With the increase in counterfeiting, Authentication technologies plays an important role in supporting brand strategies, helping to reduce the risk of fraud by deterring criminals and enabling stakeholders to identify and track genuine products with fake one. This article is an overview of primarily used authentication technologies.
Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. The selection of an authentication1 solutions2 that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers.The article explain, “Steps to identify authentication solutions to curb counterfeiting”.
The Pharma industry is facing the problem of counterfeiting. The presentation highlight the need of an solution which can help authorities and companies in identification and authentication of counterfeit pharma drug.
Everyone involved in the goods supply chain - manufacturers, distributors, consumers, taxation and
government authorities- has learnt the value of security holograms and will be reassured by their presence
on products and/or the packaging, recognising the benefits they provide. However, as coding and serialisation becomes mandated in various countries for products such
as medicines and tobacco products, the ability to incorporate QR, data matrix and other types of code in to
holograms further enhances the role they can play in supply chain control. Ian Lancaster, general secretary
of the International Hologram Manufacturers Association, highlights the latest developments.
Counterfeiting continues to be a major growing issue in the
automotive component industry. According to Motor Equipment Manufacturers Association (MEMA), USA the global automotive industry loses US $ 12 billion to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study (Grey market the invisible enemy) released in 2012, the Auto component industry loses 29.6% of its sales due to grey market, worth US $ 2 billion (`9198 crores out
of estimated size of ` 31,046) affecting the growth of economy, loss of jobs, brand owner goodwill as well as risk to public safety. The parts that tend to be counterfeited the most are frequent replaced parts such as brake pads, spark plugs, and various types of filters. Governments have a particularly critical role to play in this effort. All over world, they are doing their best creating the necessary legal infrastructure, educating police force, developing suitable laws to deter fraudulent behaviour. Businesses, however, must also do their part to prevent the production and sale of counterfeit products.
Zero brand attack is an utopia. Brand owner can only take action in reducing the overall impact of brand attack.
Better management and use of effective brand protection solutions can result in brand owners getting better sales and market share; consumer getting the right products at the right price, government getting better revenues and a satisfied and loyal channel. Brand are under attack in various forms however main four are tampering, replication, diversion and recirculation. There is a need of authentication + tracking solutions to be used with proper communication to consumers.
Holography has evolved from security to packaging, since Glaxo used it in 1989. Again in 1994 Smithkline Beachem launches Aquafresh white toothpaste in USA in a carton covered in holographic laminate, the first time of holographic packaging has been used for branding.
The journey started by these companies is on its road to success with drastic developments in holography. The key is innovation and the approach is to stay one step ahead of counterfeiters. At this time of cut throat competition and global market conditions, companies have turned to new forms of packaging and intelligent labelling to ensure they get the attention of consumers to be successful in moving their product off the shelf and aid in helping consumers check for authenticity . Not every good packaging idea comes with a price tag. A little creative thinking is all that is needed. The article discuss the increasing use
of Holography in packaging and product promotion.
Holograms have been used in India as an anti-counterfeit technology since 1990. The introduction of security holograms on India’s National Identity Voter Card provided recognition of the use of a hologram as a secure authentication device by both the authorities and by large numbers of consumers.
In authentication, the usage of holograms as excise seals is the biggest market in India. To date, around 22 of India states excise departments are using holograms to combat the illicit liquor trade and subsequently increasing the revenue of their departments. In India security holograms are gaining popularity as key element of authentication and used by almost every sector facing the menace of counterfeiting.
The industry is going strong on year to year basis, and is moving forward by combining security holograms with digital technologies. Recently, holographic features have been introduced for Financial Cards in India re-strengthening its position as one of the key visual authentication features.
Authentication Solutions are a must to curb spurious medicines
There are a variety of solutions available, as per requirement, through member companies of ASPA. The Government of India has already taken steps to protect medicines that are exported. Now it is time to protect medicines that are being distributed and consumed within India.
Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. The selection of an authentication1 solutions2 that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers.The article explain, “Steps to identify authentication solutions to curb counterfeiting”.
The Pharma industry is facing the problem of counterfeiting. The presentation highlight the need of an solution which can help authorities and companies in identification and authentication of counterfeit pharma drug.
Everyone involved in the goods supply chain - manufacturers, distributors, consumers, taxation and
government authorities- has learnt the value of security holograms and will be reassured by their presence
on products and/or the packaging, recognising the benefits they provide. However, as coding and serialisation becomes mandated in various countries for products such
as medicines and tobacco products, the ability to incorporate QR, data matrix and other types of code in to
holograms further enhances the role they can play in supply chain control. Ian Lancaster, general secretary
of the International Hologram Manufacturers Association, highlights the latest developments.
Counterfeiting continues to be a major growing issue in the
automotive component industry. According to Motor Equipment Manufacturers Association (MEMA), USA the global automotive industry loses US $ 12 billion to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study (Grey market the invisible enemy) released in 2012, the Auto component industry loses 29.6% of its sales due to grey market, worth US $ 2 billion (`9198 crores out
of estimated size of ` 31,046) affecting the growth of economy, loss of jobs, brand owner goodwill as well as risk to public safety. The parts that tend to be counterfeited the most are frequent replaced parts such as brake pads, spark plugs, and various types of filters. Governments have a particularly critical role to play in this effort. All over world, they are doing their best creating the necessary legal infrastructure, educating police force, developing suitable laws to deter fraudulent behaviour. Businesses, however, must also do their part to prevent the production and sale of counterfeit products.
Zero brand attack is an utopia. Brand owner can only take action in reducing the overall impact of brand attack.
Better management and use of effective brand protection solutions can result in brand owners getting better sales and market share; consumer getting the right products at the right price, government getting better revenues and a satisfied and loyal channel. Brand are under attack in various forms however main four are tampering, replication, diversion and recirculation. There is a need of authentication + tracking solutions to be used with proper communication to consumers.
Holography has evolved from security to packaging, since Glaxo used it in 1989. Again in 1994 Smithkline Beachem launches Aquafresh white toothpaste in USA in a carton covered in holographic laminate, the first time of holographic packaging has been used for branding.
