Royalty Report: Security, Scientific & Technical Instruments, Electrical & Electronics – Collection: 274537

$150.00

Curated Royalty Rate Report
Category: Technology Licenses, Created On: 2022-04-28, Record Count: 15

Description

This collection of transactions and supporting information was developed using our AI algorithm to curate similar royalty reports into a cohesive collection to support your licensing, transfer pricing or other transaction scenarios where documented royalty rates and/or deal terms are important.
Category: Technology Licenses
Created On: 2022-04-28
Record Count: 15

Primary Industries

  • Security
  • Scientific & Technical Instruments
  • Electrical & Electronics
  • Defense/Military
  • Internet
  • Test/Monitoring
  • Software
  • Energy & Environment
  • Solar
  • Environmental Control
  • Construction
  • Technical Know How
  • Content
  • Telecommunications Equip
  • Oil & Gas Extraction
  • Telecommunications Svcs & Equip
  • Wireless
  • Consumer Electronics

IPSCIO Report Record List

Below you will find the records curated into this collection.  This summary includes the complete licensed property description so that you can review and determine if this collection covers the topics, technology or transaction type that is relevant for your needs.  The full report will include all relevant deal data such as the royalty base, agreement date, term description, royalty rates and other deal terms.  For reference, here is a sample of a full IPSCIO curated royalty rate report: Sample Report

IPSCIO Record ID: 274537

License Grant
Under this Agreement the Assignor, an individual of the United Kingdom, conveys all rights, title and interest to the Assignee (the Assignment) to the several technologies set in the agreement which technologies were developed by the Assignor (the Technology).
License Property
The Assignor wishes to assign a certain partially developed set of technologies, in need of further development work, Border Sense, further disclosed and set forth (the “Technology” or “Border Sense” or “Smart Digital Barrier”) to the Assignee and the Assignee desires to use the Technology Assignment.
The Assignor has developed the Technology which is a unique and smart high-tech solution for the protection of a country’s border or any other perimeter, through the use of intelligent technologies.

The Technology or “Border Sense” or “Smart Digital Barrier”.

Technology includes the know-how, the blueprints, the mix of technologies including photonics (optical laser), PE (printed sensors on a PE substrate or other, software algorithm (the protected software formulae), and other sub parts including executable Nano sensors and MEMS sensors, and any related printed, electronic and online documentation and any other files that may accompany the product

Border Sense is a smart wall with inbuilt technology, including, in particular, for safeguarding country borders, prison perimeter walls or temporary walls for the US military when it goes to war need to construct adequate temporary housing facilities, generally known as a base or compound (depending on size).

Border Sense– The Smart Component of the Smart Digital Barrier
o
Border Sense is a completely intelligent autonomous wall with inbuilt array of smart sensors which can monitor the entire surface in real time and provide meaningful real-time information.
o
The top panels will be imbedded with micro touch sensors on polyethylene terephthalate (PET) triggered when physically touched.
o
This is a matrix of invisible, and not discernible micro sensors.
o
Border Sense will not require maintenance as this will be digitally protected against failure, damage or physical breaches.
o
Smart – self managing barrier.
o
Modular structure easily constructed repaired or upgraded.
o
Self-powering modules through Thin Film Technology (TFT) photovoltaics.

GPR (Ground Penetration Radar)
o
GPR sensing across the entire wall integrated within the infrastructure showing any breaches underground such as tunneling.

Physical Barrier – The Simple Component of the Smart Digital Barrier
o
The Sensortecnics Physical Barrier (the wall) is estimated to cost considerably less than competitor walls as it does not need the height, the thickness or the material intensity. All of its capabilities will instead be enhanced by being linked in with the Sensortecnics Smart Digital Barrier.
o
The wall would be constructed in smaller modular interchangeable units

The Extra layer
o
Embedded within the wall will be a thin layer of graphene film. This super composite is 100 times stronger than steel and more conductive than gold. This will give the wall an inner strengthening of the steel making penetration almost impossible (optional extra)


Robotics – A sophisticated package of sensors positioned on a smart track.
o
A robotic track with smart camera system with facial recognition capabilities will travel across the entire wall length scanning persons of interest within the perimeter mapped zone, facilitating rapid response. This is not available with currently contemplated alternative proposals.
o
Modular units positioned at central points will ensure real-time coverage of entire length, again for rapid response.
o
The intelligent camera system will record biometric data of persons of interest which is then fed directly to central servers – Homeland Security or military as applicable to use.
o
Software algorithms will be specially developed into clean data which can then integrate with other US databases and with our allies to identify, monitor and track any person of interest picked up on sensors.
o
Virtual wall sub sections specifically tailored where installing a physical wall is simply not feasible.

Drone Lock
o
Portable drones situated at strategic points will be connected digitally. These are autonomous vehicles which will be activated as and when required to track persons of interest.
o
Data will be immediately and automatically transmitted to central control.
o
Drones will return to their secure self-charging stations automatically.


Big Data
o
Specially designed software using AI (artificial intelligence)
o
ML (Machine Learning)
o
Seamless interface into immigration and police database systems, within bespoke parameters.


Border Police Notification System
o
The system will monitor a range of critical data sets which will be transmitted in real time to different authorities, as predetermined.


