SlideShare une entreprise Scribd logo
1  sur  18
1 Presented to you by: -   Agency for Eastern Europe
Nicanti in shortA joint venture in Printed Electronics with  saleable products Nicanti Oy, a Finnish company, develops, manufactures and markets security solutions based on printed electronics:  Company established in 2007, Invested cash more than 1.500.000 €, Technology developed with VTT and Itaca Nova,  Based on special inks and radiofrequency readers, A low cost & large volume security solution,         The solution is patented, microchips are propriatory, Many applications possible also out of security,  Main owners of the company are: 2 July, 2009 2
Nicanti in short Mission and Vision of Nicanti Oy Nicanti vision: 	To become a leading Electrical Coding Systems provider and a notable player in global security solutions market. Nicanti mission: 	To protect customers’ goods and documents from counterfeits with solutions which are reliable, cost efficient, easy to use and suitable for large volumes.    	Nicanti’s solutions add significant value to customers by safeguarding their revenues and integrity of their brands. 3 July, 2009 3
Nicanti in shortAchievements to-date 2007: Proof of concept Establishment of Nicanti Oy, R&D activity and proof of concept with VTT Oy. 2008: Development & Prototyping Development: 		Microelectronics (RF microchip),  		Special eCode inks, 		Encryption and code geometry algorithms, Patent applications, first prototypes manufactured. 2009: Start sales & Industrialisation Manufacturing of pre-series in industrial envirnment, Organisation of the supply chain, Secure www-interface completed, Sales activity started in March, Selection and training of printers, First customer order received in June.   4 July, 2009 4
The Nicanti offering- Basic ConceptsWe modify and measure electrical properties of materials, a simple RFID Some Physics: ,[object Object],The Nicanti solution: ,[object Object]
The Nicanti reader is able to measure the variations of these properties and therefore to read hidden digital information.
Every object or document may contain different information.The Nicanti tmtechnologyispatent pending 5 July, 2009 5
Nicanti eCode Nicanti Reader Data management The reader uses Radio Frequency to  detect the code. Only Nicanti reader can decrypt the code. A customer key is required to decrypt  the code, give info on authenticity and send the information to IT system. Simple reader: “Check”: Gives information on authenticity. Advanced reader: “Numeric”: May send code to PC or Mobile Phone  after decryption. Information is compared to original in DB.  The authentication data is given by the customer. Nicanti manages the data, secured web-interface. Customer has access to information related to hisproducts and documents. Data can be extended to supply chain or retailing info. Encrypted codes are generated with Nicanti software on https web. Content of information: 96 bits Inks with taylored electrical properties are used to print the codes without silicon or silicon based chips. Printed inks can be overcoated with standard inks. Transparent or visible inks. Substrate may be paper, packaging  or any rigid/flexible non-mettallic substrate . The Nicanti offering July, 2009 6
The Nicanti OfferingWhy should customers consider the Nicanti solution Revenue increase from reduction of fakes: Protection of originals, cloning or counterfeiting eCodes is practically impossible, Transparent inks enable eCoding without visible marks to printing surface, eCode can also be over-printed with normal colours and images of the brand,  Reliable: Inks are stable in time, no loss of information, no chip on pack or on the document, Identifying electrical properties with radiofrequency waves is existing technology,  Readers already manufactured in industrial environment, Affordable for mass markets: eCode contains same infomation as RFID but is 20 times cheaper (one cent technology), Nicanti Readers are durable and cost is very low (based on customized microelectronics), Easy and flexible: Readers are easy to carry, simple to use, checking does not require any knowledge of product, Printing process as with normal inks, no extra machines or components, Environmentally friendly: No metal, no silicon in the code, a detail that can be a driver! 7 July, 2009 7
Technical information How the Nicanti system works – Step 1 eCode generation: 	In a protected web site a customer key is generated (128bit).  	eCodes are generated based on the input of numeric information (96 bits) which has been encrypted with the customer key. 	The drawing of the eCode is made available in pdf or binary format. It is virtually impossible to generate an eCode autonomously  because, both the code and the key, contain internal characteristics. (demo available on  http://nicanti.xenonlab.com) July, 2009 8
9 Technical information How the Nicanti system works – Step 2 2.	Printing of the eCode: 	A special ink is required, may be pigmented or transparent (Nicanti Ink). Fixed eCodes (changes are rare): 	Offset, Flexo or Silk Screen printing. Serial eCodes (changes every print): 		Inkjet, Thermal transfer printing. 	Substrates: paper, rigid & flexible plastics, textiles .... (no metal). 	During the printing process the eCode is usually over-coated with traditional ink and therefore is made invisible. July, 2009
July, 2009 10 Technical information How the Nicanti system works – Step 3 Reading of the eCode: 	Only the Nicanti reader can read and decrypt the code and only if it contains the customer key. Customer key is downloaded through a secure protocol on Internet (banking standards achieved). The reader is striped in the area where the code is printed (see picture). 	Operations performed by the reader: ,[object Object]
Acquisition of the code geometry,
Decryption of the geometry and verification of the authenticity of  the internal characteristic,
If authentic the information is send to PC or Mobile Phone by cable, WLAN or Bluetooth.10
July, 2009 11 Technical information Why is the Nicanti security system is superior in security Combination of 3 disciplines: ,[object Object]
Microelectronics and Sensors,
Mathematics and Information Technology.Practical security aspects: ,[object Object]

