Xerox Memory Labels Fight Counterfeiting

xerox-printed-memory-20-bit-memory-label-100614666-primary.idge.jpg

A printed "memory label" from Thinfilm and Xerox that will store 36 bits of data that can be encrypted and used for authentication and tracking

Xerox has announced two new printed packaging labels that can store 36 bits on rewritable memory. The labels are aimed at combating counterfeiting and helping businesses and government better secure products as they are distributed.

The two printed electronic labels, which Xerox is also calling "printed memory," can collect and store information about the authenticity and condition of products, storing up to 68 billion points of data, the company said.
The labels, for example, can be used to determine if a product is genuine and to track how it's been handled during distribution, Xerox said. "This makes it possible to ensure the integrity of a product from the time it leaves the factory to the time it gets into the hands of a customer," Steve Simpson, a Xerox vice president, said in a statement.
Other uses for the rewritable data within each tag could be to identify if a medication refill has been authorized, if a shipping tax has been paid or if a package has passed through an authorized distributor.
The memory labels can be scanned using a simple smartphone-based reader. The key label verification features will work offline, allowing secure validation of an object or process without being bound to the Internet.
The memory labels can store up to 68 billion bit pattern combinations because each binary digit (0 or 1) can be combined for 2^2 or 4 possibilities (00, 01, 10, 11). When there are three bits, there are 2^3 or 8 possibilities (000, 001, 010, 011, 100, 101, 110, 111). Scaled to 36 bits, there are more than 68 billion possible bit pattern combinations, according to Bill Cummings, a spokesman for Thin Film Electronics ASA.
"In practical terms, it means that a relatively small number of bits can be used to digitally record important information about a labeled product as it moves through the supply chain and distribution network," Cummings said. "In addition to a core yes/no verification of product authenticity, the memory bits can verify the intended distribution channel and other item-specific information, such as region code, warrant info, service history, etc., to assist brands and their partners."
Xerox licensed the proprietary printed memory technology from Thin Film, a Norwegian company. Xerox plans to produce printed memory at its plant in Webster, NY.
One of the printed memory labels also includes cryptographic security through a unique, encrypted printed code such as a QR bar code.
"Traditional anti-counterfeiting methods such as invisible ink, holograms and RFID tags can be easily copied and hacked, and are often expensive to implement," Xerox said in its announcement. "This combination of printed memory with an encrypted printed code creates one of the most secure anti-counterfeit solutions on the market."
For the past few years, Xerox subsidiary Palo Alto Research Center Inc. (PARC) and Thin Film have been working together on combining digital cryptography with smart labels based on Thin Film's Addressable Memory.
While not disclosing a price for the labels, Xerox said they are inexpensive and difficult to counterfeit as every stamp is uniquely encrypted and can be created only by authorized personnel. In addition, key features will work offline, allowing secure validation of an object or process without being bound to the Internet.
"Keeping ahead of counterfeiters is a complex challenge that requires an unprecedented level of security in a growing global market," Thin Film CEO Davor Sutija said in a statement. "We are pleased to provide Xerox and its customers with another layer of defense to combat counterfeiting across multiple industries."
The printed memory labels will be showcased at Pharma Expo, a pharmaceutical processing and packaging conference and trade show being held in Las Vegas Sept. 28 through Sept. 30.
Computerworld:  http://bit.ly/1KqaKP2
 

« Google's Self-driving Car Push Spurs Hiring Spree
How Susceptible are U.S Jobs To Automation? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.

MOBIA Technology Innovations

MOBIA Technology Innovations

MOBIA is a leading Canadian business transformation partner, helping businesses across industries evolve.