Above: SIPLACE Pick and Place head with built-incamera. Cybord SMT acquire these images for advanced analysis
Keeping damaged, counterfeit and recycled parts out of the production lines is a tedious and in many cases unsuccessful mission. Cybord from Herzliya, Israel, brings a game changer product, Cybord SMT, to avoid this problem and provide quality assurance for the electronic manufacturing industry. This week the company announced a $4M Seed investment led by IL Ventures, a VC fund focused on transformational technologies for legacy industries, with co-investment by the Israel Innovation Authority.
The company delivers advanced AI and Big-Data software that inspects, qualifies, and tracks every component and every electronic board. Cybord SMT acquires component images from a built-in camera, already installed on the SMT pick and place machines. It learn and analyze every component using AI and a component knowledgebase on the cloud, and provide the manufacturer a full report covering 100% of the components.
“Today, in the midst of the global supply chain crisis, electronic manufacturers struggle to meet ever-growing customer demand while keeping quality a top priority. The need to acquire components in the free market and not only from well-established suppliers increases manufacturers’ exposure and vulnerability to significant quality issues. These issues can have direct, sudden, and costly effects on their ability to produce quality products,” said Zeev Efrat, CEO at Cybord.
“Our proven technology allows leading industry players to implement the Zero-Trust approach. As the global shortage in electronic components becomes chronic, this becomes a competitive edge which helps our customers generate more revenues, lower their costs, and increase their profitability,” added Dr. Eyal Weiss, Cybord’s founder, and CTO.
“Cybord’s proprietary technology is already deployed, serving FLEX and other global industry leaders at several manufacturing sites globally. The company has made remarkable technological and commercial achievements to date. By now, Cybord scanned over 1.2 billion components while supporting high production volumes with value delivered every day,” said Elad Frenkel, Managing Partner at IL Ventures. “We are confident this genuinely disruptive AI technology will change the entire industry, solving a multi-billion-dollar pain of the electronics industry.”
Cybordfrom Tel Aviv has developed a new concept for detecting counterfeit components right on the production line, guaranteeing that every component will only be assembled after a comprehensive inspection by utilizing existing systems in the SMT placement machines (Pick and Place). In a meeting with the Founder and CTO, Dr. Eyal Weiss and the CEO Zeev Efrat, we learned that the technology is already being tested at Flex Israel’s plant in Ofakim, and another pilot is likely to be carried out soon at the Flex’s plant in Migdal Haemek, using ASM machinery.
The technology uses visual data taken from industrial SMT machines: During manufacturing process, the machines capture image of each component to ensure it is placed on the circuit in the right direction and at the correct angle. Cybord connects to the placement machine software, extracts the images as they are produced, and examines them using an Artificial Intelligence algorithm.
The algorithm identifies vital data such as the manufacturer identity, date of manufacture and more. It provides authenticity level, solderability (which also indicates the age of the component), whether attempts were made to connect and reprogram the component and whether it was disassembled from an electronic board – before being returned again to the production line.
A 3 cents worth capacitor risked NIS multi-billions project
Processing all these parameters makes it possible to identify whether the component is counterfeit. In this case, the SMT machine will discard the component or halt the production line – in accordance with the factory policy. Siemens was impressed by the idea, adding the company to its Dynamo program that supports start-ups. Cybord is also conducting a joint trial with a leading placement machine maker to control their SMT machines by Cybord.
The company was founded as the result of an unexpected malfunction, which almost shut down a strategic project that had twice received the Israel Security Award. Weiss is an Electronics Engineering PhD with 12 years of experience in an advanced national technological research group.
Several years ago he managed a very large technological development project for a system that includes sensors, algorithms, and complex electronic manufacturing. Weiss: “Although all the tests showed that the system was working properly, when field trials began, there were inexplicable glitches that we were unable to locate.”
Everything seemed fine – but the system was not working properly. After four months of searching, the problem was revealed: ceramic capacitors (MLCC) that were thought to be new, actually came from a 10-year-old component reel. “A project worth three billion shekels was almost canceled due to a simple capacitor costing just 3 cents.
