Die Patente der National Security Agency (NSA)
Es ist wenig bekannt, dass
der US Geheimdienst NSA Inhaber zahlreicher Patente ist. (Über 200 Stück) „You
may be surprised to hear that NSA seeks patents“ schreibt die
Agency selbst in ihrer Hauspostille The
Next Wave – The National Security Agency's review of emerging
technologies.
Bis März 2014 war General Keith B. Alexander Direktor der NSA.
Obwohl der Geheimdienst zehntausende von Mitarbeitern beschäftigt, hat
General Alexander auch selbst ein NSA Patent erfunden: US 8898784 B1, Device
for and method of computer intrusion anticipation, detection, and
remediation
, erteilt am 25. November 2014.
In dieser Behörde packt der Chef halt noch selbst mit an.
Die folgende Liste
enthält die Nummern und die Bezeichnung der Erfindung von
Patenten der NSA. Dabei handelt es sich sowohl um Patente, die
durch die NSA angemeldet wurden als auch um solche, bei denen erst
später die Rechte am Patent ganz oder zum Teil auf die NSA
übertragen wurden. Jede Nummer sollte verlinkt sein,
entweder zur Inhaberdatenbank
des US Patentamts oder zur Patentsuche
von Google. (Leider wurde die Inhaberdatenbank vom US Patentamt
Ende 2014 überarbeitet, so das jetzt alle meine mühsam
verlinkten Nummern nur noch zur Eingabemaske dieser Datenbank führen.
Man muss dort also die Nummer nochmals von Hand eingeben.).
Wenn
nicht zu Google verlinkt ist können Sie sich das Patent ansehen,
wenn Sie bei Google US und die Nummer eingeben, also
etwa US5631961, es ist dann
der erste Treffer.
Die letzten Patente dieser Liste sind übrigens
„Design Patente“, in Deutschland bisher Geschmacksmuster
genannt, ab 2014 als "eingetragenes Design" bezeichnet.
Die US Veröffentlichungsnummer beginnt mit einem D.
Hier mag ich Ihre Aufmerksamkeit besonders auf die D637658 lenken,
ein Design Patent für ein „Game
Board“.
Quelle für die Liste ist hauptsächlich
das „United States Patent and Trademark Office“, aber
auch „DEPATISnet“ vom Deutschen Patent- und Markenamt und
die Datenbank des Europäischen Patentamts „Espacenet“.
Eine ältere Liste im Internet zum Thema gibt es auch:
http://cryptome.org/nsa-patents.htm
Zu den Hauptaufgaben der
National Security Agency gehört der Schutz sensibler und
geheimer Informationen der USA und die Sammlung und Auswertung
ausländischer Datenströme zu geheimdienstlichen Zwecken.
Daneben gibt der Dienst auch Empfehlungen
für die Öffentlichkeit zu heraus, zu Themen wie
Datensicherheit und Verschlüsselungstechniken. Zu letzterem
vergibt die NSA auch Patentlizenzen von Patenten, die ihr gar nicht
gehören. Die kanadische Firma Certicom Inc. besitzt über
130 Patente im Bereich „Elliptische-Kurven-Kryptographie“,
was immer das auch sein mag. Die NSA hat von 26 Patenten das Recht
erworben, sie wiederum an Firmen zu lizenzieren, wenn Belange der
nationalen Sicherheit betroffen sind. (Certicom wurde 2009 von
Research In Motion übernommen, das sich 2013 in BlackBerry
umbenannt hat.)
Siehe
http://www.nsa.gov/business/programs/elliptic_curve.shtml
und
http://www.certicom.com/pdfs/FAQ-TheNSAECCLicenseAgreement.pdf
Noch
einige Hinweise zur Patentliste:
Frage:
Stimmt die Liste
überhaupt? Auf der Titelseite der US
20110302394 steht als Inhaber nicht "National Security
Agency" sondern IBM, International Business Machines
Corporation.
Antwort:
Volltextdatenbanken wie ESPACENET,
DEPATISNET oder GOOGLE PATENTS zeigen die Patentschrift so, wie sie
am Veröffentlichungstag ausgesehen hat. Spätere Änderungen
in der Person des Inhabers sind deshalb auf dem Patent nicht
vermerkt. Dafür gibt es die Rechtsstands-Datenbanken, beim US
Patentamt heißt sie "Patent Assignment Database (AOTW-P)".
Sieht man sich die US
20110302394 dort an, erfährt man unter Assignment: 2,
dass die International Business Machines Corporation die Rechte am
Patent auf die National Security Agency übertragen hat.
Damit
klärt sich auch die Frage, was es mit der US
5224756 auf sich hat. Auf der Titelseite steht die NSA als
Inhaber, aber es geht bei dem Patent um einen Kindersitz im Auto!
