SlideShare a Scribd company logo
1 of 2
Download to read offline
www.homai.org 15
The Holography Times
Vol. 8, Issue 24
Guest Column
Coded holograms:
keeping the supply chain secure
Companies have to contend with
challenges stemming from supply
chain security lapses (which can
result in theft, diversions and
product recalls), counterfeiting
and regulations. In addition these
factors can impair the health
and reputation of companies by
adversely impacting on profits,
brand credibility and research
initiatives. With industry,
regulatory authorities, security
agencies and governments
around the world realising the
significance of implementing
product tracking and tracing
systems which build on product
serialisation, it becomes
mandatory for those in the
supply chain to comply with
legislation pertaining to the
locations in which they operate.
Even where this is not mandated
by law, tracking and tracing
systems improve defences
against counterfeiting and
other infringements as well
as improving distribution and
inventory control.
Typically, distribution systems
run the gamut of manufacturers,
wholesalers,distributors,stockists
and retail outlets before products
reach the end user or customer.
Ensuring product protection,
including authentication
capabilities, across various touch
points throughout the supply
chain through track and trace
implementation, is important to
address the challenges industry
faces. Apart from providing
visibility and full traceability
from manufacturer to consumer,
successful serialisation programs
can prove to be a key differentiator
and a clear competitive advantage
for companies.
Today,QuickResponse(QR)codes,
which use four standardised
encoding modes (numeric,
alphanumeric, byte/binary and
kanji) to efficiently store data, are
being linked with holograms to
provide integrated track & trace
and authentication solutions
which, among other benefits, can
help governments improve excise
duty collection and minimize
product counterfeit, contraband
and illegal parallel trading by
enabling tracking of each saleable
item from its point of origin to the
point of sale. Incorporating these
codes in to a hologram delivers
authentication of the product and
the code in one feature, making
this an efficient and effective
method of product protection.
Systems like Andrews &
Wykeham’s THESEUS™ can also
be applied as an anti-counterfeit
solution not related to taxation
for such market segments as
pharmaceutical. Not only do
systems like this one assist in
maximising tax collection and
reducing counterfeits, they are
also tools the government can
use to leverage public confidence.
THESEUS™ for example includes
an open Internet interface, which
enables any member of the public
Everyone involved in the goods
supply chain - manufacturers,
distributors, consumers, taxation and
government authorities- has learnt
the value of security holograms and
will be reassured by their presence
on products and/or the packaging,
recognising the benefits they
provide. However, as coding and
serialisation becomes mandated in
various countries for products such
as medicines and tobacco products,
the ability to incorporate QR, data
matrix and other types of code in to
holograms further enhances the role
they can play in supply chain control.
Ian Lancaster, general secretary
of the International Hologram
Manufacturers Association, highlights
the latest developments.
Ian Lancaster
IHMA
www.homai.org16
The Holography Times
Vol. 8, Issue 24
to verify products are genuine
and duty-paid, and uses high-
security labels with holographic
and security print features,
carrying two-dimensional QR-
format barcodes with item-
specific information. These codes
are protected from unauthorised
access and reproduction by
state-of-the-art electronic digital
signature (EDS) technology.
Another technology finding its
way to increased integration
with holography is coding
foil, which is used to stamp
various markings onto product
packaging by means of a coding
device. These markings provide
the consumer with important
information such as a product’s
expiration date, production date,
the weight, or the price, and
are especially beneficial when
it comes to the need to mark a
product’s quality or add high
performance labelling. And in
today’s health and eco-conscious
world, manufacturers ensure
that these foils comply with all
necessary regulations, including
the strict limits in EN 71/Part
3, the EU packaging guidelines
94/62/EC, and the American
CONEG specification for heavy
metals and lead chromate. The
Kurz Group, for example, is a
market leader whose eco-friendly
coding foils are enabling product
manufacturers and others in the
supply chain to choose from a
diverse product line that includes
a wide range of grades and
colours to meet the demanding
requirements of modern product
packaging, labelling and retailing.
Coding foils are just one product
that can be integrated with
holograms to boost the role played
in supply chain control. Kurz’s
TRUSTSEAL® range of difficult to
copy holographic authenticity
features visually enhance the
brand, build consumer confidence,
and provide a high level of
counterfeit protection. These
optical security features can be
combined with the web-based
TRUSTCODE®
identification
system. The TRUSTCODE®
system
connects the real world to the
virtual one: detailed product
information can be accessed by
buyers, retailers, customs officials
and brand owners using different
smart phone scanning processes.
The company has also developed
diffractive 2 D barcodes with an
appealing aesthetic that enhances
the value of the product. Rather
than being printed, the barcode is
appliedasasilvercoloredstamping
foil into which the actual code has
been incorporated as a diffractive,
holographic-like structure.
Elsewhere, companies like MTM
Technologies Inc are pioneering
othercodedholographysolutions
such as the HoloTag to protect
against brand piracy and product
theft in the supply chain within
the framework of its integrated
security concept. Integrated with
other technologies the MTM
hologram linked with a taggant
combines visible proof of any
tampering with an individual
security code for authentication.
The HoloTag 2D barcode system
has applications in many areas:
from government revenue
collection to publishers and
manufacturers of products.
Checks can be carried out within
the supply chain with a HoloTag
trackandtracemobileapplication
that can be downloaded onto
most smart phones, or accessed
from a browser, allowing the
user to gather a lot of information
in the field and track this in real
time. The technology plays an
important part in combating
counterfeiting and piracy of
taxable items, helping brand
owners control their inventories
and prevent them from producing
excess items which can be targets
for smuggling.
Unquestionably, one of the keys
to the success of holograms since
being adopted for authentication
purposes in the early 1980s has
been the ability to adapt and
constantly find new roles. We
will undoubtedly see more and
more interesting developments
for the technology that will offer
far reaching benefits that develop
and expand further the role of
track and trace. So, with the
seemingly remorseless march
of technology and the resolve of
governments, anti-counterfeiting
agencies and companies around
the world to stand firm in the face
of international organised crime,
as well as the casual opportunist,
there’s no reason why the
hologram will not continue
to evolve, becoming further
enmeshed in global supply chains
and continuing to add real value.
The International Hologram
Manufacturers Association
(IHMA) - www.ihma.org - is made
up of nearly 90 of the world’s
leading hologram companies.
IHMA members are the leading
producers and converters
of holograms for banknote
security, anti-counterfeiting,
brand protection, packaging,
graphics and other commercial
applications around the world.
IHMA member companies
actively cooperate to maintain
the highest professional, security
and quality standards.
Issued on behalf of the IHMA by
Mitchell Halton Watson Ltd.
For further details contact
Andy Bruce on +44 (0) 191 233 1300
or email andy@mhwpr.co.uk
Guest Column

