200:
335:
290:. The sensors sometimes need power, so to simplify cable runs, multi-core cable is used. While 4 cores is normally enough for devices that require power (leaving two spare for those that don't), cable with additional cores can be used. These additional cores can be wired into a special so-called "tamper circuit" in the alarm system. Tamper circuits are monitored by the system to give an alarm if a disturbance to devices or wiring is detected. Enclosures for devices and control panels may be fitted with anti-tamper switches. Would-be intruders run the risk of triggering the alarm by attempting to circumvent a given device.
320:
2423:
444:) if they detect penetration of their security encapsulation or out-of-specification environmental parameters. A chip may even be rated for "cold zeroisation", the ability to zeroise itself even after its power supply has been crippled. In addition, the custom-made encapsulation methods used for chips used in some cryptographic products may be designed in such a manner that they are internally pre-stressed, so the chip will fracture if interfered with.
503:
36:
452:" by ensuring that compromise of one device does not compromise the entire system. In this manner, the attacker can be practically restricted to attacks that cost more than the expected return from compromising a single device. Since the most sophisticated attacks have been estimated to cost several hundred thousand dollars to carry out, carefully designed systems may be invulnerable in practice.
475:(DRM). In this case, the issue is not about stopping the user from breaking the equipment or hurting themselves, but about either stopping them from extracting codes, or acquiring and saving the decoded bitstream. This is usually done by having many subsystem features buried within each chip (so that internal signals and states are inaccessible) and by making sure the
305:
Nearly all appliances and accessories can only be opened with the use of a tool. This is intended to prevent casual or accidental access to energized or hot parts, or damage to the equipment. Manufacturers may use tamper-resistant screws, which cannot be unfastened with common tools. Tamper-resistant
581:
would make software tampering of protected programs at least as difficult as hardware tampering, as the user would have to hack the trust chip to give false certifications in order to bypass remote attestation and sealed storage. However, the current specification makes it clear that the chip is not
447:
Nevertheless, the fact that an attacker may have the device in their possession for as long as they like, and perhaps obtain numerous other samples for testing and practice, means that it is impossible to totally eliminate tampering by a sufficiently motivated opponent. Because of this, one of the
352:
seals may be enough to deal with this. However, they cannot easily be checked remotely, and many countries have statutory warranty terms that mean manufacturers may still have to service the equipment. Tamper proof screws will stop most casual users from tampering in the first place. In the US,
168:
to more complex devices that render themselves inoperable or encrypt all data transmissions between individual chips, use of materials needing special tools and knowledge. Tamper-resistant devices or features are common on packages to deter package or product tampering or enable its detection.
245:
Some devices contain non-standard screws or bolts in an attempt to deter access. Examples are telephone switching cabinets (which have triangular bolt heads that a hex socket fits), or bolts with 5-sided heads used to secure doors to outdoor electrical distribution transformers. A standard
378:
credit. To prevent an attacker from retrieving or modifying the information, the chips are designed so that the information is not accessible through external means and can be accessed only by the embedded software, which should contain the appropriate security measures.
486:
in many cases. In all such cases, tamper resistance means not allowing the device user access to the valid device certificates or public-private keys of the device. The process of making software robust against tampering attacks is referred to as "software anti-tamper".
135:, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a
211:
Identify who a potential tamperer might be: average user, child, person under medical care, misguided joker, prisoner, saboteur, organized criminals, terrorists, corrupt government. What level of knowledge, materials, tools, etc. might they
585:
That has the side effect that software maintenance gets more complex because software updates need to be validated, and errors in the upgrade process may lead to a false-positive triggering of the protection mechanism.
347:
A user who breaks equipment by modifying it in a way not intended by the manufacturer might deny they did it, in order to claim the warranty or (mainly in the case of PCs) call the helpdesk for help in fixing it.
357:
prevents manufacturers from voiding warranties solely due to tampering. A warranty may be dishonored only if the tampering actually affected the part that has failed, and could have caused the failure.
143:
215:
Identify all feasible methods of unauthorized access into a product, package, or system. In addition to the primary means of entry, also consider secondary or "back door" methods.
574:
However, effective tamper resistance in software is much harder than in hardware, as the software environment can be manipulated to near-arbitrary extent by the use of emulation.