Nun, ein Blick in die Patent
Assignment Database zeigt, dass das Patent von Daimler Chrysler
war. Es handelt sich also schlicht um einen Druckfehler auf dem
Patent.
Das gleiche bei der US
5087946 zu, auf der Titelseite steht irrtümlich National
Security Agency, der Geheimdienst war aber laut der Assignment
Datenbank nie Inhaber des Patents.
Was ist ein Assignor
und ein Assignee?
Assignor heißt auf Deutsch
Zedent, also eine Person, die ein Recht an jemand abtritt. Und
dieser Jemand ist der Assignee, auf deutsch Zessionar,
derAbtretungsempfänger, Rechtsnachfolger.
Was ist der
Unterschied zwischen Patent Number und Publication
Number?
Unter der Publication Number wird die
Patentanmeldung, also die noch nicht geprüfte Anmeldung
veröffentlicht.
Während das geprüfte Patent unter
der Patent Number erscheint. Wenn bei Patent Number in der
Liste NONE steht, dann ist zu der Anmeldung bis jetzt noch
kein Patent erschienen. Das US Patentamt veröffentlicht übrigens
erst seit 2001 auch die Patentanmeldungen, darum gibt es bei den
älteren Dokumenten in der Liste keine Publication Number.
Sind
in der Liste auch ehemalige Geheimpatente?
Zunächst, es
gibt im US Patentrecht keine geheimen PATENTE sondern nur geheime
Patentanmeldungen. Wenn die Geheimhaltungsanordnung "Secrecy
Order" ergeht, wird die Patentanmeldung geheim
gehalten. Das Patent wird erst nach Aufhebung der
Geheimhaltungsanordnung erteilt. Einer Patentschrift sieht man es
nicht an, ob die Erfindung mal geheim war.
Auffällig kann
der lange Zeitraum zwischen Anmeldedatum und Erteilungsdatum sein.
Klarheit verschafft erst die Rechtsstand-Datenbank des US Patentamts,
die "Patent
Application Information Retrieval". Dort ist in der
Transaction History vermerkt, ob eine Secrecy Order erlassen
wurde. Leider ist ein dauerhafter Link zu dieser Datenbank nicht
möglich.
Hier
ist ein Muster, wie so etwas aussieht. Man sieht auf der zweiten
Seite, dass am 22.05.1987 die Geheimhaltung verfügt wurde, sie
wurde dann jährlich erneuert und am 24.11.2004 aufgehoben. In
der Transaction History ist auch die Application (Anmelde) Nummer
06/509,268 vermerkt, veröffentlicht wurde das Patent als US
6912284
.
Geheimanmeldungen aus der Liste waren einst die
US
5237615 - MULTIPLE
INDEPENDENT BINARY BIT STREAM GENERATOR
US
5245659
- CONSTANT RATIO CODING FOR MULTIPATH REJECTION AND ECCM
ENHANCEMENT
US
5351301 - AUTHENTICATOR CIRCUIT
US
5428686 - SECURE COMMUNICATION SYSTEM HAVING LONG-TERM KEYING
VARIABLE
US
5500899 - SECURE VOICE CONFERENCING APPARATUS
US
6097812 - CRYPTOGRAPHIC SYSTEM und US
6130946 - CRYPTOGRAPHS
Diese beiden Patente sind von William
F. Friedman, dem wohl bekanntesten Kryptologen aus der
Anfangszeit der NSA.
US
6175625 - CONTROL
CIRCUITS FOR ELECTRIC CODING MACHINE
Dieses Patent war 1944
bis 2001 geheim. Es beschreibt die Verschlüsselungsmaschine
„SIGABA“.
Erfinder ist Captain Laurance
F. Safford, der
„Begründer der US-Navy-Kryptographie“.
Safford
warnte vergeblich vor dem Überfall auf Pearl Harbor.
US
6912284 - SELF-AUTHENTICATING CRYPTOGRAPHIC APPARATUS
US
6724893 - METHOD OF PASSING A CRYPTOGRAPHIC KEY THAT ALLOWS THIRD
PARTY ACESS TO THE KEY
Und ein neueres Patent:
US
8380485 DEVICE FOR AND METHOD OF LANGUAGE PROCESSING
angemeldet
am 13.08.2009, veröffentlicht am 19.02.2013. Die Geheimhaltung
„SecrecyOrder“ war von 2009 bis 2012 in Kraft.
Sind
die
Erfinder alle bei der NSA angestellt?
Nein,
viele Erfindungen wurden an Universitäten gemacht, etwa an der
Stanford
University
oder der
University
of Maryland,
die nur ca. eine halbe Autostunde von der NSA entfernt ist.
Ein
schönes Beispiel ist die US 7106971
In der
Beschreibungseinleitung
(Description) wird auf die Zusammenarbeit hingewiesen:
"...Federally sponsored research and development....NSA Contract
No. MDA 904 97 C3570. The U.S. Government has certain rights in this
invention.
