The Experts in Machine - Readable Authentication 1 Presenting a new Chipless technology for low cost RFID applications.

Slides:



Advertisements
Similar presentations
Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what.
Advertisements

Prospecting – The Lifeblood of Selling
© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
( , RF/RFID Technology & Commercialization Forum Technology Service Corporation Jitti Sukontasup ( ,
Alien Technology® Patti Blessing Director Business Development
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Smart Tracking: Usage of IPv6 in RFID System for Global Mobility
Flexible Airborne Architecture
Addition Facts
13.1 Vis_2003 Data Visualization Lecture 13 Visualization of Very Large Datasets.
NexSentry Imaging Solutions
B2B Solutions Study Summary Charts June – September 2013.
1 1st China RFID Benchmarking Test Forum & MOU Signing Ceremony Johnson Yim.
Made Harta Dwijaksara Park, Yi Jae
Configuration management
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
The right asset. In the right place. At the right time. Card Printers Supplies Presenter: Jaime Silvar, Product Specialist Date: May 14, 2010.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
The Office Procedures and Technology
MARKETING INFORMATION AND RESEARCH
Desktop Printing Supplies: The Global Market & South Africa Steve Bambridge Lyra Research October 10, 2003.
Brand Protection & Authentication Solutions Confidential Information
New-Product Development and Product Life-Cycle Strategies
Heppenheim Producer-Archive Interface Specification Status of standardisation project Main characteristics, major changes, items pending.
1 WTO and medicines: from Doha to Cancún Germán Velásquez Essential Drugs and Medicines Policy World Health Organization Geneva, October 2003.
Addition 1’s to 20.
Week 1.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
International Strategy and Organization
Chapter 11 International Strategy and Organization
DETC ASME Computers and Information in Engineering Conference ONE AND TWO DIMENSIONAL DATA ANALYSIS USING BEZIER FUNCTIONS P.Venkataraman Rochester.
Internal Analysis.
Progress Report on Chipless RFID Applications
|1 Eye Surgery Center Of Hawaii Skai Vision Institute Eyegenix Endoscopy Institute Of Hawaii Endoscopy Institute Of Hawaii.
Cypak, the Future of Ink on Packaging September 12 th 2007, London Danevert Åsbrink, VP Sales, Cypak AB, Sweden.
preventing counterfeit …
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
SMT Proprietary and Confidential
PhRMA Presentation to FDA: Bar Codes to Reduce Medication Errors
Using 2D Code Presented By Derreck Ford Jet Equipment Corporation Fall Seminar.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
B2C Extended Packaging Bar Code Standard
BAR CODE SCANNER A.ANUSHA (06N61A0402). What is bar code? A barcode is a machine readable representation of information. Barcode stores data in widths.
RFID: The Next Big Little Thing William T. Colleran, Ph.D. President & CEO, Impinj Inc. Copyright 2003 Impinj, Inc. All rights reserved.
Khanh Huynh Project Leader Dat Tu Systems Analyst Sandy Fung Team Representative Patrick de Leon Lead Programmer Ching Fei Chan Documentation Specialist.
Corporate Automation Plan PHASE 2 February 4, 2004Washington D.C.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
The Experts in Machine - Readable Authentication 1 Customized Security Solutions by InkSure Award Winner.
The Experts in Machine - Readable Authentication 1 Introducing TrackSure ™ by InkSure Award Winner.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
Two Trends and Four Features from a Warehouse Perspective Melvin Fletcher.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Radio frequency identification (RFID) Opportunities for mobile telecommunication services ______________ ______________.
3506-D WEST LAKE CENTER DRIVE,
English for Advance Learners I
Preventative Measures
What is a Radio-Frequency Identification (RFID) tag?
Radio Frequency Identification (RFID)
Radio Frequency Identification
Automatic Identification and Data Collection Technology
Presentation transcript:

The Experts in Machine - Readable Authentication 1 Presenting a new Chipless technology for low cost RFID applications