The journey started by these companies is on its road to success with drastic developments in holography. The key is innovation and the approach is to stay one step ahead of counterfeiters. At this time of cut throat competition and global market conditions, companies have turned to new forms of packaging and intelligent labelling to ensure they get the attention of consumers to be successful in moving their product off the shelf and aid in helping consumers check for authenticity . Not every good packaging idea comes with a price tag. A little creative thinking is all that is needed. The article discuss the increasing use
of Holography in packaging and product promotion.
Holograms have been used in India as an anti-counterfeit technology since 1990. The introduction of security holograms on India’s National Identity Voter Card provided recognition of the use of a hologram as a secure authentication device by both the authorities and by large numbers of consumers.
In authentication, the usage of holograms as excise seals is the biggest market in India. To date, around 22 of India states excise departments are using holograms to combat the illicit liquor trade and subsequently increasing the revenue of their departments. In India security holograms are gaining popularity as key element of authentication and used by almost every sector facing the menace of counterfeiting.
The industry is going strong on year to year basis, and is moving forward by combining security holograms with digital technologies. Recently, holographic features have been introduced for Financial Cards in India re-strengthening its position as one of the key visual authentication features.
Authentication Solutions are a must to curb spurious medicines
There are a variety of solutions available, as per requirement, through member companies of ASPA. The Government of India has already taken steps to protect medicines that are exported. Now it is time to protect medicines that are being distributed and consumed within India.
With almost a 1.32 billion population, India needs a robust, modernized agriculture sector to ensure the nutritional food security for its population. In order to meet the food requirement of the nation, the agricultural productivity and its growth needs to be sustained and further improved. Crop protection industry play a significant role in this and working hard in Research & Development, Technology Transfer by providing latest innovations to the farmers and helping to achieve the Honorable Prime Minister’s agenda of “Doubling Farmers’ Income by 2022” and “Nutritional Food Security” for the nation. There is also a remarkable share of non – genuine pesticide in Indian market, which can be illegal, counterfeit, spurious, adulterated or sub – standard. These products are unable to control the pests or control them efficiently and may cause considerable harm to soil and environment as well as production loss. The damage by these spurious products is multifold. The issue of spurious or counterfeit pesticides as also its adverse impact on the national economy needs to be highlighted and for this purpose Federation of Indian Chambers of Commerce and Industry (FICCI) with the help of Department of Chemicals & Petrochemicals and Department of Agriculture Cooperation & farmers Welfare, Government of India organized a Round Table Meeting on “Supporting Farmers with Quality Crop Protection Products : Challenges and Opportunities” on 15th February, 2019 at New Delhi.This presentation was delivered at the forum by Authentication Solution Providers' Association highlighting "How Authentication Technologies & Solutions are helping farmers, industry & Government across globe and same can be implemented in India".
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax
stamps.
In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union territories) are using approximately 11 billion tax stamps per annum. In contrast to globally, all these tax stamps are for alcohol, excluding cigarettes industry. The tax stamps were introduced in India
to prevent and minimizing the hooch tragedies, curbing the menace of duplication, as well as in increasing the excise revenue collection.
Our current cover story is on “Tax Stamp in India – An overview”. It also cover global expert view on “Product security solutions currently implemented in Turkey”. Apart from these, the issue also covers industry updates, ASPA and
member news, counterfeit seizure report and global patents.
In India, security holograms are extremely relevant device for authentication and revenue protection. Almost, 22 billion tax stamps are used per annum in India protecting tax revenue worth approximate INR 600 billion. The presentation will give you an overview of holographic tax stamps trends and developments in India. Most of the tax stamps used in India fall into three categories: full polyester-based security holograms; paper labels with a holographic portion; and plain paper or BOPP-based labels.The vast majority of stamps used, however, are full polyester-based security holograms, which are quite unlike the paper-based variety mainly preferred in the rest of the world.
Counterfeit electrical and electronic products are becoming a serious menace for legitimate manufacturers as well as for consumers and Government. The presentation focus on issue of counterfeit electrical and electronic products, its impact and steps to combat this problem. This is a part of HOMAI series of presentation against counterfeiting in various sectors. These presentations are intended for educational purposes to aware all stakeholders about counterfeiting and how we can fight counterfeiting.
Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized
countries. According to FBI statistics, it is the fastest
growing crime in USA. The Federal Trade Commission
estimates that as many as 9 million Americans have
their identities stolen each year. The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.
Dear Reader,
Welcome to the first edition of The Holography Times (THT) in year 2013.
This is our 20th edition and we would like to thank all our readers and members for overwhelming response and support.
We deeply valued the trust you have shown in us and ensure our endeavour to serve you better.
Currently brand owners / government authorities are facing problem in selection of authentication technologies. The International Standard Organisation (ISO) has solve the problem by releasing new standard ISO 12931 which provides the guidelines on how to protect brand and products from counterfeits.
Our current issue highlights on “Steps to identify authentication solutions to curb counterfeiting” along-with an article on ISO 12931. This issue also covers an interview of Mr. Anil Rajput, Chairman, FICCI CASCADE on anti-counterfeiting campaign running across the country.
Lastly on behalf of THT team, we look forward to 2013 with great hopes and wish all our reviewers, members, advertisers, advisers and above all, our readers a very happy and prosperous New Year.
C S Jeena
Editor
In 2015, FICCI estimates that the non-genuine pesticides market in India is estimated at Rs 3200 crore (25% by value) and expected to grow 20% per year and by 2019 40%.
According to recent study by FICCI, the domestic market increased with CAGR 3.5% for period 2013-16, and expected to grow 6.4% by 2022. The presentation focus on Anti-Counterfeiting solutions and role of technology in helping crop protection industry for consumer protection, brand protection and revenue enhancement.
Fighting counterfeiting need a strategy which should include, analysis of problem, the organisation commitment towards fighting counterfeiting, the right selection of authentication solutions and its proper implementation.