Ein weiteres Beispiel wäre die US
8296168 bei der die NSA die Forschung der University
of Maryland finanziert hat und das Patent auf sich übertragen
ließ, siehe
hier. (NSA Contract #H9823005C0425) Zur
Zusammenarbeit zwischen der NSA und der University
of Maryland auch dieser
Artikel des NSA eigenen Magazins The Next Wave. Ein Beispiel für
die Zusammenarbeit mit der Firma IBM
ist die US
7953705 . Und wie die "Patent Assignment
Database" zeigt, war im Jahr 2005 an
zwei NSA Patenten auch die Beratungsfirma Booz Allen Hamilton
beteiligt. Siehe US7930538
und US8069349.
Die Firma war später Arbeitgeber von Herrn Snowden.
Und noch ein Link zu einem Lexikon kryptographischer Begriffe. http://ig.cs.tu-berlin.de/oldstatic/ap/rg/002/glossar/index_html
PATENT NUMBER |
PUBLICATION
NUMBER
– Title |
|
|
NONE |
US20020025034 Cryptographic encryption method using efficient elliptic curve |
NONE |
US20030118948 Method of etching semiconductor material to achieve structure suitable for optics |
NONE |
US20050171747 Method and system for non-linear state based satisfiability |
NONE |
US20060075007 System and method for optimizing a storage system to support full utilization of storage space |
NONE |
US20070133420 Multipath routing optimization for unicast and multicast communication network traffic |
NONE |
US20070162602 Template-based approach for workload generation |
NONE |
US20070220219 System and method for optimizing data in value-based storage system |
NONE |
US20070285163 Method of amplifying a digital signal and device therefor |
NONE |
US20080005778 System and method for privacy protection using identifiability risk assessment |
NONE |
US20080009095 Advanced Thin Flexible Microelectronic Assemblies and Methods for Making Same |
NONE |
US20080016547 System and method for security planning with hard security constraints |
NONE |
US20100028766 THIN FLEXIBLE RECHARGEABLE ELECTROCHEMICAL ENERGY CELL AND METHOD OF FABRICATION |
NONE |
US20100031047 ATTESTATION ARCHITECTURE AND SYSTEM |
NONE |
US20110101789 RF POWER HARVESTING CIRCUIT |
NONE |
US20110302394 SYSTEM AND METHOD FOR PROCESSING REGULAR EXPRESSIONS USING SIMD AND PARALLEL STREAMS |
NONE |
US20120014639 PACKAGED MULTICORE FIBER OPTICAL TRANSCEIVER MODULE |
NONE |
US20120221494 REGULAR EXPRESSION PATTERN MATCHING USING KEYWORD GRAPHS |
NONE |
US20120268338 CONDUCTING POLYMER ANTENNA |
|
|
|
|
Serial arithmetic functions with magnetic bubble logic elements |
|
Method and apparatus for random and sequential accessing in dynamic memories |
|
Time-integrating acousto-optical processors |
|
Variable integrated optical logic element |
|
Electronic lens |
|
DIGITAL BRIDGING APPARATUS FOR TELEPHONE CONFERENCING SYSTEM |
|
Method of position fixing active sources utilizing differential doppler |
|
Automatic frequency alteration circuit |
|
PRECISION LINEAR TUNING CIRCUIT |
|
Method for laser recording utilizing dynamic preheating |
|
METHOD AND APPARATUS FOR SIDE LAUNCH EXCITATION OF SELECTED MODES IN GRADED-INDEX OPTICAL FIBERS |
|
Apparatus for simultaneous generation of key at two locations |
|
MAGNETIC BUBBLE LOGIC APPARATUS |
|
SPACE INTEGRATING AMBIGUITY PROCESSOR |
|
HYBRID SPACE/TIME INTEGRATING OPTICAL AMBIGUITY PROCESSOR |
|
METHOD FOR SERIAL TRANSMISSION AND RECEIPT OF BINARY INFORMATION |
|
Magnetic bubble logic apparatus |
|
FAST PARALLEL SORTING PROCESSOR |
|
OPTICAL ADAPTIVE FILTER |
|
METHOD FOR REDUCING GROUP DELAY DISTORTION |
|
Pneumatic audio sweep generator |
|
Common path acoustoptic adaptive linear predictors |
|
INCOHERENT LIGHT OPTICAL PROCESSOR |
|
High bandwidth triple product processor using a shearing interferometer |
|
Tapered wet etching of contacts using a trilayer silox structure |
|
Microwave and millimeter-wave spectrum analyzer |
|
Planar optical logic |
|
Reconfigurable pipelined processor |
|
LOCALLY NULLED SINE-WAVE TOTAL POWER ALARM FOR INTRUSION DETECTING OPTICAL COMMUNICATIONS SYSTEMS |
|
