SlideShare una empresa de Scribd logo
1 de 28
Human Area Network
Human Area Network
What is Red Tacton?
Red Tacton is a new Human Area Networking technology.

Uses the surface of the human body as a safe, high speed network
transmission path.

It uses the minute electric field emitted on the surface of the human
body.
RedTacton

Developed by NTT from Japan.

Claims to send data over the surface of skin.

Attains a speed up to 10 Mbps --- equivalent to a fast broadband
connection.

Uses weak electric fields on the surface of human body instead of
relying on EM waves or light waves.
Red Tacton
Transceiver
Principle
Red Tacton relies upon the principle that the optical properties of
an electro-optic crystal can vary according to the changes of a
weak electric field.
Block Diagram of RedTacton
        Transceiver
Experiment on Human Body
Human Safety

The transmitting and receiving electrodes of the transceiver are
completely covered with insulated film.


Impossible for current to flow from the transceiver to the human body.


When communication occurs, displacement current is generated by
the electrons in the body because body is subjected to minute
electrical fields.
How Red Tacton works?
Touch
Touching, gripping, sitting, walking, stepping and other human
movements can be the triggers for unlocking or locking,
starting or stopping equipment, or obtaining data.
Communication speed can              Device drivers can be downloaded
deteriorate                          instantly and executable programs
in crowded spaces due to a lack of   can be quickly sent.(RED
Bandwidth (wireless LAN).            TACTON).
Any Media
In addition to the human body, various conductors and dielectrics
can be used as transmission media. Conductors and dielectrics
may also be used in combination
FIRMO


Firmo Kit is used as an alternative to short-range wireless
security-card entrance/exit systems.

NTT claim Firmo provides a higher degree of security than
other technologies.
Body-based networking is more secure than broadcast
systems.

Network congestion due to fall in transmission speed in
multi user environments is avoided.
It has no compelling applications that aren’t already available.


Too costly.


Widespread marketing campaigns and education.
One-to-One services




                  An alarm sounds automatically to
                  avoid accidental medicine
                  ingestion.




                  Touching advertising and receive
                  information
Intuitive operation of personal information devices




                              Touch a printer to print


                              Instantaneous private
                              network via personal
                              handshake
Device personalization




                         Just sitting in the seat
                         triggers the car to load all
                         its presets as the way you
                         like.

                         Just touching a phone
                         makes it your own.
New behavior patterns
                        Connect to the
                        network just by
                        putting a lap-top on
                        a table


                        Wireless headset
Security applications



                        User verification
                        and unlocking
                        with just a touch


                        Automatic access
                        log for
                        confidential
                        document storage
Conclusion



We conclude that, when we compare Red Tacton with other
technology present today it can give a better performance over
others
And we can say that to connect the network with in short
distances Red Tacton is best.
In this technology there is no problem of hackers as our body is
itself a media.
Future Developments



Reduction in size to be embedded in other communication
devices
Artificial Intelligence in Red Tacton
RED TACTON

Más contenido relacionado

La actualidad más candente

Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
Vinayak Hegde
 
Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
Sheel Shah
 
Redtacton - Human Area Network
Redtacton - Human Area NetworkRedtacton - Human Area Network
Redtacton - Human Area Network
Sayam Rakesh
 

La actualidad más candente (20)

Redtacton ppt
Redtacton pptRedtacton ppt
Redtacton ppt
 
Human Area Networking Technology
Human Area Networking TechnologyHuman Area Networking Technology
Human Area Networking Technology
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton final
Redtacton finalRedtacton final
Redtacton final
 
RedTacton
RedTactonRedTacton
RedTacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
RedTacton
RedTactonRedTacton
RedTacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Red tecton
Red tectonRed tecton
Red tecton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Redtacton technology
Redtacton technologyRedtacton technology
Redtacton technology
 
Redtacton Technology Intro
Redtacton Technology IntroRedtacton Technology Intro
Redtacton Technology Intro
 
REDTACTON
REDTACTONREDTACTON
REDTACTON
 
Report File On RedTacton
Report File On RedTactonReport File On RedTacton
Report File On RedTacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
Human Area Network
Human Area NetworkHuman Area Network
Human Area Network
 
Redtacton - Human Area Network
Redtacton - Human Area NetworkRedtacton - Human Area Network
Redtacton - Human Area Network
 

Destacado (6)

Red Tacton
Red TactonRed Tacton
Red Tacton
 
Red Tacton Final
Red Tacton FinalRed Tacton Final
Red Tacton Final
 
Red tacton
Red tactonRed tacton
Red tacton
 
Red tacton final ppt
Red tacton final pptRed tacton final ppt
Red tacton final ppt
 
Redtacton
RedtactonRedtacton
Redtacton
 
Redtacton technology
Redtacton technologyRedtacton technology
Redtacton technology
 

Similar a RED TACTON

49175819-red-tacton report.ppt
49175819-red-tacton report.ppt49175819-red-tacton report.ppt
49175819-red-tacton report.ppt
AbhiAavu
 
Human area networks(ad's)
Human area networks(ad's)Human area networks(ad's)
Human area networks(ad's)
Ankur Doda
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 

Similar a RED TACTON (20)

Redacton
RedactonRedacton
Redacton
 
Redtacton
RedtactonRedtacton
Redtacton
 
Myredtacton
MyredtactonMyredtacton
Myredtacton
 
Red tacton
Red tactonRed tacton
Red tacton
 
red tacton
red tactonred tacton
red tacton
 
Redtacton
Redtacton Redtacton
Redtacton
 
Sem
SemSem
Sem
 
49175819-red-tacton report.ppt
49175819-red-tacton report.ppt49175819-red-tacton report.ppt
49175819-red-tacton report.ppt
 
redtactonfinal
redtactonfinalredtactonfinal
redtactonfinal
 
RedTacton Technology
RedTacton TechnologyRedTacton Technology
RedTacton Technology
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Red tacton manu
Red tacton manuRed tacton manu
Red tacton manu
 
