SecurePak Electronic tamper detection for packaging developed by Cypak and Swedish Postal Service.

Slides:



Advertisements
Similar presentations
OptiShip ® Multi-carrier Shipping System. OptiShip ® customers save on average 13.6% of parcel shipping costs… OptiShip ® is a comprehensive system that.
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
The Widest Range of Bluetooth Barcode Scanners
PALLET SOCK SECURING AND PROTECTING YOUR COMMODITIES.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Review of Patents Agenda Item 3: Report of the New Technologies Working Group.
Storage Systems for Valuables. BIS LLC. is engaged in development of integrated solutions for support of the full life cycle of banknotes and other counterfeit-proof.
Cypak, the Future of Ink on Packaging September 12 th 2007, London Danevert Åsbrink, VP Sales, Cypak AB, Sweden.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
Rafrex LLC - RFID Solutions
RFID in Container Transportation
Radio-Frequency Identification (RFID) Andrew Bowdle MD, PhD Professor of Anesthesiology and Pharmaceutics Chief of the Division of Cardiothoracic Anesthesiology.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SMT Proprietary and Confidential
GeneXpert Installation and Xpert MTB/RIF Set-up
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Intelligent Pharmaceutical Packaging Electronic Data Capturing system to improve data quality and cut time in clinical trials with unparalleled cost efficiency.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Use of RFID in Shipments between Shore Base Terminals and Oil Platforms in the Gulf of Mexico Yasemin Aksoy Tulane Consortium for Supply Chain Management.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
RFID in the postal logistics
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Developing RFID Application In Supply Chain
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Essential Computer Concepts
MOBITRON AB CARGOLOG DATA LOGGING SYSTEM FOR TRANSPORT QUALITY ASSURANCE.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
[1] National Institute of Science & Technology Technical Seminar Presentation Presented By : Rajashree Mohapatra (IT ) Technical Seminar.
(Customs & Trade Partnership
® Features and Benefits V3.1. TurboTag ® Features Temperature logger size of credit card Uses RFID reading protocols with EPC product codes More accurate.
The Office Procedures and Technology
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
DIGITAL SIGNATURE.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Revolution in pharmaceutical packaging RFID Europe: Smart labels to active RFID September 19, 2007 Chris Johnson
The E commerce industry is growing like anything with new businesses coming up everyday and making things more competitive for the already existing players.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Citypack A bag measuring 440mm x 580mm with a top seal. The Citypack will take any item up to 10kg.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
DALCON RFID IMPROVEMENT ECE 599, SPRING 2011 Brad Gasior, ECE Mike Fradkin, ECE Richard Young, ECE Sean Rinehart, ECE.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
THE MALAYSIAN ELECTRONIC PASSPORT
Improving the accuracy and efficiency of your shipping process
Agenda Item 3: Report of the New Technologies Working Group
PARKING AUTOMATION SYSTEM
Controlling Computer-Based Information Systems, Part II
AS/RS (Automated Storage/Retrieval System)
UNIT 19 Data Security 2.
Lesson 7: BRITE Seminar: GMP II
NET 311 Information Security
Chapter 19: Building Systems with Assurance
Packaging and Labeling
Network Security Mark Creighton GBA 576 6/4/2019.
Agenda Item 3: Report of the New Technologies Working Group
Presentation transcript:

SecurePak Electronic tamper detection for packaging developed by Cypak and Swedish Postal Service

Problem domain Upon receiving a parcel, questions arise: Tamper discovery: Has the parcel been illegally opened and closed during transport? Tracability: When and where did the tamper or damage event occur? Integrity: Are the received contents intact? Do they match the description? Who is the sender of the parcel? How do we know for sure? Quality Assurance: Has the package been physically damaged during transportation? Has the package been exposed to temperature extremes? Brand protection: Is the product genuine or a counterfeit? Upon receiving a parcel, questions arise:

The SecurePak Automatic tamper discovery: - Electronic tamper and damage detection - Machine readable, not dependent on visual inspection Traceability: - When: Timestamp of closing, sealing and tampering stored in log-file - Where: Event timestamp can be fed into an existing tracking system to locate the event Origin authentication - Unique ID number - Data storage of contents, source, destination etc - Strong encryption Temperature monitoring - Logs temperature extremes during transport

SecurePak system components USB connection SecurePaksoftware SecurePak PC with Windows Cypak scanner

SecurePak Design

SecurePak electronic module Microprocessor - 32 bit unique ID number (read only) - 32 Kbytes non-volatile memory for data storage Tamper sensor - Resistive loops to detect packet damage - Sealing sensor (open/close) - Tamper events stored in log file with timestamp Contact-less interface - Cypak RFID (5 mm reader range) - Future version supports RFID (ISO 15693) Real-time clock Battery - Storage: >5 years (self discharge) - Operation: 1 year Cypak S2C Chip

Using the SecurePak The sender puts the contents in the package and seals it Package is placed on a Cypak Scanner connected to a PC Information about source, destination and contents is entered and the package is "armed" using SP Software Package is shipped The receiver scans the package using SP Software and checks the log file for tamper events

Logistic chain Sender Postman DIP HUB Aeroplane Customs HUB DIP Receiver

Application areas Theft/pilfering discovery: Locating where (using event timestamps) packages are tampered with in carrier organizations Secure content delivery: The receiver can verify that the actual contents match the description (e.g. pharmaceutical drugs, cash) Secret content delivery: The receiver can ensure that no one else but the sender knows about the contents (e.g. secret documents and products) Package Insurance: The sender can insure the package. If the package is tampered with, it is possible to track the carrier company responsible

Customization SecurePak technology can be integrated into almost any object that can be printed on: Boxes and envelopes Pharmaceutical packaging Money parcels Plastic and fabric bags Tamper-proof tape

Validation with Swedish Postal Service Objective - Proof of SecurePak concept Specification and Design - Customized cardboard parcel and software Field testing - Packaging sent within the organization. Conclusion - Technology works - Large potential use Next step - New version will be used within Swedish Postal Service (Posten) organization - Enhanced pilot with leading postal and courier company