METHOD AND APPARATUS FOR LINE-MODIFIED ASYMMETRIC CRYSTAL TOPOGRAPHY |
|
Programmable configurable logic memory |
|
|
|
Outer product optical interferometer with mask |
|
Outer product optical interferometer with hologram |
|
APPARATUS FOR PERFORMING A BIT SERIAL ORTHOGONAL TRANSFORMATION INSTRUCTION |
|
Secure, fast storage and retrieval without interactive checking |
|
MULTIPLE INDEPENDENT BINARY BIT STREAM GENERATOR |
|
LIMITED-REUSE TAMPER-EVIDENT CONTAINER |
|
Electro-optic coherent light detector |
|
Constant ratio coding for multipath rejection and ECCM enhancement |
|
PROCESS OF PREVENTING VISUAL ACCESS TO A SEMICONDUCTOR DEVICE BY APPLYING AN OPAQUE CERAMIC COATING TO INTEGRATED CIRCUIT DEVICES |
|
METHOD OF MEASURING MAGNETIC FIELDS ON MAGNETICALLY RECORDED MEDIA USING A SCANNING TUNNELING MICROSCOPE AND MAGNETIC PROBE |
|
DEVICE AND METHOD FOR A NONLINEAR COMB FILTER |
|
SELF-LOCKING, TAMPER-EVIDENT PACKAGE |
|
DEVICE FOR AND METHOD OF PREFORMING AN N-BIT MODULAR MULTIPLICATION IN APPROXIMATELY N/2 STEPS |
|
Authenticator circuit |
|
PHOTOLITHOGRAPHY EXPOSURE TOOL AND METHOD FOR IN SITU PHOTORESIST MEASUREMENTS AND EXPOSURE CONTROL |
|
Method of retrieving documents that concern the same topic |
|
SECURE COMMUNICATION SYSTEM HAVING LONG-TERM KEYING VARIABLE |
|
METHOD OF CREATING A MEBES PATTERN-GENERATION FILE FOR USE IN THE MANUFACTURE OF INTEGRATED-CIRCUIT MASKS |
|
Laser-programmable clocked-logic integrated-circuit |
|
SECURE VOICE CONFERENCING APPARATUS |
|
Device for and method of correcting errors in formatted modem transmissions |
|
METHOD OF METALLIZING A DIAMOND SUBSTRATE WITHOUT USING A REFRACTORY METAL |
|
Device for and method of cryptography that allows third party access |
|
APPARATUS FOR THE LINEAR ACCELERATION OF ELECTRONS, PARTICULARLY FOR INTRAOPERATIVE RADIATION THERAPY |
|
METHOD OF MAKING A THIN CONFORMAL HIGH-YIELDING MULTI-CHIP MODULE |
|
TAMPER DETECTION DEVICE |
|
LANGUAGE-INDEPENDENT METHOD OF GENERATING INDEX TERMS |
|
ELECTRICAL CONNECTOR THAT MINIMIZES BENT PINS |
|
COMMUNICATION INTERCEPT DEVICE USING DIGITAL DROP RECEIVERS IN MULTIPLE TIERS |
|
Optical fiber coupler type wavelength measuring apparatus |
|
Method of searching an on-line dictionary using syllables and syllable count |
|
Method of efficiency and flexibility storing, retrieving, and modifying data in any language representation |
|
Wide field of view coherent light detector and locator |
|
Polarization interferometer apparatus using the polarization dependent phase lag in a birefringent retarder |
|
DEVICE FOR MODULATING AN OPTICAL SIGNAL USING A SINGLE WAVE GUIDE |
|
METHOD OF PUBLIC KEY CRYPTOGRAPHY THAT INCLUDES KEY ESCROW |
|
AUTOMATICALLY GENERATING A TOPIC DESCRIPTION FOR TEXT AND SEARCHING AND SORTING TEXT BY TOPIC USING THE SAME |
|
METHOD OF VERIFICATION USING A SUBSET OF CLAIMANT'S FINGERPRINT |
|
METHOD OF IDENTIFYING DATA TYPE AND LOCATING IN A FILE |
|
SYSTEM AND METHOD FOR NOISE THRESHOLD ADAPTATION FOR VOICE ACTIVITY DETECTION IN NONSTATIONARY NOISE ENVIRONMENTS |
|
MULTIPLE LEVEL MINIMUM LOGIC NETWORK |
|
|
|
METHOD OF IDENTIFYING THE SCRIPT OF A DOCUMENT IRRESPECTIVE OF ORIENTATION |
|
METHOD OF THINNING INTEGRATED CIRCUITS RECEIVED IN DIE FORM |
|
METHOD OF THINNING SEMICONDUCTOR WAFER OF SMALLER DIAMETER THAN THINNING EQUIPMENT WAS DESIGNED FOR |
|
PHOTOREFRACTIVE READ-ONLY OPTICAL MEMORY APPARATUS USING PHASE, FREQUENCY, AND ANGULAR MODULATION |
|
CONTROLLED SOLDER INTERDIFFUSION FOR HIGH POWER SEMICONDUCTOR LASER DIODE DIE BONDING |
|
METHOD OF DISPLAYING 3D NETWORKS IN 2D WITHOUT FALSE CROSSINGS |
|
MODULATION INSTABILITY WAVELENGTH CONVERTER |
|
METHOD OF FILE EDITING USING FRAMEMAKER ENHANCED BY APPLICATION PROGRAMMING INTERFACE CLIENTS |
|
UNIPOLAR THREE-TERMINAL RESONANT-TUNNELING TRANSISTOR |
|
MEASUREMENT OF RAMAN GAIN SPECTRUM IN OPTICAL FIBER |
|
ALL-FIBER OPTICALLY-CONTROLLED OPTICAL SWITCH |
|
METHOD FOR EFFICIENT STORAGE AND TRANSMISSION OF THE CENTROIDS OF A LEECH LATTICE QUANTIZER |
