Hong Kong Logistics and Supply Chain MultiTech R&D Centre > Technology Commercialisation > Product & System Service
Product & System Service

LSCM has a rich portfolio of ready-to-market technologies for commercialisation by industries. By clicking the items from below three categories (Technology, Industry, System), the solutions will be shown according to your needs.

Step 1:

Click the item under TECHNOLOGY (eg. Active RFID, related solutions will be shown underneath.)

Step 2:

To further narrow the search according to specific industry, click item under INDUSTRY (eg. Logistics & Supply Chain Management, solutions related to “Active RFID” technology and “Logistics & Supply Chain Management” industry will be shown underneath.)

Step 3:

To further narrow the search according to specific system, click item under SYSTEM (eg. Application/Service System, solutions related to “Active RFID” technology, “Logistics & Supply Chain Management” industry and “Application/Service System” will be shown underneath.)

Step 4:

To reset the search, click “Reset” on top right

For more details, please contact us at tech-transfer@lscm.hk.

Search result(s): 3

Product & System Service Industry System Technology Deliverables

SHIELD - Critical Infrastructure Protection in Hong Kong

e-Commerce Security Systems Internet Security
  1. SHIELD smart box (Smart Hacking and Intrusion Entrapment with Lawful Detection)
  2. Sanitization tool design
  3. Cyber attack profiling model design

(PSTS) Trial: SHIELD

e-Commerce Security Systems Internet Security
  1. SHIELD Smartbox Software executable (WIRE embedded)
  2. TESTUDO server software executable (WIRE embedded)

IoT Security Evaluation Testbed (IoT-SET)

e-Commerce IoT Systems,Security Systems Internet Security
  1. IoT Security evaluation testbed (software and hardware)
  2. Smart home testbed (software and hardware)
  3. Software programs - attack scenarios against confidentiality, against integrity and against availability for IoT devices (Softwre)
  4. Software library - logging module to collect attack data (Software)