Your Key to Security. KeySecure The Tracing System for Product Authentication



Similar documents
complexity data room is unique.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

We Believe in Security with a Capital S

Managed Security Services for Data

ICANWK406A Install, configure and test network security

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

NEFSIS DEDICATED SERVER

Avira Small Business Security Suite Avira Endpoint Security. Quick Guide

The Secure Web Access Solution Includes:

Chapter 7 Information System Security and Control

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

White Paper DocuWare Cloud. Version 2.0

Managing internet security

Zone Labs Integrity Smarter Enterprise Security

Cloud Management Platform. Overview

How To Install Avira Small Business Security Suite (Small Business) On A Microsoft Microsoft Server (Small Bserver) For A Small Business (Small) Computer (Small Server)

Industrial Security Solutions

More efficient logistics processes with FleetBoard Logistics Management.

Filtering remote users with Websense remote filtering software v7.6

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Simplify Your Network Security with All-In-One Unified Threat Management

Brainloop Cloud Security

Avira Small Business Security Suite. HowTo

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Fujitsu Dynamic Cloud Bridging today and tomorrow

Security Technology: Firewalls and VPNs

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Pacom Systems. All rights reserved.

system monitor Uncompromised support for your entire network.

Cornerstones of Security

WORKFLOW MANAGEMENT FOR THE CLINICAL RADIOLOGY

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls Overview and Best Practices. White Paper

HANDBOOK 8 NETWORK SECURITY Version 1.0

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How To Protect A Web Application From Attack From A Trusted Environment

ACCESSNET -T IP NMS. Network Management System.

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

Borderware MXtreme. Secure Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Two-Tier Firewall genugate. Robust Security for Networks

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Consensus Policy Resource Community. Lab Security Policy

Spillemyndigheden s Certification Programme Information Security Management System

Security Administration R77

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Common Remote Service Platform (crsp) Security Concept

Intro to Firewalls. Summary

Software solutions from Integrated Engineering to Integrated Operations

Design and Implementation Guide. Apple iphone Compatibility

Increase company profitability with FleetBoard Vehicle Management.

Lecture 23: Firewalls

THE ROLE OF IDS & ADS IN NETWORK SECURITY

ISM/ISC Middleware Module

PSIwms - Warehouse Management Software in the Logistical Network

Jordans Group. Anti-money laundering checks: Overview. Case Study

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Remote Disaster Recovery Services Suite (nvision Edition)

Using Contactless Smart Cards for Secure Applications

System Requirements. 60GB free after OS and Updates, Raid 5 or Hybrid SSD array

Fujitsu s Approach to Cloud-related Information Security

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations

Professional Retail Services

StampaTech InvisiCode The next step in interactive print.

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Business On Line CUSTOMER HANDBOOK

Account Activation. Guide

BlackStratus for Managed Service Providers

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Firewall Environments. Name

Remote Deposit Terms of Use and Procedures

Control and management of privileged users

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

McAfee Network Security Platform Administration Course

Accessing TP SSL VPN

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

NETWORK AND INTERNET SECURITY POLICY STATEMENT

nfx One for Managed Service Providers

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Egress Switch Best Practice Security Guide V4.x

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

TechGuard Firewall Products Specs/Parts/Competitive Analysis

SIMATIC Remote Services. Industry Services

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Transcription:

Your Key to Security KeySecure The Tracing System for Product Authentication

Security Solutions for all Sectors Suppliers of branded products are increasingly threatened by counterfeiting and grey market trading. The consequences range from lost revenues all the way to irreparable damage to the manufacturer s image. For the consumer, counterfeiting of spare parts and pharmaceuticals may even pose lifethreatening risks. It s time to stop this dangerous trend!

Background While overt security features can be readily recognised by the consumer, they may fall short of providing the desired level of protection. Hidden features offer higher levels of security but may require authentication by special equipment or experts. Challenge While overt security features can be readily recognised by the consumer they may fall short of providing the desired level of protection. Covert features offer high levels of security but may require authentication by special equipment. Solution KeySecure is the modular tracing system from Schreiner ProSecure. KeySecure marks each product with a unique, highly complex security code. This code can be authenticated at any stage of the distribution chain via an encrypted Internet connection anywhere in the world. Tried and tested KeySecure application: authentication seal and portal of Bosch original spare parts.

Sophisticated Security Concept Unlike conventional security features, the KeySecure intelligent tracing system allows the origin, destination or other specified product features to be clearly identified anywhere in the world - enabling the consumer to verify product authenticity easily.

Each product becomes a unique item The KeySecure code is a 15-digit alpha-numerical key printed as plain text or in barcode form. The security level of this encrypted reference to the original product is many times higher than that of random-generated codes. Quick and convenient authentication Product authentication uses the Internet ideally via a direct link on the product manufac turer s website. Any inspector or consumer entering the printed code will immediately receive confirmation of product authenticity. Tamper-proof system Entry of a false code, which may indicate a case of product counterfeiting, will prompt a warning message. The system logs each product query and can be customised to reject multiple entries of the same 15-digit code at preagreed levels. KeySecure as a marketing tool The KeySecure authentication system can be combined with a host of other consumer information: product descriptions, user instructions, customer surveys or promotional activities, for example. An analysis of system queries provides valuable information on customer or user profiles. Schreiner KeySecure Security marking/printing Manufacturer Logistics Centre Distribution Consumer Encryption Code generation Authentication system Authentication of the product code Infinite security The security level achieved by KeySecure can merely be described in theoretical terms: It would take five billion Intel XEON Quad Core 2.6 GHz computers 56.117 billion years to read the entire code room.

