TECH OFFER

Wireless Data Transmission via Ultrasound in Metallic/Explosive Environment

KEY INFORMATION

TECHNOLOGY CATEGORY:
Infocomm - Security & Privacy
Infocomm - Networks & Communications
Show more >
TECHNOLOGY READINESS LEVEL (TRL):
LOCATION:
France
ID NUMBER:
TO149300

TECHNOLOGY OVERVIEW

The technology offer presents a wireless data transmission via ultrasound system. The technology transforms any speaker or sound system into a tool for detection, geolocation, authentication and wireless communication. The system allows wireless data transmission in constrained environments where radio waves (e.g., Wi-Fi, cellular and Bluetooth) are not effective or not permitted, such as explosive, defense, electromagnetic-sensitive, metallic and high humidity environment.

TECHNOLOGY FEATURES & SPECIFICATIONS

  • The system allows ultrasound (18.5-21 kHz) to be broadcasted through speakers and is picked up by microphones.
  • An ultrasound modulation which can perform multi-signal detection in a reliable and robust way, with a detection range of up to 80m was designed.
  • The system can be deployed in existing hardware systems (e.g., speaker or sound systems) by installing our proprietary software.
  • The system works wherever radio waves are no longer operational or not allowed.
  • The system allows Man-Machine, Machine-to-Machine (M2M) communications.

POTENTIAL APPLICATIONS

  • Nuclear power plant
  • Petrochemical plant
  • Aerospace
  • Explosive areas
  • Electromagnetic sensitive environment
  • Metallic warehouse
  • Airport broadcasting

Unique Value Proposition

The system is exceptionally useful when radio wave wireless data transmissions, such as Wi-Fi and 4G are not allowed or severely interfered by the environments. The system can be integrated into existing hardware systems, such as speaker and sound systems without inducing much hardware costs. The system allows long-range wireless data transmission of up to 80m in constrained environments.

RELATED TECH OFFERS
High Accuracy NB-IoT-based Tracking Device
Face Anti-Spoofing Technology
Application-to-application Mutual Trust with Identity Attestation
TV White Space Super Wi-Fi
Watermarking Neural Network Models for Proof-of-Ownership
Clinically Validated Mobile-Based Digital Psychotherapy For Stress and Mental Wellbeing
AI-based Android Application Behaviour Surveillance
Synthetically-generated Privacy-preserving Data for Machine Learning
Autonomous Materials Handling System
Mutual Authentication and Key Exchange Protocol for Peer-to-Peer IoT Devices