SlideShare a Scribd company logo
1 of 3
Download to read offline
www.aspaglobal.com
12
The Authentication Times
Inaugural Issue
Authentication:
With the increase in
counterfeiting, Authentication
technologies play an important
role in supporting brand
strategies, helping to reduce
the risk of fraud by deterring
criminals and enabling
stakeholders to identify and track
genuine product with fake one.
Today, there are various number
of authentication technologies
available in the market, although
all these technologies are applied
in the three main areas of
i)	Anti-Counterfeiting
ii)	 Anti-Tampering, and
iii)	 Track and Trace
Anti-Counterfeiting:
The common feature of anti-
counterfeiting technologies is
that they are edrtremely difficult
tobecounterfeited.Consequently,
they help in identifying a
genuine product. Based on the
authentication requirements,
such technologies may consist
of overt, covert and forensic
features, or a mix thereof.
Anti-Tampering:
Such solutions are found more
in the food and pharmaceutical
industry where there is a need
to protect a product from
adulteration or replacement. An
intact anti-tampering feature is
the consumers’ assurance that
the contents are genuine and not
tampered or adulterated.
Track and Trace:
Track and trace technologies use
mass serialization to provide a
unique identity to each SKU. The
IT technology then allows to keep
a watch on each SKU through
customised software that allow
an authorised user to track the
movement of this SKU across the
entire supply chain. Depending
upon the authorization level,
each user may also be able to
access additional information
pertaining to the product such as
manufacturing date and factory,
expiry date, the market such SKU
is meant for etc.
All these technologies can be
categorised as either overt,
covert, forensic or digital.
Overt, Covert, Forensic or
Digital
Overt: Overt technologies are
authentication devices built into
labels, documents and packaging
which are visible to the user and
show dynamic visual effects.
Their main advantage is the
fast and easy, on the spot,
visual authentication where no
Overview Authentication
Technologies
All about Authentication
With the availability of various authentication solutions, companies and Government authorities are facing
problem in selection of a specific authentication solution as the adoption of any given solution is a complex
question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are
divergent views on which technologies should be adopted and the timing for their adoption. While these
solutions can sometimes add to the problem, the right selection, usage & implementation of authentication
solutions helps companies and authorities to keep them one step ahead of counterfeiting. For the reason
The Authentication Times team decided to start a series of article on Authentication Technoligies. This is
the first article of this series giving an overview of authentication technologies to the reader, and this will
be followed by detailed articles on anti-counterfeiting, anti-tampering and tracking and tracing.
www.aspaglobal.com
13
The Authentication Times
Inaugural Issue
additional devices are needed.
Overt features are expected to
fulfil three main criteria;
-	Communicate with the
verifier
-	 Be easy to identify
-	 Be hard to copy and imitate
Physical secure solutions offering
overt features include fine-
line design, security guilloches,
holograms, optically variable
devices (OVDs), watermarks,
colour-shift and thermochromic
inks, threads, foils and laminates,
embossable and laser markable
films and security papers.
Overt features can be made
more secure by combining them
with covert, forensic and digital
features. As Overt can be used for
identification and verification by
consumer, Covert (Verification by
a predetermined device or a tool)
can be used by manufacturer
Microtext/
Nanotext/
Guilloche
Microtext/
Nanotext/
Guilloche
Holograms /
Zero diffraction
Devices/Floating/
Sinking image
films/color
shifting films/
retroreflective
films
Holograms /
Zero diffraction
Devices/Floating/
Sinking image
films/color
shifting films/
retroreflective
films
Intaglio ink/
Fluorescent ink/
infrared ink/
thermochromic /
optically variable
ink /pearlescent
varnishes/tagged
inks
Intaglio ink/
Fluorescent ink/
infrared ink/
thermochromic /
optically variable
ink /pearlescent
varnishes/tagged
inks
Fig: Diagram showing the primarily used authentication technologies
Authentication TechnologiesAuthentication Technologies
Anti-counterfeitingAnti-counterfeiting TrackingTracking
Tamper Evident
Labels
Tamper Evident
Labels
Tear Tapes/
Delaminating
Films/Patterned
Destruct Films /
Labels
Tear Tapes/
Delaminating
Films/Patterned
Destruct Films /
Labels
Security
Printing
Security
Printing
Optical Security
Technologies
Optical Security
Technologies
Chemical and
molecular
taggants and
nanotechnologies
Chemical and
molecular
taggants and
nanotechnologies
Tamper
Evident Closures
Tamper
Evident Closures
Shrink Sleeves or
Films/ Induction
Seals
Shrink Sleeves or
Films/ Induction
Seals
Security inks and
coatings
Security inks and
coatings
Substrates-
Security Papers
Substrates-
Security Papers
Anti-tamperAnti-tamper
Track & Trace
Systems
Track & Trace
Systems
EAS Tag &
Systems
EAS Tag &
Systems
All about Authentication
www.aspaglobal.com
14
The Authentication Times
Inaugural Issue
or their channel partner for an
advanced level of authentication
and verification. The third level is
highly sophisticated and can be
used by forensic experts and can
be useful to law enforcement and
for evidence in case of litigation.
Mainly classified as overt
technologies holograms
produced in high security
environment provide covert as
well as forensic features.
Covert: Covert technologies
are not instantly recognisable.
They require a special reader
or detector to be able to verify
their presence and validity, and
people using covert technologies
will normally require some kind
of training. Covert technologies
include ultraviolet and infrared
inks, micro text, unique synthetic
tagging etc.
Forensic: Forensic technologies,
being covert, are not readily
recognisable and require special
toolsfordetectionandvalidation.
Whereas covert technologies can
be detected and validated in the
field, forensic technologies must
often be taken to a laboratory
with specialised equipment.
Digital: Digital technologies may
be either overt or covert, but all
require an electronic means for
detection and validation. Digital
technologies are most associated
with RFID tags or with serialised
numbers that can be compared
to a remote database.
Conclusion
In today’s world when brand
are under attack in forms of
counterfeiting, tampering,
pilfering, Authentication
technologies play an important
role in protecting brand
reputation, value, market share
and above all trust of customers.
Counterfeiters target well known
brands for illegal profit, which is
further used to finance terrorist
organization. Therefore, a
product without authentication
technologies represents a
significant potential risk to
society at large. There is no
single solution to every problem,
hence, a proper brand protection
strategy involve combination
of technologies with proper
enforcement. It is pertinent
to mention here ISO:12931
titled “Performance criteria for
authentication solutions used to
combatcounterfeitingofmaterial
goods”. This standard lays down
some of the best practices to help
brand owners to strategise and
fight counterfeiting effectively.
We believe that this tool should
be adopted by all brand owners
to eliminate counterfeit.
The next article will focus on
anti-counterfeiting technologies
in more details.
Diagram: Overt feature (security hologram strip) applied on pharmaceutical
product label
All about Authentication

