

    Authorized third-party able to access key

    Exchange key in certified, bandwidth efficient manner

    CRYPTOGRAPHIC METHOD USING MODIFIED FRACTIONALFOURIER TRANSFORM KERNEL

    PATENT NO.:6,718,038

    With this technology a signal is received and anencryption key is established, where the keyincludes at least four user-definable variablesincluding angle or rotation, a time exponent, a

    phase, and a sampling rate. At least onecomponent of a modified fractional Fourier transform kernel isselected, where each component is defined by one of the encryptionkeys; and the signal is multiplied by at least one component of amodified fractional Fourier transform kernel selected. Fordecryption, a signal to be decrypted is received; at least onedecryption key is established, where each decryption keycorresponds with, and is identical to, an encryption key used to

    encrypt the signal.

    VALUE

    Use to encrypt a message header to act as electronic signature

    Not limited to cotangent and cosecant functions as prior art

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    20/100

    National Security Agency

    Page 18 | Advanced Mathematics

    Technology transfer provides

    an avenue for cycling thebenefits of federally fundedR&D back into the U.S.economy.

    MULTI-DIMENSIONALLY ACCENTUATING A DEVIATION ININFORMATION AND IDENTIFYING ITS CAUSE

    PATENT NO.:6,470,297Information theory has grown to include not onlypreserving the integrity of a message transmitted over acommunication network but also the communicationnetwork itself. Multiple devices and methods exist forpreserving the integrity of a communication networkthrough the detection of intrusion or misuse. However, noprior art discloses a method of multi-dimensionally accentuating a

    deviation in a transmitted message and identifying the cause.This invention is a method of multi-dimensionally accentuating anydeviation in information and identifying the cause by reducing theamount of information presented to a user and describing theinformation with an entropy-based function, a temperature-basedfunction, an energy-based function, or any combination.

    VALUE

    Information may be of any type that can be arranged in a sequence

    Reduces amount of information to a manageable level

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    21/100

    Technology Transfer Program

    Advanced Mathematics | Page 19

    LATTICE QUANTIZATION

    PATENT NOS.:6,404,820/6,085,340AND 6,084,534

    A quantizer is a device for converting numericaldata into a finite number of possible outputs.Quantizers are used in the design of signals for useover noisy channels. This technology is a method ofefficient storage and reconstruction of thecodewords of the Extended Hamming Code and istypically used for pulse or digital communications.

    This method is a combination of three patented technologies of

    lattice quantization. The first and third inventions are methods oflattice quantization that minimizes the storage requirement and thecomputational complexity of an eight dimensional lattice quantizer.The second is a method of lattice quantizing 24 real-number-longdata points so that storage requirements are minimized.

    VALUE

    Minimizes the computational complexity

    Minimal storage requirements

    DISPLAYING 3DNETWORKS IN 2DWITHOUT FALSE CROSSINGS

    PATENT NO.:6,043,825

    Graphic representations can help make networks

    more understandable by helping visualize the

    structure and, generally, network configurations are

    depicted as wire diagrams or graphs. That is, the

    processing nodes are represented as graph vertices, whilearcs connecting the vertices represent the actual physical wires

    connecting the nodes.

    The present invention is an efficient method for transforming anddisplaying the dynamic performance of three dimensionalinterconnection networks in a two dimensional graphical display byeliminating the false crossings that normally occur in suchtransformations. In addition, this invention allows dynamic selection

    of any node of the network to be the node of reference positioned atthe center of the graphical display.

    VALUE

    Graphically represent 3-D networks without false crossings

    Dynamically select any node as node of reference

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    22/100

    National Security Agency

    Page 20 | Communications

    COMMUNICATIONSThe NSA is charged with keeping the federal government andmilitary communications systems secure. As a result, the agency is

    an aggressive developer of communications equipment andproducts used for wireless and wired transmission systems. Thesetechnologies include encryption systems, speech transmissionmethods, communication intercept devices, synchronizationmethods, and error correction techniques.

    Communications technologies available for license includemethods of transmitter geolocation, station synchronization

    methods, error correction, filters, equipment simulation methods,and novel speech transmission techniques.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    23/100

    Technology Transfer Program

    Communications | Page 21

    LOCATING A TRANSMITTER

    PATENT NO.: 8,068,850

    This technology geolocates transmitters byreplacing the circuitry used in Time Delay ofArrival (TDOA) calculations with a communicationlink back to a central station. In this method, aportion of a received signal is transmitted to acontrol station. A calibration signal is received atmultiple receiving stations and a communications link isestablished between the receiving station and a central control

    station. Geolocation is performed by subtracting thecommunications link time delay from the time of arrival of eachreceived signal or by calculating the communications link timedifference of arrival for each pair of receiving stations andsubtracting the result from the TDOA calculated from the receivedsignal.

    VALUE

    Geolocates uncooperative transmitters at a central station

    Requires no TDOA circuitry at each receiving station

    PROXY/INTERMEDIARY DETECTIONPATENT NO.: 7,466,654

    This technology uses latency differences to detectintermediary devices. A sensor is placed on theusers computer to record communication packetsto and from a communication device. The packet

    times are recorded and analyzed to extract the minimumnetwork layer latency and the minimum application layer latency. Asthe latency begins to get larger than the network layer latency, itindicates the application is not being operated from the advertisednetwork connection, but from elsewhere.

    VALUE

    Provides vicinity information

    Active location sensors not required

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    24/100

    National Security Agency

    Page 22 | Communications

    WIDEBAND RETROREFLECTOR

    PATENT NO.: 7,383,026

    This novel technology is a single wideband retroreflectorthat eliminates the need for a local oscillator and a localtransmitter. In addition, this technology, does not sufferthe limitations on switching speed of non-linear junctionsthat limit instantaneous bandwidth common in prior artdesigns. This invention transfers data by the illumination ofthe retroreflector with a continuous wave of RF energy, where theretroreflector both modulates the incoming signal and retransmits it

    using the incoming signal energy.In the present invention, an externally produced continuous waveradio wave transmission within the microwave-millimeter wavefrequency band is modulated with a wideband signal with aminimum operating instantaneous bandwidth of 5 KHz to 500 MHzand retransmitted as a modulated waveform by the antenna.

