-
公开(公告)号:US12088569B1
公开(公告)日:2024-09-10
申请号:US18100312
申请日:2023-01-23
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Joshua E. Cline , Dan A. DeVries , William J. Layton , Zachary Smith , Brendan S. Surrusco , Andrew H. White , David F. Wiecek , Mitchell E. Buchman
CPC classification number: H04L63/0471 , G06F21/602 , H04L45/74 , H04L63/0272 , H04W28/06
Abstract: The present invention provides an encrypting device including an encryption unit and a communications unit. Paired encrypting devices allow for communication of trusted data between trusted devices over an untrusted network. Data received by the encryption unit is encrypted and provided with a connectionless header for delivery to the communications unit. Data received by the communications units is provided with a complex header for delivery to the paired encrypting device. The encrypting devices may be implemented in hardware or may be virtualized on a server or a plurality of severs. Arrangement of the encrypting devices in a hub-and-spoke topology allows for communication amongst a plurality of trusted devices. The encrypting devices can be used to covert commercially available equipment suitable for high assurance environments.
-
公开(公告)号:US11988022B1
公开(公告)日:2024-05-21
申请号:US17476593
申请日:2021-09-16
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Andrew R. McGregor , Gary S. Mosholder
CPC classification number: E05B65/006 , E05B73/0082
Abstract: The housing lock includes a barrel, a screw and a bumper. The screw and bumper are threadedly engaged with one another and slidably engaged with the barrel. A barrel passageway includes a screw stop limiting sliding of the screw and bumper assembly in the distal direction and a bumper stop limiting sliding of the screw and bumper assembly in the proximal direction. The barrel includes feet. The perimeter defined by the feet is selected to closely fit within a housing passage in order to limit rotational movement of the housing lock within the housing passageway. The length of the feet is selected to prevent manipulation of the lockout of the housing passageway once the lock is secured to the housing. The barrel provides an exterior housing stop limiting movement of the housing lock relative to the housing in a distal direction. The bumper provides an interior housing stop limiting movement of the housing lock relative to the housing in a proximal direction. When secured to housing, the housing lock prevents removal of the housing cover from the housing chassis.
-
公开(公告)号:US11934948B1
公开(公告)日:2024-03-19
申请号:US16930046
申请日:2020-07-15
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Kimberly J Ferguson-Walter , Sunny James Fugate
CPC classification number: G06N3/08 , G06N3/04 , H04L63/1491
Abstract: An adaptive deception system is provided for defending a production network against cyber-attacks utilizing deception devices on the production network. The adaptive deception system includes a deception management system. The deception management system includes monitors for making observations regarding the deception devices including observations of an attacker's interaction with the deception device. The adaptive deception system further incudes a control system having sensors that receive the observations of the deception management system. The control system is configured to provide an adaption specification in response to the observations made. Actuators of the control system are activated in order to provide the adaption specification to the deception management system where monitors of the deception management system implement the specified adaption. Implementation of the adaption adapts the properties of the deception devices to interfere with the cyber-attacker.
-
公开(公告)号:US11640524B1
公开(公告)日:2023-05-02
申请号:US17459079
申请日:2021-08-27
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: David J Mountain
Abstract: A computer processor includes an on-chip network and a plurality of tiles. Each tile includes an input circuit to receive a voltage signal from the network, and a crossbar array, including at least one neuron. The neuron includes first and second bit lines, a programmable resistor connecting the voltage signal to the first bit line, and a comparator to receive inputs from the two bit lines and to output a voltage, when a bypass condition is not active. Each tile includes a programming circuit to set a resistance value of the resistor, a pass-through circuit to provide the voltage signal to an input circuit of a first additional tile, when a pass-through condition is active, a bypass circuit to provide values of the bit lines to a second additional tile, when the bypass condition is active; and at least one output circuit to provide an output signal to the network.
-
公开(公告)号:US11467342B1
公开(公告)日:2022-10-11
申请号:US17326524
申请日:2021-05-21
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Ramesh Bhandari
IPC: G02B6/14 , H04B10/25 , H04B10/516 , G02B6/44
Abstract: The present invention provides a method for converting the topological charge of an orbital angular momentum mode of light to an opposite topological charge by applying the light to a spool of optical fiber having a bend radius R and length L. The length of the fiber used to form the spool is defined by ½ the bend-induced 2π walk-off length Ll,mb(2π). The length of the fiber L and the bend radius R of the spool may be adjusted to account for an ellipticity-induced 2π walk-off length Ll,m3(2π). Using the proportionality rules, Ll,mb(2π)∝R2l and Ll,m3(2π)∝ε−l adjustments to account for ellipticity induced 2π walk-off length Ll,me(2π), or to account for a change in the bend radius ΔR of the spool can be easily determined.
