Current RF: Recycle Energy & Increase Cyber-Security

Logethica

Level 13
Thread author
Verified
Top Poster
Well-known
Jun 24, 2016
636
Current RF: Recycle Energy & Increase Cyber-Security-
SOURCE: cvbj.biz (ARTICLE DATE: 1 Sep 2016)

One potentially groundbreaking innovation comes from Current RF, which produces chips that reduce energy emissions from electronic devices. It also recycles the energy that does come out and provides cybersecurity at the same time...

current_rf-92a-485x387.jpg



Current RF founder Michael Hopkins, who works out of Huddle Co-Work in downtown Stockton, is close to securing a partnership agreement with a company in Texas to mass produce the chips.
He got the idea for the Current RF technology about four years ago when he was on an airplane. He was thinking about the fact that every time there’s an instruction instituted in a computer, which is called CMOS logic, there’s a surge of current. That surge is what Hopkins wanted to harness.

He began developing the chip, which is called CC100 technology IC, to harvest that energy. Initially, he wanted to connect the chip to a computer’s motherboard. But over time, he realized the technology could be adapted to other forms and has developed a product called Powerstick Exodus.
Now, Current RF has configured the technology to fit in a USB port, a lightning connector, an SD card or a cellphone case. With the chip technology developed, it can be executed in other forms too.

Essentially, the chip takes in that current, reprocesses it and puts it back on the same supply line. After doing some tests with his daughter, who was into computer gaming, he found his chip could extend her laptop’s battery life by 30 minutes. He gave it to other contacts who saw similar results.

Another big benefit of the technology is cybersecurity. Interestingly, that was a byproduct that came about by accident. In February, Hopkins was reading a paper and began to see the possibilities in that realm.

The chip blocks the emissions of currents, which reduces the energy. But it can be used to block hackers who also gather those currents and use them to compromise systems.

“Every computer has a signature, as far as its operating system, and if you listen long enough and you know what to look for — and these guys know what to look for — then they can start reconstructing cyberkeys,” said Hopkins. “We’re taking the edges off, so they can’t really recognize anything.”

The technology is a potential step forward in cybersecurity.
“Cybersecurity companies will tell you they can’t prevent a hacker from getting in,” Hopkins said. “We’re really the only solution that can block that initial entryway. That’s key.”..

[To read the full article please visit cvbj.biz]
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top