Security Patents for Sale or License

Quick-Connect Interface for Alarm Systems

The patent consists of a PCB electronic board that connects to standard anti-theft powerhouses for residential or commercial premises, simplifies and speeds up work. It dims installation times, captures sensors and peripherals automatically, simplifies work and lowers plant costs.
[PURCHASE DETAILS HERE]


Digital Information Protecting Method

A revolutionary encryption method named Data Encryption-Remapping Technology, which provides two-layer protection that first encrypts the content of data by AES-256 and then reorganizes the position of each ciphertext by user defined sequence.
[PURCHASE DETAILS HERE]


Quick-connect Interface for Alarm Systems

It dims installation times, captures sensors and peripherals automatically, simplifies work and lowers plant costs. The patent consists of a PCB electronic board that connects to standard anti-theft powerhouses for residential or commercial premises, simplifies and speeds up work. Converting wire / wire connections to RJ11 / data connections. Decreasing working times and labor costs. Making the system expandable immediately after inserting the new connector of the new sensor or peripheral, wi
...

Digital Information Protecting Method and Apparatus, and Computer Accessible Recording Medium

- What our invention is about GiantTrend developed a revolutionary encryption method named Data Encryption-Remapping Technology, which provides two-layer protection that first encrypts the content of data by AES-256 and then reorganizes the position of each ciphertext by user defined sequence. This technology strengthens the encryption complexity of AES-256 (1077) to 10292 ~102716 and significantly increase the decryption difficulty. - What problem it solves Solving the following two proble
...

Abualeiz Antenna

It’s a method which is been used for designing passive RFID tags with multi frequencies, and multi memory. It has ability to divide the tag memory into many parts. Each part can be administrated by its one chosen frequency band. It is an antenna with self matching impedance compatible with all commercial RFID chips. It is used for design passive- microwave -RFID tag antenna (Up to 10GHz).
...

Electronic Mailbox System

An electronic mailbox system features: a mailbox housing with an inner cavity and slot for holding mail, a lid, an electrically-operable lock system for the lid, a mail sensor for detecting the mail being inserted into the slot, a first transmitter, a first receiver and a mailbox microprocessor; and a control box with a second transmitter, a second receiver, a control box indicator light, an unlock button, a reset button, and a control box microprocessor. When the mail sensor detects mail delive
...

System and Method for Selectively Enabling a Control System

A Silicon Valley company has developed the ultimate in online security and patented technology they call “Alive Biometric Signature Authentication Identification Security Systems Solutions™”(ABSAISSS) coupled with “Fragmented Character Data Storage Infrastructure Server Vaults™” (FCDSISS). “These Alive Biometric Security Systems and Solutions are ideal for preventing almost all crime. The technology creates a fool proof security system. The new systems guarantee’s a complete “l
...

Isolation Damper with Proofing

With many systems there is a need to isolate an area or air stream in a positive and secure manner. Unfortunately even the best dampers and valves can leak and this failure can't be detected until it is too late. This patent provides an absolutely positive method of sealing contamination caused by nuclear, biological or chemical origins while also providing self testing and verification of performance. This patent has a wide range of applications where safety is a must.
...

Method and System for Detecting an Individual by means of Passive Infrared Sensors

Geo-location and tracking by sensing the body’s heath. The videosurveillance market is rising drastically and needs new smart sensors at a low price. This geo-location systems qives the real-time location of individuals to Video Management Systems an to video-cameras. The present invention relates to a method and a system of detection and analysis of movement of an individual in a given observation zone by means of a particular passive infrared sensor . Its revolutionary patented new optic
...

Method and System for Detecting an Individual by means of Passive Infrared Sensors

The patent concerns a passive infrared geo-locator sensor. It detects the heath of a body ( 4 square mm of skin at 40 m are enough ) and locate it. It allows then to detect, locate and track an intruder outdoor and to position him on a digital site map and/or to drive a video camera towards the intruder and to follow him. It is a very important sensing method to improve smart videosurveillance systems.
...