Contenu connexe

Tendances

From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFilipe Mello
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...journalBEEI
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
The Rise of Biometric Cards
The Rise of Biometric CardsThe Rise of Biometric Cards
The Rise of Biometric CardsAntonio D'Albore
 
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting Services
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting ServicesInternet of Things (IoT) Patent Strategy/R&D/Monetization Consulting Services
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting ServicesAlex G. Lee, Ph.D. Esq. CLP
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit Iparveen837153
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocolsClint Smith
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoTFURQAN M LODHI
 
Embedded Systems Security News 2011/01
Embedded Systems Security News 2011/01Embedded Systems Security News 2011/01
Embedded Systems Security News 2011/01AurMiana
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)FabMinds
 

Tendances (20)

From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESET
 
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
Internet of things (IoT) Patents | Internet of things (IoT) based Systems & M...
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
The Rise of Biometric Cards
The Rise of Biometric CardsThe Rise of Biometric Cards
The Rise of Biometric Cards
 
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting Services
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting ServicesInternet of Things (IoT) Patent Strategy/R&D/Monetization Consulting Services
Internet of Things (IoT) Patent Strategy/R&D/Monetization Consulting Services
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 
Iot m2m
Iot m2mIot m2m
Iot m2m
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Embedded Systems Security News 2011/01
Embedded Systems Security News 2011/01Embedded Systems Security News 2011/01
Embedded Systems Security News 2011/01
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
IoT Innovation Fund for Business Growth
IoT Innovation Fund for Business GrowthIoT Innovation Fund for Business Growth
IoT Innovation Fund for Business Growth
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 

Similaire à Nicanti Security Solution for Printed Electronics

IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader DesignIRJET Journal
 
Latest slide intro for TRUSTLESS.AI
Latest slide intro for TRUSTLESS.AILatest slide intro for TRUSTLESS.AI
Latest slide intro for TRUSTLESS.AITRUSTLESS.AI
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
iNet-IoT company introduction
iNet-IoT  company introductioniNet-IoT  company introduction
iNet-IoT company introductionJennie Wang
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalSorin Ciornei
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?IDTechEx
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...FIWARE
 
Ledger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursLedger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursJulien Trottier
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 

Similaire à Nicanti Security Solution for Printed Electronics (20)

IRJET- Tag's Reader Design
IRJET-  	  Tag's Reader DesignIRJET-  	  Tag's Reader Design
IRJET- Tag's Reader Design
 
Latest slide intro for TRUSTLESS.AI
Latest slide intro for TRUSTLESS.AILatest slide intro for TRUSTLESS.AI
Latest slide intro for TRUSTLESS.AI
 
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki AilistoTeollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
 
DIGITAL NOTICEBOARD USING IOT
DIGITAL NOTICEBOARD USING IOTDIGITAL NOTICEBOARD USING IOT
DIGITAL NOTICEBOARD USING IOT
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 
iNet-IoT company introduction
iNet-IoT  company introductioniNet-IoT  company introduction
iNet-IoT company introduction
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
 
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...
FIWARE Global Summit - Smart Home/Building for Energy Optimization: FIWARE Be...
 
