Xerox Memory Labels Fight Counterfeiting

xerox-printed-memory-20-bit-memory-label-100614666-primary.idge.jpg

A printed "memory label" from Thinfilm and Xerox that will store 36 bits of data that can be encrypted and used for authentication and tracking

Xerox has announced two new printed packaging labels that can store 36 bits on rewritable memory. The labels are aimed at combating counterfeiting and helping businesses and government better secure products as they are distributed.

The two printed electronic labels, which Xerox is also calling "printed memory," can collect and store information about the authenticity and condition of products, storing up to 68 billion points of data, the company said.
The labels, for example, can be used to determine if a product is genuine and to track how it's been handled during distribution, Xerox said. "This makes it possible to ensure the integrity of a product from the time it leaves the factory to the time it gets into the hands of a customer," Steve Simpson, a Xerox vice president, said in a statement.
Other uses for the rewritable data within each tag could be to identify if a medication refill has been authorized, if a shipping tax has been paid or if a package has passed through an authorized distributor.
The memory labels can be scanned using a simple smartphone-based reader. The key label verification features will work offline, allowing secure validation of an object or process without being bound to the Internet.
The memory labels can store up to 68 billion bit pattern combinations because each binary digit (0 or 1) can be combined for 2^2 or 4 possibilities (00, 01, 10, 11). When there are three bits, there are 2^3 or 8 possibilities (000, 001, 010, 011, 100, 101, 110, 111). Scaled to 36 bits, there are more than 68 billion possible bit pattern combinations, according to Bill Cummings, a spokesman for Thin Film Electronics ASA.
"In practical terms, it means that a relatively small number of bits can be used to digitally record important information about a labeled product as it moves through the supply chain and distribution network," Cummings said. "In addition to a core yes/no verification of product authenticity, the memory bits can verify the intended distribution channel and other item-specific information, such as region code, warrant info, service history, etc., to assist brands and their partners."
Xerox licensed the proprietary printed memory technology from Thin Film, a Norwegian company. Xerox plans to produce printed memory at its plant in Webster, NY.
One of the printed memory labels also includes cryptographic security through a unique, encrypted printed code such as a QR bar code.
"Traditional anti-counterfeiting methods such as invisible ink, holograms and RFID tags can be easily copied and hacked, and are often expensive to implement," Xerox said in its announcement. "This combination of printed memory with an encrypted printed code creates one of the most secure anti-counterfeit solutions on the market."
For the past few years, Xerox subsidiary Palo Alto Research Center Inc. (PARC) and Thin Film have been working together on combining digital cryptography with smart labels based on Thin Film's Addressable Memory.
While not disclosing a price for the labels, Xerox said they are inexpensive and difficult to counterfeit as every stamp is uniquely encrypted and can be created only by authorized personnel. In addition, key features will work offline, allowing secure validation of an object or process without being bound to the Internet.
"Keeping ahead of counterfeiters is a complex challenge that requires an unprecedented level of security in a growing global market," Thin Film CEO Davor Sutija said in a statement. "We are pleased to provide Xerox and its customers with another layer of defense to combat counterfeiting across multiple industries."
The printed memory labels will be showcased at Pharma Expo, a pharmaceutical processing and packaging conference and trade show being held in Las Vegas Sept. 28 through Sept. 30.
Computerworld:  http://bit.ly/1KqaKP2
 

« Google's Self-driving Car Push Spurs Hiring Spree
How Susceptible are U.S Jobs To Automation? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Hacker House

Hacker House

Hacker House teaches you what hackers can learn about your business and systems so that preventative solutions to protect your assets can be applied through active measures.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.