SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Authentication
Solution for
Currency
Management
nonClonableIDTM
LABEL WITH BARCODE
Bilcare Technologies is a
division of Bilcare Ltd. focused
on creating next-generation
anti-counterfeiting, security,
and brand protection solutions
for a broad range of
industry sectors.
With breakthrough research in
nanotechnology, Bilcare
has developed a unique
technology-nonClonableID™-
that enables documents
and currency to be
authenticated as they move
between stakeholders.
elephantdesign.com
© 2010, Bilcare Ltd. All Rights Reserved. All product names, and logos mentioned herein are the trademarks or reg-
istered trademarks of Bilcare. No part of this document should be circulated, quoted, or reproduced for distribution
without prior written approval from Bilcare Ltd.
www.bilcaretech.com
tech@bilcare.com
Americas
USA
Bilcare Inc.
300 Kimberton Road Phoenixville, PA 19460
+1 610 422 3305
Europe
UK
Bilcare Technologies
Malvern Hills Science Park, Geraldine Road,
Malvern, WR14 3SZ, United Kingdom
+44 (0) 1684 585 257
Italy
Bilcare Technologies Italia Srl
Presso Veneto Nanotech,
Via San Crispino 106,
35129 Padua, Italy
+39 (049) 7705514
Asia
India
Bilcare Ltd.
601, ICC Tower, B Wing,
Pune 411 016
+91 (20) 30257700
Singapore
Bilcare Technologies Singapore Pte. Ltd.
52 Changi South Street
1, Singapore 486161
+65 63954130
Counterfeit currency -
a growing threat
A global problem linked
to organized crime
The crime of counterfeiting presents a potential danger to national economies and
causes financial losses to consumers.
There is a significant amount of counterfeit currency in circulation around the world.
Recent developments in
photographic and printing
technology have made the
production of counterfeit currency
relatively easy, thereby increasing
the potential threat.
There has been a rapid growth
in the counterfeiting of Euro
banknotes and coins since the
launch of the currency in 2002.
In India, counterfeit currency
has long been seen as a source
of funding for terrorism.
Investigations into at least four
cases — the Hyderabad bombings
of August 2007; the attack on
the Indian Institute of Science,
Bangalore, in December 2005;
the Ahmedabad bombings of July
2008; and the 26/11 terror attack
on Mumbai — have revealed a
link. (Source: The Pioneer, New
Delhi – January 2009)
PRO BLEM PROBLEM
Non-effective
authentication
Inadequate
security features
With increase in counterfeiting of currency across countries, there is a vital need for
strengthening the security features of currency and gaining assurance of authenticity.
Considering the threat that counterfeiting has on the economy, governments of various
nations have recognized the imperative need to combat it.
•	 Need for new, more robust
security features.
•	 All existing technologies
have a dependence on
human intervention, be it
secret formulae, algorithms
or ingredients, with a
corresponding risk of
security breach.
•	 Current authentication is often
based on visual checks and
hence prone to human error.
Current currency denominations
have overt and covert security
features which require human
intervention for detection and
authentication. This leaves
a window for human error.
Feature checking requires either
diverse equipment or continued
awareness campaigns and
knowledge retention by the
masses to ascertain the presence/
absence of features.
Covert Security Features
•	 Watermark
•	 Security thread
•	 Latent image
•	 Micro lettering
•	 Intaglio
•	 Identification mark
•	 Fluorescence
•	 Optically variable ink
•	 See-through register
PRO BLEM PROBLEM
•	 Inability to check in real-
time and get an appropriate
authentication response to
all concerned.
•	 Inability to identify and trace
the authenticator in real-time
for appropriate action
as required.
nonClonable™ LABEL WITH BAR CODE
The nonClonableID™
advantage
Robust security features
•	 Applies nanotechnology
to facilitate easily-readable
authentication of currency.
•	 Unique materials-based
fingerprints generated out of
randomly distributed micro
and nano particles.
•	 Can be applied to the currency
note paper before printing.
•	 Real-time authentication
through hand-held