Human area networks(ad's)
Human area networks(ad's)Human area networks(ad's)
Human area networks(ad's)
 
Human area networks(ad's)
Human area networks(ad's)Human area networks(ad's)
Human area networks(ad's)
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
182 185
182 185182 185
182 185
 
Redtacton
RedtactonRedtacton
Redtacton
 
Red Tacton
Red TactonRed Tacton
Red Tacton
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Más de HITESH Kumawat

Intermediate band quantum dot solar cell
Intermediate band quantum dot solar cellIntermediate band quantum dot solar cell
Intermediate band quantum dot solar cell
HITESH Kumawat
 
Future technology trends and gadgets
Future technology trends and gadgetsFuture technology trends and gadgets
Future technology trends and gadgets
HITESH Kumawat
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
HITESH Kumawat
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technology
HITESH Kumawat
 
Autonomous Fire detection Robot
Autonomous Fire detection Robot Autonomous Fire detection Robot
Autonomous Fire detection Robot
HITESH Kumawat
 
INFRARED TEMPERATURE DETECTOR
INFRARED TEMPERATURE DETECTORINFRARED TEMPERATURE DETECTOR
INFRARED TEMPERATURE DETECTOR
HITESH Kumawat
 
T rays technology in future scanners
T rays technology in future scannersT rays technology in future scanners
T rays technology in future scanners
HITESH Kumawat
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2
HITESH Kumawat
 

Más de HITESH Kumawat (12)

Intermediate band quantum dot solar cell
Intermediate band quantum dot solar cellIntermediate band quantum dot solar cell
Intermediate band quantum dot solar cell
 
Future technology trends and gadgets
Future technology trends and gadgetsFuture technology trends and gadgets
Future technology trends and gadgets
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Touch screen technology
Touch screen technologyTouch screen technology
Touch screen technology
 
Blue eyes
Blue eyesBlue eyes
Blue eyes
 
Autonomous Fire detection Robot
Autonomous Fire detection Robot Autonomous Fire detection Robot
Autonomous Fire detection Robot
 
INFRARED TEMPERATURE DETECTOR
INFRARED TEMPERATURE DETECTORINFRARED TEMPERATURE DETECTOR
INFRARED TEMPERATURE DETECTOR
 
T rays technology in future scanners
T rays technology in future scannersT rays technology in future scanners
T rays technology in future scanners
 
Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2Tracking and positioning_of_mobile_systems_in_telecom_network_2
Tracking and positioning_of_mobile_systems_in_telecom_network_2
 
Ktps presentation
Ktps presentationKtps presentation
Ktps presentation
 
RAPS
RAPSRAPS
RAPS
 
Optical computing1
Optical computing1Optical computing1
Optical computing1
 

Último

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Último (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

RED TACTON

  • 1.
  • 4. What is Red Tacton? Red Tacton is a new Human Area Networking technology. Uses the surface of the human body as a safe, high speed network transmission path. It uses the minute electric field emitted on the surface of the human body.
  • 5. RedTacton Developed by NTT from Japan. Claims to send data over the surface of skin. Attains a speed up to 10 Mbps --- equivalent to a fast broadband connection. Uses weak electric fields on the surface of human body instead of relying on EM waves or light waves.
  • 7. Principle Red Tacton relies upon the principle that the optical properties of an electro-optic crystal can vary according to the changes of a weak electric field.
  • 8. Block Diagram of RedTacton Transceiver
  • 10. Human Safety The transmitting and receiving electrodes of the transceiver are completely covered with insulated film. Impossible for current to flow from the transceiver to the human body. When communication occurs, displacement current is generated by the electrons in the body because body is subjected to minute electrical fields.
  • 11. How Red Tacton works?
  • 12.
  • 13.
  • 14. Touch Touching, gripping, sitting, walking, stepping and other human movements can be the triggers for unlocking or locking, starting or stopping equipment, or obtaining data.
  • 15. Communication speed can Device drivers can be downloaded deteriorate instantly and executable programs in crowded spaces due to a lack of can be quickly sent.(RED Bandwidth (wireless LAN). TACTON).
  • 16. Any Media In addition to the human body, various conductors and dielectrics can be used as transmission media. Conductors and dielectrics may also be used in combination
  • 17.
  • 18. FIRMO Firmo Kit is used as an alternative to short-range wireless security-card entrance/exit systems. NTT claim Firmo provides a higher degree of security than other technologies.
  • 19. Body-based networking is more secure than broadcast systems. Network congestion due to fall in transmission speed in multi user environments is avoided.
  • 20. It has no compelling applications that aren’t already available. Too costly. Widespread marketing campaigns and education.
  • 21. One-to-One services An alarm sounds automatically to avoid accidental medicine ingestion. Touching advertising and receive information
  • 22. Intuitive operation of personal information devices Touch a printer to print Instantaneous private network via personal handshake
  • 23. Device personalization Just sitting in the seat triggers the car to load all its presets as the way you like. Just touching a phone makes it your own.
  • 24. New behavior patterns Connect to the network just by putting a lap-top on a table Wireless headset
  • 25. Security applications User verification and unlocking with just a touch Automatic access log for confidential document storage
  • 26. Conclusion We conclude that, when we compare Red Tacton with other technology present today it can give a better performance over others And we can say that to connect the network with in short distances Red Tacton is best. In this technology there is no problem of hackers as our body is itself a media.
  • 27. Future Developments Reduction in size to be embedded in other communication devices Artificial Intelligence in Red Tacton