SlideShare uma empresa Scribd logo
1 de 16
Micro and nanotechnology to enhance the physical security of credentials and products Adrian Burden
Passport fraud is the 'biggest threat facing the world', claims Interpol Published Date: 29 January 2010 "The greatest threat in the world is that last year there were 500m, half a billion, international air arrivals worldwide where travel documents were not compared against Interpol databases, Right now in our database we have over 11 million stolen or lost passports.” Secretary-General of Interpol Ronald Noble, at the World Economic Forum in Switzerland, 28 Jan 2010.
Overview Introduction to counterfeiting Documents / ID credentials and products Introduction to micro and nanotechnology Materials science and engineering on the small scale Applying micro and nanotechnology to security Enhancing security, providing multiple layers Examples of technologies Conclusion
Counterfeiting & security ,[object Object]
Tamper evidence
Authenticity
Secure identity
Pedigree
Track and traceDigital Media (piracy) Digital / biometrics Packaging Physical items Credentials & Documents (fraud) Products (fakes) ,[object Object],Warranty cards / CoCs
Trends with documents, and now products Sophistication of counterfeiters increasing Advanced printing, advanced manufacturing Counterfeiting a high value / high volume business From currency / ID, thru’ medicines / spare parts, to shampoo Fraud and counterfeiting is an organized crime Funds large operations, including child-labour / terrorism The need for multiple layers  overt, covert, forensic
Some facts and figures Passports & fraud:   Fraud costs the UK economy an estimated £20bn a year 1 Currency: 2.5% (1 in 40, or may be 1 in 20) pound coins are fake in UK 2 Pharmaceutical Fastest growing customs seizures – 10% 2008 for US Customs 3 Fashion:  Fake shoes the most common category – 38% / $102m seized 3 1 BBC report 28th July 2009 news.bbc.co.uk/1/hi/business/8171325.stm 2 BBC report 8th April 2009 http://news.bbc.co.uk/1/hi/uk/7988001.stm 3 Washington Post, 20th Nov 2009 – Crackdown targets counterfeit drugs
No to Fakes, our brand-centric resource
Introduction to nanotechnology Controlling materials at the small size scale 1 nm is 0.000 000 001 m (1 atom is ~0.1 nm, hair width = ~200,000 nm) Much hype about ‘grey goo’ and ‘swarms’ Reality is of specialist materials with unique properties Is impacting coatings, catalysts, electronics, mechanics… Is applied to packaging, energy, manufacturing, security…
Advantages of nanotechnology Advanced technology High tech fabrication provides barrier to copying Small details make reproduction difficult Small size ideal for covert / forensic marking Issues Authenticating ‘nano-tags’ can be difficult / expensive Expense of commercial quantities of nanomaterials Yield / reproducibility in mass production Toxicity / compatibility There are many approaches with distinct advantages and disadvantages
Optical Quantum confinement effects Specific wavelengths of light Covert security – watermark / analogous to uvink Examples of companies and products www.nanosysinc.com (with Life Technologies) www.oxonica.com www.evidenttech.com www.nanocotechnologies.com
Molecular / chemical Taggants, chemicals and molecular markers Specialist detection equipment Covert and / or forensic For solids and liquids Examples of companies Nanobarcodes (was from Nanoplex / Oxonica) www.microtracesolutions.com www.adnas.com www.nanoguardian.net

Mais conteúdo relacionado

Semelhante a Micro and nanotechnology to enhance the physical security of credentials and products

Microtechniek Drukken Van Polymere Rfid Tags 20100218
Microtechniek Drukken Van Polymere Rfid Tags 20100218Microtechniek Drukken Van Polymere Rfid Tags 20100218
Microtechniek Drukken Van Polymere Rfid Tags 20100218
Themadagen
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
vafopoulos
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
Bilcareltd
 

Semelhante a Micro and nanotechnology to enhance the physical security of credentials and products (20)

Microtechniek Drukken Van Polymere Rfid Tags 20100218
Microtechniek Drukken Van Polymere Rfid Tags 20100218Microtechniek Drukken Van Polymere Rfid Tags 20100218
Microtechniek Drukken Van Polymere Rfid Tags 20100218
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
 
Wearable Electronic Medical Devices: What Fails & Why?
Wearable Electronic Medical Devices: What Fails & Why?Wearable Electronic Medical Devices: What Fails & Why?
Wearable Electronic Medical Devices: What Fails & Why?
 
Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015Wyoming technology business conference sandhi bhide, may 13, 2015
Wyoming technology business conference sandhi bhide, may 13, 2015
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
RFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in SheltersRFID Smart Tags for Controlling Belonging in Shelters
RFID Smart Tags for Controlling Belonging in Shelters
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
Tagit EM presentation of CEO Vladimir Manov
Tagit EM presentation of CEO Vladimir ManovTagit EM presentation of CEO Vladimir Manov
Tagit EM presentation of CEO Vladimir Manov
 
Chiesa_ Isecom
Chiesa_ IsecomChiesa_ Isecom
Chiesa_ Isecom
 
Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti Industriali
 
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEMNICANTI  BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
NICANTI BARCODE SECURITY AND BRAND PROTECTION PRINTING SYSTEM
 
Counterfeiting a growing problem
Counterfeiting   a growing problemCounterfeiting   a growing problem
Counterfeiting a growing problem
 
Writing about Nano
Writing about NanoWriting about Nano
Writing about Nano
 
Smart health
Smart healthSmart health
Smart health
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
Lecture7
Lecture7Lecture7
Lecture7
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Indu...
Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Indu...Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Indu...
Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Indu...
 
