Data is exploding everywhere, increasing opportunities for security breaches of sensitive information. Lower costs of electronics are making it possible to make and deploy a variety of sensors and detection devices that didn’t exist before. For example, GPS location and temperature detection are built into shipping containers. Most fleet vehicles have sensing/recording equipment that they didn’t have in the past. Everything from medical devices to environmental sensors stores and transmits vast amounts of data. Security tends to be an afterthought. Yet, security is needed to ensure the veracity/validity of the data.

Pitney Bowes offers superior technology to secure this data. We are looking to work with entrepreneurs and startups to leverage our deep expertise and advanced technology in new and exciting ways.

How could remote sensors be made secure?

Other areas where our technology could be used:

  • Document integrity
  • Smart grid
  • Metering usage
Rick Ryan Discusses Opportunities for Entrepreneurs



Background Information on Secure Evidencing Platform

The Secure Evidencing Platform (SEP) enables rapid prototyping and deployment of security applications. Secure evidencing applications are employed where there is a need to ensure the confidentiality, integrity and/or authenticity of data involved in supporting a transaction. Possible applications include:
  • Certifying document or data authenticity
  • Metering or accounting for payment/use of software or data
  • Restricting access to encrypted data based upon time and location
  • Metering or accounting for verification of credentials
The platform leverages PB’s expertise in a number of technological disciplines including: the design, deployment and management of secure, tamper resistant and tamper responding devices
  • Cryptographic system design and management
  • Funds/resource management
  • The marking and reading of data on paper (barcodes, optical character recognition...)
Listen to Rick Ryan’s Briefing on the Secure Evidencing Platform



At the heart of the SEP lies the Cryptographic and Accounting Module (CAM), an integrated circuit designed to provide assurance of the integrity and privacy of transactions. The CAM differs from commonly available devices in several important ways:

1. The single chip security module within the CAM actively responds to tampering attempts and disables itself.
2. Additional data from within the CAM, most importantly time from a secure real-time clock, can be combined with external data to further enhance the security of the external data.
3. The CAM can restrict access based upon the consumption of an internal resource. The CAM will stop executing cryptographic operation when the resource is spent. For example, the CAM can be loaded with $50 worth of value that is spent on tax payment stamps or loaded with an authorization to verify 50 educational certificates.
4. The Pitney Bowes Security Management System controls the security life-cycle of the CAM. This includes:
  • The ability add resources to the CAM
  • The ability to set a time period within which the CAM must contact the Pitney Bowes data center. If the CAM fails to contact the data center within that time period cryptographic functions will be disabled until such contact is successful.
>Learn More about the Cryptographic Accounting Module

Winners of the Secure Evidencing Platform Competition will have access to:
  • Technical and business experts
  • The Cryptographic Accounting Module (CAM) - the secure hardware
  • The infrastructure that manages the lifecycle of this hardware
  • API’s