Ledger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursLedger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à Tours
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

Nicanti Security Solution for Printed Electronics

  • 1. 1 Presented to you by: - Agency for Eastern Europe
  • 2. Nicanti in shortA joint venture in Printed Electronics with saleable products Nicanti Oy, a Finnish company, develops, manufactures and markets security solutions based on printed electronics: Company established in 2007, Invested cash more than 1.500.000 €, Technology developed with VTT and Itaca Nova, Based on special inks and radiofrequency readers, A low cost & large volume security solution, The solution is patented, microchips are propriatory, Many applications possible also out of security, Main owners of the company are: 2 July, 2009 2
  • 3. Nicanti in short Mission and Vision of Nicanti Oy Nicanti vision: To become a leading Electrical Coding Systems provider and a notable player in global security solutions market. Nicanti mission: To protect customers’ goods and documents from counterfeits with solutions which are reliable, cost efficient, easy to use and suitable for large volumes. Nicanti’s solutions add significant value to customers by safeguarding their revenues and integrity of their brands. 3 July, 2009 3
  • 4. Nicanti in shortAchievements to-date 2007: Proof of concept Establishment of Nicanti Oy, R&D activity and proof of concept with VTT Oy. 2008: Development & Prototyping Development: Microelectronics (RF microchip), Special eCode inks, Encryption and code geometry algorithms, Patent applications, first prototypes manufactured. 2009: Start sales & Industrialisation Manufacturing of pre-series in industrial envirnment, Organisation of the supply chain, Secure www-interface completed, Sales activity started in March, Selection and training of printers, First customer order received in June. 4 July, 2009 4
  • 5.
  • 6. The Nicanti reader is able to measure the variations of these properties and therefore to read hidden digital information.
  • 7. Every object or document may contain different information.The Nicanti tmtechnologyispatent pending 5 July, 2009 5
  • 8. Nicanti eCode Nicanti Reader Data management The reader uses Radio Frequency to detect the code. Only Nicanti reader can decrypt the code. A customer key is required to decrypt the code, give info on authenticity and send the information to IT system. Simple reader: “Check”: Gives information on authenticity. Advanced reader: “Numeric”: May send code to PC or Mobile Phone after decryption. Information is compared to original in DB. The authentication data is given by the customer. Nicanti manages the data, secured web-interface. Customer has access to information related to hisproducts and documents. Data can be extended to supply chain or retailing info. Encrypted codes are generated with Nicanti software on https web. Content of information: 96 bits Inks with taylored electrical properties are used to print the codes without silicon or silicon based chips. Printed inks can be overcoated with standard inks. Transparent or visible inks. Substrate may be paper, packaging or any rigid/flexible non-mettallic substrate . The Nicanti offering July, 2009 6
  • 9. The Nicanti OfferingWhy should customers consider the Nicanti solution Revenue increase from reduction of fakes: Protection of originals, cloning or counterfeiting eCodes is practically impossible, Transparent inks enable eCoding without visible marks to printing surface, eCode can also be over-printed with normal colours and images of the brand, Reliable: Inks are stable in time, no loss of information, no chip on pack or on the document, Identifying electrical properties with radiofrequency waves is existing technology, Readers already manufactured in industrial environment, Affordable for mass markets: eCode contains same infomation as RFID but is 20 times cheaper (one cent technology), Nicanti Readers are durable and cost is very low (based on customized microelectronics), Easy and flexible: Readers are easy to carry, simple to use, checking does not require any knowledge of product, Printing process as with normal inks, no extra machines or components, Environmentally friendly: No metal, no silicon in the code, a detail that can be a driver! 7 July, 2009 7
  • 10. Technical information How the Nicanti system works – Step 1 eCode generation: In a protected web site a customer key is generated (128bit). eCodes are generated based on the input of numeric information (96 bits) which has been encrypted with the customer key. The drawing of the eCode is made available in pdf or binary format. It is virtually impossible to generate an eCode autonomously because, both the code and the key, contain internal characteristics. (demo available on http://nicanti.xenonlab.com) July, 2009 8