293:
Sensors such as movement detectors, tilt detectors, air-pressure sensors, light sensors, etc., which might be employed in some burglar alarms, might also be used in a
567:
harder, or to prevent a user from modifying it against the manufacturer's wishes (such as removing a restriction on how it can be used). One commonly-used method is
172:
Anti-tamper devices have one or more components: tamper resistance, tamper detection, tamper response, and tamper evidence. In some applications, devices are only
582:
expected to be tamper-proof against any reasonably sophisticated physical attack; that is, it is not intended to be as secure as a tamper-resistant device.
401:
It has been argued that it is very difficult to make simple electronic devices secure against tampering, because numerous attacks are possible, including:
146:
An item secured with special screw heads may be considered tamperproof by casual passers-by, but can be removed by someone equipped with particular tools.
184:
Tampering involves the deliberate altering or adulteration of a product, package, or system. Solutions may involve all phases of product production,
877:
267:
2011:
250:
screw head can be made in a tamper-resistant form with a pin in the center, which excludes standard Torx drivers. Various other security
1921:
306:
screws are used on electrical fittings in many public buildings to reduce tampering or vandalism that may cause a danger to others.
707:
100:
1323:
72:
832:
448:
most important elements in protecting a system is overall system design. In particular, tamper-resistant systems should "
2307:
779:
203:
A tamper evident label with a perforated tape that permanently displays a visual 'OPENED' message after being opened.
79:
2277:
1125:
119:
199:
2247:
455:
In the United States, purchasing specifications require anti-tamper (AT) features on military electronic systems.
17:
672:
161:
1981:
1835:
1680:
658:
53:
86:
2086:
57:
2197:
1150:
721:
254:
heads have been devised to discourage casual access to the interior of such devices as consumer electronics.
1353:
68:
2242:
2126:
1358:
1140:
483:
1885:
354:
2340:
2302:
2232:
2222:
1160:
1020:
947:
862:
737:
Smith, Sean; Weingart, Steve (1999). "Building a High-Performance, Programmable Secure
Coprocessor".
630:
600:
472:
192:, sale, and use. No single solution can be considered as "tamper-proof". Often multiple levels of
2227:
2096:
1695:
1115:
1085:
975:
751:
157:
by either the normal users of a product, package, or system or others with physical access to it.
2257:
1880:
1800:
1660:
1188:
825:
625:
615:
595:
271:
46:
1976:
1685:
1388:
1120:
1100:
746:
383:
2405:
2355:
2335:
2282:
1615:
1565:
1288:
1283:
942:
932:
907:
93:
2375:
2237:
1765:
1080:
912:
558:
8:
2262:
2071:
1870:
1710:
1590:
1050:
564:
334:
319:
2427:
2390:
2350:
2202:
2111:
2076:
2026:
1911:
1620:
1490:
1460:
1398:
1135:
1035:
1015:
1010:
917:
818:
422:
760:
2446:
2395:
2380:
2252:
2172:
2167:
2081:
2056:
2041:
2021:
1991:
1971:
1850:
1820:
1655:
1605:
1228:
1110:
1070:
952:
937:
892:
867:
775:
703:
620:
578:
441:
221:
Improve the tamper resistance to make tampering more difficult, time-consuming, etc.
142:
2410:
2400:
2217:
2046:
2001:
1961:
1951:
1815:
1730:
1510:
1408:
1303:
1278:
1193:
1145:
1090:
922:
887:
872:
857:
756:
449:
375:
139:
unless some limitations on the tampering party's resources is explicit or assumed.
795:
2370:
2365:
2345:
2267:
2187:
2142:
2106:
2061:
1996:
1966:
1720:
1705:
1610:
1505:
1403:
1000:
897:
800:
769:
568:
476:
287:
275:
2330:
2325:
2297:
2147:
2121:
2116:
2006:
1926:
1916:
1830:
1805:
1775:
1735:
1550:
1485:
1428:
1333:
1318:
1298:
1208:
1060:
1055:
980:
563:
Software is also said to be tamper-resistant when it contains measures to make
541:
429:
367:
349:
225:
173:
405:
physical attack of various forms (microprobing, drills, files, solvents, etc.)