Padlock

A patent for a inexpensive in manufacturing dial padlock with almost infinite number of combinations. The attached pictures are not photos but, rather, graphic representations made by an artist.
...

Security and driver/personnel identification system

US Patent 8,451,105 refers to a biometric cell phone and biometric cell phone receptor. It is a known fact that in the transportation industry, drivers drive "over hours" to reach a facility before it closes, resulting in an overtired driver at increased risk of a highway accident, and the possibility of spending the weekend parked until the facility opens again. This dangerous and inconvenient situation can be eliminated at facilities deploying the Landit system. Example: Driver is four
...

Security and Tracking System for Cargo Containers

US Patent 7,414,527 refers to a Confirmation Security Pad and Weight Detection Sensor. The primary purpose of the Confirmation Security Pad is to prevent theft and unauthorized activity. The Confirmation Security (CS) Pad containing a weight detection sensor detects the presence and absence of weight, and communicates, via broadband and wireless, to a programmed network at a particular location. For example, a loaded cargo container parked unattended on the C/S Pad will communicate its w
...

Smart Network Camera System-on-a-Chip

Aspects of a method and system for processing video data are disclosed and may include detecting, within a single chip in a programmable surveillance video camera, one or more moving objects in a raw video signal generated by the programmable surveillance video camera. One or more characteristics of the detected one or more objects may be extracted within the single chip in the programmable surveillance video camera. The extraction may be based on the raw video signal and may be performed prior
...

Method and system for background estimation in localization and tracking of objects in a smart video camera

Aspects of a method and system for change detection in localization and tracking of objects in a smart video camera are provided. A programmable surveillance video camera comprises processors for detecting objects in a video signal based on an object mask. The processors may generate a textual representation of the video signal by utilizing a description language to indicate characteristics of the detected objects, such as shape, texture, color, and/or motion, for example. The object mask may be
...

Method and System for Programmable Camera for Configurable Security and Surveillance Systems

A method and system for a programmable camera for a configurable security and surveillance system are provided. A programmable sensor agent for video surveillance may comprise a network interface, a processor, an image processor, and an image sensor. The image processor may comprise at least one configurable device. A device programming file may be received by the network interface from a system manager and may be programmed into at least one configurable device in the image processor via a JTAG
...

Device for Protecting and Storing of a Security Case

The present invention relates to a device for protecting and storing a security case, wherein the device (1) comprises a security shell (2) having an inside (30) and an outside (31), which security shell (2) encloses a cavity (3), which cavity (3) is arranged for containing the security case (4), wherein the cavity (3) is connected with an opening (5) in the security shell (2) through which access to the cavity (3) is provided for putting or taking out the security case (4); the device (1) furth
...

Fire extinquising roof soaker

The present invention is a spraying system that extinguishes flying embers that may land on a roof from a wild fire or forest fire. This includes a submersible pump at the bottom of a well a pool or a pond that is attached to a supply pipe that allows water to be pumped into a reservoir. Another submersible pump is inside the reservoir that pumps water thru a supply pipe that is attached to the roof and soffits This area is called a water station that may also be equipped with a generator for a
...

Security system that is activated BEFORE burglary

Our patent is an autonomous wireless alarm system that detects burglars and keeps them out of your doorstep, before they even attempt to break in or cause any kind of damage to your door or window and is activated by a non replicating remote control that has a double coding of hoping codes system. We already produce this innovating alarm system, known as DoorGuard systems SD and SW, and sell it in Greece and soon in other european countries. How does it work ? Infrared sensors are install
...

Interactive Financial Card System Uniquely Suited for Conducting Financial Transactions on the Internet

This invention is engineered to prevent the hundreds of billions of dollars globally stolen each year by ID fraud from American consumers and taxpayers. This vast theft is enabled by industry's and government's imposed use of archaic identification cards for financial transactions. These include standard bank cards, credit cards, debit cards, atm cards, chip cards, social security cards (including for Tax Rebates) and health insurance cards (including Medicare and Medicaid). The invention rep
...

