WorldWideScience

Sample records for optical security devices

  1. Combined optical/digital security devices

    Science.gov (United States)

    Girnyk, Vladimir I.; Tverdokhleb, Igor V.; Ivanovsky, Andrey A.

    2000-04-01

    Modern holographic security devices used as emblems against counterfeiting are being more difficult as they should oppress criminal world. 2D, 3D, 3D rainbow holograms or simple diffraction structures protecting documents can not be acceptable against illegal copying of important documents, banknotes or valuable products. Recent developments in technology of Optical variable devices permit world leaders to create more advanced security elements: Kinegrams, Exelgrams, Pixelgrams, Kineforms. These products are used for protecting the most confidential documents and banknotes, but now even their security level can not be enough and besides their automatic identification is vulnerable to factors of instability. We elaborate new visual security devices based on the usage of expensive and advanced technology of combined optical/digital security devices. The technology unites digital and analogue methods of synthesis and recording of visual security devices. The analogue methods include techniques of optical holography - different combinations of 2D/3D, 3D, 2D/3D + 3D structures. Basing on them the design with elements of 3D graphics including security elements and hidden machine- readable images are implemented. The digital methods provide synthesis of optical variable devices including special security elements, computer generated holograms and Kineforms. Using them we create determined and quasi-random machine-readable images. Recordings are carried out using the combined optical and electronic submicrometer technology elaborated by Optronics, Ltd. The results obtained show effectiveness of the combined technology permitting to increase the security level essentially that should increase tamper and counterfeit resistance during many years.

  2. Non-diffractive optically variable security devices

    NARCIS (Netherlands)

    Renesse, R.L. van

    1991-01-01

    At the past optical security conferences attention was focused on diffractive structures, e.g. holograms, embossed gratings and thin—film devices, as security elements on valuable documents. The main reasons for this emphasis are, that the iridescent effect of such diffractive optically variable

  3. Diffractive optical variable image devices generated by maskless interferometric lithography for optical security

    Science.gov (United States)

    Cabral, Alexandre; Rebordão, José M.

    2011-05-01

    In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.

  4. Embossing of optical document security devices

    Science.gov (United States)

    Muke, Sani

    2004-06-01

    Embossing in the transparent window area of polymer banknotes, such as those seen on the Australian, New Zealand and Romanian currencies, have enormous potential for the development of novel optical security devices. The intaglio printing process can provide an efficient means for embossing of optical security structures such as micro lenses. Embossed micro lens arrays in the transparent window of a polymer banknote can be folded over a corresponding printed image array elsewhere on the note to reveal a series of moire magnified images. Analysis of samples of embossed micro lenses showed that the engraving side and impression side had a similar embossed profile. The embossed micro lens profiles were modelled using Optalix-LX commercial optical ray tracing software in order to determine the focal length of the lenses and compare with the focal length of desired embossed lenses. A fundamental understanding of how the polymer deforms during the embossing process is critical towards developing a micro lens embossing tool which can achieve the desired embossed micro lenses. This work also looks at extending the early research of the Intaglio Research Group (IRG) to better understand the embossibility of polymer substrates such as biaxially oriented polypropylene (BOPP).

  5. Development and applications of diffractive optical security devices for banknotes and high value documents

    Science.gov (United States)

    Drinkwater, John K.; Holmes, Brian W.; Jones, Keith A.

    2000-04-01

    Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.

  6. Optical security devices using nonuniform schlieren texture of UV-curable nematic liquid crystal.

    Science.gov (United States)

    Nakayama, Keizo; Ohtsubo, Junji

    2016-02-10

    We proposed and quantitatively evaluated an optical security device that provides nonuniform or random patterns of schlieren texture in nematic liquid crystal as unique identification information with a design by employing computer image processing and normalized cross correlation. Using the same photomask as the first author's university logo, the written patterns, which were composed of polymerized isotropic areas and polymerized nematic areas, were stable among different cells. Judging from the maximum correlation coefficient of 0.09, the patterns of the schlieren texture were unique in different cells. These results indicate that photocurable nematic liquid crystal materials have the potential to be applied to security devices for anticounterfeiting measures.

  7. Optical and tribomechanical stability of optically variable interference security devices prepared by dual ion beam sputtering.

    Science.gov (United States)

    Çetinörgü-Goldenberg, Eda; Baloukas, Bill; Zabeida, Oleg; Klemberg-Sapieha, Jolanta; Martinu, Ludvik

    2011-07-01

    Optical security devices applied to banknotes and other documents are exposed to different types of harsh environments involving the cycling of temperature, humidity, chemical agents, and tribomechanical intrusion. In the present work, we study the stability of optically variable devices, namely metameric interference filters, prepared by dual ion beam sputtering onto polycarbonate and glass substrates. Specifically, we assess the color difference as well as the changes in the mechanical properties and integrity of all-dielectric and metal-dielectric systems due to exposure to bleach, detergent and acetone agents, and heat and humidity. The results underline a significant role of the substrate material, of the interfaces, and of the nature and microstructure of the deposited films in long term stability under everyday application conditions.

  8. Method and device for detecting impact events on a security barrier which includes a hollow rebar allowing insertion and removal of an optical fiber

    Science.gov (United States)

    Pies, Ross E.

    2016-03-29

    A method and device for the detection of impact events on a security barrier. A hollow rebar is farmed within a security barrier, whereby the hollow rebar is completely surrounded by the security barrier. An optical fiber passes through the interior of the hollow rebar. An optical transmitter and an optical receiver are both optically connected to the optical fiber and connected to optical electronics. The optical electronics are configured to provide notification upon the detection of an impact event at the security barrier based on the detection of disturbances within the optical fiber.

  9. Optical Imaging Sensors and Systems for Homeland Security Applications

    CERN Document Server

    Javidi, Bahram

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. Optical Imaging Sensors and Systems for Homeland Security Applications presents original and significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification and anti-counterfeiting. The chapters have recent and technically significant results, ample illustrations, figures, and key references. This book is intended for engineers and scientists in the relevant fields, graduate students, industry managers, university professors, government managers, and policy makers. Advanced Sciences and Technologies for Security Applications focuses on research monographs in the areas of -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection (including bios...

  10. Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

    Science.gov (United States)

    Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan

    2014-10-01

    In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

  11. Photonic layer security in fiber-optic networks and optical OFDM transmission

    Science.gov (United States)

    Wang, Zhenxing

    Currently the Internet is experiencing an explosive growth in the world. Such growth leads to an increased data transmission rate demand in fiber-optical networks. Optical orthogonal frequency multiplexing (OFDM) is considered as a promising solution to achieve data rate beyond 100Gb/s per wavelength channel. In the meanwhile, because of extensive data transmission and sharing, data security has become an important problem and receives considerable attention in current research literature. This thesis focuses on data security issues at the physical layer of optical networks involving code-division multiple access (CDMA) systems and steganography methods. The thesis also covers several implementation issues in optical OFDM transmission. Optical CDMA is regarded as a good candidate to provide photonic layer security in multi-access channels. In this thesis we provide a systematic analysis of the security performance of incoherent optical CDMA codes. Based on the analysis, we proposed and experimentally demonstrated several methods to improve the security performance of the optical CDMA systems, such as applying all-optical encryption, and code hopping using nonlinear wavelength conversion. Moreover, we demonstrate that the use of wireless CDMA codes in optical systems can enhance the security in one single-user end-to-end optical channel. Optical steganography is another method to provide photonic data security and involves hiding the existence of data transmissions. In the thesis, we demonstrate that an optical steganography channel can exist in phase modulated public channels as well as traditional on-off-keying (OOK) modulated channels, without data synchronization. We also demonstrate an optical steganography system with enhanced security by utilizing temporal phase modulation techniques. Additionally, as one type of an overlay channel, the optical steganography technology can carry the sensor data collected by wireless sensor network on top of public optical

  12. Protection of data carriers using secure optical codes

    Science.gov (United States)

    Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.

    2006-02-01

    Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.

  13. Thin film-based optically variable security devices: From passive to active

    Science.gov (United States)

    Baloukas, Bill

    Counterfeiting costs the world economy billions of dollars every year. Aside from financial losses, counterfeiting also poses a great threat to the public's safety, for example through the existence of counterfeit passports (terrorism), pharmaceutical products (health hazards) and even airplane parts (safety issues). Optical security devices (OSDs) have therefore played a critical role in the fight against counterfeiting. It is the aim of the present thesis to show that through the use of metamerism and electrochromic materials, new types of active security devices with interesting features can be created; indeed, most present-day devices are passive in nature. I first demonstrate that the addition of metamerism in the design of interference filters can result in innovative features. Different structures which can be used in transmission and/or in reflection are designed, fabricated, and evaluated. The first structures which are presented here are based on a combination of two different metameric interference filters. Possessing widely different transmission spectra, these filters also offer different angular color shifts and, as a result, offer an opportunity of creating hidden image effects. Despite their interesting properties, such metameric devices are shown to be highly illuminant and observer sensitive; that is the color match is lost under most observation conditions. These issues are solved by a simpler structure based on the juxtaposition of an interference filter and a non-iridescent colored material. Throughout this study, I present the design approach, analyze the filters' sensitivity to deposition errors, and evaluate the performance of prototype devices prepared by dual ion beam sputtering. Following my work on passive metameric systems, I then propose to go one step further by implementing an active component using an electrochromic material. This novel concept, which is based on the joint use of a metameric filter and electrochromic device, offers

  14. Optical security based on near-field processes at the nanoscale

    International Nuclear Information System (INIS)

    Naruse, Makoto; Tate, Naoya; Ohtsu, Motoichi

    2012-01-01

    Optics has been playing crucial roles in security applications ranging from authentication and watermarks to anti-counterfeiting. However, since the fundamental physical principle involves optical far-fields, or propagating light, diffraction of light causes severe difficulties, for example in device scaling and system integration. Moreover, conventional security technologies in use today have been facing increasingly stringent demands to safeguard against threats such as counterfeiting of holograms, requiring innovative physical principles and technologies to overcome their limitations. Nanophotonics, which utilizes interactions between light and matter at the nanometer scale via optical near-field interactions, can break through the diffraction limit of conventional propagating light. Moreover, nanophotonics has some unique physical attributes, such as localized optical energy transfer and the hierarchical nature of optical near-field interactions, which pave the way for novel security functionalities. This paper reviews the physical principles and describes some experimental demonstrations of systems based on nanophotonics with respect to security applications such as tamper resistance against non-invasive and invasive attacks, hierarchical information retrieval, hierarchical holograms, authentication, and traceability. (paper)

  15. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  16. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  17. Progress in Nano-Electro-Optics VII Chemical, Biological, and Nanophotonic Technologies for Nano-Optical Devices and Systems

    CERN Document Server

    Ohtsu, Motoichi

    2010-01-01

    This book focuses on chemical and nanophotonic technology to be used to develop novel nano-optical devices and systems. It begins with temperature- and photo-induced phase transition of ferromagnetic materials. Further topics include: energy transfer in artificial photosynthesis, homoepitaxial multiple quantum wells in ZnO, near-field photochemical etching and nanophotonic devices based on a nonadiabatic process and optical near-field energy transfer, respectively and polarization control in the optical near-field for optical information security. Taken as a whole, this overview will be a valuable resource for engineers and scientists working in the field of nano-electro-optics.

  18. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  19. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  20. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  1. Electronic security device

    Science.gov (United States)

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  2. Electronic security device

    International Nuclear Information System (INIS)

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-01-01

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs

  3. Hybrid optical security system using photonic crystals and MEMS devices

    Science.gov (United States)

    Ciosek, Jerzy; Ostrowski, Roman

    2017-10-01

    An important issue in security systems is that of selection of the appropriate detectors or sensors, whose sensitivity guarantees functional reliability whilst avoiding false alarms. Modern technology enables the optimization of sensor systems, tailored to specific risk factors. In optical security systems, one of the safety parameters considered is the spectral range in which the excitation signal is associated with a risk factor. Advanced safety systems should be designed taking into consideration the possible occurrence of, often multiple, complex risk factors, which can be identified individually. The hazards of concern in this work are chemical warfare agents and toxic industrial compounds present in the forms of gases and aerosols. The proposed sensor solution is a hybrid optical system consisting of a multi-spectral structure of photonic crystals associated with a MEMS (Micro Electro-Mechanical System) resonator. The crystallographic structures of carbon present in graphene rings and graphenecarbon nanotube nanocomposites have properties which make them desirable for use in detectors. The advantage of this system is a multi-spectral sensitivity at the same time as narrow-band selectivity for the identification of risk factors. It is possible to design a system optimized for detecting specified types of risk factor from very complex signals.

  4. Combined machine-readable and visually authenticated optical devices

    Science.gov (United States)

    Souparis, Hugues

    1996-03-01

    Optical variable devices are now widely used on documents or values. The most recent optical visual features with high definition, animation, brightness, special color tune, provide excellent first and second levels of authentication. Human eye is the only instrument required to check the authenticity. This is a major advantage of OVDs in many circumstances, such as currency exchange, ID street control . . . But, under other circumstances, such as automatic payments with banknotes, volume ID controls at boarders, ID controls in shops . . . an automatic authentication will be necessary or more reliable. When both a visual and automated authentication are required, the combination, on the same security component, of a variable image and a machine readable optical element is a very secure and cost effective solution for the protection of documents. Several techniques are now available an can be selected depending upon the respective roles of the machine readability and visual control.

  5. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  6. Holographic optical security systems

    Science.gov (United States)

    Fagan, William F.

    1990-06-01

    One of the most successful applications of Holography,in recent years,has been its use as an optical security technique.Indeed the general public's awareness of holograms has been greatly enhanced by the incorporation of holographic elements into the VISA and MASTERCHARGE credit cards.Optical techniques related to Holography,are also being used to protect the currencies of several countries against the counterfeiter. The mass production of high quality holographic images is by no means a trivial task as a considerable degree of expertise is required together with an optical laboratory and embossing machinery.This paper will present an overview of the principal holographic and related optical techniques used for security purposes.Worldwide, over thirty companies are involved in the production of security elements utilising holographic and related optical technologies.Counterfeiting of many products is a major criminal activity with severe consequences not only for the manufacturer but for the public in general as defective automobile parts,aircraft components,and pharmaceutical products, to cite only a few of the more prominent examples,have at one time or another been illegally copied.

  7. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. 76 FR 15368 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-03-21

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... security devices and procedures to discourage robberies, burglaries, and larcenies, and to assist in the...

  10. Securing IoT Devices at CERN

    CERN Multimedia

    CERN. Geneva

    2018-01-01

    CERN has more than 1000 Internet of Things (IoT) devices, which are connected to the office network. We have been doing the research to find all vulnerable IoT devices in CERN and mitigated them. We are currently working on detecting IoT devices automatically and, moreover, identifying the manufacturer, model and the running firmware version. This will help the CERN Computer Security Team to spot vulnerable devices and to show the security risks associated with them.

  11. 76 FR 30243 - Minimum Security Devices and Procedures

    Science.gov (United States)

    2011-05-24

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A... respect to the installation, maintenance, and operation of security devices and procedures to discourage...

  12. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  13. Active fiber optic technologies used as tamper-indicating devices

    International Nuclear Information System (INIS)

    Horton, P.R.V.; Waddoups, I.G.

    1995-11-01

    The Sandia National Laboratories (SNL) Safeguards and Seals Evaluation Program is evaluating new fiber optic active seal technologies for use at Department of Energy (DOE) facilities. The goal of the program is to investigate active seal technologies that can monitor secured containers storing special nuclear materials (SNM) within DOE vaults. Specifically investigated were active seal technologies that can be used as tamper-indicating devices to monitor secured containers within vaults while personnel remain outside the vault area. Such a system would allow minimal access into vaults while ensuring container content accountability. The purpose of this report is to discuss tamper-indicating devices that were evaluated for possible DOE use. While previous seal evaluations (Phase I and II) considered overall facility applications, this discussion focuses specifically on their use in vault storage situations. The report will highlight general background information, specifications and requirements, and test procedures. Also discussed are the systems available from four manufacturers: Interactive Technologies, Inc., Fiber SenSys, Inc., Inovonics, Inc., and Valve Security Systems

  14. Mobile Device Security: Perspectives of Future Healthcare Workers.

    Science.gov (United States)

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  15. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  16. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  17. Implantable Medical Devices; Networking Security Survey

    Directory of Open Access Journals (Sweden)

    Siamak Aram

    2016-08-01

    Full Text Available The industry of implantable medical devices (IMDs is constantly evolving, which is dictated by the pressing need to comprehensively address new challenges in the healthcare field. Accordingly, IMDs are becoming more and more sophisticated. Not long ago, the range of IMDs’ technical capacities was expanded, making it possible to establish Internet connection in case of necessity and/or emergency situation for the patient. At the same time, while the web connectivity of today’s implantable devices is rather advanced, the issue of equipping the IMDs with sufficiently strong security system remains unresolved. In fact, IMDs have relatively weak security mechanisms which render them vulnerable to cyber-attacks that compromise the quality of IMDs’ functionalities. This study revolves around the security deficiencies inherent to three types of sensor-based medical devices; biosensors, insulin pump systems and implantable cardioverter defibrillators. Manufacturers of these devices should take into consideration that security and effectiveness of the functionality of implants is highly dependent on the design. In this paper, we present a comprehensive study of IMDs’ architecture and specifically investigate their vulnerabilities at networking interface.

  18. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  19. Optical and digital techniques for information security

    CERN Document Server

    2005-01-01

    Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications. This book encompases the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This Information Security book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies that can be applied to information security issues. The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of: -Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems) -Biological and chemical threat detection...

  20. Photometric device using optical fibers

    International Nuclear Information System (INIS)

    Boisde, Gilbert; Perez, J.-J.

    1981-02-01

    Remote measurements in radioactive environment are now possible with optical fibers. Measurement instruments developed by CEA are constitued of: - an optical probe (5 mm to 1 meter optical path length), - a photometric measurement device, - optical fiber links. 'TELEPHOT' is a photometric device for industrial installations. It is uses interferentiel filters for 2 to 5 simultaneous wave lengths. 'CRUDMETER' measures the muddiness of water. It can be equipped with a high sensitivity cell of 50 cm optical path length tested up to 250 bars. Coupling a double beam spectrophotometer to a remote optical probe, up to 1 meter optical path length, is carried out by means of an optical device using optical fibers links, eventually several hundred meter long. For these equipments special step index large core fibers, 1 to 1.5 mm in diameter, have been developed as well connectors. For industrial control and research these instruments offer new prospect thanks to optical fibers use [fr

  1. Semi-device-independent security of one-way quantum key distribution

    OpenAIRE

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being 'device-independent'. Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but t...

  2. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  3. Optical encryption and QR codes: secure and noise-free information retrieval.

    Science.gov (United States)

    Barrera, John Fredy; Mira, Alejandro; Torroba, Roberto

    2013-03-11

    We introduce for the first time the concept of an information "container" before a standard optical encrypting procedure. The "container" selected is a QR code which offers the main advantage of being tolerant to pollutant speckle noise. Besides, the QR code can be read by smartphones, a massively used device. Additionally, QR code includes another secure step to the encrypting benefits the optical methods provide. The QR is generated by means of worldwide free available software. The concept development probes that speckle noise polluting the outcomes of normal optical encrypting procedures can be avoided, then making more attractive the adoption of these techniques. Actual smartphone collected results are shown to validate our proposal.

  4. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  5. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  6. Optical security features for plastic card documents

    Science.gov (United States)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  7. Device for selectively securing an object to a shaft

    International Nuclear Information System (INIS)

    Calizano, F.; Chauvel, M.

    1984-01-01

    A magnetic tape reel is secured to a reel drive motor shaft by a device including a hub secured to the shaft, a plurality of shoes, and actuating means for thrusting the shoes against the reel and for releasing them from contact with the reel. The securing device includes a cam mounted on the shaft in combination with a locking device including the cam periphery. The locking device thrusts the shoes against the object and is operated by rotation of the motor. The cam is immobilized in rotation while the shoes are locked

  8. Semi-device-independent security of one-way quantum key distribution

    International Nuclear Information System (INIS)

    Pawlowski, Marcin; Brunner, Nicolas

    2011-01-01

    By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ''device-independent.'' Here we ask whether such a strong form of security could also be established for one-way (prepare and measure) QKD. While fully device-independent security is impossible, we show that security can be guaranteed against individual attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are noncharacterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses, and random-access codes.

  9. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  10. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  11. Advanced synthetic holograms for security purposes

    Science.gov (United States)

    Kotačka, Libor; Vízdal, Petr; Behounek, Tomás

    2009-05-01

    Our paper deals with the recent advances in synthetically written optical security devices (DOVIDs) and holograms. The synthesized holographic security elements are recorded with a resolution reaching 500.000 dpi and are specially developed for the "layman-level" security of the most important state valuables and documents, like banknotes and identity cards. We especially pay an attention to such holographic features being impossible to originate through conventional optical holography of matrix based devices.

  12. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Science.gov (United States)

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  13. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    Science.gov (United States)

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  14. Security of Mobile Devices and Wi-Fi Networks

    OpenAIRE

    Hong, Zimeng

    2015-01-01

    Along with the progress of times and the development of science and technology, mobile devices have become more and more popular. At the same time, an increasing number of Wi-Fi networks are being built for the demand of mobile devices. Therefore, the security between mobile devices and Wi-Fi networks became a main object in the IT area. The purpose of the thesis is to analyze security threats and give relative advises for all the mobile device and Wi-Fi network users. The thesis mainly ta...

  15. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  16. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    International Nuclear Information System (INIS)

    McKague, Matthew

    2009-01-01

    Device independent quantum key distribution (QKD) aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al (2009 New J. Phys. 11 045021) applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al and techniques adapted from Renner.

  17. On the security of semi-device-independent QKD protocols

    Science.gov (United States)

    Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin

    2018-06-01

    While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.

  18. Exploring a New Security Framework for Remote Patient Monitoring Devices

    Directory of Open Access Journals (Sweden)

    Brian Ondiege

    2017-02-01

    Full Text Available Security has been an issue of contention in healthcare. The lack of familiarity and poor implementation of security in healthcare leave the patients’ data vulnerable to attackers. The main issue is assessing how we can provide security in an RPM infrastructure. The findings in literature show there is little empirical evidence on proper implementation of security. Therefore, there is an urgent need in addressing cybersecurity issues in medical devices. Through the review of relevant literature in remote patient monitoring and use of a Microsoft threat modelling tool, we identify and explore current vulnerabilities and threats in IEEE 11073 standard devices to propose a new security framework for remote patient monitoring devices. Additionally, current RPM devices have a limitation on the number of people who can share a single device, therefore, we propose the use of NFC for identification in Remote Patient Monitoring (RPM devices for multi-user environments where we have multiple people sharing a single device to reduce errors associated with incorrect user identification. We finally show how several techniques have been used to build the proposed framework.

  19. Security Issues for Information Quality on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Dana Ramona ANDRISESCU

    2010-01-01

    Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.

  20. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2014-01-01

    Full Text Available After two recent security attacks against implantable medical devices (IMDs have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient’s life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician’s treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  1. The role of optics in secure credentials

    Science.gov (United States)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  2. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  3. Health care professionals’ perception of security of personal health devices

    Directory of Open Access Journals (Sweden)

    Ondiege B

    2017-04-01

    Full Text Available Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning their privacy, data, and health. Eight health care professionals were interviewed to determine their perceptions and knowledge of security in health care. The research further examines one specific aspect of security which is considered of significant concern: the authenticity of a device being from the actual manufacturer and not a counterfeit. This research proposes device registration together with digital signatures and one-time passwords to address the issue of counterfeit remote patient-monitoring devices and identify and authenticate the user of the device. Keywords: telehealth security, health care professionals’ perception, personal health device, authentication

  4. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    Science.gov (United States)

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  5. Metro Optical Networks for Homeland Security

    Science.gov (United States)

    Bechtel, James H.

    Metro optical networks provide an enticing opportunity for strengthening homeland security. Many existing and emerging fiber-optic networks can be adapted for enhanced security applications. Applications include airports, theme parks, sports venues, and border surveillance systems. Here real-time high-quality video and captured images can be collected, transported, processed, and stored for security applications. Video and data collection are important also at correctional facilities, courts, infrastructure (e.g., dams, bridges, railroads, reservoirs, power stations), and at military and other government locations. The scaling of DWDM-based networks allows vast amounts of data to be collected and transported including biometric features of individuals at security check points. Here applications will be discussed along with potential solutions and challenges. Examples of solutions to these problems are given. This includes a discussion of metropolitan aggregation platforms for voice, video, and data that are SONET compliant for use in SONET networks and the use of DWDM technology for scaling and transporting a variety of protocols. Element management software allows not only network status monitoring, but also provides optimized allocation of network resources through the use of optical switches or electrical cross connects.

  6. Optical analog transmission device

    International Nuclear Information System (INIS)

    Ikawa, Shinji.

    1994-01-01

    The present invention concerns a device such as electro-optical conversion elements, optoelectric-electric elements and optical transmission channel, not undergoing deleterious effects on the efficiency of conversion and transmission due to temperature, and aging change. That is, a sine wave superposing means superposes, on a detector signal to be transmitted, a sine-wave signal having a predetermined amplitude and at a frequency lower than that of the detector signal. An optoelectric conversion means converts the electric signal as the signal of the sine-wave signal superposing means into an optical signal and outputs the same to an optical transmitting channel. The optoelectric conversion means converts the transmitted signal to an electric signal. A discriminating means discriminates the electric signal into a detector signal and a sine-wave signal. A calculating means calculates an optical transmitting efficiency of the transmitting channel based on the amplitude of the discriminated sine-wave signal. A processing means compensates an amplitude value of the detector signals discriminated by the discriminating means based on the optical transmission efficiency. As a result, an optical analog transmission device can be attained, which conducts optical transmission at a high accuracy without undergoing the defective effects of the optical transmission efficiency. (I.S.)

  7. Security risks arising from portable storage devices

    CSIR Research Space (South Africa)

    Molotsi, K

    2012-10-01

    Full Text Available of the security risks arising from the use of PSDs, and further provides possible security countermeasures to help organisations and users to protect their digital assets. APPROACH Literature review: ? To investigate security risks posed by PSDs... technology in the workplace. International Journal of Electronic Security and Digital Forensics. 3(1): 73?81 [3] Kim, K., Kim, E. & Hong S. (2009). Privacy information protection in portable device. Proceedings of International Conference on Convergence...

  8. Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Chen Rui-Ke; Zhou Chun; Jiang Mu-Sheng; Li Hong-Wei

    2017-01-01

    Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie’s mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations . (paper)

  9. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  10. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  11. Field-Programmable Logic Devices with Optical Input Output

    Science.gov (United States)

    Szymanski, Ted H.; Saint-Laurent, Martin; Tyan, Victor; Au, Albert; Supmonchai, Boonchuay

    2000-02-01

    A field-programmable logic device (FPLD) with optical I O is described. FPLD s with optical I O can have their functionality specified in the field by means of downloading a control-bit stream and can be used in a wide range of applications, such as optical signal processing, optical image processing, and optical interconnects. Our device implements six state-of-the-art dynamically programmable logic arrays (PLA s) on a 2 mm 2 mm die. The devices were fabricated through the Lucent Technologies Advanced Research Projects Agency Consortium for Optical and Optoelectronic Technologies in Computing (Lucent ARPA COOP) workshop by use of 0.5- m complementary metal-oxide semiconductor self-electro-optic device technology and were delivered in 1998. All devices are fully functional: The electronic data paths have been verified at 200 MHz, and optical tests are pending. The device has been programmed to implement a two-stage optical switching network with six 4 4 crossbar switches, which can realize more than 190 10 6 unique programmable input output permutations. The same device scaled to a 2 cm 2 cm substrate could support as many as 4000 optical I O and 1 Tbit s of optical I O bandwidth and offer fully programmable digital functionality with approximately 110,000 programmable logic gates. The proposed optoelectronic FPLD is also ideally suited to realizing dense, statically reconfigurable crossbar switches. We describe an attractive application area for such devices: a rearrangeable three-stage optical switch for a wide-area-network backbone, switching 1000 traffic streams at the OC-48 data rate and supporting several terabits of traffic.

  12. A Systematic Approach for Understanding and Modeling the Performance of Network Security Devices

    OpenAIRE

    Beyene, Yordanos

    2014-01-01

    In this dissertation, we attempt to understand and predict the performance of security devices. More specifically, we examine the following types of questions: (a) Given a security device, and a traffic load, can we predict the performance of the device? (b) Given a traffic load and a security device, how can we tune the performance of the device to achieve the desired trade-off between security and performance? We consider both stateful firewalls and Network Intrusion Prevention systems (NIP...

  13. Secure Communications with Mobile Devices During In-Field Activities

    International Nuclear Information System (INIS)

    Partee, M.S.; Moser, F.

    2015-01-01

    One of the classic problems in information security is how to exchange confidential information securely in uncontrolled environments. There have been innumerable academic and commercial hours spent resolving this question. In traditional practice, securing communications meant investing in satellites, specialized hardware, rigorous security engineering and testing, and expending a lot of resources. For this reason, smaller organizations have often been unable to secure communications. The widespread adoption of mobile communications and the modern mobile device has brought about unprecedented abilities to stay connected with colleagues during work activities. As connectedness has increased, so have the opportunities for information compromise. The enormous mobile landscape, with competing ecosystems, large research and product development budgets, proliferating devices, and rapidly-shifting technical foundations prove to be a tremendous source of both opportunity and risk. With the reality of shrinking budgets and increasing threats, many organizations, commercial enterprises, and product vendors are looking for new ways to utilize existing resources for secure communications and mobile work capabilities. Keeping communications private and secure using the infrastructure of the world's telecommunications network and standard computing and mobile devices is the challenge. This paper will examine some methods for communicating securely using consumer mobile products and evaluate the risk such tools can present to an organization in the context of inspection work in the field. (author)

  14. Optical Regeneration and Noise in Semiconductor Devices

    DEFF Research Database (Denmark)

    Öhman, Filip

    2005-01-01

    In this report all-optical 2R-regeneration in optical communication systems is investigated. A simple regenerator device based on concatenated semiconductor optical amplifiers (SOAs) and electro absorbers (EAs) is introduced and examined. Experiments show that the monolithic SOA-EA 2R-regenerator......In this report all-optical 2R-regeneration in optical communication systems is investigated. A simple regenerator device based on concatenated semiconductor optical amplifiers (SOAs) and electro absorbers (EAs) is introduced and examined. Experiments show that the monolithic SOA-EA 2R...

  15. 5th International Workshop on Information Optics

    CERN Document Server

    Javidi, Bahram; Vallmitjana, Santiago

    2006-01-01

    Optical and photonic systems and devices have significant potential for homeland security. This title presents significant technical contributions from leaders of industry, government, and academia in the field of optical and photonic sensors, systems and devices for detection, identification, prevention, sensing, security, verification, and more.

  16. Optical network security using unipolar Walsh code

    Science.gov (United States)

    Sikder, Somali; Sarkar, Madhumita; Ghosh, Shila

    2018-04-01

    Optical code-division multiple-access (OCDMA) is considered as a good technique to provide optical layer security. Many research works have been published to enhance optical network security by using optical signal processing. The paper, demonstrates the design of the AWG (arrayed waveguide grating) router-based optical network for spectral-amplitude-coding (SAC) OCDMA networks with Walsh Code to design a reconfigurable network codec by changing signature codes to against eavesdropping. In this paper we proposed a code reconfiguration scheme to improve the network access confidentiality changing the signature codes by cyclic rotations, for OCDMA system. Each of the OCDMA network users is assigned a unique signature code to transmit the information and at the receiving end each receiver correlates its own signature pattern a(n) with the receiving pattern s(n). The signal arriving at proper destination leads to s(n)=a(n).

  17. Hardware Module for the Security Enhancement of Optical Telecom Network Equipment

    International Nuclear Information System (INIS)

    Nadeem; Ali, M.

    2015-01-01

    The telecommunication equipment physical security threats have increased not only in Pakistan but also anywhere in the world and hence, reducing the revenue. This new challenging and alarming situation is created for the telecom network provider. The main focus of this paper is to provide a low cost economical design for reducing the theft of the costly telecommunication equipment like optical network units (ONU). This system is based on instant messaging on the mobile in the event of theft through GSM modem. The proposed security module is dynamic, flexible and can also be integrated in the existing networks and separately having its own independent low power consumption source. The module will continuously work successfully under different scenarios such as completely isolated from other devices by power break down or by fibre cut. (author)

  18. Optical modeling and simulation of thin-film photovoltaic devices

    CERN Document Server

    Krc, Janez

    2013-01-01

    In wafer-based and thin-film photovoltaic (PV) devices, the management of light is a crucial aspect of optimization since trapping sunlight in active parts of PV devices is essential for efficient energy conversions. Optical modeling and simulation enable efficient analysis and optimization of the optical situation in optoelectronic and PV devices. Optical Modeling and Simulation of Thin-Film Photovoltaic Devices provides readers with a thorough guide to performing optical modeling and simulations of thin-film solar cells and PV modules. It offers insight on examples of existing optical models

  19. Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures

    Directory of Open Access Journals (Sweden)

    Xin Su

    2018-01-01

    Full Text Available Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment-IoT-based number of connected devices is quite different to the previous traditional desktop PC- or mobile-based environment. Based on the IoT, different kinds of smart and mobile devices are fully connected automatically via device controller, such as smartphone. Therefore, controller must be secure compared to conventional security mechanism. According to the existing security threats, these are quite different from the previous ones. Thus, the countermeasures applied should be changed. However, the smart device-based authentication techniques that have been proposed to date are not adequate in terms of usability and security. From the viewpoint of usability, the environment is based on mobility, and thus devices are designed and developed to enhance their owners’ efficiency. Thus, in all applications, there is a need to consider usability, even when the application is a security mechanism. Typically, mobility is emphasized over security. However, considering that the major characteristic of a device controller is deeply related to its owner’s private information, a security technique that is robust to all kinds of attacks is mandatory. In this paper, we focus on security. First, in terms of security achievement, we investigate and categorize conventional attacks and emerging issues and then analyze conventional and existing countermeasures, respectively. Finally, as countermeasure concepts, we propose several representative methods.

  20. Are wearable devices ready for HTTPS? Measuring the cost of secure communication protocols on wearable devices

    OpenAIRE

    Kolamunna, Harini; Chauhan, Jagmohan; Hu, Yining; Thilakarathna, Kanchana; Perino, Diego; Makaroff, Dwight; Seneviratne, Aruna

    2016-01-01

    The majority of available wearable devices require communication with Internet servers for data analysis and storage, and rely on a paired smartphone to enable secure communication. However, wearable devices are mostly equipped with WiFi network interfaces, enabling direct communication with the Internet. Secure communication protocols should then run on these wearables itself, yet it is not clear if they can be efficiently supported. In this paper, we show that wearable devices are ready for...

  1. Printed polymer photonic devices for optical interconnect systems

    Science.gov (United States)

    Subbaraman, Harish; Pan, Zeyu; Zhang, Cheng; Li, Qiaochu; Guo, L. J.; Chen, Ray T.

    2016-03-01

    Polymer photonic device fabrication usually relies on the utilization of clean-room processes, including photolithography, e-beam lithography, reactive ion etching (RIE) and lift-off methods etc, which are expensive and are limited to areas as large as a wafer. Utilizing a novel and a scalable printing process involving ink-jet printing and imprinting, we have fabricated polymer based photonic interconnect components, such as electro-optic polymer based modulators and ring resonator switches, and thermo-optic polymer switch based delay networks and demonstrated their operation. Specifically, a modulator operating at 15MHz and a 2-bit delay network providing up to 35.4ps are presented. In this paper, we also discuss the manufacturing challenges that need to be overcome in order to make roll-to-roll manufacturing practically viable. We discuss a few manufacturing challenges, such as inspection and quality control, registration, and web control, that need to be overcome in order to realize true implementation of roll-to-roll manufacturing of flexible polymer photonic systems. We have overcome these challenges, and currently utilizing our inhouse developed hardware and software tools, <10μm alignment accuracy at a 5m/min is demonstrated. Such a scalable roll-to-roll manufacturing scheme will enable the development of unique optoelectronic devices which can be used in a myriad of different applications, including communication, sensing, medicine, security, imaging, energy, lighting etc.

  2. Secure data exchange between intelligent devices and computing centers

    Science.gov (United States)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  3. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  4. Design issues for semi-passive optical communication devices

    Science.gov (United States)

    Glaser, I.

    2007-09-01

    Optical smart cards are devices containing a retro-reflector, light modulator, and some computing and data storage capabilities to affect semi-passive communication. They do not produce light; instead they modulate and send back light received from a stationary unit. These devices can replace contact-based smart cards as well as RF based ones for applications ranging from identification to transmitting and validating data. Since their transmission is essentially focused on the receiving unit, they are harder to eavesdrop than RF devices, yet need no physical contact or alignment. In this paper we explore optical design issues of these devices and estimate their optical behavior. Specifically, we analyze how these compact devices can be optimized for selected application profiles. Some of the key parameters addressed are effective light efficiency (how much modulated signal can be received by the stationary unit given the amount of light it transmits), range of tilt angles (angle between device surface normal to the line connecting the optical smart card with the stationary unit) through which the device would be effective, and power requirements of the semi-passive unit. In addition, issues concerning compact packaging of this device are discussed. Finally, results of the analysis are employed to produce a comparison of achievable capabilities of these optical smart cards, as opposed to alternative devices, and discuss potential applications were they can be best utilized.

  5. Device-independent two-party cryptography secure against sequential attacks

    International Nuclear Information System (INIS)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation. (paper)

  6. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  7. Magneto-optical non-reciprocal devices in silicon photonics

    Directory of Open Access Journals (Sweden)

    Yuya Shoji

    2014-01-01

    Full Text Available Silicon waveguide optical non-reciprocal devices based on the magneto-optical effect are reviewed. The non-reciprocal phase shift caused by the first-order magneto-optical effect is effective in realizing optical non-reciprocal devices in silicon waveguide platforms. In a silicon-on-insulator waveguide, the low refractive index of the buried oxide layer enhances the magneto-optical phase shift, which reduces the device footprints. A surface activated direct bonding technique was developed to integrate a magneto-optical garnet crystal on the silicon waveguides. A silicon waveguide optical isolator based on the magneto-optical phase shift was demonstrated with an optical isolation of 30 dB and insertion loss of 13 dB at a wavelength of 1548 nm. Furthermore, a four port optical circulator was demonstrated with maximum isolations of 15.3 and 9.3 dB in cross and bar ports, respectively, at a wavelength of 1531 nm.

  8. Optical fiber end-facet polymer suspended-mirror devices

    Science.gov (United States)

    Yao, Mian; Wu, Jushuai; Zhang, A. Ping; Tam, Hwa-Yaw; Wai, P. K. A.

    2017-04-01

    This paper presents a novel optical fiber device based on a polymer suspended mirror on the end facet of an optical fiber. With an own-developed optical 3D micro-printing technology, SU-8 suspended-mirror devices (SMDs) were successfully fabricated on the top of a standard single-mode optical fiber. Optical reflection spectra of the fabricated SU- 8 SMDs were measured and compared with theoretical analysis. The proposed technology paves a way towards 3D microengineering of the small end-facet of optical fibers to develop novel fiber-optic sensors.

  9. QKD-Based Secured Burst Integrity Design for Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2016-03-01

    The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. It is quite evident that people prefer optical communication when it comes to large amount of data involving its transmission. The concept of switching in networks has matured enormously with several researches, architecture to implement and methods starting with Optical circuit switching to Optical Burst Switching. Optical burst switching is regarded as viable solution for switching bursts over networks but has several security vulnerabilities. However, this work exploited the security issues associated with Optical Burst Switching with respect to integrity of burst. This proposed Quantum Key based Secure Hash Algorithm (QKBSHA-512) with enhanced compression function design provides better avalanche effect over the conventional integrity algorithms.

  10. Derived virtual devices: a secure distributed file system mechanism

    Science.gov (United States)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  11. On the security of consumer wearable devices in the Internet of Things.

    Science.gov (United States)

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  12. Development of a miniature multiple reference optical coherence tomography imaging device

    Science.gov (United States)

    McNamara, Paul M.; O'Riordan, Colm; Collins, Seán.; O'Brien, Peter; Wilson, Carol; Hogan, Josh; Leahy, Martin J.

    2016-03-01

    Multiple reference optical coherence tomography (MR-OCT) is a new technology ideally suited to low-cost, compact OCT imaging. This modality is an extension of time-domain OCT with the addition of a partial mirror in front of the reference mirror. This enables extended, simultaneous depth scanning with the relatively short sweep of a miniature voice coil motor on which the scanning mirror is mounted. Applications of this technology include biometric security, ophthalmology, personal health monitoring and non-destructive testing. This work details early-stage development of the first iteration of a miniature MR-OCT device. This device utilizes a fiber-coupled input from an off-board superluminescent diode (SLD). Typical dimensions of the module are 40 × 57 mm, but future designs are expected to be more compact. Off-the-shelf miniature optical components, voice coil motors and photodetectors are used, with the complexity of design depending on specific applications. The photonic module can be configured as either polarized or non-polarized and can include balanced detection. The photodetectors are directly connected to a printed circuit board under the module containing a transimpedance amplifier with complimentary outputs. The results shown in this work are from the non-polarized device. Assembly of the photonic modules requires extensive planning. In choosing the optical components, Zemax simulations are performed to model the beam characteristics. The physical layout is modeled using Solidworks and each component is placed and aligned via a well-designed alignment procedure involving an active-alignment pick-and-place assembly system.