More Related Content

What's hot

The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times
 
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Authentication Times
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Authentication Times
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Authentication Times
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Authentication Times
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
 

What's hot (20)

Counterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengalCounterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengal
 
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
 
The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015The Authentication Times issue 27 August 2015
The Authentication Times issue 27 August 2015
 
Recent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in indiaRecent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in india
 
How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?
 
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4
 
Fashion
FashionFashion
Fashion
 
Identity document challenges and solutions
Identity document challenges and solutionsIdentity document challenges and solutions
Identity document challenges and solutions
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
 
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
 
How to select authentication solutions according to your needs
How to select authentication solutions according to your needsHow to select authentication solutions according to your needs
How to select authentication solutions according to your needs
 
Food Fraud Authentication and Traceability
Food Fraud Authentication and TraceabilityFood Fraud Authentication and Traceability
Food Fraud Authentication and Traceability
 
HOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography marketHOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography market
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
 
How to combat Auto counterfeiting in India
How to combat Auto counterfeiting in IndiaHow to combat Auto counterfeiting in India
How to combat Auto counterfeiting in India
 

Viewers also liked

The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The Authentication Times
 
A year with Cloud Foundry and BOSH
A year with Cloud Foundry and BOSHA year with Cloud Foundry and BOSH
A year with Cloud Foundry and BOSHTroy Astle
 

Viewers also liked (15)

Tax stamp in india an overview
Tax stamp in india an overviewTax stamp in india an overview
Tax stamp in india an overview
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Serialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overviewSerialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overview
 
Identify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in IndiaIdentify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in India
 
The Authentication Times, Issue 30
The Authentication Times, Issue 30The Authentication Times, Issue 30
The Authentication Times, Issue 30
 
High tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeitingHigh tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeiting
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26
 
Evolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and ConsEvolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and Cons
 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
 
Increasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in IndiaIncreasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in India
 
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
 
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...
 
Holographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenueHolographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenue
 
Authentix
AuthentixAuthentix
Authentix
 
A year with Cloud Foundry and BOSH
A year with Cloud Foundry and BOSHA year with Cloud Foundry and BOSH
A year with Cloud Foundry and BOSH
 

Similar to Authentication Technologies An Overview

Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Ruth Thomson
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologiesBilcareltd
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problemBilcareltd
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxRichardLightfoot8
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety SolutionEddie Cohen
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
The Future of Technology: Embracing Facial Recognition Technology
The Future of Technology: Embracing Facial Recognition TechnologyThe Future of Technology: Embracing Facial Recognition Technology
The Future of Technology: Embracing Facial Recognition TechnologyStar Link Communication Pvt Ltd
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketAlexander WEIR
 
Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationBilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networksSleepros
 

Similar to Authentication Technologies An Overview (20)

Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologies
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
 
UPITag_write_upP1_toP3
UPITag_write_upP1_toP3UPITag_write_upP1_toP3
UPITag_write_upP1_toP3
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Currency
CurrencyCurrency
Currency
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptx
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
 
Overview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for IndiaOverview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for India
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
The Future of Technology: Embracing Facial Recognition Technology
The Future of Technology: Embracing Facial Recognition TechnologyThe Future of Technology: Embracing Facial Recognition Technology
The Future of Technology: Embracing Facial Recognition Technology
 
Innovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution MarketInnovation in the Anti-counterfeit Technology Solution Market
Innovation in the Anti-counterfeit Technology Solution Market
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns Application
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Securing chemical production and digital networks
Securing chemical production and digital networksSecuring chemical production and digital networks
Securing chemical production and digital networks
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 

More from Authentication Solution Providers' Association (ASPA)

More from Authentication Solution Providers' Association (ASPA) (17)

Trends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in IndiaTrends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in India
 
Covid 19 and counterfeiting
Covid 19 and counterfeitingCovid 19 and counterfeiting
Covid 19 and counterfeiting
 
Tax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policyTax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policy
 
Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting
 
How to make any serialization program successful
How to make any serialization program successful How to make any serialization program successful
How to make any serialization program successful
 
Cannabis in India & Canada
Cannabis in India & CanadaCannabis in India & Canada
Cannabis in India & Canada
 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
 
Trends and drivers in tax stamps design
Trends and drivers in tax stamps design Trends and drivers in tax stamps design
Trends and drivers in tax stamps design
 
The Evolution of DOVID's on Banknotes
The Evolution of DOVID's on BanknotesThe Evolution of DOVID's on Banknotes
The Evolution of DOVID's on Banknotes
 
Predicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heijPredicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heij
 
Combating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for IndiaCombating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for India
 
How blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishingHow blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishing
 
Need of anti counterfeit secured packaging
Need of anti counterfeit secured packagingNeed of anti counterfeit secured packaging
Need of anti counterfeit secured packaging
 
Security features in passport, trends in the last two decades
Security features in passport, trends in the last two decadesSecurity features in passport, trends in the last two decades
Security features in passport, trends in the last two decades
 
Recent trends and developments in currency
Recent trends and developments in currencyRecent trends and developments in currency
Recent trends and developments in currency
 
Milk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menaceMilk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menace
 
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menaceSituation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Authentication Technologies An Overview

