Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Hundreds sign up for the upcoming NIST Innovative Technologies Showcase 2

NIST Showcase Banner

NIST’s second Innovative Technologies Showcase, a setting where three NIST researchers will present their latest and greatest technology, has gotten off to a roaring start one whole month before the event is scheduled to take place.     

Almost 900 inventors, scientists, engineers, academics, and potential commercial partners have so far signed up to attend this Technology Transfer panel presentation.  Every day brings new registrations to attend the Showcase on March 13th from 3:00 p.m. to 4:30 p.m. Eastern Time.

The extraordinary level of interest generated by this Showcase, which was designed and hosted by the Technology Partnerships Office, demonstrates the business community’s widespread recognition of the commercial and societal value of bringing NIST’s scientific research to the marketplace.

Three researchers from NIST’s Information Technology Laboratory (ITL) will present their technologies to the Showcase attendees. These technologies are ready to move from the bench to the next step of commercialization.

David Ferraiolo is a Computer Scientist and Group Manager for ITL’s Secure Systems and Applications Group.  His presentation on cybersecurity will be “A Method and System for Centralized ABAC Policy Administration and Local Policy Decision and Enforcement Using Access Control Lists.” The technology, developed by David Ferraiolo, Gopi Katwala, and Serban I. Gavrila, details a method that centrally manages Attribute-Based Access Control (ABAC) policies and locally computes and enforces decisions over those policies on resource repositories that are locally protected in host systems using host Access Control Lists (ACLs). The method is founded on the expression of an ABAC policy, based in part on objects and object attributes that conform to the access control rules of an enterprise, and leverages the ABAC policy expression by introducing representations of local repositories into the ABAC system as objects and object attributes. Repositories may be comprised of individual files, directories, or other resources that require protection. The method further maintains a correspondence between the ABAC representations and repositories in local host systems. The method also leverages an ability to conduct policy analytics in such a way as to formulate ACLs for those representations in accordance with the ABAC policy and creates ACLs on repositories using the ACLs of their corresponding representations. As the ABAC policy configuration changes, the method updates the ACLs on affected representations and automatically updates corresponding ACLs on local repositories. Operationally, users attempt to access resources in local host systems, and the ABAC policy is enforced in those systems in terms of the methods managing ACLs.    

Mei Lee Ngan, a Computer Scientist in ITL’s Information Access Division, will present “A Methodology for Detecting Face Morphing Using One-to-Many Face Recognition Algorithms.” Face morphing is a form of identity fraud that is a known vulnerability to those automated face recognition and identity credentials, such as passports, that leverage face recognition.  Face recognition algorithms will often erroneously match the manipulated image (morph) with the multiple people that contributed to the morph.  This research has developed a morph detection method that uses one-to-many face recognition algorithms to detect the presence of face morphing and presents a novel departure from other existing morph detection techniques.  The approach developed by Mei Lee Ngan, Kayee Kwong Hanaoka, and Patrick Joseph Grother generates reduced false detection rates that are better than any conventional morph detection algorithm published in the academic literature and evaluated in independent third-party tests.

Kamran Sayrafian, an Electronics Engineer and Senior Scientist in ITL’s Applied and Computational Mathematics Division, will present “A Wireless Wearable System to Monitor Levels of Fluids in the Lungs.” The technology he devised paves the way toward a simple wearable system that can be used at home to monitor excess fluid levels in the lungs, a medical condition known as pulmonary edema. The system is composed of several small wearable antennas optimized for signal penetration through the body. The flexible antennas can be integrated into a wearable device covering the lungs. Continuous measurement of the signal through a wearable band or a T-shirt with embedded electronics could be an inexpensive monitoring system to detect the status of pulmonary edema. The promising simulation results indicate the viability of this approach as a simple wearable technology for remote or self-monitoring of the lungs. The technology could be used not only by patients who are susceptible to pulmonary edema but also by those in recovery who need to stay under continuous observation. 

After these technologies have been discussed, a panel will describe how collaborative efforts with NIST researchers and licensing opportunities with NIST can be pursued and arranged.

The Innovative Technologies Showcase programs advance NIST’s mission of bringing the results of federal scientific and technological research from the Lab to the Marketplace.

Released March 8, 2023, Updated March 10, 2023