“The production was done in a large and well-known Israeli company, the components were purchased from authorized suppliers, the documentation was correct – but the capacitor was a fake.” Following this experience, Weiss came to the conclusion that a way must be found to test each component before it reaches the production line.
Why should you check all the components and not settle for samples?
Weiss: “The U.S. Department of Defense security standard requires a statistical test for each set of reels by sampling one component from the beginning of the batch, one component from the center of the batch and one component from the end of the batch. This is why counterfeiters scatter fake parts randomly throughout the entire cylinder. Usually, they don’t sell a reel or cartridge made up entirely of counterfeit components. Rather, they sell a reel or cartridge that contains real components but also has counterfeit components in between.”
Fake Component in every Electronic Device
The problem of counterfeit components is complex and comes in many forms. The most obvious is actual forgery: a change in the documentation that appears on the component to present it as a different component, or the unauthorized production of copies using stolen intellectual property or reverse engineering. In many cases these are old components manufactured on expired dates or that have not passed quality testing, and their documentation is forged so they appear to be new, ‘fresh’ and qualified components.
The forgeries are often recycled components, removed from old PCB boards and returned to the market. In some cases, the forgery manifests as a change that has been made to the components – mainly burning software for the purpose of inserting back-entry doors for hackers or for the purpose of compromising performance at the critical moment. This category has been nicknamed “Silicon Time Bomb”. The CEO Zeev Efrat: “The US Department of Commerce estimates that 5%-10% of the components in the world are counterfeit and their market scope is estimated at about $70 billion a year. This means that almost every electronic device has at least one counterfeit component.”
How can real time flash photography detects counterfeit component?
Eyal Weiss: “We collect these images, compare them to a database of components and immediately know who the manufacturer is. Additional algorithms detect component phenomena that indicate whether it is original or counterfeit. For example, there is a clear correlation between the component’s age and its oxidation level. Another indicators: The contacts are made of a soft material and leave traces of its history that allow us to identify recycled components or if it had been connected to a circuit in order to inject malware.
“Pick and Place machines are usually install components a rate of 100,000 components per hour. There is a time-frame of 500-700 milliseconds between the moment the photo is being taken and the physical placement. This gives us enough time to study each component and stop the process if necessary, since we can perform the full analysis in just 10 milliseconds.”
Efrat said that as part of the collaboration with Flex, at the end of each production day Cybord receives all the photographs taken from the SMT machines, and analyses them. “To date, we have accumulated a database of more than 5 million components.” The information is used by the company to supply another product: an ‘As Made’ report of each PCB board, detailing the entire list of components on the board and who manufactured them.
“The depth of the history tracing of components (traceability) in the industry reaches only to the level of the batch, based on the assumption that the reel itself is valid. But this is not necessarily the case. Our goal is to close the tracing gap. We have also developed a testing machine that allows us to test reels outside the SMT machine. It photographs the entire tape, thereby enabling components to be tested even before they are introduced into the production line. We will provide our customers with a complete report of each reel and each PCB board.”
Flex enters the picture
The experiment taking place at Flex required special preparations and a willingness to carry out a non-standard procedure. Michael Dolkin, who serves as Senior Director of Engineering and Technology at Flex EMEA, was recruited to rhe project along with Gadi Mike, who serves as Senior Engineering Manager at Flex EMEA, and who was also responsible for the technical support for the joint project.
According to Dolkin, Flex Israel employs approximately 4,000 workers in its three production plants in Israel and serves about 150 different clients. “We are at the forefront of adopting technological solutions that provide protection for our clients and production procedures in Israel and around the world.”
“We believe that Cybord’s impressive technology constitutes a breakthrough in the field and will strengthen Flex’s capacity to ensure advanced, quality production. We will continue to implement the advanced production and testing technologies that enable Flex Israel to be a global center of excellence in manufacturing processes.”
We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. We also share anonymous information about your use of our site with our social media, advertising and analytics partners. View more
What personal data we collect and why we collect it
We collect anonymous data on visitors in this website for business purposes such as enhancing user experience, digital marketing and search engine optimization.
We collect personal data such as email address and names on various forms - all forms present in this website include consent checkboxes and clear reason for collecting the data: general inquiries on our products, newsletter subscription, professional inquiries job applications. All forms are designed in accordance with GDPR requirements.
