{"id":2552,"date":"2014-08-22T05:06:47","date_gmt":"2014-08-22T05:06:47","guid":{"rendered":"https:\/\/www.enaikoon.com\/?p=2552"},"modified":"2019-07-31T15:17:26","modified_gmt":"2019-07-31T15:17:26","slug":"new-security-bag-with-nfc-tag","status":"publish","type":"post","link":"https:\/\/www.enaikoon.com\/en\/new-security-bag-with-nfc-tag\/","title":{"rendered":"New: Security bag with NFC tag"},"content":{"rendered":"<div class=\"gl_blog_text\">\n\n<strong class=\"gl_color_blue\">NFC Security Bag including the NFC smartphone app for optimal tracking and storage with tamper protection \u2013 first look available at <a style=\"color: #666;\" title=\"GPEC Leipzig 09.-11.09.2014\" href=\"https:\/\/gpec.de\/index.php?id=2&amp;L=1\" target=\"_blank\" rel=\"nofollow\">GPEC<\/a> from September 9th \u2013 11th 2014, Stand C67 in H1.<\/strong>\n\nNew release available now from ENAiKOON, NFC Security Bag and the coordinating NFC smartphone app with integration into inViu web, ENAiKOON\u2019s highly secure telematics platform.\n<div class=\"gl_blog_img_style1\"><a href=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Bag_NFC_Chip.jpg\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Bag_NFC_Chip.jpg\" alt=\"Security Bag with NFC \" width=\"300\" height=\"225\" \/><\/a><\/div>\n<div class=\"gl_blog_img_style1\"><a href=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/NFC_Bag_on_a_Roll.jpg\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/NFC_Bag_on_a_Roll.jpg\" alt=\"NFC Security Bag\" width=\"300\" height=\"230\" \/><\/a><\/div>\n<strong class=\"gl_color_blue\">Typical use cases<\/strong>\nSecurity bags with an integrated NFC tag are particularly suitable for the safe transport and professional storage and safekeeping of important objects, including tamper protection. The following are examples of typical use case for these security bags:\n\u2022 Confidential and important document transfer\n\u2022 Transport of high value goods\n\u2022 Equipment security policy for weapons, illegal narcotics, and other restricted access items\n\u2022 Transport of urine and blood samples for doping tests\n\u2022 Chain of custody drug testing\n\u2022 Forensic evidence collection and storage\n\u2022 Personal property bags for patients in hospitals or deceased individuals\n\u2022 Inmate personal property inventory\n\u2022 Chain of custody for expensive or dangerous pharmaceutical, biological or chemical products\n\u2022 Secure data disposal to verify the destruction or hard drives or other storage devices with important data from banks, power plants, and other facilities which are not connected to the internet\n\u2022 and many more\n\nLost or altered items are now a thing of the past.\n<div class=\"gl_blog_img_style1\"><a href=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Anwendungen_f%C3%BCr_Sicherheitsbeutel_2.jpg\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Anwendungen_f%C3%BCr_Sicherheitsbeutel_2.jpg\" alt=\"Anwendungen_f\u00fcr_NFC_Sicherheitsbeutel_2\" width=\"600\" height=\"90\" \/><\/a>\n<a href=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Anwendungen_f%C3%BCr_NFC_Sicherheitsbeutel.jpg\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.enaikoon.com\/wp-content\/uploads\/2016\/07\/Anwendungen_f%C3%BCr_NFC_Sicherheitsbeutel.jpg\" alt=\"Anwendungen_f\u00fcr_NFC_Sicherheitsbeutel\" width=\"600\" height=\"90\" \/><\/a><\/div>\n<strong class=\"gl_color_blue\">Typical requirements<\/strong>\n\u2022 Error-free and 100% traceable documented tracking for transport of critical objects\n\u2022 Complete documentation of the contents, storage area as well as the responsible person in each case for the NFC security bag\n\u2022 Management of additional information as needed for each security bag including for example comments, photos, audio notes, videos, electronic signature capture, etc.\n\u2022 Evidence of tampering, changing or tampering with the contents of the security bag are evident and able to be identified\n\n<strong class=\"gl_color_blue\">Features of the NFC security bag<\/strong>\n\n<strong>NFC tag for tamper proof identification<\/strong>\nThe high tech NFC security bags from <a title=\"ginstr business apps\" href=\"http:\/\/www.ginstr.com\" target=\"_blank\" rel=\"nofollow\">ginstr<\/a> are equipped with an NFC tag and are more secure than the current bags on the market using bar-codes or written information.\nWith the NFC tag the NFC security bag and the associated information is saved in a databank using a smartphone app. By simply reading the NFC tag an approved smartphone is able to access all relevant data concerning the associated NFC security bag.\nIn addition to the collecting and reading the NFC security bag information photos, videos, electronic signature capture, audio notes, comments, etc. can be centrally stored and recalled later.\n\n<strong>Consecutive serial numbers<\/strong>\nIn addition to NFC tags the NFC security bags have consecutive serial numbers that are tamper proof and stored on the NFC tag. The serial numbers are unique per customer and the NFC tags are globally unique. Thus, neither can a security bag be missed nor another organisations security bags used.\n\n<strong>Tamper evident closure<\/strong>\nThe NFC security bag cannot be opened without destroying it. Attacks by heat, cold, or attempts to close a bag which has been opened are recognisable due to obvious signs of tampering.\n\n<strong>Removable ownership receipt<\/strong>\nWith this record the owner of the contents can prove ownership or the sender of the bag that it is shipped.\n\n<strong>Customisable printing<\/strong>\nThe NFC security bag can be printed with your logo and any additional fields as needed for your organisation.\n\n<strong>A variety of sizes and optional extras<\/strong>\nThe NFC security bags can be produced in different sizes.\nStandard sizes are 152\u00d7228 mm (6\u00d79 inches), 228\u00d7304 mm (9\u00d712 inches), 304 x457 mm (12\u00d718 inches), 381\u00d7508 mm (15\u00d720 inches)\nThe security bags can be produced in different versions, for example with an antistatic coating for hard drives and other storage devices.\n\n<strong>Price<\/strong>\nDepending on the quantity ordered the cost of NFC Security Bags ranges from \u20ac2.90 \u2013 \u20ac4.90 per unit. The monthly subscription fee for the use of the smartphone app and back end administration software, including data storage on ENAiKOON\u2019s highly secure servers, costs \u20ac9.90 per month per user with a minimum contract length of 24 months. All prices are excluding VAT.\n<a href=\"https:\/\/www.ginstr.com\/pricing\/\" target=\"_blank\" rel=\"nofollow\">More information about prices<\/a>\n\n<strong>More informationen<\/strong>\nRead more on the<a title=\"ginstr NFC security bag tracking\" rel=\"nofollow\" href=\"http:\/\/www.ginstr.com\/de\/sicherheitsbeutel-mit-funk-chip-und-sendungsverfolgung\/\"> ginstr website<\/a> about use cases and functions.\n\n<\/div>","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,35,36,44,45,46,49,50],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/posts\/2552"}],"collection":[{"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/comments?post=2552"}],"version-history":[{"count":14,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/posts\/2552\/revisions"}],"predecessor-version":[{"id":17230,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/posts\/2552\/revisions\/17230"}],"wp:attachment":[{"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/media?parent=2552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/categories?post=2552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enaikoon.com\/en\/wp-json\/wp\/v2\/tags?post=2552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}