|
METHOD OF LATTICE QUANTIZATION THAT MINIMIZES STORAGE REQUIREMENTS AND COMPUTATIONAL COMPLEXITY |
|
Cryptographic system |
|
PROGRAMMABLE ANTENNA |
|
METHOD OF ENCODING DATA TO MINIMIZE THE NUMBER OF CODEWORDS |
|
Cryptographs |
|
FIREWALL SECURITY APPARATUS FOR HIGH-SPEED CIRCUIT SWITCHED NETWORKS |
|
Device for and method of switching and monitoring batteries |
|
Tunable optic fiber bandpass filter using flexural acoustic waves |
|
Control circuits for electric coding machines |
|
Method of recovering a gate-level netlist from a transistor-level |
|
METHOD OF ELLIPTIC CURVE CRYPTOGRAPHIC KEY EXCHANGE USING REDUCED TAU-ADIC EXPANSION IN NON-ADJACENT FORM |
|
METHOD OF ELLIPTIC CURVE CRYPTOGRAPHIC DIGITAL SIGNATURE GENERATION AND VERIFICATION USING REDUCED BASE TAU EXPANSION IN NON-ADJACENT FORM |
|
Device for converting multiple signal types to NRZ format with automatic self-test |
|
MULTIPLE LEVEL MINIMUM LOGIC NETWORK |
|
Device for and method of detecting motion in an image |
|
RESONANTLY COUPLED WAVEGUIDES USING A TAPER |
|
Method for finding large numbers of keywords in continuous text streams |
|
Device for dispersion compensation using tapered single-mode optical fiber |
|
TRANSMISSION SYSTEM USING A SEMICONDUCTOR LASER AND A FIBER GRATING DISCRIMINATOR |
|
Method of displaying real and imaginary components of a waveform |
|
METHOD OF TRANSMITTING SPEECH USING DISCONTINUOUS TRANSMISSION AND COMFORT NOISE |
|
Filter system for information network traffic |
|
METHOD OF FEATURE EXTRACTION USING COMBINATION OF WAVELET AND FOURIER TRANSFORMATION |
|
Method of fabricating a non-SOI device on an SOI starting wafer and thinning the same |
|
Method for storage and reconstruction of the extended hamming code for an 8-dimensional lattice quantizer |
|
Ridge laser with oxidized strain-compensated superlattice of group III-V semiconductor |
|
Method of multi-dimensionally accentuating a deviation in information and identifying its cause |
Vertical cavity surface emitting laser with oxidized strain-compensated superlattice of group III-V semiconductor |
|
20020162081 METHOD AND SYSTEM FOR DISPLAYING VLSI LAYOUT DATA |
|
Timer circuit utilizing thermal effect |
|
20020173937 METHOD OF AUTHENTICATING A BEACON |
|
20030016220 METHOD FOR CONSTRUCTING GRAPH ABSTRACTIONS |
|
Method of extracting text present in a color image |
|
Method of oxidizing strain-compensated superlattice of group III-V semiconductor |
|
Cubic antenna |
|
Method of determining semiconductor laser facet reflectivity after facet reflectance modification |
|
ACOUSTO-OPTIC BANDPASS FILTER |
|
Voice activity detector |
|
Method of identifying boundary of markerless codeword |
|
US20030004665 Method of estimating signal frequency |
|
US20030086634 Chirped fiber acousto-optic bandpass filter |
|
Method of identifying all minimum-cost cutsets in a network |
|
US20020127758 Method of efficient controllable and repeatable wet oxidation in a phosphorous-rich III-V material system |
|
FIREWALL FOR PROCESSING CONNECTION-ORIENTED AND CONNECTIONLESS DATAGRAMS OVER A CONNECTION-ORIENTED NETWORK |
|
METHOD OF TESTING AND SIMULATING COMMUNICATION EQUIPMENT OVER MULTIPLE TRANSMISSION CHANNELS |
|
Tension-tuned acousto-optic bandpass filter |
|
METHOD OF PRINTING PORTION OF DOCUMENT WITH ACCOUNTABILITY AND ERROR DETECTION |
|
TAMPER-EVIDENT LABEL WITH MULTIPLE PRESSURE-SENSITIVE ADHESIVES OF DIFFERENT SENSITIVITY |
|
US20020158901 METHOD OF EFFICIENTLY INCREASING READABILITY OF FRAMEMAKER GRAPHICAL USER INTERFACE |
|
PLASMA PROCESSING APPARATUS |
|
US20030128048 LINE REFLECTION REDUCTION WITH ENERGY-RECOVERY DRIVER |
|
Optical clock recovery device using non-linear optical waveguides |
|
Method of extracting text from graphical images |
|
Cryptographic method using modified fractional fourier transform kernel |
|
Method of passing a cryptographic key that allows third party access to the key |
|