Device for monitoring spatial area outside car, has processing unit containing information about static object and about objects and persons within spatial area, so that display unit generates alert a

The device (1) has an information processing unit (6) for differentiation of static objects i.e. obstacles (7), and objects and persons to be moved. The objects and persons advance a vehicle with a display unit (8) for an alert before a collision with the static object or the objects and persons to be moved. The processing unit contains information about the static object and about the objects and persons within a spatial area based on a signal of a sensor (5), so that the display unit generates
...

Enhancing security and emergency functionalities in mobile phones based on detection of physical shocks

The invention provides a method and mobile phone of identifying at least one of a security or emergency critical situation of a user of a mobile phone, the mobile phone comprising at least one acceleration sensor, the method comprising the steps of: obtaining at least one acceleration signal from said at least one acceleration sensor representing a current situation of the mobile phone; pre-processing said obtained at least one acceleration signal to remove redundant information present in said
...

System and Method for Security Purposes

A system for security purposes comprising: - an inner structure that is accessible by a plurality of terminals, - wherein the system allows a measurement on the inner structure of the system by using a challenge signal comprising a plurality of input signals applied in parallel to the terminals and by receiving a response signal dependent on a setting of the challenge signal and dependent on the inner structure of the system, wherein - the system comprises at least two features of the group cont
...

Method for Security Purposes

A method for security purposes is disclosed, in which a challenge signal is applied to a physical object and a response signal is received from the physical object. The response signal comprises a plurality of characteristic resonant optical mode or a characteristic of the response signal is determined based on a spatial resolution of at least two frequency components of the response signal that is affected by luminescence effect. The inner structure of the physical structure may also comprise a
...

Millimeter Wave Detection Apparatus

A millimeter wave detection apparatus includes optical devices (30, 50, 60), used to receive the millimeter wave radiating from the detected object, and gather the received millimeter wave; a radiometer receiving device (80), used to receive the energy of the gathered millimeter wave, and transform the millimeter wave energy into electric signal; and an imaging device, used to form the temperature image of the detected object according to said electric signal. The millimeter wave detection appar
...

System for Cyber Investigation and Data Management

A system for executing a cyber investigation by a non-expert user, including a computer having a processor, a memory, and a display; a computer-readable medium having stored thereon instructions for execution of a wizard application, the processor adapted to execute the instructions when the computer-readable medium is inserted into the computer, the processor programmed to: receive case information; receive a type of activity being investigated in response to user inputs to select the activity
...

Methods and Circuits for Thwarting Semi-invasive and Non-invasive Integrated Circuit Security Attacks

Methods and systems are provided for thwarting semi-invasive and non-invasive security attacks on an integrated circuit. The methods and systems generally make reverse engineering, reconfiguration, decryption, observation, or any combination thereof, of the internal operations of the integrated circuit substantially more difficult if not impossible without damaging the integrated circuit.
...

Automated Video Surveillance Systems

A video surveillance system includes a plurality of video sources, at least one processing server in communication with the video sources, and at least one monitoring station viewing video from the video sources. The video sources are distributed over a target area to be monitored by the surveillance system and are attached to a video network. The processing server allocates bandwidth to the video sources with an accuracy function which provides event/object detection accuracy as a function of i
...

High Definition Scintillation Detector for Medicine, Homeland Security, and Non-destructive Evaluation

A bundle of drawn fibers that have X-ray scintillating unagglommerated nanocrystallite particles in plastic or glass cores of down to 0.1 micron spacing and claddings of X-ray absorbing compounds in the cladding composition. Optional is a cover to the bundle that blocks light from leaving the bundle at the X-ray side while allowing X-rays to pass into the cores. To image the light exiting the fiber bundle at the sub-micron level, light expansion is preferable using either a lens system or a fibe
...