portable readers.
•	 The fingerprints are machine-
readable so the authentication
process is objective
and reliable.
•	 Complete authentication report
on a mobile or computer
using robust web enterprise
secured applications and data
management at back-end.
•	 Dashboard showing real-time
problem areas and availability
of various reports.
SOL UTION SOLUTION
The nonClonableID™ label is a
unique, materials-based
fingerprint consisting of randomly
distributed particles and cannot
be reproduced even by Bilcare.
Bilcare Technologies offers a
comprehensive solution to
combat counterfeiting through
the implementation of its unique
nonClonableID™ technology.
nonClonableID™ employs unique
materials-based fingerprints that
are prohibitively difficult to copy.
These tamper-evident fingerprints
are irreproducible and cannot be
duplicated even by Bilcare.
The solution enables real-time
identification and authentication
of the fingerprints through
various types of readers.
Currency
Paper
Authentication
Servers
DataTransfer
Printed Currency
sheets
Currency Printing
 Sheet Cutting
Curing
Process
Pre-process
material in
roll form
Premises server
for control
and print Data Matrix
Barcode Printing
Fingerprint Reading
Fingerprint
Application
Final Die Cut
How it works Authentication of
currency through
nonClonableID™
Bilcare’s solution augments currency security through the following:
•	 Application of the
nonClonableID™ feature in
currency notes.
•	 Anytime, anywhere
e-authentication of currency
notes using Bilcare readers
thus enabling quick and simple
detection of originals and
counterfeits at multiple places
in real-time.
•	 Immediate alerts on each
and every occurrence of
a counterfeit.
SOL UTION SOLUTION
Bilcare’s
nonClonableIDTM
label
A comprehensive solution Protecting the integrity
of currency
Bilcare’s solution also provides a comprehensive enterprise solution which can enable
the generation of management reports and data mining. Bilcare’s smart sensing and
alerting engine comprises of configurable alerting and Reporting Software Modules
(RSMs). This is provided through an intuitive Graphical User Interface (GUI) that collates
key information for authorized users. It is based on a Dashboard that provides a basic
overview, series of alerts with respect to reported counterfeits, as well as the ability to
quickly drill down into details with respect to individual notes, banks, regions and types
of activity.
•	 Innovative security solution
for protecting currency from
counterfeiting.
•	 Enable real-time identification
and authentication of currency
and documents.
•	Authentication and
confirmation is possible at
all stages of the chain, from
the Central Banks to the
consumer, including banks,
institutions, railways,
airlines, shops, wholesalers
and retailers.
•	 Prevent forgery, manipulation
and misuse.
•	 Empower consumers to
authenticate any currency
note directly.
•	 Management reports and data
mining – platform for real-time
smart sensing and action.
•	 Re-assess usage of multiple
security features on
currency and subsequent
cost optimization.
•	 Real-time exceptions report
occurrences of counterfeit
currency for subsequent action.
•	 Cost-effective solution.
SOL UTION BENEFITS
The data system stores sufficient
relevant information about
bank notes and transactions.
The RSMs distill information
into useful formats from which
statistical data, real-time data,
and trends can be obtained and
compared. Hence the system will
not only reduce counterfeiting
and enhance security but also
supplement knowledge about the
issue and help in timely action.
Alerts
10:02 - Multiple serial number occurrence
09:58 - Fake note, Mumbai - in field
09:20 - Fake note, Bank - Delhi
09:17 - Inactive note reported - Pune
Manage
Users | Notes | Batches | Readers
Dashboard
Alerts
Statistics
Maps
Manage
Account | Settings | Help | Logout
Date and time
Dashboard
Statistics #
[ mean ]
[ m. av. ]
[ sd ]
Issuance
Authentic
Unrecognized Note
Not Authentic
Oct 23 - Nov 22, 2009
All | Note Denomination
Day | Week | Month | Year
Map
Transactions
Sample demonstration screenshot of the GUI,
showing the Dashboard and how the various sub-sections relate.

