Purdue Research Foundation

advertisement
PURDUE
OFFICE OF TECHNOLOGY
COMMERCIALIZATION
Technology Snapshot:
Computer
Technology-Misc.
This is a brief snapshot of ongoing research at Purdue University.
The following technologies represent advancements in
information technology, computer technology and computer
science.
Video Conferencing, Education
paperlessMe tablet note-taking application could
save time, reduce costs (PRF 66182)
Purdue University Research Scientist Bobby
McCullouch has developed a note-taking
application for tablets such as the Apple iPad or
Google Nexus. This software will give users the
ability to add notes and annotations to PowerPoint
slides. Presenters can upload their slide show
and users can retrieve the presentation, make
notes directly on the slide, and save the results.
McCullouch’s application is designed for use in
classrooms and at conference sessions. It will allow
users to lower handout and distribution costs by
generating, saving, and retrieving digital notes.
Design and Electronic Games
Interactive, gesture driven technology could make
3D design more user friendly (PRF 66205)
Computer-aided design (CAD) is a highly creative
process that should allow the designer to quickly
and easily manipulate their concept as ideas
change and evolve. However, CAD software
interfaces are counter-intuitive and require tedious,
time consuming effort to alter designs. Current
computer tools do not allow the creation of shapes
in a fluid manner without extensive knowledge
and training about the software tools.
Karthik Ramani, the Donald W. Feddersen Professor
of Mechanical Engineering and Director of C Design
Lab at Purdue University, has created a technology
that will allow designers to create shapes and
forms in a more user friendly manner. Ramani’s
technique is aimed at enabling the expression and
exploration of free-form and parametric 3D shape
designs through natural interactions with human
gestures.
ACTIVE-Hand
system
may
enable more immersive virtual
environments
(PRF 66216)
Haptic feedback devices enhance a
user’s experience by allowing them to
touch and feel the virtual environment they
are interacting with. As motion-based gaming
systems increase in popularity, the demand for
better tactile feedback also increases. Wearable
haptic devices are an excellent solution to fill this
need in motion-based 3D gaming; however, the
devices must be unobtrusive and portable.
Purdue University’s Donald W.
Feddersen Professor of Mechanical
Engineering and Director of C
Design Lab, Karthik Ramani, has
developed ACTIVE-Hand, a haptic
device that allows a user to become
more fully immersed in 3D gaming.
Consisting of a wearable device that
generates variable force on different
parts of the body, it allows users to
detect contact with objects in their
virtual environment. For example,
a glove applies pressure to the
user’s fingertips when they are
“touching” something in the
gaming environment, which the
body interprets as contact with
the virtual object.
Combining pen and touch
interaction
could
improve
versatility
of
touchscreen
interfaces (PRF 66218)
Using a pen/stylus with a
touchscreen provides greater
precision than hands or fingers,
but also limits interactivity with
the surface. A hand is capable of
making many different gestures,
PURDUE
OFFICE OF TECHNOLOGY
COMMERCIALIZATION
Technology Snapshot:
Computer
Technology-Misc.
while a pen is confined to a single point of input.
Karthik Ramani the Donald W. Feddersen Professor of
Mechanical Engineering and Director of C Design Lab at Purdue
University, has developed a new framework for multi-touch
devices that combines both pen and hand gestures for more
versatile interaction. Combining both forms of input allows
the pen to be used for detailed sketching while the other hand
can simultaneously perform gesture-based tasks. Ramani’s
framework has been designed specifically for the creation and
manipulation of 2D and 3D shapes, with the pen controlling
2D actions on the surface and hand gestures manipulating 3D
space.
Miscellaneous
Privacy-Preserving Verification Software Framework (PRF
65361)
PI: Elisa Bertino
Tech Body
Hardware-based data security keys may improve data security
(PRF 65985)
Read-once keys (ROKs), which allow digital information to be
decoded just one time, are crucial for the protection of data
and information on computers. There is a consensus among
cryptographers that software processes alone cannot be relied
upon to generate ROKs.
Purdue University’s Elisa Bertino, Professor of Computer Science
and Director of Cyber Center at Discovery Park, has developed
a physically unclonable function read-once key (PUF ROK) to
allow encrypted information to be decoded and then destroyed
using a trusted hardware mechanism so that it cannot be
copied or decrypted again.
Bertino’s technology could be used for a variety of applications,
such as trial versions of software or email security, and is much
more effective than current methods of generating ROKs.
PUF ROKs are tied to a specific piece of hardware, so using
the same input on another device will only produce errors.
Additionally, one encryption key directly overwrites another
within the processor instead of memory, making physical
attacks significantly more difficult.
New method for preventing software piracy could provide
long-term security, require minimal system resources
(PRF 65932)
Software piracy currently accounts for about 20 percent of
all software use in the United States and over 40 percent
worldwide. With these numbers rising, software companies
need a way to secure their intellectual property against theft
that is more effective than their current methods.
A solution proposed by John Rice, the Purdue University W.
Brooks Fortune Distinguished Professor Emeritus of Computer
Science, works by tying software to the specific hardware of
the computer on which it is installed. Hidden protections in
the program would be triggered randomly to detect if the
application has been pirated. A mixture of short- and long-term
protections would provide long-lasting security. Rice’s method
of detection yields better security from piracy than current
encryption-based deterrents and has little effect on the speed
or memory of the software in use.
Download