  13. Analysis of optically variable devices using a photometric light-field approach

    Science.gov (United States)

    Soukup, Daniel; Å tolc, Svorad; Huber-Mörk, Reinhold

    2015-03-01

    Diffractive Optically Variable Image Devices (DOVIDs), sometimes loosely referred to as holograms, are popular security features for protecting banknotes, ID cards, or other security documents. Inspection, authentication, as well as forensic analysis of these security features are still demanding tasks requiring special hardware tools and expert knowledge. Existing equipment for such analyses is based either on a microscopic analysis of the grating structure or a point-wise projection and recording of the diffraction patterns. We investigated approaches for an examination of DOVID security features based on sampling the Bidirectional Reflectance Distribution Function (BRDF) of DOVIDs using photometric stereo- and light-field-based methods. Our approach is demonstrated on the practical task of automated discrimination between genuine and counterfeited DOVIDs on banknotes. For this purpose, we propose a tailored feature descriptor which is robust against several expected sources of inaccuracy but still specific enough for the given task. The suggested approach is analyzed from both theoretical as well as practical viewpoints and w.r.t. analysis based on photometric stereo and light fields. We show that especially the photometric method provides a reliable and robust tool for revealing DOVID behavior and authenticity.

  14. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  15. Security and privacy issues in implantable medical devices: A comprehensive survey.

    Science.gov (United States)

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2017-12-01

    The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.

  17. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block...... known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse...

  18. Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule

    Directory of Open Access Journals (Sweden)

    Zhong-Nan Zhao

    2016-01-01

    Full Text Available It is important to determine the security situations of the all-optical network (AON, which is more vulnerable to hacker attacks and faults than other networks in some cases. A new approach of the security situation assessment to the all-optical network is developed in this paper. In the new assessment approach, the evidential reasoning (ER rule is used to integrate various evidences of the security factors including the optical faults and the special attacks in the AON. Furthermore, a new quantification method of the security situation is also proposed. A case study of an all-optical network is conducted to demonstrate the effectiveness and the practicability of the new proposed approach.

  19. All optical regeneration using semiconductor devices

    DEFF Research Database (Denmark)

    Mørk, Jesper; Öhman, Filip; Tromborg, Bjarne

    All-optical regeneration is a key functionality for implementing all-optical networks. We present a simple theory for the bit-error-rate in links employing all-optical regenerators, which elucidates the interplay between the noise and and nonlinearity of the regenerator. A novel device structure ...... is analyzed, emphasizing general aspects of active semiconductor waveguides....

  20. Optical Biosensors: A Revolution Towards Quantum Nanoscale Electronics Device Fabrication

    Directory of Open Access Journals (Sweden)

    D. Dey

    2011-01-01

    Full Text Available The dimension of biomolecules is of few nanometers, so the biomolecular devices ought to be of that range so a better understanding about the performance of the electronic biomolecular devices can be obtained at nanoscale. Development of optical biomolecular device is a new move towards revolution of nano-bioelectronics. Optical biosensor is one of such nano-biomolecular devices that has a potential to pave a new dimension of research and device fabrication in the field of optical and biomedical fields. This paper is a very small report about optical biosensor and its development and importance in various fields.

  1. Nanophotonic Devices for Optical Interconnect

    DEFF Research Database (Denmark)

    Van Thourhout, D.; Spuesens, T.; Selvaraja, S.K.

    2010-01-01

    We review recent progress in nanophotonic devices for compact optical interconnect networks. We focus on microdisk-laser-based transmitters and discuss improved design and advanced functionality including all-optical wavelength conversion and flip-flops. Next we discuss the fabrication uniformity...... of the passive routing circuits and their thermal tuning. Finally, we discuss the performance of a wavelength selective detector....

  2. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    Science.gov (United States)

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  3. MedMon: securing medical devices through wireless monitoring and anomaly detection.

    Science.gov (United States)

    Zhang, Meng; Raghunathan, Anand; Jha, Niraj K

    2013-12-01

    Rapid advances in personal healthcare systems based on implantable and wearable medical devices promise to greatly improve the quality of diagnosis and treatment for a range of medical conditions. However, the increasing programmability and wireless connectivity of medical devices also open up opportunities for malicious attackers. Unfortunately, implantable/wearable medical devices come with extreme size and power constraints, and unique usage models, making it infeasible to simply borrow conventional security solutions such as cryptography. We propose a general framework for securing medical devices based on wireless channel monitoring and anomaly detection. Our proposal is based on a medical security monitor (MedMon) that snoops on all the radio-frequency wireless communications to/from medical devices and uses multi-layered anomaly detection to identify potentially malicious transactions. Upon detection of a malicious transaction, MedMon takes appropriate response actions, which could range from passive (notifying the user) to active (jamming the packets so that they do not reach the medical device). A key benefit of MedMon is that it is applicable to existing medical devices that are in use by patients, with no hardware or software modifications to them. Consequently, it also leads to zero power overheads on these devices. We demonstrate the feasibility of our proposal by developing a prototype implementation for an insulin delivery system using off-the-shelf components (USRP software-defined radio). We evaluate its effectiveness under several attack scenarios. Our results show that MedMon can detect virtually all naive attacks and a large fraction of more sophisticated attacks, suggesting that it is an effective approach to enhancing the security of medical devices.

  4. Compact integrated optical devices for optical sensor and switching applications

    NARCIS (Netherlands)

    Kauppinen, L.J.

    2010-01-01

    This thesis describes the design, fabrication, and characterization of compact optical devices for sensing and switching applications. Our focus has been to realize the devices using CMOS-compatible fabrication processes. Particularly the silicon photonics fabrication platform, ePIXfab, has been

  5. A Review of Bring Your Own Device on Security Issues

    Directory of Open Access Journals (Sweden)

    Morufu Olalere

    2015-04-01

    Full Text Available Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets. As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD. In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.

  6. Integrated Optical lightguide device

    NARCIS (Netherlands)

    Heideman, Rene; Lambeck, Paul; Veldhuis, G.J.

    2005-01-01

    In an integrated optical lightguide device including a light-transmitting core layer, an inclusion or buffer layer, and an active or cladding layer. The cladding layer is divided into segments. Groups of different segments exhibit different refractive indices, light intensity profiles or different

  7. Integrated Optical lightguide device

    NARCIS (Netherlands)

    Heideman, Rene; Lambeck, Paul; Veldhuis, G.J.

    2000-01-01

    In an integrated optical lightguide device including a light-transmitting core layer, an inclusion or buffer layer, and an active or cladding layer. The cladding layer is divided into segments. Groups of different segments exhibit different refractive indices, light intensity profiles or different

  8. Semiconductor devices for all-optical regeneration

    DEFF Research Database (Denmark)

    Öhman, Filip; Bischoff, Svend; Tromborg, Bjarne

    2003-01-01

    We review different implementations of semiconductor devices for all-optical regeneration. A general model will be presented for all-optical regeneration in fiber links, taking into consideration the trade-off between non-linearity and noise. Furthermore we discuss a novel regenerator type, based...

  9. Optically coupled semiconductor device

    Energy Technology Data Exchange (ETDEWEB)

    Kumagaya, Naoki

    1988-11-18

    This invention concerns an optically coupled semiconductor device using the light as input signal and a MOS transistor for the output side in order to control on-off of the output side by the input signal which is insulated from the output. Concerning this sort of element, when a MOS transistor and a load resistance are planned to be accumulated on the same chip, a resistor and control of impurity concentration of the channel, etc. become necessary despite that the only formation of a simple P-N junction is enough, for a solar cell, hence cost reduction thereof cannot be done. In order to remove this defect, this invention offers an optically coupled semiconductor device featuring that two solar cells are connected in reverse parallel between the gate sources of the output MOS transistors and an operational light emitting element is individually set facing a respective solar cell. 4 figs.

  10. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  11. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  12. Designing Security-Hardened Microkernels For Field Devices

    Science.gov (United States)

    Hieb, Jeffrey; Graham, James

    Distributed control systems (DCSs) play an essential role in the operation of critical infrastructures. Perimeter field devices are important DCS components that measure physical process parameters and perform control actions. Modern field devices are vulnerable to cyber attacks due to their increased adoption of commodity technologies and that fact that control networks are no longer isolated. This paper describes an approach for creating security-hardened field devices using operating system microkernels that isolate vital field device operations from untrusted network-accessible applications. The approach, which is influenced by the MILS and Nizza architectures, is implemented in a prototype field device. Whereas, previous microkernel-based implementations have been plagued by poor inter-process communication (IPC) performance, the prototype exhibits an average IPC overhead for protected device calls of 64.59 μs. The overall performance of field devices is influenced by several factors; nevertheless, the observed IPC overhead is low enough to encourage the continued development of the prototype.

  13. Devices and dressings to secure peripheral venous catheters to prevent complications.

    Science.gov (United States)

    Marsh, Nicole; Webster, Joan; Mihala, Gabor; Rickard, Claire M

    2015-06-12

    A peripheral venous catheter (PVC) is typically used for short-term delivery of intravascular fluids and medications. It is an essential element of modern medicine and the most frequent invasive procedure performed in hospitals. However, PVCs often fail before intravenous treatment is completed: this can occur because the device is not adequately attached to the skin, allowing the PVC to fall out, leading to complications such as phlebitis (irritation or inflammation to the vein wall), infiltration (fluid leaking into surrounding tissues) or occlusion (blockage). An inadequately secured PVC also increases the risk of catheter-related bloodstream infection (CRBSI), as the pistoning action (moving back and forth in the vein) of the catheter can allow migration of organisms along the catheter and into the bloodstream. Despite the many dressings and securement devices available, the impact of different securement techniques for increasing PVC dwell time is still unclear; there is a need to provide guidance for clinicians by reviewing current studies systematically. To assess the effects of PVC dressings and securement devices on the incidence of PVC failure. We searched the following electronic databases to identify reports of relevant randomised controlled trials (RCTs): the Cochrane Wounds Group Register (searched 08 April 2015): The Cochrane Central Register of Controlled Trials (CENTRAL; 2015, Issue 3), Ovid MEDLINE (1946 to March 7 2015); Ovid MEDLINE (In-Process & Other Non-Indexed Citations, March 7 2015); Ovid EMBASE (1974 to March 7 2015); and EBSCO CINAHL (1982 to March 8 2015). RCTs or cluster RCTs comparing different dressings or securement devices for the stabilisation of PVCs. Cross-over trials were ineligible for inclusion, unless data for the first treatment period could be obtained. Two review authors independently selected studies, assessed trial quality and extracted data. We contacted study authors for missing information. We used standard

  14. All-optical devices for ultrafast packet switching

    DEFF Research Database (Denmark)

    Dorren, H.J.S.; HerreraDorren, J.; Raz, O.

    2007-01-01

    We discuss integrated devices for all-optical packet switching. We focus on monolithically integrated all-optical flip-flops, ultra-fast semiconductor based wavelength converters and explain the operation principles. Finally, a 160 Gb/s all-optical packet switching experiment over 110 km of field...

  15. Security of Semi-Device-Independent Random Number Expansion Protocols.

    Science.gov (United States)

    Li, Dan-Dan; Wen, Qiao-Yan; Wang, Yu-Kun; Zhou, Yu-Qian; Gao, Fei

    2015-10-27

    Semi-device-independent random number expansion (SDI-RNE) protocols require some truly random numbers to generate fresh ones, with making no assumptions on the internal working of quantum devices except for the dimension of the Hilbert space. The generated randomness is certified by non-classical correlation in the prepare-and-measure test. Until now, the analytical relations between the amount of the generated randomness and the degree of non-classical correlation, which are crucial for evaluating the security of SDI-RNE protocols, are not clear under both the ideal condition and the practical one. In the paper, first, we give the analytical relation between the above two factors under the ideal condition. As well, we derive the analytical relation under the practical conditions, where devices' behavior is not independent and identical in each round and there exists deviation in estimating the non-classical behavior of devices. Furthermore, we choose a different randomness extractor (i.e., two-universal random function) and give the security proof.

  16. Device for the alternative option of temperature measurement

    Science.gov (United States)

    Jargus, Jan; Nedoma, Jan; Fajkus, Marcel; Novak, Martin; Cubik, Jakub; Cvejn, Daniel; Vasinek, Vladimir

    2017-10-01

    Polydimethylsiloxane (PDMS) has good optical properties, and its composition offers the possibility of use in many applications (industry, security device, medicine applications and etc.). We focused on the alternative option of temperature measurement in this article. Our approach is based on measuring changes of chromaticity correlated temperature corresponding to changes in temperature. Described device uses an optical fiber with a defined layer of PDMS and luminophore and we assume that it can find use also in the field of security. The article describes the process of making the prototype of the device and its verification based on laboratory results. The measured temperature depends mainly on the type of optical fiber and the measured temperature range is determined by the thermal resistance of used optical fiber. Using a calibration measurement can determine the value of temperature with an accuracy of +/- 2,5 %.

  17. Devic's Disease (Neuromyelitis optical)

    International Nuclear Information System (INIS)

    Pinzon, Alfredo; Echeverry, Tatiana; Rodriguez, Aida Bibiana

    2010-01-01

    We present a case report about a young woman initially treated as having multiple sclerosis, who relapsed with serious visual impairment. Devic's disease is a demyelinating disorder that presents as transverse myelitis associated with optic neuritis, typically bilateral. Multiple sclerosis is in fact the main differential diagnosis

  18. Exploring a new security framework for remote patient monitoring devices

    OpenAIRE

    Ondiege, Brian; Clarke, Macolm; Mapp, Glenford E.

    2017-01-01

    Security has been an issue of contention in healthcare. The lack of familiarity and poor implementation of security in healthcare leave the patients’ data vulnerable to attackers. The main issue is assessing how we can provide security in an RPM infrastructure. The findings in literature show there is little empirical evidence on proper implementation of security. Therefore, there is an urgent need in addressing cybersecurity issues in medical devices. Through the review of relevant literatur...

  19. Noise Characterization of Devices for Optical Computing

    National Research Council Canada - National Science Library

    Walkup, John

    1998-01-01

    The major objective of the research effort is to investigate the noise characteristics of advanced optical Sources, spatial light modulators, and other devices which are candidates for applications in optical computers...

  20. Device-independent quantum key distribution secure against collective attacks

    International Nuclear Information System (INIS)

    Pironio, Stefano; Gisin, Nicolas; AcIn, Antonio; Brunner, Nicolas; Massar, Serge; Scarani, Valerio

    2009-01-01

    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in AcIn et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.

  1. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  2. Device for verification of seals by optical fibers

    International Nuclear Information System (INIS)

    Neuilly, M.; Guitaud, M.H.; Dufour, J.L.

    1993-01-01

    The seal is built around an optical fiber with a verification device. This device is made of a lighting source and photographic means supported by a rotating assembly which allow to take an image of each optical fiber end. These images are compared with reference images taken just after the sealing. (A.B.). 5 refs., 6 figs

  3. Mobile device-based optical instruments for agriculture

    Science.gov (United States)

    Sumriddetchkajorn, Sarun

    2013-05-01

    Realizing that a current smart-mobile device such as a cell phone and a tablet can be considered as a pocket-size computer embedded with a built-in digital camera, this paper reviews and demonstrates on how a mobile device can be specifically functioned as a portable optical instrument for agricultural applications. The paper highlights several mobile device-based optical instruments designed for searching small pests, measuring illumination level, analyzing spectrum of light, identifying nitrogen status in the rice field, estimating chlorine in water, and determining ripeness level of the fruit. They are suitable for individual use as well as for small and medium enterprises.

  4. Proton irradiation of liquid crystal based adaptive optical devices

    International Nuclear Information System (INIS)

    Buis, E.J.; Berkhout, G.C.G.; Love, G.D.; Kirby, A.K.; Taylor, J.M.; Hannemann, S.; Collon, M.J.

    2012-01-01

    To assess its radiation hardness, a liquid crystal based adaptive optical element has been irradiated using a 60 MeV proton beam. The device with the functionality of an optical beam steerer was characterised before, during and after the irradiation. A systematic set of measurements on the transmission and beam deflection angles was carried out. The measurements showed that the transmission decreased only marginally and that its optical performance degraded only after a very high proton fluence (10 10 p/cm 2 ). The device showed complete annealing in the functionality as a beam steerer, which leads to the conclusion that the liquid crystal technology for optical devices is not vulnerable to proton irradiation as expected in space.

  5. Proton irradiation of liquid crystal based adaptive optical devices

    Energy Technology Data Exchange (ETDEWEB)

    Buis, E.J., E-mail: ernst-jan.buis@tno.nl [cosine Science and Computing BV, Niels Bohrweg 11, 2333 CA Leiden (Netherlands); Berkhout, G.C.G. [cosine Science and Computing BV, Niels Bohrweg 11, 2333 CA Leiden (Netherlands); Huygens Laboratory, Leiden University, P.O. Box 9504, 2300 RA Leiden (Netherlands); Love, G.D.; Kirby, A.K.; Taylor, J.M. [Department of Physics, Durham University, South Road, Durham DH1 3LE (United Kingdom); Hannemann, S.; Collon, M.J. [cosine Research BV, Niels Bohrweg 11, 2333 CA Leiden (Netherlands)

    2012-01-01

    To assess its radiation hardness, a liquid crystal based adaptive optical element has been irradiated using a 60 MeV proton beam. The device with the functionality of an optical beam steerer was characterised before, during and after the irradiation. A systematic set of measurements on the transmission and beam deflection angles was carried out. The measurements showed that the transmission decreased only marginally and that its optical performance degraded only after a very high proton fluence (10{sup 10}p/cm{sup 2}). The device showed complete annealing in the functionality as a beam steerer, which leads to the conclusion that the liquid crystal technology for optical devices is not vulnerable to proton irradiation as expected in space.

  6. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  7. Multipass optical device and process for gas and analyte determination

    Energy Technology Data Exchange (ETDEWEB)

    Bernacki, Bruce E [Kennewick, WA

    2011-01-25

    A torus multipass optical device and method are described that provide for trace level determination of gases and gas-phase analytes. The torus device includes an optical cavity defined by at least one ring mirror. The mirror delivers optical power in at least a radial and axial direction and propagates light in a multipass optical path of a predefined path length.

  8. A cost-benefit analysis of alternative device configurations for aviation-checked baggage security screening.

    Science.gov (United States)

    Jacobson, Sheldon H; Karnani, Tamana; Kobza, John E; Ritchie, Lynsey

    2006-04-01

    The terrorist attacks of September 11, 2001 have resulted in dramatic changes in aviation security. As of early 2003, an estimated 1,100 explosive detection systems (EDS) and 6,000 explosive trace detection machines (ETD) have been deployed to ensure 100% checked baggage screening at all commercial airports throughout the United States. The prohibitive costs associated with deploying and operating such devices is a serious issue for the Transportation Security Administration. This article evaluates the cost effectiveness of the explosive detection technologies currently deployed to screen checked baggage as well as new technologies that could be used in the future. Both single-device and two-device systems are considered. In particular, the expected annual direct cost of using these devices for 100% checked baggage screening under various scenarios is obtained and the tradeoffs between using single- and two-device strategies are studied. The expected number of successful threats under the different checked baggage screening scenarios with 100% checked baggage screening is also obtained. Lastly, a risk-based screening strategy proposed in the literature is analyzed. The results reported suggest that for the existing security setup, with current device costs and probability parameters, single-device systems are less costly and have fewer expected number of successful threats than two-device systems due to the way the second device affects the alarm or clear decision. The risk-based approach is found to have the potential to significantly improve security. The cost model introduced provides an effective tool for the execution of cost-benefit analyses of alternative device configurations for aviation-checked baggage security screening.

  9. Neurosecurity: security and privacy for neural devices.

    Science.gov (United States)

    Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi

    2009-07-01

    An increasing number of neural implantable devices will become available in the near future due to advances in neural engineering. This discipline holds the potential to improve many patients' lives dramatically by offering improved-and in some cases entirely new-forms of rehabilitation for conditions ranging from missing limbs to degenerative cognitive diseases. The use of standard engineering practices, medical trials, and neuroethical evaluations during the design process can create systems that are safe and that follow ethical guidelines; unfortunately, none of these disciplines currently ensure that neural devices are robust against adversarial entities trying to exploit these devices to alter, block, or eavesdrop on neural signals. The authors define "neurosecurity"-a version of computer science security principles and methods applied to neural engineering-and discuss why neurosecurity should be a critical consideration in the design of future neural devices.

  10. Optical-electronic device based on diffraction optical element for control of special protective tags executed from luminophor

    Science.gov (United States)

    Polyakov, M.; Odinokov, S.

    2017-05-01

    The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.

  11. CERN tests reveal security flaws with industrial network devices

    CERN Document Server

    Lüders, Stefan

    2006-01-01

    The CERN high energy particle physics facility at Geneva, Switzerland will incorporate a wide range of COTS industrial control systems within its next generation particle collider, the LHC. In particular, the Internet will be used to facilitate the remote access for accelerator and particle physicists and system experts based at several hundred locations around the globe. The integration of Industrial Ethernet and COTS PLCs within the LHC program focuses extreme attention on the industrial network cyber-security requirement. CERN's response has been to conduct operational research on the security resilience of networked industrial devices. As test team lead Stefan Lüders reports here, industrial networked devices put through the organisation's test procedures have generally shown up unexpected vulnerabilities.

  12. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  13. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  14. Small Device For Short-Range Antenna Measurements Using Optics

    DEFF Research Database (Denmark)

    Yanakiev, Boyan Radkov; Nielsen, Jesper Ødum; Christensen, Morten

    2011-01-01

    This paper gives a practical solution for implementing an antenna radiation pattern measurement device using optical fibers. It is suitable for anechoic chambers as well as short range channel sounding. The device is optimized for small size and provides a cheap and easy way to make optical antenna...

  15. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  16. Security Belt for Wireless Implantable Medical Devices.

    Science.gov (United States)

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  17. Quasi-optic millimeter-wave device application of liquid crystal material by using porous PMMA matrix

    Science.gov (United States)

    Nose, T.; Watanabe, Y.; Kon, A.; Ito, R.; Honma, M.

    2018-02-01

    Recently, millimeter-waves (MMWs) have become indispensable for application in next-generation high-speed wireless communication i.e., 5G, in addition to conventional applications such as in automobile collision avoidance radars and airport security inspection systems. Some manageable devices to control MMW propagation will be necessary with the development of this new technology field. We believe that liquid crystal (LC) devices are one of the major candidates for such applications because it is known that LC materials are excellent electro-optic materials. However, as the wavelength of MMWs is extremely longer than the optics region, extremely thick LC layers are necessary if we choose the quasioptic approach to attain LC MMW control devices. Therefore, we adopt a PDLC structure to attain the extremely thick LC layers by using porous (polymethyl methacrylate) PMMA materials, which can be easily obtained using a solvent consisting of a mixture of ethanol/water and a little heating. In this work, we focus on Fresnel lens, which is an important quasi-optic device for MMW application, to introduce a tunable property by using LC materials. Here, we adopt the thin film deposition method to obtain a porous PMMA matrix with the aim of obtaining final composite structure based on the Fresnel substrate. First, the fundamental material properties of porous PMMA are investigated to control the microscopic porous structure. Then, the LC-MMW Fresnel lens substrate is prepared using a 3D printer, and the fundamental MMW focusing properties of the prototype composite Fresnel structure are investigated.

  18. Optically monitoring device in reactor container

    International Nuclear Information System (INIS)

    Takeuchi, Tsutomu; Kawamoto, Kikuo.

    1993-01-01

    In the device of the present invention, cable penetrations are necessary for transmission from a great number of electrical instrumentations disposed in a reactor container to the outside. Optical cables are passed through the cable penetrations to use optical signals for signal transmission. That is, pulses are injected from one end of the optical cable and a specific light (raman scattered light) among reflected lights, after elapse of a predetermined time, is measured. With such procedures, temperature at the reflection point can be measured. In this case, if emission and discrimination of the pulses are conducted in a time sharing fashion, the temperature is measured as an average value for the 1m length corresponding to the time determined by the limit. Accordingly, greater number of temperature measuring points than that in the prior art (there is a reactor which has about 170 points) are measured by a lesser number of cables (one at minimum). For instruments used for other than temperature, if the device is diagnosed by itself, by making the constitution intelligent and utilizing optical output, reliability for the measurement can be improved. (I.S.)

  19. New generation of devices for all-optical communications

    International Nuclear Information System (INIS)

    Glesk, I.; Runser, R.J.; Prucnal, P.R.

    2001-01-01

    To increase the transmission capacity of future communication networks is becoming very critical. This task can only be accomplished by taking advantage of optical networks where multiplexing techniques such as Dense Wavelength Division Multiplexing (DWDM) and Optical Time Division Multiplexing (OTDM) are employed. To avoid electronic bottlenecks a whole new generation of ultrafast devices is needed. To fulfill these needs a new class of all optical devices has been proposed and developed. By taking advantage of the nonlinear dynamics in semiconductor optical amplifiers in combination with the fiber interferometers a new generation of ultrafast all-optical de multiplexers and wavelength converters has been demonstrated. Other switching technologies are also promising for the future. The latest technologies in the area of micro machining have created very attractive low cost MEMS. Recently announced use of bubble technology for all-optical switching might also lead to the development of next generation large scale switching fabrics. This paper is an overview of the recent development in these areas. (authors)

  20. On the Modelling of Context-Aware Security for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Zurek

    2016-01-01

    Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

  1. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  2. Tunable photonic bandgap fiber based devices for optical networks

    DEFF Research Database (Denmark)

    Alkeskjold, Thomas Tanggaard; Scolari, Lara; Rottwitt, Karsten

    2005-01-01

    In future all optical networks one of the enabling technologies is tunable elements including reconfigurable routers, switches etc. Thus, the development of a technology platform that allows construction of tuning components is critical. Lately, microstructured optical fibers, filled with liquid......, for example a liquid crystal that changes optical properties when subjected to, for example, an optical or an electrical field. The utilization of these two basic properties allows design of tunable optical devices for optical networks. In this work, we focus on applications of such devices and discuss recent...... crystals, have proven to be a candidate for such a platform. Microstructured optical fibers offer unique wave-guiding properties that are strongly related to the design of the air holes in the cladding of the fiber. These wave-guiding properties may be altered by filling the air holes with a material...

  3. Hybrid Optical Devices: The Case of the Unification of the Electrochromic Device and the Organic Solar Cell

    Directory of Open Access Journals (Sweden)

    Andre F. S. Guedes

    2016-06-01

    Full Text Available The development of Hybrid Optical Devices, using some flexible optically transparent substrate material and organic semiconductor materials, has been widely utilized by the organic electronic industry, when manufacturing new technological products. The Hybrid Optical Device is constituted by the union of the electrochromic device and the organic solar cell. The flexible organic photovoltaic solar cells, in this hybrid optical device, have been the Poly base (3-hexyl thiophene, P3HT, Phenyl-C61-butyric acid methyl ester, PCBM and Polyaniline, PANI, all being deposited in Indium Tin Oxide, ITO. In addition, the thin film, obtained by the deposition of PANI, and prepared in perchloric acid solution, has been identified through PANI-X1. In the flexible electrochromic device, the Poly base (3,4-ethylenedioxythiophene, PEDOT, has been prepared in Propylene Carbonate, PC, being deposited in Indium Tin Oxide, ITO. Also, both devices have been united by an electrolyte solution prepared with Vanadium Pentoxide, V2O5, Lithium Perchlorate, LiClO4, and Polymethylmethacrylate, PMMA. This device has been characterized through Electrical Measurements, such as UV-Vis Spectroscopy and Scanning Electron Microscopy (SEM. Thus, the result obtained through electrical measurements has demonstrated that the flexible organic photovoltaic solar cell presented the characteristic curve of standard solar cell after spin-coating and electrodeposition. Accordingly, the results obtained with optical and electrical characterization have revealed that the electrochromic device demonstrated some change in optical absorption, when subjected to some voltage difference. Moreover, the inclusion of the V2O5/PANI-X1 layer reduced the effects of degradation that this hybrid organic device caused, that is, solar irradiation. Studies on Scanning Electron Microscopy (SEM have found out that the surface of V2O5/PANI-X1 layers can be strongly conditioned by the surface morphology of the

  4. Optical interconnection for a polymeric PLC device using simple positional alignment.

    Science.gov (United States)

    Ryu, Jin Hwa; Kim, Po Jin; Cho, Cheon Soo; Lee, El-Hang; Kim, Chang-Seok; Jeong, Myung Yung

    2011-04-25

    This study proposes a simple cost-effective method of optical interconnection between a planar lightwave circuit (PLC) device chip and an optical fiber. It was conducted to minimize and overcome the coupling loss caused by lateral offset which is due to the process tolerance and the dimensional limitation existing between PLC device chips and fiber array blocks with groove structures. A PLC device chip and a fiber array block were simultaneously fabricated in a series of polymer replication processes using the original master. The dimensions (i.e., width and thickness) of the under-clad of the PLC device chip were identical to those of the fiber array block. The PLC device chip and optical fiber were aligned by simple positional control for the vertical direction of the PLC device chip under a particular condition. The insertion loss of the proposed 1 x 2 multimode optical splitter device interconnection was 4.0 dB at 850 nm and the coupling loss was below 0.1 dB compared with single-fiber based active alignment.

  5. Evaluation of polymer based third order nonlinear integrated optics devices

    NARCIS (Netherlands)

    Driessen, A.; Hoekstra, Hugo; Blom, F.C.; Horst, F.; Horst, F.; Krijnen, Gijsbertus J.M.; van Schoot, J.B.P.; van Schoot, J.B.P.; Lambeck, Paul; Popma, T.J.A.; Diemeer, Mart

    Nonlinear polymers are promising materials for high speed active integrated optics devices. In this paper we evaluate the perspectives polymer based nonlinear optical devices can offer. Special attention is directed to the materials aspects. In our experimental work we applied mainly Akzo Nobel DANS

  6. Optically controlled multiple switching operations of DNA biopolymer devices

    International Nuclear Information System (INIS)

    Hung, Chao-You; Tu, Waan-Ting; Lin, Yi-Tzu; Fruk, Ljiljana; Hung, Yu-Chueh

    2015-01-01

    We present optically tunable operations of deoxyribonucleic acid (DNA) biopolymer devices, where a single high-resistance state, write-once read-many-times memory state, write-read-erase memory state, and single low-resistance state can be achieved by controlling UV irradiation time. The device is a simple sandwich structure with a spin-coated DNA biopolymer layer sandwiched by two electrodes. Upon irradiation, the electrical properties of the device are adjusted owing to a phototriggered synthesis of silver nanoparticles in DNA biopolymer, giving rise to multiple switching scenarios. This technique, distinct from the strategy of doping of pre-formed nanoparticles, enables a post-film fabrication process for achieving optically controlled memory device operations, which provides a more versatile platform to fabricate organic memory and optoelectronic devices

  7. Optically controlled multiple switching operations of DNA biopolymer devices

    Energy Technology Data Exchange (ETDEWEB)

    Hung, Chao-You; Tu, Waan-Ting; Lin, Yi-Tzu [Institute of Photonics Technologies, National Tsing Hua University, Hsinchu 30013, Taiwan (China); Fruk, Ljiljana [Department of Chemical Engineering and Biotechnology, University of Cambridge, Pembroke Street, Cambridge CB2 3RA (United Kingdom); Hung, Yu-Chueh, E-mail: ychung@ee.nthu.edu.tw [Institute of Photonics Technologies, National Tsing Hua University, Hsinchu 30013, Taiwan (China); Department of Electrical Engineering, National Tsing Hua University, Hsinchu 30013, Taiwan (China)

    2015-12-21

    We present optically tunable operations of deoxyribonucleic acid (DNA) biopolymer devices, where a single high-resistance state, write-once read-many-times memory state, write-read-erase memory state, and single low-resistance state can be achieved by controlling UV irradiation time. The device is a simple sandwich structure with a spin-coated DNA biopolymer layer sandwiched by two electrodes. Upon irradiation, the electrical properties of the device are adjusted owing to a phototriggered synthesis of silver nanoparticles in DNA biopolymer, giving rise to multiple switching scenarios. This technique, distinct from the strategy of doping of pre-formed nanoparticles, enables a post-film fabrication process for achieving optically controlled memory device operations, which provides a more versatile platform to fabricate organic memory and optoelectronic devices.

  8. Guided-wave acousto-optics interactions, devices, and applications

    CERN Document Server

    1990-01-01

    The field of integrated- or guided-wave optics has experienced significant and continuous growth since its inception in the late 1960s. There has been a considerable increase in research and development activity in this field worldwide and some significant advances in the realization of working in­ tegrated optic devices and modules have been made in recent years. In fact, there have already been some commercial manufacturing and technical ap­ plications of such devices and modules. The guided-wave-acoustooptics involving Bragg interactions between guided optical waves and surface acoustic waves is one of the areas of in­ tegrated-optics that has reached some degree of scientific and technological maturity. This topical volume is devoted to an in-depth treatment of this emerging branch of science and technology. Presented in this volume are concise treatments on bulk-wave acoustooptics, guided-wave optics, and surface acoustic waves, and detailed studies of guided-wave acoustooptic Bragg diffraction in thr...

  9. Image-based surveillance and security systems using personal computers for device aiming and digital image comparison

    International Nuclear Information System (INIS)

    Quiett, S.; Axtell, L.H.

    1987-01-01

    A detection-type security system using enhanced capability cameras or other imaging devices can aid in maintaining security from long distance and/or for large areas. To do so requires that the imaging device(s) be repeatedly and accurately positioned so that no areas are overlooked. Digital control using personal computers is the simplest method of achieving positional accuracy. The monitoring of large areas and/or a large number of areas also requires that a substantial quantity of visual information be catalogued and evaluated for potential security problems. While security personnel alone are typically used for such monitoring, as the quantity of visual information increases, the likelihood that potential security threats will be missed also increases. The ability of an image-based security system to detect potential security problems can be further increased with the use of selected image processing techniques. Utilizing personal computers for both imaging device position control as well as image processing, surveillance of large areas can be performed by a limited number of individuals with a high level of system confidence

  10. Optical links in handheld multimedia devices

    Science.gov (United States)

    van Geffen, S.; Duis, J.; Miller, R.

    2008-04-01

    Ever emerging applications in handheld multimedia devices such as mobile phones, laptop computers, portable video games and digital cameras requiring increased screen resolutions are driving higher aggregate bitrates between host processor and display(s) enabling services such as mobile video conferencing, video on demand and TV broadcasting. Larger displays and smaller phones require complex mechanical 3D hinge configurations striving to combine maximum functionality with compact building volumes. Conventional galvanic interconnections such as Micro-Coax and FPC carrying parallel digital data between host processor and display module may produce Electromagnetic Interference (EMI) and bandwidth limitations caused by small cable size and tight cable bends. To reduce the number of signals through a hinge, the mobile phone industry, organized in the MIPI (Mobile Industry Processor Interface) alliance, is currently defining an electrical interface transmitting serialized digital data at speeds >1Gbps. This interface allows for electrical or optical interconnects. Above 1Gbps optical links may offer a cost effective alternative because of their flexibility, increased bandwidth and immunity to EMI. This paper describes the development of optical links for handheld communication devices. A cable assembly based on a special Plastic Optical Fiber (POF) selected for its mechanical durability is terminated with a small form factor molded lens assembly which interfaces between an 850nm VCSEL transmitter and a receiving device on the printed circuit board of the display module. A statistical approach based on a Lean Design For Six Sigma (LDFSS) roadmap for new product development tries to find an optimum link definition which will be robust and low cost meeting the power consumption requirements appropriate for battery operated systems.

  11. A new Subcutaneously Anchored Device for Securing External Cerebrospinal Fluid Catheters: our Preliminary Experience.

    Science.gov (United States)

    Frassanito, Paolo; Massimi, Luca; Tamburrini, Gianpiero; Pittiruti, Mauro; Doglietto, Francesco; Nucci, Carlotta Ginevra; Caldarelli, Massimo

    2016-09-01

    Accidental dislocation or removal is a well-known complication of external cerebrospinal fluid (CSF) drainage in daily clinical practice. At present, no data about the incidence of such complications are available in the scientific literature. SecurAcath (Interrad Medical, Plymouth, Minnesota, USA) is a subcutaneously anchored device recently adopted for securement of central venous catheters, known to be highly effective (and cost-effective) in reducing the risk of catheter dislodgement and/or accidental removal. We report our preliminary experience with the use of SecurAcath to secure CSF drainage, either ventricular or spinal, to the skin. SecurAcath was used in 29 consecutive patients (age range: 3 weeks-16 years, median age 6.3 years). In particular, the device was used for 25 ventricular catheters (a patient received 2 catheters in the same procedure for bilateral brain abscess) and 5 spinal drainages. Period in place ranged from 1-4 weeks (median 22 days). No complication related to the use of the device was observed, in particular there was no case of dislocation or accidental removal of the catheter. The removal procedure was extremely easy. The device has proven its utility also in 3 cases requiring an adjustment of the length of the catheter. In our experience, SecurAcath is a safe and effective device to secure CSF external catheters to the skin, with several relevant advantages: its placement and maintenance are easy; it may stay in place for the entire duration of the catheter; it allows a more complete antisepsis of the exit site, thus reducing local skin complications; it eliminates the risk of suture-related needlestick injuries. Copyright © 2016 Elsevier Inc. All rights reserved.

  12. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks.

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman

    2015-10-30

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  13. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  14. Fabrication of Optical Fiber Devices

    Science.gov (United States)

    Andres, Miguel V.

    In this paper we present the main research activities of the Laboratorio de Fibras Opticas del Instituto de Ciencia de los Materiales de la Universidad de Valencia. We show some of the main results obtained for devices based on tapered fibers, fiber Bragg gratings, acousto-optic effects and photonic crystal fibers.

  15. Secure optical verification using dual phase-only correlation

    International Nuclear Information System (INIS)

    Liu, Wei; Liu, Shutian; Zhang, Yan; Xie, Zhenwei; Liu, Zhengjun

    2015-01-01

    We introduce a security-enhanced optical verification system using dual phase-only correlation based on a novel correlation algorithm. By employing a nonlinear encoding, the inherent locks of the verification system are obtained in real-valued random distributions, and the identity keys assigned to authorized users are designed as pure phases. The verification process is implemented in two-step correlation, so only authorized identity keys can output the discriminate auto-correlation and cross-correlation signals that satisfy the reset threshold values. Compared with the traditional phase-only-correlation-based verification systems, a higher security level against counterfeiting and collisions are obtained, which is demonstrated by cryptanalysis using known attacks, such as the known-plaintext attack and the chosen-plaintext attack. Optical experiments as well as necessary numerical simulations are carried out to support the proposed verification method. (paper)

  16. Do New Mobile Devices in Enterprises Pose A Serious Security Threat?

    OpenAIRE

    Ali A Altalbe

    2013-01-01

    The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.

  17. The Challenges of Balancing Safety and Security in Implantable Medical Devices.

    Science.gov (United States)

    Katzis, Konstantinos; Jones, Richard W; Despotou, George

    2016-01-01

    Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.

  18. Shrinking optical devices

    International Nuclear Information System (INIS)

    Wee, W H; Pendry, J B

    2009-01-01

    Much of optics depends on objects being much larger than the wavelength of light: shadows of opaque objects are sharp only if free of diffraction effects, and 'cat's eye' retroreflectors function only if they are large. Here, we show how to make theoretically arbitrarily small versions of these devices by exploiting the power of a negatively refracting lens to magnify objects that are smaller than the wavelength, thus creating the effect of a large object while keeping all physical dimensions small. We also give a new perspective on the 'perfect lens theorem' on which the paper is based.

  19. Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance.

    Science.gov (United States)

    Kramer, Daniel B; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R

    2012-01-01

    Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware.

  20. Integrated-optic current sensors with a multimode interference waveguide device.

    Science.gov (United States)

    Kim, Sung-Moon; Chu, Woo-Sung; Kim, Sang-Guk; Oh, Min-Cheol

    2016-04-04

    Optical current sensors based on polarization-rotated reflection interferometry are demonstrated using polymeric integrated optics and various functional optical waveguide devices. Interferometric sensors normally require bias feedback control for maintaining the operating point, which increases the cost. In order to resolve this constraint of feedback control, a multimode interference (MMI) waveguide device is integrated onto the current-sensor optical chip in this work. From the multiple outputs of the MMI, a 90° phase-shifted transfer function is obtained. Using passive quadrature demodulation, we demonstrate that the sensor could maintain the output signal regardless of the drift in the operating bias-point.

  1. Noise tolerance in wavelength-selective switching of optical differential quadrature-phase-shift-keying pulse train by collinear acousto-optic devices.

    Science.gov (United States)

    Goto, Nobuo; Miyazaki, Yasumitsu

    2014-06-01

    Optical switching of high-bit-rate quadrature-phase-shift-keying (QPSK) pulse trains using collinear acousto-optic (AO) devices is theoretically discussed. Since the collinear AO devices have wavelength selectivity, the switched optical pulse trains suffer from distortion when the bandwidth of the pulse train is comparable to the pass bandwidth of the AO device. As the AO device, a sidelobe-suppressed device with a tapered surface-acoustic-wave (SAW) waveguide and a Butterworth-type filter device with a lossy SAW directional coupler are considered. Phase distortion of optical pulse trains at 40 to 100  Gsymbols/s in QPSK format is numerically analyzed. Bit-error-rate performance with additive Gaussian noise is also evaluated by the Monte Carlo method.

  2. An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

    Directory of Open Access Journals (Sweden)

    Young-Sik Jeong

    2014-01-01

    Full Text Available Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. The m-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application of m-IPS to the Internet of things (IoT, which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.

  3. Single incision device (TVT Secur) versus retropubic tension-free vaginal tape device (TVT) for the management of stress urinary incontinence in women: a randomized clinical trial.

    Science.gov (United States)

    Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali

    2014-12-22

    In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research

  4. Spatial transformation-enabled electromagnetic devices: from radio frequencies to optical wavelengths

    Science.gov (United States)

    Jiang, Zhi Hao; Turpin, Jeremy P.; Morgan, Kennith; Lu, Bingqian; Werner, Douglas H.