2440:
2287:
2182:
2152:
2101:
2091:
2036:
2016:
1825:
1795:
1740:
1465:
1328:
1075:
902:
882:
805:
545:
428:
measuring the precise time and power requirements of certain operations (see
283:
263:
165:
1931:
1860:
1790:
1780:
1770:
1755:
1690:
1595:
1475:
1455:
1448:
1438:
1433:
1338:
1263:
1233:
1198:
1165:
1065:
1040:
395:
529:
Extra layers of packaging (no single layer or component is "tamper-proof")
2212:
2177:
2051:
1840:
1715:
1700:
1665:
1645:
1635:
1575:
1555:
1500:
1423:
1238:
1170:
1155:
1105:
990:
468:
437:
371:
279:
370:
are used to store and process private or sensitive information, such as
2292:
2272:
2162:
2031:
1956:
1845:
1760:
1625:
1585:
1560:
1525:
1495:
1418:
1393:
1343:
1213:
1045:
1030:
1005:
985:
927:
605:
464:
391:
2385:
2192:
1986:
1875:
1865:
1855:
1810:
1785:
1630:
1515:
1470:
1413:
1180:
1025:
957:
841:
635:
522:
502:
496:
418:
326:
189:
185:
698:
Rosette, J L (2009), "Tamper-Evident
Packaging", in Yam, K L (ed.),
35:
2207:
2157:
2066:
1936:
1895:
1725:
1650:
1640:
1545:
1480:
1383:
1368:
1313:
1253:
1130:
1095:
995:
387:
193:
154:
136:
771:
Improving tamper-evident packaging: Problems, tests, and solutions
517:
Evidence needs to remain unaltered for possible legal proceedings.
1946:
1941:
1890:
1600:
1348:
1203:
610:
2360:
1745:
1443:
1308:
1273:
1268:
1243:
1223:
679:. Vulnerability Assessment Team, Los Alamos National Laboratory
340:
Warranty label lifted. The word "VOID" is shown multiple times
1750:
1670:
1570:
1293:
282:) use two signal wires that, depending on configuration, are
251:
810:
1580:
1520:
1258:
801:
Design
Principles for Tamper-Resistant Smartcard Processors
294:
247:
218:
Control or limit access to products or systems of interest.
262:
This style of tamper resistance is most commonly found in
1675:
1378:
1373:
1363:
1248:
1218:
506:
Tamper-evident seal ring on drug package (eyedrop bottle)
196:
need to be addressed to reduce the risk of tampering.
228:
features to help indicate the existence of tampering.
521:
Resistance to tampering can be built in or added to
160:Tamper resistance ranges from simple features like
60:. Unsourced material may be challenged and removed.
231:Educate people to watch for evidence of tampering.
673:"Physical Security and Tamper-Indicating Devices"
2438:
511:Regulations for some pharmaceuticals require it.
417:inducing software errors using radiation (e.g.,
878:Modified atmosphere/modified humidity packaging
722:Microsoft Word – TPM 1_2 Changes final.doc
382:Examples of tamper-resistant chips include all
826:
736:
411:applying out-of-spec voltages or power surges
806:Low cost attacks on tamper resistant devices
514:High value products may be subject to theft.
458:
153:is resistance to intentional malfunction or
2012:Hazard analysis and critical control points
833:
819:
796:Tamper Resistance – a Cautionary Note
659:"Anti-Tamper Capabilities in FPGA Designs"
436:Tamper-resistant chips may be designed to
1922:Automatic identification and data capture
750:
495:Tamper resistance is sometimes needed in
482:DRM mechanisms also use certificates and
309:
120:Learn how and when to remove this message
670:
653:
651:
501:
198:
141:
767:
697:
463:Tamper resistance finds application in
14:
2439:
532:Packaging that requires tools to enter
814:
648:
1324:Flexible intermediate bulk container
700:Encyclopedia of Packaging Technology
58:adding citations to reliable sources
29:
207:Some considerations might include:
24:
2308:Vertical form fill sealing machine
25:
2458:
2278:Rotary wheel blow molding systems
1126:Purdue Improved Crop Storage bags
789:
535:Extra-strong and secure packaging
440:their sensitive data (especially
2422:
2421:
2248:Mechanical brake stretch wrapper
538:Packages that cannot be resealed
333:
318:
34:
1982:Electronic article surveillance
1836:Shock and vibration data logger
1681:Linear low-density polyethylene
730:
45:needs additional citations for
2087:Radio-frequency identification
715:
691:
664:
479:between chips are encrypted.