More Related Content

What's hot

The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The Authentication Times
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Authentication Times
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Authentication Times
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Authentication Times
 

What's hot (20)

Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
 
Overview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for IndiaOverview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for India
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7
 
The Authentication Times Issue 29
The Authentication Times Issue 29The Authentication Times Issue 29
The Authentication Times Issue 29
 
The Authentication Times, Issue 30
The Authentication Times, Issue 30The Authentication Times, Issue 30
The Authentication Times, Issue 30
 
The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23The Holography Times, January 2014, Volume 8, Issue no 23
The Holography Times, January 2014, Volume 8, Issue no 23
 
The Authentication Times issue 32
The Authentication Times issue 32The Authentication Times issue 32
The Authentication Times issue 32
 
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menaceSituation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
 
Ht issue 16 201112
Ht issue 16 201112Ht issue 16 201112
Ht issue 16 201112
 
The authentication times issue 35
The authentication times issue 35The authentication times issue 35
The authentication times issue 35
 
Fashion
FashionFashion
Fashion
 
Trends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in IndiaTrends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in India
 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
 
Food Fraud Authentication and Traceability
Food Fraud Authentication and TraceabilityFood Fraud Authentication and Traceability
Food Fraud Authentication and Traceability
 

Viewers also liked

The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Authentication Times
 
The Holography Times, July 2010, Volume 4, Issue no 11
The Holography Times, July 2010, Volume 4, Issue no 11The Holography Times, July 2010, Volume 4, Issue no 11
The Holography Times, July 2010, Volume 4, Issue no 11The Authentication Times
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Authentication Times
 

Viewers also liked (19)

Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Identity document challenges and solutions
Identity document challenges and solutionsIdentity document challenges and solutions
Identity document challenges and solutions
 
Authentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious MedicinesAuthentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious Medicines
 
High tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeitingHigh tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeiting
 
Evolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and ConsEvolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and Cons
 
Brand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its preventionBrand counterfeiting and solutions for its prevention
Brand counterfeiting and solutions for its prevention
 
How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?
 
Increasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in IndiaIncreasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in India
 
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
 
Identify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in IndiaIdentify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in India
 
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...
 
How to select authentication solutions according to your needs
How to select authentication solutions according to your needsHow to select authentication solutions according to your needs
How to select authentication solutions according to your needs
 
HOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography marketHOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography market
 
Holographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenueHolographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenue
 
Tax stamp in india an overview
Tax stamp in india an overviewTax stamp in india an overview
Tax stamp in india an overview
 
How to combat Auto counterfeiting in India
How to combat Auto counterfeiting in IndiaHow to combat Auto counterfeiting in India
How to combat Auto counterfeiting in India
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3
 
The Holography Times, July 2010, Volume 4, Issue no 11
The Holography Times, July 2010, Volume 4, Issue no 11The Holography Times, July 2010, Volume 4, Issue no 11
The Holography Times, July 2010, Volume 4, Issue no 11
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18
 

Similar to Coded holograms-keeping-the-supply-chain-secure

The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
 
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Authentication Times
 
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...Fazmina Fajju
 
Traceability in the food and beverage industry
Traceability in the food and beverage industryTraceability in the food and beverage industry
Traceability in the food and beverage industryKaizenlogcom
 
Traceability in the food and beverage industry
Traceability in the food and beverage industryTraceability in the food and beverage industry
Traceability in the food and beverage industryKaizenlogcom
 
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptxBotaQ2
 
HBR Transparent supply chain article
HBR Transparent supply chain articleHBR Transparent supply chain article
HBR Transparent supply chain articleAkhilesh Krishnan
 
Digital disruption and corruption
Digital disruption and corruptionDigital disruption and corruption
Digital disruption and corruptionMelda Tanyeri
 
Serialization Reality Check: Where are al the numbers?
Serialization Reality Check: Where are al the numbers?Serialization Reality Check: Where are al the numbers?
Serialization Reality Check: Where are al the numbers?Avi Chaudhuri
 
IFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future GrowthIFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future GrowthChaiyatorn Limapornvanich
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docxnovabroom
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docxhyacinthshackley2629
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1Patrick Lemoine
 
"Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t..."Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t...eraser Juan José Calderón
 
A Blockchain-Based Framework for Apparel & Footwear Supply Chain Traceability
A Blockchain-Based Framework for Apparel & Footwear Supply Chain TraceabilityA Blockchain-Based Framework for Apparel & Footwear Supply Chain Traceability
A Blockchain-Based Framework for Apparel & Footwear Supply Chain TraceabilityCognizant
 
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...Jatin Patel
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry BrandAlfons Futterer
 

Similar to Coded holograms-keeping-the-supply-chain-secure (20)

The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
 
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4
 
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...
Pharma Security World 2018 Anti-counterfeiting, Serialization & Brand Safety ...
 
Traceability in the food and beverage industry
Traceability in the food and beverage industryTraceability in the food and beverage industry
Traceability in the food and beverage industry
 
Traceability in the food and beverage industry
Traceability in the food and beverage industryTraceability in the food and beverage industry
Traceability in the food and beverage industry
 
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx
4_12_November_-_2.10pm_-_LIVIA_KECEROVA.pptx
 
HBR Transparent supply chain article
HBR Transparent supply chain articleHBR Transparent supply chain article
HBR Transparent supply chain article
 
Digital disruption and corruption
Digital disruption and corruptionDigital disruption and corruption
Digital disruption and corruption
 
Need of anti counterfeit secured packaging
Need of anti counterfeit secured packagingNeed of anti counterfeit secured packaging
Need of anti counterfeit secured packaging
 
Serialization Reality Check: Where are al the numbers?
Serialization Reality Check: Where are al the numbers?Serialization Reality Check: Where are al the numbers?
Serialization Reality Check: Where are al the numbers?
 
