Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.

Slides:



Advertisements
Similar presentations
Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Working with the Internet
Which server is right for you? Get in Contact with us
Patents pending Uniquely Identifying Your Products and Consumers Nakul Pasricha, COO 23 rd July, 2014 PharmaSecure, New York 601 West 26th Street, Suite.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
A Bilcare Singapore Initiative Bilcare © 2007 Privileged Information The Oxford Conference on Innovation & Technology Transfer for Global Health, Oxford,
Brand Protection through Nanotechnology Sun Innovation’s Anti-Counterfeiting Product Authentication.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
preventing counterfeit …
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
JAIPUR 16 DEC 08 TECHNOLOGY FOR FINANCIAL INCLUSION Indian Institute of Banking & Finance N D RAO.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
SDN and Openflow.
Parking Space Finder Lucia Wiguno Thursday, April
Principles of Information Technology
Electronic Commerce Semester 1 Term 1 Lecture 2. Forces Fuelling E-Commerce Interest in e-commerce is being fuelled by: –Economic forces –Customer interaction.
Biometrics: Voice Recognition
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Sales Card Dell Confidential – Internal Use Only Microsoft Windows 10 OVERALL DELL MESSAGE: Let Dell help you migrate to take advantage of new Windows.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Information Security for Managers (Master MIS)
© 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
B2C Extended Packaging Bar Code Standard
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Speaker Notes for employee discussions on how Canada Post is getting greener – August 2008 The Issues Canada Post needs to upgrade its current printer.
Gauteng Provincial Government
SureWaves Confidential. For private audiences only. Distribution, reproduction, copying of content or any other reuse is prohibited..
1 Information Systems CS-507 Lecture Critical Success Factors (CSF). Critical Success Factor (CSF) is a business term for an element which is necessary.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Copyright © 2016 – Curt Hill The Digital World Understanding the challenges of this world.
THE EXPERIENCE IS EVERYTHING DELIVERING SOLUTIONS FOR RETAILERS.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Electronic Business: Concept and Applications Department of Electrical Engineering Gadjah Mada University.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
BULK SMS IN SMSVIS SMSvis is a leading SMS messaging service provider offering SMS communication services from your internet enabled computer.
Mail to: SOCIAL MEDIA MARKETING TO BOOST RETURN ON INVESTMENT  Social Medias are indirectly connected with ROI. Social media's.
Electronic Banking & Security Electronic Banking & Security.
Information Systems Design and Development Security Precautions Computing Science.
Digital Marketing Services Web Development Web Design Web: S 124/1, Kausalya, Behind Malvani Hotel, Baner Road,
Chapter 5 – E-commerce and Enterprise Systems
Preventative Measures
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Challenge/Response Authentication
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Authentication.
Process Improvement Process Identification
Virtual Private Networks (VPN)
Information Systems in Organizations 4
Mobile Wallet Market Share
Top Emerging E-commerce Magento trends. The progress of E-commerce industry is changing year by year, this evolution has made super easy for the online.
Breaking through with Blockchain
ONLINE SECURE DATA SERVICE
Stallion Systems & Solution Pvt Ltd
COMPLETE BUSINESS TEXTING SOLUTION
Principles of Information Technology
OU BATTLECARD: Oracle Identity Management Training
Web portals-B2B-B2C-B2E TRAVELOPRO
Presentation transcript:

Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ

Speed | Innovation | Happiness What are the anti-counterfeiting technologies available? What is the effectiveness? 2 Current anti-counterfeiting technology options comprise a range of overt and covert measures which encompass product identification and security. These technology options include Barcodes, Data-matrix, RFID, Security Holograms, Biometric solutions, and Taggants among several others. However, these technologies are merely resistant to counterfeiting and not fool proof. Counterfeiters are becoming increasingly sophisticated as security weaknesses in these technologies become open to exploitation. We are sure you are encountering or seeing counterfeiting within your own industry.

Speed | Innovation | Happiness What strategies can companies implement for a more comprehensive anti- counterfeiting solution? 3 For companies that are serious about finding a solution to counterfeiting, top management involvement with periodic review is necessary. Prohibition of counterfeit goods and equipment is essential either at the points of origin or within the channels of distribution. For this, companies need to deploy anti- counterfeiting strategies that set up various layers of security. To challenge the counterfeiters, it is important to use a combination of overt and covert methods including such methods which reduce the dependence on human elements. Companies need to constantly look at new technologies to increase supply chain security for secure Track-n-Trace of products from point of origin to point of sale.

Speed | Innovation | Happiness How is non-ClonableID™ different? Does it provide a comprehensive solution? 4 nonClonableID™ offers a bundled technological solution that enables authentication as well as secure Track-n-Trace and e-Pedigree. The solution deploys unique materials-based fingerprints which are prohibitively difficult to replicate even by Bilcare. This technology offers online authentication by comparing the object or ID in the field with the equivalent digital image stored in the secure central server.

Speed | Innovation | Happiness How does nonClonableID™ work? 5 The technology is based on a unique materials-based fingerprint constructed from a composite of micro and nano particles. These fingerprints form part of a label or tag. The tag, along with any amount of product or other object data, is stored on a central and secure server platform, to be accessed for authentication and secure Track-n-Trace. The authentication happens by using the Bilcare reader and sending the data to the central server for confirmation.

Speed | Innovation | Happiness What makes nonClonableID™ so secure? 6 Each of the unique materials-based fingerprints is made up of very fine particles of different shapes and sizes besides the fact that a large volume of these particles are being used. These are produced randomly each time, so that no set pattern or template or algorithm is followed or is in existence. Moreover, these features are only machine-readable so the authentication process is objective and reliable. Most importantly, even Bilcare cannot duplicate a particular fingerprint.

Speed | Innovation | Happiness Can these unique tags be coupled with universal identification features such as barcodes etc.? 7 Yes, Absolutely. Coupling of the fingerprint element with a universal identification feature helps to accomplish the desired capability of Track-n-Trace, along with a rapid authentication process. For example, we provide the labels with unique serial numbers, usually in the form of a linear or 2D barcode.

Speed | Innovation | Happiness How is the tag authentication information communicated? 8 Bilcare has developed a robust reader that connects to a standard communication device, like a mobile phone or computer, along with the entire back-end information technology support platform for authenticating the tags and associated products. Tags are authenticated by swiping the tag and barcode in the reader. The information is communicated through a GPRS enabled mobile phone or internet network to the back end signature server, which is already pre-loaded with information regarding the tags. At the server end, the incoming fingerprint is compared and authenticated. A message confirming the authenticity or otherwise is subsequently sent from the server back to the user.

Speed | Innovation | Happiness Can the system work with RFID tags and scanning systems? 9 Yes. RFID tags are a serialisation format on which our nonClonableID™ fingerprints can be applied to create a secure RFID enabled tag, just like linear or 2D barcodes

Speed | Innovation | Happiness Can this solution be implemented with existing systems? 10 Yes. This solution can be seamlessly integrated with most existing identity and supply chain management systems to achieve the targeted levels of security.

Speed | Innovation | Happiness Can we implement this solution in our industry segment? Will it increase my cost significantly? 11 The solution is adaptable to a diverse range of industry segments. This includes high value, low volume products to that of high volume, fast moving consumer goods. Our approach is to work with clients to understand various aspects and demography of the product that needs protection. Furthermore, the solution is affordable.

Speed | Innovation | Happiness How will the end-consumer know that they should verify the product and how? 12 Companies (brand owners) need to start a communication process with end- customers to gradually educate and make them aware of authenticity and purchase safety. We will be able to assist in this process by advising on public awareness programmes, industry forums like CII, OPPI, and through other means as appropriate. For example, we host the information portal which can be used to help disseminate information to distributors, vendors and consumers. We will be delighted in answering any further questions that you have about nonClonableID ™.

Speed | Innovation | Happiness Which other Companies or Industries use nCID 13 Read the following links:- Technology-bags-the-2014-CII-Industrial-Innovation-Award-and-catapults-Bilcare- Limited-to-the-top-as-recipient-of-the-2014-CII-Grand-Award-for-Most-Innovative- Company/ gcs-gains-npcb-malaysia-gmp-certificate/ This is information showing that nCID’s time has come, for now we are moving into 4g and 5g telecommunication network speeds. Means that encryption and de- cryption speeds are much faster, than years ago.

Speed | Innovation | Happiness Product dev. & mfg. PUNE, INDIA SINGAPORE MALVERN, UK PADUA, ITALY. JERSEY. C.I. Regional sales offices Bilcare Technologies – Fortified-ID Holdings Limited 14