Knowledge

Tamperproofing

Source 📝

200: 335: 290:. The sensors sometimes need power, so to simplify cable runs, multi-core cable is used. While 4 cores is normally enough for devices that require power (leaving two spare for those that don't), cable with additional cores can be used. These additional cores can be wired into a special so-called "tamper circuit" in the alarm system. Tamper circuits are monitored by the system to give an alarm if a disturbance to devices or wiring is detected. Enclosures for devices and control panels may be fitted with anti-tamper switches. Would-be intruders run the risk of triggering the alarm by attempting to circumvent a given device. 320: 2423: 444:) if they detect penetration of their security encapsulation or out-of-specification environmental parameters. A chip may even be rated for "cold zeroisation", the ability to zeroise itself even after its power supply has been crippled. In addition, the custom-made encapsulation methods used for chips used in some cryptographic products may be designed in such a manner that they are internally pre-stressed, so the chip will fracture if interfered with. 503: 36: 452:" by ensuring that compromise of one device does not compromise the entire system. In this manner, the attacker can be practically restricted to attacks that cost more than the expected return from compromising a single device. Since the most sophisticated attacks have been estimated to cost several hundred thousand dollars to carry out, carefully designed systems may be invulnerable in practice. 475:(DRM). In this case, the issue is not about stopping the user from breaking the equipment or hurting themselves, but about either stopping them from extracting codes, or acquiring and saving the decoded bitstream. This is usually done by having many subsystem features buried within each chip (so that internal signals and states are inaccessible) and by making sure the 305:
Nearly all appliances and accessories can only be opened with the use of a tool. This is intended to prevent casual or accidental access to energized or hot parts, or damage to the equipment. Manufacturers may use tamper-resistant screws, which cannot be unfastened with common tools. Tamper-resistant
581:
would make software tampering of protected programs at least as difficult as hardware tampering, as the user would have to hack the trust chip to give false certifications in order to bypass remote attestation and sealed storage. However, the current specification makes it clear that the chip is not
447:
Nevertheless, the fact that an attacker may have the device in their possession for as long as they like, and perhaps obtain numerous other samples for testing and practice, means that it is impossible to totally eliminate tampering by a sufficiently motivated opponent. Because of this, one of the
352:
seals may be enough to deal with this. However, they cannot easily be checked remotely, and many countries have statutory warranty terms that mean manufacturers may still have to service the equipment. Tamper proof screws will stop most casual users from tampering in the first place. In the US,
168:
to more complex devices that render themselves inoperable or encrypt all data transmissions between individual chips, use of materials needing special tools and knowledge. Tamper-resistant devices or features are common on packages to deter package or product tampering or enable its detection.
245:
Some devices contain non-standard screws or bolts in an attempt to deter access. Examples are telephone switching cabinets (which have triangular bolt heads that a hex socket fits), or bolts with 5-sided heads used to secure doors to outdoor electrical distribution transformers. A standard
378:
credit. To prevent an attacker from retrieving or modifying the information, the chips are designed so that the information is not accessible through external means and can be accessed only by the embedded software, which should contain the appropriate security measures.
486:
in many cases. In all such cases, tamper resistance means not allowing the device user access to the valid device certificates or public-private keys of the device. The process of making software robust against tampering attacks is referred to as "software anti-tamper".
135:, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a 211:
Identify who a potential tamperer might be: average user, child, person under medical care, misguided joker, prisoner, saboteur, organized criminals, terrorists, corrupt government. What level of knowledge, materials, tools, etc. might they
585:
That has the side effect that software maintenance gets more complex because software updates need to be validated, and errors in the upgrade process may lead to a false-positive triggering of the protection mechanism.
347:
A user who breaks equipment by modifying it in a way not intended by the manufacturer might deny they did it, in order to claim the warranty or (mainly in the case of PCs) call the helpdesk for help in fixing it.
357:
prevents manufacturers from voiding warranties solely due to tampering. A warranty may be dishonored only if the tampering actually affected the part that has failed, and could have caused the failure.
143: 215:
Identify all feasible methods of unauthorized access into a product, package, or system. In addition to the primary means of entry, also consider secondary or "back door" methods.