414:applying unusual clock signals
176:rather than tamper-resistant.
13:
1:
2198:Extended core stretch wrapper
1151:Single-serve coffee container
840:
761:10.1016/S1389-1286(98)00019-X
641:
257:
240:
1354:Insulated shipping container
490:
179:
7:
2243:Material-handling equipment
2127:Verification and validation
1359:Intermediate bulk container
1141:Self-heating food packaging
589:
552:
484:asymmetric key cryptography
471:and other devices that use
325:Warranty label on top of a
266:. Most trip devices (e.g.
10:
2463:
1886:Time temperature indicator
702:, Wiley (published 2010),
556:
355:Magnuson-Moss Warranty Act
235:
162:screws with special drives
2419:
2341:Environmental engineering
2316:
2303:Turntable stretch wrapper
2233:Lineshaft roller conveyor
2223:Injection molding machine
2135:
1904:
1534:
1179:
1161:Toothpaste pump dispenser
1021:Disposable food packaging
966:
863:Child-resistant packaging
848:
631:Tamper-evident technology
601:Child-resistant packaging
473:digital rights management
459:Digital rights management
300:
2228:Label printer applicator
2097:Shearing (manufacturing)
1696:Low-density polyethylene
1116:Pharmaceutical packaging
1086:Low plastic water bottle
976:Alternative wine closure
768:Rosette, Jack L (1992).
361:
272:passive infrared sensors
2258:Orbital stretch wrapper
1881:Temperature data logger
1801:Pressure-sensitive tape
1661:Humidity indicator card
1189:Aerosol spray dispenser
626:Tamper-resistant switch
616:Packaging and labelling
596:Chicago Tylenol murders
384:secure cryptoprocessors
1977:Die forming (plastics)
1686:Liquid packaging board
1389:Multilayered packaging
1121:Plastic milk container
1101:Optical disc packaging
671:Johnston, R G (1997).
507:
310:Warranties and support
204:
147:
2406:Sustainable packaging
2356:Life-cycle assessment
2336:Closed-loop box reuse
2283:Seed-counting machine
1616:Corrugated fiberboard
1566:Biodegradable plastic
1289:Corrugated box design
943:Sustainable packaging
933:Shelf-ready packaging
908:Packaging engineering
505:
202:
145:
2376:PET bottle recycling
2238:Logistics automation
1766:Plastic-coated paper
913:Resealable packaging
559:anti-tamper software
525:. Examples include:
297:to hinder defusing.
166:tamper-evident seals
54:improve this article
27:Security methodology
2428:Category: Packaging
2263:Packaging machinery
2072:Product development
1871:Tamper-evident band
1711:Modified atmosphere
1051:Foam food container
565:reverse engineering
408:freezing the device
2391:Reusable packaging
2351:Industrial ecology
2112:Ultrasonic welding
2077:Production control
2027:Injection moulding
1912:Aseptic processing
1621:Corrugated plastic
1491:Steel and tin cans
1461:Shipping container
1399:Packet (container)
1136:Seasonal packaging
1036:Evidence packaging
1016:Currency packaging
1011:Cosmetic packaging
918:Reusable packaging
508:
442:cryptographic keys
423:ionising radiation
390:and chips used in
205:
148:
2434:
2433:
2396:Reverse logistics
2381:Plastic recycling
2253:Multihead weigher
2173:Cartoning machine
2168:Cap torque tester
2082:Quality assurance
2057:Plastic extrusion
2022:Induction sealing
1992:Extrusion coating
