Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the first in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Security and Authentication of Internet of Things (IoT) DevicesSanjayKumarYadav58
The proposed scheme deals with an authentication and security model for IoT applications. It is based on protecting the network from the intruders, decrease the authentication complexity and increase the communication efficiency of network devices. A signature based authentication scheme proposed for mutual authentication among users and devices in the network. The output of proposed scheme gives the better output compare to existing solutions in terms of End-To-End (E2E), Throughput, and Packet Delivery ratio. The proposed scheme implemented on Network Simulator (NS2).
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the first in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments.
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha ""Review on Vulnerabilities of IoT Security"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24020/review-on-vulnerabilities-of-iot-security/dr-e-j-thomson-fedrik
Internet of Things (IoT) from a Patent perspective | IPR strategy as a part of your Business Goal: Understanding the patent framework of internet of things (IoT). The following ppt illustrates some of the main technologies filed in the Internet of Things (IoT) sector.
Companies entering into the IoT sector need to have an IPR strategy for a profitable business in the long run.
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
This is an independent research about Biometric Smart Cards. The presentation cover status, market, forecast, players, and manufacturing process of Biometric Smart Cards.
Goldman Sachs defines the IoT (Internet of Things) as the third wave of internet revolution: by connecting to the internet billions of devices, the IoT opens up a host of new business opportunities and challenges. According to McKinsey, the IoT has the potential to create up to $6 trillion economic value annually by 2025. TechIPm provides the expert consulting services for the IoT patent strategy/R&D/monetization.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
IoT protocols overview part 2- Tethered protocolsClint Smith
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the second in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments focusing on IoT Tethered Protocols.
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
2nd International Conference on IOT, Big Data and Security (IOTBS 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of IOT, Big Data and Security. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of IoT, Big Data and Security.
Liquidax Capital, LLC is an investment advisory firm sponsoring and managing private equity innovation funds. The Liquidax debut fund; Liquidax Global Exchange Fund I, LP focuses on the acquisition and monetization of Internet of Things (IoT) technologies and intellectual property rights for target injection into numerous public companies operating on global stock exchanges, as well as, venture capital backed private companies boosting business growth and expediting exits.
Liquidax invests its IoT innovation platform to partner companies for providing competitive advantages in the IoT market. Liquidax's strategically packaged technology that is in complete alignment with IPR enables cost effective and faster time to market innovation.
Internet of Things (IoT) from a Patent perspective | IPR strategy as a part of your Business Goal: Understanding the patent framework of internet of things (IoT). The following ppt illustrates some of the main technologies filed in the Internet of Things (IoT) sector.
Companies entering into the IoT sector need to have an IPR strategy for a profitable business in the long run.
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
This is an independent research about Biometric Smart Cards. The presentation cover status, market, forecast, players, and manufacturing process of Biometric Smart Cards.
Goldman Sachs defines the IoT (Internet of Things) as the third wave of internet revolution: by connecting to the internet billions of devices, the IoT opens up a host of new business opportunities and challenges. According to McKinsey, the IoT has the potential to create up to $6 trillion economic value annually by 2025. TechIPm provides the expert consulting services for the IoT patent strategy/R&D/monetization.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
IoT protocols overview part 2- Tethered protocolsClint Smith
The advancement of IIoT 4.0 for smart factories, cities and buildings ushers in many exciting possibilities for improved automation and capabilities. IoT devices are unlocking the great potential for improved efficiency and improved user experiences. However, there are many different IoT protocols, network topologies and frequency bands, making IoT an intranet of things and not an internet of things. Therefore, in order to determine which IoT technology to use in solving your use case and future proofing your investment, an understanding of the IoT ecosystem is needed. This is the second in a series of papers describing the different protocols, topologies and frequency bands used in IoT deployments focusing on IoT Tethered Protocols.
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
2nd International Conference on IOT, Big Data and Security (IOTBS 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of IOT, Big Data and Security. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of IoT, Big Data and Security.
Liquidax Capital, LLC is an investment advisory firm sponsoring and managing private equity innovation funds. The Liquidax debut fund; Liquidax Global Exchange Fund I, LP focuses on the acquisition and monetization of Internet of Things (IoT) technologies and intellectual property rights for target injection into numerous public companies operating on global stock exchanges, as well as, venture capital backed private companies boosting business growth and expediting exits.
Liquidax invests its IoT innovation platform to partner companies for providing competitive advantages in the IoT market. Liquidax's strategically packaged technology that is in complete alignment with IPR enables cost effective and faster time to market innovation.
Notice Board is important thing in any college or institution and sticking various notices every day is a hectic
task. Also to show all the notices on a small piece of paper is difficult. In this paper, we are presenting an idea of
digital noticeboard which will be easy to operate and also support digitalization of india.