    2015-01-01

    Transformation optics provides scientists and engineers with a new powerful design paradigm to manipulate the flow of electromagnetic waves in a user-defined manner and with unprecedented flexibility, by controlling the spatial distribution of the electromagnetic properties of a medium. Using this approach, over the past decade, various previously undiscovered physical wave phenomena have been revealed and novel electromagnetic devices have been demonstrated throughout the electromagnetic spectrum. In this paper, we present versatile theoretical and experimental investigations on designing transformation optics-enabled devices for shaping electromagnetic wave radiation and guidance, at both radio frequencies and optical wavelengths. Different from conventional coordinate transformations, more advanced and versatile coordinate transformations are exploited here to benefit diverse applications, thereby providing expanded design flexibility, enhanced device performance, as well as reduced implementation complexity. These design examples demonstrate the comprehensive capability of transformation optics in controlling electromagnetic waves, while the associated novel devices will open up new paths towards future integrated electromagnetic component synthesis and design, from microwave to optical spectral regimes. PMID:26217054

  5. Spatial transformation-enabled electromagnetic devices: from radio frequencies to optical wavelengths.

    Science.gov (United States)

    Jiang, Zhi Hao; Turpin, Jeremy P; Morgan, Kennith; Lu, Bingqian; Werner, Douglas H

    2015-08-28

    Transformation optics provides scientists and engineers with a new powerful design paradigm to manipulate the flow of electromagnetic waves in a user-defined manner and with unprecedented flexibility, by controlling the spatial distribution of the electromagnetic properties of a medium. Using this approach, over the past decade, various previously undiscovered physical wave phenomena have been revealed and novel electromagnetic devices have been demonstrated throughout the electromagnetic spectrum. In this paper, we present versatile theoretical and experimental investigations on designing transformation optics-enabled devices for shaping electromagnetic wave radiation and guidance, at both radio frequencies and optical wavelengths. Different from conventional coordinate transformations, more advanced and versatile coordinate transformations are exploited here to benefit diverse applications, thereby providing expanded design flexibility, enhanced device performance, as well as reduced implementation complexity. These design examples demonstrate the comprehensive capability of transformation optics in controlling electromagnetic waves, while the associated novel devices will open up new paths towards future integrated electromagnetic component synthesis and design, from microwave to optical spectral regimes. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  6. Virtual-optical information security system based on public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  7. Broadband illusion optical devices based on conformal mappings

    Science.gov (United States)

    Xiong, Zhan; Xu, Lin; Xu, Ya-Dong; Chen, Huan-Yang

    2017-10-01

    In this paper, we propose a simple method of illusion optics based on conformal mappings. By carefully developing designs with specific conformal mappings, one can make an object look like another with a significantly different shape. In addition, the illusion optical devices can work in a broadband of frequencies.

  8. Optical Near-field Interactions and Forces for Optoelectronic Devices

    Science.gov (United States)

    Kohoutek, John Michael

    Throughout history, as a particle view of the universe began to take shape, scientists began to realize that these particles were attracted to each other and hence came up with theories, both analytical and empirical in nature, to explain their interaction. The interaction pair potential (empirical) and electromagnetics (analytical) theories, both help to explain not only the interaction between the basic constituents of matter, such as atoms and molecules, but also between macroscopic objects, such as two surfaces in close proximity. The electrostatic force, optical force, and Casimir force can be categorized as such forces. A surface plasmon (SP) is a collective motion of electrons generated by light at the interface between two mediums of opposite signs of dielectric susceptibility (e.g. metal and dielectric). Recently, surface plasmon resonance (SPR) has been exploited in many areas through the use of tiny antennas that work on similar principles as radio frequency (RF) antennas in optoelectronic devices. These antennas can produce a very high gradient in the electric field thereby leading to an optical force, similar in concept to the surface forces discussed above. The Atomic Force Microscope (AFM) was introduced in the 1980s at IBM. Here we report on its uses in measuring these aforementioned forces and fields, as well as actively modulating and manipulating multiple optoelectronic devices. We have shown that it is possible to change the far field radiation pattern of an optical antenna-integrated device through modification of the near-field of the device. This modification is possible through change of the local refractive index or reflectivity of the "hot spot" of the device, either mechanically or optically. Finally, we have shown how a mechanically active device can be used to detect light with high gain and low noise at room temperature. It is the aim of several of these integrated and future devices to be used for applications in molecular sensing

  9. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  10. Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance

    Science.gov (United States)

    Kramer, Daniel B.; Baker, Matthew; Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Reynolds, Matthew R.

    2012-01-01

    Background Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods We used three comprehensive, publicly available databases maintained by the Food and Drug Administration (FDA) to evaluate recalls and adverse events related to security and privacy risks of medical devices. Results Review of weekly enforcement reports identified 1,845 recalls; 605 (32.8%) of these included computers, 35 (1.9%) stored patient data, and 31 (1.7%) were capable of wireless communication. Searches of databases specific to recalls and adverse events identified only one event with a specific connection to security or privacy. Software-related recalls were relatively common, and most (81.8%) mentioned the possibility of upgrades, though only half of these provided specific instructions for the update mechanism. Conclusions Our review of recalls and adverse events from federal government databases reveals sharp inconsistencies with databases at individual providers with respect to security and privacy risks. Recalls related to software may increase security risks because of unprotected update and correction mechanisms. To detect signals of security and privacy problems that adversely affect public health, federal postmarket surveillance strategies should rethink how to effectively and efficiently collect data on security and privacy problems in devices that increasingly depend on computing systems susceptible to malware. PMID:22829874

  11. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  12. Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access

    OpenAIRE

    Muhammad, M.A.; Zadeh, P.B.; Ayesh, Aladdin, 1972-

    2017-01-01

    With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise contents and networks. The effectiveness of BYOD offers several business benefits like employee job satisfaction, increased job efficiency and flexibility. However, allowing employees to bring their own devices could lead to a plethora of security issues; like data theft, un...

  13. Tunable Optical True-Time Delay Devices Would Exploit EIT

    Science.gov (United States)

    Kulikov, Igor; DiDomenico, Leo; Lee, Hwang

    2004-01-01

    Tunable optical true-time delay devices that would exploit electromagnetically induced transparency (EIT) have been proposed. Relative to prior true-time delay devices (for example, devices based on ferroelectric and ferromagnetic materials) and electronically controlled phase shifters, the proposed devices would offer much greater bandwidths. In a typical envisioned application, an optical pulse would be modulated with an ultra-wideband radio-frequency (RF) signal that would convey the information that one seeks to communicate, and it would be required to couple differently delayed replicas of the RF signal to the radiating elements of a phased-array antenna. One or more of the proposed devices would be used to impose the delays and/or generate the delayed replicas of the RF-modulated optical pulse. The beam radiated or received by the antenna would be steered by use of a microprocessor-based control system that would adjust operational parameters of the devices to tune the delays to the required values. EIT is a nonlinear quantum optical interference effect that enables the propagation of light through an initially opaque medium. A suitable medium must have, among other properties, three quantum states (see Figure 1): an excited state (state 3), an upper ground state (state 2), and a lower ground state (state 1). These three states must form a closed system that exhibits no decays to other states in the presence of either or both of two laser beams: (1) a probe beam having the wavelength corresponding to the photon energy equal to the energy difference between states 3 and 1; and (2) a coupling beam having the wavelength corresponding to the photon energy equal to the energy difference between states 3 and 2. The probe beam is the one that is pulsed and modulated with an RF signal.

  14. The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    Science.gov (United States)

    Patten, Karen P.; Harris, Mark A.

    2013-01-01

    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…

  15. Fast and Scalable Fabrication of Microscopic Optical Surfaces and its Application for Optical Interconnect Devices

    Science.gov (United States)

    Summitt, Christopher Ryan

    The use of optical interconnects is a promising solution to the increasing demand for high speed mass data transmission used in integrated circuits as well as device to device data transfer applications. For the purpose, low cost polymer waveguides are a popular choice for routing signal between devices due to their compatibility with printed circuit boards. In optical interconnect, coupling from an external light source to such waveguides is a critical step, thus a variety of couplers have been investigated such as grating based couplers [1,2], evanescent couplers [3], and embedded mirrors [4-6]. These couplers are inherently micro-optical components which require fast and scalable fabrication for mass production with optical quality surfaces/structures. Low NA laser direct writing has been used for fast fabrication of structures such as gratings and Fresnel lenses using a linear laser direct writing scheme, though the length scale of such structures are an order of magnitude larger than the spot size of the focused laser of the tool. Nonlinear writing techniques such as with 2-photon absorption offer increased write resolution which makes it possible to fabricate sub-wavelength structures as well as having a flexibility in feature shape. However it does not allow a high speed fabrication and in general are not scalable due to limitations of speed and area induced by the tool's high NA optics. To overcome such limitations primarily imposed by NA, we propose a new micro-optic fabrication process which extends the capabilities of 1D, low NA, and thus fast and scalable, laser direct writing to fabricate a structure having a length scale close to the tool's spot size, for example, a mirror based and 45 degree optical coupler with optical surface quality. The newly developed process allows a high speed fabrication with a write speed of 2600 mm²/min by incorporating a mask based lithography method providing a blank structure which is critical to creating a 45 degree

  16. Fabrication of optical devices in poly(dimethylsiloxane) by proton microbeam

    International Nuclear Information System (INIS)

    Huszank, R.; Szilasi, S.Z.; Rajta, I.; Csik, A.

    2009-01-01

    Complete text of publication follows. Optical diffraction grating and micro Fresnel zone plate type structures were fabricated in relatively thin poly(dimethylsiloxane) (PDMS) layers using proton beam writing technique and the performance of these optical devices was tested. Micro-optics is a key technology in many fields of common applications like, for example, data communication, lighting technology, industrial automation, display technology, sensing applications and data storage. It enables new functionalities and applications previously inaccessible and improves performance of the already available products with reduced cost, volume and weight. There are a few different fabrication techniques to produce refractive or diffractive micro-optical devices such as X-ray lithography, UV-lithography, e-beam lithography, laser writing, plasma etching, proton beam writing. In general, three different kinds of materials are used for micro-optics, such as glass, polymers and crystal. PDMS is a commonly used silicon-based organic polymer, optically clear, generally considered to be inert, non-toxic and biocompatible and it has been used as a resist material for direct write techniques only in very few cases. In this work, PDMS was used as a resist material; the structures were irradiated directly into the polymer. We were looking for a biocompatible, micropatternable polymer in which the chemical structure changes significantly due to proton beam exposure making the polymer capable of proton beam writing. We demonstrated that the change in the structure of the polymer is so significant that there is no need to perform any development processes. The proton irradiation causes refractive index change in the polymer, so diffraction gratings and other optical devices like Fresnel zone plates can be fabricated in this way. The observed high order diffraction patterns prove the high quality of the created optical devices [1]. This technique may be a useful tool for designing

  17. Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems

    Directory of Open Access Journals (Sweden)

    Gustavo Betarte

    2015-12-01

    Full Text Available In this work we investigate the security of security-critical applications, i.e. applications in which a failure may produce consequences that are unacceptable. We consider three areas: mobile devices, virtualization platforms, and domain name systems. The Java Micro Edition platform defines the Mobile Information Device Profile (MIDP to facilitate the development of applications for mobile devices, like cell phones and PDAs. We first study and compare formally several variants of the security model specified by MIDP to access sensitive resources of a mobile device. Hypervisors allow multiple guest operating systems to run on shared hardware, and offer a compelling means of improving the security and the flexibility of software systems. In this work we present a formalization of an idealized model of a hypervisor. We establish (formally that the hypervisor ensures strong isolation properties between the different operating systems, and guarantees that requests from guest operating systems are eventually attended. We show also that virtualized platforms are transparent, i.e. a guest operating system cannot distinguish whether it executes alone or together with other guest operating systems on the platform. The Domain Name System Security Extensions (DNSSEC is a suite of specifications that provides origin authentication and integrity assurance services for DNS data. We finally introduce a minimalistic specification of a DNSSEC model which provides the grounds needed to formally state and verify security properties concerning the chain of trust of the DNSSEC tree. We develop all our formalizations in the Calculus of Inductive Constructions --formal language that combines a higher-order logic and a richly-typed functional programming language-- using the Coq proof assistant.

  18. Health care professionals’ perception of security of personal health devices

    OpenAIRE

    Ondiege,Brian; Clarke,Malcolm

    2017-01-01

    Brian Ondiege, Malcolm Clarke Department of Computer Science, College of Engineering, Design and Physical Sciences, Brunel University London, UK Abstract: With the rapid advances in the capabilities of telehealth devices and their increasing connection to the Internet, security is becoming an issue of major concern. Therefore, the perceptions of the health care professionals regarding security are of interest, as the patients trust them to make informed decisions on issues concerning...

  19. Curvature effects in two-dimensional optical devices inspired by transformation optics

    KAUST Repository

    Yuan, Shuhao

    2016-11-14

    Light transport in curved quasi two-dimensional waveguides is considered theoretically. Within transformation optics and tensor theory, a concise description of curvature effects on transverse electric and magnetic waves is derived. We show that the curvature can induce light focusing and photonic crystal properties, which are confirmed by finite element simulations. Our results indicate that the curvature is an effective parameter for designing quasi two-dimensional optical devices in the fields of micro and nano photonics. © 2016 Author(s).

  20. A Secure and Robust Connectivity Architecture for Smart Devices and Applications

    Directory of Open Access Journals (Sweden)

    Lee YangSun

    2011-01-01

    Full Text Available Convergence environments and technologies are urgently coming close to our life with various wireless communications and smart devices in order to provide many benefits such as connectivity, usability, mobility, portability, and flexibility as well as lower installation and maintenance costs. Convergence has brought important change not only in the way we live but also in the way we think. It is the progress towards the attempt to create and to evolve new valuable services through the device convergence and fusion of in-home, office, and various environments around the personal mobile apparatus. Based on the dynamic trends of convergence, it is widely argued that the increased requirements on secure and robust connectivity between a variety of mobile devices and their applications provide us the era of real pervasive computing environment. Thus, in this paper, we present a novel connectivity architecture using RF4CE-(Radio Frequency for Consumer Electronics- based wireless zero-configuration and enhanced key agreement approach. We analyze the security and performance of our proposed approach by the development of the prototype H/W and the construction of a testbed with CE and mobile devices.

  1. A new repeatable, optical writing and electrical erasing device based on photochromism and electrochromism of viologen

    International Nuclear Information System (INIS)

    Gao, Li-ping; Wei, Jian; Wang, Yue-chuan; Ding, Guo-jing; Yang, Yu-lin

    2012-01-01

    New optical writing and electrical erasing devices have been successfully fabricated that exploit the photochromism and electrochromism of viologen. In a preliminary study, both the structures of viologen and device were investigated in detail by UV–vis spectra in order to confirm their effects on the optical writing and electrical erasing performances of corresponding devices. For sandwiched, single and complementary devices based on benzyl viologen (BV 2+ ), only optical writing can be performed, not electrical erasing operations, which indicated these devices cannot realize optical information rewriting. For single and complementary devices based on styrene-functional viologen (V BV 2+ ) and acrylic-functional viologen (ACV 2+ ), optical writing and electrical erasing operations can be reversibly performed and optical information rewriting realized. It is clear that single devices based on V BV 2+ and ACV 2+ possess better performance accompanied with contrast without significant degradation and bleaching times and without significant deterioration over 10 repeated writing/erasing cycles. Furthermore, we put forward possible mechanisms for sandwiched, single and complementary devices based on V BV 2+ and ACV 2+ for the optical writing and electrical erasing operations. This study provides a new strategy to design optical writing and electrical erasing devices to realize optical information rewriting. (paper)

  2. The optical-mechanical design of DMD modulation imaging device

    Science.gov (United States)

    Li, Tianting; Xu, Xiping; Qiao, Yang; Li, Lei; Pan, Yue

    2014-09-01

    In order to avoid the phenomenon of some image information were lost, which is due to the jamming signals, such as incident laser, make the pixels dot on CCD saturated. In this article a device of optical-mechanical structure was designed, which utilized the DMD (Digital Micro mirror Device) to modulate the image. The DMD reflection imaging optical system adopts the telecentric light path. However, because the design is not only required to guarantee a 66° angle between the optical axis of the relay optics and the DMD, but also to ensure that the optical axis of the projection system keeps parallel with the perpendicular bisector of the micro-mirror which is in the "flat" state, so the TIR prism is introduced,and making the relay optics and the DMD satisfy the optical institution's requirements. In this paper, a mechanical structure of the imaging optical system was designed and at the meanwhile the lens assembly has been well connected and fixed and fine-tuned by detailed structural design, which included the tilt decentered lens, wedge flanges, prisms. By optimizing the design, the issues of mutual restraint between the inverting optical system and the projecting system were well resolved, and prevented the blocking of the two systems. In addition, the structure size of the whole DMD reflection imaging optical system was minimized; it reduced the energy loss and ensured the image quality.

  3. Diffractive generalized phase contrast for adaptive phase imaging and optical security

    DEFF Research Database (Denmark)

    Palima, Darwin; Glückstad, Jesper

    2012-01-01

    We analyze the properties of Generalized Phase Contrast (GPC) when the input phase modulation is implemented using diffractive gratings. In GPC applications for patterned illumination, the use of a dynamic diffractive optical element for encoding the GPC input phase allows for onthe- fly optimiza...... security applications and can be used to create phasebased information channels for enhanced information security....

  4. 3-5 modulation and switching devices for optical systems applications

    Science.gov (United States)

    Singh, Jasprit; Bhattacharya, Pallab

    1995-04-01

    The thrust for this three year program has been to develop novel devices and systems applications for multiple quantum well based devices. We have investigated architectures based upon the quantum confined Stark effect (QCSE), a means by which excitonic resonances in a quantum well are electric field tuned to shift the peaked absorption spectrum of the material. The devices based upon this concept have been used, in the past, to realize switching structures employing the characteristic negative differential resistance available in PIN-MQW diodes under illumination. We have focuses, primarily on three schemes based upon the QCSE, to extend the utility of quantum well based devices. Firstly, we have developed, tested and optimized a novel tunable optical filter for wavelength selective applications. Secondly, we have demonstrated an MQW based scheme for optical pattern recognition which we have applied towards header recognition in a packet switching network environment. Thirdly, we have extended previous MQW based switching schemes to implement an optical read only memory (ROM) which can store two bits of information on a single sight, read by two different probe wavelengths of light.

  5. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    Science.gov (United States)

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  6. Detector-device-independent quantum key distribution: Security analysis and fast implementation

    International Nuclear Information System (INIS)

    Boaron, Alberto; Korzh, Boris; Boso, Gianluca; Martin, Anthony; Zbinden, Hugo; Houlmann, Raphael; Lim, Charles Ci Wen

    2016-01-01

    One of the most pressing issues in quantum key distribution (QKD) is the problem of detector side-channel attacks. To overcome this problem, researchers proposed an elegant “time-reversal” QKD protocol called measurement-device-independent QKD (MDI-QKD), which is based on time-reversed entanglement swapping. However, MDI-QKD is more challenging to implement than standard point-to-point QKD. Recently, an intermediary QKD protocol called detector-device-independent QKD (DDI-QKD) has been proposed to overcome the drawbacks of MDI-QKD, with the hope that it would eventually lead to a more efficient detector side-channel-free QKD system. Here, we analyze the security of DDI-QKD and elucidate its security assumptions. We find that DDI-QKD is not equivalent to MDI-QKD, but its security can be demonstrated with reasonable assumptions. On the more practical side, we consider the feasibility of DDI-QKD and present a fast experimental demonstration (clocked at 625 MHz), capable of secret key exchange up to more than 90 km.

  7. Quantum optical device accelerating dynamic programming

    OpenAIRE

    Grigoriev, D.; Kazakov, A.; Vakulenko, S.

    2005-01-01

    In this paper we discuss analogue computers based on quantum optical systems accelerating dynamic programming for some computational problems. These computers, at least in principle, can be realized by actually existing devices. We estimate an acceleration in resolving of some NP-hard problems that can be obtained in such a way versus deterministic computers

  8. Security devices and experiment facilities at ENEA TRIGA RC-1 reactor

    International Nuclear Information System (INIS)

    Bianchi, P.; Festinesi, A.; Santoro, E.; Tardani, G.; Magli, M.; Reis, G.

    1990-01-01

    RC-1 TRIGA operating exercise staff has produced some auxiliary security devices. These are the neutron source automatic handling device, irradiated samples rabbit connection rotating rack, and auxiliary equipment for transferring hot fuel elements. The reactor electronic control instrumentation system includes various instrumentation channels, the operating capability of which must be verified by the licensee as per Italian regulations. In order to obtain automatic and repeatable operations, TEMAV designed and constructed a remotely-driven source transfer device, based on requirements, performance specifications and technical data supplied by ENEA-TIB. The pneumatic irradiating system for short lived materials allows extraction of radiated samples in a time no longer than 4 seconds. To optimize the system, both as to operability and health protection, a specific rotating rack for the connection of irradiated samples with pneumatic transfer (RABBIT) was produced. To permit 1 MW hot fuel element storage in pits it is necessary to remove hot 100 KW fuel elements and transfer them to a re-treatment plant. Feasibility studies showed the impossibility of using heavy trucks inside the reactor hall. To avoid problems trucks are left outside the reactor hall and only the PEGASO container is removed with a special device that runs on rails. Movement from Rail truck is assured by an electromotor driving pull device and security cable

  9. 77 FR 65713 - Certain Optoelectronic Devices for Fiber Optic Communications, Components Thereof, and Products...

    Science.gov (United States)

    2012-10-30

    ... Fiber Optic Communications, Components Thereof, and Products Containing the Same; Notice of Institution... certain optoelectronic devices for fiber optic communications, components thereof, and products containing... optoelectronic devices for fiber optic communications, components thereof, and products containing the same that...

  10. Monitoring system of hydraulic lifting device based on the fiber optic sensors

    Science.gov (United States)

    Fajkus, Marcel; Nedoma, Jan; Novak, Martin; Martinek, Radek; Vanus, Jan; Mec, Pavel; Vasinek, Vladimir

    2017-10-01

    This article deals with the description of the monitoring system of hydraulic lifting device based on the fiber-optic sensors. For minimize the financial costs of the proposed monitoring system, the power evaluation of measured signal has been chosen. The solution is based on an evaluation of the signal obtained using the single point optic fiber sensors with overlapping reflective spectra. For encapsulation of the sensors was used polydimethylsiloxane (PDMS) polymer. To obtain a information of loading is uses the action of deformation of the lifting device on the pair single point optic fiber sensors mounted on the lifting device of the tested car. According to the proposed algorithm is determined information of pressure with an accuracy of +/- 5 %. Verification of the proposed system was realized on the various types of the tested car with different loading. The original contribution of the paper is to verify the new low-cost system for monitoring the hydraulic lifting device based on the fiber-optic sensors.

  11. Design and Implementation of Secure and Reliable Communication using Optical Wireless Communication

    Science.gov (United States)

    Saadi, Muhammad; Bajpai, Ambar; Zhao, Yan; Sangwongngam, Paramin; Wuttisittikulkij, Lunchakorn

    2014-11-01

    Wireless networking intensify the tractability in the home and office environment to connect the internet without wires but at the cost of risks associated with stealing the data or threat of loading malicious code with the intention of harming the network. In this paper, we proposed a novel method of establishing a secure and reliable communication link using optical wireless communication (OWC). For security, spatial diversity based transmission using two optical transmitters is used and the reliability in the link is achieved by a newly proposed method for the construction of structured parity check matrix for binary Low Density Parity Check (LDPC) codes. Experimental results show that a successful secure and reliable link between the transmitter and the receiver can be achieved by using the proposed novel technique.

  12. A novel optic bistable device with very low threshold intensity using photorefractive films

    Science.gov (United States)

    Wang, Sean X.; Sun, Yuankun; Trivedi, Sudhir B.; Li, Guifang

    1994-08-01

    Brimrose Corporation of America reports the successful completion of the SBIR Phase I research in low-threshold intensity optical bistable devices using photorefractive nonlinearity. A thin photorefractive film optical bistable device was proposed in the Phase I proposal. The feasibility of this device was theoretically investigated. The theoretical feasibility study formulates the materials requirements in such a kind of configuration for Phase II research. In addition, we have proposed and investigated another configuration of optical bistable devices that do not require advanced photorefractive materials, namely, the self-pumped phase conjugator. We have successfully demonstrated a low-threshold optical bistable operation in a KNSBN:CU crystal. To the best of our knowledge, the threshold of 650 mW/sq. cm is the lowest of its kind to be achieved so far.

  13. Implantable optogenetic device with CMOS IC technology for simultaneous optical measurement and stimulation

    Science.gov (United States)

    Haruta, Makito; Kamiyama, Naoya; Nakajima, Shun; Motoyama, Mayumi; Kawahara, Mamiko; Ohta, Yasumi; Yamasaki, Atsushi; Takehara, Hiroaki; Noda, Toshihiko; Sasagawa, Kiyotaka; Ishikawa, Yasuyuki; Tokuda, Takashi; Hashimoto, Hitoshi; Ohta, Jun

    2017-05-01

    In this study, we have developed an implantable optogenetic device that can measure and stimulate neurons by an optical method based on CMOS IC technology. The device consist of a blue LED array for optically patterned stimulation, a CMOS image sensor for acquiring brain surface image, and eight green LEDs surrounding the CMOS image sensor for illumination. The blue LED array is placed on the CMOS image sensor. We implanted the device in the brain of a genetically modified mouse and successfully demonstrated the stimulation of neurons optically and simultaneously acquire intrinsic optical images of the brain surface using the image sensor. The integrated device can be used for simultaneously measuring and controlling neuronal activities in a living animal, which is important for the artificial control of brain functions.

  14. Organizational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry

    Science.gov (United States)

    Cooper, Paul K.

    2017-01-01

    There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…

  15. Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device

    Directory of Open Access Journals (Sweden)

    Hyun-Woo Kim

    2014-01-01

    Full Text Available Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  16. Time pattern locking scheme for secure multimedia contents in human-centric device.

    Science.gov (United States)

    Kim, Hyun-Woo; Kim, Jun-Ho; Park, Jong Hyuk; Jeong, Young-Sik

    2014-01-01

    Among the various smart multimedia devices, multimedia smartphones have become the most widespread due to their convenient portability and real-time information sharing, as well as various other built-in features. Accordingly, since personal and business activities can be carried out using multimedia smartphones without restrictions based on time and location, people have more leisure time and convenience than ever. However, problems such as loss, theft, and information leakage because of convenient portability have also increased proportionally. As a result, most multimedia smartphones are equipped with various built-in locking features. Pattern lock, personal identification numbers, and passwords are the most used locking features on current smartphones, but these are vulnerable to shoulder surfing and smudge attacks, allowing malicious users to bypass the security feature easily. In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. In this paper, we propose the secure locking screen using time pattern (SLSTP) focusing on improved security and convenience for users to support human-centric multimedia device completely. The SLSTP can provide a simple interface to users and reduce the risk factors pertaining to security leakage to malicious third parties.

  17. Compact and high-efficiency device for Raman scattering measurement using optical fibers.

    Science.gov (United States)

    Mitsui, Tadashi

    2014-11-01

    We describe the design and development of a high-efficiency optical measurement device for operation within the small bore of a high-power magnet at low temperature. For the high-efficiency measurement of light emitted from this small region, we designed a compact confocal optics with lens focusing and tilting systems, and used a piezodriven translation stage that allows micron-scale focus control of the sample position. We designed a measurement device that uses 10 m-long optical fibers in order to avoid the influence of mechanical vibration and magnetic field leakage of high-power magnets, and we also describe a technique for minimizing the fluorescence signal of optical fibers. The operation of the device was confirmed by Raman scattering measurements of monolayer graphene on quartz glass with a high signal-to-noise ratio.

  18. Study of 3D printing method for GRIN micro-optics devices

    Science.gov (United States)

    Wang, P. J.; Yeh, J. A.; Hsu, W. Y.; Cheng, Y. C.; Lee, W.; Wu, N. H.; Wu, C. Y.

    2016-03-01

    Conventional optical elements are based on either refractive or reflective optics theory to fulfill the design specifications via optics performance data. In refractive optical lenses, the refractive index of materials and radius of curvature of element surfaces determine the optical power and wavefront aberrations so that optical performance can be further optimized iteratively. Although gradient index (GRIN) phenomenon in optical materials is well studied for more than a half century, the optics theory in lens design via GRIN materials is still yet to be comprehensively investigated before realistic GRIN lenses are manufactured. In this paper, 3D printing method for manufacture of micro-optics devices with special features has been studied based on methods reported in the literatures. Due to the additive nature of the method, GRIN lenses in micro-optics devices seem to be readily achievable if a design methodology is available. First, derivation of ray-tracing formulae is introduced for all possible structures in GRIN lenses. Optics simulation program is employed for characterization of GRIN lenses with performance data given by aberration coefficients in Zernike polynomial. Finally, a proposed structure of 3D printing machine is described with conceptual illustration.

  19. Eat-by-light fiber-optic and micro-optic devices for food quality and safety assessment

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Grimaldi, M. F.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.

    2007-06-01

    A selection is presented of fiber-optic and micro-optic devices that have been designed and tested for guaranteeing the quality and safety of typical foods, such as extra virgin olive oil, beer, and milk. Scattered colorimetry is used to authenticate various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids, which are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma that is capable of distinguishing different ageing levels of extra virgin olive oil is also presented. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer for the rapid monitoring of the carcinogenic M1 aflatoxin in milk, is experimented.

  20. Eat-by-light: fiber-optic and micro-optic devices for food safety and quality assessment

    Science.gov (United States)

    Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.

    2007-07-01

    A selection of fiber-optic and micro-optic devices is presented designed and tested for monitoring the quality and safety of typical foods, namely the extra virgin olive oil, the beer, and the milk. Scattered colorimetry is used for the authentication of various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids that are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma is presented. It is capable of distinguishing different ageing levels of extra virgin olive oil. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer is experimented for the rapid monitoring of the carcinogenic M1 aflatoxin in milk.

  1. Implantable optical-electrode device for stimulation of spinal motoneurons

    International Nuclear Information System (INIS)

    Matveev, M V; Erofeev, A I; Zakharova, O A; Vlasova, O L; Pyatyshev, E N; Kazakin, A N

    2016-01-01

    Recent years, optogenetic method of scientific research has proved its effectiveness in the nerve cell stimulation tasks. In our article we demonstrate an implanted device for the spinal optogenetic motoneurons activation. This work is carried out in the Laboratory of Molecular Neurodegeneration of the Peter the Great St. Petersburg Polytechnic University, together with Nano and Microsystem Technology Laboratory. The work of the developed device is based on the principle of combining fiber optic light stimulation of genetically modified cells with the microelectrode multichannel recording of neurons biopotentials. The paper presents a part of the electrode implant manufacturing technique, combined with the optical waveguide of ThorLabs (USA). (paper)

  2. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  3. Invited Article: Acousto-optic finite-difference frequency-domain algorithm for first-principles simulations of on-chip acousto-optic devices

    Directory of Open Access Journals (Sweden)

    Yu Shi

    2017-02-01

    Full Text Available We introduce a finite-difference frequency-domain algorithm for coupled acousto-optic simulations. First-principles acousto-optic simulation in time domain has been challenging due to the fact that the acoustic and optical frequencies differ by many orders of magnitude. We bypass this difficulty by formulating the interactions between the optical and acoustic waves rigorously as a system of coupled nonlinear equations in frequency domain. This approach is particularly suited for on-chip devices that are based on a variety of acousto-optic interactions such as the stimulated Brillouin scattering. We validate our algorithm by simulating a stimulated Brillouin scattering process in a suspended waveguide structure and find excellent agreement with coupled-mode theory. We further provide an example of a simulation for a compact on-chip resonator device that greatly enhances the effect of stimulated Brillouin scattering. Our algorithm should facilitate the design of nanophotonic on-chip devices for the harnessing of photon-phonon interactions.

  4. Optical device comprising a cantilever and method of fabrication and use thereof

    NARCIS (Netherlands)

    Iannuzzi, Davide; Deladi, S.; Elwenspoek, Michael Curt

    2008-01-01

    The present invention provides an optical device, comprising an optical fiber and a cantilever that is arranged on an end of the optical fiber; The cantilever may be an integral part of the optical fiber, and may have a length that is substantially equal to a diameter of the optical fiber.

  5. Optical device comprising a cantilever and method of fabrication and use thereof

    NARCIS (Netherlands)

    Iannuzzi, Davide; Deladi, S.; Elwenspoek, Michael Curt

    2011-01-01

    The present invention provides an optical device, comprising an optical fiber and a cantilever that is arranged on an end of the optical fiber; The cantilever may be an integral part of the optical fiber, and may have a length that is substantially equal to a diameter of the optical fiber.

  6. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  7. Extending Security-by-Contract with Quantitative Trust on Mobile Devices

    DEFF Research Database (Denmark)

    Costa, Gabriele; Dragoni, Nicola; Lazouski, Aliaksandr

    2010-01-01

    program our architecture updates the trust level associated with the contract provider. We also present a possible application of our framework in the scenario of a mobile application marketplace, e.g., Apple AppStore, Cydia, Android Market, that, nowadays, are considered as one of the most attractive e......Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present the an extension of S×C, called Security-by-Contract-with-Trust (S×C×T). Indeed, we enrich the S×C architecture by integrating a trust model and adding new modules......-commerce activity for both mobile application developers and industries of mobile devices. Since the number of applications increases, Mobile Applications Marketplace (MAMp) sets up recommendation systems that rank and highlight mobile applications by category, social activity, etc. The S×C×T framework we propose...

  8. Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices

    Directory of Open Access Journals (Sweden)

    Andrea Baiocchi

    2015-01-01

    Full Text Available Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. On one side there is a need to maintain the logic of high level policies, which requires administrators to implement and update a large amount of filtering rules while keeping them conflict-free, that is, avoiding security inconsistencies. On the other side, traffic adaptive optimization of large rule lists is useful for general purpose computers used as filtering devices, without specific designed hardware, to face growing link speeds and to harden filtering devices against DoS and DDoS attacks. Our work joins the two issues in an innovative way and defines a traffic adaptive algorithm to find conflict-free optimized rule sets, by relying on information gathered with traffic logs. The proposed approach suits current technology architectures and exploits available features, like traffic log databases, to minimize the impact of ACO development on the packet filtering devices. We demonstrate the benefit entailed by the proposed algorithm through measurements on a test bed made up of real-life, commercial packet filtering devices.

  9. Applied optics fundamentals and device applications nano, MOEMS, and biotechnology

    CERN Document Server

    Mentzer, Mark

    2011-01-01

    How does the field of optical engineering impact biotechnology? Perhaps for the first time, Applied Optics Fundamentals and Device Applications: Nano, MOEMS, and Biotechnology answers that question directly by integrating coverage of the many disciplines and applications involved in optical engineering, and then examining their applications in nanobiotechnology. Written by a senior U.S. Army research scientist and pioneer in the field of optical engineering, this book addresses the exponential growth in materials, applications, and cross-functional relevance of the many convergent disciplines

  10. Monolithic integration of optical waveguides for absorbance detection in microfabricated electrophoresis devices

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Petersen, Nickolaj Jacob; Hübner, Jörg

    2001-01-01

    . The waveguides on the device were connected to optical fibers, which enabled alignment free operation due to the absence of free-space optics. A 750 mum long U-shaped detection cell was used to facilitate longitudinal absorption detection. To minimize geometrically induced band broadening at the turn in the U......The fabrication and performance of an electrophoretic separation chip with integrated of optical waveguides for absorption detection is presented. The device was fabricated on a silicon substrate by standard microfabrication techniques with the use of two photolithographic mask steps...

  11. Theory-Guided Design of Organic Electro-Optic Materials and Devices

    Directory of Open Access Journals (Sweden)

    Stephanie Benight

    2011-08-01

    Full Text Available Integrated (multi-scale quantum and statistical mechanical theoretical methods have guided the nano-engineering of controlled intermolecular electrostatic interactions for the dramatic improvement of acentric order and thus electro-optic activity of melt-processable organic polymer and dendrimer electro-optic materials. New measurement techniques have permitted quantitative determination of the molecular order parameters, lattice dimensionality, and nanoscale viscoelasticity properties of these new soft matter materials and have facilitated comparison of theoretically-predicted structures and thermodynamic properties with experimentally-defined structures and properties. New processing protocols have permitted further enhancement of material properties and have facilitated the fabrication of complex device structures. The integration of organic electro-optic materials into silicon photonic, plasmonic, and metamaterial device architectures has led to impressive new performance metrics for a variety of technological applications.

  12. Evaluation of 2 new optical biometry devices and comparison with the current gold standard biometer.

    Science.gov (United States)

    Chen, Yen-An; Hirnschall, Nino; Findl, Oliver

    2011-03-01

    To compare 2 new optical biometry devices with the present gold standard biometer. Vienna Institute for Research in Ocular Surgery, Department of Ophthalmology, Hanusch Hospital, Vienna, Austria. Evaluation of diagnostic test or technology. In patients scheduled for cataract surgery, measurements performed with the current gold standard optical biometer (IOLMaster) were compared with those of 2 new optical biometers, the Lenstar LS 900 (optical low-coherence reflectometry [OLCR] device; substudy 1) and the IOLMaster 500 (partial coherence interferometry [PCI] device; substudy 2). The duration of patient data entry and of the actual measurement process and the time from intraocular lens power calculation to printout were calculated. The mean difference in axial length measurements was 0.01 mm ± 0.05 (SD) between the gold standard device and the new OLCR device and 0.01 ± 0.02 mm between the gold standard device and the new PCI device (P=.12 and P gold standard device (mean difference 209 ± 127 seconds), and measurements with the gold standard device took significantly longer than with the new PCI device (mean difference 82 ± 46 seconds) (both P gold standard device. Measurements with the new OLCR device took twice as long as those with the gold standard device. Copyright © 2011 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  13. Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos.

    Science.gov (United States)

    Ai, Jianzhou; Wang, Lulu; Wang, Jian

    2017-09-15

    Chaos-based secure communication can provide a high level of privacy in data transmission. Here, we experimentally demonstrate secure signal transmission over two kinds of multimode fiber (MMF) based on electro-optic intensity chaos. High-quality synchronization is achieved in an electro-optic feedback configuration. Both 5  Gbit/s carrier-less amplitude/phase (CAP-4) modulation and 10  Gbit/s on-off key (OOK) signals are recovered efficiently in electro-optic chaos-based communication systems. Degradations of chaos synchronization and communication system due to mismatch of various hardware keys are also discussed.

  14. Modelling of new generation plasma optical devices

    Directory of Open Access Journals (Sweden)

    Litovko Irina V.

    2016-06-01

    Full Text Available The paper presents new generation plasma optical devices based on the electrostatic plasma lens configuration that opens a novel attractive possibility for effective high-tech practical applications. Original approaches to use of plasma accelerators with closed electron drift and open walls for the creation of a cost-effective low-maintenance plasma lens with positive space charge and possible application for low-cost, low-energy rocket engine are described. The preliminary experimental, theoretical and simulation results are presented. It is noted that the presented plasma devices are attractive for many different applications in the state-of-the-art vacuum-plasma processing.

  15. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    Science.gov (United States)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  16. Additional security features for optically variable foils

    Science.gov (United States)

    Marshall, Allan C.; Russo, Frank

    1998-04-01

    For thousands of years, man has exploited the attraction and radiance of pure gold to adorn articles of great significance. Today, designers decorate packaging with metallic gold foils to maintain the prestige of luxury items such as perfumes, chocolates, wine and whisky, and to add visible appeal and value to wide range of products. However, today's products do not call for the hand beaten gold leaf of the Ancient Egyptians, instead a rapid production technology exists which makes use of accurately coated thin polymer films and vacuum deposited metallic layers. Stamping Foils Technology is highly versatile since several different layers may be combined into one product, each providing a different function. Not only can a foil bring visual appeal to an article, it can provide physical and chemical resistance properties and also protect an article from human forms of interference, such as counterfeiting, copying or tampering. Stamping foils have proved to be a highly effective vehicle for applying optical devices to items requiring this type of protection. Credit cards, bank notes, personal identification documents and more recently high value packaged items such as software and perfumes are protected by optically variable devices applied using stamping foil technology.

  17. Multi-scale theory-assisted nano-engineering of plasmonic-organic hybrid electro-optic device performance

    Science.gov (United States)

    Elder, Delwin L.; Johnson, Lewis E.; Tillack, Andreas F.; Robinson, Bruce H.; Haffner, Christian; Heni, Wolfgang; Hoessbacher, Claudia; Fedoryshyn, Yuriy; Salamin, Yannick; Baeuerle, Benedikt; Josten, Arne; Ayata, Masafumi; Koch, Ueli; Leuthold, Juerg; Dalton, Larry R.

    2018-02-01

    Multi-scale (correlated quantum and statistical mechanics) modeling methods have been advanced and employed to guide the improvement of organic electro-optic (OEO) materials, including by analyzing electric field poling induced electro-optic activity in nanoscopic plasmonic-organic hybrid (POH) waveguide devices. The analysis of in-device electro-optic activity emphasizes the importance of considering both the details of intermolecular interactions within organic electro-optic materials and interactions at interfaces between OEO materials and device architectures. Dramatic improvement in electro-optic device performance-including voltage-length performance, bandwidth, energy efficiency, and lower optical losses have been realized. These improvements are critical to applications in telecommunications, computing, sensor technology, and metrology. Multi-scale modeling methods illustrate the complexity of improving the electro-optic activity of organic materials, including the necessity of considering the trade-off between improving poling-induced acentric order through chromophore modification and the reduction of chromophore number density associated with such modification. Computational simulations also emphasize the importance of developing chromophore modifications that serve multiple purposes including matrix hardening for enhanced thermal and photochemical stability, control of matrix dimensionality, influence on material viscoelasticity, improvement of chromophore molecular hyperpolarizability, control of material dielectric permittivity and index of refraction properties, and control of material conductance. Consideration of new device architectures is critical to the implementation of chipscale integration of electronics and photonics and achieving the high bandwidths for applications such as next generation (e.g., 5G) telecommunications.