1851:Staple (fastener)
1821:Security printing
1656:Hot-melt adhesive
1229:Biodegradable bag
1071:Glass milk bottle
953:Tamper resistance
893:Package pilferage
868:Contract packager
739:Computer Networks
709:978-0-470-08704-6
621:Package pilferage
579:trusted computing
394:, as well as the
366:Tamper-resistant
151:Tamper resistance
130:
129:
122:
104:
16:(Redirected from
2454:
2425:
2424:
2411:Waste management
2401:Source reduction
2218:Industrial robot
2122:Vacuum packaging
2047:Package tracking
2002:Glass production
1962:Corona treatment
1952:Containerization
1816:Screw cap (wine)
1731:Oxygen scavenger
1194:Aluminium bottle
1146:Screw cap (wine)
1091:Luxury packaging
923:Reuse of bottles
888:Package delivery
873:Edible packaging
858:Active packaging
835:
828:
821:
812:
811:
785:
764:
754:
724:
719:
713:
712:
695:
689:
688:
686:
684:
668:
662:
655:
577:If implemented,
569:code obfuscation
376:electronic money
337:
322:
276:motion detectors
188:, distribution,
125:
118:
114:
111:
105:
103:
69:"Tamperproofing"
62:
38:
30:
21:
18:Tamper-resistant
2462:
2461:
2457:
2456:
2455:
2453:
2452:
2451:
2437:
2436:
2435:
2430:
2415:
2371:Paper recycling
2366:Packaging waste
2346:Glass recycling
2318:
2312:
2268:Pallet inverter
2188:Conveyor system
2143:Barcode printer
2131:
2107:Track and trace
2062:Plastic welding
1997:Flame treatment
1967:Curtain coating
1900:
1721:Nonwoven fabric
1706:Metallised film
1611:Container glass
1538:
1536:
1530:
1506:Tub (container)
1404:Padded envelope
1175:
1001:Case-ready meat
968:
962:
898:Package testing
850:
844:
839:
792:
782:
733:
728:
727:
720:
716:
710:
696:
692:
682:
680:
669:
665:
656:
649:
644:
592:
561:
555:
499:, for example:
493:
461:
450:fail gracefully
368:microprocessors
364:
345:
344:
343:
342:
341:
338:
330:
329:
323:
312:
303:
288:normally closed
260:
243:
238:
182:
126:
115:
109:
106:
63:
61:
51:
39:
28:
23:
22:
15:
12:
11:
5:
2460:
2450:
2449:
2432:
2431:
2420:
2417:
2416:
2414:
2413:
2408:
2403:
2398:
2393:
2388:
2383:
2378:
2373:
2368:
2363:
2358:
2353:
2348:
2343:
2338:
2333:
2331:Can collecting
2328:
2326:Biodegradation
2322:
2320:
2314:
2313:
2311:
2310:
2305:
2300:
2298:Tape dispenser
2295:
2290:
2285:
2280:
2275:
2270:
2265:
2260:
2255:
2250:
2245:
2240:
2235:
2230:
2225:
2220:
2215:
2210:
2205:
2200:
2195:
2190:
2185:
2180:
2175:
2170:
2165:
2160:
2155:
2150:
2148:Barcode reader
2145:
2139:
2137:
2133:
2132:
2130:
2129:
2124:
2119:
2117:Vacuum forming
2114:
2109:
2104:
2099:
2094:
2089:
2084:
2079:
2074:
2069:
2064:
2059:
2054:
2049:
2044:
2039:
2034:
2029:
2024:
2019:
2014:
2009:
2007:Graphic design
2004:
1999:
1994:
1989:
1984:
1979:
1974:
1969:
1964:
1959:
1954:
1949:
1944:
1939:
1934:
1929:
1927:Blow fill seal
1924:
1919:
1917:Authentication
1914:
1908:
1906:
1902:
1901:
1899:
1898:
1893:
1888:
1883:
1878:
1873:
1868:
1863:
1858:
1853:
1848:
1843:
1838:
1833:
1831:Shock detector
1828:
1823:
1818:
1813:
1808:
1806:Pump dispenser
1803:
1798:
1793:
1788:
1783:
1778:
1776:Plastic pallet
1773:
1768:
1763:
1758:
1753:
1748:
1743:
1738:
1736:Package handle
1733:
1728:
1723:
1718:
1713:
1708:
1703:
1698:
1693:
1688:
1683:
1678:
1673:
1668:
1663:
1658:
1653:
1648:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1563:
1558:
1553:
1551:Aluminium foil
1548:
1542:
1540:
1532:
1531:
1529:
1528:
1523:
1518:
1513:
1508:
1503:
1498:
1493:
1488:
1486:Stand-up pouch
1483:
1478:
1473:
1468:
1463:
1458:
1453:
1452:
1451:
1441:
1436:
1431:
1429:Plastic bottle
1426:
1421:
1416:
1411:
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1371:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1334:Folding carton
1331:
1326:
1321:
1319:Euro container
1316:
1311:
1306:
1301:
1299:Disposable cup
1296:
1291:
1286:
1281:
1276:
1271:
1266:
1261:
1256:
1251:
1246:
1241:
1236:
1231:
1226:
1221:
1216:
1211:
1209:Antistatic bag
1206:
1201:
1196:
1191:
1185:
1183:
1177:
1176:
1174:
1173:
1168:
1163:
1158:
1153:
1148:
1143:
1138:
1133:
1128:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1061:Fuel container
1058:
1056:Food packaging
1053:
1048:
1043:
1038:
1033:
1028:
1023:
1018:
1013:
1008:
1003:
998:
993:
988:
983:
981:Ammunition box
978:
972:
970:
964:
963:
961:
960:
955:
950:
948:Tamper-evident
945:
940:
935:
930:
925:
920:
915:
910:
905:
900:
895:
890:
885:
880:
875:
870:
865:
860:
854:
852:
846:
845:
838:
837:
830:
823:
815:
809:
808:
803:
798:
791:
790:External links
788:
787:
786:
781:978-0877629061
780:
765:
752:10.1.1.22.8659
745:(9): 831–860.
732:
729:
726:
725:
714:
708:
690:
663:
646:
645:
643:
640:
639:
638:
633:
628:
623:
618:
613:
608:
603:
598:
591:
588:
557:Main article:
554:
551:
550:
549:
548:, and features
546:security tapes
542:Tamper-evident
539:
536:
533:
530:
519:
518:
515:
512:
492:
489:
460:
457:
434:
433:
430:power analysis
426:
415:
412:
409:
406:
386:, such as the
363:
360:
350:Tamper-evident
339:
332:
331:
324:
317:
316:
315:
314:
313:
311:
308:
302:
299:
264:burglar alarms
259:
256:
242:
239:
237:
234:
233:
232:
229:
226:tamper-evident
222:
219:
216:
213:
181:
178:
174:tamper-evident
133:Tamperproofing
128:
127:
42:
40:
33:
26:
9:
6:
4:
3:
2:
2459:
2448:
2445:
2444:
2442:
2429:
2418:
2412:
2409:
2407:
2404:
2402:
2399:
2397:
2394:
2392:
2389:
2387:
2384:
2382:
2379:
2377:
2374:
2372:
2369:
2367:
2364:
2362:
2359:
2357:
2354:
2352:
2349:
2347:
2344:
2342:
2339:
2337:
2334:
2332:
2329:
2327:
2324:
2323:
2321:
2315:
2309:
2306:
2304:
2301:
2299:
2296:
2294:
2291:
2289:
2288:Shrink tunnel
2286:
2284:
2281:
2279:
2276:
2274:
2271:
2269:
2266:
2264:
2261:
2259:
2256:
2254:
2251:
2249:
2246:
2244:
2241:
2239:
2236:
2234:
2231:
2229:
2226:
2224:
2221:
2219:
2216:
2214:
2211:
2209:
2206:
2204:
2201:
2199:
2196:
2194:
2191:
2189:
2186:
2184:
2183:Check weigher
2181:
2179:
2176:
2174:
2171:
2169:
2166:
2164:
2161:
2159:
2156:
2154:
2153:Bottling line
2151:
2149:
2146:
2144:
2141:
2140:
2138:
2134:
2128:
2125:
2123:
2120:
2118:
2115:
2113:
2110:
2108:
2105:
2103:
2102:Thermoforming
2100:
2098:
2095:
2093:
2092:Roll slitting
2090:
2088:
2085:
2083:
2080:
2078:
2075:
2073:
2070:
2068:
2065:
2063:
2060:
2058:
2055:
2053:
2050:
2048:
2045:
2043:
2040:
2038:
2037:Laser cutting
2035:
2033:
2030:
2028:
2025:
2023:
2020:
2018:
2017:Hermetic seal
2015:
2013:
2010:
2008:
2005:
2003:
2000:
1998:
1995:
1993:
1990:
1988:
1985:
1983:
1980:
1978:
1975:
1973:
1970:
1968:
1965:
1963:
1960:
1958:
1955:
1953:
1950:
1948:
1945:
1943:
1940:
1938:
1935:
1933:
1930:
1928:
1925:
1923:
1920:
1918:
1915:
1913:
1910:
1909:
1907:
1903:
1897:
1894:
1892:
1889:
1887:
1884:
1882:
1879:
1877:
1874:
1872:
1869:
1867:
1864:
1862:
1859:
1857:
1854:
1852:
1849:
1847:
1844:
1842:
1839:
1837:
1834:
1832:
1829:
1827:
1826:Security tape
1824:
1822:
1819:
1817:
1814:
1812:
1809:
1807:
1804:
1802:
1799:
1797:
1796:Polypropylene
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1777:
1774:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1741:Packaging gas
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1659:
1657:
1654:
1652:
1649:
1647:
1644:
1642:
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1552:
1549:
1547:
1544:
1543:
1541:
1533:
1527:
1524:
1522:
1519:
1517:
1514:
1512:
1509:
1507:
1504:
1502:
1499:
1497:
1494:
1492:
1489:
1487:
1484:
1482:
1479:
1477:
1474:
1472:
1469:
1467:
1466:Shipping tube
1464:
1462:
1459:
1457:
1454:
1450:
1447:
1446:
1445:
1442:
1440:
1437:
1435:
1432:
1430:
1427:
1425:
1422:
1420:
1417:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1329:Flexible tank
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1280:
1277:
1275:
1272:
1270:
1267:
1265:
1262:
1260:
1257:
1255:
1252:
1250:
1247:
1245:
1242:
1240:
1237:
1235:
1232:
1230:
1227:
1225:
1222:
1220:
1217:
1215:
1212:
1210:
1207:
1205:
1202:
1200:
1197:
1195:
1192:
1190:
1187:
1186:
1184:
1182:
1178:
1172:
1169:
1167:
1164:
1162:
1159:
1157:
1154:
1152:
1149:
1147:
1144:
1142:
1139:
1137:
1134:
1132:
1129:
1127:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1019:
1017:
1014:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
973:
971:
965:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
909:
906:
904:
903:Package theft
901:
899:
896:
894:
891:
889:
886:
884:
883:Overpackaging
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
855:
853:
847:
843:
836:
831:
829:
824:
822:
817:
816:
813:
807:
804:
802:
799:
797:
794:
793:
783:
777:
773:
772:
766:
762:
758:
753:
748:
744:
740:
735:
734:
723:
718:
711:
705:
701:
694:
678:
677:LA-UR-96-3827
674:
667:
660:
654:
652:
647:
637:
634:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
593:
587:
583:
580:
575:
572:
570:
566:
560:
547:
543:
540:
537:
534:
531:
528:
527:
526:
524:
516:
513:
510:
509:
504:
500:
498:
488:
485:
480:
478:
474:
470:
469:set-top boxes
466:
456:
453:
451:
445:
443:
439:
431:
427:
424:
420:
416:
413:
410:
407:
404:
403:
402:
399:
397:
393:
389:
385:
380:
377:
373:
369:
359:
356:
351:
336:
328:
321:
307:
298:
296:
291:
289:
285:
284:normally open
281:
280:door switches
277:
273:
269:
268:pressure pads
265:
255:
253:
249:
230:
227:
223:
220:
217:
214:
210:
209:
208:
201:
197:
195:
191:
187:
177:
175:
170:
167:
163:
158:
156:
152:
144:
140:
138:
134:
124:
121:
113:
102:
99:
95:
92:
88:
85:
81:
78:
74:
71: –
70:
66:
65:Find sources:
59:
55:
49:
48:
43:This article
41:
37:
32:
31:
19:
2317:Environment,
1932:Blow molding
1861:Stretch wrap
1791:Polyethylene
1781:Plastic wrap
1771:Plastic film
1756:Paper pallet
1691:Living hinge
1596:Coated paper
1476:Spray bottle
1456:Security bag
