26-01-2012, 04:23 PM
RED TACTON
red tacton ap.docx (Size: 225.13 KB / Downloads: 495)
INTRODUCTION:
RedTacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. The name “Tacton” has originated, as the technology involves touch and action. The word “red” indicates warm and cordial communications.
TECHNICAL APPROACH OF REDTACTON:
RedTacton takes a different technical approach. Instead of relying on electromagnetic waves or light waves to carry data, RedTacton uses weak electric fields on the surface of the body as a transmission medium. A RedTacton transmitter couples with extremely weak electric fields on the surface of the body. The weak electric fields pass through the body to a RedTacton receiver, where the weak electric field affects the optical properties of an electro-optic crystal. The extent to which the optical properties are changed is detected by laser light which is then converted to an electrical signal by a detector circuit.
HOW RED TACTON WORKS?
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 Mbps.
1. The RedTacton transmitter induces a weak electric field on the surface of the body.
2. The RedTacton receiver senses changes in the weak electric field on the surface of the body caused by the transmitter.
3. RedTacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.
4. RedTacton detects changes in the optical properties of an electro-optic crystal using a laser and converts the result to an electrical signal in a optical receiver circuit.
5) Security applications:
RedTacton could be installed on doors, cabinets and other locations calling for secure access, such that each secure access could be initiated and authenticated with a simple touch. At the same time, all the transaction details and relevant user attributes (personal identity, security clearance, etc.) could be logged by the security system.
![Microsoft Word 2007 Document .docx](https://seminarproject.net/images/attachtypes/doc.gif)
INTRODUCTION:
RedTacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. The name “Tacton” has originated, as the technology involves touch and action. The word “red” indicates warm and cordial communications.
TECHNICAL APPROACH OF REDTACTON:
RedTacton takes a different technical approach. Instead of relying on electromagnetic waves or light waves to carry data, RedTacton uses weak electric fields on the surface of the body as a transmission medium. A RedTacton transmitter couples with extremely weak electric fields on the surface of the body. The weak electric fields pass through the body to a RedTacton receiver, where the weak electric field affects the optical properties of an electro-optic crystal. The extent to which the optical properties are changed is detected by laser light which is then converted to an electrical signal by a detector circuit.
HOW RED TACTON WORKS?
Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 Mbps.
1. The RedTacton transmitter induces a weak electric field on the surface of the body.
2. The RedTacton receiver senses changes in the weak electric field on the surface of the body caused by the transmitter.
3. RedTacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.
4. RedTacton detects changes in the optical properties of an electro-optic crystal using a laser and converts the result to an electrical signal in a optical receiver circuit.
5) Security applications:
RedTacton could be installed on doors, cabinets and other locations calling for secure access, such that each secure access could be initiated and authenticated with a simple touch. At the same time, all the transaction details and relevant user attributes (personal identity, security clearance, etc.) could be logged by the security system.