  18. Remote Wiping and Secure Deletion on Mobile Devices: A Review.

    Science.gov (United States)

    Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray

    2016-11-01

    Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.

  19. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Science.gov (United States)

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  20. Method and device for monitoring distortion in an optical network

    NARCIS (Netherlands)

    2012-01-01

    A method and a device for monitoring of distortion in an optical network are provided, wherein at least one reference signal and at least one data signal are conveyed via an optical link and wherein a distortion of the at least one data signal is determined based on the at least one reference

  1. Summary of the recent conference on thin-film neutron optical devices

    International Nuclear Information System (INIS)

    Majkrzak, C.F.

    1989-01-01

    The proceedings of the conference of the International Society for Optical Engineering on Thin-Film Neutron Optical Devices: Mirrors, Supermirrors, Multilayer Monochromators, Polarizers and Beam Guides, which was held in San Diego, California in August, 1988, are summarized here. 2 refs

  2. A Novel QKD-based Secure Edge Router Architecture Design for Burst Confidentiality in Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.

    2014-06-01

    The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.

  3. Quantum Dot Devices for Optical Signal Processing

    DEFF Research Database (Denmark)

    Chen, Yaohui

    and the continuum. Additional to the conventional time-domain modeling scheme, a small-signal perturbation analysis has been used to assist the investigation of harmonic modulation properties. The static properties of quantum dot devices, for example high saturation power, have been quantitatively analyzed....... Additional to the static linear amplication properties, we focus on exploring the gain dynamics on the time scale ranging from sub-picosecond to nanosecond. In terms of optical signals that have been investigated, one is the simple sinusoidally modulated optical carrier with a typical modulation frequency....... We also investigate the gain dynamics in the presence of pulsed signals, in particular the steady gain response to a periodic pulse trains with various time periods. Additional to the analysis of high speed patterning free amplication up to 150-200 Gb/s in quantum dot semiconductor optical ampliers...

  4. CMOS-based optical energy harvesting circuit for biomedical and Internet of Things devices

    Science.gov (United States)

    Nattakarn, Wuthibenjaphonchai; Ishizu, Takaaki; Haruta, Makito; Noda, Toshihiko; Sasagawa, Kiyotaka; Tokuda, Takashi; Sawan, Mohamad; Ohta, Jun

    2018-04-01

    In this work, we present a novel CMOS-based optical energy harvesting technology for implantable and Internet of Things (IoT) devices. In the proposed system, a CMOS energy-harvesting circuit accumulates a small amount of photoelectrically converted energy in an external capacitor, and intermittently supplies this power to a target device. Two optical energy-harvesting circuit types were implemented and evaluated. Furthermore, we developed a photoelectrically powered optical identification (ID) circuit that is suitable for IoT technology applications.

  5. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  6. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  7. Determination of sieve grading curves using an optical device

    OpenAIRE

    PHAM, AM; DESCANTES, Yannick; DE LARRARD, François

    2011-01-01

    The grading curve of an aggregate is a fundamental characteristic for mix design that can easily be modified to adjust several mix properties. While sieve analysis remains the reference method to determine this curve, optical devices are developing, allowing easier and faster assessment of aggregate grading. Unfortunately, optical grading results significantly differ from sieve grading curves. As a consequence, getting full acceptance of these new methods requires building bridges between the...

  8. Active functional devices using parity-time symmetry optics (Conference Presentation)

    Science.gov (United States)

    Brac de la Perriere, Vincent; Benisty, Henri; Ramdane, Abderrahim; Lupu, Anatole

    2017-05-01

    The progress of nanotechnologies has triggered the emergence of many photonic artificial structures: photonic crystals, metamaterials, plasmonic resonators. Recently the intriguing class of PT-symmetric devices, referring to Parity-Time symmetry [1] has attracted much attention. The characteristic feature of PT-symmetry is that the structures' refractive index profile is complex-valued due to the presence of alternating gain and loss regions in the system. Apart from fundamental research motivations, the tremendous interest in these artificial systems is strongly driven by the practical outcomes expected to foster a new generation of tunable, reconfigurable and non-reciprocal devices. The principle of gain-loss modulation lying in the heart of PT-symmetry optics enables a range of innovative solutions in the field of integrated optics at 1.5μm [2-7]. By using PT-symmetric coupled waveguides and Bragg reflectors as fundamental building blocks, it is possible to build a wide variety of functional optical devices. The PT-symmetry principle provides an alternative way for the realization of active devices that could become functional in a new platform for integrated optics. For instance one major bottleneck of the III-V/Si hybrid integration approach is that each type of active devices (laser, modulator, etc) requires a specific composition of III-V semiconductor alloy, involving a variety of (re)growth challenges. The advantage of the PT-symmetry solution is that the fabrication of all these devices can be done with a single stack of III-V semiconductor alloys that greatly simplifies the technological process. The aim of the current contribution is to provide a survey of the most promising applications of PT-symmetry in photonics with a particular emphases on the transition from theoretical concepts to experimental devices. The intention is to draw attention to the risks and issues related to the practical implementation that are most often overlooked in the basic

  9. Devices and optics for photovoltaic conversion

    International Nuclear Information System (INIS)

    Arujo, G.L.

    1991-01-01

    Photovoltaic energy is one of the most promising renewable energies. The contents of this article deals firstly with the physics of the devices and the optics employed to convert directly sunlight into electricity. Secondly the state of the art of the high efficiency solar cells and concentration systems will be addressed. Finally, there will be some concluding comments about the future prospects of the photovoltaic energy. PV energy conversion is at present a viable technology to produce electricity. But unfortunately its cost is still too high to be competitive with grid connected applications. Roughly speaking there are two main strategies for reducing costs in PV: One of them relies on thin-film, low cost solar cells and modules and the other relies on high efficiency solar cells and modules used, in many cases, in combination with optical concentration. This work will focus in high efficiency solar cells, what means that good quality crystalline semiconductor materials are involved, and in the optics used in concentration systems. 25 figs, 2 tabs

  10. Optical tests for using smartphones inside medical devices

    Science.gov (United States)

    Bernat, Amir S.; Acobas, Jennifer K.; Phang, Ye Shang; Hassan, David; Bolton, Frank J.; Levitz, David

    2018-02-01

    Smartphones are currently used in many medical applications and are more frequently being integrated into medical imaging devices. The regulatory requirements in existence today however, particularly the standardization of smartphone imaging through validation and verification testing, only partially cover imaging characteristics with a smartphone. Specifically, it has been shown that smartphone camera specifications are of sufficient quality for medical imaging, and there are devices which comply with the FDA's regulatory requirements for a medical device such as a device's field of view, direction of viewing and optical resolution and optical distortion. However, these regulatory requirements do not call specifically for color testing. Images of the same object using automatic settings or different light sources can show different color composition. Experimental results showing such differences are presented. Under some circumstances, such differences in color composition could potentially lead to incorrect diagnoses. It is therefore critical to control the smartphone camera and illumination parameters properly. This paper examines different smartphone camera settings that affect image quality and color composition. To test and select the correct settings, a test methodology is proposed. It aims at evaluating and testing image color correctness and white balance settings for mobile phones and LED light sources. Emphasis is placed on color consistency and deviation from gray values, specifically by evaluating the ΔC values based on the CIEL*a*b* color space. Results show that such standardization minimizes differences in color composition and thus could reduce the risk of a wrong diagnosis.

  11. From sniffer dogs to emerging sniffer devices for airport security: an opportunity to rethink privacy implications?

    Science.gov (United States)

    Bonfanti, Matteo E

    2014-09-01

    Dogs are known for their incredible ability to detect odours, extracting them from a "complex" environment and recognising them. This makes sniffer dogs precious assets in a broad variety of security applications. However, their use is subject to some intrinsic restrictions. Dogs can only be trained to a limited set of applications, get tired after a relatively short period, and thus require a high turnover. This has sparked a drive over the past decade to develop artificial sniffer devices-generally known as "chemical sniffers" or "electronic noses"-able to complement and possibly replace dogs for some security applications. Such devices have been already deployed, or are intended to be deployed, at borders, airports and other critical installation security checkpoints. Similarly to dogs, they are adopted for detecting residual traces that indicate either the presence of, or recent contact with, substances like drugs and explosives. It goes without saying that, as with sniffer dogs, the use of artificial sniffer devices raises many sensitive issues. Adopting an ethical and legal perspective, the present paper discusses the privacy and data protection implications of the possible deployment of a hand-held body scanning sniffer for screening passengers at EU airport security checkpoints.

  12. Novel wearable-type biometric devices based on skin tissue optics with multispectral LED-photodiode matrix

    Science.gov (United States)

    Jo, Young Chang; Kim, Hae Na; Kang, Jae Hwan; Hong, Hyuck Ki; Choi, Yeon Shik; Jung, Suk Won; Kim, Sung Phil

    2017-04-01

    In this study, we examined the possibility of using a multispectral skin photomatrix (MSP) module as a novel biometric device. The MSP device measures optical patterns of the wrist skin tissue. Optical patterns consist of 2 × 8 photocurrent intensities of photodiode arrays, which are generated by optical transmission and diffuse reflection of photons from LED light sources with variable wavelengths into the wrist skin tissue. Optical patterns detected by the MSP device provide information on both the surface and subsurface characteristics of the human skin tissue. We found that in the 21 subjects we studied, they showed their unique characteristics, as determined using several wavelengths of light. The experimental results show that the best personal identification accuracy can be acquired using a combination of infrared light and yellow light. This novel biometric device, the MSP module, exhibited an excellent false acceptance rate (FAR) of 0.3% and a false rejection rate (FRR) of 0.0%, which are better than those of commercialized biometric devices such as a fingerprint biometric system. From these experimental results, we found that people exhibit unique optical patterns of their inner-wrist skin tissue and this uniqueness could be used for developing novel high-accuracy personal identification devices.

  13. InP on SOI devices for optical communication and optical network on chip

    Science.gov (United States)

    Fedeli, J.-M.; Ben Bakir, B.; Olivier, N.; Grosse, Ph.; Grenouillet, L.; Augendre, E.; Phillippe, P.; Gilbert, K.; Bordel, D.; Harduin, J.

    2011-01-01

    For about ten years, we have been developing InP on Si devices under different projects focusing first on μlasers then on semicompact lasers. For aiming the integration on a CMOS circuit and for thermal issue, we relied on SiO2 direct bonding of InP unpatterned materials. After the chemical removal of the InP substrate, the heterostructures lie on top of silicon waveguides of an SOI wafer with a separation of about 100nm. Different lasers or photodetectors have been achieved for off-chip optical communication and for intra-chip optical communication within an optical network. For high performance computing with high speed communication between cores, we developed InP microdisk lasers that are coupled to silicon waveguide and produced 100μW of optical power and that can be directly modulated up to 5G at different wavelengths. The optical network is based on wavelength selective circuits with ring resonators. InGaAs photodetectors are evanescently coupled to the silicon waveguide with an efficiency of 0.8A/W. The fabrication has been demonstrated at 200mm wafer scale in a microelectronics clean room for CMOS compatibility. For off-chip communication, silicon on InP evanescent laser have been realized with an innovative design where the cavity is defined in silicon and the gain localized in the QW of bonded InP hererostructure. The investigated devices operate at continuous wave regime with room temperature threshold current below 100 mA, the side mode suppression ratio is as high as 20dB, and the fibercoupled output power is {7mW. Direct modulation can be achieved with already 6G operation.

  14. Secured Optical Communications Using Quantum Entangled Two-Photon Transparency Modulation

    Science.gov (United States)

    Kojima, Jun (Inventor); Nguyen, Quang-Viet (Inventor); Lekki, John (Inventor)

    2015-01-01

    A system and method is disclosed wherein optical signals are coded in a transmitter by tuning or modulating the interbeam delay time (which modulates the fourth-order coherence) between pairs of entangled photons. The photon pairs are either absorbed or not absorbed (transparent) by an atomic or molecular fluorescer in a receiver, depending on the inter-beam delay that is introduced in the entangled photon pairs. Upon the absorption, corresponding fluorescent optical emissions follow at a certain wavelength, which are then detected by a photon detector. The advantage of the disclosed system is that it eliminates a need of a coincidence counter to realize the entanglement-based secure optical communications because the absorber acts as a coincidence counter for entangled photon pairs.

  15. Planar ultra thin glass seals with optical fiber interface for monitoring tamper attacks on security eminent components

    Science.gov (United States)

    Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.

    2017-11-01

    Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.

  16. Optical devices in adverse environments; Proceedings of the Meeting, Cannes, France, Nov. 19, 20, 1987

    International Nuclear Information System (INIS)

    Greenwell, R.A.

    1988-01-01

    Recent advances in the design of fiber-optic devices, test equipment, optical sensors, and lasers for operation in hostile environments are discussed in reviews and reports. Topics examined include radiation effects on optical fibers, the effect of H2 treatment and water content on the recovery of undoped core fibers after pulsed and continuous irradiation, the NATO test program for optical fibers and components, alpha-irradiation damage to borosilicate glasses, high-reliability optical components for undersea light-wave systems, the behavior of Si optoelectronic components under gamma irradiation, optical devices and sensors of special-purpose fibers, and a fiber-optic microprobe for interferometric measurements in generators

  17. Acrylic and metal based Y-branch plastic optical fiber splitter with optical NOA63 polymer waveguide taper region

    Science.gov (United States)

    Ehsan, Abang Annuar; Shaari, Sahbudin; Rahman, Mohd Kamil Abd.

    2011-01-01

    We proposed a simple low-cost acrylic and metal-based Y-branch plastic optical fiber (POF) splitter which utilizes a low cost optical polymer glue NOA63 as the main waveguiding medium at the waveguide taper region. The device is composed of three sections: an input POF waveguide, a middle waveguide taper region and output POF waveguides. A desktop high speed CNC engraver is utilized to produce the mold inserts used for the optical devices. Short POF fibers are inserted into the engraved slots at the input and output ports. UV curable optical polymer glue NOA63 is injected into the waveguide taper region and cured. The assembling is completed when the top plate is positioned to enclose the device structure and connecting screws are secured. Both POF splitters have an average insertion loss of 7.8 dB, coupling ratio of 55: 45 and 57: 43 for the acrylic and metal-based splitters respectively. The devices have excess loss of 4.82 and 4.73 dB for the acrylic and metal-based splitters respectively.

  18. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    Science.gov (United States)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  19. Perceptions of the risk of child abduction or loss and the utility of child electronic security devices.

    Science.gov (United States)

    Dixon, R M; Pasnak, R

    1997-09-01

    Perceptions of the susceptibility of young children to becoming lost or being abducted, and of the potential usefulness of child electronic security devices, were examined via a questionnaire. Data were provided by 41 volunteers, most of them from a local government office centre. The questionnaire asked for demographic data, and then for the risk of a child being abducted or lost when under the supervision of different caregivers and in different situations. The probable effectiveness of three common abductor ploys was also addressed. The questionnaire concluded with 10 questions about child electronic security devices. Respondents viewed mothers, fathers, and grandparents as equally responsible caregivers and young adults/babysitters as the least responsible. These effects diminished as the age of the children increased. The garden at home was judged to be the most secure environment for children of all ages, while an amusement park was judged the least secure environment. Children were perceived to be more at risk of an abduction when a stranger asked for physical assistance or to take them to the hospital because their parents were hurt, than when asked for directions. Furthermore, the respondents expressed a moderately strong need for child electronic security devices, and viewed parents who use them as more responsible than those who do not.

  20. Materials and Reliability Handbook for Semiconductor Optical and Electron Devices

    CERN Document Server

    Pearton, Stephen

    2013-01-01

    Materials and Reliability Handbook for Semiconductor Optical and Electron Devices provides comprehensive coverage of reliability procedures and approaches for electron and photonic devices. These include lasers and high speed electronics used in cell phones, satellites, data transmission systems and displays. Lifetime predictions for compound semiconductor devices are notoriously inaccurate due to the absence of standard protocols. Manufacturers have relied on extrapolation back to room temperature of accelerated testing at elevated temperature. This technique fails for scaled, high current density devices. Device failure is driven by electric field or current mechanisms or low activation energy processes that are masked by other mechanisms at high temperature. The Handbook addresses reliability engineering for III-V devices, including materials and electrical characterization, reliability testing, and electronic characterization. These are used to develop new simulation technologies for device operation and ...

  1. Remote optical stethoscope and optomyography sensing device

    Science.gov (United States)

    Golberg, Mark; Polani, Sagi; Ozana, Nisan; Beiderman, Yevgeny; Garcia, Javier; Ruiz-Rivas Onses, Joaquin; Sanz Sabater, Martin; Shatsky, Max; Zalevsky, Zeev

    2017-02-01

    In this paper we present the usage of photonic remote laser based device for sensing nano-vibrations for detection of muscle contraction and fatigue, eye movements and in-vivo estimation of glucose concentration. The same concept is also used to realize a remote optical stethoscope. The advantage of doing the measurements from a distance is in preventing passage of infections as in the case of optical stethoscope or in the capability to monitor e.g. sleep quality without disturbing the patient. The remote monitoring of glucose concentration in the blood stream and the capability to perform opto-myography for the Messer muscles (chewing) is very useful for nutrition and weight control. The optical configuration for sensing the nano-vibrations is based upon analyzing the statistics of the secondary speckle patterns reflected from various tissues along the body of the subjects. Experimental results present the preliminary capability of the proposed configuration for the above mentioned applications.

  2. New ideas for the design of optical devices with applications in solar energy collection

    Energy Technology Data Exchange (ETDEWEB)

    Chaves, Julio; Pereira, Manuel Collares

    2001-07-01

    New ideas for the design of optical devices and some applications to solar energy collection are presented. These are mainly solar concentrators resulting from the combination of known anidoloc (nonimaging) optics devices and known curves such as parabolic, elliptical, hyperbolic, circular arcs or flat mirrors. Other tailored curves are also used in some cases. Two possible applications are in compact high concentration devices for solar energy and ideal concentrators having a gap between the optics and the receiver. Only two dimensional solutions are explored in these cases. Due to the high number of internal reflections, the use of high reflectivity mirrors is mandatory or, alternatively, the use of total internal reflection. Combinations of 3D CPCs and torus are also presented. The obtained devices allow tracking of the sun without the need to move the receiver. An application to solar cooking is presented.

  3. High Fidelity Down-Conversion Source for Secure Communications using On-Demand Single Photons, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To provide reliably secure communications, development of quantum optical devices for encrypted ground-to-space communications is a necessity. The overall goal of...

  4. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    Science.gov (United States)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  5. Recent Developments in Optical Detection Technologies in Lab-on-a-Chip Devices for Biosensing Applications

    Directory of Open Access Journals (Sweden)

    Nuno Miguel Matos Pires

    2014-08-01

    Full Text Available The field of microfluidics has yet to develop practical devices that provide real clinical value. One of the main reasons for this is the difficulty in realizing low-cost, sensitive, reproducible, and portable analyte detection microfluidic systems. Previous research has addressed two main approaches for the detection technologies in lab-on-a-chip devices: (a study of the compatibility of conventional instrumentation with microfluidic structures, and (b integration of innovative sensors contained within the microfluidic system. Despite the recent advances in electrochemical and mechanical based sensors, their drawbacks pose important challenges to their application in disposable microfluidic devices. Instead, optical detection remains an attractive solution for lab-on-a-chip devices, because of the ubiquity of the optical methods in the laboratory. Besides, robust and cost-effective devices for use in the field can be realized by integrating proper optical detection technologies on chips. This review examines the recent developments in detection technologies applied to microfluidic biosensors, especially addressing several optical methods, including fluorescence, chemiluminescence, absorbance and surface plasmon resonance.

  6. Fault localization and analysis in semiconductor devices with optical-feedback infrared confocal microscopy

    International Nuclear Information System (INIS)

    Sarmiento, Raymund; Cemine, Vernon Julius; Tagaca, Imee Rose; Salvador, Arnel; Mar Blanca, Carlo; Saloma, Caesar

    2007-01-01

    We report on a cost-effective optical setup for characterizing light-emitting semiconductor devices with optical-feedback confocal infrared microscopy and optical beam-induced resistance change.We utilize the focused beam from an infrared laser diode to induce local thermal resistance changes across the surface of a biased integrated circuit (IC) sample. Variations in the multiple current paths are mapped by scanning the IC across the focused beam. The high-contrast current maps allow accurate differentiation of the functional and defective sites, or the isolation of the surface-emittingp-i-n devices in the IC. Optical beam-induced current (OBIC) is not generated since the incident beam energy is lower than the bandgap energy of the p-i-n device. Inhomogeneous current distributions in the IC become apparent without the strong OBIC background. They are located at a diffraction-limited resolution by referencing the current maps against the confocal reflectance image that is simultaneously acquired via optical-feedback detection. Our technique permits the accurate identification of metal and semiconductor sites as well as the classification of different metallic structures according to thickness, composition, or spatial inhomogeneity

  7. Optical inspection techniques for security instrumentation

    Science.gov (United States)

    van Renesse, Rudolf L.

    1996-03-01

    This paper reviews four optical inspection systems, in which development TNO Institute of Applied Physics was involved: (1) intaglio scanning and recognition, (2) banknote quality inspection, (3) visualization and reading of a finger pattern, and (4) 3DAS authentication. (1) Intaglio is reserved for high security printing. It renders a tactile relief that can be recognized by a laser scanning technique. This technique is applied by various national banks to detect counterfeit banknotes returning from circulation. A new system is proposed that will detect intaglio on arbitrary wrinkled banknotes. (2) A banknote fitness inspection system (BFIS) that inspects banknotes in specularly reflected light is described. As modern banknotes are provided increasingly with reflective security foils, a new system is proposed that inspects banknotes in specular and diffuse reflection, as well as in transmission. (3) An alternative visualization method for visualization of finger patterns is described, employing a reflective elastomer. A CD scanning system reads the finger patterns. (4) A nonwoven structure has two advantageous properties for card authentication: a random structure which renders each few square millimeters of the pattern uniqueness (identification) and a 3D structure which makes it virtually impossible to be counterfeited (authentication). Both properties are inspected by an extremely simple lenseless reader.

  8. Fiber optic perimeter system for security in smart city

    Science.gov (United States)

    Cubik, Jakub; Kepak, Stanislav; Nedoma, Jan; Fajkus, Marcel; Zboril, Ondrej; Novak, Martin; Jargus, Jan; Vasinek, Vladimir

    2017-10-01

    Protection of persons and assets is the key challenge of Smart City safeguards technologies. Conventional security technologies are often outdated and easy to breach. Therefore, new technologies that could complement existing systems or replace them are developed. The use of optical fibers and their subsequent application in sensing is a trend of recent years. This article discusses the use of fiber-optic sensors in perimeter protection. The sensor consists of optical fibers and couplers only and being constructed without wires and metal parts bring many advantages. These include an absence of interference with electromagnetic waves, system presence can be difficult to detect as well as affect its operation. Testing installation of perimeter system was carried out under reinforced concrete structure. Subjects walked over the bridge at different speeds and over the different routes. The task for the system was an absolute detection of all subjects. The proposed system should find application mainly in areas with the presence of volatile substances, strong electromagnetic fields, or in explosive areas.

  9. Long-Term Optical Device Use by Young Adults with Low Vision

    Science.gov (United States)

    Bachofer, Cynthia Susan

    2013-01-01

    The purpose of this study was to investigate the long-term use of optical devices by individuals who participated in a school-based comprehensive low vision program focusing on use of devices, both near and distance. Thirty-seven participants (five non-users), ages 18-28, completed phone interviews giving information on their personal…

  10. Towed Optical Assessment Device (TOAD) Data to Support Benthic Habitat Mapping since 2001

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Optical validation data were collected using a Tethered Optical Assessment Device (TOAD), an underwater sled equipped with an underwater digital video camera and...

  11. Optical effects of shadow masks on short circuit current of organic photovoltaic devices.

    Science.gov (United States)

    Lin, Chi-Feng; Lin, Bing-Hong; Liu, Shun-Wei; Hsu, Wei-Feng; Zhang, Mi; Chiu, Tien-Lung; Wei, Mau-Kuo; Lee, Jiun-Haw

    2012-03-21

    In this paper, we have employed different shadow masks attached on top of organic photovoltaic (OPV) devices to study the optical effects of the former on the short circuit current (J(SC)). To rule out possible lateral electrical conduction and simplify the optical effects inside the device, a small-molecular heterojunction OPV device with a clear donor/acceptor interface was employed with a hole extraction layer exhibiting high resistance intentionally. Careful calibration with a shadow mask was employed. By attaching two layers of opaque masks in combination with a suitable holder design to shield the light from the edges and backside, the value of J(SC) approached that of the dark current, even under 1-sun radiation. With different illumination areas, we found that the photons illuminating the non-active region of the device contributed to 40% of the J(SC) by optical effect within the width of about 1 mm around the active region. When illuminating the non-active area with 12 mm to the active area, a 5.6 times improvement in the J(SC) was observed when the incident angle was 75°. With the introduction of a microstructured film onto the OPV device and an increase in the reflection from the non-active region, a 15% enhancement of the J(SC) compared to the control device was achieved.

  12. Muscle Sensor Model Using Small Scale Optical Device for Pattern Recognitions

    Directory of Open Access Journals (Sweden)

    Kreangsak Tamee

    2013-01-01

    Full Text Available A new sensor system for measuring contraction and relaxation of muscles by using a PANDA ring resonator is proposed. The small scale optical device is designed and configured to perform the coupling effects between the changes in optical device phase shift and human facial muscle movement, which can be used to form the relationship between optical phase shift and muscle movement. By using the Optiwave and MATLAB programs, the results obtained have shown that the measurement of the contraction and relaxation of muscles can be obtained after the muscle movements, in which the unique pattern of individual muscle movement from facial expression can be established. The obtained simulation results, that is, interference signal patterns, can be used to form the various pattern recognitions, which are useful for the human machine interface and the human computer interface application and discussed in detail.

  13. High-precision methods and devices for in situ measurements of thermally induced aberrations in optical elements

    International Nuclear Information System (INIS)

    Zelenogorsky, Victor V.; Solovyov, Alexander A.; Kozhevatov, Ilya E.; Kamenetsky, Eugene E.; Rudenchik, Eugene A.; Palashov, Oleg V.; Silin, Dmitry E.; Khazanov, Efim A.

    2006-01-01

    An optical system that comprises two devices for remote measurements, a broadband optical interferometer and a scanning Hartmann sensor, is described. The results of simultaneous measurements with both devices and the results of numerical modeling of sample surface heating are presented

  14. A simple optical fibre-linked remote control system for multiple devices

    Indian Academy of Sciences (India)

    We report on the development of a simple control system which can handle multiple devices through an optical fibre data link. The devices are controlled using a set of DACs through serial data communication via a serial port of a PC. Serial data from the PC get converted to parallel mode using a homemade “serial in ...

  15. Advanced verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  16. Simultaneous optical and electrical modeling of plasmonic light trapping in thin-film amorphous silicon photovoltaic devices

    Science.gov (United States)

    Gandhi, Keyur K.; Nejim, Ahmed; Beliatis, Michail J.; Mills, Christopher A.; Henley, Simon J.; Silva, S. Ravi P.

    2015-01-01

    Rapid prototyping of photovoltaic (PV) cells requires a method for the simultaneous simulation of the optical and electrical characteristics of the device. The development of nanomaterial-enabled PV cells only increases the complexity of such simulations. Here, we use a commercial technology computer aided design (TCAD) software, Silvaco Atlas, to design and model plasmonic gold nanoparticles integrated in optoelectronic device models of thin-film amorphous silicon (a-Si:H) PV cells. Upon illumination with incident light, we simulate the optical and electrical properties of the cell simultaneously and use the simulation to produce current-voltage (J-V) and external quantum efficiency plots. Light trapping due to light scattering and localized surface plasmon resonance interactions by the nanoparticles has resulted in the enhancement of both the optical and electrical properties due to the reduction in the recombination rates in the photoactive layer. We show that the device performance of the modeled plasmonic a-Si:H PV cells depends significantly on the position and size of the gold nanoparticles, which leads to improvements either in optical properties only, or in both optical and electrical properties. The model provides a route to optimize the device architecture by simultaneously optimizing the optical and electrical characteristics, which leads to a detailed understanding of plasmonic PV cells from a design perspective and offers an advanced tool for rapid device prototyping.

  17. Modeling fiber Bragg grating device networks in photomechanical polymer optical fibers

    Science.gov (United States)

    Lanska, Joseph T.; Kuzyk, Mark G.; Sullivan, Dennis M.

    2015-09-01

    We report on the modeling of fiber Bragg grating (FBG) networks in poly(methyl methacrylate) (PMMA) polymer fibers doped with azo dyes. Our target is the development of Photomechanical Optical Devices (PODs), comprised of two FBGs in series, separated by a Fabry-Perot cavity of photomechanical material. PODs exhibit photomechanical multi-stability, with the capacity to access multiple length states for a fixed input intensity when a mechanical shock is applied. Using finite-difference time-domain (FDTD) numerical methods, we modeled the photomechanical response of both Fabry-Perot and Bragg-type PODs in a single polymer optical fiber. The polymer fiber was modeled as an instantaneous Kerr-type nonlinear χ(3) material. Our model correctly predicts the essential optical features of FBGs as well as the photomechanical multi-stability of nonlinear Fabry-Perot cavity-based PODs. Networks of PODs may provide a framework for smart shape-shifting materials and fast optical computation where the decision process is distributed over the entire network. In addition, a POD can act as memory, and its response can depend on input history. Our models inform and will accelerate targeted development of novel Bragg grating-based polymer fiber device networks for a variety of applications in optical computing and smart materials.

  18. Distributed fiber optic sensing enhances pipeline safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Frings, Jochen; Walk, Tobias [ILF Consulting Engineers, Munich (Germany)

    2011-09-15

    Pipelines are efficient, highly reliable and safe means of transportation. However, despite intensive right of way surveillance by foot, car and out of the air, pipeline leaks and illegal tappings are a reality - sometimes with catastrophic results. These events show a gap in real-time monitoring caused by the highly distributed nature of pipelines. Parts of this gap now can be closed with distributed fiber optic sensing technology. Using various physical effects this technology is apt to detect temperature, strain, vibrations and sound with very good localization over spans up to 50 km with a single sensor cable. Various field tested applications like leakage detection, third party activity monitoring and intrusion detection or ground movement detection as well as integrity monitoring proof that distributed fiber optic sensing can enhance pipeline safety and security. (orig.)

  19. A new XUV optical end-station to characterize compact and flexible photonic devices using synchrotron radiation

    Science.gov (United States)

    Marcelli, A.; Mazuritskiy, M. I.; Dabagov, S. B.; Hampai, D.; Lerer, A. M.; Izotova, E. A.; D'Elia, A.; Turchini, S.; Zema, N.; Zuccaro, F.; de Simone, M.; Javad Rezvani, S.; Coreno, M.

    2018-03-01

    In this contribution we present the new experimental end-station to characterize XUV diffractive optics, such as Micro Channel Plates (MCPs) and other polycapillary optics, presently under commission at the Elettra synchrotron radiation laboratory (Trieste, Italy). To show the opportunities offered by these new optical devices for 3rd and 4th generation radiation sources, in this work we present also some patterns collected at different energies of the primary XUV radiation transmitted by MCP optical devices working in the normal incidence geometry.

  20. Magneto-Optical Thin Films for On-Chip Monolithic Integration of Non-Reciprocal Photonic Devices.

    Science.gov (United States)

    Bi, Lei; Hu, Juejun; Jiang, Peng; Kim, Hyun Suk; Kim, Dong Hun; Onbasli, Mehmet Cengiz; Dionne, Gerald F; Ross, Caroline A

    2013-11-08

    Achieving monolithic integration of nonreciprocal photonic devices on semiconductor substrates has been long sought by the photonics research society. One way to achieve this goal is to deposit high quality magneto-optical oxide thin films on a semiconductor substrate. In this paper, we review our recent research activity on magneto-optical oxide thin films toward the goal of monolithic integration of nonreciprocal photonic devices on silicon. We demonstrate high Faraday rotation at telecommunication wavelengths in several novel magnetooptical oxide thin films including Co substituted CeO₂ -δ , Co- or Fe-substituted SrTiO 3- δ , as well as polycrystalline garnets on silicon. Figures of merit of 3~4 deg/dB and 21 deg/dB are achieved in epitaxial Sr(Ti 0.2 Ga 0.4 Fe 0.4 )O 3- δ and polycrystalline (CeY₂)Fe₅O 12 films, respectively. We also demonstrate an optical isolator on silicon, based on a racetrack resonator using polycrystalline (CeY₂)Fe₅O 12 /silicon strip-loaded waveguides. Our work demonstrates that physical vapor deposited magneto-optical oxide thin films on silicon can achieve high Faraday rotation, low optical loss and high magneto-optical figure of merit, therefore enabling novel high-performance non-reciprocal photonic devices monolithically integrated on semiconductor substrates.

  1. Quantum dot devices for optical communications

    DEFF Research Database (Denmark)

    Mørk, Jesper

    2005-01-01

    -low threshold currents and amplifiers with record-high power levels. In this tutorial we will review the basic properties of quantum dots, emphasizing the properties which are important for laser and amplifier applications, as well as devices for all-optical signal processing. The high-speed properties....... The main property of semiconductor quantum dots compared to bulk material or even quantum well structures is the discrete nature of the allowed states, which means that inversion of the medium can be obtained for very low electron densities. This has led to the fabrication of quantum dot lasers with record...

  2. QoS-aware ant routing with security constraints in optical fibre networks by using RGB pheromones

    DEFF Research Database (Denmark)

    Al-Momin, Mohammad; Lazaridis, Pavlos; Cosmas, John

    2016-01-01

    for these different traffic types. In this paper, a novel technology is proposed to satisfy the requirements of different traffic types which vary in terms of bandwidth, latency and security. Oyster Optics Technology has been used to introduce the security as a new significant QoS factor....

  3. Alq3 nanorods: promising building blocks for optical devices.

    Science.gov (United States)

    Chen, Wei; Peng, Qing; Li, Yadong

    2008-07-17

    Monodisperse Alq3 nanorods with hexagonal-prism-like morphology are produced via a facile, emulsion based synthesis route. The photoluminescence of individual nanorods differs from the bulk material. These nanorods are promising building blocks for novel optical devices. Copyright © 2008 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Superhydrophilic nanopillar-structured quartz surfaces for the prevention of biofilm formation in optical devices

    Science.gov (United States)

    Han, Soo; Ji, Seungmuk; Abdullah, Abdullah; Kim, Duckil; Lim, Hyuneui; Lee, Donghyun

    2018-01-01

    Bacterial biofilm formation on optical devices such as contact lenses, optical glasses, endoscopic devices, and microscopic slides and lenses are major concerns in the field of medicine and biomedical engineering. To solve these problems, here we present the first report of superhydrophilic transparent nanopillar-structured surfaces with bactericidal properties. To construct bactericidal surfaces, we imitated a topological mechanism found in nature in which nanopillar-structured surfaces cause a mechanical disruption of the outer cell membranes of bacteria, resulting in bacterial cell death. We used nanosphere lithography to fabricate nanopillars with various sharpnesses and heights on a quartz substrate. Water contact angle and light reflectance measurements revealed superhydrophilic, antifogging and antireflective properties, which are important for use in optical devices. To determine bactericidal efficiency, the fabricated surfaces were incubated and tested against two Gram-negative bacteria associated with biofilm formation and various diseases in humans, Pseudomonas aeruginosa and Escherichia coli. The highest bactericidal activity was achieved with nanopillars that measured 300 nm in height and 10 nm in apex diameter. Quartz substrates patterned with such nanopillars killed ∼38,000 P. aeruginosa and ∼27,000 E. coli cells cm-2 min-1, respectively. Thus, the newly designed nanopillar-structured bactericidal surfaces are suitable for use in the development of superhydrophilic and transparent optical devices.

  5. Fabrication of optical fiber micro(and nano)-optical and photonic devices and components, using computer controlled spark thermo-pulling system

    International Nuclear Information System (INIS)

    Fatemi, H.; Mosleh, A.; Pashmkar, M.; Khaksar Kalati, A.

    2007-01-01

    Fabrication of optical fiber Micro (and Nano)-Optical component and devices, as well as, those applicable for photonic purposes are described. It is to demonstrate the practical capabilities and characterization of the previously reported Computer controlled spark thermo-pulling fabrication system.

  6. Probe-pin device for optical neurotransmitter sensing in the brain

    Science.gov (United States)

    Kim, Min Hyuck; Song, Kyo D.; Yoon, Hargsoon; Park, Yeonjoon; Choi, Sang H.; Lee, Dae-Sung; Shin, Kyu-Sik; Hwang, Hak-In; Lee, Uhn

    2015-04-01

    Development of an optical neurotransmitter sensing device using nano-plasmonic probes and a micro-spectrometer for real time monitoring of neural signals in the brain is underway. Clinical application of this device technology is to provide autonomous closed-loop feedback control to a deep brain stimulation (DBS) system and enhance the accuracy and efficacy of DBS treatment. By far, we have developed an implantable probe-pin device based on localized field enhancement of surface plasmonic resonance on a nanostructured sensing domain which can amplify neurochemical signals from evoked neural activity in the brain. In this paper, we will introduce the details of design and sensing performance of a proto-typed microspectrometer and nanostructured probing devices for real time measurement of neurotransmitter concentrations.

  7. Optimizing IEEE 802.11i resource and security essentials for mobile and stationary devices

    CERN Document Server

    Amiri, IS; Saberi, Iman

    2014-01-01

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi

  8. Optical nano artifact metrics using silicon random nanostructures

    Science.gov (United States)

    Matsumoto, Tsutomu; Yoshida, Naoki; Nishio, Shumpei; Hoga, Morihisa; Ohyagi, Yasuyuki; Tate, Naoya; Naruse, Makoto

    2016-08-01

    Nano-artifact metrics exploit unique physical attributes of nanostructured matter for authentication and clone resistance, which is vitally important in the age of Internet-of-Things where securing identities is critical. However, expensive and huge experimental apparatuses, such as scanning electron microscopy, have been required in the former studies. Herein, we demonstrate an optical approach to characterise the nanoscale-precision signatures of silicon random structures towards realising low-cost and high-value information security technology. Unique and versatile silicon nanostructures are generated via resist collapse phenomena, which contains dimensions that are well below the diffraction limit of light. We exploit the nanoscale precision ability of confocal laser microscopy in the height dimension; our experimental results demonstrate that the vertical precision of measurement is essential in satisfying the performances required for artifact metrics. Furthermore, by using state-of-the-art nanostructuring technology, we experimentally fabricate clones from the genuine devices. We demonstrate that the statistical properties of the genuine and clone devices are successfully exploited, showing that the liveness-detection-type approach, which is widely deployed in biometrics, is valid in artificially-constructed solid-state nanostructures. These findings pave the way for reasonable and yet sufficiently secure novel principles for information security based on silicon random nanostructures and optical technologies.

  9. Protection device for a thermonuclear device

    International Nuclear Information System (INIS)

    Kawashima, Shuichi.

    1986-01-01

    Purpose: To exactly detect the void coefficients of coolants even under high magnetic fields thereby detect the overheat of a thermonuclear device at an early stage. Constitution: The protecting device of this invention comprises a laser beam generation device, a laser beam detection device and an accident detection device. The laser generation device always generates laser beams, which are permeated through coolants and detected by the laser beam detection device, the optical amount of which is transmitted to the accident detection device. The accident detection device judges the excess or insufficiency of the detected optical amount with respect to the optical amount of the laser beams under the stationary state as a reference and issues an accident signal. Since only the optical cables that do not undergo the effect of the magnetic fields are exposed to high magnetic fields in the protection device of this invention, a high reliability can be maintained. (Kamimura, M.)

  10. Tests, measurements, and characterization of electro-optic devices and systems

    International Nuclear Information System (INIS)

    Wadekar, S.G.

    1989-01-01

    This book contains the proceedings on tests, measurements and characterization of electro-optic devices and systems. Topics covered include: Measurement of spectral dynamics in single-quantum-well lasers, High power computer controlled laser diode characterization tester, and Laser diode characterization instrumentation

  11. Assessment and testing of industrial devices robustness against cyber security attacks

    International Nuclear Information System (INIS)

    Tilaro, F.; Copy, B.

    2012-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. CERN - in collaboration with Siemens - has designed and implemented a dedicated working environment, the Test-bench for Robustness of Industrial Equipment. Such tests attempt to detect possible anomalies by exploiting corrupt communication channels and manipulating the normal behavior of the communication protocols, in the same way as a cyber attacker would proceed. Our approach consists of analyzing protocol implementations by injecting malformed PDUs (Protocol Data Unit) to corrupt the normal behaviour of the system. As a PDU typically has many fields, the number of possible syntactically faulty PDUs grows exponentially with the number of fields. In this document, we proposed a strategy to explore this huge test domain using a hybrid approach of fuzzing and syntax techniques, specifically developed to evaluate industrial device communication robustness. So far, not all the tests can be integrated into automatic tools, human analysis and management is necessary to discover and investigate specific possible failures

  12. Integration of holography into the design of bank notes and security documents

    Science.gov (United States)

    Dunn, Paul

    2000-10-01

    The use of holograms and other diffractive optically variable devices have been used successfully in the fight against counterfeiting of security documents for several years. More recently they have become globally accepted as a key security feature on banknotes as reflected in their prime use on the Euronotes to be issues in 2002. The success of the design and origination of these images depends upon their strong visual appeal, their overt and covert content and the ability to offer unique features that provides an extremely difficult barrier for the would be counterfeiter to overcome. The basic design principles both for banknote and general security print application are discussed in this review document. TO be effective as a security device the image must be fit for the purpose. This means that the image must contain the level of overt and covert features that are easy to recognize, containing high level security features and form part of an educational program aimed at the product user and specifically trained security personnel. More specifically it must meet a clearly defined performance criteria.