    V

    ALUE

    Eliminates need for a local oscillator and transmitter

    Modulates incoming signal and retransmits using incoming energy

    IMPEDANCE MATCHING RFOPEN WIRE TRANSMISSION LINES

    PATENT NO.:7,283,015

    This technology is an innovative device for impedancematching along open wire lines. Prior methods haveissues such as added operational noise, limited

    adjustability, and are difficult to manufacture. Thisinvention is comprised of a dielectric material with a groundplane affixed to one surface and a microstrip line conductordisposed on the opposite surface, and a movable dielectric plate.The bottom surface of the movable dielectric plate has a higherdielectric constant than the dielectric material, and the top surfacepossesses a conductive coating. The bottom surface of the movabledielectric plate engages a portion of the microstrip line conductor,

    and is movable transversely to the conductor to increase or decreaseimpedance and linearly change the phase. As a result, this devicematches impedance during transmission in a manner thatsignificantly reduces noise.

    VALUE

    Customizable device shapes provide application flexibility

    Reduces current issues with UHF/microwave impedance matching

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    25/100

    Technology Transfer Program

    Communications | Page 23

    TIME SYCHRONIZATION WITHOUT BROADCASTING ASYCHRONIZATION SIGNAL

    PATENT NO.: 7,227,858This CICADA protocol is a synchronizationmethod that uses the environment as a means ofensuring that nodes within the network are workingin the same time domain. This method ofsynchronization dynamically sets the nodes timerto awaken an individual sleeping node at afrequency determined by an environmental sensor variable.

    The environmental variable, along with empirical data, willdetermine the interval at which sleep intervals will be modified untila synchronization point is reached.

    VALUE

    Conserves energy between intervals of time

    Reduces detectability and susceptibility to denial of service attacks

    CORRECTING ERRORS IN FORMATTED MODEM TRANSMISSIONSPATENT NO.:5,533,033

    This invention is a device for and method of correctingbit errors in a formatted modem transmission thatdoes not employ an exhaustive-search scheme. Thistechnology is highly efficient because a much smallernumber of possible errors are considered.

    This method identifies those error patterns that are most likely to

    occur and searches for only these errors. This method identifies theformatting scheme used by the transmitting modem, checks thereceived data for errors, generates possible error patterns andassociated correction patterns for the receiving modem, identifiesthe type and location of each error, and replaces each error with itsassociated correction pattern.

    VALUE

    Identifies error patterns most likely to occur

    Highly efficient, smaller number of possible errors considered

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    26/100

    National Security Agency

    Page 24 | Computer Technology

    COMPUTER TECHNOLOGYThe NSA has been at the forefront of computer technology for

    over 60 years. As one of the first developers and users ofsupercomputing technology, NSA personnel have participated inor tested virtually every computer advancement since the 1950s.In order to keep the NSA at the forefront of computing, agencyresearchers and computer scientists continue to developadvanced computing platforms, novel computing techniques, andadvanced coding tools.

    Computing technologies available for license include bothadvanced software techniques such as methods of protectingcomputer stacks as well as novel hardware input/output devices.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    27/100

    Technology Transfer Program

    Computer Technology | Page 25

    CONVERTING COMPUTER PROGRAM WITH LOOPS TOONE WITHOUT LOOPS

    PATENT NO.: 7,788,659This invention was released to the NASA SoftwareRelease Authority and was developed as part of the JavaPlug-in Framework (JPF) Project.

    This method eliminates loops from a computer program.This method receives the program, graphs its function and control,identifies its entry point, and identifies groups of loops connected toits entry point. If there are no such loop groups the process stops.

    Otherwise, a group of loops is selected and the groups entry point isidentified. If the selected group includes no group of loops having adifferent entry point then the group is replaced with a recursive ornon-recursive function. Each connection entering and exiting theselected group is reconfigured to preserve their functionality.

    VALUE

    Preserves order of execution of the computer program

    Available as open source application under JPF

    PROTECTING A COMPUTER STACKPATENT NO.: 7,581,089

    This novel invention is a method of protectinginformation stored on a computer stack in an easilyaccessible but un-modifiable location protecting theunmatched calls/returns from being overwritten.

    In this method, two stacks are created. The first is anormal stack and the second, or shadow stack, has shadow frames.These frames contain the return address upon a subroutine call, theaddress on the first stack where the return address is stored, and auser-definable state variable which is used to identify a shadowframe as a return address. Before returning from a subroutine, thetwo return addresses are compared, and if they do not match, thesecond stack is searched down, and then up, for a matching return

    address. If there is a match, the shadow is re-synchronized with thefirst stack by comparing the stored values of the first stack pointerwith the first stack pointer and adjusting the shadow stack pointer.

    VALUE

    Stores protected information in a non-spoofable, efficient way

    Protects unmatched calls / returns from being overwritten

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    28/100

    National Security Agency

    Page 26 | Information Processing

    INFORMATION PROCESSINGAs the amount of speech, video, data, print, and multimedia

    continues to increase exponentially every year, the NSA isaggressively leading research efforts in methods to collect andprocess this massive amount of information. Today, NSAscientists continue to develop new methods for transporting,storing, retrieving, and analyzing information critical tonational security.

    Technologies available for license include methods to

    efficiently store, retrieve, and modify data in any languageformat, methods to extract text from graphics, data modelingtechniques, optical character recognition, and authenticationmethods.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    29/100

    Technology Transfer Program

    Information Processing | Page 27

    LINEAR INTERPOLATIVE CODING

    PATENT NO.: 8,539,307

    This invention is a device for and method ofdetecting and correcting errors in both a futureand a past data value by computing bothbackward and forward coefficients. The typesof errors detected and corrected includegarbled data, missing data, and added data. In agarbled datum, the datum is present but its value isincorrect (e.g., transmission error due to noise in the

    transmission channel). A missing datum is supposed to bepresent but is not (e.g., synchronization error between thetransmitter and the receiver). An added datum is not supposed tobe present but is (e.g., perceived synchronization error betweenthe transmitter and the receiver). This technology includes acontrol unit, coefficient computation unit, error computationunit, and an error detection and correction unit.

    VA

    LUE

    Improves the detection and correction of errors

    Detects and corrects errors in both future and past data

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    30/100

    National Security Agency

    Page 28 | Information Processing

    MULTIMEDIA INSTRUCTIONAL DESIGN SYSTEM /DIGITAL TRANSCRIPTION SYSTEM (SCRIBEZONE)

    PATENT NO.: 8,380,485ScribeZoneis a multimedia language processingsystem that has enhanced capabilities to improvethe efficiency and speed of transcription andtranslation of audio, video, and graphic materials.This technology is also a development and deliverysystem for media-based instruction specificallydesigned for, but not limited to, language instruction.