1449:Water sachet
1439:Salvage drum
1434:Retort pouch
1339:Glass bottle
1234:Blister pack
1199:Aluminum can
1166:Water bottle
1066:Gas cylinder
1041:Field ration
938:Shelf-stable
770:
742:
738:
731:Bibliography
717:
699:
693:
681:. Retrieved
676:
666:
584:
576:
573:
562:
520:
494:
481:
462:
454:
446:
435:
400:
396:Clipper chip
381:
372:private keys
365:
346:
304:
292:
261:
244:
206:
183:
171:
159:
150:
149:
132:
131:
116:
110:January 2008
107:
97:
90:
83:
76:
64:
52:Please help
47:verification
44:
2213:Heat sealer
2178:Case sealer
2052:Papermaking
1972:Die cutting
1937:Calendering
1841:Shrink wrap
1716:Molded pulp
1701:Meat diaper
1666:Kraft paper
1646:Foam peanut
1636:Double seam
1606:Coextrusion
1576:Bubble wrap
1556:Bail handle
1501:Thermal bag
1424:Plastic bag
1239:Boil-in-bag
1171:Wine bottle
1156:Spray paint
1111:Popcorn bag
1106:Oyster pail
991:Beer bottle
465:smart cards
2293:Staple gun
2273:Palletizer
2163:Can seamer
2032:Lamination
1957:Converting
1846:Slip sheet
1761:Paperboard
1626:Cushioning
1586:Cellophane
1561:Bioplastic
1539:components
1526:Wooden box
1496:Tetra Brik
1419:Paper sack
1394:Multi-pack
1344:Gunny sack
1214:Bag-in-box
1181:Containers
1046:Flour sack
1031:Egg carton
1006:Coffee bag
986:Banana box
928:Shelf life
642:References
606:FIPS 140-2
419:microwaves
392:smartcards
258:Electrical
241:Mechanical
80:newspapers
2386:Recycling
2193:Drum pump
2136:Machinery
1987:Extrusion
1905:Processes
1876:Tear tape
1866:Susceptor
1856:Strapping
1811:Screw cap
1786:Polyester
1631:Desiccant
1535:Materials
1516:Unit load
1471:Skin pack
1414:Paper bag
1284:Clamshell
1026:Drink can
958:Wrap rage
842:Packaging
747:CiteSeerX
683:30 August
636:Wrap rage
523:packaging
497:packaging
491:Packaging
327:hard disk
190:logistics
186:packaging
180:Tampering
2447:Security
2441:Category
2319:post-use
2208:Heat gun
2158:Calender
2067:Printing
1896:Velostat
1891:Tinplate
1726:Overwrap
1651:Gel pack
1641:Flip-top
1546:Adhesive
1481:Squround
1384:Mesh bag
1369:Jerrycan
1314:Envelope
1254:Bulk box
1131:Sand bag
1096:Milk bag
1081:Juicebox
996:Box wine
969:packages
657:Altera.
590:See also
553:Software
388:IBM 4758
194:security
155:sabotage
137:misnomer
2042:Molding
1947:Coating
1942:Canning
1601:Coating
1591:Closure
1349:Inhaler
1204:Ampoule
1076:Growler
967:Product
849:General
661:. p. 1.
611:Ink tag
544:seals,
438:zeroise
236:Methods
94:scholar
2426:
2361:Litter
2203:Filler
1746:Pallet
1444:Sachet
1309:Endcap
1274:Carton
1269:Carboy
1244:Bottle
1224:Barrel
851:topics
778:
749:
706:
301:Safety
96:
89:
82:
75:
67:
1751:Paper
1671:Label
1571:BoPET
1294:Crate
477:buses
362:Chips
252:screw
212:have?
101:JSTOR
87:books
1581:Bung
1521:Vial
1511:Tube
1409:Pail
1304:Drum
1279:Chub
1264:Case
1259:Cage
776:ISBN
704:ISBN
685:2019
353:the
295:bomb
248:Torx
224:Add
164:and
73:news
1676:Lid
1537:and
1379:Keg
1374:Jug
1364:Jar
1249:Box
1219:Bag
757:doi
421:or
374:or
286:or
278:),
56:by
2443::
774:.
755:.
743:31
741:.
675:.
650:^
571:.
467:,
398:.
270:,
834:e
827:t
820:v
784:.
763:.
759::
687:.
432:)
425:)
274:(
123:)
117:(
112:)
108:(
98:·
91:·
84:·
77:·
50:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.