METHOD FOR MEASURING GAIN OF PHOTONIC INVERTERS |
|
Sample-stage for scanning electron microscope |
|
METHOD OF TESTING A RANDOMIZER |
|
SHREDDER RESIDUE DISPERSION SYSTEM |
|
20020122554 DEVICE FOR AND METHOD OF ONE-WAY CRYPTOGRAPHIC HASHING |
|
US20030035453 METHOD OF COATING OPTICAL DEVICE FACETS WITH DIELECTRIC LAYER AND DEVICE MADE THEREFROM |
|
US20040074176 MODULAR PLATFORM ASSEMBLY |
|
US20040022513 METHOD FOR FABRICATION OF VERTICALLY COUPLED INTEGRATED OPTICAL STRUCTURES |
|
CRYPTOGRAPHIC IDENTIFICATION AND DIGITAL SIGNATURE METHOD USING EFFICIENT ELLIPTIC CURVE |
|
Method of summarizing text using just the text |
|
SELF-AUTHENTICATING CRYPTOGRAPHIC APPARATUS |
|
Method and system for non-linear state based satisfiability |
|
20020169987 DEVICE FOR AND METHOD OF SECURE COMPUTING USING VIRTUAL MACHINES |
|
METHOD OF IMAGE BINARIZATION USING HISTOGRAM MODELING |
|
US20040183566 LINE REFLECTION REDUCTION WITH ENERGY-RECOVERY DRIVER |
|
US20020087666 METHOD FOR GEOLOCATING LOGICAL NETWORK ADDRESSES |
|
Method of acknowledging receipt of data packets |
|
US20050087785 MAGNETIC RANDOM ACCESS MEMORY CELL |
|
20050153477 FABRICATING A SEMICONDUCTOR DEVICE USING FULLY CURED BISBENZOCYCLOBUTENE |
|
US20020174149 Method of summarizing text by sentence extraction |
|
20020021810 CRYPTOGRAPHIC KEY EXCHANGE METHOD USING EFFICIENT ELLIPTIC CURVE |
|
|
|
US20050180039 Method for intersymbol interference removal in data recovery |
|
Sample-stand for scanning electron microscope |
|
US20040095134 SYSTEM AND METHOD FOR HIGH-SPEED MASSIVE MAGNETIC IMAGING ON A SPIN-STAND |
Method of geometric linear discriminant analysis pattern recognition |
Mode transition-discrimination photonic logic device |
|
Method of surface preparation and imaging for integrated circuits |
|
Method of identifying script of line of text |
|
Method of elliptic curve digital signature using expansion in joint sparse form |
|
Method of elliptic curve digital signature using coefficient splitting |
|
Method of elliptic curve cryptographic key agreement using coefficient splitting |
|
MULTIPLE LEVEL MINIMUM LOGIC NETWORK |
|
Method of distinguishing handwritten and machine-printed images |
|
Firewall for processing a connectionless network packet |
|
Device for and method of cryptographically wrapping information |
|
US20050206376 High frequency scanning SQUID microscope and method of measuring high frequency magnetic fields |
|
SYSTEM AND METHOD FOR OPTICAL WIRELESS COMMUNICATION |
|
Device for and method of detecting voice activity |
|
Photonic integrated circuit and method of fabricating same |
|
Majority logic circuit |
|
US20060109026 LINE REFLECTION REDUCTION WITH ENERGY-RECOVERY DRIVER |
|
Method of surface preparation and imaging for integrated circuits |
|
Reusable tamper evident security device |
|
Method of synchronization without broadcasting synchronization signal |
|
US20050036608 Automated permutation method and apparatus |
|
Method for bumping a thin wafer |
|
Device for and method of viewing magnetic pattern recorded on magnetic media |
|
LENSED FIBER STUB ASSEMBLIES OPTICAL AND OPTOELECTRONIC PACKAGES INCLUDING THEM |
|
US20040242228 METHOD FOR FAST ROAMING IN A WIRELESS NETWORK |
|
Method of generating multiple random numbers |
|
Method of monitoring and formatting computer network data |
|
Method of biometric authentication |
|
US20060274562 PLANAR ARRAY CONTACT MEMORY CARDS |
Device for impedance matching radio frequency open wire transmission lines |
|
US20050254215 Use of thermally conductive vias to extract heat from microelectronic chips and method of manufacturing |
|
Range limited antenna |
|
Method of fabricating and integrating high quality decoupling capacitors |
|
Method of reliably electroless-plating integrated circuit die |
|
Single frequency repeater |
|
Reusable tamper evident envelope |
|
Method of precisely aligning components in flexible integrated circuit module |
|