Systems and Methods for Zero-Power Security

The present invention provides systems and methods for utilizing zero-power, energy-harvesting computational modules to provide secure and reprogrammable wireless communications with vulnerable devices comprising integrated circuits (ICs), including active implantable medical devices, electronic lock and key systems, credit cards, access cards, identification cards and passports. The zero-power, energy-harvesting computational modules are powered by radio signals received from an interrogator, a
...

Wireless Network Security Using Randomness

The present invention provides systems and methods for securing communications in a wireless network by utilizing the inherent randomness of propagation errors to enable legitimate users to dynamically create a shared symmetric secret key. In one embodiment, the invention provides a system with two computers each having a wireless network adapter. The sending node encodes the frames, transmits the frames, determines if the frames were correctly received, retransmits the frames if they were not c
...

Visual Background Extractor

The present invention relates to a Visual Background Extractor ( VIBE ) consisting in a method for detecting a background in an image selected from a plurality of related images. Each one of said set of images is formed by a set of pixels, and captured by an imaging device. This background detection method comprising the steps of: establishing, for a determined pixel position in said plurality of images, a background history comprising a plurality of addresses, in such a manner as to have a samp
...

Method and Device for the Manipulation of Microcarriers for an Identification Purpose

The present invention relates to a method for the manipulation for an identification purpose of a microcarrier comprising the steps of: (a) an identification purpose step of the microcarrier; and (b) a positioning and orientation step prior to or during the identification purpose step, wherein the identification purpose step is a detection step for the detection of an encoded microcarrier having an anisotropy in its shape. The invention further relates to an apparatus for the manipulation for id
...

Method and System for Image Analysis

The present invention relates generally to a method for determining the level of expression of one or more candidate objects of interest in a biological sample. In particular, the present invention relates to a method for determining the level of expression of one or more candidate objects of interest using image analysis. More specifically, the present invention relates to a method and a system for determining the level of expression of one or more candidate objects of interest using an automat
...

Systems and Methods for Providing Opportunistic Security for Physical Communication Channels

Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly se
...

System and method for provisioning device certificates

A method is provided for provisioning a device certificate on a device. The device is configured to communicate wirelessly with a plurality of backend servers via a communication network. The communication network includes a mobile data server. An activation request is initiated to the mobile data server for activating the device on the communication network. During activation, a device certificate request is provided to the mobile data server for the device. The device certificate request inclu
...

Security System for Sales Device

A security system (SYS) is proposed for a sales device, comprising at least one first device (CP) for generating a payment receipt for purchased goods and/or services, and comprising at least one second device (CTR) for examining the payment receipt, wherein the first device (CP) generates an electronic payment receipt in the form of an ID (CD) and comprises a transmitting device (CP-S) that wirelessly transmits the ID (CD) to a mobile device (M), and that the second device (CTR) comprises at le
...

Digital Watermarking

These 2 applications include a new and improved watermarking system and method for use with video and audio. The system and method can be applied directly to compressed media data/ frames with variable lengths (as opposed to a common fixed length) which (1)tremendously reduces the amount data needed to be processed and (2) increases the degree of difficulty for tampering without being detected. The system and method generates a novel digital signature for each compressed frame based upon the
...

Coatings for Security Documents and Labels

Background Researchers at the University of Toronto have developed a novel materials platform based on self-assembling spherical polymer particles which can store a variety of additives such as fluorescent dyes in either the spherical cores or the surrounding polymer matrix. Technology It has been shown that it is possible to create a material with dyes of different colours in the spheres and matrix such that directly superimposable images can be written selectively with a laser, and re
...

Towards Higher Assurance Software Construction via Aspects

Security evaluations for software systems can be time consuming and expensive endeavors. In particular, the tracing of security requirements into code and the accurate maintenance of that mapping as a system evolves over time can be tedious and error-prone. Currently evaluators must maintain a mapping of security requirements into application code via manual processes. There is a need for an approach to help minimize evaluation cost and time and to improve the overall accuracy. This JHU/APL t
...

