Risk
10/27/2009
01:34 PM
50%
50%

SAP, Nokia Partner On Mobile Security

With the joint venture's technology, prescription drugs, software, and other goods could be tagged with smart barcodes to protect them from counterfeiting.

SAP, Nokia, and a German-based supplier of security technologies have formed a company that will let businesses use smartphones to track products that are susceptible to counterfeit and piracy.

The company, called Original1, will be headquartered in Frankfurt, Germany, and will offer product authentication and anti-counterfeit services across the globe.

Specifically, using Original1's products, manufacturers would tag prescription drugs, packaged software, designer-labeled products, and other items susceptible to counterfeit with smart barcodes. Personnel both in the supply chain and at retail sites would be able to verify the identity of products by swiping them against a reader on their Nokia smartphones and matching that information to a database.

Original1's services will use SAP server software and Nokia's mobile authentication software. Germany-based Giesecke & Devrient, which is the third owner of Original1, will supply the security and ID-related technologies, including user authentication and data encryption. Claudia Alsdorf, currently VP of SAP Research, will head Original1, which is scheduled to open by year's end.

"We see a big business opportunity in brand protection services," said Antti-Jussi Suominen, GM of commerce, corporate development at Nokia, in a prepared statement. "Nokia started a mobile phone-based product authentication business program in 2006; this joint venture is a logical step in evolving that business."


InformationWeek Analytics has published a report on the 10 steps to effective data classification. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.