IFI - Corporate Foresight - Its Impact on Future Growth
IFI - Corporate Foresight - Its Impact on Future GrowthIFI - Corporate Foresight - Its Impact on Future Growth
IFI - Corporate Foresight - Its Impact on Future Growth
 
IFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future GrowthIFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future Growth
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1
 
UPITag_write_upP1_toP3
UPITag_write_upP1_toP3UPITag_write_upP1_toP3
UPITag_write_upP1_toP3
 
"Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t..."Does blockchain hold the key to a new age of supply chain transparency and t...
"Does blockchain hold the key to a new age of supply chain transparency and t...
 
A Blockchain-Based Framework for Apparel & Footwear Supply Chain Traceability
A Blockchain-Based Framework for Apparel & Footwear Supply Chain TraceabilityA Blockchain-Based Framework for Apparel & Footwear Supply Chain Traceability
A Blockchain-Based Framework for Apparel & Footwear Supply Chain Traceability
 
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...
A blockchain-based-framework-for-apparel-and-footwear-supply-chain-traceabili...
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry Brand
 

More from Authentication Solution Providers' Association (ASPA)

More from Authentication Solution Providers' Association (ASPA) (17)

Covid 19 and counterfeiting
Covid 19 and counterfeitingCovid 19 and counterfeiting
Covid 19 and counterfeiting
 
Tax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policyTax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policy
 
Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting
 
How to make any serialization program successful
How to make any serialization program successful How to make any serialization program successful
How to make any serialization program successful
 
Cannabis in India & Canada
Cannabis in India & CanadaCannabis in India & Canada
Cannabis in India & Canada
 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
 
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
 
Trends and drivers in tax stamps design
Trends and drivers in tax stamps design Trends and drivers in tax stamps design
Trends and drivers in tax stamps design
 
The Evolution of DOVID's on Banknotes
The Evolution of DOVID's on BanknotesThe Evolution of DOVID's on Banknotes
The Evolution of DOVID's on Banknotes
 
Predicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heijPredicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heij
 
Combating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for IndiaCombating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for India
 
How blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishingHow blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishing
 
Security features in passport, trends in the last two decades
Security features in passport, trends in the last two decadesSecurity features in passport, trends in the last two decades
Security features in passport, trends in the last two decades
 
Recent trends and developments in currency
Recent trends and developments in currencyRecent trends and developments in currency
Recent trends and developments in currency
 
Recent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in indiaRecent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in india
 
Milk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menaceMilk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menace
 
Counterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengalCounterfeiting & the ways to tackle this menace in west bengal
Counterfeiting & the ways to tackle this menace in west bengal
 

Recently uploaded

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Recently uploaded (20)

