SlideShare a Scribd company logo
1 of 12
Sharon Flank, CEO
Apr 2016
IP-Protected 3D-Printed
Electronics and More
Counterfeiting is a trillion-dollar business
Costs US
companies
$250B/year
Erodes
consumer
confidence
Can support
terrorists and
organized crime
R I S K
3D printing makes counterfeiting easy
3D Printing, Protected with Spectroscopy
Under-the-skin fingerprinting:
Fingerprinting for “ink”
Authorized spare parts, made with the right material
Make objects unscannable
What We Do: Light-Based Verification
Chemical Taggants in the “sandwich”
Detector: Pocket-sized spectrometer
Fast & easy field authentication
PB&J metaphor:
“the most promising is a technique
developed by InfraTrac” (3dprint.com)
Tagging Electronics
Printable electronics options include:
Jettable nanocomposites, e.g. Chemcubed
Bioprinting with electronics, e.g. Jennifer Lewis
(Wyss/Harvard)
Conductive ink (NanoDimension)
Conductive graphene filament (BLACKMAGIC3D)
RFID (Chemcubed)
Flexible, e.g. for wearables
Layered into substrate: InfraTrac taggants
Confidential
InfraTrac’s chemical protection is…
Completely covert
Detectable in the field
Easy to scale
Small circle of trust: nobody needs
to know the entire recipe
¢
3D Printing IP Opportunity:
Licensed Taggants
Gartner: 3D printing IP theft >$100 billion by 2018
Brand Owners: Authorized product
1st Markets: Defense/Aerospace; Med Devices
Current Protection Options for 3D
1-use print
Protects the file, but not the object
Quantum dots
Scale-up and supply chain issues
Toxicity issues (cadmium, lead)
DNA
Full verification is not a field test
Heat limits applicability
Easy AND Effective
Confidential
Serialization
(2D, RFID)
Hologram Botanical
DNA
Laser
Etching
UV
Ink
Easy to Use X X X X X
Fast Results X X X X X
Covert X** X
Flexible X
Cost-effective X* X X X X
Hard to Defeat X X
** DNA is covert only with
full PCR, not with UV
* Expensive infrastructure
What InfraTrac Can Protect, 3D & Beyond
Plastic
Packaging
Medical Devices
Metal
Cars
Electronics
Computer Chips
Substances
Medications
Cosmetics
Perfume
Luxury Goods
Our IP is well protected
In-dose fingerprints: EU 2012, US 2014
EP1671094, U.S. 8,719,043
Packaging chemical code: 2013; CIP
U.S. 8,517,274, EU allowed 2016
Hospital medication errors: 2011
U.S. 7,952,710
Patents Pending:
• Sensor fusion
• 3D printing
Confidential
Sharon Flank, Ph.D.
Silver Spring, MD
sflank@infratrac.com
202-251-4648
We keep brands safe…
from FAKES AND MISTAKES

More Related Content

Similar to 3D Printing IP Protection with Spectroscopy

220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptxINDHUJALV
 
Disruptive Digital Technologies - MIT ID Innovation
Disruptive Digital Technologies - MIT ID InnovationDisruptive Digital Technologies - MIT ID Innovation
Disruptive Digital Technologies - MIT ID InnovationPankaj Deshpande
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Evolution of blockchain protocols & Towards Mass Adoption
Evolution of blockchain protocols & Towards Mass AdoptionEvolution of blockchain protocols & Towards Mass Adoption
Evolution of blockchain protocols & Towards Mass AdoptionTom Ding
 
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...Is Hardware the New Software? Creating the Hightech Innovations that will Tra...
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...IT Arena
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?Codemotion
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
RFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in SheltersRFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in SheltersIJERA Editor
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
internetofthingsiotslides-190502035400.pdf
internetofthingsiotslides-190502035400.pdfinternetofthingsiotslides-190502035400.pdf
internetofthingsiotslides-190502035400.pdfbkumar2974
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 
3d printing weekly update - 10.26.15
3d printing weekly update - 10.26.153d printing weekly update - 10.26.15
3d printing weekly update - 10.26.15Sandra Kahn
 
Fourth revolution through 3 d technology
Fourth revolution through 3 d technologyFourth revolution through 3 d technology
Fourth revolution through 3 d technologyM S Siddiqui
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveSharbani Bhattacharya
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionDr Laurent Guiraud
 

Similar to 3D Printing IP Protection with Spectroscopy (20)