IP-Protected 3D-Printed Electronics and More
IP-Protected 3D-Printed Electronics and MoreIP-Protected 3D-Printed Electronics and More
IP-Protected 3D-Printed Electronics and More
 

Mais de Bilcare Research

Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development Factsheet
Bilcare Research
 

Mais de Bilcare Research (13)

Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Cs Ivrs
Cs IvrsCs Ivrs
Cs Ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Virtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeVirtualization Helps Bilcare Optimize
Virtualization Helps Bilcare Optimize
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development Factsheet
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Anti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesAnti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging Technologies
 
Dispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DDispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &D
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business Growth
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Micro and nanotechnology to enhance the physical security of credentials and products

  • 1. Micro and nanotechnology to enhance the physical security of credentials and products Adrian Burden
  • 2. Passport fraud is the 'biggest threat facing the world', claims Interpol Published Date: 29 January 2010 "The greatest threat in the world is that last year there were 500m, half a billion, international air arrivals worldwide where travel documents were not compared against Interpol databases, Right now in our database we have over 11 million stolen or lost passports.” Secretary-General of Interpol Ronald Noble, at the World Economic Forum in Switzerland, 28 Jan 2010.
  • 3. Overview Introduction to counterfeiting Documents / ID credentials and products Introduction to micro and nanotechnology Materials science and engineering on the small scale Applying micro and nanotechnology to security Enhancing security, providing multiple layers Examples of technologies Conclusion
  • 4.
  • 9.
  • 10. Trends with documents, and now products Sophistication of counterfeiters increasing Advanced printing, advanced manufacturing Counterfeiting a high value / high volume business From currency / ID, thru’ medicines / spare parts, to shampoo Fraud and counterfeiting is an organized crime Funds large operations, including child-labour / terrorism The need for multiple layers overt, covert, forensic
  • 11. Some facts and figures Passports & fraud: Fraud costs the UK economy an estimated £20bn a year 1 Currency: 2.5% (1 in 40, or may be 1 in 20) pound coins are fake in UK 2 Pharmaceutical Fastest growing customs seizures – 10% 2008 for US Customs 3 Fashion: Fake shoes the most common category – 38% / $102m seized 3 1 BBC report 28th July 2009 news.bbc.co.uk/1/hi/business/8171325.stm 2 BBC report 8th April 2009 http://news.bbc.co.uk/1/hi/uk/7988001.stm 3 Washington Post, 20th Nov 2009 – Crackdown targets counterfeit drugs
  • 12. No to Fakes, our brand-centric resource
  • 13. Introduction to nanotechnology Controlling materials at the small size scale 1 nm is 0.000 000 001 m (1 atom is ~0.1 nm, hair width = ~200,000 nm) Much hype about ‘grey goo’ and ‘swarms’ Reality is of specialist materials with unique properties Is impacting coatings, catalysts, electronics, mechanics… Is applied to packaging, energy, manufacturing, security…
  • 14. Advantages of nanotechnology Advanced technology High tech fabrication provides barrier to copying Small details make reproduction difficult Small size ideal for covert / forensic marking Issues Authenticating ‘nano-tags’ can be difficult / expensive Expense of commercial quantities of nanomaterials Yield / reproducibility in mass production Toxicity / compatibility There are many approaches with distinct advantages and disadvantages
  • 15. Optical Quantum confinement effects Specific wavelengths of light Covert security – watermark / analogous to uvink Examples of companies and products www.nanosysinc.com (with Life Technologies) www.oxonica.com www.evidenttech.com www.nanocotechnologies.com
  • 16. Molecular / chemical Taggants, chemicals and molecular markers Specialist detection equipment Covert and / or forensic For solids and liquids Examples of companies Nanobarcodes (was from Nanoplex / Oxonica) www.microtracesolutions.com www.adnas.com www.nanoguardian.net
  • 17. Textural / morphology Small-scale features Intrinsic micro and nanostructure - disordered ‘Fingerprint’ of paper, package, substrate, etc Area needs to be locatable and aligned Infrastructure For authentication But also track and trace
  • 18. Magnetic Features Advantages Invisible signature with small feature size Reliable low-cost read-heads available Fast reading possible Can be made extremely robust Magnetic inks and watermarks possible Disadvantages Added to item (not usually intrinsic) Detector / Reader required
  • 19. Bilcare’snonClonableTM system DATA RECORD 1.Scanned barcode & fingerprint send to server 3.Information from Brand Owner to Forward to Source 4. Customized Information Sent Back to User 2. Secure Query of Brand Owner Server Bilcare’s Secure Clearing House Data Server Brand Owner Server See more at stand E21
  • 20. Conclusions Document security and brand protection converging Multiple layers required Overt, Covert and Forensic solutions Micro and Nanotechnology Physical materials-technology to provide some of these layers Higher barriers to counterfeiting Enhanced complexity and security Range of approaches – taggants, dyes, markers, structures IT and central database systems playing a larger role