Any potential breach of the barrier will send real time data with location information and images, including to the nearest border police unit. Low cost scalable TFT (thin film technology) sensors

Robotics based AV

Smart Drone tracking

Fully upgradable

Inbuilt multi-layered cyber-attack protocols.

Current status

Sensors TRL 6

Completed system TRL 2

Technology Readiness Levels (TRL) are a type of measurement system used to assess the maturity level of a particular technology. Each technology project is evaluated against the parameters for each technology level and is then assigned a TRL rating based on the projects progress. There are nine technology readiness levels. TRL 1 is the lowest and TRL 9 is the highest.  When a technology is at TRL 1, scientific research is beginning and those results are being translated into future research and development. TRL 2 occurs once the basic principles have been studied and practical applications can be applied to those initial findings. TRL 2 technology is very speculative, as there is little to no experimental proof of concept for the technology. When active research and design begin, a technology is elevated to TRL 3. Generally, both analytical and laboratory studies are required at this level to see if a technology is viable and ready to proceed further through the development process. Often during TRL 3, a proof-of-concept model is constructed. Once the proof-of-concept technology is ready, the technology advances to TRL 4. During TRL 4, multiple component pieces are tested with one another. TRL 5 is a continuation of TRL 4, however, a technology that is at 5 is identified as a breadboard technology and must undergo more rigorous testing than technology that is only at TRL 4. Simulations should be run in environments that are as close to realistic as possible. Once the testing of TRL 5 is complete, a technology may advance to TRL 6. A TRL 6 technology has a fully functional prototype or representational model. TRL 7 technology requires that the working model or prototype be demonstrated in a space environment. TRL 8 technology has been tested and “flight qualified” and it’s ready for implementation into an already existing technology or technology system. Once a technology has been “flight proven” during a successful mission, it can be called TRL 9.

Delivering the Border Sense (technologies) from a Border Sense integrated system CIPS™ (Critical TFT (Thin Film Technology)) Sensor platform to TRL level 6 “Prototype System Verified”. This research and development will enable the Assignee to integrate the IP directly into its customers’ blueprint end user design document. This will cover TRL level 7-9. In the alternative, at a smaller total cost, a scaled-back version to TRL level 3, would be accomplished by engaging the services of the Developer.

Field of Use
This agreement pertains to the defense / military industry.

The Border Sense solution offers the United States Government a sophisticated method to protect its borders far beyond the capabilities of a basic “wall.” Most significantly, the parties seek to enable the United States Government a cost-effective method to build the Border Sense System and innovative mechanisms to recover initial costs to ultimately cost the US taxpayer very little to nothing. For the United States Government, the Technology enables the parties to design a completely novel framework for a resilient low-cost Smart Digital Barrier to solve an age-old problem and resolve an important political issue, employing innovative technologies coupled with reconfigured and optimized existing security systems.

IPSCIO Record ID: 274471

License Grant
Under this Agreement the Assignor, an individual of the United Kingdom, conveys all rights, title and interest to the Assignee to the several technologies set forth were developed by the Assignor, an individual, (the Technology).
License Property
The Assignor wishes to assign to the Assignee, a certain partially developed set of technologies, in need of further development work, Ebox or Solar Energy in a Box

The Technology is the “Ebox” or Solar Energy in a Box, , using energy harvesting processing technology through a innovative novel process without the use of large fixed panels in direct sunlight. Ebox is designed to be 10 times cheaper and 10 times more powerful than current technologies.
The Assignor and the Developer, including through their respective affiliates and principals, have utilized the Internet Of Things (IOT) and pioneered smart sensor technologies, whose core competency is innovative design and technological, robust solutions for complex scientific and industrial problems, including as applied to Ebox.

Technology includes the know-how, the blueprints, the mix of technologies including photonics (optical laser), PE (printed sensors on a PE substrate or other, software algorithm ( the protected software formulae), and other sub parts including executable Nano sensors and MEMS sensors, and any related printed, electronic and online documentation and any other files that may accompany the product,

TRL (Technology Readiness Level)
Current status

Sensors TRL 2-3

Completed system TRL 1
Technology Readiness Levels (TRL) are a type of measurement system used to assess the maturity level of a particular technology. Each technology project is evaluated against the parameters for each technology level and is then assigned a TRL rating based on the projects progress. There are nine technology readiness levels. TRL 1 is the lowest and TRL 9 is the highest.  When a technology is at TRL 1, scientific research is beginning and those results are being translated into future research and development. TRL 2 occurs once the basic principles have been studied and practical applications can be applied to those initial findings. TRL 2 technology is very speculative, as there is little to no experimental proof of concept for the technology.  When active research and design begin, a technology is elevated to TRL 3. Generally, both analytical and laboratory studies are required at this level to see if a technology is viable and ready to proceed further through the development process. Often during TRL 3, a proof-of-concept model is constructed. Once the proof-of-concept technology is ready, the technology advances to TRL 4. During TRL 4, multiple component pieces are tested with one another. TRL 5 is a continuation of TRL 4, however, a technology that is at 5 is identified as a breadboard technology and must undergo more rigorous testing than technology that is only at TRL 4. Simulations should be run in environments that are as close to realistic as possible. Once the testing of TRL 5 is complete, a technology may advance to TRL 6. A TRL 6 technology has a fully functional prototype or representational model. TRL 7 technology requires that the working model or prototype be demonstrated in a space environment. TRL 8 technology has been tested and “flight qualified” and it’s ready for implementation into an already existing technology or technology system. Once a technology has been “flight proven” during a successful mission, it can be called TRL 9.