    ScribeZonefacilitates audio and graphic contextual analysistraining, transcription, and translation, as well as comprehensivelanguage skills enhancement. ScribeZonesupports any foreignlanguage input so it is ideal for teaching foreign language and canalso be used for teaching English as a Second Language (ESL).

    VALUE

    Side-by-side language translation

    Optimize quality control through collaboration

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    31/100

    Technology Transfer Program

    Information Processing | Page 29

    ASSESSING LANGUAGE TRANSLATION AND INTERPRETATION

    PATENT NO.:8,185,373

    This patented method establishes a standardfor translation metrics, offering analysis andfeedback for grading and improvingtranslation activities. The method firstconsists of the receipt of a communication(source) along with identification of the sourcescontent and format. The source material is evaluated andassigned a user-definable level of difficulty along with the

    translation type necessary. Next, the source translation isassessed with user-definable ratings of accuracy, interpretation ofintended message, and formatting. These ratings provide theresults to determine a user-definable assessment of the languagetranslation and interpretation of the source material.

    VALUE

    Increased performance and reduced subjectivity

    Macrotextual focus

    IDENTIFYING CONNECTED DATA IN RELATIONAL DATABASESPATENTNO.:8,001,137

    This invention is a method of querying arelational database using a computerlanguage such as Structured QueryLanguage (SQL) to automatically determinea user-definable derived relation. This

    method receives data components andinitializes tables with data identifiers and connectioninformation. A transition table is initialized and each entry isreplaced with a user-definable relationship of its identifier,corresponding connected data component identifier, andtransition table identifier. The tables are updated and, dependingon identifier transitions, the replacement step is repeated. Finally,the received data components are identified as connected based

    on equalities in the table entries.

    VALUE

    Faster relationship determination

    Less prone to errors than manually determining derived relations

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    32/100

    National Security Agency

    Page 30 | Information Processing

    IDENTIFYING TOPIC OF TEXT USING NOUNS

    PATENT NO.:7,805,291

    Prior methods of topic identification were basedon keywords. A disadvantage of this method isthat any variation in the spelling of a keywordwithout any significant change in meaning maycause the performance of the method to degrade.

    In this method, the nouns in the text are identified andthe form is determined. Combinations are created of the singularform (number is user-definable) and the frequency of occurrence

    of the singular form is determined. A frequency score is assignedand each combination is assigned a score that is equal to the sumof the scores of its constituent singular nouns. The top scoringsingular nouns and combinations of singular nouns are selectedas the topic of the text.

    VALUE

    No keyword performance degradation

    Improved performance over dictionary variants of keywords

    DATABASE SEARCHING AND IDENTIFYING TEXT (ALADDIN)PATENT NOS.: 7,797,152/7,761,286AND 7,539,611

    This technology incorporates two functions: aTagger and a Matcher. The Tagger searches fortransliterated terms (such as names) within largedata sets using lexical, contextual, andmorphological information. The Matcher is thenapplied to determine which candidate terms areknown within the database and therefore of likelyincreased interest to the reader. The Matcher is a foreignlanguage term-matching tool that provides results based on howthe term, with variant spellings, matches entries from variousdataset term lists. This knowledge-based system for termmatching maintains contributions from expert linguists and anextensive collection of transliterated data.

    VALUE

    Linguistic expertise for the non-expert

    Adaptable algorithms

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    33/100

    Technology Transfer Program

    Information Processing | Page 31

    SORTING TEXT AND STRING SEARCHING

    PATENTNO.:7,734,671

    Prior methods of searching for a regularexpression were scanning techniques. Forexample, reading the input text onecharacter at a time and checking formatches. However, as data volumeincreases, these scanning search strategiestake longer, and index-backed searchingalgorithms become of greater importance.

    The present invention provides a method of string searching thatis more efficient for large volumes of data using the Ferraginaand Manzini (FM) index, a string-searching index based on theBurrows-Wheeler transformation.

    With this method, an FM-index is created on received text, and anumber of rows are marked. The locations of the rows are storedin data buckets as well as the last column of the FM-index, whichis stored as a wavelet tree. Data blocks containing the databuckets are created, containing the number of times eachcharacter appears in the data block before each data bucket. Aheader block is created comprising an array of the number oftimes each character appears in the last column of the FM-indexbefore each data blocks, the location of the end of the datablocks and the location of the end of the data, and appended tothe data block. The header and data blocks are stored. Thesearch process loads data buckets into memory as needed to find

    the required text.

    VALUE

    Increased efficiency for large volumes of data

    More space efficient than prior art suffix tries

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    34/100

    National Security Agency

    Page 32 | Information Processing

    MODELING SINGLE-CLASS DATA FROM MULTI-CLASS DATA

    PATENT NO.:7,454,337

    Data can include different classes within onecategory (speech, images, text). In speechapplications, multi-class data includes speaker ofinterest data, speech from both genders, ormultiple language speech. Prior methods modeleddata from one particular class or data of aparticular class contaminated with data from other classes.

    The extensible technology presented here isolates a variety of

    entities (text, image, voice) from multi-class data. Purification ofthe statistical model for a data class, calibrated from datarepresenting the identified class and at least one other class,allows enhanced identification and detection capabilities whilesimultaneously reducing memory and processing requirements.

    VALUE

    Eliminates costly memory swapping

    Removes nonessential artifacts

    MORPHOLOGICAL TEXT PROCESSINGPATENT NO.:7,409,334

    This method of morphological text processing

    provides all inflected forms, or any subsetthereof,

    of an input word or group of words of a highly

    inflected language. In this method, text is

    received, a language is selected, and a textual unit isselected. Next, the textual unit's stem and suffix is identified

    and a rules database is searched for the suffix. If a base suffix is

    found in the rules database, it is combined with the stem to form

    a lemma and a lexicon database is searched for the lemma. If

    found, a model number from the lexicon database is retrieved

    and cross-referenced with the rules database to obtain all

    inflected suffixes for the selected textual unit. Finally, the

    inflected suffixes are combined with the stem to form inflectedforms and a subset of inflected-forms. Information associated

    with the lemma and inflected suffixes is output.

    VALUE

    Morphological text processing

    Provides all inflected forms or subset for input word or word group

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    35/100

    Technology Transfer Program

    Information Processing | Page 33

    AUTOMATED SEPARATION OF HAND-WRITTEN ANDMACHINE-PRINTED IMAGES

    PATENT NO.: 7,072,514This language agnostic technologyautomatically characterizes documents ashand-written, machine-printed, orunknown. Utilizing this method,document images are quickly scored andsorted. To assign meta-data to an image,this technology identifies and evaluates connected

    components within a given document, followed by comparisonof suspected characters, and grouping of suspected matches bycategory. The result is the capability to more accurately searchand sort large document collections.

