You are here

Award Data

For best search results, use the search terms first and then apply the filters
Reset

The Award database is continually updated throughout the year. As a result, data for FY24 is not expected to be complete until March, 2025.

Download all SBIR.gov award data either with award abstracts (290MB) or without award abstracts (65MB). A data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.

The SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.

  1. Advanced Unattended Ground Sensor (AUGS)

    SBC: Systems & Processes Engineering Corporation            Topic: HSB062003

    SPEC will develop and deliver a suite of extended duration (2 year+), covert, unattended sensors for near real-time monitoring of the passage of people and vehicles in critical, remote border areas. The Advanced Unattended Ground Sensor (AUGS) will form a robust network of sensors, using a variable information bridge, to relay actionable information to the Customs and Border Patrol (CBP). Advanced ...

    SBIR Phase II 2008 Department of Homeland Security
  2. A Layered Service Provider/Customer Approach to Call Spoofing

    SBC: SECURELOGIX CORPORATION            Topic: HSB0171003

    Our proposed solution is based upon three primary concepts. First, we define the Authentication Engine, which is a cloud-based service that is passed simple information about a call, masks the complexity of using a variety of techniques to detect spoofing or authenticate the caller, and returns a score and actionable category for a very wide variety of scenarios. Second, we are making heavy use of ...

    SBIR Phase II 2018 Department of Homeland Security
  3. Bio-Advise- A Rapid and Fully Automated Biothreat Evaluation Model

    SBC: LYNNTECH INC.            Topic: HSB062002

    In the event of a biological threat, first responders need tools that enable them to rapidly determine if a release is real or a hoax, which requires identifying multiple threat agents from a complex environmental sample. Current threat analysis is costly, time-consuming, and requires complex procedures with considerable expertise to execute. Lynntech s solution is BioAdvise, a simple, self-contai ...

    SBIR Phase II 2008 Department of Homeland Security
  4. CNT-Based D2 Ion Source for Improved Neutron and Photon Generator

    SBC: APPLIED NANOTECH, INC.            Topic: HSB072007

    Applied Nanotech, Inc. (ANI) proposes to develop a novel field ionization technology to produce a deuterium ion (D+) current for a neutron source or gamma-ray source enabling fast switching, high repetition rate and high yields. Carbon nanotubes (CNT) have a high aspect ratio structure (they are long and narrow) that induces high electric field concentration, thus they are ideal choices for electr ...

    SBIR Phase II 2008 Department of Homeland Security
  5. Distributed Network Attack (DNA)-Grid

    SBC: AccessData Corporation            Topic: HSB071006

    AccessData is proposing enhancements to its Distributed Network Attack (DNA)product to increase the functionality which will increase the number of workstations that can participate in the system; from approximately 1,000 to potentially 1,000,000 workstations. This will be accomplished by coupling its world class password attack technology with a proven open source desktop grid computing infrastru ...

    SBIR Phase II 2008 Department of Homeland Security
  6. Novel Methods to Measure Penetrator Dynamics in Multi-Layer Geometries

    SBC: Thornton Tomasetti, Inc.            Topic: DTRA07011

    In Phase I of this effort we analyzed the structural response of a BLU 109 during typical penetration events. Based on these finite element results, we proposed and demsonstrated a simple robust concept for a passive penetrator sensor that identifies the material being penetrated and also correlates strongly with its underground trajectory. Such a sensor would obviously provide valuable informatio ...

    SBIR Phase II 2008 Department of DefenseDefense Threat Reduction Agency
  7. Plan Learning Across Textual Observations (PLATO) Phase II

    SBC: LANGUAGE COMPUTER CORPORATION            Topic: DTRA162004

    In Phase II of PLATO, we will develop a prototype plan and goal identification system that employs a rich model of domain actions and events, extracted automatically from a massive amount of real-world domain-relevant information, to model agent-specific action costs and to process sequences of agent actions and events, extracted from text, as an agent plan in progress. The system will be able to ...

    SBIR Phase II 2018 Department of DefenseDefense Threat Reduction Agency
  8. Portable, Fieldable, Non- Helium-3 Based Neutron Multiplicity Counter

    SBC: PROPORTIONAL TECHNOLOGIES, INC.            Topic: DTRA162007

    Neutron coincidence counters are currently based on 3H technology. A worldwide 3He shortage plus the need for significant improvements in performance necessitate the development of a new class of neutron detectors. We propose the use of boron-coated straw

    SBIR Phase II 2018 Department of DefenseDefense Threat Reduction Agency
  9. Real-Time Authentication to Counter Caller ID Spoofing

    SBC: Illuma Labs Inc.            Topic: HSB0171003

    Vulnerabilities in telecommunications channels are being exploited at alarming rates by malicious attackers to commit fraud, perpetrate scams, and organize data breaches. In addition to financial losses incurred by corporations and taxpayers, attacks against government agencies such as the DHS can severely compromise national security. A common element of these attacks is the attacker's ability to ...

    SBIR Phase II 2018 Department of Homeland Security
  10. Sensor Fusion Software to aid in response and evacuation of subterranean incidents

    SBC: DAX TECHNOLOGIES INTERNATIONAL            Topic: HSB071002

    The speed at which an attack is detected is a critical trigger for all responses to follow. The accurate determination of the type of attack will determine the type of emergency personnel and response needed. The location will determine the target response area as well as determine by proximity which of the responders that are available can be first on the scene. Therefore, a system that can do th ...

    SBIR Phase II 2008 Department of Homeland Security
US Flag An Official Website of the United States Government