SlideShare a Scribd company logo
1 of 1
High-quality labels ensure
UID compliance
Labels that last a lifetime. That is a key component of the Item Unique Identification system, or IUID,
developed by the U.S. Department of Defense. The idea is to mark each piece of DoD equipment
with a Unique Identifier (UID) so the department can track the asset throughout its life cycle. The
identifier is contained within a 2-D Data Matrix symbol that is applied to the asset.
The identifier is entered into the DoD’s IUID registry, a database that also contains information
about each item, such as its date of purchase, location, maintenance history and other details. The
system allows the DoD to better manage a massive inventory of equipment that is spread across the
globe, thereby improving safety for military personnel. It also may save taxpayer money; in the past,
the department sometimes ordered duplicate equipment unnecessarily because it lost track of
assets.
For defense department suppliers, the IUID program means another step in fulfilling DoD contracts.
Equipment valued at more than $5,000 must be marked with UID labels. The DoD’s MIL-STD-130
spells out requirements for the labeling process. A good resource for learning more is www.id-
integration.com.
A variety of labeling methods exist. Importantly, the 2-D data matrix symbol must remain readable
throughout the expected life of the asset. It must be able to endure environmental conditions the
equipment will encounter during normal operation.
The Data Matrix symbol can be applied directly to the equipment through methods such as dot
peening, laser marking, or etching. These methods are considered “intrusive,” and the contractor
must ensure that the labeling does not adversely impact performance of the equipment.
Indirect methods involve applying the Data Matrix to a label, which is then attached to the
equipment. Contractors might already be placing nameplates or tags on equipment; in many cases
the data matrix can be added as another label element. UID labels are available in a variety of
materials, including stainless steel, aluminum, acrylic or polyester.
In general, larger Data Matrix labels can better withstand damage and are preferred. For example, a
scratch that renders a small symbol unreadable might have little or no impact on a larger symbol.
But depending on the item to be labeled, the available marking area may be limited.
Another step in the marking process is IUID verification. Specialized hardware and software is used
to ensure that the data matrix is readable. IUID verification involves assigning a grade to the symbol
based on a number of parameters, such as contrast and uniformity. The staff at ID Integration Inc.
and Jet City Laser Inc. is well versed on UID labels and IUID verification and is available to help
contractors who have questions on the DoD requirements.

More Related Content

What's hot

Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and dataIAEME Publication
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD SuccessSierraware
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101Sierraware
 

What's hot (7)

Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Creation of automatic identification and data
Creation of automatic identification and dataCreation of automatic identification and data
Creation of automatic identification and data
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
Mobile App Virtualization 101
Mobile App Virtualization 101Mobile App Virtualization 101
Mobile App Virtualization 101
 

Similar to High quality labels ensure uid compliance

Asset Management Using Item Unique Identification (IUID)
Asset Management UsingItem Unique Identification (IUID)Asset Management UsingItem Unique Identification (IUID)
Asset Management Using Item Unique Identification (IUID)elliando dias
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...IAEME Publication
 
Military Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure ChipsMilitary Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure ChipsTJR Global
 
The Most Common Misconceptions About IUID and RFID Compliance
The Most Common Misconceptions About IUID and RFID ComplianceThe Most Common Misconceptions About IUID and RFID Compliance
The Most Common Misconceptions About IUID and RFID CompliancePamela Chasse
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSEMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSIRJET Journal
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1Michael Buschmann
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceIRJET Journal
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...IJERA Editor
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
The IUID and RFID Survival Guide
The IUID and RFID Survival GuideThe IUID and RFID Survival Guide
The IUID and RFID Survival GuidePamela Chasse
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Is Your IUID Compliance Plan Coming Up Short?
Is Your IUID Compliance Plan Coming Up Short?Is Your IUID Compliance Plan Coming Up Short?
Is Your IUID Compliance Plan Coming Up Short?Pamela Chasse
 

Similar to High quality labels ensure uid compliance (20)

UID Basics
UID BasicsUID Basics
UID Basics
 
Asset Management Using Item Unique Identification (IUID)
Asset Management UsingItem Unique Identification (IUID)Asset Management UsingItem Unique Identification (IUID)
Asset Management Using Item Unique Identification (IUID)
 
Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...Creation of automatic identification and data capture infrastructure via data...
Creation of automatic identification and data capture infrastructure via data...
 
Military Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure ChipsMilitary Enlists Digital Twin Technology to Secure Chips
Military Enlists Digital Twin Technology to Secure Chips
 
The Most Common Misconceptions About IUID and RFID Compliance
The Most Common Misconceptions About IUID and RFID ComplianceThe Most Common Misconceptions About IUID and RFID Compliance
The Most Common Misconceptions About IUID and RFID Compliance
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARSEMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile Device
 
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
Analysis of Payment Card Industry Data Security Standard [PCI DSS] Compliance...
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
The IUID and RFID Survival Guide
The IUID and RFID Survival GuideThe IUID and RFID Survival Guide
The IUID and RFID Survival Guide
 
IUID Policy
IUID PolicyIUID Policy
IUID Policy
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET-  	  Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Is Your IUID Compliance Plan Coming Up Short?
Is Your IUID Compliance Plan Coming Up Short?Is Your IUID Compliance Plan Coming Up Short?
Is Your IUID Compliance Plan Coming Up Short?
 

High quality labels ensure uid compliance

  • 1. High-quality labels ensure UID compliance Labels that last a lifetime. That is a key component of the Item Unique Identification system, or IUID, developed by the U.S. Department of Defense. The idea is to mark each piece of DoD equipment with a Unique Identifier (UID) so the department can track the asset throughout its life cycle. The identifier is contained within a 2-D Data Matrix symbol that is applied to the asset. The identifier is entered into the DoD’s IUID registry, a database that also contains information about each item, such as its date of purchase, location, maintenance history and other details. The system allows the DoD to better manage a massive inventory of equipment that is spread across the globe, thereby improving safety for military personnel. It also may save taxpayer money; in the past, the department sometimes ordered duplicate equipment unnecessarily because it lost track of assets. For defense department suppliers, the IUID program means another step in fulfilling DoD contracts. Equipment valued at more than $5,000 must be marked with UID labels. The DoD’s MIL-STD-130 spells out requirements for the labeling process. A good resource for learning more is www.id- integration.com. A variety of labeling methods exist. Importantly, the 2-D data matrix symbol must remain readable throughout the expected life of the asset. It must be able to endure environmental conditions the equipment will encounter during normal operation. The Data Matrix symbol can be applied directly to the equipment through methods such as dot peening, laser marking, or etching. These methods are considered “intrusive,” and the contractor must ensure that the labeling does not adversely impact performance of the equipment. Indirect methods involve applying the Data Matrix to a label, which is then attached to the equipment. Contractors might already be placing nameplates or tags on equipment; in many cases the data matrix can be added as another label element. UID labels are available in a variety of materials, including stainless steel, aluminum, acrylic or polyester. In general, larger Data Matrix labels can better withstand damage and are preferred. For example, a scratch that renders a small symbol unreadable might have little or no impact on a larger symbol. But depending on the item to be labeled, the available marking area may be limited. Another step in the marking process is IUID verification. Specialized hardware and software is used to ensure that the data matrix is readable. IUID verification involves assigning a grade to the symbol based on a number of parameters, such as contrast and uniformity. The staff at ID Integration Inc. and Jet City Laser Inc. is well versed on UID labels and IUID verification and is available to help contractors who have questions on the DoD requirements.