574:
However, effective tamper resistance in software is much harder than in hardware, as the software environment can be manipulated to near-arbitrary extent by the use of emulation.
293:
Sensors such as movement detectors, tilt detectors, air-pressure sensors, light sensors, etc., which might be employed in some burglar alarms, might also be used in a
567:
harder, or to prevent a user from modifying it against the manufacturer's wishes (such as removing a restriction on how it can be used). One commonly-used method is
172:
Anti-tamper devices have one or more components: tamper resistance, tamper detection, tamper response, and tamper evidence. In some applications, devices are only
582:
expected to be tamper-proof against any reasonably sophisticated physical attack; that is, it is not intended to be as secure as a tamper-resistant device.
401:
It has been argued that it is very difficult to make simple electronic devices secure against tampering, because numerous attacks are possible, including:
146:
An item secured with special screw heads may be considered tamperproof by casual passers-by, but can be removed by someone equipped with particular tools.
184:
Tampering involves the deliberate altering or adulteration of a product, package, or system. Solutions may involve all phases of product production,
877: 267: 2011: 250:
screw head can be made in a tamper-resistant form with a pin in the center, which excludes standard Torx drivers. Various other security
1921: 306:
screws are used on electrical fittings in many public buildings to reduce tampering or vandalism that may cause a danger to others.
707: 100: 1323: 72: 832: 448:
most important elements in protecting a system is overall system design. In particular, tamper-resistant systems should "
2307: 779: 203:
A tamper evident label with a perforated tape that permanently displays a visual 'OPENED' message after being opened.
79: 2277: 1125: 119: 199: 2247: 455:
In the United States, purchasing specifications require anti-tamper (AT) features on military electronic systems.
17: 672: 161: 1981: 1835: 1680: 658: 53: 86: 2086: 57: 2197: 1150: 721: 254:
heads have been devised to discourage casual access to the interior of such devices as consumer electronics.
1353: 68: 2242: 2126: 1358: 1140: 483: 1885: 354: 2340: 2302: 2232: 2222: 1160: 1020: 947: 862: 737:
Smith, Sean; Weingart, Steve (1999). "Building a High-Performance, Programmable Secure Coprocessor".
630: 600: 472: 192:, sale, and use. No single solution can be considered as "tamper-proof". Often multiple levels of 2227: 2096: 1695: 1115: 1085: 975: 751: 157:
by either the normal users of a product, package, or system or others with physical access to it.
2257: 1880: 1800: 1660: 1188: 825: 625: 615: 595: 271: 46: 1976: 1685: 1388: 1120: 1100: 746: 383: 2405: 2355: 2335: 2282: 1615: 1565: 1288: 1283: 942: 932: 907: 93: 2375: 2237: 1765: 1080: 912: 558: 8: 2262: 2071: 1870: 1710: 1590: 1050: 564: 334: 319: 2427: 2390: 2350: 2202: 2111: 2076: 2026: 1911: 1620: 1490: 1460: 1398: 1135: 1035: 1015: 1010: 917: 818: 422: 760: 2446: 2395: 2380: 2252: 2172: 2167: 2081: 2056: 2041: 2021: 1991: 1971: 1850: 1820: 1655: 1605: 1228: 1110: 1070: 952: 937: 892: 867: 775: 703: 620: 578: 441: 221:
Improve the tamper resistance to make tampering more difficult, time-consuming, etc.
142: 2410: 2400: 2217: 2046: 2001: 1961: 1951: 1815: 1730: 1510: 1408: 1303: 1278: 1193: 1145: 1090: 922: 887: 872: 857: 756: 449: 375: 139:
unless some limitations on the tampering party's resources is explicit or assumed.
795: 2370: 2365: 2345: 2267: 2187: 2142: 2106: 2061: 1996: 1966: 1720: 1705: 1610: 1505: 1403: 1000: 897: 800: 769: 568: 476: 287: 275: 2330: 2325: 2297: 2147: 2121: 2116: 2006: 1926: 1916: 1830: 1805: 1775: 1735: 1550: 1485: 1428: 1333: 1318: 1298: 1208: 1060: 1055: 980: 563:
Software is also said to be tamper-resistant when it contains measures to make
541: 429: 367: 349: 225: 173: 405:
physical attack of various forms (microprobing, drills, files, solvents, etc.)
