Patents Assigned to The United States of America as represented by the Director, National Security Agency
  • Patent number: 8200731
    Abstract: A device for and method of determining a coherence measurement for a signal that includes a digitizer for digitizing the signal, a transformer connected to the digitizer, a first squarer connected to the transformer, a second squarer connected to the digitizer, an adder connected to the first squarer and the second squarer, a subtractor connected to the first squarer and the second squarer, a standard-deviation function block connected to the subtractor, a mean generator connected to the adder, a first multiplier connected to the standard-deviation function block, and a divider connected to the output of the mean generator and the first multiplier.
    Type: Grant
    Filed: November 20, 2008
    Date of Patent: June 12, 2012
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Adolf Cusmariu
  • Patent number: 8185373
    Abstract: A method of assessing quality of language translation and interpretation by receiving source material and a translation, identifying the source material's content and format, assigning a first rating to the source material's level of difficulty in translating the source material, determining the translation's type, assigning a second rating to the translation's accuracy, assigning a third rating to the degree to which the translation interprets the source material's intended message, assigning a fourth rating to the formatting of the translation, and evaluating the four ratings to determine an assessment of the translation's language translation and interpretation.
    Type: Grant
    Filed: May 5, 2009
    Date of Patent: May 22, 2012
    Assignee: The United States of America as represented by the Director, National Security Agency, The
    Inventor: Scribner A. Messenger
  • Patent number: 8177089
    Abstract: A reusable tamper indicating transport tube that can be used to securely transport large drawings and other documentation without damaging or distorting them. The tamper-evident tube comprises an outer tube, an inner tube, an outer cap, an inner tube cap, an inner tube locking mechanism, and an outer tube locking mechanism that is affixed to the peripheral surface of the outer cap.
    Type: Grant
    Filed: September 30, 2009
    Date of Patent: May 15, 2012
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventors: Steven S. Bishop, Stephen R. Campbell
  • Patent number: 8068850
    Abstract: A method of locating a transmitter is disclosed. A communications link is established between multiple receiving stations and a control station, and used with a calibration signal to calibrate out the time delay of the communications link. A radiated signal from an unknown transmitter is received at a receiving station and sent to the control station over the communications link. The time of arrival is recorded. Upon receiving a user input, the communication link switches from transmitting the received radiated signal to transmitting the calibration signal. The start of calibration signal is timed to begin at the same time across all of the receiving stations. The communication link time delay for each link is calculated by subtracting the start time from the received time, and the communication link time delay is subtracted from the received time recorded for the radiated signal. TDOA calculations are made to locate the transmitter.
    Type: Grant
    Filed: March 4, 2008
    Date of Patent: November 29, 2011
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventors: Walter J Kleinfelder, James E Meister
  • Patent number: 8069349
    Abstract: A method of securely transferring files from an un-trusted to a trusted network is disclosed. A file that is an archive file of many component files is separated into constituent files. Each file is stored on a server connected to an un-trusted network, and a series of initial checks, such as virus, file size, and file extension are performed. If the files pass, additional, file format specific security rules are applied. An open format transform is performed on proprietary format type files, and embedded file components are separated out. A user-definable security rule set is performed on each open format transform component. If all security tests pass, the file is reassembled and saved as a trusted file in the same format as the original file.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: November 29, 2011
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventors: Jeffrey Israel, Colin Richmond, Darrel Sharpe, Wohlgemuth Erik
  • Patent number: 8052180
    Abstract: A tamper-evident cargo seal is disclosed, comprising a pin that is passed through a hasp on a shipping container, a body member, a pair of parallel guide members, at least one security label blank, and a cover. One end of the pin is keyed. The body member has a slot through a side surface extending into the interior, and is keyed to receive the pin. Abutting the top surface of the body member are two parallel guide members, bounding an area comprising the top surface of the body member. One of the guide members also has a slot to allow the pin to engage the slot in the body member. One or two removable security label blanks are inserted between the guides after the pin is inserted into the slot, and a security label is affixed over the blanks. A cover engages the body and guide members to protect the label.