  13. Manufacturing and testing flexible microfluidic devices with optical and electrical detection mechanisms

    Science.gov (United States)

    Ivan, Marius G.; Vivet, Frédéric; Meinders, Erwin R.

    2010-06-01

    Flexible microfluidic devices made of poly(dimethylsiloxane) (PDMS) were manufactured by soft lithography, and tested in detection of ionic species using optical absorption spectroscopy and electrical measurements. PDMS was chosen due to its flexibility and ease of surface modification by exposure to plasma and UV treatment, its transparency in UV-Vis regions of the light spectrum, and biocompatibility. The dual-detection mechanism allows the user more freedom in choosing the detection tool, and a functional device was successfully tested. Optical lithography was employed for manufacturing templates, which were subsequently used for imprinting liquid PDMS by thermal curing. Gold electrodes having various widths and distances among them were patterned with optical lithography on the top part which sealed the microchannels, and the devices were employed for detection of ionic species in aqueous salt solutions as well as micro-electrolysis cells. Due to the transparency of PDMS in UV-Vis the microfluidics were also used as photoreactors, and the in-situ formed charged species were monitored by applying a voltage between electrodes. Upon addition of a colorimetric pH sensor, acid was detected with absorption spectroscopy.

  14. Magneto-Optical Thin Films for On-Chip Monolithic Integration of Non-Reciprocal Photonic Devices

    Directory of Open Access Journals (Sweden)

    Mehmet Cengiz Onbasli

    2013-11-01

    Full Text Available Achieving monolithic integration of nonreciprocal photonic devices on semiconductor substrates has been long sought by the photonics research society. One way to achieve this goal is to deposit high quality magneto-optical oxide thin films on a semiconductor substrate. In this paper, we review our recent research activity on magneto-optical oxide thin films toward the goal of monolithic integration of nonreciprocal photonic devices on silicon. We demonstrate high Faraday rotation at telecommunication wavelengths in several novel magnetooptical oxide thin films including Co substituted CeO2−δ, Co- or Fe-substituted SrTiO3−δ, as well as polycrystalline garnets on silicon. Figures of merit of 3~4 deg/dB and 21 deg/dB are achieved in epitaxial Sr(Ti0.2Ga0.4Fe0.4O3−δ and polycrystalline (CeY2Fe5O12 films, respectively. We also demonstrate an optical isolator on silicon, based on a racetrack resonator using polycrystalline (CeY2Fe5O12/silicon strip-loaded waveguides. Our work demonstrates that physical vapor deposited magneto-optical oxide thin films on silicon can achieve high Faraday rotation, low optical loss and high magneto-optical figure of merit, therefore enabling novel high-performance non-reciprocal photonic devices monolithically integrated on semiconductor substrates.

  15. Optical devices for biochemical sensing in flame hydrolysis deposited glass

    Science.gov (United States)

    Ruano-Lopez, Jesus M.

    Previous research in the field of Flame Hydrolysis Deposition (FHD) of glasses has focused on the production of low cost optical devices for the field of telecommunications. The originality of this doctoral research resides in the exploration of this technology in the fabrication of optical bio-chemical sensors, with integrated "Lab-on-a-chip" devices. To achieve this goal, we have combined and applied different microfabrication processes for the manufacture of sensor platforms using FHD. These structures are unique in that they take advantage of the intrinsic benefits of the microfabrication process, such as, miniaturisation and mass production, and combine them with the properties of FHD glass, namely: low loss optical transducing mechanisms, planar technologies and monolithic integration. This thesis demonstrates that FHD is a suitable technology for biosensing and Lab- on-a-Chip applications. The objective is to provide future researchers with the necessary tools to accomplish an integrated analytical system based on FHD. We have designed, fabricated, and successfully tested a FHD miniaturised sensor, which comprised optical and microfluidic circuitry, in the framework of low volume fluorescence assays. For the first time, volumes as low as 570 pL were analysed with a Cyanine-5 fluorophore with a detection limit of 20 pM, or ca. 6000 molecules (+/-3sigma) for this platform. The fabrication of the sensor generated a compilation of processes that were then utilised to produce other possible optical platforms for bio-chemical sensors in FHD, e.g. arrays and microfluidics. The "catalogue" of methods used included new recipes for reactive ion etching, glass deposition and bonding techniques that enabled the development of the microfluidic circuitry, integrated with an optical circuitry. Furthermore, we developed techniques to implement new tasks such as optical signal treatment using integrated optical structures, planar arraying of sensors, a separating element for

  16. Optical fiber applied to radiation detection

    Energy Technology Data Exchange (ETDEWEB)

    Junior, Francisco A.B.; Costa, Antonella L.; Oliveira, Arno H. de; Vasconcelos, Danilo C., E-mail: fanbra@yahoo.com.br, E-mail: antonella@nuclear.ufmg.br, E-mail: heeren@nuclear.ufmg.br, E-mail: danilochagas@yahoo.com.br [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Escola de Engenharia. Departamento de Engenharia Nuclear

    2015-07-01

    In the last years, the production of optical fibers cables has make possible the development of a range of spectroscopic probes for in situ analysis performing beyond nondestructive tests, environmental monitoring, security investigation, application in radiotherapy for dose monitoring, verification and validation. In this work, a system using an optical fiber cable to light signal transmission from a NaI(Tl) radiation detector is presented. The innovative device takes advantage mainly of the optical fibers small signal attenuation and immunity to electromagnetic interference to application for radiation detection systems. The main aim was to simplify the detection system making it to reach areas where the conventional device cannot access due to its lack of mobility and external dimensions. Some tests with this innovative system are presented and the results stimulate the continuity of the researches. (author)

  17. Integrated optical and electrical modeling of plasmon-enhanced thin film photovoltaics: A case-study on organic devices

    International Nuclear Information System (INIS)

    Rourke, Devin; Ahn, Sungmo; Nardes, Alexandre M.; Lagemaat, Jao van de; Kopidakis, Nikos; Park, Wounjhang

    2014-01-01

    The nanoscale light control for absorption enhancement of organic photovoltaic (OPV) devices inevitably produces strongly non-uniform optical fields. These non-uniformities due to the localized optical modes are a primary route toward absorption enhancement in OPV devices. Therefore, a rigorous modeling tool taking into account the spatial distribution of optical field and carrier generation is necessary. Presented here is a comprehensive numerical model to describe the coupled optical and electrical behavior of plasmon-enhanced polymer:fullerene bulk heterojunction (BHJ) solar cells. In this model, a position-dependent electron-hole pair generation rate that could become highly non-uniform due to photonic nanostructures is directly calculated from the optical simulations. By considering the absorption and plasmonic properties of nanophotonic gratings included in two different popular device architectures, and applying the Poisson, current continuity, and drift/diffusion equations, the model predicts quantum efficiency, short-circuit current density, and desired carrier mobility ratios for bulk heterojunction devices incorporating nanostructures for light management. In particular, the model predicts a significant degradation of device performance when the carrier species with lower mobility are generated far from the collecting electrode. Consequently, an inverted device architecture is preferred for materials with low hole mobility. This is especially true for devices that include plasmonic nanostructures. Additionally, due to the incorporation of a plasmonic nanostructure, we use simulations to theoretically predict absorption band broadening of a BHJ into energies below the band gap, resulting in a 4.8% increase in generated photocurrent.

  18. Integrated optical and electrical modeling of plasmon-enhanced thin film photovoltaics: A case-study on organic devices

    Energy Technology Data Exchange (ETDEWEB)

    Rourke, Devin [Department of Physics, University of Colorado, Boulder, Colorado 80309-0390 (United States); Ahn, Sungmo [Department of Electrical, Computer, and Energy Engineering, University of Colorado, Boulder, Colorado 80309-0425 (United States); Nardes, Alexandre M.; Lagemaat, Jao van de; Kopidakis, Nikos [National Renewable Energy Laboratory, 15013 Denver West Parkway, Golden, Colorado 80401 (United States); Park, Wounjhang, E-mail: won.park@colorado.edu [Department of Electrical, Computer, and Energy Engineering, University of Colorado, Boulder, Colorado 80309-0425 (United States); Materials Science and Engineering Program, University of Colorado, Boulder, Colorado 80303 (United States)

    2014-09-21

    The nanoscale light control for absorption enhancement of organic photovoltaic (OPV) devices inevitably produces strongly non-uniform optical fields. These non-uniformities due to the localized optical modes are a primary route toward absorption enhancement in OPV devices. Therefore, a rigorous modeling tool taking into account the spatial distribution of optical field and carrier generation is necessary. Presented here is a comprehensive numerical model to describe the coupled optical and electrical behavior of plasmon-enhanced polymer:fullerene bulk heterojunction (BHJ) solar cells. In this model, a position-dependent electron-hole pair generation rate that could become highly non-uniform due to photonic nanostructures is directly calculated from the optical simulations. By considering the absorption and plasmonic properties of nanophotonic gratings included in two different popular device architectures, and applying the Poisson, current continuity, and drift/diffusion equations, the model predicts quantum efficiency, short-circuit current density, and desired carrier mobility ratios for bulk heterojunction devices incorporating nanostructures for light management. In particular, the model predicts a significant degradation of device performance when the carrier species with lower mobility are generated far from the collecting electrode. Consequently, an inverted device architecture is preferred for materials with low hole mobility. This is especially true for devices that include plasmonic nanostructures. Additionally, due to the incorporation of a plasmonic nanostructure, we use simulations to theoretically predict absorption band broadening of a BHJ into energies below the band gap, resulting in a 4.8% increase in generated photocurrent.

  19. Fabry-Perot-like interference security image structures: From passive to active

    International Nuclear Information System (INIS)

    Baloukas, B.; Trottier-Lapointe, W.; Martinu, L.

    2014-01-01

    Counterfeiting of products and important documents is at an all-time high and is costing the world economy hundreds of billions of dollars yearly as well as posing significant safety and health hazards through the production of uncertified goods, e.g., pharmaceutical products. To limit these effects, interference-based optical security devices offering an angular color shift are still widely in use. Unfortunately, commercial iridescent materials are now readily available and represent a potential source of counterfeiting. In this short review, we first describe the basic principles behind passive interference security image structures (ISIS) and the qualities which have resulted in their integration into most important documents. Various features which have been added to ISIS in order to make them harder to duplicate yet simpler to authenticate are also presented (metamerism, magnetic materials, diffraction, etc.). We then address the implementation of active materials, mainly electrochromic WO 3 as a means of generating two-level authentication devices. Finally, we discuss some general considerations to keep in mind when developing features for security applications. - Highlights: • We review Fabry–Perot-like metal-dielectric filters used in optical security. • We discuss/demonstrate recent additions: metamerism, magnetism and diffraction. • We demonstrate a feature based on the use of thin metallic mirrors. • We cover recent developments in the use of active materials. • We demonstrate an electrochromic feature with two levels of authentication

  20. Applied Physics of Carbon Nanotubes Fundamentals of Theory, Optics and Transport Devices

    CERN Document Server

    Rotkin, Slava V

    2005-01-01

    The book describes the state-of-the-art in fundamental, applied and device physics of nanotubes, including fabrication, manipulation and characterization for device applications; optics of nanotubes; transport and electromechanical devices and fundamentals of theory for applications. This information is critical to the field of nanoscience since nanotubes have the potential to become a very significant electronic material for decades to come. The book will benefit all all readers interested in the application of nanotubes, either in their theoretical foundations or in newly developed characterization tools that may enable practical device fabrication.

  1. Information security in data exchange between mobile devices with Android system using RSA encryption

    Directory of Open Access Journals (Sweden)

    Fernando Solís

    2017-02-01

    Full Text Available The new styles and ways of life lead to greater use of wireless networks, the mobile device being a tool for data transmission, which are susceptible to threats in the transmission channels in the network. IT security plays a very important role in guaranteeing the availability, privacy and integrity of information, one of the techniques that helps in this task is cryptography, whose foundation is to transform a message so that it is unintelligible except for those who have the Key to decipher it. The research focuses on the use of the RSA algorithm between mobile devices, the encrypted data is sent through communication channels called threads that through formulas and processes executed on the server, will help to execute the encryption and decryption of the data. To carry it out, a prototype for the exchange of data between mobile devices wirelessly was designed and implemented, conducting performance tests with three nodes to improve the security. The results show the efficiency of the algorithm and additionally its functionality, the times of encryption and decryption are fast against the sending of information without any method or algorithm used.

  2. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    OpenAIRE

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  3. A handheld optical device for skin profile measurement

    Science.gov (United States)

    Sun, Jiuai; Liu, Xiaojin

    2018-04-01

    This paper describes a portable optical scanning device designed for skin surface measurement on both colour and 3D geometry through a relative easy and cost effective multiple light source photometric stereo method. The validation of colour recovered had been verified through its application on skin lesion segmentation in our early work. This paper focuses on the reconstructed topographic data which are subject to further evaluation and advancement. The evaluation work takes the skin in vitro as an application scenario and compares the experimental result to that obtained by using a commercial product. The experiments show that this handheld device can measure the skin profile significantly closer to that of the ground truth and have the additional function of skin colour recovery.

  4. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  5. 78 FR 16296 - Certain Optoelectronic Devices for Fiber Optic Communications, Components Thereof, and Products...

    Science.gov (United States)

    2013-03-14

    ... Fiber Optic Communications, Components Thereof, and Products Containing Same; Commission Determination... United States after importation of certain optoelectronic devices for fiber optic communications... Fiber IP (Singapore) Pte. Ltd. of Singapore (``Avago Fiber IP''); Avago General IP and Avago...

  6. Quantum confined laser devices optical gain and recombination in semiconductors

    CERN Document Server

    Blood, Peter

    2015-01-01

    The semiconductor laser, invented over 50 years ago, has had an enormous impact on the digital technologies that now dominate so many applications in business, commerce and the home. The laser is used in all types of optical fibre communication networks that enable the operation of the internet, e-mail, voice and skype transmission. Approximately one billion are produced each year for a market valued at around $5 billion. Nearly all semiconductor lasers now use extremely thin layers of light emitting materials (quantum well lasers). Increasingly smaller nanostructures are used in the form of quantum dots. The impact of the semiconductor laser is surprising in the light of the complexity of the physical processes that determine the operation of every device. This text takes the reader from the fundamental optical gain and carrier recombination processes in quantum wells and quantum dots, through descriptions of common device structures to an understanding of their operating characteristics. It has a consistent...

  7. All-optical signal processing data communication and storage applications

    CERN Document Server

    Eggleton, Benjamin

    2015-01-01

    This book provides a comprehensive review of the state-of-the art of optical signal processing technologies and devices. It presents breakthrough solutions for enabling a pervasive use of optics in data communication and signal storage applications. It presents presents optical signal processing as solution to overcome the capacity crunch in communication networks. The book content ranges from the development of innovative materials and devices, such as graphene and slow light structures, to the use of nonlinear optics for secure quantum information processing and overcoming the classical Shannon limit on channel capacity and microwave signal processing. Although it holds the promise for a substantial speed improvement, today’s communication infrastructure optics remains largely confined to the signal transport layer, as it lags behind electronics as far as signal processing is concerned. This situation will change in the near future as the tremendous growth of data traffic requires energy efficient and ful...

  8. OPTICAL DEFLECTOR CREATION FOR LASER THERAPEUTIC DEVICES

    Directory of Open Access Journals (Sweden)

    V. N. Baranov

    2014-03-01

    Full Text Available The paper deals with creation of optical deflector for management of laser radiation in physiotherapeutic devices. Design features and operation principles of electro-optical, optical-acoustic and mechanical deflectors, giving the possibility to carry out continuous or discrete scanning of a laser beam are shown. Operation mechanism of the mechanical type deflector on the example of domestic laser therapeutic scanners is described in detail. Application possibility in clinical practice for heating technique of the acupuncture points by volumetric scanning of tissues by the radiation of semiconductor lasers on wave lengths equal to 0,67 and 0,85 μm is investigated. Creation justification of the new type deflector is given. Comparison between stable and labile techniques of radiation is carried out. It is shown that more intensive warming up of a skin surface in acupuncture point projection is observed at volumetric scanning, rather than at planar scanning by laser beams. Temperature increase on a skin surface in projection of acupuncture points is detected at radiation in both the visible spectrum range (0,67 μm and the infrared range (0,85 μm. It gives the possibility to apply this scanning method to thermal photo-activation of the point and to extend an existing arsenal of laser reflexology methods. The optical deflector is offered for medical industry, making it possible to carry out volumetric scanning of a laser beam and to facilitate the medical personnel’s work in laser therapy and reflexology consulting rooms.

  9. Industrial fabrication of an optical security device for document protection using plasmon resonant transmission through a thin corrugated metallic film embedded on a plastic foil

    Science.gov (United States)

    Sauvage-Vincent, Jean; Jourlin, Yves; Tonchev, Svetlen; Veillas, Colette; Claude, Pedri; Parriaux, Olivier

    2012-06-01

    Known since a long time in polymer banknotes and presented in the few years in paper banknotes, the principle of windowed documents has been currently extended to ID documents. We present an innovative solution which combines resonant transmission and Zero Order Device technologies and which is dedicated to improve windows in terms of the overt security level. With this R&D program, Hologram Industries targeted to obtain an overt visual security device that should be readily checked in transmission in the same manner as the established paper watermark. The proposed solution is based on the propagation of resonant modes in a thin continuous corrugated metallic layer embedded (encapsulated) between two dielectric layers of near equal refractive index. The mode of most interest is the Long Range Plasmon Mode. The coupling condition to the Long Range Mode is principally related to the corrugation, the metal layer thickness and the index of the two dielectric layers. If the condition of the mode excitation through the grating is fulfilled, a predetermined wavelength will be coupled to the Long Range Plasmon Mode. This mode will propagate at each metal/dielectric interface with a low loss and will concentrate the electric field inside the metal layer. This effect of coupling enables the transmission of a peak at this wavelength through the metallic layer. It defines the so called "extraordinary resonant transmission".

  10. Silicon Photonics: All-Optical Devices for Linear and Nonlinear Applications

    Science.gov (United States)

    Driscoll, Jeffrey B.

    Silicon photonics has grown rapidly since the first Si electro-optic switch was demonstrated in 1987, and the field has never grown more quickly than it has over the past decade, fueled by milestone achievements in semiconductor processing technologies for low loss waveguides, high-speed Si modulators, Si lasers, Si detectors, and an enormous toolbox of passive and active integrated devices. Silicon photonics is now on the verge of major commercialization breakthroughs, and optical communication links remain the force driving integrated and Si photonics towards the first commercial telecom and datacom transceivers; however other potential and future applications are becoming uncovered and refined as researchers reveal the benefits of manipulating photons on the nanoscale. This thesis documents an exploration into the unique guided-wave and nonlinear properties of deeply-scaled high-index-contrast sub-wavelength Si waveguides. It is found that the tight confinement inherent to single-mode channel waveguides on the silicon-on-insulator platform lead to a rich physics, which can be leveraged for new devices extending well beyond simple passive interconnects and electro-optic devices. The following chapters will concentrate, in detail, on a number of unique physical features of Si waveguides and extend these attributes towards new and interesting devices. Linear optical properties and nonlinear optical properties are investigated, both of which are strongly affected by tight optical confinement of the guided waveguide modes. As will be shown, tight optical confinement directly results in strongly vectoral modal components, where the electric and magnetic fields of the guided modes extend into all spatial dimensions, even along the axis of propagation. In fact, the longitudinal electric and magnetic field components can be just as strong as the transverse fields, directly affecting the modal group velocity and energy transport properties since the longitudinal fields

  11. Integrated Magneto-Optical Devices for On-Chip Photonic Systems

    Science.gov (United States)

    2017-09-01

    Technology SEPTEMBER 2017 Final Report Approved for public release; distribution is unlimited. See additional restrictions described on inside pages STINFO...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Massachusetts Institute of Technology 77 Massachusetts Avenue...interferometer (MZI) isolator devices based on optical modeling, for both transverse- electric (TE) and transverse-magnetic (TM) polarization. 15. SUBJECT TERMS

  12. Nonlinear Silicon Photonic Signal Processing Devices for Future Optical Networks

    Directory of Open Access Journals (Sweden)

    Cosimo Lacava

    2017-01-01

    Full Text Available In this paper, we present a review on silicon-based nonlinear devices for all optical nonlinear processing of complex telecommunication signals. We discuss some recent developments achieved by our research group, through extensive collaborations with academic partners across Europe, on optical signal processing using silicon-germanium and amorphous silicon based waveguides as well as novel materials such as silicon rich silicon nitride and tantalum pentoxide. We review the performance of four wave mixing wavelength conversion applied on complex signals such as Differential Phase Shift Keying (DPSK, Quadrature Phase Shift Keying (QPSK, 16-Quadrature Amplitude Modulation (QAM and 64-QAM that dramatically enhance the telecom signal spectral efficiency, paving the way to next generation terabit all-optical networks.

  13. Miniaturized pulsed laser source for time-domain diffuse optics routes to wearable devices.

    Science.gov (United States)

    Di Sieno, Laura; Nissinen, Jan; Hallman, Lauri; Martinenghi, Edoardo; Contini, Davide; Pifferi, Antonio; Kostamovaara, Juha; Mora, Alberto Dalla

    2017-08-01

    We validate a miniaturized pulsed laser source for use in time-domain (TD) diffuse optics, following rigorous and shared protocols for performance assessment of this class of devices. This compact source (12×6  mm2) has been previously developed for range finding applications and is able to provide short, high energy (∼100  ps, ∼0.5  nJ) optical pulses at up to 1 MHz repetition rate. Here, we start with a basic level laser characterization with an analysis of suitability of this laser for the diffuse optics application. Then, we present a TD optical system using this source and its performances in both recovering optical properties of tissue-mimicking homogeneous phantoms and in detecting localized absorption perturbations. Finally, as a proof of concept of in vivo application, we demonstrate that the system is able to detect hemodynamic changes occurring in the arm of healthy volunteers during a venous occlusion. Squeezing the laser source in a small footprint removes a key technological bottleneck that has hampered so far the realization of a miniaturized TD diffuse optics system, able to compete with already assessed continuous-wave devices in terms of size and cost, but with wider performance potentialities, as demonstrated by research over the last two decades. (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE).

  14. Optical modeling based on mean free path calculations for quantum dot phosphors applied to optoelectronic devices.

    Science.gov (United States)

    Shin, Min-Ho; Kim, Hyo-Jun; Kim, Young-Joo

    2017-02-20

    We proposed an optical simulation model for the quantum dot (QD) nanophosphor based on the mean free path concept to understand precisely the optical performance of optoelectronic devices. A measurement methodology was also developed to get the desired optical characteristics such as the mean free path and absorption spectra for QD nanophosphors which are to be incorporated into the simulation. The simulation results for QD-based white LED and OLED displays show good agreement with the experimental values from the fabricated devices in terms of spectral power distribution, chromaticity coordinate, CCT, and CRI. The proposed simulation model and measurement methodology can be applied easily to the design of lots of optoelectronics devices using QD nanophosphors to obtain high efficiency and the desired color characteristics.

  15. Device-dependent and device-independent quantum key distribution without a shared reference frame

    International Nuclear Information System (INIS)

    Slater, Joshua A; Tittel, Wolfgang; Branciard, Cyril; Brunner, Nicolas

    2014-01-01

    Standard quantum key distribution (QKD) protocols typically assume that the distant parties share a common reference frame. In practice, however, establishing and maintaining a good alignment between distant observers is rarely a trivial issue, which may significantly restrain the implementation of long-distance quantum communication protocols. Here we propose simple QKD protocols that do not require the parties to share any reference frame, and study their security and feasibility in both the usual device-dependent (DD) case—in which the two parties use well characterized measurement devices—as well as in the device-independent (DI) case—in which the measurement devices can be untrusted, and the security relies on the violation of a Bell inequality. To illustrate the practical relevance of these ideas, we present a proof-of-principle demonstration of our protocols using polarization entangled photons distributed over a coiled 10-km long optical fiber. We consider two situations, in which either the fiber spool's polarization transformation freely drifts, or randomly chosen polarization transformations are applied. The correlations obtained from measurements allow, with high probability, to generate positive asymptotic secret key rates in both the DD and DI scenarios (under the fair-sampling assumption for the latter case). (paper)

  16. Coherent optical communication detection device based on modified balanced optical phase-locked loop

    Science.gov (United States)

    Zhang, Bo; Sun, Jianfeng; Xu, Mengmeng; Li, Guangyuan; Zhang, Guo; Lao, Chenzhe; He, Hongyu; Lu, Zhiyong

    2017-08-01

    In the field of satellite communication, space laser communication technology is famous for its high communication rate, good confidentiality, small size, low power consumption and so on. The design of coherent optical communication detection device based on modified balanced optical phase-locked loop (OPLL) is presented in the paper. It combined by local oscillator beam, modulator, voltage controlled oscillator, signal beam, optical filter, 180 degree hybrid, balanced detector, loop filter and signal receiver. Local oscillator beam and voltage controlled oscillator trace the phase variation of signal beam simultaneously. That taking the advantage of voltage controlled oscillator which responses sensitively and tunable local oscillator laser source with large tuning range can trace the phase variation of signal beam rapidly and achieve phase locking. The demand of the phase deviation is very low, and the system is easy to adjust. When the transmitter transmits the binary phase shift keying (BPSK) signal, the receiver can demodulate the baseband signal quickly, which has important significance for the free space coherent laser communication.

  17. A full-duplex working integrated optoelectronic device for optical interconnect

    Science.gov (United States)

    Liu, Kai; Fan, Huize; Huang, Yongqing; Duan, Xiaofeng; Wang, Qi; Ren, Xiaomin; Wei, Qi; Cai, Shiwei

    2018-05-01

    In this paper, a full-duplex working integrated optoelectronic device is proposed. It is constructed by integrating a vertical cavity surface emitting laser (VCSEL) unit above a resonant cavity enhanced photodetector (RCE-PD) unit. Analysis shows that, the VCSEL unit has a threshold current of 1 mA and a slop efficiency of 0.66 W/A at 849.7 nm, the RCE-PD unit obtains its maximal absorption quantum efficiency of 90.24% at 811 nm with a FWHM of 4 nm. Moreover, the two units of the proposed integrated device can work independently from each other. So that the proposed integrated optoelectronic device can work full-duplex. It can be applied for single fiber bidirectional optical interconnects system.

  18. Optical Structural Health Monitoring Device

    Science.gov (United States)

    Buckner, Benjamin D.; Markov, Vladimir; Earthman, James C.

    2010-01-01

    This non-destructive, optical fatigue detection and monitoring system relies on a small and unobtrusive light-scattering sensor that is installed on a component at the beginning of its life in order to periodically scan the component in situ. The method involves using a laser beam to scan the surface of the monitored component. The device scans a laser spot over a metal surface to which it is attached. As the laser beam scans the surface, disruptions in the surface cause increases in scattered light intensity. As the disruptions in the surface grow, they will cause the light to scatter more. Over time, the scattering intensities over the scanned line can be compared to detect changes in the metal surface to find cracks, crack precursors, or corrosion. This periodic monitoring of the surface can be used to indicate the degree of fatigue damage on a component and allow one to predict the remaining life and/or incipient mechanical failure of the monitored component. This wireless, compact device can operate for long periods under its own battery power and could one day use harvested power. The prototype device uses the popular open-source TinyOS operating system on an off-the-shelf Mica2 sensor mote, which allows wireless command and control through dynamically reconfigurable multi-node sensor networks. The small size and long life of this device could make it possible for the nodes to be installed and left in place over the course of years, and with wireless communication, data can be extracted from the nodes by operators without physical access to the devices. While a prototype has been demonstrated at the time of this reporting, further work is required in the system s development to take this technology into the field, especially to improve its power management and ruggedness. It should be possible to reduce the size and sensitivity as well. Establishment of better prognostic methods based on these data is also needed. The increase of surface roughness with

  19. Exploiting the optical and luminescence characteristic of quantum dots for optical device fabrication

    Science.gov (United States)

    Suriyaprakash, Jagadeesh; Qiao, Ting Ting

    2018-02-01

    One can design a robust optical device by engineering the optical band gap of the quantum dots (QDs) owing to their size-tunable quantum confinement effect. To do this, understanding the optical effects of QDs and composite materials is crucial. In this context, various sizes (2.8-4.2 nm) of CdSe QDs-PMMA nanocomposite are fabricated in a two-step process and their absorbance, luminescence and optical constants studied systematically. The ellipsometry spectroscopic analysis exhibits the heterogeneous medium feature of Ψ value and also the measured refractive index (1.51-1.59) values are increased with decreased band gap (2.24-2.10 eV). The observed red shift in the UV-Vis and photoluminescence spectra is indicative of early stage CdSe QD followed by a nucleation process of bigger size QD. In addition, the growth kinetics of the reaction and the band gap of the QDs are evaluated with respect to the time to testify the colloidal QDs formation. The thickness and QD composition of the nanocomposite thin films calculated by effective medium approximation are 100 nm and 8-12%, respectively. Morphology and structural feature transmission electron microscopy study of the fabricated nanocomposite demonstrated that spherical CdSe QDs are well dispersed in PMMA.

  20. Celebrating the Year of Light….. from medicine to security with Optical Coherence Tomography

    CSIR Research Space (South Africa)

    Singh, A

    2015-10-01

    Full Text Available medicine to security with Optical Coherence Tomography Ann Singh1, Ameeth Sharma1, Ted Roberts1, Rethabile Khutlang2, Rocky Ramokolo1, Nico Marome1, Leandra Webb2, Natasha Botha2,Aletta Karsten3, Hencharl Strauss1 1 CSIR, National Laser Centre, P.O Box...

  1. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  2. Simultaneous topographical, electrical and optical microscopy of optoelectronic devices at the nanoscale

    KAUST Repository

    Kumar, Naresh

    2017-01-12

    Novel optoelectronic devices rely on complex nanomaterial systems where the nanoscale morphology and local chemical composition are critical to performance. However, the lack of analytical techniques that can directly probe these structure-property relationships at the nanoscale presents a major obstacle to device development. In this work, we present a novel method for non-destructive, simultaneous mapping of the morphology, chemical composition and photoelectrical properties with <20 nm spatial resolution by combining plasmonic optical signal enhancement with electrical-mode scanning probe microscopy. We demonstrate that this combined approach offers subsurface sensitivity that can be exploited to provide molecular information with a nanoscale resolution in all three spatial dimensions. By applying the technique to an organic solar cell device, we show that the inferred surface and subsurface composition distribution correlates strongly with the local photocurrent generation and explains macroscopic device performance. For instance, the direct measurement of fullerene phase purity can distinguish between high purity aggregates that lead to poor performance and lower purity aggregates (fullerene intercalated with polymer) that result in strong photocurrent generation and collection. We show that the reliable determination of the structure-property relationship at the nanoscale can remove ambiguity from macroscopic device data and support the identification of the best routes for device optimisation. The multi-parameter measurement approach demonstrated herein is expected to play a significant role in guiding the rational design of nanomaterial-based optoelectronic devices, by opening a new realm of possibilities for advanced investigation via the combination of nanoscale optical spectroscopy with a whole range of scanning probe microscopy modes.

  3. Security authentication using the reflective glass pattern imaging effect.

    Science.gov (United States)

    Zhu, Ji Cheng; Shen, Su; Wu, Jian Hong

    2015-11-01

    The reflective glass pattern imaging effect is investigated experimentally for the utility in forming a synthetic 3D image as a security authentication device in this Letter. An array of homogeneously randomly distributed reflective elements and a corresponding micropattern array are integrated onto a thin layer of polyester film aiming to create a vivid image floating over a substrate surface, which can be clearly visible to the naked eye. By using the reflective-type configuration, the micro-optic system can be realized on a thinner substrate and is immune to external stain due to its flat working plane. A novel gravure-like doctor blading technique can realize a resolution up to 12,000 dpi and a stringent 2D alignment requirement should be imposed. Such devices can find applications in document security and banknotes or other valuable items to protect them against forgery.

  4. A comparison of tape-tying versus a tube-holding device for securing endotracheal tubes in adults.

    Science.gov (United States)

    Murdoch, E; Holdgate, A

    2007-10-01

    During the transfer of intubated patients, endotracheal tube security is paramount. This study aims to compare two methods of securing an endotracheal tube in adults: tying with a cloth tape versus the Thomas Endotracheal Tube Holder (Laerdal). A manikin-based study was performed using paramedics and critical care doctors (consultants and senior trainees) as participants. Each participant was asked to secure an endotracheal tube that had been placed within the trachea of a manikin a total of six times, the first three times using tied cloth tape and the last three times using a Thomas Endotracheal Tube Holder. Following each 'fixation' and after the participant had left the room, the security of the tube was tested by applying a fixed force laterally and to the right by dropping a 1.25 kg weight a distance of 50 cm. The amount of movement of the tube with respect to the teeth was measured and recorded in millimetres. Two-hundred-and-seventy tube fixations (135 tied vs. 135 tube holder) were performed by 45 participants. The degree of tube movement was significantly higher when the tube was secured with a tie compared with when the tube holder was used (median movement 22 mm vs. 4 mm, P tube holder device minimised tube movement in a manikin model when compared with conventional tape tying. The use of this device when transporting intubated patients may reduce the risk of tube displacement though further clinical studies are warranted.

  5. Fabry-Perot-like interference security image structures: From passive to active

    Energy Technology Data Exchange (ETDEWEB)

    Baloukas, B., E-mail: bill.baloukas@polymtl.ca; Trottier-Lapointe, W.; Martinu, L., E-mail: ludvik.martinu@polymtl.ca

    2014-05-30

    Counterfeiting of products and important documents is at an all-time high and is costing the world economy hundreds of billions of dollars yearly as well as posing significant safety and health hazards through the production of uncertified goods, e.g., pharmaceutical products. To limit these effects, interference-based optical security devices offering an angular color shift are still widely in use. Unfortunately, commercial iridescent materials are now readily available and represent a potential source of counterfeiting. In this short review, we first describe the basic principles behind passive interference security image structures (ISIS) and the qualities which have resulted in their integration into most important documents. Various features which have been added to ISIS in order to make them harder to duplicate yet simpler to authenticate are also presented (metamerism, magnetic materials, diffraction, etc.). We then address the implementation of active materials, mainly electrochromic WO{sub 3} as a means of generating two-level authentication devices. Finally, we discuss some general considerations to keep in mind when developing features for security applications. - Highlights: • We review Fabry–Perot-like metal-dielectric filters used in optical security. • We discuss/demonstrate recent additions: metamerism, magnetism and diffraction. • We demonstrate a feature based on the use of thin metallic mirrors. • We cover recent developments in the use of active materials. • We demonstrate an electrochromic feature with two levels of authentication.

  6. Time–energy high-dimensional one-side device-independent quantum key distribution

    International Nuclear Information System (INIS)

    Bao Hai-Ze; Bao Wan-Su; Wang Yang; Chen Rui-Ke; Ma Hong-Xin; Zhou Chun; Li Hong-Wei

    2017-01-01

    Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel. (paper)

  7. Nanomaterials for LightManagement in Electro-Optical Devices

    Energy Technology Data Exchange (ETDEWEB)

    Truong, Vo-Van [Concordia University, Montréal, Québec, H4B 1R6, Canada; Singh, Jai [Charles Darwin University, Darwin, Australia; Tanemura, Sakae [Japan Fine Ceramics Center, Nagoya, Japan; Hu, Michael Z. [ORNL

    2012-01-01

    In the past decade, nanostructured materials and nanoparticles have emerged as the necessary ingredients for electrooptical applications and enhancement of device performance, in particular by making use of the light management aspects of the nanomaterials. The application areas that are being transformed profoundly include smart coating devices (e.g., electrochromic, photochromic, and thermochromic devices), solar energy, and sensing. Despite the large volume of work in the past on smart coating devices, and in particular on electrochromic devices and thermochromic fenestrations, for optical transmission or reflection control, applications remain limited because of slow response time and nonuniformity in the case of large surfaces. Recent works in the field indicate that nanostructured electrochromic coatings would be an integral part of the solution to the above problem. One aspect that can thus be focused on would be the fabrication and characterization of the nanostructured smart coating materials and their compatibility with other layers in the overall smart coating device. In the area of solar photovoltaics, nanomaterials have been used in designing light-trapping schemes for inorganic as well as organic solar cells. One particular category of solar cells that has attracted much interest is the plasmonic solar cells in which metallic nanoparticles are incorporated, helping in enhancing their energy conversion efficiency. Nanostructured solar cells would eventually develop into a 'game changing' technology for making solar cells that are affordable and highly efficient, providing a sizeable alternative energy source for our ever-increasing energy needs. Sensors based on the optical properties of constituting nanostructures and nanoparticles also form a most interesting class of bio- and electrochemical sensing devices. The possibility of synthetizing nanoparticles and structures of specifically desired sizes and shapes has indeed opened a whole new

  8. InP monolithically integrated label swapper device for spectral amplitude coded optical packet networks

    NARCIS (Netherlands)

    Muñoz, P.; García-Olcina, R.; Doménech, J.D.; Rius, M.; Sancho, J.C.; Capmany, J.; Chen, L.R.; Habib, C.; Leijtens, X.J.M.; Vries, de T.; Heck, M.J.R.; Augustin, L.M.; Nötzel, R.; Robbins, D.J.

    2010-01-01

    In this paper a label swapping device, for spectral amplitude coded optical packet networks, fully integrated using InP technology is presented. Compared to previous demonstrations using discrete component assembly, the device footprint is reduced by a factor of 105 and the operation speed is

  9. Manipulating qudits spatial using programmable diffractive optical devices

    International Nuclear Information System (INIS)

    Lima, G.; Neves, L.; Saavedra, C.; Vargas, A.; Guzman, R.

    2009-01-01

    The generation of high-dimensional quantum states (qudits) is justified by the advantages that they can bring for the field of quantum information. These states for practical application in quantum communication must be of simple manipulation. Qudits can be generated by controlling the transverse momentum of the parametric down-converted photons. In this work, we show a simple technique for modifying these sates based on the use of programmable diffractive optical devices, which can act as spatial light modulators. (Author)

  10. Optical wireless connected objects for healthcare.

    Science.gov (United States)

    Toumieux, Pascal; Chevalier, Ludovic; Sahuguède, Stéphanie; Julien-Vergonjanne, Anne

    2015-10-01

    In this Letter the authors explore the communication capabilities of optical wireless technology for a wearable device dedicated to healthcare application. In an indoor environment sensible to electromagnetic perturbations such as a hospital, the use of optical wireless links can permit reducing the amount of radio frequencies in the patient environment. Moreover, this technology presents the advantage to be secure, low-cost and easy to deploy. On the basis of commercially available components, a custom-made wearable device is presented, which allows optical wireless transmission of accelerometer data in the context of physical activity supervision of post-stroke patients in hospital. Considering patient mobility, the experimental performance is established in terms of packet loss as a function of the number of receivers fixed to the ceiling. The results permit to conclude that optical wireless links can be used to perform such mobile remote monitoring applications. Moreover, based on the measurements obtained with one receiver, it is possible to theoretically determine the performance according to the number of receivers to be deployed.

  11. Security and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket Surveillance

    OpenAIRE

    Ransford, Benjamin; Molina-Markham, Andres; Stewart, Quinn; Fu, Kevin; Kramer, Daniel Bruce; Baker, Matthew Charles; Reynolds, Matthew R.

    2012-01-01

    Background: Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients’ stored medical information. These computing capabilities introduce security and privacy risks, yet little is known about the prevalence of such risks within the clinical setting. Methods: We used three comprehensive, publicly available databases maintained by the Food and Drug Admini...

  12. Information authentication using an optical dielectric metasurface

    International Nuclear Information System (INIS)

    Wang, Xiaogang; Mei, Shengtao

    2017-01-01

    Metasurfaces that consist of a monolayer of photonic artificial atoms are emerging as attractive materials for optical wavefront-shaping and polarization-control devices. By integrating nanophotonics with a phase-encoding technique, we demonstrate theoretically an information authentication method using dielectric metasurfaces that can be verified without information disclosure at visible wavelengths. The required secured diffraction pattern can be simply achieved by a metasurface hologram with a small number of pixels, which means increased efficiency and lower costs of production. Although the decrypted image is noisy, it can be authenticated by recognition algorithms where the primary image is used as a reference. The results show that the dielectric metasurface approach, providing great flexibility in the design of the wavefront of light and compatible with the CMOS technology, can be potentially applied in optical information security. (letter)

  13. High-damage-threshold static laser beam shaping using optically patterned liquid-crystal devices.

    Science.gov (United States)

    Dorrer, C; Wei, S K-H; Leung, P; Vargas, M; Wegman, K; Boulé, J; Zhao, Z; Marshall, K L; Chen, S H

    2011-10-15

    Beam shaping of coherent laser beams is demonstrated using liquid crystal (LC) cells with optically patterned pixels. The twist angle of a nematic LC is locally set to either 0 or 90° by an alignment layer prepared via exposure to polarized UV light. The two distinct pixel types induce either no polarization rotation or a 90° polarization rotation, respectively, on a linearly polarized optical field. An LC device placed between polarizers functions as a binary transmission beam shaper with a highly improved damage threshold compared to metal beam shapers. Using a coumarin-based photoalignment layer, various devices have been fabricated and tested, with a measured single-shot nanosecond damage threshold higher than 30 J/cm2.