2440: 2287: 2182: 2152: 2101: 2091: 2036: 2016: 1825: 1795: 1740: 1465: 1328: 1075: 902: 882: 805: 545: 428:
measuring the precise time and power requirements of certain operations (see
283: 263: 165: 1931: 1860: 1790: 1780: 1770: 1755: 1690: 1595: 1475: 1455: 1448: 1438: 1433: 1338: 1263: 1233: 1198: 1165: 1065: 1040: 395: 529:
Extra layers of packaging (no single layer or component is "tamper-proof")
2212: 2177: 2051: 1840: 1715: 1700: 1665: 1645: 1635: 1575: 1555: 1500: 1423: 1238: 1170: 1155: 1105: 990: 468: 437: 371: 279: 370:
are used to store and process private or sensitive information, such as
2292: 2272: 2162: 2031: 1956: 1845: 1760: 1625: 1585: 1560: 1525: 1495: 1418: 1393: 1343: 1213: 1045: 1030: 1005: 985: 927: 605: 464: 391: 2385: 2192: 1986: 1875: 1865: 1855: 1810: 1785: 1630: 1515: 1470: 1413: 1180: 1025: 957: 841: 635: 522: 502: 496: 418: 326: 189: 185: 698:
Rosette, J L (2009), "Tamper-Evident Packaging", in Yam, K L (ed.),
35: 2207: 2157: 2066: 1936: 1895: 1725: 1650: 1640: 1545: 1480: 1383: 1368: 1313: 1253: 1130: 1095: 995: 387: 193: 154: 136: 771:
Improving tamper-evident packaging: Problems, tests, and solutions
517:
Evidence needs to remain unaltered for possible legal proceedings.
1946: 1941: 1890: 1600: 1348: 1203: 610: 2360: 1745: 1443: 1308: 1273: 1268: 1243: 1223: 679:. Vulnerability Assessment Team, Los Alamos National Laboratory 340:
Warranty label lifted. The word "VOID" is shown multiple times
1750: 1670: 1570: 1293: 282:) use two signal wires that, depending on configuration, are 251: 810: 1580: 1520: 1258: 801:
Design Principles for Tamper-Resistant Smartcard Processors
294: 247: 218:
Control or limit access to products or systems of interest.
262:
This style of tamper resistance is most commonly found in
1675: 1378: 1373: 1363: 1248: 1218: 506:
Tamper-evident seal ring on drug package (eyedrop bottle)
196:
need to be addressed to reduce the risk of tampering.
228:
features to help indicate the existence of tampering.
521:
Resistance to tampering can be built in or added to
160:Tamper resistance ranges from simple features like 60:. Unsourced material may be challenged and removed. 231:Educate people to watch for evidence of tampering. 673:"Physical Security and Tamper-Indicating Devices" 2438: 511:Regulations for some pharmaceuticals require it. 417:inducing software errors using radiation (e.g., 878:Modified atmosphere/modified humidity packaging 722:Microsoft Word – TPM 1_2 Changes final.doc 382:Examples of tamper-resistant chips include all 826: 736: 411:applying out-of-spec voltages or power surges 806:Low cost attacks on tamper resistant devices 514:High value products may be subject to theft. 458: 153:is resistance to intentional malfunction or 2012:Hazard analysis and critical control points 833: 819: 796:Tamper Resistance – a Cautionary Note 659:"Anti-Tamper Capabilities in FPGA Designs" 436:Tamper-resistant chips may be designed to 1922:Automatic identification and data capture 750: 495:Tamper resistance is sometimes needed in 482:DRM mechanisms also use certificates and 309: 120:Learn how and when to remove this message 670: 653: 651: 501: 198: 141: 767: 697: 463:Tamper resistance finds application in 14: 2439: 532:Packaging that requires tools to enter 814: 648: 1324:Flexible intermediate bulk container 700:Encyclopedia of