Available Technologies by Category
Frequency-Output Gyroscope
  • Low-cost
  • Constant resonant frequency of the drive mode
  • Better sensitivity – minimal detectable frequency is only limited by short-term stability and counting period length
4682
Compressive Wireless Arrays for Bearing Estimation
  • Efficient – Uses minimum possible samples to reconstruct space
  • Passive – System listens to available signals, it does not send our signals that could cause interference 
  • Low Power – System uses low power consumption because it listens to available signals
4326
Electromagnetic Breach Detection Sensor
  • Difficult to defeat — due to unique voltage patterns
  • Works independently — not reliant on perfect connections to maintain functionality
  • Ability to sustain a moderate amount of damage — to avoid incorrectly detecting a breach
3646
Standoff Detection of Nuclear Materials
  • Air-ionization measurement, molecular resonance, excitation and fluorescence
  • Remote (LIDAR) probing/detection of inaccessible (or hidden) radiation sources
  • On-site (Direct) ionization detection/monitoring  (Ionized air pump) of radiation materials
4936
Method for VM Monitoring Using Hardware Virtualization
  • More efficient — at least 10 times performance improvement between switching to a monitor inside SIM and switching to a monitor residing in another trusted VM
  • Expandable — new security applications can be built
4882
Aerodynamic Drag Reduction at Low Angles of Attack
  • Substantial drag reduction
3583
Reconfigurable Antenna Array with Multi-Feed Antenna Pixels
  • Enables direct and intuitive programming of RF current distribution, simplifying the setting and prediction of the resulting antenna array pattern
  • Allows broad bandwidth operation, i.e. S-band to X-band operation (2-12 GHz)
  • Easy deployment is made possible by not mandating computationally intensive optimization
6433
Improved Privacy: A Data Security Solution
  • Easy-to-use – Overcomes usability problems and/or server modifications of existing privacy solutions
  • Standalone – Ability to be used as a standalone program that provides better isolation than other products
  • Secure – Allows the provider or online entity to enhance the user’s confidence that the personal data will be not be compromised
6426
Reconfigurable Antennas for Radar Applications
  • Innovative — Origami-based accordion structure enables variable physical deployment of antenna
  • Reconfigurable — Varying extent of physical deployment reconfigures antenna frequency band, radiation pattern, and gain
  • Cost-reductive — Configurability allows for changing complexity of antenna packages
6357
Apparatus and Method for Protecting Log Information
  • Hardware and software to prevent ‘log’ data tampering
  • System logs impenetrable and non-modifiable
  • Disables the ability to remove or tamper with trace data
6327
Self-Steering Transceiver with Autonomous Beam-Forming
  • Simple operation – operates on phased-array and MIMO systems with zero power consumption
  • Autonomous operation – achieves autonomous beam-forming and beam-alignment towards desired signal
  • High sensitivity – performs automatic dynamic tracking and rejection of unknown interference signals
7360
Submersible Vehicle Design Based on Biomimicry of Batoids
  • Extended range: This vehicle’s propulsion system does not require refueling, allowing for long range deployments.
  • Nearly silent: Its limited use of mechanical components reduces the acoustic signature.
  • Highly maneuverable: Scalable system provides three-dimensional maneuvering capabilities
6019
Highly Sensitive Standoff Gas Sensing Using Carbon Nanotubes
  • Extremely sensitive gas sensor based on the change in resonant frequency of circuit caused by interaction of gas molecules with carbon nanotubes
  • CNTs can be functionalized to detect one or more analytes with high specificity
  • Sensor can be manufactured using inkjet printing technologies to reduce costs
5830
Using Hardware "Fingerprints" to Enhance Network Security
  • Long-Term Solution: Because no software client is required, this technique can be used to identify both current and future unmanageable devices.
  • Failsafe: Because it relies on inherently unique signatures tied to hardware’s diverse compositions, component manufacturers, and physical differences, the system is difficult to defeat by unauthorized—or even authorized—users.
  • Reduced Vulnerability: As a network-based solution, this method eliminates the security vulnerabilities associated with software additions at each node.
5818
Liquid Core Patch Antenna with Broadband Frequency Agility
  • Broadband frequency agility that stretches from mid-LF to mid-EHF
  • Adaptable design to products that need significant frequency agility
  • Ability to provide fractional tunable capability of 8.5:1 surpasses the 1.67:1 capability for current reactively tuned patch antennas
5664
Enhanced Information Security Monitoring Using Analog Signals
  • Accurately and precisely perform security monitoring of information and data being used by computer devices and systems
  • Eliminates the need for the security mechanism to be incorporated into the device/system being monitored
  • Capable of functioning without using resources of the device or system being monitored
7110, 6898
'Security Refresh': Protecting Phase-Change Memory
  • Longer memory lifespan — Lifetime is extended by creating even wear-out
  • Versatile — Not limited to PCM, can be applied to any future memory technology that suffers from limited write endurance
  • Secure — Protects against attacks by masking actual data location
5601
Cross-Coupled VCO With Phase Noise Performance
  • Inherently separate device source nodes for the cross-coupled devices with no compromise on the VCO startup condition.
  • The new topology ensures both low phase noise and low DC power.
  • Superior close-in 1/f3 phase noise.
7176
Autonomous Indoor Robotic Blimps
  • Miniature size and low cost
  • Flight duration of more than 3 hours
  • Safe interaction with humans
7136