Field of Use
This agreement pertains to the energy industry.

IPSCIO Record ID: 274496

License Grant
Under this Agreement the Assignor, an individual of the United Kingdom, conveys all rights, title and interest to the Assignee (the Assignment) to the several technologies set forth in the agreement which technologies were developed by the Assignor (the Technology).
License Property
Assignor wishes to assign to the Assignee, a certain partially developed set of technologies, in need of further development work, System 10 water purification system, further disclosed and set forth (the “Technology” or “System 10”), and the Assignee desires to use the Technology Assignment

Technology includes the know-how, the blueprints, the mix of technologies including photonics (optical laser), PE (printed sensors on a PE substrate or other, software algorithm ( the protected software formulae), and other sub parts including executable Nano sensors and MEMS sensors, and any related printed, electronic and online documentation and any other files that may accompany the product, as further described in the agreement.  Title, copyright, intellectual property rights and distribution rights of the Technology remain exclusively with the Assignor. Intellectual property rights include the look and feel of the Technology. This Agreement constitutes a transfer of ownership rights to the Technology.

For System 10Current status
– Sensors TRL 3-4
– Completed system TRL 1

Technology Readiness Levels (TRL) are a type of measurement system used to assess the maturity level of a particular technology. Each technology project is evaluated against the parameters for each technology level and is then assigned a TRL rating based on the projects progress. There are nine technology readiness levels. TRL 1 is the lowest and TRL 9 is the highest.  When a technology is at TRL 1, scientific research is beginning and those results are being translated into future research and development. TRL 2 occurs once the basic principles have been studied and practical applications can be applied to those initial findings. TRL 2 technology is very speculative, as there is little to no experimental proof of concept for the technology.  When active research and design begin, a technology is elevated to TRL 3. Generally, both analytical and laboratory studies are required at this level to see if a technology is viable and ready to proceed further through the development process. Often during TRL 3, a proof-of-concept model is constructed. Once the proof-of-concept technology is ready, the technology advances to TRL 4. During TRL 4, multiple component pieces are tested with one another. TRL 5 is a continuation of TRL 4, however, a technology that is at 5 is identified as a breadboard technology and must undergo more rigorous testing than technology that is only at TRL 4. Simulations should be run in environments that are as close to realistic as possible. Once the testing of TRL 5 is complete, a technology may advance to TRL 6. A TRL 6 technology has a fully functional prototype or representational model.  TRL 7 technology requires that the working model or prototype be demonstrated in a space environment. TRL 8 technology has been tested and 'flight qualified' and it’s ready for implementation into an already existing technology or technology system. Once a technology has been 'flight proven' during a successful mission, it can be called TRL 9.

This Assignment contemplates a limited, at most, license for CIPPS® and for CIPS™, from the Developer, in connection with the exploitation of the Technology for sub component IP that has been tailored for smart wall applications for sensing of physical or digital breaches.

Field of Use
The Technology or “System 10” is an off-water-grid water purification systems using Nano particle split processing, meaning no chemicals or membranes to clean water. This has been designed to help the world water shortage epidemic and charities when clean water is required in remote parts of the world.

IPSCIO Record ID: 274470

License Grant
The United Kingdom Licensor in its capacity as the licensor of CIPS™ and CIPPS®, and to the limited extent necessary in connection with the potential use of the Technology in accordance with the terms hereof or the use, or possible use, of CIPS™ and/or CIPPS®, directly or indirectly, irrespective of any actual use thereof will receive compensation for each such use or possible use.
License Property
CIPPS® (Critical Infrastructure Pipeline Protection System) for Pipelines Only.
CIPSâ„¢ (Critical Infrastructure Protection System) for IOT (Internet Of Things) applications, everything other than Pipes. (This is used as a part of the Technology.)
Field of Use
This agreement pertains to the defense / military industry.

The Technology or “Border Sense” or “Smart Digital Barrier”

Border Sense is a smart wall with inbuilt technology, including, in particular, for safeguarding country borders, prison perimeter walls or temporary walls for the US military when it goes to war need to construct adequate temporary housing facilities, generally known as a base or compound (depending on size).

The Border Sense solution offers the United States Government a sophisticated method to protect its borders far beyond the capabilities of a basic “wall.” Most significantly, the parties seek to enable the United States Government a cost-effective method to build the Border Sense System and innovative mechanisms to recover initial costs to ultimately cost the US taxpayer very little to nothing. For the United States Government, the Technology enables the parties to design a completely novel framework for a resilient low-cost Smart Digital Barrier to solve an age-old problem and resolve an important political issue, employing innovative technologies coupled with reconfigured and optimized existing security systems.