Packaging Technology 58:adding citations to reliable sources 29: 207:Some considerations might include: 24: 2308:Vertical form fill sealing machine 25: 2458: 2278:Rotary wheel blow molding systems 1126:Purdue Improved Crop Storage bags 789: 535:Extra-strong and secure packaging 440:their sensitive data (especially 2422: 2421: 2248:Mechanical brake stretch wrapper 538:Packages that cannot be resealed 333: 318: 34: 1982:Electronic article surveillance 1836:Shock and vibration data logger 1681:Linear low-density polyethylene 730: 45:needs additional citations for 2087:Radio-frequency identification 715: 691: 664: 479:between chips are encrypted. 414:applying unusual clock signals 176:rather than tamper-resistant. 13: 1: 2198:Extended core stretch wrapper 1151:Single-serve coffee container 840: 761:10.1016/S1389-1286(98)00019-X 641: 257: 240: 1354:Insulated shipping container 490: 179: 7: 2243:Material-handling equipment 2127:Verification and validation 1359:Intermediate bulk container 1141:Self-heating food packaging 589: 552: 484:asymmetric key cryptography 471:and other devices that use 325:Warranty label on top of a 266:. Most trip devices (e.g. 10: 2463: 1886:Time temperature indicator 702:, Wiley (published 2010), 556: 355:Magnuson-Moss Warranty Act 235: 162:screws with special drives 2419: 2341:Environmental engineering 2316: 2303:Turntable stretch wrapper 2233:Lineshaft roller conveyor 2223:Injection molding machine 2135: 1904: 1534: 1179: 1161:Toothpaste pump dispenser 1021:Disposable food packaging 966: 863:Child-resistant packaging 848: 631:Tamper-evident technology 601:Child-resistant packaging 473:digital rights management 459:Digital rights management 300: 2228:Label printer applicator 2097:Shearing (manufacturing) 1696:Low-density polyethylene 1116:Pharmaceutical packaging 1086:Low plastic water bottle 976:Alternative wine closure 768:Rosette, Jack L (1992). 361: 272:passive infrared sensors 2258:Orbital stretch wrapper 1881:Temperature data logger 1801:Pressure-sensitive tape 1661:Humidity indicator card 1189:Aerosol spray dispenser 626:Tamper-resistant switch 616:Packaging and labelling 596:Chicago Tylenol murders 384:secure cryptoprocessors 1977:Die forming (plastics) 1686:Liquid packaging board 1389:Multilayered packaging 1121:Plastic milk container 1101:Optical disc packaging 671:Johnston, R G (1997). 507: 310:Warranties and support 204: 147: 2406:Sustainable packaging 2356:Life-cycle assessment 2336:Closed-loop box reuse 2283:Seed-counting machine 1616:Corrugated fiberboard 1566:Biodegradable plastic 1289:Corrugated box design 943:Sustainable packaging 933:Shelf-ready packaging 908:Packaging engineering 505: 202: 145: 2376:PET bottle recycling 2238:Logistics automation 1766:Plastic-coated paper 913:Resealable packaging 559:anti-tamper software 525:. Examples include: 297:to hinder defusing. 