  14. Optical devices for proximity operations study and test report. [intensifying images for visual observation during space transportation system activities

    Science.gov (United States)

    Smith, R. A.

    1979-01-01

    Operational and physical requirements were investigated for a low-light-level viewing device to be used as a window-mounted optical sight for crew use in the pointing, navigating, stationkeeping, and docking of space vehicles to support space station operations and the assembly of large structures in space. A suitable prototype, obtained from a commercial vendor, was subjected to limited tests to determine the potential effectiveness of a proximity optical device in spacecraft operations. The constructional features of the device are discussed as well as concepts for its use. Tests results show that a proximity optical device is capable of performing low-light-level viewing services and will enhance manned spacecraft operations.

  15. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  16. Lab-on-fiber electrophoretic trace mixture separating and detecting an optofluidic device based on a microstructured optical fiber.

    Science.gov (United States)

    Yang, Xinghua; Guo, Xiaohui; Li, Song; Kong, Depeng; Liu, Zhihai; Yang, Jun; Yuan, Libo

    2016-04-15

    We report an in-fiber integrated electrophoretic trace mixture separating and detecting an optofluidic optical fiber sensor based on a specially designed optical fiber. In this design, rapid in situ separation and simultaneous detection of mixed analytes can be realized under electro-osmotic flow in the microstructured optical fiber. To visually display the in-fiber separating and detecting process, two common fluorescent indicators are adopted as the optofluidic analytes in the optical fiber. Results show that a trace amount of the mixture (0.15 μL) can be completely separated within 3.5 min under a high voltage of 5 kV. Simultaneously, the distributed information of the separated analytes in the optical fiber can be clearly obtained by scanning along the optical fiber using a 355 nm laser. The emission from the analytes can be efficiently coupled into the inner core and guides to the remote end of the optical fiber. In addition, the thin cladding around the inner core in the optical fiber can prevent the fluorescent cross talk between the analytes in this design. Compared to previous optical fiber optofluidic devices, this device first realizes simultaneously separating treatment and the detection of the mixed samples in an optical fiber. Significantly, such an in-fiber integrated separating and detecting optofluidic device can find wide applications in various analysis fields involves mixed samples, such as biology, chemistry, and environment.

  17. Development of DSRC device and communication system performance measures recommendations for DSRC OBE performance and security requirements.

    Science.gov (United States)

    2016-05-22

    This report presents recommendations for minimum DSRC device communication performance and security : requirements to ensure effective operation of the DSRC system. The team identified recommended DSRC : communications requirements aligned to use cas...

  18. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  19. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  20. Multilayered analog optical differentiating device: performance analysis on structural parameters.

    Science.gov (United States)

    Wu, Wenhui; Jiang, Wei; Yang, Jiang; Gong, Shaoxiang; Ma, Yungui

    2017-12-15

    Analogy optical devices (AODs) able to do mathematical computations have recently gained strong research interest for their potential applications as accelerating hardware in traditional electronic computers. The performance of these wavefront-processing devices is primarily decided by the accuracy of the angular spectral engineering. In this Letter, we show that the multilayer technique could be a promising method to flexibly design AODs according to the input wavefront conditions. As examples, various Si-SiO 2 -based multilayer films are designed that can precisely perform the second-order differentiation for the input wavefronts of different Fourier spectrum widths. The minimum number and thickness uncertainty of sublayers for the device performance are discussed. A technique by rescaling the Fourier spectrum intensity has been proposed in order to further improve the practical feasibility. These results are thought to be instrumental for the development of AODs.

  1. Materials and devices for all-optical helicity-dependent switching

    Science.gov (United States)

    Salah El Hadri, Mohammed; Hehn, Michel; Malinowski, Grégory; Mangin, Stéphane

    2017-04-01

    Since the first observation of ultrafast demagnetization in Ni thin films by Beaurepaire et al 20 years ago, understanding the interaction between ultrashort laser pulses and magnetization has become a topic of huge interest. In 2007, an intriguing discovery related to ultrafast demagnetization was the observation of all-optical switching (AOS) of magnetization in ferrimagnetic GdFeCo alloy films using only femtosecond laser pulses. This review discusses the recent studies elucidating several key issues regarding the all-optical switching phenomenon. Although AOS had long been restricted to GdFeCo alloys, it turned out to be a more general phenomenon for a variety of ferrimagnetic as well as ferromagnetic materials. This discovery helped pave the way for the integration of all-optical writing in data storage industries. Nevertheless, theoretical models explaining the switching in GdFeCo alloy films do not appear to apply in the other materials, thus questioning the uniqueness of the microscopic origin of all-optical switching. By investigating the integration of all-optical switching in spintronic devices, two types of all-optical switching mechanism have been distinguished: a single-pulse heat-only switching in ferrimagnetic GdFeCo alloys, and a two regime helicity-dependent switching in both ferrimagnetic TbCo alloys and ferromagnetic Co/Pt multilayers. Another key issue discussed in this review is the necessary condition for the observation of all-optical switching. Many models have been proposed but are strongly challenged by the discovery of such switching in ferromagnets. A comprehensive investigation of the magnetic parameters governing all-optical switching demonstrate that its observation requires magnetic domains larger than the laser spot size during the cooling process; such a criterion is common for both ferri- and ferro-magnets. These investigations strongly improve our understanding and give intriguing insights into the rich physics of the ultrafast

  2. Study of Periodic Fabrication Error of Optical Splitter Device Performance

    OpenAIRE

    Ab-Rahman, Mohammad Syuhaimi; Ater, Foze Saleh; Jumari, Kasmiran; Mohammad, Rahmah

    2012-01-01

    In this paper, the effect of fabrication errors (FEs) on the performance of 1×4 optical power splitter is investigated in details. The FE, which is assumed to take regular shape, is considered in each section of the device. Simulation result show that FE has a significant effect on the output power especially when it occurs in coupling regions.

  3. Optical transmission modules for multi-channel superconducting quantum interference device readouts

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin-Mok, E-mail: jmkim@kriss.re.kr; Kwon, Hyukchan; Yu, Kwon-kyu; Lee, Yong-Ho; Kim, Kiwoong [Brain Cognition Measurement Center, Korea Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of)

    2013-12-15

    We developed an optical transmission module consisting of 16-channel analog-to-digital converter (ADC), digital-noise filter, and one-line serial transmitter, which transferred Superconducting Quantum Interference Device (SQUID) readout data to a computer by a single optical cable. A 16-channel ADC sent out SQUID readouts data with 32-bit serial data of 8-bit channel and 24-bit voltage data at a sample rate of 1.5 kSample/s. A digital-noise filter suppressed digital noises generated by digital clocks to obtain SQUID modulation as large as possible. One-line serial transmitter reformed 32-bit serial data to the modulated data that contained data and clock, and sent them through a single optical cable. When the optical transmission modules were applied to 152-channel SQUID magnetoencephalography system, this system maintained a field noise level of 3 fT/√Hz @ 100 Hz.

  4. DSA for Secured Optical Communication

    International Nuclear Information System (INIS)

    Shojaei, A.A.; Amiri, I.S.

    2011-01-01

    Novel system of dark soliton array (DSA) for secured communication is proposed. The DSA are obtained by using a series micro ring resonators where the input wavelengths of λ 1 = 1516 nm, λ 2 = 1518 nm and λ 3 =1520 nm propagate inside the system and finally will be multiplexed. For security applications, the DSA can be tuned and amplified. The use of DSA for high capacity can be realized by using proposed secured system. (author)

  5. Designing ECG-based physical unclonable function for security of wearable devices.

    Science.gov (United States)

    Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo

    2017-07-01

    As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.

  6. Manufacturing and testing flexible microfluidic devices with optical and electrical detection mechanisms

    NARCIS (Netherlands)

    Ivan, M.G.; Vivet, F.; Meinders, E.R.

    2010-01-01

    Flexible microfluidic devices made of poly(dimethylsiloxane) (PDMS) were manufactured by soft lithography, and tested in detection of ionic species using optical absorption spectroscopy and electrical measurements. PDMS was chosen due to its flexibility and ease of surface modification by exposure

  7. DeviceGuard: External Device-Assisted System And Data Security

    OpenAIRE

    Deng, Yipan

    2011-01-01

    This thesis addresses the threat that personal computer faced from malware when the personal computer is connected to the Internet. Traditional host-based security approaches, such as anti-virus scanning protect the host from virus, worms, Trojans and other malwares. One of the issues of the host-based security approaches is that when the operating system is compromised by the malware, the antivirus software also becomes vulnerable. In this thesis, we present a novel approach through usin...

  8. A Study of Various Electronic Security Sensors Devices and Technology at Various Application Field Accompanied With Real Time Project Implementation of Sensor

    OpenAIRE

    Vijay Laxmi Kalyani; Parmeet Kour; Peram Navya

    2016-01-01

    Abstract: Nowadays electronics is everywhere and we are surrounded with electronic gazettes many of them are helping us in maintaining security at various places, there are many security problems faced by banks, homes etc. Without proper and strong security a vault can be penetrated. A security system is used in residential, commercial, industrial, Medical and Militaries as well as personal protection. In this paper we are discussing about the various electronic security sensor devices and te...

  9. Choice of optical system is critical for the security of double random phase encryption systems

    Science.gov (United States)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Cassidy, Derek; Zhao, Liang; Ryle, James P.; Healy, John J.; Sheridan, John T.

    2017-06-01

    The linear canonical transform (LCT) is used in modeling a coherent light-field propagation through first-order optical systems. Recently, a generic optical system, known as the quadratic phase encoding system (QPES), for encrypting a two-dimensional image has been reported. In such systems, two random phase keys and the individual LCT parameters (α,β,γ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfy some dynamic security properties. We, therefore, examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform-based double random phase encryption (DRPE) systems. The results show that the LCT-based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel-based encryption systems.

  10. Solitonic guides in photopolymerizable materials for optical devices

    Science.gov (United States)

    Dorkenoo, Kokou D.; Cregut, Olivier; Fort, Alain

    2003-11-01

    These last twenty years, advanced studies in integrated optics have demonstrated the capacity to elaborate optical circuits in planar substrates. Most of the optical integrated devices are realized on glass substrate and the guide areas are usually obtained by photolithography techniques. We present here a new approach based on the use of compounds photopolymerizable in the visible range. The conditions of self written channel creation by solitonic propagation inside the bulk of the photopolymerizable formulation are analyzed. Waveguides can be self-written in photopolymerizable materials1,2 due to the dependence of their refractive index on intensity and duration of the active light. This process results from the competition between the diffraction of the incident Gaussian beam and the photopolymerization which tends to increase the refractive index where light intensity is the highest. By controlling the difference between the refractive index values of the polymerized and non polymerized zones, the beam can be self-trapped along the propagation axis giving rise to a waveguide over distances as large as 10 cm without any broadening. Such permanent waveguides can be structured by inscription of gratings and doped with a dye in a plastic cell leading to the elaboration of a completely plastic laser.

  11. Study on magnetic fluid optical fiber devices for optical logic operations by characteristics of superparamagnetic nanoparticles and magnetic fluids

    International Nuclear Information System (INIS)

    Chieh, J. J.; Hong, C. Y.; Yang, S. Y.; Horng, H. E.; Yang, H. C.

    2010-01-01

    We propose two optical fiber-based schemes using two magnetic fluid optical fiber modulators in series or in parallel for optical logic signal processing and operation. Here, each magnetic fluid optical fiber modulator consists of a bare multimode fiber surrounded by magnetic fluid in which the refractive index is adjustable by applying external magnetic fields amplifying the input electrical signal to vary the transmission intensity of the optical fiber-based scheme. The physical mechanisms for the performances of the magnetic fluid optical fiber devices, such as the transmission loss related to Boolean number of the logic operation as well as the dynamic response, are studied by the characteristics of superparamagnetic nanoparticles and magnetic fluids. For example, in the dynamic response composed of the retarding and response sub-procedures except the response times of the actuation coil, the theoretical evaluation of the retarding time variation with cladding magnetic fluids length has good agreement with the experimental results.

  12. Integrated optical devices based on sol – gel waveguides using the temperature dependence of the effective refractive index

    Energy Technology Data Exchange (ETDEWEB)

    Pavlov, S V; Trofimov, N S; Chekhlova, T K [Peoples' Friendship University of Russia, Moscow (Russian Federation)

    2014-07-31

    A possibility of designing optical waveguide devices based on sol – gel SiO{sub 2} – TiO{sub 2} films using the temperature dependence of the effective refractive index is shown. The dependences of the device characteristics on the parameters of the film and opticalsystem elements are analysed. The operation of a temperature recorder and a temperature limiter with a resolution of 0.6 K mm{sup -1} is demonstrated. The film and output-prism parameters are optimised. (fibreoptic and nonlinear-optic devices)

  13. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  14. Collective multipartite Einstein-Podolsky-Rosen steering: more secure optical networks.

    Science.gov (United States)

    Wang, Meng; Gong, Qihuang; He, Qiongyi

    2014-12-01

    Collective multipartite Einstein-Podolsky-Rosen (EPR) steering is a type of quantum correlation shared among N parties, where the EPR paradox of one party can only be realized by performing local measurements on all the remaining N-1 parties. We formalize the collective tripartite steering in terms of local hidden state model and give the steering inequalities that act as signatures and suggest how to optimize collective tripartite steering in specific optical schemes. The special entangled states with property of collective multipartite steering may have potential applications in ultra-secure multiuser communication networks where the issue of trust is critical.

  15. Design, Manufacturing and Experimental Validation of Optical Fiber Sensors Based Devices for Structural Health Monitoring

    Directory of Open Access Journals (Sweden)

    Angela CORICCIATI

    2016-06-01

    Full Text Available The use of optical fiber sensors is a promising and rising technique used for Structural Health Monitoring (SHM, because permit to monitor continuously the strain and the temperature of the structure where they are applied. In the present paper three different types of smart devices, that are composite materials with an optical fiber sensor embedded inside them during the manufacturing process, are described: Smart Patch, Smart Rebar and Smart Textile, which are respectively a plate for local exterior intervention, a rod for shear and flexural interior reinforcement and a textile for an external whole application. In addition to the monitoring aim, the possible additional function of these devices could be the reinforcement of the structures where they are applied. In the present work, after technology manufacturing description, the experimental laboratory characterization of each device is discussed. At last, smart devices application on medium scale masonry walls and their validation by mechanical tests is described.

  16. Reconfigurable optical-to-optical frequency conversion method and apparatus

    Science.gov (United States)

    Zortman, William A.; Lentine, Anthony L.

    2017-04-18

    A photonic device is provided for impressing a modulation pattern on an optical carrier. The device includes a unit in which a photodetector and an optical microresonator are monolithically integrated. The device further includes an optical waveguide evanescently coupled to the optical microresonator and having at least an upstream portion configured to carry at least one optical carrier toward the microresonator. The optical microresonator is tunable so as to resonate with the optical carrier frequency. The optical microresonator and the photodetector are mutually coupled such that in operation, charge carriers photogenerated in the photodetector are injected into the microresonator, where the photocurrent changes the resonant conditions. In some embodiments the device is operable as an optical-to-optical frequency converter. In other embodiments the device is operable as an oscillator.

  17. Poly (N-isopropylacrylamide Microgel-Based Optical Devices for Sensing and Biosensing

    Directory of Open Access Journals (Sweden)

    Molla R. Islam

    2014-05-01

    Full Text Available Responsive polymer-based materials have found numerous applications due to their ease of synthesis and the variety of stimuli that they can be made responsive to. In this review, we highlight the group’s efforts utilizing thermoresponsive poly (N-isopropylacrylamide (pNIPAm microgel-based optical devices for various sensing and biosensing applications.

  18. Authenticated sensor interface device

    Energy Technology Data Exchange (ETDEWEB)

    Coleman, Jody Rustyn; Poland, Richard W.

    2018-05-01

    A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolator that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.

  19. Organic structures design applications in optical and electronic devices

    CERN Document Server

    Chow, Tahsin J

    2014-01-01

    ""Presenting an overview of the syntheses and properties of organic molecules and their applications in optical and electronic devices, this book covers aspects concerning theoretical modeling for electron transfer, solution-processed micro- and nanomaterials, donor-acceptor cyclophanes, molecular motors, organogels, polyazaacenes, fluorogenic sensors based on calix[4]arenes, and organic light-emitting diodes. The publication of this book is timely because these topics have become very popular nowadays. The book is definitely an excellent reference for scientists working in these a

  20. Mobile Device Encryption Systems

    OpenAIRE

    Teufl , Peter; Zefferer , Thomas; Stromberger , Christof

    2013-01-01

    Part 4: Software Security; International audience; The initially consumer oriented iOS and Android platforms, and the newly available Windows Phone 8 platform start to play an important role within business related areas. Within the business context, the devices are typically deployed via mobile device management (MDM) solutions, or within the bring-your-own-device (BYOD) context. In both scenarios, the security depends on many platform security functions, such as permission systems, manageme...

  1. An in-fiber integrated optofluidic device based on an optical fiber with an inner core.

    Science.gov (United States)

    Yang, Xinghua; Yuan, Tingting; Teng, Pingping; Kong, Depeng; Liu, Chunlan; Li, Entao; Zhao, Enming; Tong, Chengguo; Yuan, Libo

    2014-06-21

    A new kind of optofluidic in-fiber integrated device based on a specially designed hollow optical fiber with an inner core is designed. The inlets and outlets are built by etching the surface of the optical fiber without damaging the inner core. A reaction region between the end of the fiber and a solid point obtained after melting is constructed. By injecting samples into the fiber, the liquids can form steady microflows and react in the region. Simultaneously, the emission from the chemiluminescence reaction can be detected from the remote end of the optical fiber through evanescent field coupling. The concentration of ascorbic acid (AA or vitamin C, Vc) is determined by the emission intensity of the reaction of Vc, H2O2, luminol, and K3Fe(CN)6 in the optical fiber. A linear sensing range of 0.1-3.0 mmol L(-1) for Vc is obtained. The emission intensity can be determined within 2 s at a total flow rate of 150 μL min(-1). Significantly, this work presents information for the in-fiber integrated optofluidic devices without spatial optical coupling.

  2. Chemical and Biological Sensing with a Fiber Optic Surface Plasmon Resonance Device

    Science.gov (United States)

    Shevchenko, Yanina

    Fiber biosensors have emerged as an alternative to other optical sensor platforms which utilize bulkier optical elements. Sensors manufactured using optical fiber offer considerable advantages over traditional platforms, such as simple manufacturing process, small size and possibility for in situ and remote measurements. The possibility to manufacture a compact sensor with very few optical elements and package it into a portable hand-held device makes it particularly useful in many biomedical applications. Such applications generate a growing demand for an improved understanding of how fiber sensors function as well as for sensor optimization techniques so later these devices can suit the needs of the applications they are developed for. Research presented in this thesis is focused on a development of a plasmonic fiber biosensor and its application towards biochemical sensing. The fiber sensor used in this study integrates plasmonics with tilted Bragg grating technology, creating a versatile sensing solution. Plasmonics alone is an established phenomenon that is widely employed in many sensing applications. The Bragg grating is also a well-researched optical component that has been extensively applied in telecommunication. By combining both plasmonics and Bragg gratings, it is possible to design a compact and very sensitive chemical sensor. The presented work focuses on the characterization and optimization of the fiber sensor so later it could be applied in biochemical sensing. It also explores several applications including real-time monitoring of polymer adsorption, detection of thrombin and cellular sensing. All applications are focused on studying processes that are very different in their nature and thus the various strengths of the developed sensing platform were leveraged to suit the requirements of these applications.

  3. Micro knife-edge optical measurement device in a silicon-on-insulator substrate.

    Science.gov (United States)

    Chiu, Yi; Pan, Jiun-Hung

    2007-05-14

    The knife-edge method is a commonly used technique to characterize the optical profiles of laser beams or focused spots. In this paper, we present a micro knife-edge scanner fabricated in a silicon-on-insulator substrate using the micro-electromechanical-system technology. A photo detector can be fabricated in the device to allow further integration with on-chip signal conditioning circuitry. A novel backside deep reactive ion etching process is proposed to solve the residual stress effect due to the buried oxide layer. Focused optical spot profile measurement is demonstrated.

  4. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  5. DEVICE FOR BINARY DATA TRANSMITTING AND RECEIVING OVER A FIBEROPTIC COMMUNICATION CHANNEL

    Directory of Open Access Journals (Sweden)

    A. M. Timofeev

    2018-01-01

    Full Text Available When transferring data over optical fiber communication channels, it is required to provide data security and the authenticity of their source. To limit the access to the data for a third party, there can be applied quantum-cryptographical systems which are supposed to transfer every data bit by means of low power optical signals containing radiation photons the number of which could be in the range from 10 to 1, however, are far from being perfect and suffer from shortcomings, the main of which being a large number of errors due to the depolarization effect of optical radiation. The aim of this work was, therefore, to create device for sending and receiving confidential data which could provide complete security of transferred data, inherent to quantum-cryptographical communication systems at the same time could have a low number of such errors.A device for quantum-cryptographic communication system with a photon counter applied as a receiving module has been proposed. The possibility to use silicon avalanche photodetectors operating in the photon counting mode for confidential information transmission systems and defining authenticity of the source of transmitted information has been shown.I develop modern optical fiber communication system incorporating avalanche photodetector photon counter as a receiving module, that allow to detect unauthorized access to information and violation of its integrity and speed up the exchange of information in comparison with well-known quantum-cryptographical communication systems.

  6. Inspection of commercial optical devices for data storage using a three Gaussian beam microscope interferometer

    International Nuclear Information System (INIS)

    Flores, J. Mauricio; Cywiak, Moises; Servin, Manuel; Juarez P, Lorenzo

    2008-01-01

    Recently, an interferometric profilometer based on the heterodyning of three Gaussian beams has been reported. This microscope interferometer, called a three Gaussian beam interferometer, has been used to profile high quality optical surfaces that exhibit constant reflectivity with high vertical resolution and lateral resolution near λ. We report the use of this interferometer to measure the profiles of two commercially available optical surfaces for data storage, namely, the compact disk (CD-R) and the digital versatile disk (DVD-R). We include experimental results from a one-dimensional radial scan of these devices without data marks. The measurements are taken by placing the devices with the polycarbonate surface facing the probe beam of the interferometer. This microscope interferometer is unique when compared with other optical measuring instruments because it uses narrowband detection, filters out undesirable noisy signals, and because the amplitude of the output voltage signal is basically proportional to the local vertical height of the surface under test, thus detecting with high sensitivity. We show that the resulting profiles, measured with this interferometer across the polycarbonate layer, provide valuable information about the track profiles, making this interferometer a suitable tool for quality control of surface storage devices

  7. Pixelgram: an application of electron-beam lithography for the security printing industry

    Science.gov (United States)

    Lee, Robert A.

    1991-10-01

    Following the development of the Catpix I diffraction gratings structure first used on the 1988 Australian plastic DLR10 banknote and more recently on the Singapore plastic DLR50 banknote, the CSIRO Australia, Division of Materials Science & Technology has developed a new optical security and anti-counterfeiting technology known as Pixelgram (or Catpix 2). The Pixelgram, which is subject to patent, is an optically variable device based on a computerized procedure for producing an optically variable version of any given input picture, e.g., a photograph. When a Pixelgram is observed under a given source, such as a fluorescent tube, the image of the original input picture appears at particular angles of view. At other angles, the image varies in both contrast and brightness and can even appear as the photographic negative of the original input picture at some angles of view. As well as its ability to generate optically variable text and graphical images, Pixelgram has the unique capability of being able to display easily recognizable small scale optically variable images of the human face of near photographic clarity. Pixelgram optical security device master plates are produced by a technique borrowed from the microelectronics industry and known as electron beam lithography. In this technique, millions of microscopic grooves are written individually by a finely focused electron beam scanning across a glass plate coated with an electron sensitive material. On a typical Pixelgram there are approximately 2,000 million individual polygons etched into the plate by the electron beam. This corresponds to more than 10,000 megabytes of binary data. The only known electron beam lithography systems that have been able to write such large data files with the required precision are the Cambridge Instruments EBMF 10.5 and EBML 300 electron beam systems.

  8. Using cloud models of heartbeats as the entity identifier to secure mobile devices.

    Science.gov (United States)

    Fu, Donglai; Liu, Yanhua

    2017-01-01

    Mobile devices are extensively used to store more private and often sensitive information. Therefore, it is important to protect them against unauthorised access. Authentication ensures that authorised users can use mobile devices. However, traditional authentication methods, such as numerical or graphic passwords, are vulnerable to passive attacks. For example, an adversary can steal the password by snooping from a shorter distance. To avoid these problems, this study presents a biometric approach that uses cloud models of heartbeats as the entity identifier to secure mobile devices. Here, it is identified that these concepts including cloud model or cloud have nothing to do with cloud computing. The cloud model appearing in the study is the cognitive model. In the proposed method, heartbeats are collected by two ECG electrodes that are connected to one mobile device. The backward normal cloud generator is used to generate ECG standard cloud models characterising the heartbeat template. When a user tries to have access to their mobile device, cloud models regenerated by fresh heartbeats will be compared with ECG standard cloud models to determine if the current user can use this mobile device. This authentication method was evaluated from three aspects including accuracy, authentication time and energy consumption. The proposed method gives 86.04% of true acceptance rate with 2.73% of false acceptance rate. One authentication can be done in 6s, and this processing consumes about 2000 mW of power.

  9. Saying goodbye to optical storage technology.

    Science.gov (United States)

    McLendon, Kelly; Babbitt, Cliff

    2002-08-01

    The days of using optical disk based mass storage devices for high volume applications like health care document imaging are coming to an end. The price/performance curve for redundant magnetic disks, known as RAID, is now more positive than for optical disks. All types of application systems, across many sectors of the marketplace are using these newer magnetic technologies, including insurance, banking, aerospace, as well as health care. The main components of these new storage technologies are RAID and SAN. SAN refers to storage area network, which is a complex mechanism of switches and connections that allow multiple systems to store huge amounts of data securely and safely.

  10. Design refinement of multilayer optical thin film devices with two optimization techniques

    International Nuclear Information System (INIS)

    Apparao, K.V.S.R.

    1992-01-01

    The design efficiency of two different optimization techniques of designing multilayer optical thin film devices is compared. Ten different devices of varying complexities are chosen as design examples for the comparison. The design refinement efficiency and the design parameter characteristics of all the sample designs obtained with the two techniques are compared. The results of the comparison demonstrate that the new method of design developed using damped least squares technique with indirect derivatives give superior and efficient designs compared to the method developed with direct derivatives. (author). 23 refs., 4 tabs., 14 figs

  11. Optical sensor array platform based on polymer electronic devices

    Science.gov (United States)

    Koetse, Marc M.; Rensing, Peter A.; Sharpe, Ruben B. A.; van Heck, Gert T.; Allard, Bart A. M.; Meulendijks, Nicole N. M. M.; Kruijt, Peter G. M.; Tijdink, Marcel W. W. J.; De Zwart, René M.; Houben, René J.; Enting, Erik; van Veen, Sjaak J. J. F.; Schoo, Herman F. M.

    2007-10-01

    Monitoring of personal wellbeing and optimizing human performance are areas where sensors have only begun to be used. One of the reasons for this is the specific demands that these application areas put on the underlying technology and system properties. In many cases these sensors will be integrated in clothing, be worn on the skin, or may even be placed inside the body. This implies that flexibility and wearability of the systems is essential for their success. Devices based on polymer semiconductors allow for these demands since they can be fabricated with thin film technology. The use of thin film device technology allows for the fabrication of very thin sensors (e.g. integrated in food product packaging), flexible or bendable sensors in wearables, large area/distributed sensors, and intrinsically low-cost applications in disposable products. With thin film device technology a high level of integration can be achieved with parts that analyze signals, process and store data, and interact over a network. Integration of all these functions will inherently lead to better cost/performance ratios, especially if printing and other standard polymer technology such as high precision moulding is applied for the fabrication. In this paper we present an optical transmission sensor array based on polymer semiconductor devices made by thin film technology. The organic devices, light emitting diodes, photodiodes and selective medium chip, are integrated with classic electronic components. Together they form a versatile sensor platform that allows for the quantitative measurement of 100 channels and communicates wireless with a computer. The emphasis is given to the sensor principle, the design, fabrication technology and integration of the thin film devices.

  12. Multi-party Measurement-Device-Independent Quantum Key Distribution Based on Cluster States

    Science.gov (United States)

    Liu, Chuanqi; Zhu, Changhua; Ma, Shuquan; Pei, Changxing

    2018-03-01

    We propose a novel multi-party measurement-device-independent quantum key distribution (MDI-QKD) protocol based on cluster states. A four-photon analyzer which can distinguish all the 16 cluster states serves as the measurement device for four-party MDI-QKD. Any two out of four participants can build secure keys after the analyzers obtains successful outputs and the two participants perform post-processing. We derive a security analysis for the protocol, and analyze the key rates under different values of polarization misalignment. The results show that four-party MDI-QKD is feasible over 280 km in the optical fiber channel when the key rate is about 10- 6 with the polarization misalignment parameter 0.015. Moreover, our work takes an important step toward a quantum communication network.

  13. Fast charged-coupled device spectrometry using zoom-wavelength optics

    International Nuclear Information System (INIS)

    Carolan, P.G.; Conway, N.J.; Bunting, C.A.; Leahy, P.; OConnell, R.; Huxford, R.; Negus, C.R.; Wilcock, P.D.

    1997-01-01

    Fast charge-coupled device (CCD) detector arrays placed at the output of visible spectrometers are used for multichord Doppler shift analyses on the COMPASS-D and START tokamaks. Unequal magnification in the horizontal and vertical axes allows for optimal matching of throughput and spectral resolution at the CCD detector. This involves cylindrical lenses in an anamorphic mounting. Optical acuity is preserved over a very wide range of wavelengths (220 nm→700 nm) by separate repositioning of all the optical elements which is accomplished by the use of zoom mechanisms. This facilitates rapid changes of wavelength allowing edge and core observations depending on the location of the emitting impurity ions. Changes to the ion temperature and velocity are recorded using 20 chords simultaneously with typical accuracies of Δv i -1 and ΔT i /T i <10% with a time resolution of <1 ms. copyright 1997 American Institute of Physics

  14. Android Applications Security

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2011-01-01

    Full Text Available The use of smartphones worldwide is growing very fast and also the malicious attacks have increased. The mobile security applications development keeps the pace with this trend. The paper presents the vulnerabilities of mobile applications. The Android applications and devices are analyzed through the security perspective. The usage of restricted API is also presented. The paper also focuses on how users can prevent these malicious attacks and propose some prevention measures, including the architecture of a mobile security system for Android devices.

  15. Meta-structure and tunable optical device including the same

    Science.gov (United States)

    Han, Seunghoon; Papadakis, Georgia Theano; Atwater, Harry

    2017-12-26

    A meta-structure and a tunable optical device including the same are provided. The meta-structure includes a plurality of metal layers spaced apart from one another, an active layer spaced apart from the plurality of metal layers and having a carrier concentration that is tuned according to an electric signal applied to the active layer and the plurality of metal layers, and a plurality of dielectric layers spaced apart from one another and each having one surface contacting a metal layer among the plurality of metal layers and another surface contacting the active layer.

  16. Fiber optic sensor based on Mach-Zehnder interferometer for securing entrance areas of buildings

    Science.gov (United States)

    Nedoma, Jan; Fajkus, Marcel; Martinek, Radek; Mec, Pavel; Novak, Martin; Bednarek, Lukas; Vasinek, Vladimir

    2017-10-01

    Authors of this article focused on the utilization of fiber optic sensors based on interferometric measurements for securing entrance areas of buildings such as windows and doors. We described the implementation of the fiber-optic interferometer (type Mach-Zehnder) into the window frame or door, sensor sensitivity, analysis of the background noise and methods of signal evaluation. The advantage of presented solution is the use of standard telecommunication fiber standard G.652.D, high sensitivity, immunity of sensor to electromagnetic interference (EMI) and passivity of the sensor regarding power supply. Authors implemented the Graphical User Interface (GUI) which offers the possibility of remote monitoring presented sensing solution.

  17. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

    Science.gov (United States)

    Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa

    2018-03-01

    Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.

  18. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  19. Optical absorption and oxygen passivation of surface states in III-nitride photonic devices

    Science.gov (United States)

    Rousseau, Ian; Callsen, Gordon; Jacopin, Gwénolé; Carlin, Jean-François; Butté, Raphaël; Grandjean, Nicolas

    2018-03-01

    III-nitride surface states are expected to impact high surface-to-volume ratio devices, such as nano- and micro-wire light-emitting diodes, transistors, and photonic integrated circuits. In this work, reversible photoinduced oxygen desorption from III-nitride microdisk resonator surfaces is shown to increase optical attenuation of whispering gallery modes by 100 cm-1 at λ = 450 nm. Comparison of photoinduced oxygen desorption in unintentionally and n+-doped microdisks suggests that the spectral changes originate from the unpinning of the surface Fermi level, likely taking place at etched nonpolar III-nitride sidewalls. An oxygen-rich surface prepared by thermal annealing results in a broadband Q improvement to state-of-the-art values exceeding 1 × 104 at 2.6 eV. Such findings emphasize the importance of optically active surface states and their passivation for future nanoscale III-nitride optoelectronic and photonic devices.

  20. A Trusted Portable Computing Device

    Science.gov (United States)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  1. Design of optical switches by illusion optics

    International Nuclear Information System (INIS)

    Shoorian, H R; Abrishamian, M S

    2013-01-01

    In this paper, illusion optics theory is employed to form Bragg gratings in an optical waveguide in order to design an optical switch. By using an illusion device at a certain distance from the waveguide, the effective refractive index of the waveguide is remotely modulated, turning the waveguide into a distributed Bragg reflector (DBR) which blocks the waves at a stop band. By removing the illusion device, the waves propagate through the waveguide again. In addition, this method is used to remotely tune DBR optical properties such as resonant frequency and bandwidth in a wide range, which leads to a tunable filter for optical switching applications. Finally, using an illusion device at a distance, an optical cavity is created by inserting defects remotely in a DBR without any physical damage in the primary device. (paper)

  2. Design of optical switches by illusion optics

    Science.gov (United States)

    Shoorian, H. R.; Abrishamian, M. S.

    2013-05-01

    In this paper, illusion optics theory is employed to form Bragg gratings in an optical waveguide in order to design an optical switch. By using an illusion device at a certain distance from the waveguide, the effective refractive index of the waveguide is remotely modulated, turning the waveguide into a distributed Bragg reflector (DBR) which blocks the waves at a stop band. By removing the illusion device, the waves propagate through the waveguide again. In addition, this method is used to remotely tune DBR optical properties such as resonant frequency and bandwidth in a wide range, which leads to a tunable filter for optical switching applications. Finally, using an illusion device at a distance, an optical cavity is created by inserting defects remotely in a DBR without any physical damage in the primary device.

  3. (In-)security of smartphone anti-virus and security apps

    OpenAIRE

    Huber, Stephan; Rasthofer, Siegfried

    2016-01-01

    Android is by far the most popular operating system for smartphones today. Many people entrust their Android-based phone with highly sensitive data such as business documents and credit card information, or perform critical tasks such as online banking on their devices. To protect their devices against threats from malware or attackers who aim to exploit security vulnerabilities, many users rely on anti-virus and security apps available from renowned vendors. In this paper, we show that those...

  4. Device for simultaneous measurements of the optical and dielectric properties of hydrogels

    International Nuclear Information System (INIS)

    Gómez-Galván, F; Lara-Ceniceros, T; Mercado-Uribe, H

    2012-01-01

    We have designed an experimental device to simultaneously measure the light transmittance and dielectric properties of thermo-sensitive hydrogels. We have used this device to study poly(N-isopropylacrylamide) samples in order to understand the mechanism of water deliverance during the phase transition such hydrogels normally exhibit. We found that the phase transition can be observed dielectrically at low frequencies, when the isothermals obtained during the heating of the samples separate into two groups. The phenomenon occurs due to the increase of ions caused by the dissociation of water molecules released by the polymer, and corresponds to the drop of the optical transmittance

  5. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    Science.gov (United States)

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  6. Personal medical electronic devices and walk-through metal detector security systems: assessing electromagnetic interference effects.

    Science.gov (United States)

    Guag, Joshua; Addissie, Bisrat; Witters, Donald

    2017-03-20

    There have been concerns that Electromagnetic security systems such as walk-through metal detectors (WTMDs) can potentially cause electromagnetic interference (EMI) in certain active medical devices including implantable cardiac pacemakers and implantable neurostimulators. Incidents of EMI between WTMDs and active medical devices also known as personal medical electronic devices (PMED) continue to be reported. This paper reports on emission measurements of sample WTMDs and testing of 20 PMEDs in a WTMD simulation system. Magnetic fields from sample WTMD systems were characterized for emissions and exposure of certain PMEDs. A WTMD simulator system designed and evaluated by FDA in previous studies was used to mimic the PMED exposures to the waveform from sample WTMDs. The simulation system allows for controlled PMED exposure enabling careful study with adjustable magnetic field strengths and exposure duration, and provides flexibility for PMED exposure at elevated levels in order to study EMI effects on the PMED. The PMED samples consisted of six implantable cardiac pacemakers, six implantable cardioverter defibrillators (ICD), five implantable neurostimulators, and three insulin pumps. Each PMED was exposed in the simulator to the sample WTMD waveforms using methods based on appropriate consensus test standards for each of the device type. Testing the sample PMEDs using the WTMD simulator revealed EMI effects on two implantable pacemakers and one implantable neurostimulator for exposure field strength comparable to actual WTMD field strength. The observed effects were transient and the PMEDs returned to pre-exposure operation within a few seconds after removal from the simulated WTMD exposure fields. No EMI was observed for the sample ICDs or insulin pumps. The findings are consistent with earlier studies where certain sample PMEDs exhibited EMI effects. Clinical implications were not addressed in this study. Additional studies are needed to evaluate potential PMED

  7. Optically reconfigurable metasurfaces and photonic devices based on phase change materials

    Science.gov (United States)

    Wang, Qian; Rogers, Edward T. F.; Gholipour, Behrad; Wang, Chih-Ming; Yuan, Guanghui; Teng, Jinghua; Zheludev, Nikolay I.

    2016-01-01

    Photonic components with adjustable parameters, such as variable-focal-length lenses or spectral filters, which can change functionality upon optical stimulation, could offer numerous useful applications. Tuning of such components is conventionally achieved by either micro- or nanomechanical actuation of their constituent parts, by stretching or by heating. Here, we report a novel approach for making reconfigurable optical components that are created with light in a non-volatile and reversible fashion. Such components are written, erased and rewritten as two-dimensional binary or greyscale patterns into a nanoscale film of phase-change material by inducing a refractive-index-changing phase transition with tailored trains of femtosecond pulses. We combine germanium-antimony-tellurium-based films with a diffraction-limited resolution optical writing process to demonstrate a variety of devices: visible-range reconfigurable bichromatic and multi-focus Fresnel zone plates, a super-oscillatory lens with subwavelength focus, a greyscale hologram, and a dielectric metamaterial with on-demand reflection and transmission resonances.

  8. Device independence for two-party cryptography and position verification with memoryless devices

    Science.gov (United States)

    Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie

    2018-06-01

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.

  9. Memory attacks on device-independent quantum cryptography.

    Science.gov (United States)

    Barrett, Jonathan; Colbeck, Roger; Kent, Adrian

    2013-01-04

    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

  10. Security Issues for Mobile Medical Imaging: A Primer.

    Science.gov (United States)

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  11. Interconnecting wearable devices with nano-biosensing implants through optical wireless communications

    Science.gov (United States)

    Johari, Pedram; Pandey, Honey; Jornet, Josep M.

    2018-02-01

    Major advancements in the fields of electronics, photonics and wireless communication have enabled the development of compact wearable devices, with applications in diverse domains such as fitness, wellness and medicine. In parallel, nanotechnology is enabling the development of miniature sensors that can detect events at the nanoscale with unprecedented accuracy. On this matter, in vivo implantable Surface Plasmon Resonance (SPR) nanosensors have been proposed to analyze circulating biomarkers in body fluids for the early diagnosis of a myriad of diseases, ranging from cardiovascular disorders to different types of cancer. In light of these results, in this paper, an architecture is proposed to bridge the gap between these two apparently disjoint paradigms, namely, the commercial wearable devices and the advanced nano-biosensing technologies. More specifically, this paper thoroughly assesses the feasibility of the wireless optical intercommunications of an SPR-based nanoplasmonic biochip -implanted subcutaneously in the wrist-, with a nanophotonic wearable smart band which is integrated by an array of nano-lasers and photon-detectors for distributed excitation and measurement of the nanoplasmonic biochip. This is done through a link budget analysis which captures the peculiarities of the intra-body optical channel at (sub) cellular level, the strength of the SPR nanosensor reflection, as well as the capabilities of the nanolasers (emission power, spectrum) and the nano photon-detectors (sensitivity and noise equivalent power). The proposed analysis guides the development of practical communication designs between the wearable devices and nano-biosensing implants, which paves the way through early-stage diagnosis of severe diseases.

  12. Contribution to coherent atom optics - Design of multiple wave devices

    International Nuclear Information System (INIS)

    Impens, F.