IPSCIO Record ID: 274497

License Grant
Under this Agreement the Assignor, an individual of the United Kingdom, conveys all rights, title and interest to the Licensee to the several technologies set forth which technologies were developed by the Licensor (the Technology), but limited to use in North America.  Title, copyright, intellectual property rights and distribution rights of the Technology remain exclusively with the Licensor. Intellectual property rights include the look and feel of the Technology. This Agreement constitutes a conveyance of exclusive rights to the Technology, but limited to use in North America.
License Property
The Licensor wishes to assign to the Licensee, a certain partially developed set of technologies, in need of further development work, Cybersoft – File Tracker, further disclosed and set forth in Exhibit A hereto (the “Technology” or “Cybersoft – File Tracker” or “File Tracker”) and the Licensee desires to use the Technology License in accordance with the terms and conditions stated below.

The Technology or “Cybersoft – File Tracker” or “File Tracker”

Cybersoft – File Tracker is a file tracking software enabling the send, track, recall or destruct files when emailed to third party. Data file abuse is major problem when the owner sends valuable documents to the recipient in confidence. The recipient then forwards those files to other parties without permission. File Tracker will stop this as it triggers an alert if the file is forwarded to non-authorized third party, the owner can then decide to recall or destruct that file. This is major achievement in the data breach and security market.

Technology includes the know-how, the blueprints, the mix of technologies including photonics (optical laser), PE (printed sensors on a PE substrate or other, software algorithm ( the protected software formulae), and other sub parts including executable Nano sensors and MEMS sensors, and any related printed, electronic and online documentation and any other files that may accompany the product, as further described in the agreement.

A part of the Technology, employs the use of CIPPS® (Critical Infrastructure Pipeline Protection System) for Pipelines Only and/or CIPS™ (Critical Infrastructure Protection System) for IOT applications, everything other than Pipes.

IPSCIO Record ID: 274495

License Grant
Under this Agreement the Assignor, an individual of the United Kingdom, conveys all rights, title and interest to the Licensee to the several technologies set forth which technologies were developed by the Licensor (the Technology), but limited to use in North America.

Title, copyright, intellectual property rights and distribution rights of the Technology remain exclusively with the Licensor. Intellectual property rights include the look and feel of the Technology. This Agreement constitutes a conveyance of exclusive rights to the Technology, but limited to use in North America.

License Property
The Technology or “Intelliclad – Smart Buildings”
Current status
– Sensors TRL 6
– Completed system TRL 2
– Smart Hydrant – 1
– EE-Pods- 1

Technology includes the know-how, the blueprints, the mix of technologies including photonics (optical laser), PE (printed sensors on a PE substrate or other, software algorithm ( the protected software formulae), and other sub parts including executable Nano sensors and MEMS sensors, and any related printed, electronic and online documentation and any other files that may accompany the product.

Intelliclad has among its technological features, the Smart Hydrant Smart Building external fire hydrant. This makes possible the extinguishment of fire, without the necessity of humans going to the particular site and applying water, which may be impossible in the case of tall buildings.

Intelliclad has among its technological features, the EE-POD -Emergency Evacuation PODS Emergency Exit Fire Pods for tall buildings. This makes possible the safe exit, even from the top floor of tall buildings, without having to navigate a more conventional exit from the building, which may be impossible in the case of tall buildings.

Field of Use
Intelliclad is perhaps best characterized as Smart Buildings employing a Smart Buildings Safety System. Prompted by a major disaster, Intellicald was designed in response to the major Grenfell fire in June 2017 which claimed almost 100 lives, as residents could not escape the tall building. Intelliclad sensors digitize the entire tall building into smart module which is monitored in real time for environmental risks including fire, smoke, heat and building movement. Once Intelliclad detects such a major life-threatening event, it triggers immediate reaction and automated remedies, without the need of human response or involvement, as further disclosed and set forth (the “Technology” or “Intelliclad – Smart Buildings”).

IPSCIO Record ID: 29239

License Grant
The Licensee has entered into a License Agreement with our Chief Technology Officer and member of our Board of Directors, under which we have acquired exclusive rights to proprietary high technology intellectual properties invented and/or developed by the Licensor, that we will further develop and offer to our customers.
License Property
1 – Perimeter intrusion detection radars
Description
We will develop two radar systems for intrusion detection the first, called more properly GUIDAR is based on ranging leaky coaxial cable sensors and creates a volumetric protection zone; the second is a high performances free-space RADAR and creates a virtual barrier. Both systems are designed to detect moving targets.
The GUIDAR exploits the features of Ultra Wide Band (UWB) radar signal transmitted along a leaky coaxial cable and whose reflections, given by targets approaching the cable, are received by another leaky coaxial cable and then processed, detected, and classified by means of a complete and innovative Digital Signal Processing (DSP) system.
The leaky coaxial double cable can be installed, buried or not, along a generic path and protect a cylindrical volume around the double cable with a diameter of about 2 m along its entire length. Each digital processing system, able to detect the position and size of any target, can manage up to hundreds of meters of cable. More digital processing systems can be networked using standard Ethernet and then connected to a central managing system. This technology is generally classified as active, volumetric, terrain following, all-weather, and immune to vegetation and blowing debris.
We also developed a mono-static UWB electronic scanning radar (ESR) using a new antenna design and an advanced DSP system realizing a protection barrier. The processing unit is developed implementing a signal processing scheme able to precisely recognize the intruder radar cross section and position up to hundreds of meters distance from the antenna. More processing units can be networked using standard Ethernet and then connected to a central managing system. This technology is classified as active, volumetric, all-weather, ideal for low profile targets, and immune to vegetation and blowing debris.
Advantages
We will develop innovative cable geometry and innovative antennas that dramatically improve the performances of our systems in terms of ranging with respect to the existing products. Moreover we will adopt innovative UWB radar analysis software based on DSP architecture that permits us to reach very high detection capabilities and performances and to be highly resilient to the environment changes (nuisance).
Applications
These systems are ideal to protect military and operation plants, airports, borders, oil pipes, etc.

