Skip to main content
Image
Electronic Wave

This invention works by imaging an ultrafast pulse diffracted from a large grating onto a spatial light modulator (SLM) thereby directly transcribing an arbitrary record on a pulse front tilted (PFT) ultrafast pulse. The grating generates PFT of the input pulse, and the SLM provides temporal control of the pulse through the space-to-time mapping of the tilted pulse. Coupling this patterned…

Image
Electronic Wave

This invention exploits the non-linearities of optical Mach-Zehnder (MZ) electrooptic modulators to enhance small signal dynamic range at higher bandwidths. A linear photodiode (PD) converts the amplified optical signal output from the MZ back to an electrical signal completing an Electrical-Optical-Electrical (EOE) conversion cycle. The dynamic range can be further enhanced by daisy chaining…

Image
large potassium dihydrogen phosphate KDP crystal

This invention takes advantage of the high water-solubility of key NIF KDP crystal optics and uses water as an etchant to remove surface defects and improve the laser induced damage threshold. Since pure water etches KDP too fast, this invention is to disperse water as nanosized droplets in a water-in-oil micro-emulsion. While in a stable micro-emulsion form, the surfactant additives prevent…

Image
LLNL’s CO2 laser-based Optics Mitigation Facility adapted for controlled laser melting of glass optics.

This invention proposes to use laser induced melting/softening to locally reshape the form of a glass optic. The local glass densification that results induces predictable stresses that through plate deformation mechanics yield a deterministic methodology for arbitrarily reshaping an optic surface figure and wavefront without the need to remove material.

Image
cyber

CSP-POST provides the capability to inspect all incoming and outgoing emails while providing after-the-fact forensic capabilities. Using commercially available lightweight and serverless technologies, CSP-POST easily collects all email and parses it into easily searchable metadata, enriched and ready for analysis. The web-based application is deployed in a repeatable, testable, and auditable…

Image
A system to cryptographically distinguish between human-generated text vs. AI-generated text

LLNL has invented a new system that uses public key cryptography to differentiate between human-generated text and AI-generated text. This invention can be used to validate that text is likely to be human generated for the purposes of sorting or gatekeeping on the internet, can detect cheating on essay assignments, and can be used as an automatic captcha that does away with the hassle of…

Image
Radio Frequency Photonics Optimizes Signal Processing

LLNL researchers in the NIF Directorate DoD Technologies RF Photonics Group explored phase modulation solutions to this signal processing challenge. Optical frequency combs offer phase noise characteristics that are orders of magnitude lower than available from commercial microwave references. The Photonics Group researchers recognized that by converting the intensity information into phase,…

Image
Encrypting computer clusters

LLNL has developed a new method for securely processing protected data on HPC systems with minimal impact on the existing HPC operations and execution environment. It can be used with no alterations to traditional HPC operations and can be managed locally. It is fully compatible with traditional (unencrypted) processing and can run other jobs, unencrypted or not, on the cluster simultaneously…

Image
Hand polishing optics

LLNL's Slurry Stabilization Method provides a chemical means of stabilizing a polishing compound in suspension at working concentrations without reducing the rate of material removal. The treated product remains stable for many months in storage.

Image
Cell phone 2

LLNL's NeMS system enables network mapping operations by using two LLNL-developed software systems: LLNL's NeMS tool and the Everest visualization system. Each software system can be also used separately for their specific applications. When the two systems are used together as an iterative analysis platform, LLNL's NeMS system provides network security managers and information technology…