    VALUE

    Discriminates between hand-written and machine-printed images

    Language and font agnostic

    SUMMARIZING TEXT BY SENTENCE EXTRACTIONPATENT NO.: 6,990,634

    This method uses a simplified, internalalgorithm to extract only those sentencesfrom text that convey the essentialmeaning. The number of sentences islimited to only provide enoughinformation for a user to determinewhether or not to read the text in its entirety, or to actas a substitute for the text. With this method, each sentence in agiven text is identified along with each term in the sentence. Amatrix is generated with each column representing a sentenceand each row representing a term. Each entry in the matrix isthen replaced by a product of the matrix entry and a user-definable function that decays exponentially, so that severaldeterminations of Euclidean length can be made in order to

    assign a relative value to each component of the text.

    VALUE

    Text summaries save time and effort

    Provides concise summary of full text

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    36/100

    National Security Agency

    Page 34 | Information Processing

    SELF-REFERENTIAL TEXT SUMMARIZATION (KODA)

    PATENT NO.:6,904,564

    This technology solves the problem of extractingkey sentences or phrases from a document for thepurpose of summarizing the document, allowingrapid and accurate decisions about whether thedocument is relevant, without having to open andscan the entire document line-by-line and withoutthe use of outside exemplary texts, dictionaries, orencyclopedias. KODA evaluates each text segment and scores its

    relevance to the remainder of the text. KODA also quickly andeffectively processes overwhelmingly large textual data sets,reducing each document to a few representative passages. Thedepth of detail is user-definable.

    VALUE

    Fast and accurate text summarizing

    Saves time and effort

    PRINTING PORTION OF DOCUMENT WITH ACCOUNTABILITYAND ERROR DETECTIONPATENT NO.: 6,657,740

    This invention is a method for printing a portion ofa document with an emphasis on accountabilitythrough the incorporation of automatic errordetection. By working through a sequence ofdeterminations, conversions, checks, andcomparisons, this method guarantees that the contentof a print file is precisely what is physically printed on to theactual page. For example, if a single byte is found to be out oforder from its original intended format, this technology is able todetect the discrepancy and prevent the printing operation.

    VALUE

    Assures 100% accurate representation of original file

    Zero error tolerance

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    37/100

    Technology Transfer Program

    Information Processing | Page 35

    DATA RELATIONSHIP AND VISUALIZATION TOOL (RENOIR)

    PATENT NO.:6,515,666

    RENOIR is a Java-based data visualizationtool having strong analysis capabilities formanipulating and visualizing transactional orrelationship type information.

    RENOIR accepts data sets of any size inmost common formats that contain relationships within the dataand, within seconds, automatically generates a graph, displayingthe relationships as nodes and links.

    The application offers numerous data layout, clustering, andannotation features that produce a knowledge-rich diagram thatenables data mining and understanding of the activity (e.g.,relationships) in the raw data. It provides basic and advanced linkanalysis functions, including temporal analysis, social networkdiscovery, data normalization, hierarchical clustering, andintegration with other tools. A few example analyses include:

    Temporal analysisview, animate, and mark data Content analysisdiscover patterns in unformatted text

    using n-gram analysis

    Network analysisdiscover paths through networks

    Cyber analysisdetect denial of service attacks

    RENOIR is also able to capture user-defined process flows into

    a single step, and can operate on stored data and real-time datafeeds.

    A complete set of user manuals, training guides, systemintegration/coding examples, and quick reference cards are allpart of this polished, fully supported, platform-independentprogram written in Java.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    38/100

    National Security Agency

    Page 36 | Information Processing

    DATA RELATIONSHIP AND VISUALIZATION TOOL,CONTINUED

    RENOIR takes large data sets that would otherwise be difficultfor users to conceptualize and turns them into easily readablegraphs. This powerful visualization tool works on any data setthat contains associations and allows data from a variety ofsources to be shared. RENOIRs unique patented data layout,community clustering algorithms, and well-developed graphicaluser interface (GUI) allows users to manipulate, analyze, andcustomize the tool. RENOIR is ideal for business intelligence

    applications and can be tailored to meet the needs of specificindustries.

    Potential markets include:

    Bioinformatics

    Law enforcement

    Energy management

    Telecommunications

    Data mining

    Finance

    Statistical analysis

    Search engines

    Marketing

    Business performancemanagement

    VALUE

    Java-based tool captures user-defined process flows into a single step

    Visualization works on any data set containing relationships

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    39/100

    Technology Transfer Program

    Information Processing | Page 37

    FINDING LARGE NUMBERS OF KEYWORDS IN CONTINUOUS

    TEXT STREAMSPATENT NO:6,311,183

    In Selective Dissemination of Information (SDI)systems, text samples are run against staticsubscriber profiles. A sample that satisfies aprofile is then selected and routed to theappropriate subscriber. In these systems, selectionis often done by matching keywords specified in the

    profiles.The technology presented here is a method of full-text scanning formatches in a large dictionary of keywords. The method is applicableto large dictionaries (hundreds of thousands of entries) and toarbitrary byte sequences for both patterns and sample streams. Theapproach employs Boyer-Moore-Horspool skipping, extended topattern collections and diagrams, followed by an n-gram hash test,which also identifies a subset of feasible keywords for conventional

    pattern matching at each location of a putative match.

    VALUE

    Locates all matches of a keyword dictionary in a sample stream

    Rapidly locates keywords without examining every sample stream byte

    FULL-TEXT,LARGE-DICTIONARY STRING MATCHING USINGN-GRAM HASHING

    PATENT NO.: 6,169,969This invention is a method of large dictionarystring matching that overcomes limitations of theprior art by locating keywords in continuous bytestreams without the need for delimiters. Thismethod factors each keyword into n-grams whichare catalogued into hash tables. The input sample is thenexamined by hashing each n-gram and checking for matches. The

    primary test utilized in this method is an FPGA-based hardwaresolution in which a second software test is applied. Primary alarmsgenerated by the hardware are then screened by a secondary tester toremove remaining false alarms.

    VALUE

    Improves prior art by locating keywords in continuous byte streams

    Accommodates large dictionaries of keywords

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    40/100

    National Security Agency

    Page 38 | Information Processing

    IDENTIFYING DATA TYPE AND LOCATION IN A FILE

    PATENT NO.:5,991,714

    The present invention is a method of identifying thetypes, and locations, of data contained within anelectronic file, or document, of unknown data type.This method may be used to identify languages, thetype of word-processors used to create the data, type ofexecutable code included in a file, or compression schemes usedto compress the data. A file may contain one or more data type ofinterest.