2 – EMSEC (protection and eavesdropping)
Description
Electronic equipment can emit unintentional signals from which eavesdroppers may reconstruct processed data at some distance.
We will develop a single pc/laptop active protection system based on the emission of correlated signals (innovative concept) that is intrinsically totally secure. Emitting a composite correlated protection signal the received spectrum is a non discernible mix of the signal to be protected and the protecting signal. This apparatus is low power, narrow band, impossible to violate and easy to be installed.
We will develop a high performances (large distance and through the wall) eavesdropping system on video display unit based on state-of-the-art digital signal processing. The system is an all-digital system implementing a fast AD conversion and digital front-end. Channel equalization, automatic choice of spectral harmonic, automatic extraction of vertical and horizontal synchronizations, and digital image enhancement permit to reach unprecedented performances in terms of readability.
Advantages
A completely and totally new concept is applied to the protection system and a totally digital system will be developed for eavesdropping permitting to reach unprecedented performances.
Application
The protection system can be applied in military installations, in governmental buildings, during tactical operations, etc.

3 – Real time positioning system
Description
Organizations need a system able to locate objects or people. A real time positioning system consists of a fixed infrastructure of base stations and associated hardware and software to enable accurate real-time tracking of small battery powered (active) tags, which can be attached to people or objects, within the area covered by the base stations infrastructure. Compared to Global Positioning Systems (GPS), this system provides greater accuracy (typically to a resolution of a few centimetres) and the ability to work in situations where GPS does not (such as inside buildings) and with very small devices (active tags) with very small batteries.
The sensors in each base station are very sensitive detectors for the low power pulses emitted by the tags and can distinguish between reflections and directly received signals. Each sensor independently determines the azimuth and elevation directions of arrival of the incoming signals using special antenna array and signal analysis. Sensors do not need to have optical line of sight contact with the tags since the signals go through walls and other objects. An infrastructure of base stations can be installed and networked using standard Ethernet and then connected to a central management system.
Advantages
New sensor antennas will be developed with improved performances. Innovative signal processing techniques will improve range and precision. The main advantages of such technologies are high precision, very good performance even in presence of obstacles or limited visibility, capability to work both outdoor and indoor, capability to work also with important metal obstacles using a suitable topology for the base stations, very high noise immunity, etc.
Applications
The system can be applied wherever is necessary to track in real time the position of people or objects, i.e. to associate the data from a bar code scanner with its position in a warehouse, to provide the position of a pallet of goods placed in a warehouse or a container in a storage area or airport, to automatically detect the proximity between objects, to determine if during an emergency procedure employees have all reached designated areas, etc.

4 – Image processing codecs
Description
This system is constituted of an off-the-shelf electronic board based on digital signal processors running state-of-the-art image processing software algorithms (embedded system). It gets an input from any video camera (or radar, or eavesdropping system) and gives alarm and other outputs. It will perform the following content video analyses motion detection, abandoned/removed object/vehicle detection, perimeter crossing detection, panic situation detection, people/vehicle counting and speed evaluation, PTZ camera tracking, plate recognition, behaviour analysis, face recognition.
Advantages
We are confident to reach incredible performances in terms of image resolution (> 1 mega-pixel) and video rate (> 25 frames per second).
Applications
The system is ideal to protect military and operation plants, airports, borders, vip houses, highways, cities, etc.

Field of Use
Licensee has the right to file patents on these technologies in the field of intrusion detection systems, radar systems for border and pipeline surveillance, and technologies for monitoring and surveillance systems, through our License Agreement with the Licensor.

IPSCIO Record ID: 274535

License Grant
The United Kingdom Licensor in its capacity as the licensor of CIPS™ and CIPPS®, and to the limited extent necessary in connection with the potential use of the Technology in accordance with the terms hereof or the use, or possible use, of CIPS™ and/or CIPPS®, directly or indirectly, irrespective of any actual use thereof will receive compensation for each such use or possible use.
License Property
The Licensor and the Developer, including through their respective affiliates and principals, have utilized the Internet Of Things (IOT) and pioneered smart sensor technologies, whose core competency is innovative design and technological, robust solutions for complex scientific and industrial problems, including as applied to File Tracker.

The Technology or “Cybersoft – File Tracker” or “File Tracker”

A part of the Technology, employs the use of the Licensor’s lead product, Developer, CIPPS® (Critical Infrastructure Pipeline Protection System), previously assigned to the Developer, which is currently undergoing further product development from a technology status to product in partnership with United Utilities, UK’s leading water services company, Radius Pipes, a leading pipeline manufacture and CPI (Centre for Process Innovation) a government funded R&D facility with almost 1000 scientists and experts in OPE (Organic Printed Electronics), all of which and all of whom will be available with regard to the development of the Technology, including the Licensor, as this License contemplates the engagement of the services of the Developer, for the further development of the Technology, including with the use of CIPPS® and of CIPS™, in connection with the Technology.