Food & beverage quality & safety is an important issue worldwide. The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by various high-profile cases in the global supply chain. Europol OPSON VIII operation coordinated by Europol’s Intellectual Property Crime Coordinated Coalition and INTERPOL which ran from December 2018 through April 2019. Enforcement agencies, regulatory authorities, and private
sector partners from approximately 78 countries took part in this
operation resulted in more than 67,000 checks carried out at shops, markets, airports, seaports, and industrial estates. In total, 672 individuals were arrested during the Operation, around 16,000 tonnes, and 33 million litres of likely fake food and drink worth of €100 million seized.
The presentation highlight the work of HOMAI doing to promote holography industry in India and to protect consumers from ill effects of counterfeiting.
Dear Reader,
Welcome to the 21st edition of The Holography Times.
Today, in India more than 300 State level industry-trade association exist representing more than 7,00,000* companies.
Each and every product has an industry trade association formed with an aim to facilitate the business environment for its member companies.
While they are playing an important role in modern and global economies, there are various hindrances which affect their industry / sector growth. Product counterfeiting is one of them. It is affecting all categories of products, but the impact is very high in sectors / product categories like fast moving consumer goods (FMCG), pharmaceuticals, electronics, automobile and aircraft parts, music, publishing, software, telecom, cosmetics, personal care, beverages, etc.
To fight this menace, a few of trade associations have come forwarded and have started playing a proactive role. Although, the number is very low, we are hopeful that other industry association will follow up the examples.
Our current issue highlights the Role of Industry Association in Curbing Counterfeiting. Apart from this, the issue also covers, industry updates including news, patents, financial analysis and much more.
Do send us your feedback / critics at info@aspaglobal.com
With Regards,
C S Jeena
Editor
Dear Reader,
Welcome to the 25th edition of our newsletter with a new name “The Authentication Times” (formerly known as The Holography Times).
Recently, HoMAI had completed its re-branding and now will be known as Authentication Solution Providers’ Association (ASPA).
With this it is becoming inevitable for us to change the name of “The Holography Times” as “The Authentication Times” and will focus on providing information, industry trends and news on authentication solutions from across the globe.
In the last few months, one of the two biggest economies of paper banknotes has shown their interest in polymer banknotes. Our current cover story is focus on “Evolution of polymer banknotes: pros and cons”. Apart from this we are starting a series of article on authentication with name “All about authentication”. The first article of his series will give you an overview of authentication technologies. Apart from this the issue also covers the industry updates including news, counterfeit seizure report, event review, appointment and global patents.
We are thankful to our readers for their support in last 7 years and hope that they will like the changes we are going for.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Dear Reader,
Welcome to the 22nd edition of The Holography Times.
Identity counterfeiting is an increasing global menace that has turned our identities into highly valuable assets. Since being developed over 60 years ago holograms have been the most successful anti-counterfeiting measure in this battle against ID counterfeiting. While the first DOVID appeared on a credit card in 1982 and on a banknote in 1988, in 1985 the first metallized hologram appeared on the passport of Iraq.
Our current issue highlights the “Identity Theft and Counterfeiting” and “Role of Hologram in Document Protection”. Apart from this the issue also covers industry updates including news, patents.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Counterfeiting continues to be a major growing issue in
the automotive component industry. According to Motor
Equipment Manufacturers Association (MEMA), USA
the global automotive industry loses US $ 12 billion
to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study
(Grey market the invisible enemy) released in 2012, the
Auto component industry loses 29.6% of its sales due
to grey market, worth US $ 2 billion (INR 9198 crores
out of estimated size of INR 31,046).
To combat this menace all Stakeholders need to fight
at their level. Governments have a particularly critical
role to play in this effort. All over world, they are doing
their best creating the necessary legal infrastructure,
educating police force, developing suitable laws to
deter fraudulent behaviour. Businesses, however, must
also do their part to prevent the production and sale of
counterfeit products.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It
was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across
the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax stamps. In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union Territories) in India are using approximately 11 billion tax stamps per annum. In contrast to
globally, all these tax stamps are for alcohol, excluding cigarettes industry. The introduction of tax stamps has help State Excise Department in minimizing the hooch tragedies,
curbing the menace of duplication, as well as in increasing the excise revenue collection. This article is an overview of TAX STAMPS in INDIA.
Counterfeiting is not a new term for electronic industry as counterfeit electrical and electronic products now occupy second place after pharmaceuticals estimated to range anywhere between US$11 billion to $20 billion worldwide
every year. However, counterfeit electronic parts have been much in the public eye in recent weeks. On March 28, 2014 one of Indian Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city killing five crew members. There were controversial news reported
in media about the counterfeit electronics being the reason for C-130J air crash. Over the past several years the electronics industry has seen a marked increase in the
availability of counterfeit electronic components. Counterfeiters have attacked every commodity of electronics, from simple components such as capacitors,
to complex integrated circuits such as microprocessors. In expensive commercial devices, as well as high cost military components, have seen counterfeiting on the rise. This article highlights the serious risk, its impact and the possible proactive steps that can be taken to curb this menace.
With almost a 1.32 billion population, India needs a robust, modernized agriculture sector to ensure the nutritional food security for its population. In order to meet the food requirement of the nation, the agricultural productivity and its growth needs to be sustained and further improved. Crop protection industry play a significant role in this and working hard in Research & Development, Technology Transfer by providing latest innovations to the farmers and helping to achieve the Honorable Prime Minister’s agenda of “Doubling Farmers’ Income by 2022” and “Nutritional Food Security” for the nation. There is also a remarkable share of non – genuine pesticide in Indian market, which can be illegal, counterfeit, spurious, adulterated or sub – standard. These products are unable to control the pests or control them efficiently and may cause considerable harm to soil and environment as well as production loss. The damage by these spurious products is multifold. The issue of spurious or counterfeit pesticides as also its adverse impact on the national economy needs to be highlighted and for this purpose Federation of Indian Chambers of Commerce and Industry (FICCI) with the help of Department of Chemicals & Petrochemicals and Department of Agriculture Cooperation & farmers Welfare, Government of India organized a Round Table Meeting on “Supporting Farmers with Quality Crop Protection Products : Challenges and Opportunities” on 15th February, 2019 at New Delhi.This presentation was delivered at the forum by Authentication Solution Providers' Association highlighting "How Authentication Technologies & Solutions are helping farmers, industry & Government across globe and same can be implemented in India".
