Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what.

Slides:



Advertisements
Similar presentations
Protect and Grow Brand Equity by Creating Cost-Effective, Innovative Technical Solutions January 1, 2010 Confidential and Proprietary to Food & Restaurant.
Advertisements

COMP 110: Introduction to Programming Tyler Johnson Feb 11, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Feb 18, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Feb 25, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Mar 16, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 20, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 13, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson January 12, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Mar 25, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 8, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 1, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson January 28, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 27, 2009 MWF 11:00AM-12:15PM Sitterson 014.
Solvency ii: an overview Lloyds May © LloydsSolvency II May Contents Solvency II: key features Legislative process Solvency II implementation.
2010 Tax Class1 Day 3 Class Participation Class Exercise – Paul Austin Publ W Exercise page 98 Advanced Section.
Tax Year TYPES OF PAYMENTS 1040 PG 2 Line & 68 Federal income tax withheld from W-2s, 1099s Estimated payments & $ applied from prior year.
Large Scale Integration of Senses for the Semantic Web Jorge Gracia, Mathieu dAquin, Eduardo Mena Computer Science and Systems Engineering Department (DIIS)
M. Mayer SEWG Fuel Retention June Sample Analysis for TS, AUG and JET: Depth Profiling of Deuterium M. Mayer Max-Planck-Institut für Plasmaphysik,
Producing monthly estimates of labour market indicators exploiting the longitudinal dimension of the LFS microdata R. Gatto, S. Loriga, A. Spizzichino.
University of Reading Improved understanding of how rainfall responds to a warming world Richard Allan Environmental Systems.
AQA INFO 1 SECTION 4 Selection & Use of Input devices and media tcowling 2009 from Mott, Leaming & Williams.
Wouter Noordkamp The assessment of new platforms on operational performance and manning concepts.
Confidential & Copyright - Megasoft Ltd. All rights reserved.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
Ziehm Academy - User Guide for online registration portal Nuremberg, February 2009.
October FUEL PRICE EVALUATION Comparing different fuel costs is a complex issue requiring an in-depth knowledge of fuel properties and characteristics,
Automation Solutions for Ladle Gate Applications
Working Set-Based Access Control for Network File Systems Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science.
Efficient Solutions For Water Supply Helix High-Pressure Vertical Multistage Pump.
1 CONFIDENTIAL Copyright 2006, Toshiba Corporation. How to Ensure Theyre Genuine Toshiba Toner 2009 Toshiba America Business Solutions Inc.
1 Cathay Life Insurance Ltd. (Vietnam) 27/11/20091.
Feb Alten Group Started in France in 1988 Currently more than people Presence in 10 countries Active in The Netherlands since 2002.
Brand Protection & Authentication Solutions Confidential Information
ATUG Roundtable – November 2009 NBN Architecture Reference Model.
IV Medicine Administration: Infection Control September 2009.
1. (c) Alan Rowley Associates Laboratory Accreditation Dr Alan G Rowley Quality Policy based on Quality Objectives Quality Management System Communicate.
Vault 9 Project Update 9 th September 2009 Paul Pointon – Site Project Delivery Manager LLW Repository Ltd.
30 min Scratch July min intro to Scratch A Quick-and-Dirty approach Leaving lots of exploration for the future. (5 hour lesson plan available)
B E S T B E S T B E S T.
Flexible Scheduling of Software with Logical Execution Time Constraints* Stefan Resmerita and Patricia Derler University of Salzburg, Austria *UC Berkeley,
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
SATO XML-enabled Printers Introduction
preventing counterfeit …
Presented By Md. Habibul Islam Hamdu Deprtment Of Marketing Hamdard University Bangladesh.
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
PhRMA Presentation to FDA: Bar Codes to Reduce Medication Errors
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
Using 2D Code Presented By Derreck Ford Jet Equipment Corporation Fall Seminar.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Digital Imaging Systems –I/O. Workflow of digital imaging Two Competing imaging format for motion pictures Film vs Digital Video( TV) Presentation of.
BAR CODE SCANNER A.ANUSHA (06N61A0402). What is bar code? A barcode is a machine readable representation of information. Barcode stores data in widths.
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
Desktop shipping application Desktop shipping application Web based shipping application Web based shipping application Track and trace web portal Track.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
The Experts in Machine - Readable Authentication 1 Customized Security Solutions by InkSure Award Winner.
Barcoding and Museum Collections Presented by: Julie MacDonald Utah Museum Association Conference, October 2015.
The Experts in Machine - Readable Authentication 1 Introducing TrackSure ™ by InkSure Award Winner.
Input Chapter 5 Introduction to IT Darlene Ringhand.
TSC Barcode Printer. Introduction Including a barcoding system makes the work of a retailer infinitely easier. The bar coding system offers a strategic.
Lecture on Input Devices
English for Advance Learners I
Preventative Measures
Input Devices.
PROCAL-TRACK Label Printing & Barcode Scanning.
Ishaque P K Electronics & Communication S3, Roll No 38
LECTURE Course Name: Computer Application
California Tax Stamp Example
Label Printing & Barcode Scanning
Presentation transcript:

Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what others cannot SEE! John Hattersley, P.E.

What? Why? How? Technology? Information Management Institute Conference on Security Printing 11/18/20092

Not Linear – Too sensitive to width of bars 2D Data Matrix – more error correction more data - smaller area! Information Management Institute Conference on Security Printing 11/18/20093 What are they?

Product ID – Label Identification Serial Number – License Plate Hashed encoded unique number Information Management Institute Conference on Security Printing 11/18/20094 What are they?

Multi-Layer Protection Unobtrusive Identification Track and Trace Authentication Product Diversion Tracking Easy to Print Invisible to the Human Eye Less expensive than RFID NOW – Easy to Read and Store! Information Management Institute Conference on Security Printing 11/18/20095

Invisible bar code with Unique Serial Number Holograms, Micro Text, embedded DNA Other Overt/Covert marks Information Management Institute Conference on Security Printing 11/18/20096 Why Covert Bar Codes?

Information Management Institute Conference on Security Printing 11/18/2009 Unobtrusive Identification Why Covert Bar Codes?

Information Management Institute Conference on Security Printing 11/18/2009 Track & Trace – in the FIELD ! Why Covert Bar Codes?

Information Management Institute Conference on Security Printing 11/18/2009 Product Authentication Why Covert Bar Codes?

Information Management Institute Conference on Security Printing 11/18/2009 Product Diversion Tracking in the FIELD ! Why Covert Bar Codes?

Information Management Institute Conference on Security Printing 11/18/ EASY TO PRINT!

Information Management Institute Conference on Security Printing 11/18/ Three Legged Stool of Covert Security Solutions How does it work? Marking + Scanning + Scanning + Data System + Data System

Information Management Institute Conference on Security Printing 11/18/ Covert Security Solutions: Marking Quality ink or ribbon marking Suitable to endure the environment

Information Management Institute Conference on Security Printing 11/18/ Easy to use scanners: in-line or handheld Read the marks in the factory and the field Covert Security Solutions: Scanning

Information Management Institute Conference on Security Printing 11/18/ Data and systems integration Either in-house or specialty service Covert Security Solutions: Data System

Information Management Institute Conference on Security Printing 11/18/ Technology Update: Data systems havent been a problem… they can use either regular or covert bar code data input, or any number of other labeling technologies including sophisticated but expensive RFID. So what about Bar Code vs. RFID…? Covert Bar Code

Information Management Institute Conference on Security Printing 11/18/ RFID Solutions can be very expensive to implement. Covert Bar Codes are Less Expensive. Covert Bar Code

Information Management Institute Conference on Security Printing 11/18/ RFID Solutions are getting better – but... Covert Bar Codes are still more cost effective to implement. Covert Bar Code

Information Management Institute Conference on Security Printing 11/18/ Technology Update: Since data systems havent been a problem (they can use any data input)… The only challenge in adopting economical covert bar codes was reliable marking and scanning… however BOTH are now available!

Information Management Institute Conference on Security Printing 11/18/ Digital printing Inkjet printing Thermal transfer …all now available Covert Bar Code

Information Management Institute Conference on Security Printing 11/18/ Different Ink-Specific technologies are now available across the light spectrum Covert Bar Code

Information Management Institute Conference on Security Printing 11/18/ Affordable, durable scanners are now available for both the factory and the field Covert Bar Code

John Hattersley InData Systems 27 Fennell Street Skaneateles, NY Information Management Institute Conference on Security Printing 11/18/2009 Read what others cannot SEE!