220943-RSP.pptx
220943-RSP.pptx220943-RSP.pptx
220943-RSP.pptx
 
Disruptive Digital Technologies - MIT ID Innovation
Disruptive Digital Technologies - MIT ID InnovationDisruptive Digital Technologies - MIT ID Innovation
Disruptive Digital Technologies - MIT ID Innovation
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Evolution of blockchain protocols & Towards Mass Adoption
Evolution of blockchain protocols & Towards Mass AdoptionEvolution of blockchain protocols & Towards Mass Adoption
Evolution of blockchain protocols & Towards Mass Adoption
 
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...Is Hardware the New Software? Creating the Hightech Innovations that will Tra...
Is Hardware the New Software? Creating the Hightech Innovations that will Tra...
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Are Drones our best friends?
Are Drones our best friends?Are Drones our best friends?
Are Drones our best friends?
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
RFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in SheltersRFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in Shelters
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
internetofthingsiotslides-190502035400.pdf
internetofthingsiotslides-190502035400.pdfinternetofthingsiotslides-190502035400.pdf
internetofthingsiotslides-190502035400.pdf
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
3d printing weekly update - 10.26.15
3d printing weekly update - 10.26.153d printing weekly update - 10.26.15
3d printing weekly update - 10.26.15
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
Fourth revolution through 3 d technology
Fourth revolution through 3 d technologyFourth revolution through 3 d technology
Fourth revolution through 3 d technology
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
Ubiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation PerspectiveUbiquitous Computing A Next Generation Perspective
Ubiquitous Computing A Next Generation Perspective
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Iotp
IotpIotp
Iotp
 

More from Rising Media, Inc.

1415 track 1 wu_using his laptop
1415 track 1 wu_using his laptop1415 track 1 wu_using his laptop
1415 track 1 wu_using his laptopRising Media, Inc.
 
1620 keynote olson_using our laptop
1620 keynote olson_using our laptop1620 keynote olson_using our laptop
1620 keynote olson_using our laptopRising Media, Inc.
 
1530 track 2 stuart_using our laptop
1530 track 2 stuart_using our laptop1530 track 2 stuart_using our laptop
1530 track 2 stuart_using our laptopRising Media, Inc.
 
1530 track 1 fader_using our laptop
1530 track 1 fader_using our laptop1530 track 1 fader_using our laptop
1530 track 1 fader_using our laptopRising Media, Inc.
 
1215 daa lunch owusu_using our laptop
1215 daa lunch owusu_using our laptop1215 daa lunch owusu_using our laptop
1215 daa lunch owusu_using our laptopRising Media, Inc.
 
1215 daa lunch a bos intro slides_using our laptop
1215 daa lunch a bos intro slides_using our laptop1215 daa lunch a bos intro slides_using our laptop
1215 daa lunch a bos intro slides_using our laptopRising Media, Inc.
 
855 sponsor movassate_using our laptop
855 sponsor movassate_using our laptop855 sponsor movassate_using our laptop
855 sponsor movassate_using our laptopRising Media, Inc.
 
1325 keynote yale_pdf shareable
1325 keynote yale_pdf shareable1325 keynote yale_pdf shareable
1325 keynote yale_pdf shareableRising Media, Inc.
 
905 keynote peele_using our laptop
905 keynote peele_using our laptop905 keynote peele_using our laptop
905 keynote peele_using our laptopRising Media, Inc.
 

More from Rising Media, Inc. (20)

1415 track 1 wu_using his laptop
1415 track 1 wu_using his laptop1415 track 1 wu_using his laptop
1415 track 1 wu_using his laptop
 
Matt gershoff
Matt gershoffMatt gershoff
Matt gershoff
 
Keynote adam greco
Keynote adam grecoKeynote adam greco
Keynote adam greco
 
1620 keynote olson_using our laptop
1620 keynote olson_using our laptop1620 keynote olson_using our laptop
1620 keynote olson_using our laptop
 
1530 track 2 stuart_using our laptop
1530 track 2 stuart_using our laptop1530 track 2 stuart_using our laptop
1530 track 2 stuart_using our laptop
 
1530 track 1 fader_using our laptop
1530 track 1 fader_using our laptop1530 track 1 fader_using our laptop
1530 track 1 fader_using our laptop
 
1415 track 2 richardson
1415 track 2 richardson1415 track 2 richardson
1415 track 2 richardson
 
1215 daa lunch owusu_using our laptop
1215 daa lunch owusu_using our laptop1215 daa lunch owusu_using our laptop
1215 daa lunch owusu_using our laptop
 
1215 daa lunch a bos intro slides_using our laptop
1215 daa lunch a bos intro slides_using our laptop1215 daa lunch a bos intro slides_using our laptop
1215 daa lunch a bos intro slides_using our laptop
 
