# of Displayed Technologies: 5 / 5

Applied Category Filter (Click To Remove): Communications & Networking


Categories

Counterattacking Smart Contract Exploits: An Active Defense Approach
TS-063027 — The Need Smart contracts have revolutionized the way transactions are conducted, but their unique nature makes them susceptible to exploitation. Despite extensive efforts in vulnerability identification, exploitable vulnerabilities persist, resulting in substantial financial losses. To mitigate thi…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Morales, Marcelo
  • Licensing Officer: Mess, David

A Novel MIMO Architecture for Multi-user Power line communication
TS-062843 — This MIMO-PLC architecture is the first scalable MIMO architecture on a single power line. It improves the throughput for power line communication (PLC) by utilizing the existing power delivery infrastructure and allows for high data rates in rural areas.
Home networking and the Internet of Things (IoT), especially voice and video communications, require high throughput, reliable coverage, and sustainable connectivity. However, the performance is dramatically decreased when the wireless signals go through the walls and ceilings. The densely deploye…
  • College: College of Engineering (COE)
  • Inventors: Srinivasan, Kannan; Chen, Bo; Guruvenkata, Vivek; Sun, Wei
  • Licensing Officer: Mess, David

3DScope: Detecting 3D Model Clones
TS-057129 — Algorithm for extracting 3D models, indexing them using a value-insensitive normalization algorithm, and comparing the model indexes to detect cloned 3D models.
The unauthorized copying of 3D models robs designers of property, reduces innovation going into the creation of 3D models, creates liability for entities unknowingly using copied models, and indicates a lapse in IP security. With the vast amount of 3D assets in use, it is infeasible for humans to …
  • College: College of Engineering (COE)
  • Inventors: Zuo, Chaoshun; Lin, Zhiqiang
  • Licensing Officer: Mess, David

Protecting Bluetooth Low Energy from Address Tracking When Using Whitelisting
TS-052807 — Bluetooth Low Energy (BLE) is ubiquitous today due to its extremely low energy consumption and relatively large communication coverage. However, the devices communicated through Bluetooth are subject to address tracking attacks, where a nearby attacker can associate Bluetooth addresses to particul…
  • College: College of Engineering (COE)
  • Inventors: Lin, Zhiqiang; Zhang, Yue
  • Licensing Officer: Mess, David

Turf Whisperer: Location Selective Data Delivery via Low-Power Acoustic Transmissions
TS-037839 — A way to use audio systems to send information to select locations and people, without the public hearing it.
With the advent of digital communications platforms such as mobile devices, information is able is to be disseminated almost instantly, to anywhere in the world. However, some aspects of modern infrastructure have not caught up to the information age, with facilities such as supermarkets and airpo…
  • College: College of Engineering (COE)
  • Inventors: Koksal, C. Emre; Indukuri, Harihara Varma
  • Licensing Officer: Mess, David

Loading icon