    Type: Grant
    Filed: January 24, 2008
    Date of Patent: November 8, 2011
    Assignee: The United States of America as represented by the Director of the National Security Agency
    Inventor: David Lassen
  • Patent number: 8001137
    Abstract: A method of identifying connected data in relational database by receiving relational database, receiving data components from relational database, initializing a first table and a second table with data identifiers and connection information, initializing a third table with data identifiers, initializing a transition table; replacing each entry in the third table with a user-definable relationship of its corresponding identifier in the second table, its corresponding connected data component identifier in the second table, and the identifier to which an equivalent identifier transitioned in the transition table; updating the transition table, updating the second table, returning to the replacement step if the third table changed, and, otherwise, identifying the received data components as connected that correspond to entries in the third table that are equal.
    Type: Grant
    Filed: October 15, 2009
    Date of Patent: August 16, 2011
    Assignee: The United States of America as represented by the Director of the National Security Agency
    Inventor: Brian M. Hess
  • Patent number: 7945947
    Abstract: A method of giving a user high-level access privileges if a combination of keystrokes is sent to a desktop is disclosed. Each terminal services session is enumerated and sessions identified. Unidentified sessions have a user-definable process associated with the session. Desktops registered in the terminal services session are identified, and if a new desktop is identified, a thread is created to attach to that desktop and hook the desktop's low-level keyboard input. The keyboard input is then monitored for a pre-defined combination of keystrokes, and if found, a command shell starts, giving the user higher-level access privileges.
    Type: Grant
    Filed: December 3, 2007
    Date of Patent: May 17, 2011
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Eric B. Chudow
  • Patent number: 7930538
    Abstract: A method of securely transferring files from an un-trusted to a trusted network is disclosed. A file that is an archive file of many component files is separated into constituent files. Each file is stored on a first computer connected to an un-trusted network, and a series of initial checks, such as virus, file size, and file extension are performed. If the files pass, the file is transferred to a second server using a one-way file transfer mechanism. A series of secondary checks, similar to the initial checks is performed on each file transferred. For text files or images, a simplified security rule is applied. An open format transform is performed on proprietary format type files, and embedded file components are separated out. A user-definable security rule set is performed on each open format transform component. If all security tests pass, the file is reassembled and transferred to the trusted network.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: April 19, 2011
    Assignee: The United States of America as represented by the Director of the National Security Agency
    Inventors: Jeffrey Israel, Colin Richmond, Darrel Sharpe, Erik Wohlgemuth
  • Patent number: 7893875
    Abstract: A device and method of geolocating a transmitter. First and second receivers, in motion, receive a signal from the transmitter. Digitizers in the receivers digitize the signal. Converters in the receivers for converting the digitized signals to complex-valued signals. Transmitters on the receivers transmit their digitized signals, locations, and velocities at the time the signal was received to a processor. A central processing unit on the processor determines a difference in radial velocities of the receivers relative to the transmitter. The difference in radial velocities and delay time between the signals received at the receivers are used to geolocate the transmitter.
    Type: Grant
    Filed: March 11, 2009
    Date of Patent: February 22, 2011
    Assignee: The United States of America as represented by the Director National Security Agency
    Inventor: David C. Smith
  • Patent number: 7895659
    Abstract: A method of assessing security of an information access system by selecting at least one verification mechanism, estimating an error tradeoff plot showing false acceptance rate versus false rejection rate for each verification mechanism, selecting a corresponding false acceptance rate and false rejection rate pair from each error plot, combining the false acceptance rates to determine intrusion protection, combining the false rejection rates to determine denial protection, and combining intrusion protection and denial protection as the assessment of the information access system.
    Type: Grant
    Filed: April 18, 2008
    Date of Patent: February 22, 2011
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Adolf Cusmariu
  • Patent number: 7890763
    Abstract: Method of identifying invalid digital signatures involving batch verification by receiving digital messages, digital signatures, and signer identifiers, computing Z0 as a function of the received information, and determining if the digital signatures are valid. If so, stopping. If not, assigning a signature identifier to each digital signature, setting w equal to 1, computing Zw as a function of the received information and signature identifiers, and searching for a multiplicative relationship amongst Z0, Z1, . . . , Zw. If one is found then determining the invalid digital signatures from the multiplicative relationship and stopping. Otherwise, incrementing w and returning to the step of computing for additional processing if desired.
    Type: Grant
    Filed: September 14, 2007
    Date of Patent: February 15, 2011
    Assignees: The United States of America as represented by the Director, National Security Agency, Sparta, Inc.