  • 1. www.aspaglobal.com 12 The Authentication Times Inaugural Issue Authentication: With the increase in counterfeiting, Authentication technologies play an important role in supporting brand strategies, helping to reduce the risk of fraud by deterring criminals and enabling stakeholders to identify and track genuine product with fake one. Today, there are various number of authentication technologies available in the market, although all these technologies are applied in the three main areas of i) Anti-Counterfeiting ii) Anti-Tampering, and iii) Track and Trace Anti-Counterfeiting: The common feature of anti- counterfeiting technologies is that they are edrtremely difficult tobecounterfeited.Consequently, they help in identifying a genuine product. Based on the authentication requirements, such technologies may consist of overt, covert and forensic features, or a mix thereof. Anti-Tampering: Such solutions are found more in the food and pharmaceutical industry where there is a need to protect a product from adulteration or replacement. An intact anti-tampering feature is the consumers’ assurance that the contents are genuine and not tampered or adulterated. Track and Trace: Track and trace technologies use mass serialization to provide a unique identity to each SKU. The IT technology then allows to keep a watch on each SKU through customised software that allow an authorised user to track the movement of this SKU across the entire supply chain. Depending upon the authorization level, each user may also be able to access additional information pertaining to the product such as manufacturing date and factory, expiry date, the market such SKU is meant for etc. All these technologies can be categorised as either overt, covert, forensic or digital. Overt, Covert, Forensic or Digital Overt: Overt technologies are authentication devices built into labels, documents and packaging which are visible to the user and show dynamic visual effects. Their main advantage is the fast and easy, on the spot, visual authentication where no Overview Authentication Technologies All about Authentication With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. For the reason The Authentication Times team decided to start a series of article on Authentication Technoligies. This is the first article of this series giving an overview of authentication technologies to the reader, and this will be followed by detailed articles on anti-counterfeiting, anti-tampering and tracking and tracing.
  • 2. www.aspaglobal.com 13 The Authentication Times Inaugural Issue additional devices are needed. Overt features are expected to fulfil three main criteria; - Communicate with the verifier - Be easy to identify - Be hard to copy and imitate Physical secure solutions offering overt features include fine- line design, security guilloches, holograms, optically variable devices (OVDs), watermarks, colour-shift and thermochromic inks, threads, foils and laminates, embossable and laser markable films and security papers. Overt features can be made more secure by combining them with covert, forensic and digital features. As Overt can be used for identification and verification by consumer, Covert (Verification by a predetermined device or a tool) can be used by manufacturer Microtext/ Nanotext/ Guilloche Microtext/ Nanotext/ Guilloche Holograms / Zero diffraction Devices/Floating/ Sinking image films/color shifting films/ retroreflective films Holograms / Zero diffraction Devices/Floating/ Sinking image films/color shifting films/ retroreflective films Intaglio ink/ Fluorescent ink/ infrared ink/ thermochromic / optically variable ink /pearlescent varnishes/tagged inks Intaglio ink/ Fluorescent ink/ infrared ink/ thermochromic / optically variable ink /pearlescent varnishes/tagged inks Fig: Diagram showing the primarily used authentication technologies Authentication TechnologiesAuthentication Technologies Anti-counterfeitingAnti-counterfeiting TrackingTracking Tamper Evident Labels Tamper Evident Labels Tear Tapes/ Delaminating Films/Patterned Destruct Films / Labels Tear Tapes/ Delaminating Films/Patterned Destruct Films / Labels Security Printing Security Printing Optical Security Technologies Optical Security Technologies Chemical and molecular taggants and nanotechnologies Chemical and molecular taggants and nanotechnologies Tamper Evident Closures Tamper Evident Closures Shrink Sleeves or Films/ Induction Seals Shrink Sleeves or Films/ Induction Seals Security inks and coatings Security inks and coatings Substrates- Security Papers Substrates- Security Papers Anti-tamperAnti-tamper Track & Trace Systems Track & Trace Systems EAS Tag & Systems EAS Tag & Systems All about Authentication
  • 3. www.aspaglobal.com 14 The Authentication Times Inaugural Issue or their channel partner for an advanced level of authentication and verification. The third level is highly sophisticated and can be used by forensic experts and can be useful to law enforcement and for evidence in case of litigation. Mainly classified as overt technologies holograms produced in high security environment provide covert as well as forensic features. Covert: Covert technologies are not instantly recognisable. They require a special reader or detector to be able to verify their presence and validity, and people using covert technologies will normally require some kind of training. Covert technologies include ultraviolet and infrared inks, micro text, unique synthetic tagging etc. Forensic: Forensic technologies, being covert, are not readily recognisable and require special toolsfordetectionandvalidation. Whereas covert technologies can be detected and validated in the field, forensic technologies must often be taken to a laboratory with specialised equipment. Digital: Digital technologies may be either overt or covert, but all require an electronic means for detection and validation. Digital technologies are most associated with RFID tags or with serialised numbers that can be compared to a remote database. Conclusion In today’s world when brand are under attack in forms of counterfeiting, tampering, pilfering, Authentication technologies play an important role in protecting brand reputation, value, market share and above all trust of customers. Counterfeiters target well known brands for illegal profit, which is further used to finance terrorist organization. Therefore, a product without authentication technologies represents a significant potential risk to society at large. There is no single solution to every problem, hence, a proper brand protection strategy involve combination of technologies with proper enforcement. It is pertinent to mention here ISO:12931 titled “Performance criteria for authentication solutions used to combatcounterfeitingofmaterial goods”. This standard lays down some of the best practices to help brand owners to strategise and fight counterfeiting effectively. We believe that this tool should be adopted by all brand owners to eliminate counterfeit. The next article will focus on anti-counterfeiting technologies in more details. Diagram: Overt feature (security hologram strip) applied on pharmaceutical product label All about Authentication