166:tamper-evident seals 54:improve this article 27:Security methodology 2428:Category: Packaging 2263:Packaging machinery 2072:Product development 1871:Tamper-evident band 1711:Modified atmosphere 1051:Foam food container 565:reverse engineering 408:freezing the device 2391:Reusable packaging 2351:Industrial ecology 2112:Ultrasonic welding 2077:Production control 2027:Injection moulding 1912:Aseptic processing 1621:Corrugated plastic 1491:Steel and tin cans 1461:Shipping container 1399:Packet (container) 1136:Seasonal packaging 1036:Evidence packaging 1016:Currency packaging 1011:Cosmetic packaging 918:Reusable packaging 508: 442:cryptographic keys 423:ionising radiation 390:and chips used in 205: 148: 2434: 2433: 2396:Reverse logistics 2381:Plastic recycling 2253:Multihead weigher 2173:Cartoning machine 2168:Cap torque tester 2082:Quality assurance 2057:Plastic extrusion 2022:Induction sealing 1992:Extrusion coating 1851:Staple (fastener) 1821:Security printing 1656:Hot-melt adhesive 1229:Biodegradable bag 1071:Glass milk bottle 953:Tamper resistance 893:Package pilferage 868:Contract packager 739:Computer Networks 709:978-0-470-08704-6 621:Package pilferage 579:trusted computing 394:, as well as the 366:Tamper-resistant 151:Tamper resistance 130: 129: 122: 104: 16:(Redirected from 2454: 2425: 2424: 2411:Waste management 2401:Source reduction 2218:Industrial robot 2122:Vacuum packaging 2047:Package tracking 2002:Glass production 1962:Corona treatment 1952:Containerization 1816:Screw cap (wine) 1731:Oxygen scavenger 1194:Aluminium bottle 1146:Screw cap (wine) 1091:Luxury packaging 923:Reuse of bottles 888:Package delivery 873:Edible packaging 858:Active packaging 835: 828: 821: 812: 811: 785: 764: 754: 724: 719: 713: 712: 695: 689: 688: 686: 684: 668: 662: 655: 577:If implemented, 569:code obfuscation 376:electronic money 337: 322: 276:motion detectors 188:, distribution, 125: 118: 114: 111: 105: 103: 69:"Tamperproofing" 62: 38: 30: 21: 18:Tamper-resistant 2462: 2461: 2457: 2456: 2455: 2453: 2452: 2451: 2437: 2436: 2435: 2430: 2415: 2371:Paper recycling 2366:Packaging waste 2346:Glass recycling 2318: 2312: 2268:Pallet inverter 2188:Conveyor system 2143:Barcode printer 2131: 2107:Track and trace 2062:Plastic welding 1997:Flame treatment 1967:Curtain coating 1900: 1721:Nonwoven fabric 1706:Metallised film 1611:Container glass 1538: 1536: 1530: 1506:Tub (container) 1404:Padded envelope 1175: 1001:Case-ready meat 968: 962: 898:Package testing 850: 844: 839: 792: 782: 733: 728: 727: 720: 716: 710: 696: 692: 682: 680: 669: 665: 656: 649: 644: 592: 561: 555: 499:, for example: 493: 461: 450:fail gracefully 368:microprocessors 364: 345: 344: 343: 342: 341: 338: 330: 329: 323: 312: 303: 288:normally closed 260: 243: 238: 182: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 2460: 2450: 2449: 2432: 2431: 2420: 2417: 2416: 2414: 2413: 2408: 2403: 2398: 2393: 2388: 2383: 2378: 2373: 2368: 2363: 2358: 2353: 2348: 2343: 2338: 2333: 2331:Can collecting 2328: 2326:Biodegradation 2322: 2320: 2314: 2313: 2311: 2310: 2305: 2300: 2298:Tape dispenser 2295: 2290: 2285: 2280: 2275: 2270: 2265: 2260: 2255: 2250: 2245: 2240: 2235: 2230: 2225: 2220: 2215: 2210: 2205: 2200: 2195: 2190: 2185: 2180: 2175: 2170: 2165: 2160: 2155: 2150: 2148:Barcode reader 2145: 2139: 2137: 2133: 2132: 2130: 2129: 2124: 2119: 2117:Vacuum forming 2114: 2109: 2104: 2099: 2094: 2089: 2084: 2079: 2074: 2069: 2064: 2059: 2054: 2049: 2044: 2039: 2034: 2029: 2024: 2019: 2014: 2009: 2007:Graphic design 2004: 1999: 1994: 1989: 1984: 1979: 1974: 1969: 1964: 1959: 1954: 1949: 1944: 1939: 1934: 1929: 1927:Blow fill seal 1924: 1919: 1917:Authentication 1914: 1908: 1906: 1902: 1901: 1899: 1898: 1893: 1888: 1883: 1878: 1873: 1868: 1863: 1858: 1853: 1848: 1843: 1838: 1833: 1831:Shock detector 