    This invention is a method of counting unique n-grams anddetermining the weight. In an Exemplary file, the top weighted n-gramsfor each data type are selected and thresholds are set to determine datatypes. Next, data from a file with unknown data types is selected andevery n-gram is listed. Weights are assigned and summed. Each sum isthen compared to the threshold for that data type.

    V

    ALUE

    Identifies language, data type, and compression in electronic file

    Identifies type of word processor used and executable code

    AUTOMATICALLY GENERATING TOPIC DESCRIPTION FOR TEXTPATENT NO.: 5,937,422

    This technology is a method of automaticallygenerating a search query from a user generatednatural language input. This technique uses arelational database automatically built from variousonline dictionaries with each word having severaldefinitions and the words in the definitionrepresenting the relative importance of that word. The weightof each word propagates through the tree providing a measure ofsignificance of each word to every other word. The words with thelargest cumulative links are selected as possible topics.

    VA

    LUE

    Estimates importance of every word in the dictionary

    Text may be derived from any source

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    41/100

    Technology Transfer Program

    Information Processing | Page 39

    SEARCHING AN ON-LINE DICTIONARY USING SYLLABLES

    PATENT NO.:5,832,478

    This invention is a method of improving theeffectiveness of on-line dictionary searches byspecifying the known syllables and theirlocations in the word sought, specifying the totalnumber of syllables in the word sought, andputting a wildcard marker in the locations of theunknown syllables or unknown characters of a partially knownsyllable. The present invention is not limited to any language or any

    language representation.With this method, a user first selects a language representation (e.g.Pinyin) for a query and performs the query. Next, the query is parsedto determine if and how many segmented syllables were used in thequery. If no segmented syllables were used, a character string searchfor the headword that matches the query is conducted. If the querycontains segmented syllables, a syllable search for headwords thatcontain the same syllables in the same locations is conducted. This

    method then returns one or more headwords in the language of thequery and their corresponding definitions in the language of the user.Various wildcard symbols may be used for unknown syllables andfor characters within a syllable, which may include tones.

    VALUE

    Improves effectiveness of wildcard searches of on-line dictionaries

    Applicable to any language

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    42/100

    National Security Agency

    Page 40 | Information Processing

    LANGUAGE-INDEPENDENT METHOD OF GENERATING INDEX TERMS

    PATENT NO.:5,752,051

    Automatic indexing systems typically return largevolumes of documents from queries, either fromfull-text indexing or subject searching. This lendsitself to using lists of automatically-generated indexterms. The invention presented here generates indexterms from sample text relative to a backgroundcorpus. In this method, background text is filtered toremove undesired symbols and n-grams are counted to produce

    background n-gram counts. Sample text is also filtered and n-gramsare counted to produce sample n-gram counts. The background andsample n-gram counts are compared to produce n-gram scores andeach symbol of the filtered sample text is assigned a symbol scorederived from the n-gram scores. A symbol threshold is determinedand words and phrases are extracted as index terms when the filteredsample text contains symbols whose scores exceed the symbol scorethreshold.

    VALUE Filters text to remove undesired symbols

    Index terms drawn from text without language-specific processes

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    43/100

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    44/100

    National Security Agency

    Page 42 | Microelectronics

    FABRICATING A FLEXIBLE ORGANIC INTEGRATED CIRCUIT

    PATENT NOS.: 7,452,746/6,013,534AND 6,017,822

    This invention is a method of fabricating flexibleorganic integrated circuits (ICs) such as flexiblesubstrates used for large area displays, identificationtags, electronic paper, etc. In addition, this technologyis useful for fabricating flexible ICs which haveirregular shapes such as outer perimeters of variedslopes and angles as well as high temperature flexible ICs.

    With this technology, a rigid substrate, such as a silicon wafer, has

    alternating layers of thin film conductors and dielectrics attached toform a High Density Interconnect (HDI). Organic transistors arethen fabricated and connected to the HDI. Next, the rigid substrateand the flexible substrate are bonded to a handle wafer. The rigidsubstrate is removed and the organic IC is released from the supportto yield a flexible IC, or it may be left on the support for shipping orfor further processing.

    VALU

    E

    Fabricating flexible ICs with irregular shapesFabricating high temperature flexible ICs

    FABRICATING AND INTEGRATING DECOUPLING CAPACITORSPATENT NO.: 7,297,613

    This technology provides a method of fabrication andintegration for high quality decoupling capacitors with

    high capacitance values, low parasitic losses, goodyield, and long-term reliability. This method enableshigh-yielding capacitors and other passive elements tobe placed very close to the processor or otherintegrated circuit design and provides improved signal integrity.

    VALUE

    Reduced signal loss and footprint

    Reduced cost and increased yields for RF systems

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    45/100

    Technology Transfer Program

    Microelectronics | Page 43

    FIXTURE FOR HIGH-RESOLUTION IMAGING OFMAGNETIC MEDIA

    PATENT NO.:7,239,332This invention is a device to view different areas of amagnetic pattern recorded on magnetic media and tospatially relate one view with another. It alsoprovides a method to view a magnetic garnet filmafter the magnetic pattern is transposed onto themagnetic garnet film.

    This technology uses air pressure in a bladder to push the magnetic

    media firmly against the garnet. This avoids problems with non-uniform contact and provides a means of obtaining good garnetimage quality over a field of view equal to the garnet dimension.Operationally, the garnet imager is more efficient to use than amagnetic particle fluid, since no advance preparation of the solutionis required, no drying time is required, and there is no contaminationof the material under investigation.

    VALU

    E

    Applies uniform contact between media and garnetNo advance preparation of fluids

    REVERSE ENGINEERING INTEGRATED CIRCUITSPATENT NO. 7,183,123

    Integrated circuit (IC) analysis imaging techniquesare used during failure analysis and typical methods

    include collection and analysis of emitted radiation,electron microscopy, or conventional opticalimaging. Backside imaging allows enhanced viewing ofthe interconnects, which reside at the lowest level of the chip.Interconnects are a frequent source of failure in an integrated circuitand clear inspection greatly reduces the number of defective parts.

    This invention allows a clear image of the components of an IC tobe obtained without adding elements to the backside of the

    processed IC and also allows analysis by multiple conventionalimaging techniques.