The Experts in Machine - Readable Authentication 2 InkSure Technologies Provider of covert, machine readable security solutions (CMRT) to definitively and quickly identify genuine branded products and documents for protection against counterfeiting Our expertise in spectral detection of covert marks enables InkSure to provide the most advanced readers in the authentication industry 4 ½ years of commercial sales Billions of consumer products protected with InkSure technology Product and Image Security (PISEC) award winner: 2000,2003,2006 Member Document Security Alliance (DSA) and North America Security Products Organization (NASPO) U.S. public corporation (INKS.OB) Corporate Headquarters in Fort Lauderdale, FL; Global R&D Center at the Science Park in Rehovot, Israel

The Experts in Machine - Readable Authentication 3 Wholly owned subsidiary of InkSure Technologies Inc. Holder of 3 patents, 1 patent application to print and read Chipless RF labels for various RFID applications Highly skilled dedicated R&D team for reader/label development Proof of concept successfully demonstrated publicly at IDTechExs RFID Smart Labels USA 2006 conference in Boston, March 29. Approaching initial field testing, with commercial sales expected by end of 2007 InkSure RF

The Experts in Machine - Readable Authentication 4 So What is Chipless? RFID systems involving codes/symbology that do not contain a silicon chip Potential to produce the lowest cost RFID tag Capabilities for printing directly on top of products or packaging Passive/ Read only Frequencies above UHF

The Experts in Machine - Readable Authentication 5 Tens of Millions= Secure access, test tubes/blood samples, toys Hundreds of millions= Laundry, library, livestock, logistics, assets security Billions = Pallets, cases, air baggage, smart paper tickets, banknotes, financial cards, parcels drugs, archiving Trillions= Supermarket barcodes, brand protection Yearly Market Potential Source: IDTechEX Today, no more than several hundred million RFID devices are sold yearly.

The Experts in Machine - Readable Authentication 6 Tag price* Chipless Chip Anti-theft 1 bitIDMore Data k bit 2c 10c 32c 4c 10-20c Range 1m Range 0.1m Target to sell trillions a year 96 bits *When bought in millions Tag Price Comparisons Source: IDTechEX

The Experts in Machine - Readable Authentication 7 InkSure Vision for Chipless RFID Achieve a sub-cent cost target for fully printed tag Provide a completely printed symbology on or within the product/package using digital or conventional printing technologies with focus on inkjet engines. Provide an anti-counterfeiting solution based on the unique RF properties of the ink used for printing the tag. Address the reading of printed labels in difficult real life conditions Non-line of sight Any orientation/angle Anti collision effect-identify single tags within tag groups Provide 25bit to 96bit information applications

The Experts in Machine - Readable Authentication 8 How our Technology Works The existence of diffraction has limited the extent to which symbols or images (such as barcodes) can be compressed. Diffraction is the bending, spreading and interference of waves when they pass by an obstruction or through a gap. When a bar code symbol is placed too near another symbol, its waves interfere with those of its neighbour (diffraction) and vice versa, making it impossible to accurately read either bar. This limitation has restricted the density with which symbol based codes can be printed, and therefore the minimum size required for machine- readable codes. By extension, this has also limited the number of digits which can be used, for example, in barcodes.

The Experts in Machine - Readable Authentication 9 Technology: Diffraction Phenomena Current technologies do not take into account that the diffraction phenomena are predictable. That is, it is possible to place 2D objects within extremely high density, yet still use deductive methods to identify them Although the labels produced using this method are 2- dimensional, the phenomena itself produces a 3D effect. In this way, it is possible to derive the exact position of the label, even if behind an obstacle. This capability minimizes the challenge of correctly identifying objects that are located directly behind other objects (collision)