Comments
When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.
An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.
Media
If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.
Contact forms and newsletter
We use Gravity Forms as our platform of choice for all forms present in this website. Forms present in this website have been modified to fit GDPR requirements.
Unless specifically specified and approved by visitor, we do not use the collected data for marketing purposes.
We use Mailchimp to collect email addresses and send periodical marketing materials to our customers.
Handling and management of all email addresses and mailing operations is conducted under GDPR terms and guidelines provided by Mailchimp.
All subscribers are able to change their subscriptions preferences or unsubscribe at any given time.
Techtime has accepted the Data Processing Addendum agreement provided by Mailchimp for all its Mailchimp accounts.
All our lead collection forms have been altered in accordance with GDPR requirements and now include unchecked checkboxes in order to accept the explicit consent of the user prior to form submission.
Cookies
If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.
If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.
When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.
If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.
Embedded content from other websites
Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.
These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracing your interaction with the embedded content if you have an account and are logged in to that website.
Analytics
We use Google Analytics regularly for monitoring user behavior and traffic sources and utilize the gathered information for enhancing user experience and for business purposes.
The use of Google Analytics in done according to GDPR terms and guidelines provided by Google.
Legal Entity: Techtime.
Primary Contact (a.k.a. "Notification Email Address"): roni@techtime.co.il - this email is designated for receiving notices under the Google Ads Data Processing Terms.
Who we share your data with
We use various cloud platforms and third party providers for the purpose of operating this website.
We do not share or sell your data for any commercial purpose other than specified above.
We use the following processors for the operating this website and executing related digital marketing campaigns:
WP Engine - Hosting Provider
Cloudflare - Cloud based security and web performance processor.
Google Cloud Platform - data centers provider for WP Engine
Sucuri - Website security provider
Mailchimp - Newsletter service provider
Google Analytics, Adwords, Webmasters
Facebook - We use Facebook for advertising and place tracking code on our website for enhancing digital marketing campaigns (i.e - Facebook Pixel).
Planwize Ltd - Digital Marketing Agency.
How long we retain your data
If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.
For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.
What rights you have over your data
If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we anonymize or erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.
Request for Receiving Data Associated with One’s Email Address
Users may request to receive access to all related information submitted to this website for their review.
In accordance with GDPR compliance, user may further request the anonymization of such data.
In order to request access for all data associated with a given email address, users may submit the request here. Users then receive an email with a link to a page with all related information.
The link is valid for 24 hours. Users may submit additional request for the same email address once in every 24 hours.
A request for anonymization should be sent separately: User may select the data he or she wishes the site owner to anonymize so it cannot be linked to his or her email address any longer. An email confirmation will be sent once linked data has been successfully anonymized.
Where we send your data
Visitor comments may be checked through an automated spam detection service. All our processors and third party providers comply with GDPR requirements and apply privacy by design and necessary measure to ensure that personal data is being processed and handled in accordance with requirements. The list of our third party service providers and processors is listed above.
Contact information
For all privacy-specific concerns inquiries, you may contact us at mail@mail.com
How we protect your data
We use rigorous practices in order to protect our website and data collected, as well as world class cloud and hosting providers.
Communication between visitor and the server is encrypted using SSL.
The site is protected with web application firewall and is undergoing daily security scans, regular software updates by a dedicated team in order to minimize the risk of data breach.
What data breach procedures we have in place
Once a data breach is detected, our providers execute a dedicated standard operational procedure in order to assess the scope and potential damage, provide immediate remedy, patch any potential security holes and notify users who may be affected by the breach.
We may contact affected users with one or more form of communication within 72 hours and provide the needed information as to the scope of the data breach and actions taken.
What third parties we receive data from
We do not receive data from third parties for our marketing campaigns.
What automated decision making and/or profiling we do with user data
We may apply remarketing/retargeting methods while conducting online advertising using Google Facebook and the likes.
The above is conducted by applying various tracking codes into our website in order to track and retarget users based on
By visiting and using this website you are hereby provide your consent for the use of the above means and methods.