    VALUE

    Upper layers of metal do not need to be removed

    Layers can be imaged without staining

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    46/100

    National Security Agency

    Page 44 | Microelectronics

    SURFACE PREPARATION AND IMAGING FOR INTEGRATED CIRCUITS

    PATENT NO:7,019,530

    The difficulty in performing failure analysis orreverse engineering on an integrated circuit (IC) isobtaining a clear view of the components of thecircuit. To achieve this, most modern systemsattempt to obtain a clear image of the top side ofthe IC through light emission or a combination ofoptically obtained images and emitted images. This inventionprovides a semiconductor analysis technique that allows a clear

    image of the components of an IC to be obtained from the top sideof an IC device after backside processing and that allows analysis bymultiple conventional imaging techniques.

    With this method, a substrate is selected and an opening is cut to fitthe IC to be analyzed. An adhesive film is applied to the top surfaceof the first substrate. An IC is inserted into the opening and attachedto the bottom side of the adhesive film. Next, the first substrate andIC are bonded to a second substrate. The bottom side of the first

    substrate and the IC are thinned until the substrate wafer isremoved. A handle wafer is attached to the bottom of the firstsubstrate. The second substrate is then removed and thinned and ananalytical imaging technique is performed on the IC from the topside of the first substrate. The first substrate and IC are processed toa user-definable level.

    V

    ALUE

    Supports clearer, multiple top-side imaging techniques

    Provides more accurate failure and operational analysis

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    47/100

    Technology Transfer Program

    Microelectronics | Page 45

    FORWARD SCATTERED ELECTRON IMAGE (FSEI)SAMPLE HOLDER

    PATENT NOS.: 7,005,652AND 6,777,678

    This technology is a combination of two patents.The FSEI sample holder is a method that bringsTransmission Electron Microscope (TEM) qualityto the less expensive Scanning ElectronMicroscope (SEM) by providing information aboutthe sample that is both surface sensitive and very highresolution. This new technology enables more high-resolution imaging on a general category of samples and eliminates

    the need for additional hardware at a tremendous cost savings.This technology uses an angled sample holder and a two-stagereflector to obtain a perspective view of the sample. A perspectiveview allows details along the edge to be imaged. Furthermore, thehigh tilt angle causes as many as 50% of the high energy electrons tobe forward scattered off the surface of the sample. These electronscarry high resolution and surface sensitive information.

    VALU

    E

    Produces image resolution at the 1.0 nanometer rangeRequires no additional detector hardware

    TIMER CIRCUIT UTILIZING THERMAL EFFECTPATENT NO.: 6,498,770

    This technology is a timer circuit that utilizes thethermal runaway effect. The timer circuit includes a

    switch, resistor, transistor and protective device.When current flows through the first terminal ofthe transistor, current begins to flow through thesecond terminal. This current heats the transistor andincreases its gain and leakage current. The increased gaincauses a higher current to flow through the second terminal whichheats the transistor further. This cycle eventually activates theprotective device, which both acts as the time indicator and

    disconnects the power to the transistor to protect the transistor fromdamage.

    VALUE

    Replaces digital timer circuits

    Less complicated and more reliable than prior methods

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    48/100

    National Security Agency

    Page 46 | Microelectronics

    RECOVERING A GATE-LEVEL NETLIST FROM A TRANSISTOR-LEVEL

    PATENT NO.: 6,190,433

    Various tools have been created to quickly analyze anintegrated circuit (IC) based on a transistor-levelnetlist and layout of the IC. In many instances,however, the layout of the IC is not available. There isa need for a method of recovering a gate-level netlistfrom a transistor-level netlist of an IC where layoutinformation of the gates included on the integrated circuit isunknown.

    This method recovers a gate-level netlist from a transistor-levelnetlist description of an IC where layout information for the gatescontained in the IC is not known. This is accomplished bycomparing a functional description of every gate function of interestto a functional description of a set of connected componentsselected from a transistor-level netlist. Different circuitimplementations of a particular gate function may be recoveredusing a single functional description of the gate function in question.

    VALUE

    Provides high-level abstraction to describe ICs

    Recovers netlist where gate layout information is unknown

    Federal technology transfer exists,in part, to provide a return on investmentfor tax payers.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    49/100

    Technology Transfer Program

    Networking | Page 47

    NETWORKINGAs U.S. Government data networks and systems continuallycome under attack from countless cyber threats the NSA, in itsmission to secure our infrastructure, has to stay one step ahead ofthousands of foreign adversaries. Network penetrations, denial ofservice attacks, data traffic interceptions, and rerouting are just afew of the challenges facing agency engineers and scientists on adaily basis. As a result, the NSA has developed some of theworlds leading network security capabilities.

    Networking technologies that are available for license includeadvanced firewall technologies, multiple level minimum logicnetworks, traffic monitoring as well as inter-network datatransport, secure file transfer, and network address locationmethods.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    50/100

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    51/100

    Technology Transfer Program

    Networking | Page 49

    RELIABLY COMMUNICATING VIA COMPUTER NETWORK

    PATENT NO.: 7,743,122

    Network communications continue to experienceinterruptions in data delivery due to the lack ofavailability or bandwidth in a channel. Thisinvention increases the reliability of networkcommunications by adaptively constraining therouting of communications within a network.

    This technology identifies the hub and leaf nodes in anetwork. By communicating between the hub and leaf nodes, and

    between hub nodes, a leaf node can be re-designated as a hub nodeif the leaf node identifies a region of the network not known by ahub node. In addition, a hub node can be re-designated as a leafnode if the hub node becomes redundant. All re-designations arebased on node statistics consisting of number of neighboring nodes,amount of node uptime, number of neighboring nodes plus amountof node uptime, and node processor speed.

    VALU

    E

    Adaptively constrains routing of communications within a networkAble to re-designate leaf nodes as hub nodes as needed

    ESTABLISHING &UPDATING MASTER NODE IN COMPUTER NETWORKPATENT NO:7,738,504

    In cluster type networks, a master node typicallycontrols decision making and tasks non-master

    nodes. A master node may malfunction, or a nodemay be added to a network that is more suited to bethe master node than the designated master node.

    This technology establishes and updates a master node in acomputer network by scoring each node based on its physicalattributes. The highest scoring node is designated as the masternode. The master node sends messages, including its score, to non-master nodes requesting each non-master node score. If a non-

    master node has a higher score, it requests the master noderelinquish its master node status.