The Experts in Machine - Readable Authentication 10 Technology: Using The Diffraction Phenomena Our approach : devise a code of simple objects together with algorithms for interpreting the phenomena produced when they are printed close to each other Depending upon the wavelength used to query and transmit the information and the code used, it is possible to print the desired level of information in small areas No silicon chip required 96-bit printed code consumes only 10% of the conductive ink required for a printed RFID antenna Detection principles based on Synthetic Aperture Radar (SAR), Interferometer Synthetic Aperture Radar (ISAR) and RF Holography (RFH)

The Experts in Machine - Readable Authentication 11 Each code produces a unique image. Red colors indicate the presence of code information Image processing algorithms detect the image and extract its information Segmentation of label information from background Multiple image separation Further analysis of the image completed only in the labels area How our Technology Works

The Experts in Machine - Readable Authentication Bit Tag Structure - Concept Sequence of 37 symbols, each positioned (or not) in 1 of 9 potential vertical positions Special symbols for tag positioning 96 bits matrix = EPC code capacity Very high error correction capacity Tag dimensions = 108mm x 15mm 108mm x 15mm

The Experts in Machine - Readable Authentication 13 How our Technology Works Conductive Ink Printing Technology EM Fields Diffraction Theory Radar Methods Antennas Techniques RF Signals Processing Digital Signals Processing Control Algorithms Imaging Algorithms Deciphering Algorithms Error Correct. Algorithms

The Experts in Machine - Readable Authentication 14 Where Are We Now ? Symbols have been tested to date on paper board, typical packaging materials and polymeric foils

The Experts in Machine - Readable Authentication 15 Symbols have been printed using conventional and commercially available printing techniques Tag image – Using Screen Printing Tag image – Using Ink Jet Printing Where Are We Now ?

The Experts in Machine - Readable Authentication 16 Where Are We Now ? Multiple label reading capability is showing positive signs. We have tested a pattern consisting of 2-3 labels and results were good reading and full separate identification of each tag in most of the test scenarios

The Experts in Machine - Readable Authentication 17 Where Are We Now ? 96 bit tag size has been reduced: 108mm x 55mm 108mm x 15mm

The Experts in Machine - Readable Authentication 18 Where Are We Now Summary September 2006 Read Range =1 foot Read Speed=1 second( single tag) Information Capacity=up to 96bits Print Sizes=108mm x 15 mm(96 bits) Non-Line of sight reading=yes Any orientation read capability=yes Anti –collision=yes Anti-counterfeiting capability=no December 2007 Read Range =10 feet Read Speed = 1 second (stationary) Information Capacity=up to 128bits? Print Sizes= 108mm x 15 mm & Less Non-Line of sight reading=yes Any orientation read capability=yes Anti –collision=yes Anti-counterfeiting capability=yes

The Experts in Machine - Readable Authentication 19 How Our Technology Will Be Used Consumer Promotions Estimated Annual Volume Potential: Billions ¹ Brand Protection needs for Multi-Layer Anti- Counterfeiting Estimated Volume Potential:100s of billions ¹ Printing Industry –Sorting and Verification of Documents Estimated Volume Potential:100s of billions ¹ Drug/Pharmaceutical identification Estimated Volume Potential: 100s of billions¹ ¹ ID TechEX and Internal estimates for unit volumes

The Experts in Machine - Readable Authentication 20 How Our Technology Will Be Used Asset tracking /internal identification Estimated Volume Potential: Hundreds of Millions¹ Replacement of barcodes for added information and added package real estate Estimated Volume Potential: Trillions¹ Anywhere Low Cost and Easy to Print is important= $ & ¢ !!

The Experts in Machine - Readable Authentication 21 Next Steps Complete tests over a maximum variety of substrates, packaging materials, application environments etc. Complete the development of our SAR/ISAR/RFH and Processing algorithms. Identify five partners for test programs Phase One (Sept. 06 through Feb. 07): Format and print InkSureRF codes onto selected products Scan encoded products with prototype readers at InkSure Phase Two (March 07 through Aug. 07): Live field test involving readers, encoded products and customer IT Commercial Release – September/October 2007