Technology Overview
Creating acoustic "fingerprints" and interpreting spatial state through temporal changes.
EchoPrint is "the frequency response curve of a space"
When high-frequency audio is emitted from a speaker, sound waves spread throughout the space and reflect off walls, floors, ceilings, and people. These reflections overlap to create constructive and destructive interference — amplifying certain frequencies and canceling others. By sweeping across frequencies and measuring each one's response intensity, an amplitude curve across the spectrum emerges. This is the EchoPrint — an acoustic fingerprint of the space.
Two types of change with different characteristics
Deformation vs Shift
Irregular Deformation
Changes in occupancy, movement, or position alter interference conditions, irregularly deforming the peaks and valleys of the EchoPrint. This irregularity is interpreted as a "movement/state change" signal.
Pattern Shift
When air conditions (temperature, etc.) change, acoustic propagation characteristics shift, causing the EchoPrint to gradually drift over time. Tracking this drift provides an "environmental/temperature trend" signal.
Processing Pipeline
Emit & Capture
Emit high-frequency sound and capture the spatial frequency response via microphone
EchoPrint Analysis
Extract EchoPrint from the response and analyze temporal changes
Decision & Action
Assess the situation based on analysis and trigger alerts as needed
Creating "situational data" with EDM
By processing EchoPrint change metrics along spatial and temporal axes into EDM-format feature data, we can systematize state classification (normal/abnormal/disturbed) and environment-specific tuning—enabling a data-driven approach beyond simple rule-based methods.
Open/disturbed environments are a matter of "policy + tuning"
External noise, vibration, window openings, and structural changes can affect frequency response patterns. EchoPrint addresses these disturbances with (1) filtering and outlier suppression, (2) temperature shift compensation, and (3) safety alert policies (staged alerts, confirmation requests, delayed triggers).