Seamless Process Security Computing centre 1 1st Level: Application Level Gateway, Virus Scanner, Proxy Encryption 2nd Level: DMZ 3rd Level: Packet Filter Authentication System Internet Firewall 1 Firewall 2 Demo System Computing centre 2 The KeySecure network Latest-generation hard- and software protects the Key- Secure network against unauthorised access. The server structure and a failsafe backup system meet maximum security requirements. Firewall 3 Encryption/Generation System Company Network

Top-end quality and security Schreiner ProSecure is certified according to the stringent quality standards of the pharmaceutical and automotive industries. Seamless protection of security product manufacturing is guaranteed by audited monitoring systems. Only a restricted group of operators can initiate the generation of KeySecure codes from designated workstations. The security codes are generated exclusively by a specially protected system, combining different encryption technologies, like RC4 and Blowfish with 128-bit key length. A special firewall configured as a multi-stage high-availability system protects the entire ProSecure server network against unauthorised access. The Schreiner ProSecure query system can be accessed by consumers and authorised personnel within the distribution chain via a 128-bit encrypted Internet connection. Password protection for the link to the query page is available on request. State-of-the-art image processing systems ensure 100 % final inspections of numbered labels. Video monitored production and warehouse areas provide maximum security.

An Unbeatable Combination The combination of Schreiner ProSecure s tried and tested tamper and counterfeit protection features with the KeySecure tracing system achieves whole new levels of security: The integration of Key Secure codes in security labels links physical with logical security features creating a highly effective tool for product, brand and document protection.

KeySecure can be integrated into customised security products: Holograms Features which can be easily identified visually, like holograms, offer particularly distinctive and decorative authenticity protection. Unique security features, like dynagrams, nano-text, 2D / 3D effects raise counterfeiting protection levels step-by-step. Holograms allow even non-experts to readily recognize an original, and the addition of a void effect provides reliable tamper protection. Logistics Seal Schreiner ProSecure s Logistics Seal provides reliable authenticity protection, from the factory to the consumer. Suitable security features are integrated into the labels according to the client s specifications. Overt, covert and forensic elements are available for authentication. In addition, the seal is equipped with a self-destruction effect that provides reliable evidence of any tampering attempt or unauthorised first opening of the packaging. Pharmaceutical identification Today s pharmaceutical labels combine numerous functionalities in an extremely small space. Schreiner MediPharm s Pharma-Multi-Inform product family, for example, offers an enlarged area for text by means of multi-layered labels or booklets. Pharma-Comb labels come with one or several detachable segments. In combination with KeySecure codes, they provide multi-functional labelling solutions including reliable authentication of original products. Holograms are security features which can be quickly identified by consumers. The logistics seal provides reliable authenticity protection across the entire distribution process. Authentication codes can be integrated on the main product label and on detachable documentation labels in an extremely small space.

Security Partnership You Can Trust Around the Globe

Schreiner ProSecure is your reliable development partner, providing you with customised solutions that address your specific needs: Schreiner ProSecure experts help you to scope your project, then develop suitable proposals, assist you in evaluating and selecting the solution that best meets your needs, and ensure its successful implementation. Using in-house research and development capabilities, Schreiner ProSecure has been working out innovative, project-specific security solutions for constantly changing requirements. Efficient project management, including a complete chain of documentation, as well as use of the latest developments and production technology give you reliable product protection against counterfeiting, tampering and abuse. Our worldwide network of sales locations ensures optimum local customer support as well as country-specific adaptation of products and KeySecure Internet integration. Schreiner ProSecure is your reliable partner for any security requirements. Why not put ProSecure to the test: Project analysis: Threat Prerequisites Application Project solution: Security features Product selection Application tests Phone +49 89 31584-5428 Fax +49 89 31584-5317 info@schreiner-prosecure.com Project monitoring: Audits Inspections Log-file analysis Project implementation: Manufacturing Programming Website integration Schreiner ProSecure stands for reliable project partnership, from the initial analysis of your needs all the way to monitoring the successful outcome of your project.

Concentrated Competence, a Pool of Innovative Power. Solutions for Authenticity Protection of Products and Brands Solutions for Document and Value Protection Effective PIN Protection Track & Trace Solutions Tamper Evidence Consulting and System Integration of Hard- and Software Comprehensive Security Management Individual Risk and Process Analysis Schreiner ProSecure, a division of Schreiner Group, is a supplier of innovative, self-adhesive security solutions for product, brand and document protection with worldwide activities. Innovation, Quality, Performance and Enthusiasm: These are the core values to which Schreiner Group subscribes. The extensive know-how and performance portfolio of all group members, including research and development, is fully available for Schreiner ProSecure to draw on as needed. Schreiner ProSecure, a division of Schreiner Group GmbH & Co. KG Bruckmannring 22 85764 Oberschleissheim/Germany Phone +49 89 31584-5428 Fax +49 89 31584-5317 info@schreiner-prosecure.com www.schreiner-prosecure.com 03/070709/164