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax
stamps.
In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union territories) are using approximately 11 billion tax stamps per annum. In contrast to globally, all these tax stamps are for alcohol, excluding cigarettes industry. The tax stamps were introduced in India
to prevent and minimizing the hooch tragedies, curbing the menace of duplication, as well as in increasing the excise revenue collection.
Our current cover story is on “Tax Stamp in India – An overview”. It also cover global expert view on “Product security solutions currently implemented in Turkey”. Apart from these, the issue also covers industry updates, ASPA and
member news, counterfeit seizure report and global patents.
In India, security holograms are extremely relevant device for authentication and revenue protection. Almost, 22 billion tax stamps are used per annum in India protecting tax revenue worth approximate INR 600 billion. The presentation will give you an overview of holographic tax stamps trends and developments in India. Most of the tax stamps used in India fall into three categories: full polyester-based security holograms; paper labels with a holographic portion; and plain paper or BOPP-based labels.The vast majority of stamps used, however, are full polyester-based security holograms, which are quite unlike the paper-based variety mainly preferred in the rest of the world.
Counterfeit electrical and electronic products are becoming a serious menace for legitimate manufacturers as well as for consumers and Government. The presentation focus on issue of counterfeit electrical and electronic products, its impact and steps to combat this problem. This is a part of HOMAI series of presentation against counterfeiting in various sectors. These presentations are intended for educational purposes to aware all stakeholders about counterfeiting and how we can fight counterfeiting.
Identity theft and ID counterfeiting are among the fastest growing types of crime, especially in highly industrialized
countries. According to FBI statistics, it is the fastest
growing crime in USA. The Federal Trade Commission
estimates that as many as 9 million Americans have
their identities stolen each year. The article highlight the issues related to document counterfeiting and the
importance of hologram in document protection.
Dear Reader,
Welcome to the first edition of The Holography Times (THT) in year 2013.
This is our 20th edition and we would like to thank all our readers and members for overwhelming response and support.
We deeply valued the trust you have shown in us and ensure our endeavour to serve you better.
Currently brand owners / government authorities are facing problem in selection of authentication technologies. The International Standard Organisation (ISO) has solve the problem by releasing new standard ISO 12931 which provides the guidelines on how to protect brand and products from counterfeits.
Our current issue highlights on “Steps to identify authentication solutions to curb counterfeiting” along-with an article on ISO 12931. This issue also covers an interview of Mr. Anil Rajput, Chairman, FICCI CASCADE on anti-counterfeiting campaign running across the country.
Lastly on behalf of THT team, we look forward to 2013 with great hopes and wish all our reviewers, members, advertisers, advisers and above all, our readers a very happy and prosperous New Year.
C S Jeena
Editor
In 2015, FICCI estimates that the non-genuine pesticides market in India is estimated at Rs 3200 crore (25% by value) and expected to grow 20% per year and by 2019 40%.
According to recent study by FICCI, the domestic market increased with CAGR 3.5% for period 2013-16, and expected to grow 6.4% by 2022. The presentation focus on Anti-Counterfeiting solutions and role of technology in helping crop protection industry for consumer protection, brand protection and revenue enhancement.
Fighting counterfeiting need a strategy which should include, analysis of problem, the organisation commitment towards fighting counterfeiting, the right selection of authentication solutions and its proper implementation.
Food & beverage quality & safety is an important issue worldwide. The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by various high-profile cases in the global supply chain. Europol OPSON VIII operation coordinated by Europol’s Intellectual Property Crime Coordinated Coalition and INTERPOL which ran from December 2018 through April 2019. Enforcement agencies, regulatory authorities, and private
sector partners from approximately 78 countries took part in this
operation resulted in more than 67,000 checks carried out at shops, markets, airports, seaports, and industrial estates. In total, 672 individuals were arrested during the Operation, around 16,000 tonnes, and 33 million litres of likely fake food and drink worth of €100 million seized.
The presentation highlight the work of HOMAI doing to promote holography industry in India and to protect consumers from ill effects of counterfeiting.
Dear Reader,
Welcome to the 21st edition of The Holography Times.
Today, in India more than 300 State level industry-trade association exist representing more than 7,00,000* companies.
Each and every product has an industry trade association formed with an aim to facilitate the business environment for its member companies.
While they are playing an important role in modern and global economies, there are various hindrances which affect their industry / sector growth. Product counterfeiting is one of them. It is affecting all categories of products, but the impact is very high in sectors / product categories like fast moving consumer goods (FMCG), pharmaceuticals, electronics, automobile and aircraft parts, music, publishing, software, telecom, cosmetics, personal care, beverages, etc.
To fight this menace, a few of trade associations have come forwarded and have started playing a proactive role. Although, the number is very low, we are hopeful that other industry association will follow up the examples.
Our current issue highlights the Role of Industry Association in Curbing Counterfeiting. Apart from this, the issue also covers, industry updates including news, patents, financial analysis and much more.
Do send us your feedback / critics at info@aspaglobal.com
With Regards,
C S Jeena
Editor
Dear Reader,
Welcome to the 25th edition of our newsletter with a new name “The Authentication Times” (formerly known as The Holography Times).
Recently, HoMAI had completed its re-branding and now will be known as Authentication Solution Providers’ Association (ASPA).
With this it is becoming inevitable for us to change the name of “The Holography Times” as “The Authentication Times” and will focus on providing information, industry trends and news on authentication solutions from across the globe.
In the last few months, one of the two biggest economies of paper banknotes has shown their interest in polymer banknotes. Our current cover story is focus on “Evolution of polymer banknotes: pros and cons”. Apart from this we are starting a series of article on authentication with name “All about authentication”. The first article of his series will give you an overview of authentication technologies. Apart from this the issue also covers the industry updates including news, counterfeit seizure report, event review, appointment and global patents.