915 e metrics_claudia perlich
915 e metrics_claudia perlich915 e metrics_claudia perlich
915 e metrics_claudia perlich
 
855 sponsor movassate_using our laptop
855 sponsor movassate_using our laptop855 sponsor movassate_using our laptop
855 sponsor movassate_using our laptop
 
1615 plack using our laptop
1615 plack using our laptop1615 plack using our laptop
1615 plack using our laptop
 
1530 rimmele do not share
1530 rimmele do not share1530 rimmele do not share
1530 rimmele do not share
 
1325 keynote yale_pdf shareable
1325 keynote yale_pdf shareable1325 keynote yale_pdf shareable
1325 keynote yale_pdf shareable
 
1115 fiztgerald schuchardt
1115 fiztgerald schuchardt1115 fiztgerald schuchardt
1115 fiztgerald schuchardt
 
1000 kondic do not share
1000 kondic do not share1000 kondic do not share
1000 kondic do not share
 
905 keynote peele_using our laptop
905 keynote peele_using our laptop905 keynote peele_using our laptop
905 keynote peele_using our laptop
 
Stephen morse sharable
Stephen morse sharableStephen morse sharable
Stephen morse sharable
 
Elder shareable
Elder shareableElder shareable
Elder shareable
 
1115 ramirez using our laptop
1115 ramirez using our laptop1115 ramirez using our laptop
1115 ramirez using our laptop
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

3D Printing IP Protection with Spectroscopy

  • 1. Sharon Flank, CEO Apr 2016 IP-Protected 3D-Printed Electronics and More
  • 2. Counterfeiting is a trillion-dollar business Costs US companies $250B/year Erodes consumer confidence Can support terrorists and organized crime R I S K 3D printing makes counterfeiting easy
  • 3. 3D Printing, Protected with Spectroscopy Under-the-skin fingerprinting: Fingerprinting for “ink” Authorized spare parts, made with the right material Make objects unscannable
  • 4. What We Do: Light-Based Verification Chemical Taggants in the “sandwich” Detector: Pocket-sized spectrometer Fast & easy field authentication PB&J metaphor: “the most promising is a technique developed by InfraTrac” (3dprint.com)
  • 5. Tagging Electronics Printable electronics options include: Jettable nanocomposites, e.g. Chemcubed Bioprinting with electronics, e.g. Jennifer Lewis (Wyss/Harvard) Conductive ink (NanoDimension) Conductive graphene filament (BLACKMAGIC3D) RFID (Chemcubed) Flexible, e.g. for wearables Layered into substrate: InfraTrac taggants Confidential
  • 6. InfraTrac’s chemical protection is… Completely covert Detectable in the field Easy to scale Small circle of trust: nobody needs to know the entire recipe ¢
  • 7. 3D Printing IP Opportunity: Licensed Taggants Gartner: 3D printing IP theft >$100 billion by 2018 Brand Owners: Authorized product 1st Markets: Defense/Aerospace; Med Devices
  • 8. Current Protection Options for 3D 1-use print Protects the file, but not the object Quantum dots Scale-up and supply chain issues Toxicity issues (cadmium, lead) DNA Full verification is not a field test Heat limits applicability
  • 9. Easy AND Effective Confidential Serialization (2D, RFID) Hologram Botanical DNA Laser Etching UV Ink Easy to Use X X X X X Fast Results X X X X X Covert X** X Flexible X Cost-effective X* X X X X Hard to Defeat X X ** DNA is covert only with full PCR, not with UV * Expensive infrastructure
  • 10. What InfraTrac Can Protect, 3D & Beyond Plastic Packaging Medical Devices Metal Cars Electronics Computer Chips Substances Medications Cosmetics Perfume Luxury Goods
  • 11. Our IP is well protected In-dose fingerprints: EU 2012, US 2014 EP1671094, U.S. 8,719,043 Packaging chemical code: 2013; CIP U.S. 8,517,274, EU allowed 2016 Hospital medication errors: 2011 U.S. 7,952,710 Patents Pending: • Sensor fusion • 3D printing Confidential
  • 12. Sharon Flank, Ph.D. Silver Spring, MD sflank@infratrac.com 202-251-4648 We keep brands safe… from FAKES AND MISTAKES

Editor's Notes

  1. Brand equity
  2. Combination s chosen from GRAS list, excipients, and other FDA-friendly sources, even for packaging taggants. Unique to each customer, or even each CMO, each product, each market.
  3. Invisible to the naked eye, but detectable with a pocket spectrometer, by a non-technical user who does not need to know enough to spoof the taggant fingerprint
  4. A smart mix of effective and cost-effective, all composed of chemical taggants detected with handheld spectrometers, anywhere