Cybersoft – File Tracker is a file tracking software enabling the send, track, recall or destruct files when emailed to third party. Data file abuse is major problem when the owner sends valuable documents to the recipient in confidence. The recipient then forwards those files to other parties without permission. File Tracker will stop this as it triggers an alert if the file is forwarded to non-authorized third party, the owner can then decide to recall or destruct that file. This is major achievement in the data breach and security market.

CIPPS® (Critical Infrastructure Pipeline Protection System) for Pipelines Only and/or CIPS™ (Critical Infrastructure Protection System) for IOT applications, everything other than Pipes.

CIPPS® technology facilitates the transformation of dumb, inert plastic or metal surfaces into completely intelligent autonomous self-thinking systems, susceptible to monitoring. A self-managing predictive asset management system, CIPPS® designed to predict failure-point in advance to maintain operational resiliency.

Field of Use
This agreement pertains to the software industry.

IPSCIO Record ID: 2112

License Grant
The Licensor grants to the Licensee an Exclusive License to make, use and sell Licensed Products.
License Property
Fiber Optic Intelligent Detection System 'FOIDS(R)'.  Fiber optic based security system and components are used in the system that are immune to most external electronic impulses such as radio frequency emissions, static electricity (including lightning), and moisture and ambient temperature variations.  Digital processing minimizes nuisance alarms and permits the operator to set the desired probability of detection (i.e., sensitivity to certain conditions or intrusions).  The FOIDS(R) system can be fully integrated with a variety of digital security.

Fiber Optic Intelligence Detection Systems is a cost effective perimeter security system utilizing single mode fiber optic cable and highly sensitive interferometry technology for intrusion detection along fences and walls up to a zone length of 3.5 miles. FOIDS can secure virtually any size perimeter without electrical power or electronic components outside a central control room. FOIDS detects pressure changes along length of zone including climbing, lifting, or cutting of the fence.

The Licensed Products are covered by the Licensed U.S. Patents;

1. No.5,355,208, 'Distributed Fiber optic Sensor for Locating and Identifying Remote Disturbances'  
2. No.5,373,487, 'Distributed Acoustic Sensor'  
3. No.5,567,933 (issuing 10/22/96) 'Optical Fiber Detection System with Disturbance and Positive Cut-Loop Detection Capabilities'

IPSCIO Record ID: 274534

License Grant
This License contemplates a limited, at most, license for CIPPS® and for CIPS™, from the United Kingdom Developer, in connection with the exploitation of the Technology for sub component IP that has been tailored for smart wall applications for sensing of physical or digital breaches. And to the limited extent necessary in connection with the potential use of the Technology in accordance with the terms hereof, for the use, or possible use, of CIPS™ and/or CIPPS®, directly or indirectly, irrespective of any actual use thereof.
License Property
The Licensor and the Developer, including through their respective affiliates and principals, have utilized the Internet Of Things (IOT) and pioneered smart sensor technologies, whose core competency is innovative design and technological, robust solutions for complex scientific and industrial problems, including as applied to Intelliclad – Smart Buildings.

The Licensor wishes to assign the Licensee, a certain partially developed set of technologies, in need of further development work, Intelliclad – Smart Buildings.

CIPPS® (Critical Infrastructure Pipeline Protection System) for Pipelines Only.
CIPSâ„¢ (Critical Infrastructure Protection System) for IOT applications, everything other than Pipes. (This is used as a part of the Technology.)

Field of Use
Intelliclad is perhaps best characterized as Smart Buildings employing a Smart Buildings Safety System. Prompted by a major disaster, Intellicald was designed in response to the major Grenfell fire in June 2017 which claimed almost 100 lives, as residents could not escape the tall building. Intelliclad sensors digitize the entire tall building into smart module which is monitored in real time for environmental risks including fire, smoke, heat and building movement. Once Intelliclad detects such a major life-threatening event, it triggers immediate reaction and automated remedies, without the need of human response or involvement, as further disclosed and set forth in Exhibit A hereto (the “Technology” or “Intelliclad – Smart Buildings”).

IPSCIO Record ID: 116214

License Grant
Licensor hereby grants to Licensee the exclusive worldwide license to make, have made, use, sell, and lease the Product(s) described in the Licensed Patent Rights.

Under the agreements, the company granted to Licensee an exclusive license to the assets comprising the technology and products of the defense, detection and protection security products invented and developed by the inventor and the company.

License Property
Licensed Patent Rights Shall mean a. US Patent number 7,408,461 'Metal Detection System and Method'

The security products being developed by the company are designed for personal and collateral protection. The proposed detection technology is intended to provide passive security scanning units for either walk-through or hand-held use. The units use electromagnets and do not emit anything (such as x-rays) through the subject. The company is developing a prototype and expects to have a testing unit operational in the coming days. The units are intended to improve security for schools and other public facilities.

Field of Use
The licensee is a developer of defense, detection and protection products to improve security for schools and other public facilities.