We are thankful to our readers for their support in last 7 years and hope that they will like the changes we are going for.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Dear Reader,
Welcome to the 22nd edition of The Holography Times.
Identity counterfeiting is an increasing global menace that has turned our identities into highly valuable assets. Since being developed over 60 years ago holograms have been the most successful anti-counterfeiting measure in this battle against ID counterfeiting. While the first DOVID appeared on a credit card in 1982 and on a banknote in 1988, in 1985 the first metallized hologram appeared on the passport of Iraq.
Our current issue highlights the “Identity Theft and Counterfeiting” and “Role of Hologram in Document Protection”. Apart from this the issue also covers industry updates including news, patents.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Counterfeiting continues to be a major growing issue in
the automotive component industry. According to Motor
Equipment Manufacturers Association (MEMA), USA
the global automotive industry loses US $ 12 billion
to counterfeiting. The Indian scenario is not a different
story. According to FICCI – CASCADE latest study
(Grey market the invisible enemy) released in 2012, the
Auto component industry loses 29.6% of its sales due
to grey market, worth US $ 2 billion (INR 9198 crores
out of estimated size of INR 31,046).
To combat this menace all Stakeholders need to fight
at their level. Governments have a particularly critical
role to play in this effort. All over world, they are doing
their best creating the necessary legal infrastructure,
educating police force, developing suitable laws to
deter fraudulent behaviour. Businesses, however, must
also do their part to prevent the production and sale of
counterfeit products.
TAX Stamps have always been an important authentication solutions used by Government authorities to curb the illicit trade, protect consumer and to increase the excise revenue. It
was only 20 years ago; due to the globalization many countries started using tax stamps for the first time, especially in the Eastern Europe and Former Soviet Union. Today across
the globe, 81 countries are using approximately 130 billion cigarette tax stamps and 14 billion alcohol tax stamps. In India also, the revolution of first tax stamp was introduced by Tamilnadu State Excise Department in early eighties. Today, 22 States (including Union Territories) in India are using approximately 11 billion tax stamps per annum. In contrast to
globally, all these tax stamps are for alcohol, excluding cigarettes industry. The introduction of tax stamps has help State Excise Department in minimizing the hooch tragedies,
curbing the menace of duplication, as well as in increasing the excise revenue collection. This article is an overview of TAX STAMPS in INDIA.
Counterfeiting is not a new term for electronic industry as counterfeit electrical and electronic products now occupy second place after pharmaceuticals estimated to range anywhere between US$11 billion to $20 billion worldwide
every year. However, counterfeit electronic parts have been much in the public eye in recent weeks. On March 28, 2014 one of Indian Air Force Aircraft (C-130J Super
Hercules) crashed near Gwalior city killing five crew members. There were controversial news reported
in media about the counterfeit electronics being the reason for C-130J air crash. Over the past several years the electronics industry has seen a marked increase in the
availability of counterfeit electronic components. Counterfeiters have attacked every commodity of electronics, from simple components such as capacitors,
to complex integrated circuits such as microprocessors. In expensive commercial devices, as well as high cost military components, have seen counterfeiting on the rise. This article highlights the serious risk, its impact and the possible proactive steps that can be taken to curb this menace.
There has been a wave in the global pharmaceutical industry over the past several years, driven by the need for battling the scourge of spurious medicines, which take thousands of live each year. This wave has led to the evolution of technology to help regulators ensure that only genuine medicines are distributed within or imported in any market, and to empower patient to verify that the medicines they are taking are indeed what they claim to be. Serialization is one of the most widely adopted technologies in the new wave, and in this article we present an overview of this technology and its applications.
It has been over three decades since India Today, one of India’s leading publication covered a story on the problem of
fake pesticides in Punjab and Haryana. In these last 35 years,
the predicament of farmers in India has worsened year by year, as they continue to fight a grim battle against fake pesticides. On the other hand, the fake pesticides industry in
India has been growing at an annual rate of 20 per cent and
now constitutes approximately 30 per cent of the total crop
protection market.
While fighting fake pesticides is a complex problem, the
adoption of new generation authentication solutions can greatly help various stakeholders in tackling this growing menace.
The article highlights this core issue and details on its various types along with the reasons for the increase in counterfeit pesticides. The story also brings to light the authentication solutions that can be implemented in India to curb this menace to a great extent in the interest of farmers, industry and country.
Dear Readers,
Welcome to the 30th edition of The Authentication Times.
In The Authentication Times, we continue to raise the issue of counterfeiting, which impacts the consumers and society by large. Our current edition focusses on the issue of milk adulteration in India. Managing food safety standards across a global supply chain is complex and challenging. However, steps must be taken to ensure safe and secure shipping,
and distribution of food products that end up in consumer's hands. To protect the 25 million babies born every year in India, it is essential to protect baby milk powders and other nutritional products from the scourge of counterfeiting.
According to a survey conducted by the Food Safety and Standards Authority of India (FSSAI) in 2011, 68.4 of per cent milk served throughout the country was found adulterated, which itself defines the grim situation and calls for strict rules over fake and adulterated milk.
The cover story highlights this challenging issue in detail covering aspects such as its impact, consequences and how this menace can be tackled with the help of technology – adopting authentication, and track and trace solutions.
In this issue, you will also find a new section “Questions raised in the Indian Parliament related to counterfeiting and Answers by the Members of Parliament against these.” Other than this, you will also find our regular sections such as reports from FICCI CASCADE, News Bytes, Counterfeit Seizure Report and Events in this issue.
We thank you for your continual support and look forward to receive your feedback.
Regards,
Editor - The Authentication Times
Illicit tobacco trade and tobacco tax evasion are problems that costs governments and manufacturers dearly in terms of lost revenue and damage to brand reputation. Further, the high tax policies on tobacco products make them a lucrative target for counterfeiters. In this article, we
will find out how hologram, an anti-counterfeiting technology, could prove to be an important tool
in tackling this problem.
Dear Reader,
Welcome to the 26th edition of our newsletter “The Authentication Times”.