Mais conteúdo relacionado

Mais procurados

General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarVeridium
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application IJCSIS Research Publications
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...SafeNet
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityLenin Aboagye
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentationtneudenb
 

Mais procurados (18)

Sms passcode
Sms passcodeSms passcode
Sms passcode
 
ConfidentID_broc
ConfidentID_brocConfidentID_broc
ConfidentID_broc
 
Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9Multi factor authentication issa0415-x9
Multi factor authentication issa0415-x9
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Biometric Trends for 2017 Webinar
Biometric Trends for 2017 WebinarBiometric Trends for 2017 Webinar
Biometric Trends for 2017 Webinar
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application Security Protocols for Mobile Banking Application
Security Protocols for Mobile Banking Application
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
biolock Presentation
biolock Presentationbiolock Presentation
biolock Presentation
 

Destaque

Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015Bilcareltd
 
CURRENCY MANAGEMENT: ISSUES AND CHALLENGES IN THE STATE OF J & K
CURRENCY MANAGEMENT:  ISSUES AND CHALLENGES IN THE STATE OF J & KCURRENCY MANAGEMENT:  ISSUES AND CHALLENGES IN THE STATE OF J & K
CURRENCY MANAGEMENT: ISSUES AND CHALLENGES IN THE STATE OF J & KIbadat Singh
 
ban on existing currency and Introduction of new currency in India
ban on existing currency and Introduction of new currency in Indiaban on existing currency and Introduction of new currency in India
ban on existing currency and Introduction of new currency in IndiaVamshi Karnam
 

Destaque (7)

Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015
 
CURRENCY MANAGEMENT: ISSUES AND CHALLENGES IN THE STATE OF J & K
CURRENCY MANAGEMENT:  ISSUES AND CHALLENGES IN THE STATE OF J & KCURRENCY MANAGEMENT:  ISSUES AND CHALLENGES IN THE STATE OF J & K
CURRENCY MANAGEMENT: ISSUES AND CHALLENGES IN THE STATE OF J & K
 
ban on existing currency and Introduction of new currency in India
ban on existing currency and Introduction of new currency in Indiaban on existing currency and Introduction of new currency in India
ban on existing currency and Introduction of new currency in India
 
Hdfc bank ppt
Hdfc bank pptHdfc bank ppt
Hdfc bank ppt
 
RBI Presentation
RBI PresentationRBI Presentation
RBI Presentation
 
Hdfc Bank
Hdfc BankHdfc Bank
Hdfc Bank
 
Latest rbi ppt
Latest rbi pptLatest rbi ppt
Latest rbi ppt
 

Semelhante a Currency

Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problemBilcareltd
 
New Science Transaction Security Journal
New Science Transaction Security JournalNew Science Transaction Security Journal
New Science Transaction Security JournalUL
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSafeDeposit
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsChas Yap
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!Caroline Johnson
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosMatthew Sinclair
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsManzurul Hassan Zumman
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...Jenna Murray
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologiesBilcareltd
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 

Semelhante a Currency (20)

Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
New Science Transaction Security Journal
New Science Transaction Security JournalNew Science Transaction Security Journal
New Science Transaction Security Journal
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Security Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money SafeSecurity Measures in Digital Payment Apps: Keeping Your Money Safe
Security Measures in Digital Payment Apps: Keeping Your Money Safe
 
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKINGARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
ARTIFICIAL INTELLIGENCE IN DIGITAL BANKING
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
 
FinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights DemosFinovateEurope 2024 Summary Insights Demos
FinovateEurope 2024 Summary Insights Demos
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
MACHINE LEARNING AND CONTINUOUS AUTHENTICATION A SHIELD AGAINST CYBER THREATS...
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologies
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Loqr
LoqrLoqr
Loqr
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 

Mais de Bilcareltd

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpakBilcareltd
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016Bilcareltd
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Bilcareltd
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayBilcareltd
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcareltd
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged worldBilcareltd
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali MemoriesBilcareltd
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Bilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_applicationBilcareltd
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for PropertiesBilcareltd
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBilcareltd
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualBilcareltd
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leafletBilcareltd
 
