Xerox Memory Labels Fight Counterfeiting

xerox-printed-memory-20-bit-memory-label-100614666-primary.idge.jpg

A printed "memory label" from Thinfilm and Xerox that will store 36 bits of data that can be encrypted and used for authentication and tracking

Xerox has announced two new printed packaging labels that can store 36 bits on rewritable memory. The labels are aimed at combating counterfeiting and helping businesses and government better secure products as they are distributed.

The two printed electronic labels, which Xerox is also calling "printed memory," can collect and store information about the authenticity and condition of products, storing up to 68 billion points of data, the company said.
The labels, for example, can be used to determine if a product is genuine and to track how it's been handled during distribution, Xerox said. "This makes it possible to ensure the integrity of a product from the time it leaves the factory to the time it gets into the hands of a customer," Steve Simpson, a Xerox vice president, said in a statement.
Other uses for the rewritable data within each tag could be to identify if a medication refill has been authorized, if a shipping tax has been paid or if a package has passed through an authorized distributor.
The memory labels can be scanned using a simple smartphone-based reader. The key label verification features will work offline, allowing secure validation of an object or process without being bound to the Internet.
The memory labels can store up to 68 billion bit pattern combinations because each binary digit (0 or 1) can be combined for 2^2 or 4 possibilities (00, 01, 10, 11). When there are three bits, there are 2^3 or 8 possibilities (000, 001, 010, 011, 100, 101, 110, 111). Scaled to 36 bits, there are more than 68 billion possible bit pattern combinations, according to Bill Cummings, a spokesman for Thin Film Electronics ASA.
"In practical terms, it means that a relatively small number of bits can be used to digitally record important information about a labeled product as it moves through the supply chain and distribution network," Cummings said. "In addition to a core yes/no verification of product authenticity, the memory bits can verify the intended distribution channel and other item-specific information, such as region code, warrant info, service history, etc., to assist brands and their partners."
Xerox licensed the proprietary printed memory technology from Thin Film, a Norwegian company. Xerox plans to produce printed memory at its plant in Webster, NY.
One of the printed memory labels also includes cryptographic security through a unique, encrypted printed code such as a QR bar code.
"Traditional anti-counterfeiting methods such as invisible ink, holograms and RFID tags can be easily copied and hacked, and are often expensive to implement," Xerox said in its announcement. "This combination of printed memory with an encrypted printed code creates one of the most secure anti-counterfeit solutions on the market."
For the past few years, Xerox subsidiary Palo Alto Research Center Inc. (PARC) and Thin Film have been working together on combining digital cryptography with smart labels based on Thin Film's Addressable Memory.
While not disclosing a price for the labels, Xerox said they are inexpensive and difficult to counterfeit as every stamp is uniquely encrypted and can be created only by authorized personnel. In addition, key features will work offline, allowing secure validation of an object or process without being bound to the Internet.
"Keeping ahead of counterfeiters is a complex challenge that requires an unprecedented level of security in a growing global market," Thin Film CEO Davor Sutija said in a statement. "We are pleased to provide Xerox and its customers with another layer of defense to combat counterfeiting across multiple industries."
The printed memory labels will be showcased at Pharma Expo, a pharmaceutical processing and packaging conference and trade show being held in Las Vegas Sept. 28 through Sept. 30.
Computerworld:  http://bit.ly/1KqaKP2
 

« Google's Self-driving Car Push Spurs Hiring Spree
How Susceptible are U.S Jobs To Automation? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.