Various Government authorities across the globe consider drug counterfeiting to be a major issue and coming with various policy measures in order to fight against this menace. The Indian Government has also mandated for all pharmaceutical firms to build track and trace capability for exports using barcode technology at three levels of packaging: primary, secondary and tertiary. Although the Government is doing work at the policy level, there is a clear need to involve all stakeholders in the efforts in fighting this menace.
The mandates to serialize all pharmaceutical products is a challenge for pharmaceutical manufacturers. Keeping in view, we decided to cover a story highlighting “Overview on Pharmaceutical Serialisation”. The issue also covers our series of article on “Authentication Technologies”. The current article will give an overview of key available anti-counterfeiting technologies to be followed by anti-tamper technology and track and trace technologies. Apart from this the issue also covers the industry updates including news, counterfeit seizure report, appointment, global patents and upcoming events.
Do send us your feedback/critics at info@aspaglobal.com.
With Best Regards,
C S Jeena
Editor
Globally many countries are shifting or opted polymer banknotes in place of paper banknotes. The article analyses the brief history, pros and cons of polymer banknotes.
Dear Reader,
Welcome to the first issue of the year and wish you a Happy 2016!
We hope this year is filled with joyful learning, abundant opportunity, and success in all that you choose to do.
Coming to The Authentication Times, the current edition focuses on the issue of counterfeit pesticides that are being rampantly used in India. Agriculture industry, which is the backbone of our Indian economy, is facing multiple threats from the growth of these counterfeit pesticides. Though the problem is not a new one and exists since last 35 years, however, the situation has become worse in the last five years. The counterfeit pesticides industry in India is growing at an annual rate of 20 per cent. If not immediately addressed, it
can reach up to 40 per cent (approximately) share by value in the pesticides industry by 2019.
Our cover story highlights this core issue and details on its various types along with the reasons for the increase in counterfeit pesticides.
The story also brings to light the authentication solutions that can be implemented in India to curb this menace to a great extent in the interest of farmers, industry and country.
In this issue, you will also find an interesting interview with Pantec GS Systems and Arkansas Tobacco Control, various industry updates, news bytes, counterfeit seizure report and global patents.
We thank you for your continual support and look forward to receive your feedback.
Sincerely,
Chander S Jeena
Editor
Presentation made at Tax Stamp Forum, Dubai on 16 September 2014 by Mr. Manoj Kochar, President, Authentication Solution Providers' Association. It analyzes how various authentication solutions can help curb illegal liquor trade and help the government earn more revenues. Examples cited include Madhya Pradesh, Tamil Nadu and Uttar Pradesh.
The liquor industry is a major source of excise revenue for all States in India. In fact, it is the second largest
revenue contributor for many States after sales tax. More than two decade ago, Tamilnadu Government
took the revolutionary step and introduce fi rst holographic excise adhesive label (HEAL) in India. The step
taken by Tamilnadu was appreciated and further adopted by many other States in India. Today, more
than 17 States excise department are using HEAL. This has not only minimized the hooch tragedies
and duplication, but has also substantially increased the excise revenue collection in States. This article
highlights the role of HEAL as an effective anti-counterfeiting solution in securing tax revenue, protecting
consumer and curbing illicit liquor trade.
Holograms are used globally by excise department to increase government revenue as well as to stop tax evasion. As of 2007, more than 27 countries (46% of total using tax stamp) are using on their liquor stamps. The presentation explained importance of holographic excise adhesive label (HEAL) and statistics that its use has resulted in an impressive increase in revenue whenever it has been used.
Business Situation
Tobacco tax evasion is a problem that costs federal and state governments billions per year. For example, the state of Washington loses an estimated $200 million per year due to tobacco tax fraud. Governments lose money in two ways: the first occurs when cigarettes are smuggled from lower tax to higher tax states. The second is from cigarettes stamped with counterfeit tax stamps. When tax revenues are stolen, they don’t go to their intended sources of funding tax relief programs, healthcare and infrastructure. In some cases, these stolen revenues have been shown to fund criminal and terrorist activities. As a result, governments lose millions in tax revenue and the security of their citizens is threatened.
Like currency, traditional tax stamps carry inherent value and need to be treated as such. This creates challenges in securing the manufacturing, distribution, and application of the stamps. Tracking of cigarette packs throughout their distribution would enable tax authorities to ensure proper tax collection, but currently taxes on cigarettes are collected via a stamp system that has very limited track and trace capabilities. In order to manage tobacco tax revenue collection efficiently and securely, it is necessary to significantly improve tax stamp security features and transition stamp distribution from a centralized print and distribute model to a secure print-on-demand model.
Anti Counterfeiting - Playing Roulette Or Chess?Ruth Thomson
An overview of the counterfeiting problem, the trends and the stakeholders. An insight into how to design an effective approach and the role of technology in the solution.
Bilcare Technologies is a research and technology leader focused on creating next-generation anti-counterfeiting, security and brand protection solutions for a broad range of industry sectors.
Bilcare Technologies is a business unit of Bilcare Ltd. - an innovation-led solutions provider that partners with the global pharmaceutical and healthcare industry to improve patient healthcare outcomes.
The presentation is from Authentication Solution Providers’ Association (ASPA) & Indian Printing Packaging and Allied Machinery Manufacturers Association (IPAMA) recent workshop organized during PRINTPACK 2019. It covers recent initiatives & latest trends in physical authentication technologies. ASPA’s latest project “Counterfeit News Repository”, a unique repository providing a record of incidents of counterfeiting, theft and illegal diversion of products worldwide. Examples of innovation in Anti-Counterfeiting industry including irreversible holographic effect for medicine carton, NFC chip based Tamper Evident Label for medical Auto-injectors, high security holographic cap seal with digital authentication, use of special film on spot registration feature for carton packaging etc. etc and steps in developing Anti-counterfeiting strategy. The key learning from presentation is to integrate physical anti-counterfeiting technologies with traceability technologies to make customized authentication solutions. The future will be Current Labelling integration with innovative authentication solutions will lead to Smart Packaging Solutions which will ensure efficient supply chain, revenue enhancement , consumer safety and loyalty towards products, brands and authorities.
