Search Results - smart+devices

4 Results

Sort By:

  1. There is great interest in camera-based wearables for monitoring human activity. These devices can be used to monitor activity anywhere and at any time. Much of human activity involves the use of hands and often in conjunction with objects. Certain everyday activities, e.g., taking medication or grabbing keys, can be quite complex. These activities...
    Published: 2/13/2025
  2. Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when...
    Published: 2/23/2023
  3. Current portable and wearable devices use fingerprint analysis for secure authentication. The fingerprint pattern systems analyze only the surface morphology of the fingerprint, making it easy for hackers to spoof and bypass authentication. RF signals can collect tissue information beyond the surface of the finger and can provide increased security...
    Published: 2/13/2025
  4. Currently, mobile wireless networks use contention-based protocols because of their simplicity and ability to adapt to changes in network conditions. Unfortunately, these systems lack the ability to prioritize the supply and demand load and changes in topology. This inability can cause variances in or delay of signals that can be important in applications...
    Published: 2/13/2025
    Category(s): Wireless & Networking

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.