    VALUE

    Does not require global administrator

    Uses scoring to determine master node instead of field comparison

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    52/100

    National Security Agency

    Page 50 | Networking

    FIREWALL FOR PROCESSING A CONNECTIONLESS NETWORK PACKET

    PATENT NOS:7,073,196AND 6,141,755

    Some networks combine IP and ATM bytransmitting IP packets over ATM channelcommonly referred to as IP over ATM. The IPpacket is divided into segments and then made partof an ATM data segment. Combining thecapabilities of an ATM firewall with those of an IP firewalldoes not, necessarily, yield a more efficient or more secure firewallfor an IP over ATM network.

    This invention is a secure, efficient firewall that applies a securityposture to connectionless IP data packets transmitted over aconnection-oriented ATM network. This invention allows aconnectionless packet access to a network, where the connectionlesspacket is compared only once, if at all, to a database containingaccess rules. Each allowance or denial is recorded, and a systemadministrator is alerted if denial or threshold limits are exceeded.

    VAL

    UE

    Packets only require first time comparison to acceptance rules database

    Provides maximally efficient firewall

    MULTIPLE LEVEL MINIMUM LOGIC NETWORKPATENT NOS.:7,068,671AND 5,996,020

    This technology is a multiple level, minimum logicnetwork interconnect structure with high bandwidthand low latency. This structure utilizes a data flow

    technique based on timing and positioning ofmessages communicating through the interconnectstructure. Switching control is distributed throughout multiple nodesso that a supervisory controller providing a global control functionand complex logic structures are avoided. The interconnect structureoperates as a deflection or hot potato system in whichprocessing and storage overhead at each node is minimized.Elimination of a global controller and buffering at the nodes greatly

    reduces the amount of control and logic structures in theinterconnect structure, simplifying overall control and networkinterconnect components and improving speed performance ofmessage communication.

    VALUE

    Eliminates global controller and buffering at the nodes

    Simplifies overall control and network interconnect components

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    53/100

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    54/100

    National Security Agency

    Page 52 | Networking

    FILTER SYSTEM FOR INFORMATION NETWORK TRAFFIC

    PATENT NO.:6,385,205

    Various hardware-only and hardware and softwarecombination devices are known for directing packetsthroughout a network system. A number of thesedevices are designed to optimize the performance ofthe network by evaluating packets and eitherdetermining a specific destination, or providing a filter,to only pass designated packets. The technology presentedhere is a hardware-only filter for controlling data packet traffic. The

    filter consist of a grid system with columns and rows and a gridpopulating device that inserts binary numbers that are thecomparison between an incoming packet and the column and rowheaders of the grid.

    With this technology, a converter breaks down data packets intoeight-bit octets that are identified and placed in the column headersof the grid. Predetermined row header information is placed in therow headers. Next the row and column headers are compared to

    produce positive and negative binary numbers in the event of amatch and a non-match, respectively. These numbers are placed inthe grid squares by the grid populating device as controlled by theoffset positioning means. Next, determine if any column is all ones.If so, the data packet is released from the memory device where itwas temporarily stored. If no column is all ones, the data packet iscleared from memory.

    VAL

    UE

    Selects desirable packets from traffic with hardware-only deviceMore efficient than software packet handling

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    55/100

    Technology Transfer Program

    Optics | Page 53

    OPTICSIn order to satisfy the demand of increasingly fast encryption,switching, and data processing systems, optical switching andtransmission methods continue to evolve. The NSA has been atthe forefront of many of these technologies and agency scientistshave developed numerous optical data transport methods anddevices. These technologies have included methods ofmanufacturing advanced integrated circuit waveguides, photoniclogic devices, optical filters, and optical signal modulationdevices.

    Optical technologies that are available for license include opticalbandpass filters, optical switches, modulators, optical clockrecovery, and beacon authentication methods.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    56/100

    National Security Agency

    Page 54 | Optics

    LOW-LOSS FIBER CHIP ALIGNMENT

    PATENT NO.: 7,128,476

    This invention is a method of aligning optical fiber toa photonic integrated chip that results in lower backreflections, lower insertion losses, easier alignment,and a more rugged package.

    With this technology, a thermally formed spherical lensis attached to the end of the fiber and a via is etched along aside of a photonic chip preferably a tetrahedral, conical, or pyramidaperture. The spherical lens is then inserted into the via and the

    optical device is aligned with each via. Alignment of the lens and viais performed using conventional means. Next, an anti-reflectioncoating is applied to the end of the optical device abutting the viaand spherical lens. An index matching fluid is applied to each lens.Finally, the lens is connected to the via using conventional meanssuch as UV curable epoxy.

    V

    ALUE

    Easily scalable

    Inexpensive implementation

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    57/100

    Technology Transfer Program

    Optics | Page 55

    OPTICAL CLOCK RECOVERY DEVICE USING NON-LINEAROPTICAL WAVEGUIDES

    PATENT NO.: 6,701,049Transmission of data over long fiber links results intiming jitter, which is a major signal degradationproblem. The timing jitter refers to a random variationof the pulsesarrival time at the receiver, and it can beon the order of a pulse width. This jitter may causeslight changes in the repetition rate of the data at thereceiver. Therefore, at a node or a receiver, the timing of the

    data needs to be extracted and synchronized with a local clock thatin turn drives the data processing devices, which perform othersignal processing operations, such as demultiplexing or optical signalregeneration. This extraction of the data timing at the receiver iscalled clock recovery. As optical data transmission speeds approach100 gigabits per second, a phase noise yielding less than onepicosecond of clock timing jitter is required.

    The invention presented here provides an all-optical timing

    extraction device using the non-linear characteristics of opticalwaveguides for counter-propagating pulses. In addition, theinvention provides an all-optical timing extraction device that canresolve timing delays between pulses on the order of a fewpicoseconds.

    VALUE

    Resolves timing delays between pulses to two picoseconds

    Bit-rate flexible, all-optical timing extraction device

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    58/100

    National Security Agency

    Page 56 | Optics

    TENSION-TUNED ACOUSTO-OPTIC BANDPASS FILTER

    PATENT NO.: 6,647,159

    Typically, wavelength sensitive optical switches areused for wavelength division multiplexed (WDM)signals because the wavelength separation betweenchannels is small. In the case where a narrow, opticalband of traffic carried by a specific wavelength of amulti-wavelength signal needs to be separated from therest of the traffic, a wavelength-sensitive optical switch can beimplemented at considerable cost savings.

    This invention is a device that allows one or more bands of opticalwavelengths to be selected for further transmission. All light withinthe optical bandwidth of operation is first coupled from the coremode of an optical fiber to a specific cladding mode by a chirpedbroadband cladding mode coupler. These cladding mode light wavesthen enter a narrow-band core mode coupler whereby selectedoptical bands of wavelengths, tuned by the tension on the opticalfiber, are re-coupled back into the core of the optical fiber. The

    chirped broadband cladding mode coupler is isolated from thenarrow-band core mode coupler by an acoustic absorber to limit theacoustic interaction between them.

