Selected Patents

Lincoln Laboratory Technology Available for License

Periodically, a selected but not comprehensive list of Lincoln Laboratory–developed inventions available for license is published. The current featured set is below. Be sure to check back for future updates of this list. An archive of past featured inventions, in such areas as semiconductor laser technology, semiconductor lithography, and DNA Array Technology can be found at patents archive.

Below are several representative Lincoln Laboratory cases in the areas of semiconductor laser sources, advanced semiconductor photolithography, computer network security, and computer programming methodologies. For further information, contact Jack Turner of the MIT Technology Licensing Office, http://web.mit.edu/tlo/www/, at 617-253-6966 or mailto:jht@mit.edu.

 

Laser Sources

Recent research at Lincoln Laboratory has resulted in significant breakthroughs in the designs of lasers that can be used in industrial applications requiring high power and good optical beam quality. The below case is representative of IP in this area.

M.I.T. Case No. 11321L

"Wavelength Beam Combining Implementations," by Bien Chann, Tso Yee Fan, and Antonio Sanchez-Rubio

U.S. Patent Pending; Serial No. 60/674416

Description:  This invention relates to reducing the number of optical components necessary in implementations of wavelength beam combining of laser arrays, leading to potential decreases in size and cost.  The implementation involves the use of a micro-lens array that has a slightly different element pitch from the laser.  An alternative implementation may use unequal pitches.  Such an implementation could arise from the need to accommodate manufacturing variations in the pitches of the laser and lens arrays.  The grating is placed at a location (other than a focal distance of the lens) where the individual beams substantially overlap.  A mirror is used to provide optical feedback in order to control the wavelengths of the individual laser elements.  In a third implementation, the wavelengths of the individual laser elements are controlled to be different by an external reflective optic that provides narrowband feedback at a different wavelength for each element.

 

Semiconductor Optical Lithography

Many advancements in the field of optical lithography are the result of research conducted by various groups at Lincoln Laboratory.  Below is an example of recent IP in this field.

M.I.T. Case No. 12191L

"Immersion Fluids for Lithography," by Theodore H. Fedynyshyn and Indira S. Pottebaum

U.S. Patent Pending; Serial No. 60/809060, filed May 26, 2006

Description:  Optical lithography at UV wavelengths is the standard process for patterning state-of-the art devices in the semiconductor industry.  Several years ago a new technology was proposed and quickly adopted, that of liquid immersion lithography (LIL).  In LIL a fluid is introduced between the last optical element and the photoresist and, as a result, the numerical aperture of the projection optics is effectively increased to above 1.0.  This in turn allows smaller dimensions to be patterned using longer wavelengths, thereby extending the useful life of standard lithography techniques.  One major challenge to LIL is to identify liquids that allow for the benefits of LIL to be realized without introducing other problems.  This invention claims a family of silicon or germanium containing transparent fluids to be used to enhance the resolution of optical imaging in the wavelength range from 120 to 250 nm.  The invention is particularly useful for imaging in the wavelength range from 120 to 200 nm, and especially useful for imaging in the wavelength range from 155 to 160 nm.

 

Network Security and Computer Architecture

We showcase two Lincoln Laboratory inventions below that highlight recent developments in this field.

M.I.T. Case No. 12095L

"NetSPA: Network Security Planning Architecture for Enterprise Scale Networks," by Robert K. Cunningham, Kyle W. Ingols, Kendra J. Kratkiewicz, Richard P. Lippmann, Keith Piwowarski, and Chris Scott

U.S. Patent Pending; Serial No. 60/804298, filed June 9, 2006
 
Description:  Assessing the security of a computer network is a complex problem that depends on many factors, such as the network topology, the services and vulnerabilities that exist on the hosts, firewall policy, IDS placement and more.  Gathering and analyzing all this information by hand is a daunting task.  While current vulnerability scanners provide information about the services and vulnerabilities present on individual hosts, they don't take into account the impact of the vulnerabilities, or of removing them, on the larger network as a whole.  This invention comprises a set of techniques which allow the import of static information about a computer network (e.g., topology, filtering device configurations, vulnerabilities on each host), and produce an ordered list of recommended changes to improve the network's security posture.  This is accomplished by computing network “reachability”, an attack graph representing an attacker's potential actions, and recommendations for improvement derived from the attack graph.  The technique is several orders of magnitude faster than other algorithms available today, and is easily scalable to enterprise-scale networks.

M.I.T. Case No. 12298L

"eXtreme Virtual Memory (XVM) - A Unified Model for Parallel and Out-of-Core Programming," by Crystal L. Kahn, Jeremy Kepner, and Hahn G. Kim
 
U.S.Patent Pending; filed August 1, 2006

Description: This invention, termed eXtreme Virtual Memory (XVM) because it emulates the ease of use of virtual memory, is a software programming model for efficiently orchestrating the distribution and management of data across storage hierarchies using a global data abstraction.  It combines the Parallel Global Address Space (PGAS) programming model with out-of-core methods, and can be applied to both serial and parallel processor architectures as well as arbitrarily deep storage hierarchies.  The invention targets programming applications where the data arrays are too large to fit inside a single level of storage and must be distributed across the storage hierarchies of multiple processors.

Patents archive

 

top of page