Track and trace
Track and traceTrack and trace
Track and traceBilcareltd
 

Mais de Bilcareltd (20)

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpak
 
Patient first
Patient firstPatient first
Patient first
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga Day
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired Certificate
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged world
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali Memories
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_application
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for Properties
 
Fashion
FashionFashion
Fashion
 
Pharma
PharmaPharma
Pharma
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
Art brochure
Art brochureArt brochure
Art brochure
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User Manual
 
Agrochemicals
AgrochemicalsAgrochemicals
Agrochemicals
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leaflet
 
Track and trace
Track and traceTrack and trace
Track and trace
 

Currency

  • 1. Authentication Solution for Currency Management nonClonableIDTM LABEL WITH BARCODE Bilcare Technologies is a division of Bilcare Ltd. focused on creating next-generation anti-counterfeiting, security, and brand protection solutions for a broad range of industry sectors. With breakthrough research in nanotechnology, Bilcare has developed a unique technology-nonClonableID™- that enables documents and currency to be authenticated as they move between stakeholders. elephantdesign.com © 2010, Bilcare Ltd. All Rights Reserved. All product names, and logos mentioned herein are the trademarks or reg- istered trademarks of Bilcare. No part of this document should be circulated, quoted, or reproduced for distribution without prior written approval from Bilcare Ltd. www.bilcaretech.com tech@bilcare.com Americas USA Bilcare Inc. 300 Kimberton Road Phoenixville, PA 19460 +1 610 422 3305 Europe UK Bilcare Technologies Malvern Hills Science Park, Geraldine Road, Malvern, WR14 3SZ, United Kingdom +44 (0) 1684 585 257 Italy Bilcare Technologies Italia Srl Presso Veneto Nanotech, Via San Crispino 106, 35129 Padua, Italy +39 (049) 7705514 Asia India Bilcare Ltd. 601, ICC Tower, B Wing, Pune 411 016 +91 (20) 30257700 Singapore Bilcare Technologies Singapore Pte. Ltd. 52 Changi South Street 1, Singapore 486161 +65 63954130
  • 2. Counterfeit currency - a growing threat A global problem linked to organized crime The crime of counterfeiting presents a potential danger to national economies and causes financial losses to consumers. There is a significant amount of counterfeit currency in circulation around the world. Recent developments in photographic and printing technology have made the production of counterfeit currency relatively easy, thereby increasing the potential threat. There has been a rapid growth in the counterfeiting of Euro banknotes and coins since the launch of the currency in 2002. In India, counterfeit currency has long been seen as a source of funding for terrorism. Investigations into at least four cases — the Hyderabad bombings of August 2007; the attack on the Indian Institute of Science, Bangalore, in December 2005; the Ahmedabad bombings of July 2008; and the 26/11 terror attack on Mumbai — have revealed a link. (Source: The Pioneer, New Delhi – January 2009) PRO BLEM PROBLEM
  • 3. Non-effective authentication Inadequate security features With increase in counterfeiting of currency across countries, there is a vital need for strengthening the security features of currency and gaining assurance of authenticity. Considering the threat that counterfeiting has on the economy, governments of various nations have recognized the imperative need to combat it. • Need for new, more robust security features. • All existing technologies have a dependence on human intervention, be it secret formulae, algorithms or ingredients, with a corresponding risk of security breach. • Current authentication is often based on visual checks and hence prone to human error. Current currency denominations have overt and covert security features which require human intervention for detection and authentication. This leaves a window for human error. Feature checking requires either diverse equipment or continued awareness campaigns and knowledge retention by the masses to ascertain the presence/ absence of features. Covert Security Features • Watermark • Security thread • Latent image • Micro lettering • Intaglio • Identification mark • Fluorescence • Optically variable ink • See-through register PRO BLEM PROBLEM • Inability to check in real- time and get an appropriate authentication response to all concerned. • Inability to identify and trace the authenticator in real-time for appropriate action as required.