  • 11. 9 Technical information How the Nicanti system works – Step 2 2. Printing of the eCode: A special ink is required, may be pigmented or transparent (Nicanti Ink). Fixed eCodes (changes are rare): Offset, Flexo or Silk Screen printing. Serial eCodes (changes every print): Inkjet, Thermal transfer printing. Substrates: paper, rigid & flexible plastics, textiles .... (no metal). During the printing process the eCode is usually over-coated with traditional ink and therefore is made invisible. July, 2009
  • 12.
  • 13. Acquisition of the code geometry,
  • 14. Decryption of the geometry and verification of the authenticity of the internal characteristic,
  • 15. If authentic the information is send to PC or Mobile Phone by cable, WLAN or Bluetooth.10
  • 16.
  • 18.
  • 19. Use of special security inks (only available through secure channels),
  • 20. Use of cryptography and customer keys (customizes the system for every customer),
  • 21. Microchip developed by Nicanti (retro-engineering of analog chip is not possible),
  • 23. High security cryptographic algorithms for data transmission (equivalent to banking),
  • 24. Possible connection to a database for code authentication.These combinations make the system very safe and easy to use.
  • 25. Future development opportunities Future applications inside and out of the security Security applications: Non-Security applications: Use of programmable eCode Inks: Ink is not conductive when printed, laser or RF may program the ink further down the process. Miniaturisation of the eCode: Small two-dimension codes, new sensor geometry required. Distance reading: RF principles to be used to read in distance. Double security inks: A second security characteristic in the ink enhances the difficulty of copying, modification on reader required. Integration/customization: Proof of concept in mobile phone made, developments required. Brand communication: Striping of code can give information to consumers and suppliers. Multi Media applications: Low cost readers for home applications, games. Lotteries: Low cost substitution of scratch cards. July, 2009 12 VTT, with Nicanti’s support, is already running two R&D projects on some of these ideas. The projects (920K€) are sponsored by TEKES (Finnish government).
  • 26. Market and competitionCounterfeiting, unfortunately a double digit industry Market potential: 5% of world trade, approximately 500 billion Euros, is based on counterfeited products, Branded good producers can loose as much as 15% of revenues to counterfeits, 10% of drugs sold in US are fake, 25% in developing countries! (source IAA), Today, the global expenditure in security solutions is about 5 billion Euros annually, The market is global and grows over 10% p.a., Globalisation made life earier for counterfeiters, solutions can be copied at lower costs and control of is not so strict anymore. For more information go to: http://internationalauthenticationassociation.org/content/counterfeit_statistics.php Customer needs and supply: Need for security solutions is vast and urgent (in industry and governament agencies), Customers are against costly solutions and complex applications, Relibility, low cost and easiness are the key requirements, Several security solutions available, not many combine low cost and reliability. 13 July, 2009 13
  • 27.
  • 29.
  • 36. Consumer spare parts14 July, 2009 14
  • 37. July, 2009 15 Market and competition – Security Techniques 1From “tactile/visual “to “numeric” security increases, but not always the cost! Increase in security “Visual/Tactile” methods: Holograms, Intaglio Printing, Special Colour effects, Controlled defects … Advantages: Simple, no reading equipment required, “emotional”. Disadvantages: Relatively easy to copy, no serial information, high cost. Instrumental Analysis: UV, IR, Refractometry … Advantages: Easy, Disadvantages: The “trick” is easy to copy only difficult to find, no serial info. “Numeric” Information: RFID chip, Surface recognition …. Advantages: May be used for tracking & tracing, very practical (RFID) Disadvantages: Cost of readers and unit cost of assembled chip. Nicanti has reduced the cost of these numeric protection systems.
  • 38. Market and competition – Security Techniques 2Commonly used competing solutions 16 July, 2009 16
  • 39. CUSTOMER Devliery of Readers Devliery of printed eCode Order for eCodes Order for Readers PRINTER NICANTI READER MANUFATURER Specification for eCodes Specification for Readers Deliveryof Microchips Order for Microchips (Delivery of inks) Order for inks INK PRODUCER ASIC MANUFACTURER Nicanti operations and supply chainA rough operating model, which may be adapted case by case. Delivery of inks DATA MANAGEMENT 17 July, 2009
  • 40. 18 For further information, demonstration and pricing please contact: Contact details: Jiri Perkous Labska 183 277 15 Tisice +420 725 797 238 Czech republic jperkous@tisice.cz Your Eastern Europe agency