IPSCIO Record ID: 137003

License Grant
The German Licensor grants to the Licensee of Puerto Rico and its Affiliates, a non-exclusive, non-transferable, non-assignable without the right to sublicense worldwide license under the licensed patents, to make, have made, use, import, export, distribute, sell, offer for sale, develop and advertise licensed products. In addition, Licensor hereby grants to the Licensee Third Parties a non-exclusive, non-transferable, non-assignable without the right to sublicense worldwide license under the licensed patents, to make, have made, use, import, export, distribute, sell, offer for sale, develop and advertise licensed products only.
License Property
The US patents are for wireless building controls.

The License owned by Seller relates to patents of Austria, Belgium, Brazil, Canada, China, EPO, Finland, France, Germany, Greece, Ireland, Italy, Mexico Netherlands, South Korea, Spain, Sweden, Switzerland, United Kingdom and the United States.

Field of Use
The patented wireless building control systems and devices would be used in the construction industry for building management and protection.

IPSCIO Record ID: 2111

License Grant
The Company grants a nonexclusive and nontransferable licenses to make, have made, use, lease, sell offer for sale and import Optical Fiber Sensing Systems.
License Property
Optical Fiber Sensing System means any instrumentality or aggregate of instrumentalities of a type for sensing any intrusion into an Optical Fiber or a network of Optical Fiber and includes all auxiliary apparatus associated therewith and involved in performing the function thereof.  Fiber Optic Intelligent Detection System (FOIDS(R)). Fiber optic based security system and components are used in the system that are immune to most external electronic impulses such as radio frequency emissions, static electricity (including lightning), and moisture and ambient temperature variations. Digital processing minimizes nuisance alarms and permits the operator to set the desired probability of detection (i.e., sensitivity to certain conditions or intrusions). The FOIDS(R) system can be fully integrated with a variety of digital security. The FOIDS(R) and RDIDS systems can be combined to create an easily deployable single-mode optical fiber sensor incorporating the most recent developments in optical and electronic technologies to provide state-of-the-art security in tactical situations where temporary barrier security is required.

PATENT means U.S. Patent 4,904,050 and any reissue thereof. Optical Fiber means a filamentary body of optical transmission material of a design primarily adapted for transmitting electromagnetic Waves having a frequency in excess of three hundred (300) GHz, along a desired path extending longitudinally there through and to which such Waves are substantially confined by the refraction of reflection (or both) of such Waves.

OPTICAL FIBER SENSING SYSTEM means any instrumentality or aggregate of instrumentalities of a type for sensing any intrusion into an OPTICAL FIBER or a network of OPTICAL FIBER and includes all auxiliary apparatus associated therewith and involved in performing the function thereof.

Field of Use
The rights granted apply solely for the manufacture in Licensee's factories of Optical Fiber Sensing Systems and of maintenance parts therefor.

IPSCIO Record ID: 7363

License Grant
Licensor hereby grant to Licensee a perpetual sub-licensable, exclusive, worldwide license to make, have made, use, sell, offer for sale and import products and to practice any method under the Intellectual Property (as defined below) in the Markets (as defined below), including but not limited to the use of the Technology for the manufacture and distribution of products, and a non-exclusive license to the same in all other markets outside the Markets.
License Property
Licensor have developed expertise in the area of three-dimensional imaging (the “Field”) and have certain intellectual property, equipment and software in the Field (collectively, referred to as the “Technology”), that 3D-ID is interested in further developing.

The Licensor has developed innovative technologies and products for all aspects of imaging, including capture, processing, display, and enhancement. The Licensor's products range from 3D cameras to surveillance algorithms to integrated facial recognition systems.

Product Description

Shuttle X 3.01 GHZ mini Computer with an EuraCard frame grabber

3D FaceCam, model FACE CAM500-34

3D FaceCam (FC800-688-22651-38105-1279b)

Manfrotto Tripod

Belkin Power strip

WellCam system with monitor and power supply

WellCam camera

WellCam system in Pelican 1490 case

Pelican 1400 case

IMPERX IPX-4M15-L camera

CameraLink power supply

AXIS EVI-D30 12 variable zoom camera

Swann Security c500 CCD color camera

Color TFT LCD monitor

Micro compact KPC CCD camera lenses

Micro compact KPC CCD camera

Power supply adaptors

Network server case

More Power supply adaptors

Three level camera ring with 19 KPC-EX20H cameras

One level camera ring with 5 or 6 KPC-EX20H cameras

SOS-4 Vision system

SOS vision system (model IS 1)

Small Pelican case

AirPlus Xtreme G wireless router

Netgear Prosafe 8 port Gigabit switch (GS108)

More power supply adaptors

Battery Lithium MnO2 BA 5390/u

More power supply adaptors

Utilitech motion sensor control #182164

Sets of SOS cables

SOS power supply
DPTex Passive Infrared Detector CX-702

DS ATO Gateway

SH-5316-BZ Motion Sensor

Marshall Electronics V-LCD4-Pro-l High resolution 4” LCD monitor

Camera Ring mechanical structure for 8 sensors

S.BATT12.6 battery

Small Electronic chips

Archer Filed personal computer

STUDS SOS Vision Systems

Pelican 1150 cases

Genex camera system with two big grey cameras

Camera vision system with 3 KPC-EX20H cameras

AXIS 2120 Network Camera

IQeye3 Camera system from IQinVision

Software and Trademarks
WellCam
STUDS
SOS
Cerberus
FaceCam
3D SketchArtist
3D FaceMap
3D FaceMatch
3D Enroll

