Xerox Memory Labels Fight Counterfeiting

xerox-printed-memory-20-bit-memory-label-100614666-primary.idge.jpg

A printed "memory label" from Thinfilm and Xerox that will store 36 bits of data that can be encrypted and used for authentication and tracking

Xerox has announced two new printed packaging labels that can store 36 bits on rewritable memory. The labels are aimed at combating counterfeiting and helping businesses and government better secure products as they are distributed.

The two printed electronic labels, which Xerox is also calling "printed memory," can collect and store information about the authenticity and condition of products, storing up to 68 billion points of data, the company said.
The labels, for example, can be used to determine if a product is genuine and to track how it's been handled during distribution, Xerox said. "This makes it possible to ensure the integrity of a product from the time it leaves the factory to the time it gets into the hands of a customer," Steve Simpson, a Xerox vice president, said in a statement.
Other uses for the rewritable data within each tag could be to identify if a medication refill has been authorized, if a shipping tax has been paid or if a package has passed through an authorized distributor.
The memory labels can be scanned using a simple smartphone-based reader. The key label verification features will work offline, allowing secure validation of an object or process without being bound to the Internet.
The memory labels can store up to 68 billion bit pattern combinations because each binary digit (0 or 1) can be combined for 2^2 or 4 possibilities (00, 01, 10, 11). When there are three bits, there are 2^3 or 8 possibilities (000, 001, 010, 011, 100, 101, 110, 111). Scaled to 36 bits, there are more than 68 billion possible bit pattern combinations, according to Bill Cummings, a spokesman for Thin Film Electronics ASA.
"In practical terms, it means that a relatively small number of bits can be used to digitally record important information about a labeled product as it moves through the supply chain and distribution network," Cummings said. "In addition to a core yes/no verification of product authenticity, the memory bits can verify the intended distribution channel and other item-specific information, such as region code, warrant info, service history, etc., to assist brands and their partners."
Xerox licensed the proprietary printed memory technology from Thin Film, a Norwegian company. Xerox plans to produce printed memory at its plant in Webster, NY.
One of the printed memory labels also includes cryptographic security through a unique, encrypted printed code such as a QR bar code.
"Traditional anti-counterfeiting methods such as invisible ink, holograms and RFID tags can be easily copied and hacked, and are often expensive to implement," Xerox said in its announcement. "This combination of printed memory with an encrypted printed code creates one of the most secure anti-counterfeit solutions on the market."
For the past few years, Xerox subsidiary Palo Alto Research Center Inc. (PARC) and Thin Film have been working together on combining digital cryptography with smart labels based on Thin Film's Addressable Memory.
While not disclosing a price for the labels, Xerox said they are inexpensive and difficult to counterfeit as every stamp is uniquely encrypted and can be created only by authorized personnel. In addition, key features will work offline, allowing secure validation of an object or process without being bound to the Internet.
"Keeping ahead of counterfeiters is a complex challenge that requires an unprecedented level of security in a growing global market," Thin Film CEO Davor Sutija said in a statement. "We are pleased to provide Xerox and its customers with another layer of defense to combat counterfeiting across multiple industries."
The printed memory labels will be showcased at Pharma Expo, a pharmaceutical processing and packaging conference and trade show being held in Las Vegas Sept. 28 through Sept. 30.
Computerworld:  http://bit.ly/1KqaKP2
 

« Google's Self-driving Car Push Spurs Hiring Spree
How Susceptible are U.S Jobs To Automation? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Cura Software Solutions

Cura Software Solutions

Cura Software Solutions (formerly Cura Technologies) is a market-leader in Governance, Risk and Compliance (GRC) enterprise applications.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Cybersecurity Competence Center (C3)

Cybersecurity Competence Center (C3)

The Cybersecurity Competence Center was created to further strengthen the Luxembourg economy in the field of cybersecurity.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

Phone Monitoring Service

Phone Monitoring Service

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe.