NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM

1,810
-1

Published on

Presentation of new patent "INVISIBLE" high security barcode printing and reader system aimed at security printing, Brand protection and logistics

Published in: Technology, Sports, Automotive
1 Comment
1 Like
Statistics
Notes
  • APOSENTE-SE HOJE E GANHE R$ 4.650,00 PREVIDENCIA PRIVADA PLANO FUTURO E O PROJETO VENDA BRASIL ESTA OREFECENDO UMA APOSENTADORIA PARA O RESTO DE SUA VIDA NO VALOR DE 10 SALARIOS MINIMOS COM UM INVESTIMENTO DE APENAS R$ 10,00 MENSAIS ATÉ COMPLETAR OS 11 SETORES A SUA FRENTE, SAIBA MAIS EM UMA CONFERÊNCIA ON-LINE. E FAÇA SEU CADASTRO AQUI: http:// www. projetovendabras il.com.br/ ?p=3911 WWW. DANIELFARIA.COM. BR
    Website www.projetovendabrasil.com.br/?p=39…
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
1,810
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
73
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM

  1. 1. 1<br />Presented to you by:<br />- Agency for Eastern Europe<br />
  2. 2. Nicanti in shortA joint venture in Printed Electronics with saleable products<br />Nicanti Oy, a Finnish company, develops, manufactures and markets security solutions based on printed electronics: <br />Company established in 2007,<br />Invested cash more than 1.500.000 €,<br />Technology developed with VTT and Itaca Nova, <br />Based on special inks and radiofrequency readers,<br />A low cost & large volume security solution, <br />The solution is patented, microchips are propriatory,<br />Many applications possible also out of security, <br />Main owners of the company are:<br />2<br />July, 2009<br />2<br />
  3. 3. Nicanti in short<br />Mission and Vision of Nicanti Oy<br />Nicanti vision:<br /> To become a leading Electrical Coding Systems provider and a notable player in global security solutions market.<br />Nicanti mission:<br /> To protect customers’ goods and documents from counterfeits with solutions which are reliable, cost efficient, easy to use and suitable for large volumes. <br /> Nicanti’s solutions add significant value to customers by safeguarding their revenues and integrity of their brands.<br />3<br />July, 2009<br />3<br />
  4. 4. Nicanti in shortAchievements to-date<br />2007: Proof of concept<br />Establishment of Nicanti Oy,<br />R&D activity and proof of concept with VTT Oy.<br />2008: Development & Prototyping<br />Development:<br /> Microelectronics (RF microchip), <br /> Special eCode inks,<br /> Encryption and code geometry algorithms,<br />Patent applications, first prototypes manufactured.<br />2009: Start sales & Industrialisation<br />Manufacturing of pre-series in industrial envirnment,<br />Organisation of the supply chain,<br />Secure www-interface completed,<br />Sales activity started in March,<br />Selection and training of printers,<br />First customer order received in June. <br />4<br />July, 2009<br />4<br />
  5. 5. The Nicanti offering- Basic ConceptsWe modify and measure electrical properties of materials, a simple RFID<br />Some Physics:<br /><ul><li>When materials are exposed to Radio Frequency (RF) they react in a different way as a function of their electrical properties (conductive & capacitive).</li></ul>The Nicanti solution:<br /><ul><li>With a printing process, the electrical properties are modified in a controlled way.
  6. 6. The Nicanti reader is able to measure the variations of these properties and therefore to read hidden digital information.
  7. 7. Every object or document may contain different information.</li></ul>The Nicanti tmtechnologyispatent pending<br />5<br />July, 2009<br />5<br />
  8. 8. Nicanti eCode<br />Nicanti Reader<br />Data management<br />The reader uses Radio Frequency to <br />detect the code.<br />Only Nicanti reader can decrypt the code.<br />A customer key is required to decrypt <br />the code, give info on authenticity and<br />send the information to IT system.<br />Simple reader: “Check”:<br />Gives information on authenticity.<br />Advanced reader: “Numeric”:<br />May send code to PC or Mobile Phone <br />after decryption.<br />Information is compared to original in DB. <br />The authentication data is given by the customer.<br />Nicanti manages the data, secured web-interface.<br />Customer has access to information related to hisproducts and documents.<br />Data can be extended to supply chain or retailing info.<br />Encrypted codes are generated with Nicanti software on https web.<br />Content of information: 96 bits<br />Inks with taylored electrical properties are used to print the codes without silicon or silicon based chips.<br />Printed inks can be overcoated with standard inks.<br />Transparent or visible inks.<br />Substrate may be paper, packaging <br />or any rigid/flexible non-mettallic substrate .<br />The Nicanti offering<br />July, 2009<br />6<br />
  9. 9. The Nicanti OfferingWhy should customers consider the Nicanti solution<br />Revenue increase from reduction of fakes:<br />Protection of originals, cloning or counterfeiting eCodes is practically impossible,<br />Transparent inks enable eCoding without visible marks to printing surface,<br />eCode can also be over-printed with normal colours and images of the brand, <br />Reliable:<br />Inks are stable in time, no loss of information, no chip on pack or on the document,<br />Identifying electrical properties with radiofrequency waves is existing technology, <br />Readers already manufactured in industrial environment,<br />Affordable for mass markets:<br />eCode contains same infomation as RFID but is 20 times cheaper (one cent technology),<br />Nicanti Readers are durable and cost is very low (based on customized microelectronics),<br />Easy and flexible:<br />Readers are easy to carry, simple to use, checking does not require any knowledge of product,<br />Printing process as with normal inks, no extra machines or components,<br />Environmentally friendly:<br />No metal, no silicon in the code, a detail that can be a driver!<br />7<br />July, 2009<br />7<br />
  10. 10. Technical information<br />How the Nicanti system works – Step 1<br />eCode generation:<br /> In a protected web site a customer key is generated (128bit). <br /> eCodes are generated based on the input of numeric information (96 bits) which has been encrypted with the customer key.<br /> The drawing of the eCode is made available in pdf or binary format.<br />It is virtually impossible to generate an eCode autonomously because, both the code and the key, contain internal characteristics.<br />(demo available on http://nicanti.xenonlab.com)<br />July, 2009<br />8<br />
  11. 11. 9<br />Technical information<br />How the Nicanti system works – Step 2<br />2. Printing of the eCode:<br /> A special ink is required, may be pigmented or transparent (Nicanti Ink).<br />Fixed eCodes (changes are rare):<br /> Offset, Flexo or Silk Screen printing.<br />Serial eCodes (changes every print):<br /> Inkjet, Thermal transfer printing.<br /> Substrates: paper, rigid & flexible plastics, textiles .... (no metal).<br /> During the printing process the eCode is usually over-coated with traditional ink and therefore is made invisible.<br />July, 2009<br />
  12. 12. July, 2009<br />10<br />Technical information<br />How the Nicanti system works – Step 3<br />Reading of the eCode:<br /> Only the Nicanti reader can read and decrypt the code and only if it contains the customer key.<br />Customer key is downloaded through a secure protocol on Internet (banking standards achieved).<br />The reader is striped in the area where the code is printed (see picture).<br /> Operations performed by the reader:<br /><ul><li>Detection of the presence of eCode ink,
  13. 13. Acquisition of the code geometry,
  14. 14. Decryption of the geometry and verification of the authenticity of the internal characteristic,
  15. 15. If authentic the information is send to PC or Mobile Phone by cable, WLAN or Bluetooth.</li></ul>10<br />
  16. 16. July, 2009<br />11<br />Technical information<br />Why is the Nicanti security system is superior in security<br />Combination of 3 disciplines:<br /><ul><li>Polymer and nanoparticle science,
  17. 17. Microelectronics and Sensors,
  18. 18. Mathematics and Information Technology.</li></ul>Practical security aspects:<br /><ul><li>eCode is not visible (therefore cannot be cloned),
  19. 19. Use of special security inks (only available through secure channels),
  20. 20. Use of cryptography and customer keys (customizes the system for every customer),
  21. 21. Microchip developed by Nicanti (retro-engineering of analog chip is not possible),
  22. 22. Specific firmware difficult to develop,
  23. 23. High security cryptographic algorithms for data transmission (equivalent to banking),
  24. 24. Possible connection to a database for code authentication.</li></ul>These combinations make the system very safe and easy to use.<br />
  25. 25. Future development opportunities<br />Future applications inside and out of the security<br />Security applications:<br />Non-Security applications:<br />Use of programmable eCode Inks:<br />Ink is not conductive when printed, laser or RF may program the ink further down the process.<br />Miniaturisation of the eCode:<br />Small two-dimension codes, new sensor geometry required.<br />Distance reading:<br /> RF principles to be used to read in distance.<br />Double security inks:<br /> A second security characteristic in the ink enhances the difficulty of copying, modification on reader required.<br />Integration/customization:<br />Proof of concept in mobile phone made, developments required.<br />Brand communication:<br /> Striping of code can give information to consumers and suppliers.<br />Multi Media applications:<br />Low cost readers for home applications, games.<br />Lotteries:<br />Low cost substitution of scratch cards.<br />July, 2009<br />12<br />VTT, with Nicanti’s support, is already running two R&D projects on some of these ideas.<br />The projects (920K€) are sponsored by TEKES (Finnish government).<br />
  26. 26. Market and competitionCounterfeiting, unfortunately a double digit industry<br />Market potential:<br />5% of world trade, approximately 500 billion Euros, is based on counterfeited products,<br />Branded good producers can loose as much as 15% of revenues to counterfeits,<br />10% of drugs sold in US are fake, 25% in developing countries! (source IAA),<br />Today, the global expenditure in security solutions is about 5 billion Euros annually,<br />The market is global and grows over 10% p.a.,<br />Globalisation made life earier for counterfeiters, solutions can be copied at lower costs and control of is not so strict anymore.<br />For more information go to: <br />http://internationalauthenticationassociation.org/content/counterfeit_statistics.php<br />Customer needs and supply:<br />Need for security solutions is vast and urgent (in industry and governament agencies),<br />Customers are against costly solutions and complex applications, <br />Relibility, low cost and easiness are the key requirements,<br />Several security solutions available, not many combine low cost and reliability.<br />13<br />July, 2009<br />13<br />
  27. 27. Market and competitionPotential customer segmentation<br />Healthcare andmedical <br />Documents<br />of value<br />Branded<br />consumer goods<br />Branded<br />industrial goods<br /><ul><li> Pharmaceuticals
  28. 28. Natural health
  29. 29. Medical equipment</li></ul> Phones, cameras, iPods<br /> Cosmetics, beauty care <br /> Luxury items <br /> Branded or baby food<br /><ul><li> Taxation receipts
  30. 30. Cheques, notes
  31. 31. Tickets, coupons
  32. 32. Security IDs
  33. 33. Office equipment
  34. 34. Machinery
  35. 35. Industrial spare parts
  36. 36. Consumer spare parts</li></ul>14<br />July, 2009<br />14<br />
  37. 37. July, 2009<br />15<br />Market and competition – Security Techniques 1From “tactile/visual “to “numeric” security increases, but not always the cost!<br />Increase in security<br />“Visual/Tactile” methods:<br />Holograms, Intaglio Printing, Special Colour effects, Controlled defects …<br />Advantages: Simple, no reading equipment required, “emotional”.<br />Disadvantages: Relatively easy to copy, no serial information, high cost.<br />Instrumental Analysis:<br />UV, IR, Refractometry … <br />Advantages: Easy,<br />Disadvantages: The “trick” is easy to copy only difficult to find, no serial info.<br />“Numeric” Information:<br />RFID chip, Surface recognition ….<br />Advantages: May be used for tracking & tracing, very practical (RFID)<br />Disadvantages: Cost of readers and unit cost of assembled chip.<br />Nicanti has reduced the cost of these numeric protection systems.<br />
  38. 38. Market and competition – Security Techniques 2Commonly used competing solutions<br />16<br />July, 2009<br />16<br />
  39. 39. CUSTOMER<br />Devliery of Readers<br />Devliery of printed eCode<br />Order for<br />eCodes<br />Order for<br />Readers<br />PRINTER<br />NICANTI<br />READER <br />MANUFATURER<br />Specification<br />for eCodes<br />Specification<br /> for Readers<br />Deliveryof <br />Microchips<br />Order for<br />Microchips<br />(Delivery <br />of inks)<br />Order <br />for inks<br />INK<br />PRODUCER<br />ASIC <br />MANUFACTURER<br />Nicanti operations and supply chainA rough operating model, which may be adapted case by case.<br />Delivery <br />of inks<br />DATA <br />MANAGEMENT<br />17<br />July, 2009<br />
  40. 40. 18<br />For further information, demonstration and pricing please contact:<br />Contact details: Jiri Perkous<br /> Labska 183<br /> 277 15 Tisice<br /> +420 725 797 238<br /> Czech republic jperkous@tisice.cz <br />Your Eastern Europe agency<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×