-
Underwater Wireless Optical Communication Technology
We have developed an underwater wireless optical communication modem (UWOCM) that offers excellent data transmission speed, a short standby time and low power consumption compare to acoustic communication modem. Therefore, it is an ideal choice for data collection from underwater sensor, underwater wireless video transmissions, and the wireless int -
A Fast and Flexible Provenance Scheme for Industrial Control Systems
Successful attacks against industrial control systems (ICS) often exploited the insufficiency of security checking mechanisms -- e.g., control commands are largely executed without checking whether they are issued by the legitimate source and whether they are transmitted through the right network path and hence undergone all necessary mediations an -
Micro-Beacon System for Monitoring and Tracking
The Micro-Beacon system consists of tiny (<10mm) battery-operated beacons and a network of one or more receivers. These beacons may be tagged onto high-value objects or assets that need to be monitored or tracked or may even act as standalone sensors. The beacons transmit RF packets over a distance of about 100m and a network of one or more receive -
Stand-off Concealed Threat Detection that Saves Lives
Stand-off concealed threat detection, fully automated concealed threat detection solution based on mm-wave radar technology. Detecting concealed assault rifles, machine pistols, person-borne improvised explosive devices (PBIED)'s and large bladed weapons at distances exceeding 30m. Overview devices such as High Definition Closed Circuit Television -
Physical Distancing via Mobile Phones and Badges
COVID-19 has triggered the need for physical distancing. It is not always easy to be aware of respecting physical distance in all circumstances. We have developed a mobile application that triggers our designed badge or the smartphones flash and vibrate when the distance of 2m does not comply. The software development kit (SDK) is integrated into a -
Wireless Data Transmission via Ultrasound in Metallic/Explosive Environment
We have developed a wireless data transmission via ultrasound system. Our technology transforms any speaker or sound system into a tool for detection, geolocation, authentication and wireless communication. Our system allows wireless data transmission in constrained environments where radio waves (e.g., Wi-Fi, cellular and Bluetooth) are not effect -
3-in-1 Asset Tracker - BLE/Wi-fi/GPS Indoor and Outdoor applications
Nowadays indoor tracking systems require heavy infrastructure set up, and it could be a big challenge when the users simply want to localize their valuable mobile assets. We have developed a 3-in-1 asset tracker, which is able to manage and monitor the assets indoor and outdoor. The device is battery operated that sends geolocation through Sigfox n -
Industrial Grade Mission-Critical Wireless Solutions for Factory Automation
Factories require flexible and adaptable machines, mobile equipment and intelligent devices requiring industrial-grade, robust, fast, secure and scalable wireless communication. Our technology presents reliability that is literally a million times better than any other wireless protocol, 100 times faster, deterministic and capable of supporting 100 -
Smart Waste Management System
This system includes battery operated sensors to detect if a bin is filled, and communicate this information to an Application server on the Internet through a wireless infrastructure base on LPWAN technology which supports wide area wireless coverage in the ISM frequency band and at very low power. The use of LPWAN technology enables the design of -
TV White Space Super Wi-Fi
Demand for wireless communication is ever-increasing. However, the frequency spectrum is a scarce resource that cannot be created. This has resulted in an issue commonly known as "spectrum crunch" -- a phenomenon where demand for spectrum outpaced supply that resulted in congestion and drop in wireless communication quality. Ironically, measurement -
Cloud Network Access Control
Harness the Power of the Cloud to Make Managing Your Network Security Easier than Ever. No more unknown, unmanaged, unsecured devices in your network. Device platform information is a vital element in the world of IoT Without knowing the specific platform information, you can't really protect IT assets. A critical part of IT security is staying on -
Intelligence Reconstruction Gear OS (IRGO) and and Real-Time Packet Reconstruction Technology (RTPR) for Cyber Security & Intelligence
The marketplace requires a breakthrough network packet forensics solutions for Internet Monitoring, Cyber Security & Intelligence, Cyber Crime Prevention & Investigation for Enterprises, and Government & Internet Service Provider (ISP) networks. Intelligence Reconstruction Gear OS (IRGO)and Real-Time Packet Reconstruction Technology (RTPR) is our i -
Multi-hop, Scalable and Dynamic Wireless Backhaul Technologies
PicoCELA Backhaul Engine (PBE) is an embedded system application that adds a multi-hop communication capability to a wireless platform using its wireless interface. PBE uses innovative proprietary technology to create a MIMOZONE, providing stable, seamless, swift connectivity in a wide range of wireless deployment scenarios.Furthermore, it uses unl -
3i-Filter - Layer 7 DPI Packet Content Finder and Filtering for Cyber Security & Cyber Intelligence
The 3i-Filter (L7 DPI Packet Content Filtering System)allows large-scale real-time deep packet inspection and filtering on multiple 10/100Gbps links based on object, REGEX pattern(such as text string, keywords, account, ID, email, usernameetc...) and signature detection. It accesses and delivers traffic from one or more full-duplex networks to mult -
Real Time ‘Big Data’ Analytics Derived from the 3/4G Mobile Networks to Understand Movement by Vehicle, on Foot and by Public Transport
Data derived from the mobile phone network offers the opportunity to create comprehensive and high value understandings and pictures of people movements - all using the 3/4G infrastructure that is already in place. This capability is genuinely disruptive, capturing anonymized and aggregated information from millions of ever-moving sensors (mobile p -
Automatic Domain Name System (DNS) Naming for an IoT Device
This technology is a Domain Name System (DNS) naming method for an IoT device, and provides a method of automatically generating a DNS name by an IoT device while transmitting a DNS search list (DNSSL) option containing domain information based on a neighbor discovery (ND) protocol of IPv6 via multicast. A DNS name is automatically generated for th -
Communication Tool Without Cellular Coverage or Internet Connectivity
It is a Peer-to-Peer communicational tool for smartphones that works without any cellular coverage or internet. It has a standalone software component, which enables smartphones to share text, voice, pictures or documents within a range of hundreds of meters (tested for 500m+). Its hardware component is a smartphone case, that would fit the most po -
Network Security Protocol for Internet-of-Things (IoT) & Operational Technology (OT) Networks and Devices
Securing embedded IoT devices and networks are challenging due to the limited computing capabilities and communication bandwidth on the devices. This requires a different approach than those typical of Corporate IT networks with high-performance servers. This software protocol innovation delivers enterprise-grade security with its patent-pending so