Using Wearable Biometrics for Continuous Automated Authentication

Biometrics use biological features such as fingerprints to determine an individual’s identity by comparing the observed fingertip patterns to a previously stored pattern. Biometrics are useful for controlling access to devices - such as laptops - or to facilities. One drawback, however, is the user-intrusive action required, such as placing a finger on a sensor for scanning or positioning the eye close to an iris scanner. The intrusiveness of a biometric scan can be especially cumbersome durin
...

Ground Moving Target Indicator (GMTI) Aided Video Registration

video does not fully support precision engagements due to poor geolocation of targets in video. A technique for improved image coordinate to ground position transformation is needed for real time, integrated tracking for situational awareness; force protection; and forensic analysis of the battlefield. The JHU/APL Ground Moving Target Indicator (GMTI) technology provides improved geo-registration of Unmanned Aerial Video (UAV) to obtain engagement quality geolocation of targets in video. The
...

Information Technology in Support of Early Detection of Bioterrorist Events

Recent history demonstrates that weapons of mass destruction can be built and deployed by almost any individual or group that has an intent to cause harm or that is looking for media attention for its cause. The arsenal of weapons available to the terrorist includes chemical and biological agents. These weapons, banned from wartime usage, have nevertheless proliferated in third world countries. Information on the development and deployment of these weapons has become widely available on the Inte
...

Remotely Directed Vehicle Inspection System

Personnel operating check points, border crossings, toll barriers, parking garages, traffic stops and others are subject to many different types of hazards. They include explosives, drugs, weapons, chemical, biological and radiological agents, smugglers, contraband and others. A method is needed to require the occupants of the vehicle to be remotely directed to examine the vehicle while the security officer is at a safe distance. A researcher at the Johns Hopkins University Applied Physics La
...

Tow Body Metal Detector

Detection of underwater metal objects is used in a wide variety of areas: commercial salvage operations, treasure hunting, law enforcement, minesweeping and underwater-unexploded ordnance (UXO) remediation. The Tow Body Metal Detector (TMBD) is connected to a tow vessel via a cable and tow point. The tow vessel pulls the TMBD through the water and a winch deploys a cable that allows the tow body to descend into the water. A metal detector (MD) antenna is used for underwater metal detection. Typi
...

Automatic Integrated Distress Device

Signaling for near term and near by assistance when a vessel is sinking generally requires human intervention. This is in the form of radioing a "Mayday" or setting off signal flares. Sometimes access to these emergence devices is not practical. The Automatic Integrated Distress Device(AIDD), invented by the Johns Hopkins University Applied Physics Laboratory, provides an automated multi-function method of signaling for assistance. AIDD is activated by hydrostatic pressure surrounding a sink
...

Device for Rapid and Nondestructive Detection of the Presence of Latent Fingerprints

Portable system for forensic analysis to rapidly detect and locate latent fingerprints in a nondestructive manner. No system exists that detects and locates the presence of a latent print and provides information on the quality metric of the print itself. Current systems are seriously inefficient, extremely time-consuming, and many require additional chemical treatment to the entire area, which permanently changes the evidence and the crime scene. Researchers at The Johns Hopkins University A
...

Addressable Metal Detector Array and Method for Crowd Screening

There exists a need for metal detection systems for screening people for metal weapons such as guns and knives. Conventional metal detectors require people to walk through a small portal that has an electromagnetic induction (EMI) metal detector. Typically, only one person can walk through a metal detector at a time. This creates a "choke" point and a line typically forms. For large sporting events, subways and anywhere that large crowds gather and must be screened, the use of portable type meta
...

Wide-Area Portal Metal Detector

There exists a need for metal detection systems for screening people for metal weapons such as guns and knives. Conventional metal detectors require people to walk through a small portal that has an electromagnetic induction (EMI) metal detector. Typically, only one person can walk through a metal detector at a time. This creates a "choke" point and a line typically forms. For large sporting events, subways and anywhere that large crowds gather and must be screened, the use of portable type meta
...