Patent Title
Serial/Patent/

Registration Number

Method and Apparatus for High
6,064,423

Resolution Three Dimensional Display

Omni-Directional Cameras
D436,612

High Speed Three Dimensional
6,028,672

Imaging Method

Method and System for Three-Dimensional
6,700,669

Imaging Using Light Pattern Having

Multiple Sub-Patterns

Method And Apparatus for Omnidirectional
6,744,569

Three Dimensional Imaging

Face Recognition System and Method
7,221,809

A System and a Method for Three-Dimensional Imaging Systems
7,349,104

Method and Apparatus for an Interactive
7,098,872

Volumetric Three Dimensional Display

Face Recognition System and Method
7,876,931

Method and Apparatus for Omni-Directional
7,940,299

Video Surveillance System

A System and a Method for a
7,358,498

Smart Surveillance System

A High Speed Three Dimensional
6,147,760

Imaging Method

Method And Apparatus for Modeling Via a
6,819,318

Three-Dimensional Image Mosaic System

Method and System for a Three
7,804,997

Dimensional Facial Recognition System

Method and Apparatus for Omnidirectional
6,304,285

Three-Dimensional Imaging

Method and Apparatus for Generating Structural Pattern Illumination
6,937,348

Field of Use
The Licensee is a technology company that is focused on products, solutions, and services that have a need for biometric secure access control. The Licensee has three distinct lines of business that we believe will form our company law enforcement; m-commerce; and biometric access control applications.

IPSCIO Record ID: 363078

License Grant
For the Licensee of Japan Products and Trust Services, Licensor grants Licensee of Japan a nonexclusive, nontransferable, and worldwide license, under the Licensed Patents, in the Consumer Media Field, to make, have made, use, sell, offer for sale, lease, import and otherwise transfer Licensee Products and/or operate Licensee Trust Services.

For the Memory Stick, Licensor grants a nonexclusive, nontransferable, and worldwide license, under the Licensed Patents, in the Consumer Media Field, to sublicense third parties the right to make, have made, use, sell, offer for sale, lease, import and otherwise transfer Memory Stick; and to make, have made, use, sell, offer for sale, lease, import and otherwise transfer Memory Stick Capable Products.

License Property
Licensor holds the patent rights relating to, but not limited to; Database Usage Metering and Protection System and Method; Systems and Methods for Secure Transaction Management and Electronic Rights Protection; Systems and Methods Using Cryptography to Protect Secure Computing Environments.

Consumer Media Content means electronic content and information primarily released or published for distribution to and consumption by end-user individual consumers in the consumer market, including audio, video, video games, books, periodicals and other textual publications, and includes associated consumer end-user data obtained in connection therewith.

Memory Stick means a stand-alone, portable, secure, self-contained semiconductor storage device that is designed to be inserted into and interfaces with Memory Stick Capable Products, and meets the Memory Stick Standard Format Specifications, or any successor product that is a stand-alone, portable, secure, self-contained storage semiconductor device provided that such device will not be considered a successor product while it is sold or distributed by Licensee at the same time as the prior Memory Stick device. Memory Stick shall not include any DRM software, but includes its device drivers and any Licensee authentication or security software running on any embedded, dedicated-purpose processor on such Memory Stick.

Memory Stick Capable Products means any hardware product that incorporates device drivers, and potentially Licensee DRM software, that interface with a Memory Stick, and that does not include or interface with any third-party DRM software or services, nor include or interface with any other stand-alone, portable, secure, self-contained storage device. Notwithstanding the foregoing, Memory Stick Capable Products shall not include any personal computer or set top box, or other products similar to a personal computer or set top box, that contain a general purpose or open operating system, or any general purpose trusted systems or environments.

Licensee Product means any hardware or software product, including but not limited to devices and software products, including DRM software products, made, used, offered for sale, sold, imported or otherwise distributed by or for Licensee, under any Licensee Trademark; and any mobile phones or mobile audio devices made by Licensee, and distributed to a Vertical Partner by or for Licensee, for incorporation into such Vertical Partner’s value–added products under a brand owned by such Vertical Partner.

Licensee Trust Services means any services for Licensee Products that are operated by Licensee, under any Licensee Trademark, to provide key management and renewability, security patches and fixes, and other similar types of security maintenance services.

Field of Use
Consumer Media Field means products and services that are principally intended for end-user individual consumers, to Govern Consumer Media Content. Consumer Media Field excludes any product or service that is intended for use by enterprises, organizations, or governmental entities to Govern their enterprise, confidential, or other proprietary information.

Digital Rights Management (DRM) technology is implemented in software and is most often used to protect digital content, such as music and video clips, from unauthorized copying.

Disclaimer: The information gathered from RoyaltySource® database was sourced from the U.S. Securities and Exchange Commission EDGAR Filings and other public records. While we believe the sources to be reliable, this does not guarantee the accuracy or completeness of the information provided. Further, the information is supplied as general guidance and is not intended to represent or be a substitute for a detailed analysis or professional judgment. This information is for private use only and may not be resold or reproduced without permission.