Digital notice board will be iteractive. For making display interactive we will use raspberry pi. Only authorized
users like office staff and teaching staff can put the notices or can modify the old notices. Also we are going to
use mic for speech to text conversion which will help to take input from user(student). WIFI module will use for
data transmission which will be connected to raspberry pi. Here, we will use wireless system.
Conference Security by Design - Gemalto - Security in IoTWitekio
For those who didn't come to our conference "Security by Design : An IoT must have", or those who want to see it again, here is the presentation made by Gemalto.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
> APRÈS CE WEBINAIRE, VOUS SEREZ EN MESURE DE COMPRENDRE :
- Les principaux composants d’une solution IoT
- L’importance de bien concevoir sa solution dès les premières étapes
Product security by Blockchain, AI and Security CertsLabSharegroup
Three themes You need to think about Product Security — and some tips for How to Do It
I have been working with software security laboratories and IT security firms for years. I have talked with clients, read and watched dozens of articles/videos and talked with several experts about product security themes, future, technologies.
The three themes are:
Is the blockchain the new technology of trust?
Blockchain has the potential to transform industries. However, some security experts raised questions: If blockchain is broadly used in technology solutions will security standards be adopted? How to protect the cryptographic keys that allow access to the blockchain applications? Although it is true that the potential is huge such as securing IoT nodes, edge devices with authentication, improved confidentiality and data integrity, disrupting current PKI systems, reducing DDoS attacks etc.
AI (Machine Learning, Deep Learning, Reinforcement Learning algorithm) potential in Product Security
Machine learning can help in creating products that analyse threats and respond to attacks and security incidents. There are several repositories on GitHub or open-source codes by IBM available for developers. Deep learning networks are rapidly growing due to cheap cloud GPU services and after Reinforcement learning algorithm’s last success nobody knows the upper limit.
Product Security by International security standards and practices
The present, future, and developmental orientations of independent third party certificates Industry. How can the international standards answer the rapid growth of new technologies and maintain secure applications in IoT, Blockchain or AI-driven industries?
Are IT products reliable, secure and will they stay that way?
I would like to explain Product Security in a simple way. My goal is the introduction of product security for Tech startups, fast-growing Tech firms. Furthermore, I would like to emphasize the benefits of product security certification.
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?IDTechEx
IDTechEx Research provides an overview of the status of the Internet of Things; what it encompasses, applications, security concerns and who is buying in this market.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
2. Nicanti in shortA joint venture in Printed Electronics with saleable products Nicanti Oy, a Finnish company, develops, manufactures and markets security solutions based on printed electronics: Company established in 2007, Invested cash more than 1.500.000 €, Technology developed with VTT and Itaca Nova, Based on special inks and radiofrequency readers, A low cost & large volume security solution, The solution is patented, microchips are propriatory, Many applications possible also out of security, Main owners of the company are: 2 July, 2009 2
3. Nicanti in short Mission and Vision of Nicanti Oy Nicanti vision: To become a leading Electrical Coding Systems provider and a notable player in global security solutions market. Nicanti mission: To protect customers’ goods and documents from counterfeits with solutions which are reliable, cost efficient, easy to use and suitable for large volumes. Nicanti’s solutions add significant value to customers by safeguarding their revenues and integrity of their brands. 3 July, 2009 3
4. Nicanti in shortAchievements to-date 2007: Proof of concept Establishment of Nicanti Oy, R&D activity and proof of concept with VTT Oy. 2008: Development & Prototyping Development: Microelectronics (RF microchip), Special eCode inks, Encryption and code geometry algorithms, Patent applications, first prototypes manufactured. 2009: Start sales & Industrialisation Manufacturing of pre-series in industrial envirnment, Organisation of the supply chain, Secure www-interface completed, Sales activity started in March, Selection and training of printers, First customer order received in June. 4 July, 2009 4
5.
6. The Nicanti reader is able to measure the variations of these properties and therefore to read hidden digital information.