Nanoparticle Taggants for Explosive Precursors

Aggressive Homeland Defense initiatives may force foreign or domestic terrorists to construct explosive devices from commercial sources such as ammonium nitrate fuel oil (ANFO). As seen in the case of the Oklahoma City bombing, such low technology munitions have the potential for inflicting severe damage to unprotected assets. Exacerbating this problem, a large number of chemicals and commercial sources are available to formulate improvised explosives. Once devices are detonated, sophisticated f
...

Low-cost Projectile Detection and Warning System

The current global climate necessitates protection against attacks from anti-aircraft assaults for both military and civilian aircraft. Many of the currently available counter measure systems work by using an Infrared Counter Measure (IRCM) approach however, the deployment of an IRCM system is prohibitively expensive due to the waveband of light used to do the missile detection. Further, due to the method of detection with these imagers, large amounts of clutter and false signals in the band mus
...

Personnel Screening Device for the Detection of Non-metallic Concealed Contraband Using Microwave Backscatter

Current security scanning procedures at commercial airlines may reasonably fail to detect nonmetallic objects (i.e., plastic explosives such as C4 and ceramic devices) concealed under a person's clothing. Passive infrared receivers that measure thermal emissions have proven to be ineffective due to the small temperature difference for objects next to the body and the thermal diffusion due to clothing. Although volatile explosives (e.g. TNT) produce a detectable vapor signal, plastic explosives h
...

Dense Object Detection System and Method

Several million cargo containers arrive into the U.S. every year bringing a large variety of goods into the country. Recent concerns over the possibility of radioactive materials used in the making of a "dirty bomb" being smuggled into the country by terrorists has heightened the need for screening cargo containers. Nuclear detectors are typically used to sense for possible radiological material inside a cargo container. However, if the radiological material is well shielded by lead or other rad
...

Gun Shot Digital Imaging System (GSDIS)

Violence and criminal activity involving firearms is a significant problem for most metropolitan areas in the United States, and numerous suburban areas as well. Two of the problems facing law enforcement authorities when handling these types of crimes are (1) the speed at which the violence begins and ends and (2) the relative ease and speed at which the perpetrators can disappear into the urban landscape. Using acoustic triangulation technology, the present invention spatially localizes a g
...

Wide Area Metal Detection

With the recent terrorist attacks, providing a safe environment in large settings such as stadiums, amusement parks, airports and other areas where large groups of people are moving through has taken on renewed importance. Currently, perhaps the most effective portal that has an electromagnetic induction (EMI) metal detector. Typically only one person can walk through the metal detector at a time, so this creates a "choke" point where a line typically forms. For large sporting events and anywher
...

Blast Position Detector

The present invention provides for a method and apparatus for detecting the position, intensity, and initiation time of an energy pulse in 3-D space. The method and apparatus may detect signals at very high speeds and may employ commercial-off-the-shelf (COTS) components that are inexpensive and durable. Futhermore, different embodiments of the present invention are adaptable to numerous and diverse applications, including the detection of various types of energy such as light and sound. A pl
...

Explosive Detection Instrument

With an estimated 100 million mines and countless millions of acres of land contaminated with unexploded ordnance (UXO) worldwide there is a need for sensor systems and methods that can detect and identify large and small explosive objects buried in soil. In addition, during armed conflict, there is a need for mine detection and neutralization in real-time or near real-time. The present invention provides a simple, relatively low cost, stand-alone, portable device that can be used virtually a
...

Time and Frequency Domain Electromagnetic Induction Metal and Landmine Detection and Identification Sensor System

With an estimated 100 million mines and countless millions of acres of land contaminated with unexploded ordnance (UXO) world-wide there is a need for a sensor system and methods that can detect and identify large and small metal objects buried in the soil. In addition, during armed conflict, there is a need for mine detection and neutralization in real-time or near real time. A commonly used sensor for mine and UXO detection is the electromagnetic induction (EMI) metal detector. Conventional EM
...

