Search Results - smartphone

3 Results

Sort By:

  1. Smart phones are very popular and used by over seven billion people. Each day seven million dollars worth of cell phones is lost or stolen. Without an authentication device, personal data stored on the device can be used for identity theft or the phone can be used for unauthorized purposes. Most authentication systems authenticate a user only once when...
    Published: 2/23/2023
  2. As electronics become more compact, the issue of electromigration, the accumulation of atoms at the anode of an electronic circuit due to an uneven distribution of current, becomes more prevalent. Devices that undergo electromigration experience physical changes often resulting in short or open circuit failures specifically at the soldering joints....
    Published: 2/13/2025
  3. Currently, mobile wireless networks use contention-based protocols because of their simplicity and ability to adapt to changes in network conditions. Unfortunately, these systems lack the ability to prioritize the supply and demand load and changes in topology. This inability can cause variances in or delay of signals that can be important in applications...
    Published: 2/13/2025
    Category(s): Wireless & Networking

Search Inventions

Looking for a technology or invention to commercialize? Arizona State University has more than 300 technologies available for licensing. Start your search here or submit your own invention.