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

Coded holograms-keeping-the-supply-chain-secure

  • 1. www.homai.org 15 The Holography Times Vol. 8, Issue 24 Guest Column Coded holograms: keeping the supply chain secure Companies have to contend with challenges stemming from supply chain security lapses (which can result in theft, diversions and product recalls), counterfeiting and regulations. In addition these factors can impair the health and reputation of companies by adversely impacting on profits, brand credibility and research initiatives. With industry, regulatory authorities, security agencies and governments around the world realising the significance of implementing product tracking and tracing systems which build on product serialisation, it becomes mandatory for those in the supply chain to comply with legislation pertaining to the locations in which they operate. Even where this is not mandated by law, tracking and tracing systems improve defences against counterfeiting and other infringements as well as improving distribution and inventory control. Typically, distribution systems run the gamut of manufacturers, wholesalers,distributors,stockists and retail outlets before products reach the end user or customer. Ensuring product protection, including authentication capabilities, across various touch points throughout the supply chain through track and trace implementation, is important to address the challenges industry faces. Apart from providing visibility and full traceability from manufacturer to consumer, successful serialisation programs can prove to be a key differentiator and a clear competitive advantage for companies. Today,QuickResponse(QR)codes, which use four standardised encoding modes (numeric, alphanumeric, byte/binary and kanji) to efficiently store data, are being linked with holograms to provide integrated track & trace and authentication solutions which, among other benefits, can help governments improve excise duty collection and minimize product counterfeit, contraband and illegal parallel trading by enabling tracking of each saleable item from its point of origin to the point of sale. Incorporating these codes in to a hologram delivers authentication of the product and the code in one feature, making this an efficient and effective method of product protection. Systems like Andrews & Wykeham’s THESEUS™ can also be applied as an anti-counterfeit solution not related to taxation for such market segments as pharmaceutical. Not only do systems like this one assist in maximising tax collection and reducing counterfeits, they are also tools the government can use to leverage public confidence. THESEUS™ for example includes an open Internet interface, which enables any member of the public Everyone involved in the goods supply chain - manufacturers, distributors, consumers, taxation and government authorities- has learnt the value of security holograms and will be reassured by their presence on products and/or the packaging, recognising the benefits they provide. However, as coding and serialisation becomes mandated in various countries for products such as medicines and tobacco products, the ability to incorporate QR, data matrix and other types of code in to holograms further enhances the role they can play in supply chain control. Ian Lancaster, general secretary of the International Hologram Manufacturers Association, highlights the latest developments. Ian Lancaster IHMA
  • 2. www.homai.org16 The Holography Times Vol. 8, Issue 24 to verify products are genuine and duty-paid, and uses high- security labels with holographic and security print features, carrying two-dimensional QR- format barcodes with item- specific information. These codes are protected from unauthorised access and reproduction by state-of-the-art electronic digital signature (EDS) technology. Another technology finding its way to increased integration with holography is coding foil, which is used to stamp various markings onto product packaging by means of a coding device. These markings provide the consumer with important information such as a product’s expiration date, production date, the weight, or the price, and are especially beneficial when it comes to the need to mark a product’s quality or add high performance labelling. And in today’s health and eco-conscious world, manufacturers ensure that these foils comply with all necessary regulations, including the strict limits in EN 71/Part 3, the EU packaging guidelines 94/62/EC, and the American CONEG specification for heavy metals and lead chromate. The Kurz Group, for example, is a market leader whose eco-friendly coding foils are enabling product manufacturers and others in the supply chain to choose from a diverse product line that includes a wide range of grades and colours to meet the demanding requirements of modern product packaging, labelling and retailing. Coding foils are just one product that can be integrated with holograms to boost the role played in supply chain control. Kurz’s TRUSTSEAL® range of difficult to copy holographic authenticity features visually enhance the brand, build consumer confidence, and provide a high level of counterfeit protection. These optical security features can be combined with the web-based TRUSTCODE® identification system. The TRUSTCODE® system connects the real world to the virtual one: detailed product information can be accessed by buyers, retailers, customs officials and brand owners using different smart phone scanning processes. The company has also developed diffractive 2 D barcodes with an appealing aesthetic that enhances the value of the product. Rather than being printed, the barcode is appliedasasilvercoloredstamping foil into which the actual code has been incorporated as a diffractive, holographic-like structure. Elsewhere, companies like MTM Technologies Inc are pioneering othercodedholographysolutions such as the HoloTag to protect against brand piracy and product theft in the supply chain within the framework of its integrated security concept. Integrated with other technologies the MTM hologram linked with a taggant combines visible proof of any tampering with an individual security code for authentication. The HoloTag 2D barcode system has applications in many areas: from government revenue collection to publishers and manufacturers of products. Checks can be carried out within the supply chain with a HoloTag trackandtracemobileapplication that can be downloaded onto most smart phones, or accessed from a browser, allowing the user to gather a lot of information in the field and track this in real time. The technology plays an important part in combating counterfeiting and piracy of taxable items, helping brand owners control their inventories and prevent them from producing excess items which can be targets for smuggling. Unquestionably, one of the keys to the success of holograms since being adopted for authentication purposes in the early 1980s has been the ability to adapt and constantly find new roles. We will undoubtedly see more and more interesting developments for the technology that will offer far reaching benefits that develop and expand further the role of track and trace. So, with the seemingly remorseless march of technology and the resolve of governments, anti-counterfeiting agencies and companies around the world to stand firm in the face of international organised crime, as well as the casual opportunist, there’s no reason why the hologram will not continue to evolve, becoming further enmeshed in global supply chains and continuing to add real value. The International Hologram Manufacturers Association (IHMA) - www.ihma.org - is made up of nearly 90 of the world’s leading hologram companies. IHMA members are the leading producers and converters of holograms for banknote security, anti-counterfeiting, brand protection, packaging, graphics and other commercial applications around the world. IHMA member companies actively cooperate to maintain the highest professional, security and quality standards. Issued on behalf of the IHMA by Mitchell Halton Watson Ltd. For further details contact Andy Bruce on +44 (0) 191 233 1300 or email andy@mhwpr.co.uk Guest Column