7. Every object or document may contain different information.The Nicanti tmtechnologyispatent pending 5 July, 2009 5
8. Nicanti eCode Nicanti Reader Data management The reader uses Radio Frequency to detect the code. Only Nicanti reader can decrypt the code. A customer key is required to decrypt the code, give info on authenticity and send the information to IT system. Simple reader: “Check”: Gives information on authenticity. Advanced reader: “Numeric”: May send code to PC or Mobile Phone after decryption. Information is compared to original in DB. The authentication data is given by the customer. Nicanti manages the data, secured web-interface. Customer has access to information related to hisproducts and documents. Data can be extended to supply chain or retailing info. Encrypted codes are generated with Nicanti software on https web. Content of information: 96 bits Inks with taylored electrical properties are used to print the codes without silicon or silicon based chips. Printed inks can be overcoated with standard inks. Transparent or visible inks. Substrate may be paper, packaging or any rigid/flexible non-mettallic substrate . The Nicanti offering July, 2009 6
9. The Nicanti OfferingWhy should customers consider the Nicanti solution Revenue increase from reduction of fakes: Protection of originals, cloning or counterfeiting eCodes is practically impossible, Transparent inks enable eCoding without visible marks to printing surface, eCode can also be over-printed with normal colours and images of the brand, Reliable: Inks are stable in time, no loss of information, no chip on pack or on the document, Identifying electrical properties with radiofrequency waves is existing technology, Readers already manufactured in industrial environment, Affordable for mass markets: eCode contains same infomation as RFID but is 20 times cheaper (one cent technology), Nicanti Readers are durable and cost is very low (based on customized microelectronics), Easy and flexible: Readers are easy to carry, simple to use, checking does not require any knowledge of product, Printing process as with normal inks, no extra machines or components, Environmentally friendly: No metal, no silicon in the code, a detail that can be a driver! 7 July, 2009 7
10. Technical information How the Nicanti system works – Step 1 eCode generation: In a protected web site a customer key is generated (128bit). eCodes are generated based on the input of numeric information (96 bits) which has been encrypted with the customer key. The drawing of the eCode is made available in pdf or binary format. It is virtually impossible to generate an eCode autonomously because, both the code and the key, contain internal characteristics. (demo available on http://nicanti.xenonlab.com) July, 2009 8
11. 9 Technical information How the Nicanti system works – Step 2 2. Printing of the eCode: A special ink is required, may be pigmented or transparent (Nicanti Ink). Fixed eCodes (changes are rare): Offset, Flexo or Silk Screen printing. Serial eCodes (changes every print): Inkjet, Thermal transfer printing. Substrates: paper, rigid & flexible plastics, textiles .... (no metal). During the printing process the eCode is usually over-coated with traditional ink and therefore is made invisible. July, 2009
24. Possible connection to a database for code authentication.These combinations make the system very safe and easy to use.
25. Future development opportunities Future applications inside and out of the security Security applications: Non-Security applications: Use of programmable eCode Inks: Ink is not conductive when printed, laser or RF may program the ink further down the process. Miniaturisation of the eCode: Small two-dimension codes, new sensor geometry required. Distance reading: RF principles to be used to read in distance. Double security inks: A second security characteristic in the ink enhances the difficulty of copying, modification on reader required. Integration/customization: Proof of concept in mobile phone made, developments required. Brand communication: Striping of code can give information to consumers and suppliers. Multi Media applications: Low cost readers for home applications, games. Lotteries: Low cost substitution of scratch cards. July, 2009 12 VTT, with Nicanti’s support, is already running two R&D projects on some of these ideas. The projects (920K€) are sponsored by TEKES (Finnish government).
26. Market and competitionCounterfeiting, unfortunately a double digit industry Market potential: 5% of world trade, approximately 500 billion Euros, is based on counterfeited products, Branded good producers can loose as much as 15% of revenues to counterfeits, 10% of drugs sold in US are fake, 25% in developing countries! (source IAA), Today, the global expenditure in security solutions is about 5 billion Euros annually, The market is global and grows over 10% p.a., Globalisation made life earier for counterfeiters, solutions can be copied at lower costs and control of is not so strict anymore. For more information go to: http://internationalauthenticationassociation.org/content/counterfeit_statistics.php Customer needs and supply: Need for security solutions is vast and urgent (in industry and governament agencies), Customers are against costly solutions and complex applications, Relibility, low cost and easiness are the key requirements, Several security solutions available, not many combine low cost and reliability. 13 July, 2009 13
37. July, 2009 15 Market and competition – Security Techniques 1From “tactile/visual “to “numeric” security increases, but not always the cost! Increase in security “Visual/Tactile” methods: Holograms, Intaglio Printing, Special Colour effects, Controlled defects … Advantages: Simple, no reading equipment required, “emotional”. Disadvantages: Relatively easy to copy, no serial information, high cost. Instrumental Analysis: UV, IR, Refractometry … Advantages: Easy, Disadvantages: The “trick” is easy to copy only difficult to find, no serial info. “Numeric” Information: RFID chip, Surface recognition …. Advantages: May be used for tracking & tracing, very practical (RFID) Disadvantages: Cost of readers and unit cost of assembled chip. Nicanti has reduced the cost of these numeric protection systems.
38. Market and competition – Security Techniques 2Commonly used competing solutions 16 July, 2009 16
39. CUSTOMER Devliery of Readers Devliery of printed eCode Order for eCodes Order for Readers PRINTER NICANTI READER MANUFATURER Specification for eCodes Specification for Readers Deliveryof Microchips Order for Microchips (Delivery of inks) Order for inks INK PRODUCER ASIC MANUFACTURER Nicanti operations and supply chainA rough operating model, which may be adapted case by case. Delivery of inks DATA MANAGEMENT 17 July, 2009
40. 18 For further information, demonstration and pricing please contact: Contact details: Jiri Perkous Labska 183 277 15 Tisice +420 725 797 238 Czech republic jperkous@tisice.cz Your Eastern Europe agency