PRINTED CIRCUIT BOARD VIA WITH RADIO FREQUENCY ABSORBER |
|
Device for and method of generating pseudo-random sequence uniformly distributed over any range |
|
US20050171747 Method and system for non-linear state based satisfiability |
|
WIDEBAND RETROREFLECTOR |
|
US20050240794 METHOD FOR DOMAIN SPECIFIC TEST DESIGN AUTOMATION |
|
US20070285163 Method of amplifying a digital signal and device therefor |
|
Method of recognizing phones in speech of any language |
|
Method of packet encryption that allows for pipelining |
|
METHOD OF TEXT PROCESSING |
|
US20070040113 ION TRAP IN A SEMICONDUCTOR CHIP |
|
Method of combining corpora to achieve consistency in phonetic labeling |
|
Method of fabricating a patterned device using sacrificial spacer layer |
|
Method of estimating a high frequency carrier signal |
|
Method of fabricating a flexible organic integrated circuit |
|
Method of optical character recognition using feature recognition and baseline estimation |
|
Method of modeling single data class from multi-class data |
|
Method of generating time-frequency signal representation preserving phase information |
Method of detecting intermediary communication device |
|
US20070260428 SYSTEM AND METHOD FOR BENCHMARKING CORRELATED STREAM PROCESSING SYSTEMS |
|
Method of removing noise and interference from signal using peak picking |
|
US20080046657 METHOD TO EFFICIENTLY PREFETCH AND BATCH COMPILER-ASSISTED SOFTWARE CACHE ACCESSES |
|
US20070126472 Line reflection reduction with energy-recovery driver |
|
US20030235300 Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same |
|
Statistical inference of static analysis rules |
|
US20060253709 System and method for fuzzy multi-level security |
|
METHOD OF FABRICATING A PATTERNED DEVICE USING SACRIFICIAL SPACER LAYER |
|
METHOD OF IDENTIFYING AND HIGHLIGHTING TEXT |
|
Method of signal processing |
|
US20080222075 Autonomic retention classes |
|
US20080222218 Risk-modulated proactive data migration for maximizing utility in storage systems |
|
Method of identifying duplicate voice recording |
|
Method of protecting a computer stack |
|
Method of monitoring multiple computer system calls using one routine and non-executable configuration file |
|
Method of fabricating a patterned device using sacrificial spacer layer |
|
Method of fabricating waveguide using sacrificial spacer layer |
|
Secure manhole accessway |
|
Method of fabricating turning mirror using sacrificial spacer layer and device made therefrom |
|
Method of identifying digital audio signal format |
|
US20030095304 ALL-OPTICAL TIMING JITTER MEASUREMENT SYSTEM AND METHOD |
|
Range limited antenna |
|
Method of comparing voice signals that reduces false alarms |
|
Method for generating and distributing strong DES keys |
|
Method of removing noise and interference from signal |
Method of code generation that minimizes error propagation |
|
Method of fabricating optical device using multiple sacrificial spacer layers |
|
Method of decoding signals having binary BCH codes |
|
Method of fabricating optical device using multiple sacrificial spacer layers |
|
Method of fabricating optical device using multiple sacrificial spacer layers |
|
Method of estimating digital signal frequency |
|
Method of sorting text and string searching |
|
Method of encoding signals with binary codes |
|
Method of establishing and updating master node in computer network |
|
Method of fabricating turning mirror using sacrificial spacer layer and device made therefrom |
|
Method of reliably communicating via computer network |
|
Risk-modulated proactive data migration for maximizing utility in storage systems |
|
Method of signal processing for determining range and velocity of an object |
|
Natural language database searching using morphological query term expansion |
|
US20070111537 METHOD AND SYSTEM FOR CONTROLLABLE DEPOSITION OF NANOPARTICLES ON A SUBSTRATE |
|
Method of converting computer program with loops to one without loops |