    Inventors: Laurie E. Law, Brian J. Matt
  • Patent number: 7838866
    Abstract: The present invention is a method of fabricating a waveguide using a sacrificial spacer layer. The first step in this process is to fabricate the underlying optical semiconductor structure. A trench is then etched in this structure resulting in an underlying L-shaped structure. A sacrificial spacer layer is deposited in the trench. The waveguide is created in the trench on the sacrificial spacer layer using a mask layer to angle the vertex of the L-shaped structure. User-defined portions of the sacrificial spacer layer are subsequently removed to create air gaps between the waveguide and the sidewalls of the trench in the optical semiconductor.
    Type: Grant
    Filed: May 13, 2009
    Date of Patent: November 23, 2010
    Assignee: The United States of America as represented by the Director of the National Security Agency
    Inventors: John L. Fitz, Daniel Stephen Hinkel, Scott C. Horst
  • Patent number: 7838867
    Abstract: The present invention is a method of fabricating a waveguide using a sacrificial spacer layer. The first step in this process is to fabricate the underlying optical semiconductor structure. A trench is then etched in this structure resulting in an underlying L-shaped structure. A sacrificial spacer layer is deposited in the trench. The waveguide is created in the trench on the sacrificial spacer layer using a mask layer to angle the vertex of the L-shaped structure. User-defined portions of the sacrificial spacer layer are subsequently removed to create air gaps between the waveguide and the sidewalls of the trench in the optical semiconductor.
    Type: Grant
    Filed: May 13, 2009
    Date of Patent: November 23, 2010
    Assignee: United States of America as represented by the Director, National Security Agency, The
    Inventors: John L. Fitz, Daniel S. Hinkel, Scott C. Horst
  • Patent number: 7833828
    Abstract: A method of creating a patterned device by selecting a substrate; forming a first step on the substrate; depositing a sacrificial layer along the first step and the substrate; depositing a second step on a portion of the sacrificial layer; depositing a second layer on each of a portion of the substrate, sacrificial layer and second step that shares a common resistance to removal by a same agent as the substrate, the first step and the second step; removing a portion of the sacrificial layer so that a gap is created between the second layer and the first step, wherein a portion of the sacrificial layer remains such that the second layer remains; and processing the substrate beneath the gap created between the second layer and the first step.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: November 16, 2010
    Assignee: United States of America as represented by the Director, The National Security Agency
    Inventors: John L. Fitz, Harris Turk
  • Patent number: 7827408
    Abstract: A device for and method of authenticated encryption by concatenating a first user-datum with a second datum, concatenating the first datum with a third datum, encrypting the results, concatenating the encrypted results, concatenating the result with a message and a fifth user-definable datum, hashing the result, concatenating the result with the message, dividing the result into blocks, concatenating the first datum with a sixth datum, generating key-stream blocks from the result using a block cipher in counter mode, combining the blocks and key-stream blocks, concatenating the result with the first datum and the fifth datum, and transmitting the result to a recipient. The recipient extracts the hash value from the received ciphertext, generates a hash value from the first through fifth datums and plaintext derived from the ciphertext, and compares the two. If they match then the plaintext and fifth datum are as the sender intended.
    Type: Grant
    Filed: July 10, 2007
    Date of Patent: November 2, 2010
    Assignee: The United States of America as represented by the Director of the National Security Agency
    Inventors: Nicholas E. Gehringer, Patricia P. Greene
  • Patent number: 7818168
    Abstract: A method of measuring the degree of enhancement made to a voice signal by receiving the voice signal, identifying formant regions in the voice signal, computing stationarity for each identified formant region, enhancing the voice signal, identifying formant regions in the enhanced voice signal that correspond to those identified in the received voice signal, computing stationarity for each formant region identified in the enhanced voice signal, comparing corresponding stationarity results for the received and enhanced voice signals, and calculating at least one user-definable statistic of the comparison results as the degree of enhancement made to the received voice signal.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: October 19, 2010
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Adolf Cusmariu
  • Patent number: D627216
    Type: Grant
    Filed: July 21, 2009
    Date of Patent: November 16, 2010
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Thomas Fulginiti
  • Patent number: D637658
    Type: Grant
    Filed: August 5, 2010
    Date of Patent: May 10, 2011
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: William H. Ryder
  • Patent number: D655335
    Type: Grant
    Filed: August 9, 2011
    Date of Patent: March 6, 2012
    Assignee: The United States of America as represented by the Director, National Security Agency
    Inventor: Felix J. Gollucci