BSecured is an online platform to generate and embed a unique BlockChain Secured QR code (BSQR) on products and documents to validate originality and genuinity.
Micro Focus GPAS is an innovative and comprehensive cloud-based Brand Protection, Track & Trace and Consumer Engagement Service that drives business value by addressing problems and challenges that organizations face when operating within global markets.
Since its creation in 2009, GPAS has be-come the global standard to solving counterfeit, grey market and supply chain challenges surrounding the manufacture and distribution of finished goods. GPAS protects some of the world’s largest and innovative brands across a variety of market sectors including Food & Beverage, FMCG, Pharmaceutical, Nutraceutical, Apparel and Electronics to name a few.
Counterfeiting activities are increasing menace both in terms of value and magnitude. The Government must look into
the issue of counterfeit and pirated products’ trade and treat it on a national priority which will help in eliminating this threat.
“For the larger interest of the nation and to ensure that this issue gets the desired attention.
Biometric System and Recognition Authentication and Security Issuesijtsrd
In recent days Biometric has become the most popular technique used. The purpose of biometric systems is used to achieve high security, authentication and many more. Through this scheme or technique it ensures that the services are accessed only by the authorized persons. This system works effectively and is user friendly. Biometric systems are progressively exchanging the ongoing password and authentication token based system. Authentication and Security recognition are the two most essential characteristic to consider in scheming a biometric system. In this paper, a broad review is presented to illuminate on the latest technologies in the study of fingerprint based biometric covering these two characteristic with a view to improving system security and authentication recognition. Shweta Naik ""Biometric System and Recognition: Authentication and Security Issues"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30195.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-security/30195/biometric-system-and-recognition-authentication-and-security-issues/shweta-naik
facial recognition technology is a cutting-edge innovation that has already made significant strides in various industries. Its potential to enhance security, improve efficiency, and provide valuable insights makes it a key player in the future of technology.
Innovation in the Anti-counterfeit Technology Solution MarketAlexander WEIR
ÉGIDE - one of the most promising new technologies that I have come across in the fight against counterfeits, delivering to customers and brand owners the means to verify product authenticity through a smart phone app...
The dire need of competent cybersecurity solution providers has made us look for, “The 10 Most Trusted Cyber Security Solution Providers, 2018.” On our cover page we have DERMALOG Identification Systems GmbH, which is an expanding company based in Hamburg with additional offices in Malaysia and Singapore, as a result of strong growth in the region.
Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply chain. These items are often identical to the genuine products; however the contracting company is robbed of its rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is not able to undertake the necessary safety tests on the overrun products.
Our solution is based on over five years of intensive research and development. Our research has allowed us to deploy technology to uniquely identify items of value.
Securing chemical production and digital networksSleepros
Data theft and manipulation is not a matter of inconvenience in the pharmaceutical industry, it can be a matter of life and death. OTORIO works with you to protect the integrity and availability of your products, so you can keep your employees and your consumers safe.
BSecured is an online platform to generate and embed a unique BlockChain Secured QR code (BSQR) on products and documents to validate originality and genuinity.
BSecured has developed a unique solution to secure ID Cards using BlockChain Technology, in this process it embeds a BlockChain secured QR code on IDs with a unique hash inside it, hash holds a string of information like cardholder’s name, ID number, photo, and expiration date etc. Verifier can scan the QR Code on ID card to verify the authenticity of ID Card.
BSecured works on three major steps Upload - Generate - Verify
It takes few minutes to learn and understand BSecured workflow built on the most advanced technology of trust – Blockchain, smooth workflow for unbreakable results.
BSecured is an online platform to generate and embed a unique BlockChain Secured QR code (BSQR) on products and documents to validate originality and genuinity.
BSecured has developed a unique solution to secure ID Cards using BlockChain Technology, in this process it embeds a BlockChain secured QR code on IDs with a unique hash inside it, hash holds a string of information like cardholder’s name, ID number, photo, and expiration date etc. Verifier can scan the QR Code on ID card to verify the authenticity of ID Card.
Similar to Authentication Technologies An Overview (20)
The last few years have seen a shift by state excise departments towards using tax stamps, not only as tax collection instruments, but also as tools for authentication. With this in mind, many states have upgraded their stamps by combining the latest authentication features with digital technologies.
COVID-19 is affecting people in all corners of the world as we know it. At this critical point, concerns are increasing among the public including the news of getting fake Personal Protection Equipment's, including sanitizers & masks. Witnessing a scarcity of sanitizers and face masks since the COVID-19
outbreak, Counterfeiters and profiteers have offered the bogus public treatments and unfounded advice. These are ideal conditions for criminals to capitalize on people's fears by advertising falsified therapies and vaccines and spreading rumors of potential cures. In this challenging situation, being
vigilant is the most important thing.
Excise taxes on alcohol & other sin products have long been a dependable and significant revenue source for Policy planners in India. Maximization of Government Revenue to generate resources that can be utilized to finance Departmental projects is always accorded a high priority on the agenda of the policymakers. However, when it comes to framing a policy such as Excise Policy, the Excise & Taxation Department has to give due weight to the health and well-being of the citizens of the State. An ideal Excise Policy, therefore, not only has to strike a delicate balance between the twin objectives of preventing dominance of liquor mafia or social degeneration on the one hand and securing an optimum revenue for the Government on the other, but also has to address the concerns of all the four key stakeholders i.e. the Government, the Manufacturers, the Licensees and most important of all, the Consumer. While there are various other factors that also play a significant role in
achieving the State Excise Objective, the article explores the role of Tax Stamps & Traceability Technology Role in State Excise Policy in the current scenario.
We often read, hear or see news related to counterfeit products, counterfeiting and counterfeiters. From knock-off tires to spurious brakes, counterfeit toys to fake medicines, duplicate luxury handbags to phony fragrances, the list seems endless. Counterfeit products pose a risk to consumers, manufacturers, government and other stakeholders. The figures related to counterfeiting on the national and global level have raised an alarm which should not be left unnoticed. The widespread sale of fake goods on the e-commerce portals has further deteriorated the situation. Today, it has become quite challenging for the consumer, manufacturer and authorities to tackle the problem of counterfeiting.
