Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

1/12/2012
02:25 PM
50%
50%

WISeKey And INSIDE Secure Join Forces To Target Counterfeit Luxury Goods

New solution also will offer sales monitoring and direct marketing capabilities

GENEVA, Switzerland and AIX-EN-PROVENCE, France, January 11, 2012 - WISeKey and INSIDE Secure today announced a partnership to create a new breakthrough evolution of the WISeAuthentic solution suite which provides protection against counterfeiting, offers powerful sales monitoring and direct marketing capabilities. WISeAuthentic employs time-tested security technologies to help luxury brands ensure the authenticity of their goods from the supply chain to the end customer and beyond. The new generation of the authentication solution, which will be developed and marketed jointly by the two companies, will provide a convenient way for retailers and consumers to verify the authenticity of luxury goods at the point of sale, using smartphones enabled with Near Field Communication technology (NFC). WISeKey will employ INSIDE Secure's new VaultIC(tm) 150 security module, which combines tamper-proof security with a wireless interface that communicates with a smartphone or other NFC reader to determine the product's authenticity.

"Our WISeAuthentic service is already at work defending luxury brands in their fight against counterfeiters, to monitor their sellout operations, and establish a lifelong bond with customers. Our partnership with INSIDE Secure will be a major step towards the future, scaling our solution to store an unforgeable digital certificate of authenticity in formats other than just smartcards by taking advantage of the power of NFC technology. Today's smartphones allow us to offer new value added services that luxury brands can offer their clientele, making it easier than ever before to prove a product's authenticity," said Carlos Moreno, vice president Digital Brand Management at WISeKey. "This kind of solution could be applied to many industries in addition to luxury goods, including gemstones, fine wines, pharmaceutical and medical products, and aeronautical and automotive parts."

WISeKey's digital brand protection solutions are based on proven public key infrastructure (PKI) technology that creates a cryptographically secured digital certificate of authenticity containing the product's identity code. The NFC tag ID will be impossible to replicate, and the solution will be available at a small fraction of the cost of sales lost from counterfeits. The IACC (International Anti-Counterfeiting Coalition) estimates that brand holders lose approximately $600 billion of revenue annually due to counterfeiting.

"The NFC interface is key in this application because it enables the strong cryptographic capabilities of the VaultIC to operate on induced power, allowing it to be employed in products like handbags or wine bottles that do not have their own built-in power source," said David Richetto, marketing manager for Embedded Security Products and applications manager for Secure ICs at INSIDE Secure. "The elliptic curve asymmetric cryptography this system uses offers the strongest protection available to combat counterfeiters, yet allows a compact, cost-effective design, and we can use it to create NFC tags small enough to be available in a variety of form factors to accommodate the shape of various products."

"NFC is now rapidly being adopted by all the major smartphone makers, providing an ideal platform consumers can use for a broad range of NFC applications, including the ability to verify that the goods they purchase are genuine," said Christian Fleutelot, general manager of the VaultIC Secure Microcontroller Solutions business unit at INSIDE Secure. "Our single-chip NFC security module can embed banking-level security directly within products cost effectively to protect brands, and by partnering with WISeKey, we can deliver a complete authentication solution that's easy for retailers and consumers to use."

WISeKey will be participating at the 2012 Geneva Time Exhibition, showcasing WISeAuthentic 15 - 20 January, at the Espace Hippomne, Geneva. For more information about WISeAuthentic, visit http://www.wiseauthentic.com.

About WISeKey WISeKey is a leading information security and identity management company, providing specialized security technologies for data protection, effective identification and authentication of people or objects over physical infrastructures, networks and the Internet to ensure secured communications and e-transactions without compromising trust. Established in 1999, and headquartered in Geneva Switzerland, WISeKey also has subsidiaries that solve advanced e-security issues for organizations in many sectors, including defense, health, education, finance and government. For more information, visit www.wisekey.com.

About INSIDE Secure INSIDE Secure is a leading designer, developer and supplier of semiconductors, embedded software and platforms for secure transactions and digital security. INSIDE mobile NFC, secure payment and digital security products provide security for a wide range of information processing, storage and transmission applications. The company's customers are found in a wide range of markets including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television and mobile service operators. For more information, visit www.insidesecure.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5162
PUBLISHED: 2020-02-25
An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as t...
CVE-2019-5165
PUBLISHED: 2020-02-25
An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker ...
CVE-2020-9383
PUBLISHED: 2020-02-25
An issue was discovered in the Linux kernel through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
CVE-2019-5136
PUBLISHED: 2020-02-25
An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands ...
CVE-2019-5137
PUBLISHED: 2020-02-25
The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A firmware version 1.13.