Upload
emily-veazie
View
212
Download
0
Tags:
Embed Size (px)
Citation preview
IT Solutions for IT Solutions for Security & Trade FacilitationSecurity & Trade Facilitation
Susan EvansSusan EvansBusiness Development, EMEABusiness Development, EMEA
All Rights Reserved. Confidential
Agenda
• The Challenge• Requirements• A Technology Approach• Case Study
All Rights Reserved. Confidential
The Challenge
• Limited visibility of movements of goods• Limited information of trading partners• Lack of existing infrastructure• Security Breach
– When did it happen– Who was in custody of the goods
• Acceptance of new processes & technology
All Rights Reserved. Confidential
Requirements
• A solution that provides security• A solution that provides visibility and data
– Forensics for improving supply chain security
• A solution that automates and improves supply chain efficiency
• An adaptable solution that meets differing objectives– Theft– Smuggling– Bombs and Weapons of Mass Destruction
All Rights Reserved. Confidential
A typical supply chain Network includes…
• Movement Vehicle
• Container (sea)
• Pallet
• Master Carton
• Item
ActiveRFID
Satellite
Passive RFID
BarCode
• ULD (air)
Semi-Passive
RFID
Paper
All Rights Reserved. Confidential
A Technology Solution
• Radio Frequency Identification Device (RFID)– Hardware Device for Security
• Software Application that collects the information and makes available to users– Transportation Security System
• A Network that supports the RFID technology
All Rights Reserved. Confidential
A Typical RFID Network Includes…
Applications for user interaction
Enterprise systems for coordinated decision making
Local systems for site coordination
ZONES
APPLICATIONS
Distribution CenterWarehouseManufacturer Store
Web Browser AlertsEnterprise Software
ENTERPRISE Other Enterprise
SITES
ASSETS
RFID readers
RFID tags (Active or EPC/Passive)
All Rights Reserved. Confidential
36 countries and growing
400 nodes – Airports, Seaports, Rail Terminals, Consolidation Points
250,000 conveyances tracked
Open network, international (ISO) and technology standards-based system
Integrated with a number of complementary technologies (sensors, GPS, handheld devices)
Technology infrastructure available for global container security
US Govt. Dept. Total Asset Visibility Network
Macedonia
BremerhavenAntwerp
Port BrindisiBeaumont
McGuire Air Force Base
All Rights Reserved. Confidential
READER
SIGNPOST
BEACON MODE
SIGNPOST MODE
TAMPER EVENT
Tag ID
Seal Condition
Tag ID
Tamper Condition
2.4GHz or otherBackhaul
RADIO ACCESS POINT
PORT HARDWARE INFRASTRUCTURE
SAVI SITE MANAGER
Signpost ID
123 KHz
Tag ID + Signpost ID +
Seal Condition433 MHz
SAVI MOBILE READER POD
AND HANDHELD
Seal/Tag Commands
433MHz
Seal/Tag Commands
433MHz / 123 KHz
Tag ID
Tamper Condition
Tag ID
Tamper Condition
Tag ID
Tamper Condition
Tag ID
Tamper Condition
SMART SEAL TAG
Tag ID
Seal Condition
Tag ID
Seal Condition
Tag ID
Seal Condition
All Rights Reserved. Confidential
Examples of RFID Tags
ST-604
ST-654
ST-602
ST-645 New ST-645EJB ESeal
General Asset Tracking Security Tags
RFID Tags
Smart Lables
Future Tags will be smaller than a grain of rice
Intelligent LabelsIntelligent Labels
SHIP TO: SHIP FROM:
COMMANDING OFFICER DDSP SUSQUEHANNA, PA 15230
CHEMICAL SUPPLIER CHEMICAL COMPANY INSTITUTE, WV 23456
TCN:
NSN:
CAGE:
MSDS #:
GTIN:
HCC:
AHRIST DATA:
AWHGEAA$0F00090XX
5310011987585
AWHGE 00098756100013CHEM WT:
ABCDE 10000A1
SHIP TO: SHIP FROM:
COMMANDING OFFICER DDSP SUSQUEHANNA, PA 15230
CHEMICAL SUPPLIER CHEMICAL COMPANY INSTITUTE, WV 23456
TCN:
NSN:
CAGE:
MSDS #:
GTIN:
HCC:
AHRIST DATA:
AWHGEAA$0F00090XX
5310011987585
AWHGE 00098756100013CHEM WT:
ABCDE 10000A1
Bar codes give way to Intelligent Labels (Passive RFID tags)
All Rights Reserved. Confidential
Case Study: Smart & Secure Tradelanes
Phase One Results:• Increased security• Complete, accurate information• Timely information transfer• Compliance• Economic justification
All Rights Reserved. Confidential
SST: Phase II
– Phase I results proved that SST is a viable and effective system for improving global supply chain security and efficiency
– The geographical, technological, and informational deliverables and benefits of SST were powerful but limited during Phase I
– The capabilities of SST are nonetheless suitable for expanding it on a large scale
– Phase II builds upon the existing capabilities of SST, and refines and expands its benefits through a three-part process
– Enlarge the circle of partners to develop improvements for both the SST system and the management of individual supply chains
– Expand the number of locations served, technologies available, and information provided to users
– Collaborate closely with the ISO to develop global standards for supply chain security
– Phase II presents an opportunity for users to implement a completely integrated, end-to-end supply chain security and management system that is truly global
All Rights Reserved. Confidential
SST Applications forSecuring Transit Transport
• Nato relief to Afghanistan• SST for Africa
– Corridor Specific Applications
• Integration with customs systems• Tracking transit goods
– East Africa– Kuwait– Pakistan
Questions?
Appendix:
All Rights Reserved. Confidential
Smart Container – Evolution of RFID for Security and TrackingSST I Bolt Tag SST I New Design Single Use EJ
Brooks TagSmart Container with Sensors
•Monitors presence and integrity of ISO bolt seal•Generates immediate alarm upon bolt removal or breakage•Re-usable tag•5 year battery life•Up to 300 feet range •32 K bytes of read/write memory
•To be used in OSC Trials•Enhanced version of previous ST-645•Less prone to breakage -- lies within protective envelope of container•Rubberize arms fits any hasp and makes tag easier to install.•Bolt is easier to cut•Tough and Durable
•Co-developed by Savi and EJ Brooks•Compatible with Savi Fixed Readers and Mobile Readers•Single Use Bolt Seal
–lower cost–bolt can be cut once
•Designed for Pardo Hole Containers
–Longer bolt
•Security, Tracking, and Status of Container•Easy to install•Replaceable battery for long lasting life•Senses when doors are open or closed•Integrated light detection circuit for additional intrusion detection•Temperature, humidity, and shock sensors add value for intrusion detection and integrity of goods monitoring•Expansion port for integration with other sensors