1828: 1823: 1818: 1813: 1808: 1806:Pump dispenser 1803: 1798: 1793: 1788: 1783: 1778: 1776:Plastic pallet 1773: 1768: 1763: 1758: 1753: 1748: 1743: 1738: 1736:Package handle 1733: 1728: 1723: 1718: 1713: 1708: 1703: 1698: 1693: 1688: 1683: 1678: 1673: 1668: 1663: 1658: 1653: 1648: 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1578: 1573: 1568: 1563: 1558: 1553: 1551:Aluminium foil 1548: 1542: 1540: 1532: 1531: 1529: 1528: 1523: 1518: 1513: 1508: 1503: 1498: 1493: 1488: 1486:Stand-up pouch 1483: 1478: 1473: 1468: 1463: 1458: 1453: 1452: 1451: 1441: 1436: 1431: 1429:Plastic bottle 1426: 1421: 1416: 1411: 1406: 1401: 1396: 1391: 1386: 1381: 1376: 1371: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1334:Folding carton 1331: 1326: 1321: 1319:Euro container 1316: 1311: 1306: 1301: 1299:Disposable cup 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1261: 1256: 1251: 1246: 1241: 1236: 1231: 1226: 1221: 1216: 1211: 1209:Antistatic bag 1206: 1201: 1196: 1191: 1185: 1183: 1177: 1176: 1174: 1173: 1168: 1163: 1158: 1153: 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1083: 1078: 1073: 1068: 1063: 1061:Fuel container 1058: 1056:Food packaging 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 981:Ammunition box 978: 972: 970: 964: 963: 961: 960: 955: 950: 948:Tamper-evident 945: 940: 935: 930: 925: 920: 915: 910: 905: 900: 895: 890: 885: 880: 875: 870: 865: 860: 854: 852: 846: 845: 838: 837: 830: 823: 815: 809: 808: 803: 798: 791: 790:External links 788: 787: 786: 781:978-0877629061 780: 765: 752:10.1.1.22.8659 745:(9): 831–860. 732: 729: 726: 725: 714: 708: 690: 663: 646: 645: 643: 640: 639: 638: 633: 628: 623: 618: 613: 608: 603: 598: 591: 588: 557:Main article: 554: 551: 550: 549: 548:, and features 546:security tapes 542:Tamper-evident 539: 536: 533: 530: 519: 518: 515: 512: 492: 489: 460: 457: 434: 433: 430:power analysis 426: 415: 412: 409: 406: 386:, such as the 363: 360: 350:Tamper-evident 339: 332: 331: 324: 317: 316: 315: 314: 313: 311: 308: 302: 299: 264:burglar alarms 259: 256: 242: 239: 237: 234: 233: 232: 229: 226:tamper-evident 222: 219: 216: 213: 181: 178: 174:tamper-evident 133:Tamperproofing 128: 127: 42: 40: 33: 26: 9: 6: 4: 3: 2: 2459: 2448: 2445: 2444: 2442: 2429: 2418: 2412: 2409: 2407: 2404: 2402: 2399: 2397: 2394: 2392: 2389: 2387: 2384: 2382: 2379: 2377: 2374: 2372: 2369: 2367: 2364: 2362: 2359: 2357: 2354: 2352: 2349: 2347: 2344: 2342: 2339: 2337: 2334: 2332: 2329: 2327: 2324: 2323: 2321: 2315: 2309: 2306: 2304: 2301: 2299: 2296: 2294: 2291: 2289: 2288:Shrink tunnel 2286: 2284: 2281: 2279: 2276: 2274: 2271: 2269: 2266: 2264: 2261: 2259: 2256: 2254: 2251: 2249: 2246: 2244: 2241: 2239: 2236: 2234: 2231: 2229: 2226: 2224: 2221: 2219: 2216: 2214: 2211: 2209: 2206: 2204: 2201: 2199: 2196: 2194: 2191: 2189: 2186: 2184: 2183:Check weigher 2181: 2179: 2176: 2174: 2171: 2169: 2166: 2164: 2161: 2159: 2156: 2154: 2153:Bottling line 2151: 2149: 2146: 2144: 2141: 2140: 2138: 2134: 2128: 2125: 2123: 2120: 2118: 2115: 2113: 2110: 2108: 2105: 2103: 2102:Thermoforming 2100: 2098: 2095: 2093: 2092:Roll slitting 2090: 2088: 2085: 2083: 2080: 2078: 2075: 2073: 2070: 2068: 2065: 2063: 2060: 2058: 2055: 2053: 2050: 2048: 2045: 2043: 2040: 2038: 2037:Laser cutting 2035: 2033: 2030: 2028: 2025: 2023: 2020: 2018: 2017:Hermetic seal 2015: 2013: 2010: 2008: 