Molecularly Imprinted Polymer Sensor for Explosives

With the recent actions of individuals, both in the private sector and in the schools, providing a safe workplace, place of learning or airflight has taken on renewed importance. Currently, perhaps the most effective methodology for detecting explosives is highly trained K-9's, who are typically trained to detect up to 20 of the most commonly used components in explosive devices, such as C4, TNT, smokeless powder, black powder, PETN, DetCord, potassium/sodium chlorates, water gel, and nitro/ammo
...

Molecularly Imprinted Polymer Sensor for Drug Residues

Narcotics traffic throughout the world is a serious problem. Even though current interdiction methods has improved, it is certain that only a small percentage of drugs entering the United States are confiscated. One reason for the low rate of drug interdiction is the lack of adequate instrumentation available to field agents. Mass spectrometers and gas chromatographs are not portable and must be operated by well-trained technicians. Other methods, such as optical sensors and surface acoustic wav
...

Mass Spectrometer Threat Identification System

There is typically an abundant sample available for analysis in TOF and other mass spectrometers located in a laboratory. Thus, a highly resolved spectrum may be achieved by repeated ionization and detection of the analyte. By contrast, in the field, only a small and diffuse sample may be available for collection from the environment. In addition, for a laboratory mass spectromenter, the samples are often prepared in a liquid state and placed in the extraction region. Because the extraction regi
...

Improvement in Performance of a Microchannel Plate Detector Assembly Using a Miniature Anode (Micro-node)

Small devices that can rapidly and accurately analyze chemical and biological molecules are required by many industries. Homeland security and the medical community lead the list. Current instruments are either too large to be used as a first responder in the field, too slow in giving results to analyze large amounts of protein data, or too costly for widespread use. The Johns Hopkins University Applied Physics Laboratory has invented and patented an improved version of commercially available
...

A Gridless, Focusing Ion Source for a Time-of-Flight Mass Spectrometer

Small devices that can rapidly and accurately analyze chemical and biological molecules are required by many industries. Homeland security and the medical community lead the list. Current instruments are either too large to be used as a first responder in the field, too slow in giving results to analyze large amounts of protein data, or too costly for widespread use. The Johns Hopkins University Applied Physics Laboratory has invented and patented (1) a grid-less, focusing ionization extracti
...

Innovative Technologies for Two-Dimensional Identification Coding (TOP8-70)

Abstract: Researchers at NASA Marshall Space Flight Center (MSFC) have developed a series of technologies for marking and detecting images of two-dimensional matrix symbol patterns used to identify and track manufactured items. These matrix symbols can be hidden from view (e.g., beneath coatings or on the backside of a surface) or embedded in an assembly. As part of an automatic identification scheme, these matrix symbols offer high information density and security.
...

Forensic Security Fo the Home - "Chain Reaction"

FORENSIC DNA TRACE FOR THE HOME StranDNA (UK) Limited is a new company with offices in Guildford, Surrey, United Kingdom who are offering Sales, Installation & Data Basing regarding a totally new and innovative access control system given the name “Chain Reaction” this unique security product places itself directly within the residential security market, but other applications include caravans, mobile homes, recreational and marine vehicles. Due to the increased technical specificatio
...

Microfluidic Device and Surface Decoration Process for Surface Capture-Based Bioassays

Introduction Immunoassays remain the most versatile and rapid method for the detection of chemical and biological warfare (CBW) threat agents. Current requirements from our military and government is to be able to deploy a field hardened and easily mobile device. Historically this has led to serious degradation in the performance of these devices and their ability to detect small amounts of CBW agents. Technology description Researchers at the University of Washington have developed a new method
...

Use of Liquid Junction Potentials for Electrophoresis without Applied Voltage

Introduction One of the problems with producing a small field usable microfluidic device is the requirement to have some form of power to make it work. More and more devices currently being developed will either require the system to work with a minimal power supply or none at all. Technology description Our researchers have developed a microfluidic method and device to capture cells electrophoretically without the use of a power source. Business opportunity Some of the applications for this met
...

Notify me of New Entries on this Page

You can receive an email whenever a new patent is added to this category. You can unsubscribe at any time.