  • 4. nonClonable™ LABEL WITH BAR CODE The nonClonableID™ advantage Robust security features • Applies nanotechnology to facilitate easily-readable authentication of currency. • Unique materials-based fingerprints generated out of randomly distributed micro and nano particles. • Can be applied to the currency note paper before printing. • Real-time authentication through hand-held portable readers. • The fingerprints are machine- readable so the authentication process is objective and reliable. • Complete authentication report on a mobile or computer using robust web enterprise secured applications and data management at back-end. • Dashboard showing real-time problem areas and availability of various reports. SOL UTION SOLUTION The nonClonableID™ label is a unique, materials-based fingerprint consisting of randomly distributed particles and cannot be reproduced even by Bilcare. Bilcare Technologies offers a comprehensive solution to combat counterfeiting through the implementation of its unique nonClonableID™ technology. nonClonableID™ employs unique materials-based fingerprints that are prohibitively difficult to copy. These tamper-evident fingerprints are irreproducible and cannot be duplicated even by Bilcare. The solution enables real-time identification and authentication of the fingerprints through various types of readers.
  • 5. Currency Paper Authentication Servers DataTransfer Printed Currency sheets Currency Printing Sheet Cutting Curing Process Pre-process material in roll form Premises server for control and print Data Matrix Barcode Printing Fingerprint Reading Fingerprint Application Final Die Cut How it works Authentication of currency through nonClonableID™ Bilcare’s solution augments currency security through the following: • Application of the nonClonableID™ feature in currency notes. • Anytime, anywhere e-authentication of currency notes using Bilcare readers thus enabling quick and simple detection of originals and counterfeits at multiple places in real-time. • Immediate alerts on each and every occurrence of a counterfeit. SOL UTION SOLUTION Bilcare’s nonClonableIDTM label
  • 6. A comprehensive solution Protecting the integrity of currency Bilcare’s solution also provides a comprehensive enterprise solution which can enable the generation of management reports and data mining. Bilcare’s smart sensing and alerting engine comprises of configurable alerting and Reporting Software Modules (RSMs). This is provided through an intuitive Graphical User Interface (GUI) that collates key information for authorized users. It is based on a Dashboard that provides a basic overview, series of alerts with respect to reported counterfeits, as well as the ability to quickly drill down into details with respect to individual notes, banks, regions and types of activity. • Innovative security solution for protecting currency from counterfeiting. • Enable real-time identification and authentication of currency and documents. • Authentication and confirmation is possible at all stages of the chain, from the Central Banks to the consumer, including banks, institutions, railways, airlines, shops, wholesalers and retailers. • Prevent forgery, manipulation and misuse. • Empower consumers to authenticate any currency note directly. • Management reports and data mining – platform for real-time smart sensing and action. • Re-assess usage of multiple security features on currency and subsequent cost optimization. • Real-time exceptions report occurrences of counterfeit currency for subsequent action. • Cost-effective solution. SOL UTION BENEFITS The data system stores sufficient relevant information about bank notes and transactions. The RSMs distill information into useful formats from which statistical data, real-time data, and trends can be obtained and compared. Hence the system will not only reduce counterfeiting and enhance security but also supplement knowledge about the issue and help in timely action. Alerts 10:02 - Multiple serial number occurrence 09:58 - Fake note, Mumbai - in field 09:20 - Fake note, Bank - Delhi 09:17 - Inactive note reported - Pune Manage Users | Notes | Batches | Readers Dashboard Alerts Statistics Maps Manage Account | Settings | Help | Logout Date and time Dashboard Statistics # [ mean ] [ m. av. ] [ sd ] Issuance Authentic Unrecognized Note Not Authentic Oct 23 - Nov 22, 2009 All | Note Denomination Day | Week | Month | Year Map Transactions Sample demonstration screenshot of the GUI, showing the Dashboard and how the various sub-sections relate.