2005: 2003: 2000: 1998: 1995: 1993: 1990: 1988: 1985: 1983: 1980: 1978: 1975: 1973: 1970: 1968: 1965: 1963: 1960: 1958: 1955: 1953: 1950: 1948: 1945: 1943: 1940: 1938: 1935: 1933: 1930: 1928: 1925: 1923: 1920: 1918: 1915: 1913: 1910: 1909: 1907: 1903: 1897: 1894: 1892: 1889: 1887: 1884: 1882: 1879: 1877: 1874: 1872: 1869: 1867: 1864: 1862: 1859: 1857: 1854: 1852: 1849: 1847: 1844: 1842: 1839: 1837: 1834: 1832: 1829: 1827: 1826:Security tape 1824: 1822: 1819: 1817: 1814: 1812: 1809: 1807: 1804: 1802: 1799: 1797: 1796:Polypropylene 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1777: 1774: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1741:Packaging gas 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1722: 1719: 1717: 1714: 1712: 1709: 1707: 1704: 1702: 1699: 1697: 1694: 1692: 1689: 1687: 1684: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1637: 1634: 1632: 1629: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1549: 1547: 1544: 1543: 1541: 1533: 1527: 1524: 1522: 1519: 1517: 1514: 1512: 1509: 1507: 1504: 1502: 1499: 1497: 1494: 1492: 1489: 1487: 1484: 1482: 1479: 1477: 1474: 1472: 1469: 1467: 1466:Shipping tube 1464: 1462: 1459: 1457: 1454: 1450: 1447: 1446: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1425: 1422: 1420: 1417: 1415: 1412: 1410: 1407: 1405: 1402: 1400: 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1329:Flexible tank 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1235: 1232: 1230: 1227: 1225: 1222: 1220: 1217: 1215: 1212: 1210: 1207: 1205: 1202: 1200: 1197: 1195: 1192: 1190: 1187: 1186: 1184: 1182: 1178: 1172: 1169: 1167: 1164: 1162: 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1022: 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 973: 971: 965: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 909: 906: 904: 903:Package theft 901: 899: 896: 894: 891: 889: 886: 884: 883:Overpackaging 881: 879: 876: 874: 871: 869: 866: 864: 861: 859: 856: 855: 853: 847: 843: 836: 831: 829: 824: 822: 817: 816: 813: 807: 804: 802: 799: 797: 794: 793: 783: 777: 773: 772: 766: 762: 758: 753: 748: 744: 740: 735: 734: 723: 718: 711: 705: 701: 694: 678: 677:LA-UR-96-3827 674: 667: 660: 654: 652: 647: 637: 634: 632: 629: 627: 624: 622: 619: 617: 614: 612: 609: 607: 604: 602: 599: 597: 594: 593: 587: 583: 580: 575: 572: 570: 566: 560: 547: 543: 540: 537: 534: 531: 528: 527: 526: 524: 516: 513: 510: 509: 504: 500: 498: 488: 485: 480: 478: 474: 470: 469:set-top boxes 466: 456: 453: 451: 445: 443: 439: 431: 427: 424: 420: 416: 413: 410: 407: 404: 403: 402: 399: 397: 393: 389: 385: 380: 377: 373: 369: 359: 356: 351: 336: 328: 321: 307: 298: 296: 291: 289: 285: 284:normally open 281: 280:door switches 277: 273: 269: 268:pressure pads 265: 255: 253: 249: 230: 227: 223: 220: 217: 214: 210: 209: 208: 201: 197: 195: 191: 187: 177: 175: 170: 167: 163: 158: 156: 152: 144: 140: 138: 134: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 2317:Environment, 1932:Blow molding 1861:Stretch wrap 1791:Polyethylene 1781:Plastic wrap 1771:Plastic film 1756:Paper pallet 1691:Living hinge 1596:Coated paper 1476:Spray bottle 1456:Security bag 1449:Water sachet 1439:Salvage drum 1434:Retort pouch 1339:Glass bottle 1234:Blister pack 1199:Aluminum can 1166:Water bottle 1066:Gas cylinder 1041:Field ration 938:Shelf-stable 770: 742: 738: 731:Bibliography 