-
6.
公开(公告)号:US10579457B1
公开(公告)日:2020-03-03
申请号:US15802927
申请日:2017-11-03
Applicant: The Government of the United States as Represented by the Director, National Security Agency
Inventor: Andrew H White
Abstract: A processor and methods are provided for detecting fault in a control flow. The processor includes an instruction set architecture defining a pair of FLOWSET and FLOWCHECK opcodes and FLOWSET and FLOWCHECK operations. This pair of opcodes and associated operation works together with a CFI shadow stack to detect faults in an intended flow of instructions. Upon detection of a fault, a fault notice is provided. The methods of detecting fault in a control flow may be implemented using hardware or software and a shadow stack.
-
公开(公告)号:US12199958B1
公开(公告)日:2025-01-14
申请号:US17894855
申请日:2022-08-24
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: William J. Layton , Andrew H. White
IPC: H04L9/40
Abstract: A high assurance system provides for communication between trusted user devices with auxiliary adaptation for augmenting communication security across an untrusted environment. First and second main encrypting devices coupled to respective trusted user devices are cryptologically tethered to one another by a main communication link established across the untrusted environment between trusted user devices in cryptologically protected manner. An auxiliary encrypting device is cryptologically tethered to the first main encrypting device by an auxiliary communication link established across the untrusted environment between a trusted auxiliary device and one trusted user device in cryptologically protected manner. The main and auxiliary encrypting devices define portals traverse trust boundaries between trusted and untrusted environments, each including at least one encryption unit and a communication unit coupled thereto by a connectionless interconnect. The encryption unit encrypts and decrypts message data, while the communication unit transmits and receives encrypted message data through the communication links.
-
公开(公告)号:US11997186B1
公开(公告)日:2024-05-28
申请号:US16950161
申请日:2020-11-17
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Sean A. Weaver
IPC: H04L9/06
CPC classification number: H04L9/0643
Abstract: A computer-implemented method of constructing a minimal perfect hash function includes selecting a set H of k hash functions over a set Y of n keys and building a bipartite graph from keys to hash values using the set Y of keys and the set H of hash functions. Each edge of the bipartite graph has a weight equal to an index of a hash function associated with that edge. The method also includes determining a minimal weight perfect matching of the bipartite graph and generating an XORSAT filter using the minimal weight perfect matching of the bipartite graph, such that a minimal perfect hash function can be performed on an element by querying the XORSAT filter for a result associated with the element.
-
公开(公告)号:US12197473B1
公开(公告)日:2025-01-14
申请号:US17519000
申请日:2021-11-04
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Brian M. Baughman , Rodrigo P. Gomez , Ryan L. Kaliszewski , Shawn L. Robertson
IPC: G06F16/28 , G06F16/9536 , G06N20/00
Abstract: A method is disclosed for identifying related social media accounts of a social media platform, based on social media clients used to interact with the platform. The method includes obtaining a first dataset of information including, for each interaction between the accounts and the platform, the client used. The method also includes using the first dataset to generate a pruned dataset including accounts, clients, and numbers of interactions by using an unsupervised machine learning algorithm to identify and exclude outlier accounts and outlier clients. The method also includes normalizing the pruned dataset across accounts. The method also includes identifying a connected sub-component of the pruned dataset. The method also includes performing topic modeling of the sub-component to generate a matrix W associating the accounts of the sub-component with topics. The method also includes determining, using the matrix W, that a first account A is associated with a second account B.
-
公开(公告)号:US12166259B1
公开(公告)日:2024-12-10
申请号:US18367203
申请日:2023-09-12
Applicant: The Government of the United States as represented by the Director, National Security Agency
Inventor: Kevin D. Osborn , Waltraut Wustmann
IPC: H03K19/195 , G11C19/32 , H01P3/02
Abstract: A reversible superconducting circuit includes two Josephson transmission lines. Inductors connect Josephson Junctions in the array. Each transmission line passes a fluxon along the Junctions. The circuit includes an interface with first and second shunt capacitors coupled to the first and second transmission lines, and a third shunt capacitor, forming a connecting circuit with the first and second shunt capacitors. The shunt capacitors include Josephson junctions in parallel. The connecting circuit receives an input fluxon and transmits an output fluxon. The circuit also includes a Josephson Junction and inductor in parallel with the third shunt capacitor, forming a storage circuit. The storage circuit stores a SFQ. The output fluxon has polarity based on the SFQ stored when the first fluxon is received. The input fluxon causes the polarity of the stored SFQ to be the same as the polarity of the input fluxon, immediately after the input fluxon is received.
-
-
-
-
-
-
-
-
-