Xerox Memory Labels Fight Counterfeiting

xerox-printed-memory-20-bit-memory-label-100614666-primary.idge.jpg

A printed "memory label" from Thinfilm and Xerox that will store 36 bits of data that can be encrypted and used for authentication and tracking

Xerox has announced two new printed packaging labels that can store 36 bits on rewritable memory. The labels are aimed at combating counterfeiting and helping businesses and government better secure products as they are distributed.

The two printed electronic labels, which Xerox is also calling "printed memory," can collect and store information about the authenticity and condition of products, storing up to 68 billion points of data, the company said.
The labels, for example, can be used to determine if a product is genuine and to track how it's been handled during distribution, Xerox said. "This makes it possible to ensure the integrity of a product from the time it leaves the factory to the time it gets into the hands of a customer," Steve Simpson, a Xerox vice president, said in a statement.
Other uses for the rewritable data within each tag could be to identify if a medication refill has been authorized, if a shipping tax has been paid or if a package has passed through an authorized distributor.
The memory labels can be scanned using a simple smartphone-based reader. The key label verification features will work offline, allowing secure validation of an object or process without being bound to the Internet.
The memory labels can store up to 68 billion bit pattern combinations because each binary digit (0 or 1) can be combined for 2^2 or 4 possibilities (00, 01, 10, 11). When there are three bits, there are 2^3 or 8 possibilities (000, 001, 010, 011, 100, 101, 110, 111). Scaled to 36 bits, there are more than 68 billion possible bit pattern combinations, according to Bill Cummings, a spokesman for Thin Film Electronics ASA.
"In practical terms, it means that a relatively small number of bits can be used to digitally record important information about a labeled product as it moves through the supply chain and distribution network," Cummings said. "In addition to a core yes/no verification of product authenticity, the memory bits can verify the intended distribution channel and other item-specific information, such as region code, warrant info, service history, etc., to assist brands and their partners."
Xerox licensed the proprietary printed memory technology from Thin Film, a Norwegian company. Xerox plans to produce printed memory at its plant in Webster, NY.
One of the printed memory labels also includes cryptographic security through a unique, encrypted printed code such as a QR bar code.
"Traditional anti-counterfeiting methods such as invisible ink, holograms and RFID tags can be easily copied and hacked, and are often expensive to implement," Xerox said in its announcement. "This combination of printed memory with an encrypted printed code creates one of the most secure anti-counterfeit solutions on the market."
For the past few years, Xerox subsidiary Palo Alto Research Center Inc. (PARC) and Thin Film have been working together on combining digital cryptography with smart labels based on Thin Film's Addressable Memory.
While not disclosing a price for the labels, Xerox said they are inexpensive and difficult to counterfeit as every stamp is uniquely encrypted and can be created only by authorized personnel. In addition, key features will work offline, allowing secure validation of an object or process without being bound to the Internet.
"Keeping ahead of counterfeiters is a complex challenge that requires an unprecedented level of security in a growing global market," Thin Film CEO Davor Sutija said in a statement. "We are pleased to provide Xerox and its customers with another layer of defense to combat counterfeiting across multiple industries."
The printed memory labels will be showcased at Pharma Expo, a pharmaceutical processing and packaging conference and trade show being held in Las Vegas Sept. 28 through Sept. 30.
Computerworld:  http://bit.ly/1KqaKP2
 

« Google's Self-driving Car Push Spurs Hiring Spree
How Susceptible are U.S Jobs To Automation? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

SGCyberSecurity

SGCyberSecurity

SGCyberSecurity is Singapore's No.1 Cyber Security portal. From this platform, you will be able to find useful articles, resources and connect with the security companies for your business needs.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.