    2008-03-01

    The theoretical work presented in this manuscript addresses two complementary issues in coherent atom optics. The first part addresses the perspectives offered by coherent atomic sources through the design of two experiment involving the levitation of a cold atomic sample in a periodic series of light pulses, and for which coherent atomic clouds are particularly well-suited. These systems appear as multiple wave atom interferometers. A striking feature of these experiments is that a unique system performs both the sample trapping and interrogation. To obtain a transverse confinement, a novel atomic lens is proposed, relying on the interaction between an atomic wave with a spherical light wave. The sensitivity of the sample trapping towards the gravitational acceleration and towards the pulse frequencies is exploited to perform the desired measurement. These devices constitute atomic wave resonators in momentum space, which is a novel concept in atom optics. A second part develops new theoretical tools - most of which inspired from optics - well-suited to describe the propagation of coherent atomic sources. A phase-space approach of the propagation, relying on the evolution of moments, is developed and applied to study the low-energy dynamics of Bose-Einstein condensates. The ABCD method of propagation for atomic waves is extended beyond the linear regime to account perturbatively for mean-field atomic interactions in the atom-optical aberration-less approximation. A treatment of the atom laser extraction enabling one to describe aberrations in the atomic beam, developed in collaboration with the Atom Optics group at the Institute of Optics, is exposed. Last, a quality factor suitable for the characterization of diluted matter waves in a general propagation regime has been proposed. (author)

  13. Initial Results of Optical Vortex Laser Absorption Spectroscopy in the HYPER-I Device

    Science.gov (United States)

    Yoshimura, Shinji; Asai, Shoma; Aramaki, Mitsutoshi; Terasaka, Kenichiro; Ozawa, Naoya; Tanaka, Masayoshi; Morisaki, Tomohiro

    2015-11-01

    Optical vortex beams have a potential to make a new Doppler measurement, because not only parallel but perpendicular movement of atoms against the beam axis causes the Doppler shift of their resonant absorption frequency. As the first step of a proof-of-principle experiment, we have performed the optical vortex laser absorption spectroscopy for metastable argon neutrals in an ECR plasma produced in the HYPER-I device at the National Institute for Fusion Science, Japan. An external cavity diode laser (TOPTICA, DL100) of which center wavelength was 696.735 nm in vacuum was used for the light source. The Hermite-Gaussian (HG) beam was converted into the Laguerre-Gaussian (LG) beam (optical vortex) by a computer-generated hologram displayed on the spatial light modulator (Hamamatsu, LCOS-SLM X10468-07). In order to make fast neutral flow across the LG beam, a high speed solenoid valve system was installed on the HYPER-I device. Initial results including the comparison of absorption spectra for HG and LG beams will be presented. This study was supported by NINS young scientists collaboration program for cross-disciplinary study, NIFS collaboration research program (NIFS13KOAP026), and JSPS KAKENHI grant number 15K05365.

  14. Small scale optics

    CERN Document Server

    Yupapin, Preecha

    2013-01-01

    The behavior of light in small scale optics or nano/micro optical devices has shown promising results, which can be used for basic and applied research, especially in nanoelectronics. Small Scale Optics presents the use of optical nonlinear behaviors for spins, antennae, and whispering gallery modes within micro/nano devices and circuits, which can be used in many applications. This book proposes a new design for a small scale optical device-a microring resonator device. Most chapters are based on the proposed device, which uses a configuration know as a PANDA ring resonator. Analytical and nu

  15. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  16. New security features and their impact on low-cost note readers

    Science.gov (United States)

    Bernardini, Ronald R.

    2004-06-01

    Banknote security features are evolving and changing. New features are constantly being developed and slowly being incorporated into banknotes. The assumption is that these features make the notes more secure for everyone; but do they? This paper looks at some of the features incorporated in today's banknotes and how (or if) they add security to banknotes processed by low cost banknote readers. The sensing technology used in low cost note readers has changed somewhat in the last few years but the industry is still faced by the cost constraints of a very competitive market. Some of the new note features require high-resolution image capture, complex optical measurements or expensive emission/detection devices. Paper watermarks, digital watermarks, OVI, Holograms, Stokes conversion, IR and magnetic features are examined, as well as the technologies used and the relative cost/benefit developed for these note features.

  17. 78 FR 77166 - Certain Optoelectronic Devices for Fiber Optic Communications, Components Thereof, and Products...

    Science.gov (United States)

    2013-12-20

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-860] Certain Optoelectronic Devices for Fiber Optic Communications, Components Thereof, and Products Containing the Same; Notice of Request for Statements on the Public Interest AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY...

  18. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  19. Three-dimensional crossbar interconnection using planar-integrated free-space optics and digital mirror-device

    Science.gov (United States)

    Lohmann, U.; Jahns, J.; Limmer, S.; Fey, D.

    2011-01-01

    We consider the implementation of a dynamic crossbar interconnect using planar-integrated free-space optics (PIFSO) and a digital mirror-device™ (DMD). Because of the 3D nature of free-space optics, this approach is able to solve geometrical problems with crossings of the signal paths that occur in waveguide optical and electrical interconnection, especially for large number of connections. The DMD device allows one to route the signals dynamically. Due to the large number of individual mirror elements in the DMD, different optical path configurations are possible, thus offering the chance for optimizing the network configuration. The optimization is achieved by using an evolutionary algorithm for finding best values for a skewless parallel interconnection. Here, we present results and experimental examples for the use of the PIFSO/DMD-setup.

  20. Securing health sensing using integrated circuit metric.

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  1. Fabrication and optical characterization of light trapping silicon nanopore and nanoscrew devices

    International Nuclear Information System (INIS)

    Jin, Hyunjong; Logan Liu, G

    2012-01-01

    We have fabricated nanotextured Si substrates that exhibit controllable optical reflection intensities and colors. Si nanopore has a photon trapping nanostructure but has abrupt changes in the index of refraction displaying a darkened specular reflection. Nanoscrew Si shows graded refractive-index photon trapping structures that enable diffuse reflection to be as low as 2.2% over the visible wavelengths. By tuning the 3D nanoscale silicon structure, the optical reflection peak wavelength and intensity are changed in the wavelength range of 300–800 nm, making the surface have different reflectivity and apparent colors. The relation between the surface optical properties with the spatial features of the photon trapping nanostructures is examined. Integration of photon trapping structures with planar Si structure on the same substrate is also demonstrated. The tunable photon trapping silicon structures have potential applications in enhancing the performance of semiconductor photoelectric devices. (paper)

  2. Roadmap on optical security

    NARCIS (Netherlands)

    javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millan, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; Peng, X.; Stern, A.; Rivenson, Y.; Alfalou, A.; Brosseau, C.; Guo, C.; Sheridan, J.T.; Situ, G.; Naruse, M.; Matsumoto, T.; Juvells, I.; Tajahuerce, E.; Lancis, J.; Chen, Wen; Chen, X.; Markman, A.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2016-01-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical

  3. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  4. Thermo-optical properties of 1H[3,4-b] quinoline films used in electroluminescent devices

    Science.gov (United States)

    Jaglarz, Janusz; Kępińska, Mirosława; Sanetra, Jerzy

    2014-06-01

    Electroluminescence cells with H[3,4-b] quinoline layers are promising devices for a blue light emitting EL diode. This work measured the optical reflectance as a function of temperature in copolymers PAQ layers deposited on Si crystalline substrate. Using the extended Cauchy dispersion model of the film refractive index we determined the thermo-optical coefficients for quinoline layers in the temperature range of 76-333 K from combined ellipsometric and spectrofotometric studies. The obtained values of thermo-optical coefficients of thin PAQ film, were negative and ranged in 5-10 × 10-4 [1/K].

  5. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase

    International Nuclear Information System (INIS)

    Chen, Wen; Chen, Xudong; Wang, Xiaogang

    2015-01-01

    We propose a method for security-enhanced phase encryption assisted by a nonlinear optical correlation via a sparse phase. Optical configurations are established based on a phase retrieval algorithm for embedding an input image and the secret data into phase-only masks. We found that when one or a few phase-only masks generated during data hiding are sparse, it is possible to integrate these sparse masks into those phase-only masks generated during the encoding of the input image. Synthesized phase-only masks are used for the recovery, and sparse distributions (i.e., binary maps) for generating the incomplete phase-only masks are considered as additional parameters for the recovery of secret data. It is difficult for unauthorized receivers to know that a useful phase has been sparsely distributed in the finally generated phase-only masks for secret-data recovery. Only when the secret data are correctly verified can the input image obtained with valid keys be claimed as targeted information. (paper)

  6. Security "high-tech" individual extra-light device mask 2.0: CAD/CAM evolution.

    Science.gov (United States)

    Ramieri, V; Vellone, V; Crimi, S; Cascone, P

    2017-06-01

    In 2008, we presented our security "high-tech" individual extra-light device mask (SHIELD), a protective shield based on the face cast of an injured soccer player that can be customised. It allows a shortened convalescent period, is comfortable, fits well, and allows the patient to continue to play at a professional level in their chosen sport or activity in the shortest time possible. It has been used often in both amateur and professional categories of many sports, and we now present an update. Copyright © 2017 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  7. Analysis and investigation of temperature and hydrostatic pressure effects on optical characteristics of multiple quantum well slow light devices.

    Science.gov (United States)

    Abdolhosseini, Saeed; Kohandani, Reza; Kaatuzian, Hassan

    2017-09-10

    This paper represents the influences of temperature and hydrostatic pressure variations on GaAs/AlGaAs multiple quantum well slow light systems based on coherence population oscillations. An analytical model in non-integer dimension space is used to study the considerable effects of these parameters on optical properties of the slow light apparatus. Exciton oscillator strength and fractional dimension constants have special roles on the analytical model in fractional dimension. Hence, the impacts of hydrostatic pressure and temperature on exciton oscillator strength and fractional dimension quantity are investigated theoretically in this paper. Based on the achieved results, temperature and hydrostatic pressure play key roles on optical parameters of the slow light systems, such as the slow down factor and central energy of the device. It is found that the slope and value of the refractive index real part change with alterations of temperature and hydrostatic pressure in the range of 5-40 deg of Kelvin and 1 bar to 2 kbar, respectively. Thus, the peak value of the slow down factor can be adjusted by altering these parameters. Moreover, the central energy of the device shifts when the hydrostatic pressure is applied to the slow light device or temperature is varied. In comparison with previous reported experimental results, our simulations follow them successfully. It is shown that the maximum value of the slow down factor is estimated close to 5.5×10 4 with a fine adjustment of temperature and hydrostatic pressure. Meanwhile, the central energy shift of the slow light device rises up to 27 meV, which provides an appropriate basis for different optical devices in which multiple quantum well slow light is one of their essential subsections. This multiple quantum well slow light device has potential applications for use as a tunable optical buffer and pressure/temperature sensors.

  8. Single integrated device for optical CDMA code processing in dual-code environment.

    Science.gov (United States)

    Huang, Yue-Kai; Glesk, Ivan; Greiner, Christoph M; Iazkov, Dmitri; Mossberg, Thomas W; Wang, Ting; Prucnal, Paul R

    2007-06-11

    We report on the design, fabrication and performance of a matching integrated optical CDMA encoder-decoder pair based on holographic Bragg reflector technology. Simultaneous encoding/decoding operation of two multiple wavelength-hopping time-spreading codes was successfully demonstrated and shown to support two error-free OCDMA links at OC-24. A double-pass scheme was employed in the devices to enable the use of longer code length.

  9. Optically-powered Voltage-supply-device for Effective Utilization of Optical Energy in the Fiber-To-The-Home Network

    Science.gov (United States)

    Fukano, Hideki; Shinagawa, Takeshi; Tsuruta, Kenji

    An optically powered device with using InGaAs-Photodiode has been developed. This study aims to harvest light energy (2.8∼500μW) from the FTTH (Fiber To The Home) network and to utilize it for operating remote sensors without external energy sources. First, we designed and evaluated the characteristics of the booster circuit and confirmed that it could boost an input voltage of 0.3 V to 3.0 V. Next, we also evaluated the characteristics of InGaAs photodiode and confirmed that it can output a voltage over 0.3 V at 10-μW input light. We demonstrate that a ready-made sensor can be operated with an input optical power as low as 10 μW.

  10. Security Implications for Ultra-Low Power Configurable SoC FPAA Embedded Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Hasler

    2018-06-01

    Full Text Available We discuss the impact of physical computing techniques to classifying network security issues for ultra-low power networked IoT devices. Physical computing approaches enable at least a factor of 1000 improvement in computational energy efficiency empowering a new generation of local computational structures for embedded IoT devices. These techniques offer computational capability to address network security concerns. This paper begins the discussion of security opportunities for, and issues using, FPAA devices for small embedded IoT platforms. These FPAAs enable devices often utilized for low-power context aware computation. Embedded FPAA devices have both positive Security attributes, as well as potential vulnerabilities. FPAA devices can be part of the resulting secure computation, such as implementing unique functions. FPAA devices can be used investigate security of analog/mixed signal capabilities. The paper concludes with summarizing key improvements for secure ultra-low power embedded FPAA devices.

  11. Method and device for secure, high-density tritium bonded with carbon

    Science.gov (United States)

    Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony; Norby, Brad Curtis

    2016-04-05

    A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof. The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.

  12. Optically sensitive devices based on Pt nano particles fabricated by atomic layer deposition and embedded in a dielectric stack

    Energy Technology Data Exchange (ETDEWEB)

    Mikhelashvili, V.; Padmanabhan, R.; Eisenstein, G. [Electrical Engineering Department, Technion, Haifa 3200 (Israel); Russell Berrie Nanotechnology Institute, Technion, Haifa 3200 (Israel); Meyler, B.; Yofis, S.; Weindling, S.; Salzman, J. [Electrical Engineering Department, Technion, Haifa 3200 (Israel); Atiya, G.; Cohen-Hyams, Z.; Kaplan, W. D. [Department of Material Science and Engineering, Technion, Haifa 3200 (Israel); Russell Berrie Nanotechnology Institute, Technion, Haifa 3200 (Israel); Ankonina, G. [Russell Berrie Nanotechnology Institute, Technion, Haifa 3200 (Israel); Photovoltaic Laboratory, Technion, Haifa 3200 (Israel)

    2015-10-07

    We report a series of metal insulator semiconductor devices with embedded Pt nano particles (NPs) fabricated using a low temperature atomic layer deposition process. Optically sensitive nonvolatile memory cells as well as optical sensors: (i) varactors, whose capacitance-voltage characteristics, nonlinearity, and peak capacitance are strongly dependent on illumination intensity; (ii) highly linear photo detectors whose responsivity is enhanced due to the Pt NPs. Both single devices and back to back pairs of diodes were used. The different configurations enable a variety of functionalities with many potential applications in biomedical sensing, environmental surveying, simple imagers for consumer electronics and military uses. The simplicity and planar configuration of the proposed devices makes them suitable for standard CMOS fabrication technology.

  13. Optically sensitive devices based on Pt nano particles fabricated by atomic layer deposition and embedded in a dielectric stack

    International Nuclear Information System (INIS)

    Mikhelashvili, V.; Padmanabhan, R.; Eisenstein, G.; Meyler, B.; Yofis, S.; Weindling, S.; Salzman, J.; Atiya, G.; Cohen-Hyams, Z.; Kaplan, W. D.; Ankonina, G.

    2015-01-01

    We report a series of metal insulator semiconductor devices with embedded Pt nano particles (NPs) fabricated using a low temperature atomic layer deposition process. Optically sensitive nonvolatile memory cells as well as optical sensors: (i) varactors, whose capacitance-voltage characteristics, nonlinearity, and peak capacitance are strongly dependent on illumination intensity; (ii) highly linear photo detectors whose responsivity is enhanced due to the Pt NPs. Both single devices and back to back pairs of diodes were used. The different configurations enable a variety of functionalities with many potential applications in biomedical sensing, environmental surveying, simple imagers for consumer electronics and military uses. The simplicity and planar configuration of the proposed devices makes them suitable for standard CMOS fabrication technology

  14. A data-management system using sensor technology and wireless devices for port security

    Science.gov (United States)

    Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya

    2014-05-01

    Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.

  15. Bacteriorhodopsin-based photochromic pigments for optical security applications

    Science.gov (United States)

    Hampp, Norbert A.; Fischer, Thorsten; Neebe, Martin

    2002-04-01

    Bacteriorhodopsin is a two-dimensional crystalline photochromic protein which is astonishingly stable towards chemical and thermal degradation. This is one of the reasons why this is one of the very few proteins which may be used as a biological pigment in printing inks. Variants of the naturally occurring bacteriorhodopsin have been developed which show a distinguished color change even with low light intensities and without the requirement of UV-light. Several pigments with different color changes are available right now. In addition to this visual detectable feature, the photochromism, the proteins amino acid sequence can be genetically altered in order to code and identify specific production lots. For advanced applications the data storage capability of bacteriorhodopsin will be useful. Write-once-read-many (WORM) recording of digital data is accomplished by laser excitation of printed bacteriorhodopsin inks. A density of 1 MBit per square inch is currently achieved. Several application examples for this biological molecule are described where low and high level features are used in combination. Bacteriorhodopsin-based inks are a new class of optical security pigments.

  16. Securing Health Sensing Using Integrated Circuit Metric

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  17. Securing Health Sensing Using Integrated Circuit Metric

    Directory of Open Access Journals (Sweden)

    Ruhma Tahir

    2015-10-01

    Full Text Available Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  18. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  19. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  20. Optical sensing system based on wireless paired emitter detector diode device and ionogels for lab-on-a-disc water quality analysis.

    Science.gov (United States)

    Czugala, Monika; Gorkin, Robert; Phelan, Thomas; Gaughran, Jennifer; Curto, Vincenzo Fabio; Ducrée, Jens; Diamond, Dermot; Benito-Lopez, Fernando

    2012-12-07

    This work describes the first use of a wireless paired emitter detector diode device (PEDD) as an optical sensor for water quality monitoring in a lab-on-a-disc device. The microfluidic platform, based on an ionogel sensing area combined with a low-cost optical sensor, is applied for quantitative pH and qualitative turbidity monitoring of water samples at point-of-need. The autonomous capabilities of the PEDD system, combined with the portability and wireless communication of the full device, provide the flexibility needed for on-site water testing. Water samples from local fresh and brackish sources were successfully analysed using the device, showing very good correlation with standard bench-top systems.

  1. Design of all-optical, hot-electron current-direction-switching device based on geometrical asymmetry.

    Science.gov (United States)

    Kumarasinghe, Chathurangi S; Premaratne, Malin; Gunapala, Sarath D; Agrawal, Govind P

    2016-02-18

    We propose a nano-scale current-direction-switching device(CDSD) that operates based on the novel phenomenon of geometrical asymmetry between two hot-electron generating plasmonic nanostructures. The proposed device is easy to fabricate and economical to develop compared to most other existing designs. It also has the ability to function without external wiring in nano or molecular circuitry since it is powered and controlled optically. We consider a such CDSD made of two dissimilar nanorods separated by a thin but finite potential barrier and theoretically derive the frequency-dependent electron/current flow rate. Our analysis takes in to account the quantum dynamics of electrons inside the nanorods under a periodic optical perturbation that are confined by nanorod boundaries, modelled as finite cylindrical potential wells. The influence of design parameters, such as geometric difference between the two nanorods, their volumes and the barrier width on quality parameters such as frequency-sensitivity of the current flow direction, magnitude of the current flow, positive to negative current ratio, and the energy conversion efficiency is discussed by considering a device made of Ag/TiO2/Ag. Theoretical insight and design guidelines presented here are useful for customizing our proposed CDSD for applications such as self-powered logic gates, power supplies, and sensors.

  2. Service-oriented Software Defined Optical Networks for Cloud Computing

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.

  3. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  4. Monolithically integrated quantum dot optical modulator with Semiconductor optical amplifier for short-range optical communications

    Science.gov (United States)

    Yamamoto, Naokatsu; Akahane, Kouichi; Umezawa, Toshimasa; Kawanishi, Tetsuya

    2015-04-01

    A monolithically integrated quantum dot (QD) optical gain modulator (OGM) with a QD semiconductor optical amplifier (SOA) was successfully developed. Broadband QD optical gain material was used to achieve Gbps-order high-speed optical data transmission, and an optical gain change as high as approximately 6-7 dB was obtained with a low OGM voltage of 2.0 V. Loss of optical power due to insertion of the device was also effectively compensated for by the SOA section. Furthermore, it was confirmed that the QD-OGM/SOA device helped achieve 6.0-Gbps error-free optical data transmission over a 2.0-km-long photonic crystal fiber. We also successfully demonstrated generation of Gbps-order, high-speed, and error-free optical signals in the >5.5-THz broadband optical frequency bandwidth larger than the C-band. These results suggest that the developed monolithically integrated QD-OGM/SOA device will be an advantageous and compact means of increasing the usable optical frequency channels for short-reach communications.

  5. Note: Automated optical focusing on encapsulated devices for scanning light stimulation systems

    International Nuclear Information System (INIS)

    Bitzer, L. A.; Benson, N.; Schmechel, R.

    2014-01-01

    Recently, a scanning light stimulation system with an automated, adaptive focus correction during the measurement was introduced. Here, its application on encapsulated devices is discussed. This includes the changes an encapsulating optical medium introduces to the focusing process as well as to the subsequent light stimulation measurement. Further, the focusing method is modified to compensate for the influence of refraction and to maintain a minimum beam diameter on the sample surface

  6. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  7. Monolithically integrated quantum dot optical modulator with semiconductor optical amplifier for thousand and original band optical communication

    Science.gov (United States)

    Yamamoto, Naokatsu; Akahane, Kouichi; Umezawa, Toshimasa; Matsumoto, Atsushi; Kawanishi, Tetsuya

    2016-04-01

    A monolithically integrated quantum dot (QD) optical gain modulator (OGM) with a QD semiconductor optical amplifier (SOA) was successfully developed with T-band (1.0 µm waveband) and O-band (1.3 µm waveband) QD optical gain materials for Gbps-order, high-speed optical data generation. The insertion loss due to coupling between the device and the optical fiber was effectively compensated for by the SOA section. It was also confirmed that the monolithic QD-OGM/SOA device enabled >4.8 Gbps optical data generation with a clear eye opening in the T-band. Furthermore, we successfully demonstrated error-free 4.8 Gbps optical data transmissions in each of the six wavelength channels over a 10-km-long photonic crystal fiber using the monolithic QD-OGM/SOA device in multiple O-band wavelength channels, which were generated by the single QD gain chip. These results suggest that the monolithic QD-OGM/SOA device will be advantageous in ultra-broadband optical frequency systems that utilize the T+O-band for short- and medium-range optical communications.

  8. Integrated Photonic Devices Incorporating Low-Loss Fluorinated Polymer Materials

    Directory of Open Access Journals (Sweden)

    Hyung-Jong Lee

    2011-06-01

    Full Text Available Low-loss polymer materials incorporating fluorinated compounds have been utilized for the investigation of various functional optical devices useful for optical communication and optical sensor systems. Since reliability issues concerning the polymer device have been resolved, polymeric waveguide devices have been gradually adopted for commercial application systems. The two most successfully commercialized polymeric integrated optic devices, variable optical attenuators and digital optical switches, are reviewed in this paper. Utilizing unique properties of optical polymers which are not available in other optical materials, novel polymeric optical devices are proposed including widely tunable external cavity lasers and integrated optical current sensors.

  9. Controlling lightwave in Riemann space by merging geometrical optics with transformation optics.

    Science.gov (United States)

    Liu, Yichao; Sun, Fei; He, Sailing

    2018-01-11

    In geometrical optical design, we only need to choose a suitable combination of lenses, prims, and mirrors to design an optical path. It is a simple and classic method for engineers. However, people cannot design fantastical optical devices such as invisibility cloaks, optical wormholes, etc. by geometrical optics. Transformation optics has paved the way for these complicated designs. However, controlling the propagation of light by transformation optics is not a direct design process like geometrical optics. In this study, a novel mixed method for optical design is proposed which has both the simplicity of classic geometrical optics and the flexibility of transformation optics. This mixed method overcomes the limitations of classic optical design; at the same time, it gives intuitive guidance for optical design by transformation optics. Three novel optical devices with fantastic functions have been designed using this mixed method, including asymmetrical transmissions, bidirectional focusing, and bidirectional cloaking. These optical devices cannot be implemented by classic optics alone and are also too complicated to be designed by pure transformation optics. Numerical simulations based on both the ray tracing method and full-wave simulation method are carried out to verify the performance of these three optical devices.

  10. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  11. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  12. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    Directory of Open Access Journals (Sweden)

    Stanislav A. Shikov

    2017-03-01

    Full Text Available Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT, and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things. The author considers security challenges for the “smart home” system. Next section reviews the experiments of the author involved in testing of the Internet of Things devices. Materials and Methods: The subjects of study are the Apple Pay, the ZigBee wireless standard, Tesla Model S electric cars. The main methods for identification of security threats are analysis and comparison. Results: The companies of electronic devices simplify and reduce the price of manufacturing process. The customers and users are rarely interested in levels of electronic devices security policies. This is the weakest link of electronic products in terms of security and safety. The tests demonstrated that modern electronic-based technologies do not reach the 100-percentage security level. Apple Pay mobile payment system demonstrated the highest security rating. Discussion and Conclusions: Modern electronic devices for Internet of Things does not meet all safety requirements, from the point of view of the author. The article recommends analyzing the potential threats and developing new security standards. In addition, the logistics of electronic devices for Internet of Things need to be under control from the manufacturer to equipment installation time.

  13. The CritiView: a new fiber optic based optical device for the assessment of tissue vitality

    Science.gov (United States)

    Mayevsky, Avraham; Blum, Yoram; Dekel, Nava; Deutsch, Assaf; Halfon, Rafael; Kremer, Shlomi; Pewzner, Eliyahu; Sherman, Efrat; Barnea, Ofer

    2006-02-01

    The most important parameter that reflects the balance between oxygen supply and demand in tissues is the mitochondrial NADH redox state that could be monitored In vivo. Nevertheless single parameter monitoring is limited in the interpretation capacity of the very complicated pathophysiological events, therefore three more parameters were added to the NADH and the multiparametric monitoring system was used in experimental and clinical studies. In our previous paper1 we described the CritiView (CRV1) including a fiber optic probe that monitor four physiological parameters in real time. In the new model (CRV3) several factors such as UV safety, size and price of the device were improved significantly. The CRV3 enable to monitor the various parameters in three different locations in the tissue thus increasing the reliability of the data due to the better statistics. The connection between the device and the monitored tissue could be done by various types of probes. The main probe that was tested also in clinical studies was a special 3 points probe that includes 9 optical fibers (3 in each point) that was embedded in a three way Foley catheter. This catheter enabled the monitoring of urethral wall vitality as an indicator of the development of body metabolic emergency state. The three point probe was tested in the brain exposed to the lack of oxygen (Anoxia, Hypoxia or Ischemia). A decrease in blood oxygenation and a large increase in mitochondrial NADH fluorescence were recorded. The microcirculatory blood flow increased during anoxia and hypoxia and decreased significantly under ischemia.

  14. Optical zoom lens module using MEMS deformable mirrors for portable device

    Science.gov (United States)

    Lu, Jia-Shiun; Su, Guo-Dung J.

    2012-10-01

    The thickness of the smart phones in today's market is usually below than 10 mm, and with the shrinking of the phone volume, the difficulty of its production of the camera lens has been increasing. Therefore, how to give the imaging device more functionality in the smaller space is one of the interesting research topics for today's mobile phone companies. In this paper, we proposed a thin optical zoom system which is combined of micro-electromechanical components and reflective optical architecture. By the adopting of the MEMS deformable mirrors, we can change their radius of curvature to reach the optical zoom in and zoom out. And because we used the all-reflective architecture, so this system has eliminated the considerable chromatic aberrations in the absence of lenses. In our system, the thickness of the zoom system is about 11 mm. The smallest EFL (effective focal length) is 4.61 mm at a diagonal field angle of 52° and f/# of 5.24. The longest EFL of the module is 9.22 mm at a diagonal field angle of 27.4 with f/# of 5.03.°

  15. An integrated semiconductor device enabling non-optical genome sequencing.

    Science.gov (United States)

    Rothberg, Jonathan M; Hinz, Wolfgang; Rearick, Todd M; Schultz, Jonathan; Mileski, William; Davey, Mel; Leamon, John H; Johnson, Kim; Milgrew, Mark J; Edwards, Matthew; Hoon, Jeremy; Simons, Jan F; Marran, David; Myers, Jason W; Davidson, John F; Branting, Annika; Nobile, John R; Puc, Bernard P; Light, David; Clark, Travis A; Huber, Martin; Branciforte, Jeffrey T; Stoner, Isaac B; Cawley, Simon E; Lyons, Michael; Fu, Yutao; Homer, Nils; Sedova, Marina; Miao, Xin; Reed, Brian; Sabina, Jeffrey; Feierstein, Erika; Schorn, Michelle; Alanjary, Mohammad; Dimalanta, Eileen; Dressman, Devin; Kasinskas, Rachel; Sokolsky, Tanya; Fidanza, Jacqueline A; Namsaraev, Eugeni; McKernan, Kevin J; Williams, Alan; Roth, G Thomas; Bustillo, James

    2011-07-20

    The seminal importance of DNA sequencing to the life sciences, biotechnology and medicine has driven the search for more scalable and lower-cost solutions. Here we describe a DNA sequencing technology in which scalable, low-cost semiconductor manufacturing techniques are used to make an integrated circuit able to directly perform non-optical DNA sequencing of genomes. Sequence data are obtained by directly sensing the ions produced by template-directed DNA polymerase synthesis using all-natural nucleotides on this massively parallel semiconductor-sensing device or ion chip. The ion chip contains ion-sensitive, field-effect transistor-based sensors in perfect register with 1.2 million wells, which provide confinement and allow parallel, simultaneous detection of independent sequencing reactions. Use of the most widely used technology for constructing integrated circuits, the complementary metal-oxide semiconductor (CMOS) process, allows for low-cost, large-scale production and scaling of the device to higher densities and larger array sizes. We show the performance of the system by sequencing three bacterial genomes, its robustness and scalability by producing ion chips with up to 10 times as many sensors and sequencing a human genome.

  16. Systems Security Engineering

    Science.gov (United States)

    2010-08-22

    environment that contains network- borne cybersecurity threats, an argument may be made that the firewall increases overall system functionality by reserving...the number of administered devices. This approach to security analysis is at once old and new. In the early days of eCommerce , security

  17. Security Awareness of the Digital Natives

    Directory of Open Access Journals (Sweden)

    Vasileios Gkioulos

    2017-04-01

    Full Text Available Young generations make extensive use of mobile devices, such as smartphones, tablets and laptops, while a plethora of security risks associated with such devices are induced by vulnerabilities related to user behavior. Furthermore, the number of security breaches on or via portable devices increases exponentially. Thus, deploying suitable risk treatments requires the investigation of how the digital natives (young people, born and bred in the digital era use their mobile devices and their level of security awareness, in order to identify common usage patterns with negative security impact. In this article, we present the results of a survey performed across a multinational sample of digital natives with distinct backgrounds and levels of competence in terms of security, to identify divergences in user behavior due to regional, educational and other factors. Our results highlight significant influences on the behavior of digital natives, arising from user confidence, educational background, and parameters related to usability and accessibility. The outcomes of this study justify the need for further analysis of the topic, in order to identify the influence of fine-grained semantics, but also the consolidation of wide and robust user-models.

  18. Future consumer mobile phone security : a case study using the data centric security model

    NARCIS (Netherlands)

    van Cleeff, A.

    2008-01-01

    In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested,

  19. Secure passive RFID tag with seal

    Science.gov (United States)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2017-11-14

    A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

  20. Manufacturing and testing flexible microfluidic devices with optical and electrical detection mechanisms

    OpenAIRE

    Ivan, M.G.; Vivet, F.; Meinders, E.R.

    2010-01-01

    Flexible microfluidic devices made of poly(dimethylsiloxane) (PDMS) were manufactured by soft lithography, and tested in detection of ionic species using optical absorption spectroscopy and electrical measurements. PDMS was chosen due to its flexibility and ease of surface modification by exposure to plasma and UV treatment, its transparency in UV-Vis regions of the light spectrum, and biocompatibility. The dual-detection mechanism allows the user more freedom in choosing the detection tool, ...

  1. The Electric and Optical Properties of Doped Small Molecular Organic Light-Emitting Devices

    International Nuclear Information System (INIS)

    Kwang-Ohk Cheon

    2003-01-01

    Organic light-emitting devices (OLEDs) constitute a new and exciting emissive display technology. In general, the basic OLED structure consists of a stack of fluorescent organic layers sandwiched between a transparent conducting-anode and metallic cathode. When an appropriate bias is applied to the device, holes are injected from the anode and electrons from the cathode; some of the recombination events between the holes and electrons result in electroluminescence (EL). Until now, most of the efforts in developing OLEDs have focused on display applications, hence on devices within the visible range. However some organic devices have been developed for ultraviolet or infrared emission. Various aspects of the device physics of doped small molecular OLEDs were described and discussed. The doping layer thickness and concentration were varied systematically to study their effects on device performances, energy transfer, and turn-off dynamics. Low-energy-gap DCM2 guest molecules, in either α-NPD or DPVBi host layers, are optically efficient fluorophores but also generate deep carrier trap-sites. Since their traps reduce the carrier mobility, the current density decreases with increased doping concentration. At the same time, due to efficient energy transfer, the quantum efficiency of the devices is improved by light doping or thin doping thickness, in comparison with the undoped neat devices. However, heavy doping induces concentration quenching effects. Thus, the doping concentration and doping thickness may be optimized for best performance

  2. The Electric and Optical Properties of Doped Small Molecular Organic Light-Emitting Devices

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Kwang-Ohk [Iowa State Univ., Ames, IA (United States)

    2003-01-01

    Organic light-emitting devices (OLEDs) constitute a new and exciting emissive display technology. In general, the basic OLED structure consists of a stack of fluorescent organic layers sandwiched between a transparent conducting-anode and metallic cathode. When an appropriate bias is applied to the device, holes are injected from the anode and electrons from the cathode; some of the recombination events between the holes and electrons result in electroluminescence (EL). Until now, most of the efforts in developing OLEDs have focused on display applications, hence on devices within the visible range. However some organic devices have been developed for ultraviolet or infrared emission. Various aspects of the device physics of doped small molecular OLEDs were described and discussed. The doping layer thickness and concentration were varied systematically to study their effects on device performances, energy transfer, and turn-off dynamics. Low-energy-gap DCM2 guest molecules, in either α-NPD or DPVBi host layers, are optically efficient fluorophores but also generate deep carrier trap-sites. Since their traps reduce the carrier mobility, the current density decreases with increased doping concentration. At the same time, due to efficient energy transfer, the quantum efficiency of the devices is improved by light doping or thin doping thickness, in comparison with the undoped neat devices. However, heavy doping induces concentration quenching effects. Thus, the doping concentration and doping thickness may be optimized for best performance.

  3. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  4. The HIPAA Security Rule: implications for biomedical devices.

    Science.gov (United States)

    2004-11-01

    The HIPAA Security Rule, with which hospitals must become compliant by April 2005, is broad in scope. Some aspect of this rule will affect virtually every function and department within a healthcare organization. The functions and departments that deal with biomedical technologies face special challenges due to the great diversity of technologies, the variety of data maintained and transmitted, and the risks associated with compromises to data security--combined with the presence of older technology and the absence of integrated expertise. It is essential that hospitals recognize this challenge and initiate steps now to implement appropriate information security management.

  5. Report on Security 82

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The 1982 trade fair Security 82 presented a variety of equipment and systems for protection and security in general. Apart from physical protection devices to prevent theft, a great number of fire protection devices, transmitting apparatus, locator systems, metal detectors, protective devices against signal interception, and complete alarm systems were exhibited and explained. By means of specifications and brief descriptions, sometimes with figures, predominantly passive and active infrared sensors, light and microwave sensors, ultrasound and microwave Doppler effect devices for indoor and outdoor physical protection, as well as other alarm systems and fire alarm systems or entry control systems are presented in this report. Design and functioning mode of the equipment presented are illustrated by explaining the fields of employment. (orig.) [de

  6. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    DEFF Research Database (Denmark)

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  7. Optical design of multi-multiple expander structure of laser gas analysis and measurement device

    Science.gov (United States)

    Fu, Xiang; Wei, Biao

    2018-03-01

    The installation and debugging of optical circuit structure in the application of carbon monoxide distributed laser gas analysis and measurement, there are difficult key technical problems. Based on the three-component expansion theory, multi-multiple expander structure with expansion ratio of 4, 5, 6 and 7 is adopted in the absorption chamber to enhance the adaptability of the installation environment of the gas analysis and measurement device. According to the basic theory of aberration, the optimal design of multi-multiple beam expander structure is carried out. By using image quality evaluation method, the difference of image quality under different magnifications is analyzed. The results show that the optical quality of the optical system with the expanded beam structure is the best when the expansion ratio is 5-7.

  8. Neuroradiology Using Secure Mobile Device Review.

    Science.gov (United States)

    Randhawa, Privia A; Morrish, William; Lysack, John T; Hu, William; Goyal, Mayank; Hill, Michael D

    2016-04-05

    Image review on computer-based workstations has made film-based review outdated. Despite advances in technology, the lack of portability of digital workstations creates an inherent disadvantage. As such, we sought to determine if the quality of image review on a handheld device is adequate for routine clinical use. Six CT/CTA cases and six MR/MRA cases were independently reviewed by three neuroradiologists in varying environments: high and low ambient light using a handheld device and on a traditional imaging workstation in ideal conditions. On first review (using a handheld device in high ambient light), a preliminary diagnosis for each case was made. Upon changes in review conditions, neuroradiologists were asked if any additional features were seen that changed their initial diagnoses. Reviewers were also asked to comment on overall clinical quality and if the handheld display was of acceptable quality for image review. After the initial CT review in high ambient light, additional findings were reported in 2 of 18 instances on subsequent reviews. Similarly, additional findings were identified in 4 of 18 instances after the initial MR review in high ambient lighting. Only one of these six additional findings contributed to the diagnosis made on the initial preliminary review. Use of a handheld device for image review is of adequate diagnostic quality based on image contrast, sharpness of structures, visible artefacts and overall display quality. Although reviewers were comfortable with using this technology, a handheld device with a larger screen may be diagnostically superior.

  9. Diffractive optical element for creating visual 3D images.

    Science.gov (United States)

    Goncharsky, Alexander; Goncharsky, Anton; Durlevich, Svyatoslav

    2016-05-02

    A method is proposed to compute and synthesize the microrelief of a diffractive optical element to produce a new visual security feature - the vertical 3D/3D switch effect. The security feature consists in the alternation of two 3D color images when the diffractive element is tilted up/down. Optical security elements that produce the new security feature are synthesized using electron-beam technology. Sample optical security elements are manufactured that produce 3D to 3D visual switch effect when illuminated by white light. Photos and video records of the vertical 3D/3D switch effect of real optical elements are presented. The optical elements developed can be replicated using standard equipment employed for manufacturing security holograms. The new optical security feature is easy to control visually, safely protected against counterfeit, and designed to protect banknotes, documents, ID cards, etc.

  10. Array-type miniature interferometer as the core optical microsystem of an optical coherence tomography device for tissue inspection

    Science.gov (United States)

    Passilly, Nicolas; Perrin, Stéphane; Lullin, Justine; Albero, Jorge; Bargiel, Sylwester; Froehly, Luc; Gorecki, Christophe; Krauter, Johann; Osten, Wolfgang; Wang, Wei-Shan; Wiemer, Maik

    2016-04-01

    Some of the critical limitations for widespread use in medical applications of optical devices, such as confocal or optical coherence tomography (OCT) systems, are related to their cost and large size. Indeed, although quite efficient systems are available on the market, e.g. in dermatology, they equip only a few hospitals and hence, are far from being used as an early detection tool, for instance in screening of patients for early detection of cancers. In this framework, the VIAMOS project aims at proposing a concept of miniaturized, batch-fabricated and lower-cost, OCT system dedicated to non-invasive skin inspection. In order to image a large skin area, the system is based on a full-field approach. Moreover, since it relies on micro-fabricated devices whose fields of view are limited, 16 small interferometers are arranged in a dense array to perform multi-channel simultaneous imaging. Gaps between each channel are then filled by scanning of the system followed by stitching. This approach allows imaging a large area without the need of large optics. It also avoids the use of very fast and often expensive laser sources, since instead of a single point detector, almost 250 thousands pixels are used simultaneously. The architecture is then based on an array of Mirau interferometers which are interesting for their vertical arrangement compatible with vertical assembly at the wafer-level. Each array is consequently a local part of a stack of seven wafers. This stack includes a glass lens doublet, an out-of-plane actuated micro-mirror for phase shifting, a spacer and a planar beam-splitter. Consequently, different materials, such as silicon and glass, are bonded together and well-aligned thanks to lithographic-based fabrication processes.

  11. Optical identification using imperfections in 2D materials

    Science.gov (United States)

    Cao, Yameng; Robson, Alexander J.; Alharbi, Abdullah; Roberts, Jonathan; Woodhead, Christopher S.; Noori, Yasir J.; Bernardo-Gavito, Ramón; Shahrjerdi, Davood; Roedig, Utz; Fal'ko, Vladimir I.; Young, Robert J.

    2017-12-01

    The ability to uniquely identify an object or device is important for authentication. Imperfections, locked into structures during fabrication, can be used to provide a fingerprint that is challenging to reproduce. In this paper, we propose a simple optical technique to read unique information from nanometer-scale defects in 2D materials. Imperfections created during crystal growth or fabrication lead to spatial variations in the bandgap of 2D materials that can be characterized through photoluminescence measurements. We show a simple setup involving an angle-adjustable transmission filter, simple optics and a CCD camera can capture spatially-dependent photoluminescence to produce complex maps of unique information from 2D monolayers. Atomic force microscopy is used to verify the origin of the optical signature measured, demonstrating that it results from nanometer-scale imperfections. This solution to optical identification with 2D materials could be employed as a robust security measure to prevent counterfeiting.