717: 699: 693: 681:. Retrieved 676: 666: 584: 576: 573: 562: 520: 494: 481: 462: 454: 446: 435: 400: 396:Clipper chip 381: 372:private keys 365: 346: 304: 292: 261: 244: 206: 183: 171: 159: 150: 149: 132: 131: 116: 110:January 2008 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 2213:Heat sealer 2178:Case sealer 2052:Papermaking 1972:Die cutting 1937:Calendering 1841:Shrink wrap 1716:Molded pulp 1701:Meat diaper 1666:Kraft paper 1646:Foam peanut 1636:Double seam 1606:Coextrusion 1576:Bubble wrap 1556:Bail handle 1501:Thermal bag 1424:Plastic bag 1239:Boil-in-bag 1171:Wine bottle 1156:Spray paint 1111:Popcorn bag 1106:Oyster pail 991:Beer bottle 465:smart cards 2293:Staple gun 2273:Palletizer 2163:Can seamer 2032:Lamination 1957:Converting 1846:Slip sheet 1761:Paperboard 1626:Cushioning 1586:Cellophane 1561:Bioplastic 1539:components 1526:Wooden box 1496:Tetra Brik 1419:Paper sack 1394:Multi-pack 1344:Gunny sack 1214:Bag-in-box 1181:Containers 1046:Flour sack 1031:Egg carton 1006:Coffee bag 986:Banana box 928:Shelf life 642:References 606:FIPS 140-2 419:microwaves 392:smartcards 258:Electrical 241:Mechanical 80:newspapers 2386:Recycling 2193:Drum pump 2136:Machinery 1987:Extrusion 1905:Processes 1876:Tear tape 1866:Susceptor 1856:Strapping 1811:Screw cap 1786:Polyester 1631:Desiccant 1535:Materials 1516:Unit load 1471:Skin pack 1414:Paper bag 1284:Clamshell 1026:Drink can 958:Wrap rage 842:Packaging 747:CiteSeerX 683:30 August 636:Wrap rage 523:packaging 497:packaging 491:Packaging 327:hard disk 190:logistics 186:packaging 180:Tampering 2447:Security 2441:Category 2319:post-use 2208:Heat gun 2158:Calender 2067:Printing 1896:Velostat 1891:Tinplate 1726:Overwrap 1651:Gel pack 1641:Flip-top 1546:Adhesive 1481:Squround 1384:Mesh bag 1369:Jerrycan 1314:Envelope 1254:Bulk box 1131:Sand bag 1096:Milk bag 1081:Juicebox 996:Box wine 969:packages 657:Altera. 590:See also 553:Software 388:IBM 4758 194:security 155:sabotage 137:misnomer 2042:Molding 1947:Coating 1942:Canning 1601:Coating 1591:Closure 1349:Inhaler 1204:Ampoule 1076:Growler 967:Product 849:General 661:. p. 1. 611:Ink tag 544:seals, 438:zeroise 236:Methods 94:scholar 2426:  2361:Litter 2203:Filler 1746:Pallet 1444:Sachet 1309:Endcap 1274:Carton 1269:Carboy 1244:Bottle 1224:Barrel 851:topics 778:  749:  706:  301:Safety 96:  89:  82:  75:  67:  1751:Paper 1671:Label 1571:BoPET 1294:Crate 477:buses 362:Chips 252:screw 212:have? 101:JSTOR 87:books 1581:Bung 1521:Vial 1511:Tube 1409:Pail 1304:Drum 1279:Chub 1264:Case 1259:Cage 776:ISBN 704:ISBN 685:2019 353:the 295:bomb 248:Torx 224:Add 164:and 73:news 1676:Lid 1537:and 1379:Keg 1374:Jug 1364:Jar 1249:Box 1219:Bag 757:doi 421:or 374:or 286:or 278:), 56:by 2443:: 774:. 755:. 743:31 741:. 675:. 650:^ 571:. 467:, 398:. 270:, 834:e 827:t 820:v 784:. 763:. 759:: 687:. 432:) 425:) 274:( 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Tamper-resistant

verification
improve this article
adding citations to reliable sources
"Tamperproofing"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
misnomer

sabotage
screws with special drives
tamper-evident seals
tamper-evident
packaging
logistics
security

tamper-evident
Torx
screw
burglar alarms
pressure pads
passive infrared sensors
motion detectors
door switches

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.