    VALUE

    Able to select one or more channels to pass through the filter

    Broadband cladding and narrow-band core mode coupler isolation

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    59/100

    Technology Transfer Program

    Optics | Page 57

    CHIRPED FIBER ACOUSTO-OPTIC BANDPASS FILTER

    PATENT NO.: 6,580,841

    With Chirped Fiber Acousto-Optic BandpassFilters, all light within the optical bandwidth isfirst coupled from the core mode of an opticalfiber to a specific cladding mode within a chirpedbroadband cladding mode coupler. A selected RFfrequency of a flexure wave, induced by anacoustic wave amplifier and acting on a chirped region offiber, couples all light within the optical bandwidth from the core

    mode of the optical fiber to a specific cladding mode. The claddingmode lightwaves enter a narrow-band core mode where selectedfrequencies of flexure waves, induced by a second acoustic waveamplifier, re-couple selected bands of wavelengths back into the coremode. As a result, the device uses less power and allows individualcontrol of multiple acoustic signal strengths and frequencies,efficient coupling of all optical traffic for selecting individual opticalchannels, and changes to the strength or magnitude of optical signalsby varying the frequency.

    VALUE

    Does not require core-block and more power efficient

    Multiple acoustic signals with controllable strengths and frequencies

    ACOUSTO-OPTIC BANDPASS FILTERPATENT NO.: 6,556,729

    The acousto-optic bandpass filter is a device

    where one or more wavelength bands may beselected for further transmission. In this device,all light within the optical bandwidth of operationis first coupled from the core mode of an optical fiber to aspecific cladding mode by a long-period photo-induced grating.These cladding mode light waves then enter an acousto-opticinteraction region where selected RF frequencies of flexure waves,induced by an acoustic wave amplifier, re-couple selected bands of

    wavelengths back into the core mode.

    VALUE

    Lower optical losses

    More versatility and reduced power consumption

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    60/100

    National Security Agency

    Page 58 | Optics

    ALL-FIBER OPTICALLY-CONTROLLED OPTICAL SWITCH

    PATENT NO.:6,081,634

    Optical switches are typically controlled by electro- oracousto-optic techniques such as surrounding thewaveguides with electro- or acousto-optic material tocontrol the coupling between the waveguides.

    This invention utilizes two waveguides controlled by a thirdwaveguide. The waveguides are in the same plane and the third maybe an optic fiber or slab waveguide. The first and second waveguidesare close enough to exhibit evanescent wave coupling and the

    propagation constant is identical. The second waveguide ispositioned closer to the third optical waveguide. Switching betweenthe first and second waveguides occurs when the propagationconstant of the third is changed optically.

    VALUE

    Avoids switch-fiber coupling issues (i.e. incompatible modal fields)

    Significantly reduces reflection losses

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    61/100

    Technology Transfer Program

    Security | Page 59

    SECURITYThe NSA has invented some of the modern worlds mostground-breaking data and device security technologies. These

    technological breakthroughs have included methods ofencryption and decryption, physical security devices, networkintrusion detection, as well as secure computing and data transfermethods.

    The NSA has numerous security technologies available forcommercialization including methods of generating cryptographickeys, digital signature validation, secure computing technologies

    using virtual machines, and wireless intrusion detection methods.Additional technologies available include physical securityapparatuses such as tamper evident cargo seals and reusabletamper evident shipping packages.

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    62/100

    National Security Agency

    Page 60 | Security

    IMAGE-BASED USER AUTHENTICATION

    PATENT NO.: 8,655,027

    This invention is a method of authenticating acomputer user so that authentication cannot becompromised by either keystroke monitoring orlooking over the shoulder of the user. With thismethod, an image is captured of the user andassigned a username. The user selects an imagecategory, two or more patterns, facial location, and rotation value.

    When a user logs into the system, the system presents a series ofimages. The user selects an image and system projects the imageonto the face at the selected rotation. The system captures animage of the users face with the rotated images and

    authenticating the user if the facial features match and the patternimages match.

    VALUE

    Authentication not compromised by key logging or visual surveillance

    User selectable image categories and pattern images

    DETECTING SIMCARD REMOVAL AND REINSERTIONPATENT NO.:8,478,340

    Methods exist for identifying when anunauthorized user attempts to use someoneelses electronic device using the unauthorizedusers SIM card. However, there is a need todetect misuse of a valid SIM card with anelectronic device for which the SIM card wasintended to be used.

    This technology is a device for and method of determining if a SIMcard was removed and reinserted into a device by an unauthorizedperson. After initially inserting a SIM card into a device, thistechnology monitors any SIM card removed and reinserted and an

    indicator on a graphical user interface reports the removal and re-insertion to the user.

    VALUE

    Detects misuse of a valid SIM card by unauthorized person

    Alerts user of SIM card removal and reinsertion

  • 8/11/2019 NSA Technology Transfer Program (TTP) Catalog

    63/100

    Technology Transfer Program

    Security | Page 61

    USBAND DATA PORT PROTECTOR

    PATENT NOS.:8,449,309AND 8,414,314

    Increasingly, universal serial bus (USB) ports arebecoming the preferred method to maliciouslyextricate data or infiltrate malicious software into acomputer system. As a result, the need to secureUSB ports from unauthorized access is becoming a priority forsystem administrators and security personnel.

    This technology consists of two patented devices (reusable andsingle use) that provide a simple method for blocking access to a

    USB port. The reusable USB Port Protector consists of one tabularplug and a matching shim that are inserted into the port. The lowershim is inserted first and then the upper tab is inserted. When thetwo are mated together, a security wire can be inserted through ahole in each preventing the two pieces from being separated.Projections on the lower shim, prevent the assembly from beingremoved blocking access to the port electrical connections.

    VAL

    UE

    Quick, easy, two-part installationReusable and one-time use models

    REUSABLE TAMPER EVIDENT BAG CLOSUREPATENT NO.: 8,196,442

    This invention is a device that can maintain the chain ofcustody so as to provide the user with the assurance thatthe information being protected has not beencompromised.

    This tamper-evident bag closure is defined by a lid withmultiple hasps and a base with knobs that attach to the bag. Thebag is secured by a locking mechanism placed through an openingon the base and inserted within an insertion aperture. When themechanism is locked, the lid slides into alignment with the base andengages the plurality of hasps with the plurality of knobs, thus

    securing the b