Weekly Tech Roundup | Jun 14, 2019

Weekly tech roundup: cybersecurity technology edition

TechLink’s federal invention database is where entrepreneurial-minded people can go to find solutions to commercial problems.

This week’s tech roundup features cutting-edge cybersecurity technologies that data security businesses can license the patent rights, further develop, and sell in commercial markets.

TechLink can help you navigate the licensing process at no cost to you.

Get your (also free) bonus download: Guide to Technology Transfer: Why and How to License Technology from Federal Laboratories

Scroll down for the full roundup:

Microprocessor design for secure, high-assurance, safety-critical computing

Given the number of data breaches and amount of information stolen from computer networks, it’s clear that conventional computer architectures do not adequately support cybersecurity. According to a study sponsored by IBM, businesses have a one-in-four chance of having their data security breached, costing an average of $3.6 million.

Army scientists and engineers have developed a microprocessor computer system for secure, high-assurance, safety-critical computing.

Your business can license the patent rights to this cybersecurity technology. Get the full details:

View Technology Summary

Encryption of remote data

Existing encryption solutions within conventional network environments are often not suitable for the majority of smaller network platforms. This is usually due to size, power consumption requirements, and hardware weight, as well as risks associated with reverse-engineering controlled cryptographic items. As the use of autonomous vehicles and remote sensors increases, we need greater data security of information that resides on and is being transmitted from these devices.

Navy cybersecurity researchers developed a device and process to ensure secure data transmission and storage. This hardware and software solution is designed to be lightweight, have a very small footprint, and operate in a wireless mode.

Your business can license the patent rights to this cybersecurity technology. Get the full details:

View Technology Summary

Triple authentication for secure access to computer devices

Navy researchers want to further protect data, address shortcomings of current cybersecurity solutions, and push biometrics towards broader adoption. To do this, they developed an authentication system that incorporates three different modes: a wrist vein imager wherein the imaging system is triggered when the operator’s hands are placed on a keyboard; a fingerprint reader under one of the keyboard home keys; and a smart card.

This triple-pass system more closely mirrors the common mechanics of accessing a keyboard and is ideally suited to work environments where an operator may leave the computer for periods of time.

Your business can license the patent rights to this cybersecurity technology. Get the full details:

View Technology Summary

Harvesting electrical energy from a data bus

Energy harvesting techniques currently leverage solar, thermal, wind, and kinetic sources. These approaches are valuable in running remote sensor systems, providing heat and power to off-grid structures, and powering RF communications towers. They also carry relatively high capital costs and ongoing maintenance expense.

The Navy’s prototyped energy harvesting technology uses a switching circuit to divert excess power within a communications bus for use elsewhere that does not disrupt the normal operation of the bus.

Your business can license the patent rights to this cybersecurity technology. Get the full details:

View Technology Summary

Secure mobile maintenance and operator system

Control and maintenance of electronic systems operating in remote locations pose significant logistical challenges.

Navy researchers have developed a technical support system comprised of a head-mounted device, image recognition software, augmented reality technology, and 3-D models. Voice and gesture recognition can be incorporated to initiate commands. Additional elements include connectivity to remote servers.

This system brings context-specific information to the eye of the onsite technician who can make the appropriate system changes with precision and speed.

Your business can license the patent rights to this cybersecurity technology. Get the full details:

View Technology Summary

Headshot Image of Austin Leach, PhD, CLP

Is your business interested in one of these hot technologies?

Contact Us