MoD brainbox repo opens up IP treasure chest for world+dog

Easy Access to some small-but-snazzy UK military ideas

British military boffins are letting world+dog use bright ideas they devised for, among other things, compact antennas, military bouncy castles and a dog-training programme.

The Defence and Science Technology Laboratory holds the Ministry of Defence's IP portfolio. The agency announced earlier this week that it is extending its "easy access IP portfolio".

This includes radio antenna tech, biomedical innovations, armour and even a "system for training sniffer dogs while avoiding trainer-induced bias," all being made available under the Easy Access IP scheme, as detailed on the DSTL website.

In brief, the Easy Access IP scheme involves a two-page contract in readable English, along with what is being presented as relatively low licensing fees, though the public literature does not specify what "patent costs" actually means in monetary terms.

Items of interest to IT-focused techies may include DSTL's miniature mobile antenna (PDF, 1 page). This little device is said to be capable of operating across the 2GHz-5GHz frequency range with an area of just 2cm2.

"The antenna is suitable for small, low cost or rugged devices which need to operate across a wide frequency band (e.g. 4G) or across multiple frequency bands where multiple antennas or complex solutions are undesirable or where space is at a premium – for example smart watches, toys, sensors, and internet enabled devices," added DSTL, which is offering a handful of similar antenna patents to world+dog.

Also up for grabs is the IP on a rucksack power supply, which incorporates "universal power and network connections for electrical devices" for which you can read more here (PDF, 1 page).

As for the military bouncy castle... strictly speaking it's a "structural element comprising a series of individual, inflatable layers co-arranged in an offset orientation, suitable for the construction of temporary modular structures". Interested by the idea of making and selling build-your-own inflatable edifices? Have a shufti at the DSTL infosheet here (PDF, 1 page).

If this all sounds a bit too good to be true, it's worth remembering the wider context: the MoD is starving and broke as a result of having too many large and expensive equipment projects (F-35 fighter jets, two new aircraft carriers, etc) and a government that doesn't care about properly funding conventional defence. Commercialising its IP is an easy way to claw back a few pennies.

Oh, and should you want to train Fido to sniff out whatever it is you want him to sniff out without biasing his training regime, there's more info here. The full DSTL list of Easy Access IP is on its website, along with this little footnote: "Note that DSTL will be happy to discuss licensing of any of its technologies where appropriate, not just the ones listed above." ®

Similar topics

Other stories you might like

  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading
  • Google assuring open-source code to secure software supply chains
    Java and Python packages are the first on the list

    Google has a plan — and a new product plus a partnership with developer-focused security shop Snyk — that attempts to make it easier for enterprises to secure their open source software dependencies.

    The new service, announced today at the Google Cloud Security Summit, is called Assured Open Source Software. We're told it will initially focus on some Java and Python packages that Google's own developers prioritize in their workflows. 

    These two programming languages have "particularly high-risk profiles," Google Cloud Cloud VP and GM Sunil Potti said in response to The Register's questions. "Remember Log4j?" Yes, quite vividly.

    Continue reading
  • Rocket Lab is taking NASA's CAPSTONE to the Moon
    Mission to lunar orbit is further than any Photon satellite bus has gone before

    Rocket Lab has taken delivery of NASA's CAPSTONE spacecraft at its New Zealand launch pad ahead of a mission to the Moon.

    It's been quite a journey for CAPSTONE [Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment], which was originally supposed to launch from Rocket Lab's US launchpad at Wallops Island in Virginia.

    The pad, Launch Complex 2, has been completed for a while now. However, delays in certifying Rocket Lab's Autonomous Flight Termination System (AFTS) pushed the move to Launch Complex 1 in Mahia, New Zealand.

    Continue reading

Biting the hand that feeds IT © 1998–2022