Security Label (information Security)
   HOME

TheInfoList



OR:

Security tape (or security label) is a type of
adhesive tape Adhesive tape is one of many varieties of backing materials coated with an adhesive. Several types of adhesives can be used. Types Pressure-sensitive tape Pressure-sensitive tape, PSA tape, self-stick tape or sticky tape consists of a pre ...
used to help reduce shipping losses due to pilfering and theft. It helps reduce tampering or product adulteration. It is often a
pressure-sensitive tape Pressure-sensitive tape or pressure-sensitive adhesive tape (PSA tape) is an adhesive tape that sticks when pressure is applied without the need for a solvent (such as water) or heat for activation. It is also known in various countries as self ...
or
label A label (as distinct from signage) is a piece of paper, plastic film, cloth, metal, or other material affixed to a container or product. Labels are most often affixed to packaging and containers using an adhesive, or sewing when affix ...
with special tamper-resistant or
tamper-evident Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings, or other techniques may be tamper indicating. Tampering Tampering involves the deliberate altering or adulterat ...
features. It can be used as a ''security seal'' in addition to a container closure or can be used as a security label. They are sometimes used as or with
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
products and as an anti-pilferage seal. Security tapes and labels are sometimes used in conjunction with security envelopes.


Use

Security tapes can be used as packaging tapes on small primary packages such as
bottle A bottle is a narrow-necked container made of an impermeable material (such as glass, plastic or aluminium) in various shapes and sizes that stores and transports liquids. Its mouth, at the bottling line, can be sealed with an internal ...
s and
carton A carton is a box or container usually made of liquid packaging board, paperboard and sometimes of corrugated fiberboard. Many types of cartons are used in packaging. Sometimes a carton is also called a box. Types of cartons Folding cartons ...
s or on larger
shipping container A shipping container is a container with strength suitable to withstand shipment, storage, and handling. Shipping containers range from large reusable steel boxes used for intermodal shipments to the ubiquitous corrugated box design, corrugated b ...
s such as
corrugated box Corrugated box design is the process of matching design factors for corrugated fiberboard (sometimes called corrugated cardboard) or corrugated plastic boxes with the functional physical, processing and end-use requirements. Packaging engineers w ...
es. They are also used on
unit load The term unit load refers to the size of an assemblage into which a number of individual items are combined for ease of storage and handling, for example a pallet load represents a unit load which can be moved easily with a pallet jack or fork ...
s or palletized goods. The strength and adhesive bonding are important. Security labels are usually only used for their security features; backing strength is less important but the bonding characteristics are critical. Some security tapes have an appearance similar to standard packaging tapes to help conceal the value of an item. Logistics and packaging professionals do not want to bring attention to the item or its package. Other security tapes have bright colors with high impact graphics. Security tapes and labels are one part of a broader security system: No one layer of security can provide full protection to shipments of packages. Most security products can be foiled by a knowledgeable person with sufficient time and with access to specialized tools, solvents, extreme temperatures, other security tapes and labels, adhesives, etc. Security tapes and labels usually add security to one point of entry to a container. Other points of unauthorized entry are sometimes available. Security tapes are also used on access doors for temporary area denial and as tamper-indicating seals for sensitive equipment. Some uses of security tapes require stable temperatures and the non-exposure of the tape to direct sunlight.


Construction

There are many types and constructions of tapes and labels used for security. The use of
security printing Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps, and identity c ...
,
holography Holography is a technique that allows a wavefront to be recorded and later reconstructed. It is best known as a method of generating three-dimensional images, and has a wide range of other uses, including data storage, microscopy, and interfe ...
, embossing,
barcode A barcode or bar code is a method of representing data in a visual, Machine-readable data, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines. These barcodes, now commonly ref ...
s,
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
chips, etc. is common. Some tape strips and labels have sequential serial numbers, bar codes, etc. Custom printing with corporate logo, etc. is useful but needs to be revised periodically because of creative counterfeiters. Many security tapes have extra strong backings and high performance adhesives; a damaged or partially open package can be an invitation to theft or tampering. High graphics can draw attention to a package during shipment. Security tapes often have special features to indicate opening, including: *Intentionally weak or
frangible A material is said to be frangible if through deformation it tends to break up into fragments, rather than deforming elastically and retaining its cohesion as a single object. Common crackers are examples of frangible materials, while fresh bre ...
components *Printing which cannot easily be realigned after a cut or tear *Hidden print layers which indicate opening *
Serration Serration is a saw-like appearance or a row of sharp or tooth-like projections. A serrated cutting edge has many small points of contact with the material being cut. By having less contact area than a smooth blade or other edge, the applied pr ...
s or
perforation A perforation is a small hole in a thin material or web. There is usually more than one perforation in an organized fashion, where all of the holes collectively are called a ''perforation''. The process of creating perforations is called perfor ...
s to make one-piece removal more difficult *
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
indicating systems Security tapes are usually wound on a roll for storage and dispensing. Either a
release liner A release liner or ''release paper'', also called a ''backing liner'', is a paper or plastic-based film sheet (usually applied during the manufacturing process) used to prevent a sticky surface from prematurely adhering. It is coated on one or bo ...
is used or a premium release coating is used on the top surface. Security labels typically employ a release liner and are die-cut.


Interpretation

Sometimes a tape or label is intended to provide a signal of removal or of container tampering: imaging, delamination, fracture, etc. The desired outcome is for the tape or label to correctly indicate attempted or unauthorized container opening. Conversely, it should not signal tampering when there has not been tampering. This is a type of
binary classification Binary classification is the task of classifying the elements of a set into one of two groups (each called ''class''). Typical binary classification problems include: * Medical testing to determine if a patient has a certain disease or not; * Qual ...
. It may be possible to have a "
false negative A false positive is an error in binary classification in which a test result incorrectly indicates the presence of a condition (such as a disease when the disease is not present), while a false negative is the opposite error, where the test resu ...
": the label is (or appears to be) intact yet tampering has occurred. Depending on the specific security tape/label, there may be specialized means of removing and reattaching the label, covering or obscuring the signaled/activated label, etc. Also, tampering could have occurred in a different part of the container. A "false positive" may also be possible, either by accident or with intent.


See also

*
Electronic article surveillance Electronic article surveillance (EAS) is a type of system used to prevent shoplifting from retail stores, pilferage of books from libraries, or unwanted removal of properties from office buildings. EAS systems typically consist of two components ...
*
Barricade tape Barricade tape is brightly colored tape (often incorporating a two-tone pattern of alternating yellow-black or red-white stripes or the words "Caution" or "Danger" in prominent lettering) that is used to warn or catch the attention of passersby ...
*
Evaluation of binary classifiers Evaluation of a binary classifier typically assigns a numerical value, or values, to a classifier that represent its accuracy. An example is error rate, which measures how frequently the classifier makes a mistake. There are many metrics that ca ...
* Counterfeit consumer good


References

* Soroka, W, "Fundamentals of Packaging Technology", IoPP, 2002, * Yam, K. L., "Encyclopedia of Packaging Technology", John Wiley & Sons, 2009, * Rosette, J. L, "Improving Tamper-Evident Packaging: Problems, Tests and Solutions", 1992 {{labeling Packaging Theft Adhesive tape Security Authentication methods Security technology