|
Method of database searching |
|
Method of identifying topic of text using nouns |
|
Method of measuring degree of enhancement to voice signal |
|
Device for and method of authenticated cryptography |
|
US20070162976 METHOD OF MANAGING AND MITIGATING SECURITY RISKS THROUGH PLANNING |
|
Method of fabricating a patterned device using sacrificial spacer layer |
|
Method of fabricating turning mirror using sacrificial spacer layer and device made therefrom |
|
Method of fabricating turning mirror using sacrificial spacer layer and device made therefrom |
|
Method of identifying invalid digital signatures involving batch verification |
|
Device for and method of geolocation |
Method of assessing security of an information access system |
|
US20080015808 METHODS AND SYSTEM FOR PROGRAM EXECUTION INTEGRITY MEASUREMENT |
|
Method of secure file transfer |
|
US20090022456 OPTICAL FIBER PROBE TIPS AND METHODS FOR FABRICATING SAME |
|
Method of providing a computer user with high-level privileges |
|
Autonomic retention classes |
|
US20060072400 OPTIMIZING A STORAGE SYSTEM TO SUPPORT SHORT DATA LIFETIMES |
|
|
|
METHOD OF IDENTIFYING CONNECTED DATA IN RELATIONAL DATABASE |
|
US20090267238 BRIDGES FOR INTERCONNECTING INTERPOSERS IN MULTI-CHIP INTEGRATED CIRCUITS |
|
US20080034439 ACCESS CONTROL METHOD AND A SYSTEM FOR PRIVACY PROTECTION |
|
TAMPER EVIDENT CARGO SEAL |
|
METHOD OF LOCATING A TRANSMITTER |
|
METHOD OF SECURE FILE TRANSFER |
|
DEVICE FOR AND METHOD OF WIRELESS INTRUSION DETECTION |
|
US20100242120 MITIGATING AND MANAGING PRIVACY RISKS USING PLANNING |
|
US20060172279 CELL-BASED SENSING: BIOLOGICAL TRANSDUCTION OF CHEMICAL STIMULI TO ELECTRICAL SIGNALS (NOSE-ON-A-CHIP) |
|
US20080065863 METHOD AND APPARATUS FOR DATA STREAM ALIGNMENT SUPPORT |
|
REUSABLE TAMPER INDICATING TRANSPORT TUBE |
|
METHOD OF ASSESSING LANGUAGE TRANSLATION AND INTEPRETATION |
|
Reusable tamper indicating bag closure |
|
DEVICE FOR DETERMINING A COHERENCE MEASUREMENT FOR A DIGITAL SIGNAL THAT DOES NOT REQUIRE SPECTRAL ESTIMATION |
|
Device for and method of making element appear in shortest network path by minimal decrements and increments |
|
US20080195404 COMPLIANT-BASED SERVICE LEVEL OBJECTIVES |
|
Coherent demodulation of ais-GMSK signals in co-channel |
|
US20110309888 TECHNIQUE FOR LINEARIZING THE VOLTAGE-TO-FREQUENCY RESPONSE OF A VCO |
|
US20100023311 SYSTEM AND METHOD FOR ANALYSIS OF AN OPINION EXPRESSED IN DOCUMENTS WITH REGARD TO A PARTICULAR TOPIC |
|
US20110042795 THREE-DIMENSIONAL SILICON INTERPOSER FOR LOW VOLTAGE LOW POWER SYSTEMS |
|
Method of collision-free hashing for near-match inputs |
|
DEVICE FOR AND METHOD OF COLLISION-FREE HASHING FOR NEAR-MATCH INPUTS |
|
8380485 |
|
8396912 |
|
8397146 |
Device for and method of identifying minimum candidate codewords for list decoder |
US20080028467 DETECTION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IN AUTONOMOUS SYSTEM DOMAINS |
|
US20120001166 FABRICATING A SEMICONDUCTOR CHIP WITH BACKSIDE OPTICAL VIAS |
|
US20080098479 METHODS OF SIMULATING VULNERABILITY |
|
8414314 |
|
8442825 |
|
8443105 |
|
8449309 |
|
Device for and method of detecting SIM card removal and reinsertion |
|
8488921 |
US20120014639 PACKAGED MULTICORE FIBER OPTICAL TRANSCEIVER MODULE |
8539307 |
|
Method of image-based user authentication |
|
US20080195369 DIAGNOSTIC SYSTEM AND METHOD |
|
8661037 |
US20110252033 SYSTEM AND METHOD FOR MULTITHREADED TEXT INDEXING FOR NEXT GENERATION MULTI-CORE ARCHITECTURES |
8665997 |
AIS demodulator for unknown carrier phase and baud alignment |
8799339 |
Device for and method of measuring similarity between sets |
8826158 |
|
US20050117524 Method for performing handoff in wireless network |
|
8886952 |
|
8898784 |
Device
for and method of computer intrusion anticipation, detection, and
remediation
|
|
|
DESIGN PATENT |
|
D637658 |
|
D655335 |
D681766 |
Seite im Internet seit
12.02.2013
letzte Änderung: 26.12.2014