29 May 1999


National Security Agency-owned patents accessed at the US Patent Office online 28 May 1999. Obtained by search for "National Security Agency," though oddly none of the patents disclose the full name. This does not include all the NSA-sponsored patents, such those not owned/attributable to the agency or those classified and prohibited to public access. Full PTO text of patents mirrored here. See IBM's patent server for text and related images.


http://jya.com/nsa5832478.htm
United States Patent 5,832,478
George November 3, 1998


Method of searching an on-line dictionary using syllables and syllable count

Abstract

The present invention is a method of searching an on-line dictionary in any language representation using syllables and syllable count and an on-line dictionary, where the on-line dictionary includes a primary headword field, a segmented primary headword field, additional unsegmented language representation (headword) fields as required, additional segmented representation (headword) fields as required, a syllable count field, additional syllable count fields as required, and a definition field. The user selects a language representation for a query and makes the query in the selected language representation. The present invention then parses the query to determine if segmented syllables were used in the query and how many, if any. If no segmented syllables were used in the query, a character string search for the headword that matches the query is conducted. If the query contains segmented syllables, a syllable search for headwords that contain the same syllables in the same locations is conducted. The present invention returns one or more headwords in the language of the query and their corresponding definitions in the language of the user. Various wildcard symbols may be used for unknown syllables and for characters within a syllable, which may include tones.


http://jya.com/nsa5812609.htm
United States Patent 5,812,609
McLochlin September 22, 1998


Communication intercept device using digital drop receivers in multiple tiers

Abstract

A communications intercept device that includes an analog-to-digital converter for digitizing an analog wideband input signal, a first memory for storing the digitized wideband signal, a first digital drop receiver in a first tier for selecting signals stored in the first memory, a controller for controlling which signals are selected, a second memory for storing the signals selected by the first digital drop receiver, and a second digital drop receiver in a second tier for selecting signals stored in the second memory under control of the controller.


http://jya.com/nsa5631961.htm
United States Patent 5,631,961
Mills ,   et al. May 20, 1997


Device for and method of cryptography that allows third party access

Abstract

A device for and method of transmitting an encrypted message and an access field from a sender to a receiver, where a third party may intercept and process the transmission. The sender and receiver agree on a session key. The sender raises an element of a Galois Field to the session key; forms a temporary device unique key; encrypts the session key with the temporary device unique key; forms a temporary family key; encrypts an identifier of the sender and the encrypted session key using the temporary family key; encrypts a plaintext message using the session key; forms the access field by concatenating the element of a Galois Field raised to the session key to the encrypted version of the sender's identifier and the sender's encrypted session key; concatenates the ciphertext to the access field; and transmits the access field and the ciphertext to the receiver. The receiver may recover the plaintext from the sender's transmission. The third party may partially process the transmission to find the identity of the sender. The third party may then request an escrowed key that would allow the third party to recover the plaintext of the sender's message.


http://jya.com/nsa4897878.htm
United States Patent 4,897,878
Boll ,   et al. January 30, 1990


Noise compensation in speech recognition apparatus

Abstract

A method and apparatus for noise suppression for speech recognition systems which employs the principle of a least means square estimation which is implemented with conditional expected values. Essentially, according to this method, one computes a series of optimal estimators which estimators and their variances are then employed to implement a noise immune metric. This noise immune metric enables the system to substitute a noisy distance with an expected value which value is calculated according to combined speech and noise data which occurs in the bandpass filter domain. Thus the system can be used with any set of speech parameters and is relatively independent of a specific speech recognition apparatus structure.


http://jya.com/nsa4731840.htm
United States Patent 4,731,840
Mniszewski ,   et al. March 15, 1988


Method for encryption and transmission of digital keying data

Abstract

A method for the encryption, transmission, and subsequent decryption of digital keying data. The method utilizes the Data Encryption Standard and is implemented by means of a pair of apparatus, each of which is selectable to operate as either a master unit or remote unit. Each unit contains a set of key encryption keys which are indexed by a common indexing system. The master unit operates upon command from the remote unit to generate a data encryption key and encrypt the data encryption key using a preselected key encryption key. The encrypted data encryption key and an index designator are then downloaded to the remote unit, where the data encryption key is decrypted for subsequent use in the encryption and transmission data. Downloading of the encrypted data encryption key enables frequent change of keys without requiring manual entry or storage of keys at the remote unit.


http://jya.com/nsa4567572.htm
United States Patent 4,567,572
Morris ,   et al. January 28, 1986


Fast parallel sorting processor

Abstract

An information processor is described which is especially suitable for efficiently sorting large quantities of binary data. Data in a plurality of storage devices is fed to a plurality of compare-exchange modules and is then selectively passed back to the storage devices by means of multi-input switches. A programmable microprocessor controls passage of data through the various components in an iterative process.


http://jya.com/nsa4429180.htm
United States Patent 4,429,180
Unkenholz January 31, 1984


Apparatus for simultaneous generation of key at two locations

Abstract

An apparatus for simultaneously generating identical cipher key at two remote terminals in a manner which prohibits interception of the key by unauthorized persons. A circuit comprising three separate wire lines is connected between the two terminals over geographically separated routes. The circuit is randomly completed and broken by a switch at each terminal, the switch position being determined at each terminal by an independent key generator. Cipher key is communicated by comparing the key generator output and the circuit condition.


http://jya.com/nsa5812609.htm
United States Patent 4,161,032
Williams July 10, 1979


Serial arithmetic functions with magnetic bubble logic elements

Abstract

Compact arrangements of two-input magnetic bubble logic gates providing bubble devices for performing serial integer arithmetic on binary integers are disclosed. Using only a small number of different types of logic gates, designs are given for devices for performing serial addition, subtraction, multiplication and division arithmetic operations on binary integers, represented as sequences of magnetic bubbles. All logical interactions use bubble repulsion to prevent bubbles from transferring to adjacent propagation paths via preferred transitions. By using only two-input gates and a pipeline computational structure, hardware design is simplified and advantage is taken of the inherent serial nature of bubble technology. The simple gate interconnection geometry has a minimum of feedback paths and results in devices which are not burdened with excessive numbers of bubble generators, annihilators or crossovers.