  12. NASA Electronic Parts and Packaging (NEPP): Space Qualification Guidelines of Optoelectronic and Photonic Devices for Optical Communication Systems

    Science.gov (United States)

    Kim, Quiesup

    2001-01-01

    Key elements of space qualification of opto-electric and photonic optical devices were overviewed. Efforts were concentrated on the reliability concerns of the devices needed for potential applications in space environments. The ultimate goal for this effort is to gradually establish enough data to develop a space qualification plan of newly developed specific photonic parts using empirical and numerical models to assess the life-time and degradation of the devices for potential long term space missions.

  13. Fabrication and characterization of on-chip optical nonlinear chalcogenide nanofiber devices.

    Science.gov (United States)

    Zhang, Qiming; Li, Ming; Hao, Qiang; Deng, Dinghuan; Zhou, Hui; Zeng, Heping; Zhan, Li; Wu, Xiang; Liu, Liying; Xu, Lei

    2010-11-15

    Chalcogenide (As(2)S(3)) nanofibers as narrow as 200 nm in diameter are drawn by the fiber pulling method, are successfully embedded in SU8 polymer, and form on-chip waveguides and high-Q microknot resonators (Q = 3.9 × 10(4)) with smooth cleaved end faces. Resonance tuning of resonators is realized by localized laser irradiation. Strong supercontinuum generation with a bandwidth of 500 nm is achieved in a 7-cm-long on-chip chalcogenide waveguide. Our result provides a method for the development of compact, high-optical-quality, and robust photonic devices.

  14. Transmutation of singularities and zeros in graded index optical instruments: a methodology for designing practical devices.

    Science.gov (United States)

    Hooper, I R; Philbin, T G

    2013-12-30

    We describe a design methodology for modifying the refractive index profile of graded-index optical instruments that incorporate singularities or zeros in their refractive index. The process maintains the device performance whilst resulting in graded profiles that are all-dielectric, do not require materials with unrealistic values, and that are impedance matched to the bounding medium. This is achieved by transmuting the singularities (or zeros) using the formalism of transformation optics, but with an additional boundary condition requiring the gradient of the co-ordinate transformation be continuous. This additional boundary condition ensures that the device is impedance matched to the bounding medium when the spatially varying permittivity and permeability profiles are scaled to realizable values. We demonstrate the method in some detail for an Eaton lens, before describing the profiles for an "invisible disc" and "multipole" lenses.

  15. Diffractive optical devices produced by light-assisted trapping of nanoparticles.

    Science.gov (United States)

    Muñoz-Martínez, J F; Jubera, M; Matarrubia, J; García-Cabañes, A; Agulló-López, F; Carrascosa, M

    2016-01-15

    One- and two-dimensional diffractive optical devices have been fabricated by light-assisted trapping and patterning of nanoparticles. The method is based on the dielectrophoretic forces appearing in the vicinity of a photovoltaic crystal, such as Fe:LiNbO3, during or after illumination. By illumination with the appropriate light distribution, the nanoparticles are organized along patterns designed at will. One- and two-dimensional diffractive components have been achieved on X- and Z-cut Fe:LiNbO3 crystals, with their polar axes parallel and perpendicular to the crystal surface, respectively. Diffraction gratings with periods down to around a few micrometers have been produced using metal (Al, Ag) nanoparticles with radii in the range of 70-100 nm. Moreover, several 2D devices, such as Fresnel zone plates, have been also produced showing the potential of the method. The diffractive particle patterns remain stable when light is removed. A method to transfer the diffractive patterns to other nonphotovoltaic substrates, such as silica glass, has been also reported.

  16. Tradeoff between energy and error in the discrimination of quantum-optical devices

    Energy Technology Data Exchange (ETDEWEB)

    Bisio, Alessandro; Dall' Arno, Michele; D' Ariano, Giacomo Mauro [Quit group, Dipartimento di Fisica ' ' A. Volta' ' , via Bassi 6, I-27100 Pavia (Italy) and Istituto Nazionale di Fisica Nucleare, Gruppo IV, via Bassi 6, I-27100 Pavia (Italy)

    2011-07-15

    We address the problem of energy-error tradeoff in the discrimination between two linear passive quantum optical devices with a single use. We provide an analytical derivation of the optimal strategy for beamsplitters and an iterative algorithm converging to the optimum in the general case. We then compare the optimal strategy with a simpler strategy using coherent input states and homodyne detection. It turns out that the former requires much less energy in order to achieve the same performances.

  17. Tradeoff between energy and error in the discrimination of quantum-optical devices

    International Nuclear Information System (INIS)

    Bisio, Alessandro; Dall'Arno, Michele; D'Ariano, Giacomo Mauro

    2011-01-01

    We address the problem of energy-error tradeoff in the discrimination between two linear passive quantum optical devices with a single use. We provide an analytical derivation of the optimal strategy for beamsplitters and an iterative algorithm converging to the optimum in the general case. We then compare the optimal strategy with a simpler strategy using coherent input states and homodyne detection. It turns out that the former requires much less energy in order to achieve the same performances.

  18. Direct metal transfer printing on flexible substrate for fabricating optics functional devices

    Science.gov (United States)

    Jiang, Yingjie; Zhou, Xiaohong; Zhang, Feng; Shi, Zhenwu; Chen, Linsen; Peng, Changsi

    2015-11-01

    New functional materials and devices based on metal patterns can be widely used in many new and expanding industries,such as flat panel displays, alternative energy,sensors and so on. In this paper, we introduce a new transfer printing method for fabricating metal optics functional devices. This method can directly transfer a metal pattern from a polyethylene terephthalate (PET)supported UV or polydimethylsiloxane (PDMS) pattern to another PET substrate. Purely taking advantage of the anaerobic UV curing adhesive (a-UV) on PET substrate, metal film can be easily peeled off from micro/nano-structured surface. As a result, metal film on the protrusion can be selectively transferred onto the target substrate, to make it the metal functional surface. But which on the bottom can not be transferred. This method provides low cost fabrication of metal thin film devices by avoiding high cost lithography process. Compared with conventional approach, this method can get more smooth rough edges and has wider tolerance range for the original master mold. Future developments and potential applications of this metal transfer method will be addressed.

  19. Improved verification methods for OVI security ink

    Science.gov (United States)

    Coombs, Paul G.; Markantes, Tom

    2000-04-01

    Together, OVP Security Pigment in OVI Security Ink, provide an excellent method of overt banknote protection. The effective use of overt security feature requires an educated public. The rapid rise in computer-generated counterfeits indicates that consumers are not as educate das to banknote security features as they should be. To counter the education issue, new methodologies have been developed to improve the validation of banknotes using the OVI ink feature itself. One of the new methods takes advantage of the overt nature of the product's optically variable effect. Another method utilizes the unique optical interference characteristics provided by the OVP platelets.

  20. Device interoperability and authentication for telemedical appliance based on the ISO/IEEE 11073 Personal Health Device (PHD) Standards.

    Science.gov (United States)

    Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G

    2012-01-01

    In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.

  1. Label swapper device for spectral amplitude coded optical packet networks monolithically integrated on InP.

    Science.gov (United States)

    Muñoz, P; García-Olcina, R; Habib, C; Chen, L R; Leijtens, X J M; de Vries, T; Robbins, D; Capmany, J

    2011-07-04

    In this paper the design, fabrication and experimental characterization of an spectral amplitude coded (SAC) optical label swapper monolithically integrated on Indium Phosphide (InP) is presented. The device has a footprint of 4.8x1.5 mm2 and is able to perform label swapping operations required in SAC at a speed of 155 Mbps. The device was manufactured in InP using a multiple purpose generic integration scheme. Compared to previous SAC label swapper demonstrations, using discrete component assembly, this label swapper chip operates two order of magnitudes faster.

  2. Signal Normalization Reduces Image Appearance Disparity Among Multiple Optical Coherence Tomography Devices.

    Science.gov (United States)

    Chen, Chieh-Li; Ishikawa, Hiroshi; Wollstein, Gadi; Bilonick, Richard A; Kagemann, Larry; Schuman, Joel S

    2017-02-01

    To assess the effect of the previously reported optical coherence tomography (OCT) signal normalization method on reducing the discrepancies in image appearance among spectral-domain OCT (SD-OCT) devices. Healthy eyes and eyes with various retinal pathologies were scanned at the macular region using similar volumetric scan patterns with at least two out of three SD-OCT devices at the same visit (Cirrus HD-OCT, Zeiss, Dublin, CA; RTVue, Optovue, Fremont, CA; and Spectralis, Heidelberg Engineering, Heidelberg, Germany). All the images were processed with the signal normalization. A set of images formed a questionnaire with 24 pairs of cross-sectional images from each eye with any combination of the three SD-OCT devices either both pre- or postsignal normalization. Observers were asked to evaluate the similarity of the two displayed images based on the image appearance. The effects on reducing the differences in image appearance before and after processing were analyzed. Twenty-nine researchers familiar with OCT images participated in the survey. Image similarity was significantly improved after signal normalization for all three combinations ( P ≤ 0.009) as Cirrus and RTVue combination became the most similar pair, followed by Cirrus and Spectralis, and RTVue and Spectralis. The signal normalization successfully minimized the disparities in the image appearance among multiple SD-OCT devices, allowing clinical interpretation and comparison of OCT images regardless of the device differences. The signal normalization would enable direct OCT images comparisons without concerning about device differences and broaden OCT usage by enabling long-term follow-ups and data sharing.

  3. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  4. Secure fingerprint identification based on structural and microangiographic optical coherence tomography.

    Science.gov (United States)

    Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun

    2017-03-10

    Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.

  5. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  6. The Security Plan for the Joint Euratom/IAEA Remote Monitoring Network

    International Nuclear Information System (INIS)

    Stronkhorst, J.; Schoop, K.; Ruuska, K.; Kurek, S.; Levert, J.F.

    2015-01-01

    The European Commission and the IAEA have installed surveillance systems in all larger civil European nuclear facilities. The monitoring data is gathered by optical surveillance systems, electronic sealing systems and numerous measuring devices. The on-site joint Euratom/IAEA monitoring networks operate in general completely isolated from the operator's IT systems. To largely improve data security and reliability, remote data transmission (RDT) is installed on a growing number of sites, and the inspection data is daily transferred to the Data Collect Servers in Luxembourg and Vienna. A growing number of RDT connections and a growing number of security threats require an IT security policy that is pro-active as well as reactive in an efficient way. The risk based approach used in setting up the security plans assesses all elements of the monitoring network, from the implemented technical solution and the assessment of the security needs and threats, up to the incident handling and lessons learned. The results of the assessments are, for each individual RDT connection, described in the technical paragraphs and annexes, including system descriptions, network plans and contact information. The principles of secure data handling as implemented in the shared Euratom /IAEA monitoring network can apply to a broad range of industrial monitoring systems, where human interaction is in general the largest security risk. (author)

  7. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  8. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  9. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  10. Label swapper device for spectral amplitude coded optical packet networks monolithically integrated on InP

    NARCIS (Netherlands)

    Muñoz, P.; García-Olcina, R.; Habib, C.; Chen, L.R.; Leijtens, X.J.M.; Vries, de T.; Robbins, D.J.; Capmany, J.

    2011-01-01

    In this paper the design, fabrication and experimental characterization of an spectral amplitude coded (SAC) optical label swapper monolithically integrated on Indium Phosphide (InP) is presented. The device has a footprint of 4.8x1.5 mm2 and is able to perform label swapping operations required in

  11. High optical and switching performance electrochromic devices based on a zinc oxide nanowire with poly(methyl methacrylate) gel electrolytes

    Energy Technology Data Exchange (ETDEWEB)

    Chun, Young Tea; Chu, Daping, E-mail: dpc31@cam.ac.uk [Electrical Engineering Division, Department of Engineering, University of Cambridge, 9 JJ Thomson Avenue, Cambridge CB3 0FA (United Kingdom); Neeves, Matthew; Placido, Frank [Thin Film Centre, University of the West of Scotland, Paisley PA1 2BE (United Kingdom); Smithwick, Quinn [Disney Research, 521 Circle Seven Drive, Glendale, Los Angeles, California 91201 (United States)

    2014-11-10

    High performance electrochromic devices have been fabricated and demonstrated utilizing a solid polymer electrolyte and zinc oxide (ZnO) nanowire (NW) array counter electrode. The poly(methyl methacrylate) based polymer electrolyte was spin coated upon hydrothermally grown ZnO NW array counter electrodes, while electron beam evaporated NiO{sub x} thin films formed the working electrodes. Excellent optical contrast and switching speeds were observed in the fabricated devices with active areas of 2 cm{sup 2}, exhibiting an optical contrast of 73.11% at the wavelength of 470 nm, combined with a fast switching time of 0.2 s and 0.4 s for bleaching and coloration, respectively.

  12. High optical and switching performance electrochromic devices based on a zinc oxide nanowire with poly(methyl methacrylate) gel electrolytes

    International Nuclear Information System (INIS)

    Chun, Young Tea; Chu, Daping; Neeves, Matthew; Placido, Frank; Smithwick, Quinn

    2014-01-01

    High performance electrochromic devices have been fabricated and demonstrated utilizing a solid polymer electrolyte and zinc oxide (ZnO) nanowire (NW) array counter electrode. The poly(methyl methacrylate) based polymer electrolyte was spin coated upon hydrothermally grown ZnO NW array counter electrodes, while electron beam evaporated NiO x thin films formed the working electrodes. Excellent optical contrast and switching speeds were observed in the fabricated devices with active areas of 2 cm 2 , exhibiting an optical contrast of 73.11% at the wavelength of 470 nm, combined with a fast switching time of 0.2 s and 0.4 s for bleaching and coloration, respectively

  13. Parallel Device-Independent Quantum Key Distribution

    OpenAIRE

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  14. Cyber Security : Home User's Perspective

    OpenAIRE

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  15. Usable Authentication with an Offline Trusted Device Proxy Architecture (long version)

    OpenAIRE

    Johansen, Christian; Jøsang, Audun; Migdal, Denis

    2016-01-01

    Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the security. This paper describes a new architecture where a security proxy on the client platform communicates with both a trusted security device and the server application. The proxy switches between two TLS channels, one from the client and another from the trusted device. The...

  16. A simple security architecture for smart water management system

    CSIR Research Space (South Africa)

    Ntuli, N

    2016-05-01

    Full Text Available . Secure booting prevents installation of malicious code onto the device. By making sure that the booting process is secured, we can establish securely the root of trust for the device. Public key cryptography is utilized at this stage. During... Architecture 1168 Nonhlanhla Ntuli and Adnan Abu-Mahfouz / Procedia Computer Science 83 ( 2016 ) 1164 – 1169 3.2. Secure Communication While public key cryptography can be used in the first step (secure booting), it would be too heavy to use during...

  17. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  18. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  19. Optical device terahertz integration in a two-dimensional-three-dimensional heterostructure.

    Science.gov (United States)

    Feng, Zhifang; Lin, Jie; Feng, Shuai

    2018-01-10

    The transmission properties of an off-planar integrated circuit including two wavelength division demultiplexers are designed, simulated, and analyzed in detail by the finite-difference time-domain method. The results show that the wavelength selection for different ports (0.404[c/a] at B 2 port, 0.389[c/a] at B 3 port, and 0.394[c/a] at B 4 port) can be realized by adjusting the parameters. It is especially important that the off-planar integration between two complex devices is also realized. These simulated results give valuable promotions in the all-optical integrated circuit, especially in compact integration.

  20. Optical fiber stripper positioning apparatus

    Science.gov (United States)

    Fyfe, Richard W.; Sanchez, Jr., Amadeo

    1990-01-01

    An optical fiber positioning apparatus for an optical fiber stripping device is disclosed which is capable of providing precise axial alignment between an optical fiber to be stripped of its outer jacket and the cutting blades of a stripping device. The apparatus includes a first bore having a width approximately equal to the diameter of an unstripped optical fiber and a counter bore axially aligned with the first bore and dimensioned to precisely receive a portion of the stripping device in axial alignment with notched cutting blades within the stripping device to thereby axially align the notched cutting blades of the stripping device with the axis of the optical fiber to permit the notched cutting blades to sever the jacket on the optical fiber without damaging the cladding on the optical fiber. In a preferred embodiment, the apparatus further includes a fiber stop which permits determination of the length of jacket to be removed from the optical fiber.

  1. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  2. Radiation ray measuring device

    International Nuclear Information System (INIS)

    Maekawa, Tatsuyuki; Ida, Masaki.

    1997-01-01

    The present invention provides a chained-radiation ray monitoring system which can be applied to an actual monitoring system of a nuclear power plant or the like. Namely, this device comprises a plurality of scintillation detectors. Each of the detectors has two light take-out ports for emitting light corresponding to radiation rays irradiated from the object of the measurement to optical fibers. In addition, incident light from the optical fiber by way of one of the light take-out optical ports is transmitted to the other of the ports and sent from the other optical port to the fibers. Plurality sets of measuring systems are provided in which each of the detectors are disposed corresponding to a plurality of objects to be measured. A signal processing device is (1) connected with optical fibers of plurality sets of measuring systems in conjunction, (2) detects the optical pulses inputted from the optical fibers to identify the detector from which the optical pulses are sent and (3) measures the amount of radiation rays detected by the identified detector. As a result, the device of the present invention can form a measuring system with redundancy. (I.S.)

  3. Planar junctionless phototransistor: A potential high-performance and low-cost device for optical-communications

    Science.gov (United States)

    Ferhati, H.; Djeffal, F.

    2017-12-01

    In this paper, a new junctionless optical controlled field effect transistor (JL-OCFET) and its comprehensive theoretical model is proposed to achieve high optical performance and low cost fabrication process. Exhaustive study of the device characteristics and comparison between the proposed junctionless design and the conventional inversion mode structure (IM-OCFET) for similar dimensions are performed. Our investigation reveals that the proposed design exhibits an outstanding capability to be an alternative to the IM-OCFET due to the high performance and the weak signal detection benefit offered by this design. Moreover, the developed analytical expressions are exploited to formulate the objective functions to optimize the device performance using Genetic Algorithms (GAs) approach. The optimized JL-OCFET not only demonstrates good performance in terms of derived drain current and responsivity, but also exhibits superior signal to noise ratio, low power consumption, high-sensitivity, high ION/IOFF ratio and high-detectivity as compared to the conventional IM-OCFET counterpart. These characteristics make the optimized JL-OCFET potentially suitable for developing low cost and ultrasensitive photodetectors for high-performance and low cost inter-chips data communication applications.

  4. Large aperture optical switching devices

    International Nuclear Information System (INIS)

    Goldhar, J.; Henesian, M.A.

    1983-01-01

    We have developed a new approach to constructing large aperture optical switches for next generation inertial confinement fusion lasers. A transparent plasma electrode formed in low pressure ionized gas acts as a conductive coating to allow the uniform charging of the optical faces of an electro-optic material. In this manner large electric fields can be applied longitudinally to large aperture, high aspect ratio Pockels cells. We propose a four-electrode geometry to create the necessary high conductivity plasma sheets, and have demonstrated fast (less than 10 nsec) switching in a 5x5 cm aperture KD*P Pockels cell with such a design. Detaid modelling of Pockels cell performance with plasma electrodes has been carried out for 15 and 30 cm aperture designs

  5. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    Science.gov (United States)

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  6. Campus Area Network Wi-Fi Security

    Directory of Open Access Journals (Sweden)

    Arjun K. Pillay

    2017-07-01

    Full Text Available Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

  7. Quantum reading of unitary optical devices

    International Nuclear Information System (INIS)

    Dall'Arno, Michele; Bisio, Alessandro; D'Ariano, Giacomo Mauro

    2014-01-01

    We address the problem of quantum reading of optical memories, namely the retrieving of classical information stored in the optical properties of a media with minimum energy. We present optimal strategies for ambiguous and unambiguous quantum reading of unitary optical memories, namely when one's task is to minimize the probability of errors in the retrieved information and when perfect retrieving of information is achieved probabilistically, respectively. A comparison of the optimal strategy with coherent probes and homodyne detection shows that the former saves orders of magnitude of energy when achieving the same performances. Experimental proposals for quantum reading which are feasible with present quantum optical technology are reported

  8. Interference lithography for optical devices and coatings

    Science.gov (United States)

    Juhl, Abigail Therese

    Interference lithography can create large-area, defect-free nanostructures with unique optical properties. In this thesis, interference lithography will be utilized to create photonic crystals for functional devices or coatings. For instance, typical lithographic processing techniques were used to create 1, 2 and 3 dimensional photonic crystals in SU8 photoresist. These structures were in-filled with birefringent liquid crystal to make active devices, and the orientation of the liquid crystal directors within the SU8 matrix was studied. Most of this thesis will be focused on utilizing polymerization induced phase separation as a single-step method for fabrication by interference lithography. For example, layered polymer/nanoparticle composites have been created through the one-step two-beam interference lithographic exposure of a dispersion of 25 and 50 nm silica particles within a photopolymerizable mixture at a wavelength of 532 nm. In the areas of constructive interference, the monomer begins to polymerize via a free-radical process and concurrently the nanoparticles move into the regions of destructive interference. The holographic exposure of the particles within the monomer resin offers a single-step method to anisotropically structure the nanoconstituents within a composite. A one-step holographic exposure was also used to fabricate self-healing coatings that use water from the environment to catalyze polymerization. Polymerization induced phase separation was used to sequester an isocyanate monomer within an acrylate matrix. Due to the periodic modulation of the index of refraction between the monomer and polymer, the coating can reflect a desired wavelength, allowing for tunable coloration. When the coating is scratched, polymerization of the liquid isocyanate is catalyzed by moisture in air; if the indices of the two polymers are matched, the coatings turn transparent after healing. Interference lithography offers a method of creating multifunctional self

  9. Radiation effects in optoelectronic devices

    International Nuclear Information System (INIS)

    Barnes, C.E.

    1977-03-01

    A summary is given of studies on radiation effects in light-emitting diodes, laser diodes, detectors, optical isolators and optical fibers. It is shown that the study of radiation damage in these devices can provide valuable information concerning the nature of the devices themselves, as well as methods of hardening these devices for applications in radiation environments

  10. A novel automotive headlight system based on digital micro-mirror devices and diffractive optical elements

    Science.gov (United States)

    Su, Ping; Song, Yuming; Ma, Jianshe

    2018-01-01

    The DMD (Digital Micro-mirror Device) has the advantages of high refresh rate and high diffraction efficiency, and these make it become an ideal loader of multiple modes illumination. DOEs (Diffractive Optical Element) have the advantages of high degree of freedom, light weight, easy to copy, low cost etc., and can be used to reduce the weight, complexity, cost of optical system. A novel automotive headlamp system using DMD as the light distribution element and a DOE as the light field modulation device is proposed in this paper. The pure phase DOE is obtained by the GS algorithm using Rayleigh-Sommerfeld diffraction integral model. Based on the standard automotive headlamp light intensity distribution in the target plane, the amplitude distribution of DMD is obtained by numerical simulation, and the grayscale diagram loaded on the DMD can be obtained accordingly. Finally, according to simulation result, the light intensity distribution in the target plane is proportional to the national standard, hence verifies the validity of the novel system. The novel illumination system proposed in this paper provides a reliable hardware platform for the intelligent headlamps.

  11. Complete achromatic and robustness electro-optic switch between two integrated optical waveguides

    Science.gov (United States)

    Huang, Wei; Kyoseva, Elica

    2018-01-01

    In this paper, we present a novel design of electro-optic modulator and optical switching device, based on current integrated optics technique. The advantages of our optical switching device are broadband of input light wavelength, robustness against varying device length and operation voltages, with reference to previous design. Conforming to our results of previous paper [Huang et al, phys. lett. a, 90, 053837], the coupling of the waveguides has a hyperbolic-secant shape. while detuning has a sign flip at maximum coupling, we called it as with a sign flip of phase mismatch model. The a sign flip of phase mismatch model can produce complete robust population transfer. In this paper, we enhance this device to switch light intensity controllable, by tuning external electric field based on electro-optic effect.

  12. Design of free space optical omnidirectional transceivers for indoor applications using non-imaging optical devices

    Science.gov (United States)

    Agrawal, Navik; Davis, Christopher C.

    2008-08-01

    Omnidirectional free space optical communication receivers can employ multiple non-imaging collectors, such as compound parabolic concentrators (CPCs), in an array-like fashion to increase the amount of possible light collection. CPCs can effectively channel light collected over a large aperture to a small area photodiode. The aperture to length ratio of such devices can increase the overall size of the transceiver unit, which may limit the practicality of such systems, especially when small size is desired. New non-imaging collector designs with smaller sizes, larger field of view (FOV), and comparable transmission curves to CPCs, offer alternative transceiver designs. This paper examines how transceiver performance is affected by the use of different non-imaging collector shapes that are designed for wide FOV with reduced efficiency compared with shapes such as the CPC that are designed for small FOV with optimal efficiency. Theoretical results provide evidence indicating that array-like transceiver designs using various non-imaging collector shapes with less efficient transmission curves, but a larger FOV will be an effective means for the design of omnidirectional optical transceiver units. The results also incorporate the effects of Fresnel loss at the collector exit aperture-photodiode interface, which is an important consideration for indoor omnidirectional FSO systems.

  13. Fluidic optics

    Science.gov (United States)

    Whitesides, George M.; Tang, Sindy K. Y.

    2006-09-01

    Fluidic optics is a new class of optical system with real-time tunability and reconfigurability enabled by the introduction of fluidic components into the optical path. We describe the design, fabrication, operation of a number of fluidic optical systems, and focus on three devices, liquid-core/liquid-cladding (L2) waveguides, microfluidic dye lasers, and diffraction gratings based on flowing, crystalline lattices of bubbles, to demonstrate the integration of microfluidics and optics. We fabricate these devices in poly(dimethylsiloxane) (PDMS) with soft-lithographic techniques. They are simple to construct, and readily integrable with microanalytical or lab-on-a-chip systems.

  14. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  15. Regulatory considerations in the licensing of a mobile backscatter X-ray device used in security screening

    International Nuclear Information System (INIS)

    Scott, Jim; Railey, Leon

    2008-01-01

    This paper describes the regulatory and radiation protection issues taken into consideration in the licensing of a mobile security screening device which employs backscatter X-ray technology. The views expressed are those of the authors and are not the formal view of ARPANSA. The US standard ANSI N43.17 proposes doses limits for X-ray personnel security screening systems, viz. 0.1 μSv effective dose per scan; 250 μSv effective dose per year. The Z backscatter van TM satisfies the first criterion, as demonstrated by the independent measurements. Finally, if we assume an average effective dose of 0.1 μSv per scan, an individual would require to be scanned approximately 7 times per day, every day for a year in order to exceed the second dose limit of 250 μSv per year. This is considered extremely unlikely, and hence the van also meets the requirements of ANSI N43.17.

  16. Optical XOR gate

    Science.gov (United States)

    Vawter, G. Allen

    2013-11-12

    An optical XOR gate is formed as a photonic integrated circuit (PIC) from two sets of optical waveguide devices on a substrate, with each set of the optical waveguide devices including an electroabsorption modulator electrically connected in series with a waveguide photodetector. The optical XOR gate utilizes two digital optical inputs to generate an XOR function digital optical output. The optical XOR gate can be formed from III-V compound semiconductor layers which are epitaxially deposited on a III-V compound semiconductor substrate, and operates at a wavelength in the range of 0.8-2.0 .mu.m.

  17. HARD - The High Assurance Remote Authentication Device Project

    OpenAIRE

    2006-01-01

    The HARD project will build and evaluate a high assurance network access device. The purpose of this device is to provide an unforgeable trusted path with which network clients can securely interact with security-enabled remote servers.

  18. The optimal input optical pulse shape for the self-phase modulation based chirp generator

    Science.gov (United States)

    Zachinyaev, Yuriy; Rumyantsev, Konstantin

    2018-04-01

    The work is aimed to obtain the optimal shape of the input optical pulse for the proper functioning of the self-phase modulation based chirp generator allowing to achieve high values of chirp frequency deviation. During the research, the structure of the device based on self-phase modulation effect using has been analyzed. The influence of the input optical pulse shape of the transmitting optical module on the chirp frequency deviation has been studied. The relationship between the frequency deviation of the generated chirp and frequency linearity for the three options for implementation of the pulse shape has been also estimated. The results of research are related to the development of the theory of radio processors based on fiber-optic structures and can be used in radars, secure communications, geolocation and tomography.

  19. Optical engineering of diamond

    CERN Document Server

    Rabeau, James R

    2013-01-01

    This is the first comprehensive book on the engineering of diamond optical devices. It will give readers an up-to-date account of the properties of optical quality synthetic diamond (single crystal, nanodiamond and polycrystalline) and reviews the large and growing field of engineering of diamond-based optical devices, with applications in quantum computation, nano-imaging, high performance lasers, and biomedicine. It aims to provide scientists, engineers and physicists with a valuable resource and reference book for the design and performance of diamond-based optical devices.

  20. Optical smart card using semipassive communication.

    Science.gov (United States)

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  1. Latching device for securing a closure to a cask for transporting radioactive waste

    International Nuclear Information System (INIS)

    Obermeyer, F.D.; Cruz, R.R.; Bieberbach, G.

    1991-01-01

    This patent describes a latching device for removably securing and sealingly engaging a closure around an opening in a cask defined by an edge of the cask. It comprises: at least three shear key assemblies uniformly spaced around the outer portion of the closure, each of which includes a shear key means having a bolt portion movably mounted in the closure, and a latch portion that is insertable into and retractable out of a slot means in the cask edge in response to the application of a closing and an opening force applied to the bolt portion, at least one drive mechanism located within a cavity in the closure and connected to the bolt portion of the shear key assemblies for applying the closing and opening forces to the bolt portions

  2. Optically Tunable Magnetoresistance Effect: From Mechanism to Novel Device Application.

    Science.gov (United States)

    Liu, Pan; Lin, Xiaoyang; Xu, Yong; Zhang, Boyu; Si, Zhizhong; Cao, Kaihua; Wei, Jiaqi; Zhao, Weisheng

    2017-12-28

    The magnetoresistance effect in sandwiched structure describes the appreciable magnetoresistance effect of a device with a stacking of two ferromagnetic layers separated by a non-magnetic layer (i.e., a sandwiched structure). The development of this effect has led to the revolution of memory applications during the past decades. In this review, we revisited the magnetoresistance effect and the interlayer exchange coupling (IEC) effect in magnetic sandwiched structures with a spacer layer of non-magnetic metal, semiconductor or organic thin film. We then discussed the optical modulation of this effect via different methods. Finally, we discuss various applications of these effects and present a perspective to realize ultralow-power, high-speed data writing and inter-chip connection based on this tunable magnetoresistance effect.

  3. A rhythm-based authentication scheme for smart media devices.

    Science.gov (United States)

    Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

  4. Quantum wells for optical information processing

    International Nuclear Information System (INIS)

    Miller, D.A.B.

    1989-01-01

    Quantum wells, alternate thin layers of two different semiconductor materials, show an exceptional electric field dependence of the optical absorption, called the quantum-confined Stark effect (QCSE), for electric fields perpendicular to the layers. This enables electrically controlled optical modulators and optically controlled self-electro-optic-effect devices that can operate at high speed and low energy density. Recent developments in these QCSE devices are summarized, including new device materials and novel device structures. The variety of sophisticated devices now demonstrated is promising for applications to information processing

  5. Meso-optical Fourier transform microscope - a new device for high energy physics

    International Nuclear Information System (INIS)

    Astakhov, A.Ya.; Batusov, Yu.A.; Bencze, G.L.; Farago, I.; Kisvaradi, A.; Molnar, L.; Soroko, L.M.; Vegh, J.

    1989-01-01

    A new device for high energy physics, the Meso-optical Fourier Transform Microscope (MFTM), designed for observation fo straight line particle tracks in nuclear research emulsion is described. The MFTM works without any mechanical or electronical depth scanning and can be considered as a selectivity viewing 'eye'. The computer controlled system containing MFTM as its main unit is given. This system can be used for a fast search for particle tracks and events produced by high energy neutrinos from particle accelerators. The results of the first experimental test of the computer controlled MFTM are presented. The performance of this system is described and discussed. It is shown that the angular resolution of the MFTM is 1 angular minute and the measurement time is equal to 30 ms per image. As all operations in the MFTM proceed without any depth scanning, this new evaluation system works at least two orders of magnitude faster than any known system with a traditional optical microscope. (orig.)

  6. Emerging trends in ICT security

    CERN Document Server

    Akhgar, Babak

    2013-01-01

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach

  7. SBIR Grant:No-Vibration Agile Cryogenic Optical Refrigerator

    Energy Technology Data Exchange (ETDEWEB)

    Epstein, Richard

    2013-04-09

    Optical refrigeration is currently the only all-solid-state cryocooling technology that has been demonstrated. Optical cryocoolers are devices that use laser light to cool small crystal or glass cooling elements. The cooling element absorbs the laser light and reradiates it at higher energy, an example of anti-Stokes fluorescence. The dif-ference between the energy of the outgoing and incoming light comes from the thermal energy of the cooling element, which in turn becomes colder. Entitled No-Vibration Agile Cryocoolers using Optical Refrigeration, this Phase I proposal directly addressed the continued development of the optical refrigerator components necessary to transition this scientific breakthrough into National Nu-clear Security Administration (NNSA) sensor applications in line with the objectives of topic 50b. ThermoDynamic Films LLC (TDF), in collaboration with the University of New Mexico (UNM), cooled an optical-refrigerator cooling element comprised of an ytterbium-doped yttrium lithium fluoride (Yb:YLF) crystal from room tempera-ture to 123 K with about 2% efficiency. This is the world record in optical refrigera-tion and an important step toward revolutionizing cryogenic systems for sensor ap-plications. During this period, they also designed and analyzed the crucial elements of a prototype optical refrigerator including the thermal link that connects the cool-ing element with the load.

  8. Towards the mid-infrared optical biopsy

    DEFF Research Database (Denmark)

    Seddon, Angela B.; Benson, Trevor M.; Sujecki, Slawomir

    2016-01-01

    We are establishing a new paradigm in mid-infrared molecular sensing, mapping and imaging to open up the mid-infrared spectral region for in vivo (i.e. in person) medical diagnostics and surgery. Thus, we are working towards the mid-infrared optical biopsy ('opsy' look at, bio the biology) in situ...... in the body for real-time diagnosis. This new paradigm will be enabled through focused development of devices and systems which are robust, functionally designed, safe, compact and cost effective and are based on active and passive mid-infrared optical fibers. In particular, this will enable early diagnosis...... of a bright mid-infrared wideband source in a portable package as a first step for medical fiber-based systems operating in the mid-infrared. Moreover, mid-infrared molecular mapping and imaging is potentially a disruptive technology to give improved monitoring of the environment, energy efficiency, security...

  9. A TOUCH-SENSITIVE DEVICE

    DEFF Research Database (Denmark)

    2009-01-01

    The present invention relates to an optical touch-sensitive device and a method of determining a position and determining a position change of an object contacting an optical touch sensitive device. In particular, the present invention relates to an optical touch pad and a method of determining...... a position and determining a position change of an object contacting an optical touch pad. A touch-sensitive device, according to the present invention may comprise a light source, a touch- sensitive waveguide, a detector array, and a first light redirecting member, wherein at least a part of the light...... propagating towards a specific point of the detector array is prevented from being incident upon the specific point of the detector array when an object contacts a touch-sensitive surface of the touch-sensitive waveguide at a corresponding specific contact point....

  10. Toward biomaterial-based implantable photonic devices

    Directory of Open Access Journals (Sweden)

    Humar Matjaž

    2017-03-01

    Full Text Available Optical technologies are essential for the rapid and efficient delivery of health care to patients. Efforts have begun to implement these technologies in miniature devices that are implantable in patients for continuous or chronic uses. In this review, we discuss guidelines for biomaterials suitable for use in vivo. Basic optical functions such as focusing, reflection, and diffraction have been realized with biopolymers. Biocompatible optical fibers can deliver sensing or therapeutic-inducing light into tissues and enable optical communications with implanted photonic devices. Wirelessly powered, light-emitting diodes (LEDs and miniature lasers made of biocompatible materials may offer new approaches in optical sensing and therapy. Advances in biotechnologies, such as optogenetics, enable more sophisticated photonic devices with a high level of integration with neurological or physiological circuits. With further innovations and translational development, implantable photonic devices offer a pathway to improve health monitoring, diagnostics, and light-activated therapies.

  11. Device calibration impacts security of quantum key distribution.

    Science.gov (United States)

    Jain, Nitin; Wittmann, Christoffer; Lydersen, Lars; Wiechers, Carlos; Elser, Dominique; Marquardt, Christoph; Makarov, Vadim; Leuchs, Gerd

    2011-09-09

    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.

  12. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  13. NATO Advanced Study Institute on Optical Waveguide Sensing and Imaging in Medicine, Environment, Security and Defence

    CERN Document Server

    Bock, Wojtek J; Tanev, Stoyan

    2008-01-01

    The book explores various aspects of existing and emerging fiber and waveguide optics sensing and imaging technologies including recent advances in nanobiophotonics. The focus is both on fundamental and applied research as well as on applications in civil engineering, biomedical sciences, environment, security and defence. The main goal of the multi-disciplinarry team of Editors was to provide an useful reference of state-of-the-art overviews covering a variety of complementary topics on the interface of engineering and biomedical sciences.

  14. Attacks on Heartbeat-Based Security Using Remote Photoplethysmography.

    Science.gov (United States)

    Seepers, Robert Mark; Wang, Wenjin; de Haan, Gerard; Sourdis, Ioannis; Strydis, Christos

    2018-05-01

    The time interval between consecutive heartbeats (interpulse interval, IPI) has previously been suggested for securing mobile-health solutions. This time interval is known to contain a degree of randomness, permitting the generation of a time- and person-specific identifier. It is commonly assumed that only devices trusted by a person can make physical contact with him/her, and that this physical contact allows each device to generate a similar identifier based on its own cardiac recordings. Under these conditions, the identifiers generated by different trusted devices can facilitate secure authentication. Recently, a wide range of techniques have been proposed for measuring heartbeats remotely, a prominent example of which is remote photoplethysmography (rPPG). These techniques may pose a significant threat to heartbeat-based security, as an adversary may pretend to be a trusted device by generating a similar identifier without physical contact, thus bypassing one of the core security conditions. In this paper, we assess the feasibility of such remote attacks using state-of-the-art rPPG methods. Our evaluation shows that rPPG has similar accuracy as contact PPG and, thus, forms a substantial threat to heartbeat-based-security systems that permit trusted devices to obtain their identifiers from contact PPG recordings. Conversely, rPPG cannot obtain an accurate representation of an identifier generated from electrical cardiac signals, making the latter invulnerable to state-of-the-art remote attacks.

  15. Mid-infrared materials and devices on a Si platform for optical sensing

    Science.gov (United States)

    Singh, Vivek; Lin, Pao Tai; Patel, Neil; Lin, Hongtao; Li, Lan; Zou, Yi; Deng, Fei; Ni, Chaoying; Hu, Juejun; Giammarco, James; Soliani, Anna Paola; Zdyrko, Bogdan; Luzinov, Igor; Novak, Spencer; Novak, Jackie; Wachtel, Peter; Danto, Sylvain; Musgraves, J David; Richardson, Kathleen; Kimerling, Lionel C; Agarwal, Anuradha M

    2014-01-01

    In this article, we review our recent work on mid-infrared (mid-IR) photonic materials and devices fabricated on silicon for on-chip sensing applications. Pedestal waveguides based on silicon are demonstrated as broadband mid-IR sensors. Our low-loss mid-IR directional couplers demonstrated in SiNx waveguides are useful in differential sensing applications. Photonic crystal cavities and microdisk resonators based on chalcogenide glasses for high sensitivity are also demonstrated as effective mid-IR sensors. Polymer-based functionalization layers, to enhance the sensitivity and selectivity of our sensor devices, are also presented. We discuss the design of mid-IR chalcogenide waveguides integrated with polycrystalline PbTe detectors on a monolithic silicon platform for optical sensing, wherein the use of a low-index spacer layer enables the evanescent coupling of mid-IR light from the waveguides to the detector. Finally, we show the successful fabrication processing of our first prototype mid-IR waveguide-integrated detectors. PMID:27877641

  16. Continuous Context-Aware Device Comfort Evaluation Method

    DEFF Research Database (Denmark)

    Guo, Jingjing; Jensen, Christian D.; Ma, Jianfeng

    2015-01-01

    Mobile devices have become more powerful and are increasingly integrated in the everyday life of people; from playing games, taking pictures and interacting with social media to replacing credit cards in payment solutions. The security of a mobile device is therefore increasingly linked to its...... context, such as its location, surroundings (e.g. objects and people in the immediate environment) and so on, because some actions may only be appropriate in some situations; this is not captured by traditional security models. In this paper, we examine the notion of Device Comfort and propose a way...... to calculate the sensitivity of a specific action to the context. We present two different methods for a mobile device to dynamically evaluate its security status when an action is requested, either by the user or by another device. The first method uses the predefined ideal context as a standard to assess...

  17. Research on fully distributed optical fiber sensing security system localization algorithm

    Science.gov (United States)

    Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen

    2013-12-01

    A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.

  18. An introduction to electrooptic devices

    CERN Document Server

    Kaminow, Ivan P

    1974-01-01

    An Introduction to Electrooptic Devices aims to present an introduction to the electrooptic effect and to summarize work on devices employing the electrooptic effect. The book provides the necessary background in classical crystal optics. The text then discusses topics including crystal symmetry, the tensor description of linear dielectric properties, propagation in anisotropic media, and passive crystal optic devices. The book also describes the phenomenological description of tensor nonlinear dielectric properties of crystals, with emphasis on the electrooptic effect; device design and appli

  19. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  20. Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists

    Science.gov (United States)

    Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin

    2017-01-01

    Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774