The use of serialization as an anti-counterfeiting measure has expanded across the world, and across sectors. This is especially true in the pharmaceutical sector, where more than 75% of the world’s pharmaceutical supply will be under serialization regulations by 2020. The United States, the European Union, Argentina, Turkey, Saudi Arabia, India and Russia, amongst others, already have or are in the process of implementing regulations. Several other countries are evaluating how best to protect their patients against the scourge of counterfeiting, one that takes hundreds of thousands of lives a year and causes billions of dollars of losses to industry (one estimate by the World Economic Forum put it at $200 bn annually ). Even without regulations, leading companies around the world are adopting serialization as a tool to protect their brands and secure their supply chains. Whether you are a brand owner or a regulator, taking those first steps in the serialization journey can be daunting. The article is an attempt to break it down into five steps view as being essential for success.
The article review the Cannabis in India & Canada. While India is fighting with the illicit Cannabis problem, Canada is expecting to generate $8 billion revenue with legalizing it. Recently, International Narcotics Control Board (INCB) released annual report, raises concerns over record levels of illicit cannabis herbs seized in India. While a debate must be is needed on socio-economic benefits of legalizing cannabis, it is known fact the country needs greater investments in the healthcare sector to enable better treatment and rehabilitation of drug users. The time is the best answer, is legalizing Cannabis benefit the socio-economic is the future ?
Integration of anti-counterfeiting solutions, physical with digital technologies play a vital role in staying ahead of the counterfeiters. While the trade of counterfeit has dramatically increased, tackling counterfeits is not impossible. For that we need to create zero tolerance position towards illegal activities (strict policy with our business partners and expect their full support in fighting any kind of illegal activities). There is a need to implemented a global strategy to efficiently combat production, trade and use of counterfeit and illegal products including awareness, training and development of anti-counterfeiting solutions.
Wlook like today, compared to what it used to look like… and
what it may look like tomorrow? What are the drivers that have shaped the modern tax stamp and what are the individual parts of that stamp that make up the whole?
These are the questions addressed in this special feature, devoted to the evolution in the design, as well as in the
security features and functionality of tax stamps – since all these elements are inextricably linked.
Holograms, optically variable devices (OVDs), diffractive optically variable devices (DOVDs), diffractive foil features
(DFF) or diffractive optically variable image devices (DOVIDs) are the variety of terms used to describe the security
features that have become one of the most common, and successful, level 1 (overt) features on banknotes today.
To most lay people they are collectively called holograms.
This article tracks some of the important milestones in the evolution of DOVIDs on banknotes to the present day.
Banknote design management should invest in user needs. When cash is no longer an attractive payment instrument,
banknotes will disappear. User needs will lead to other design requirements as applied today. Furthermore, banknote
designers should focus first of all on the User Interface Functions, instead of spending their creativity to User
Experience Functions like connecting to a main image.
Combating illicit tobacco trade is an issue that is being seriously
addressed by not only those in the tobacco industry but also governments around world and international bodies such
as World Health Organisation (WHO) and Interpol. According to an estimate by WHO, eliminating the illicit trade in tobacco would generate an annual tax of US $ 31 billions for governments. In Indian scenario, as per media sources, illegal Cigarette trade comprising international smuggled and locally manufactured tax-evaded cigarettes accounts for as much as 1/4th of the Cigarette Industry in India. According to studies by FICCI CASCADE (Committee against Smuggling and Destroying Economy), the grey market in the tobacco industry has grown significantly since 2010 and has grown from 15.7 percent in 2010 to 20.2 percent in 2012 - an increase of 28.7 percent. Government of India alone bears the losses
INR 13 billion per annum because of illicit tobacco trade. Based on the current tax rates on cigarettes, it is estimated that the
Government loses Rs. 13,000 crores per annum because of illegal cigarette trade.Taking a positive step in curbing illicit
tobacco trade, on 2-May-2018, The Union Cabinet Chaired by Prime Minister Shri Narendra Modi has given approval to
accede to the Protocol under World Health O rg a n i z a t i o n ( W H O ) F r a m e w o r k Convention on tobacco control to eliminate illicit trade in tobacco products. This is a welcome step and in view of this development, the article review the issue and solutions for combating it.
In a significant development for global fisheries, blockchain technology is now being used to improve tuna traceability to help stop illegal and sustainable fishing practices in the Pacific Islands tuna industry. The World Wildlife Fund (WWF) in Australia, Fiji and New Zealand, in partnership with US based
tech innovator ConsenSys, tech implementer TraSeable and tuna fishing and processing company Sea Quest Fiji Ltd, has
just launched a pilot project in the Pacific Islands tuna industry that will use blockchain technology to track the journey
of tuna from “bait to plate”. The aim is to help stop illegal, unreported and unregulated fishing and human rights
abuses in the tuna industry.
Drug counterfeiting is a significant public health threat and is rapidly increasing with dozens of new cases being reported throughout the world every day. In the past few months, various
news has been reported in media referring the ongoing activities of counterfeiters making fake and sub-standard medicines in
different parts of India. The article is on need of anti-counterfeit secured packaging solutions like tamper evident and serialization.
The article provide an comparative analysis of evolution of basic and additional security features in ordinary passports, during the last two decades from 1996 to 2016, based on the information held in the Keesing Reference database.
Astrid Mitchell has a 30-year commercial career with companies within the banknote, authentication and holographic industries, including De La Rue, Applied Optical Technologies and
Bundesdruckerei. She joined the Reconnaissance Board in
2002 and, in addition to her role as Managing Director, is primarily responsible for the company’s activities in currency (including Currency News, The Coin Conference and various directories and reports through Reconnaissance’s joint venture Currency Publications Ltd.). The article provides an overview of trends and development in currency in 2017.
Managing food safety standards across a global supply chain is complex and challenging. However, steps must be taken
to ensure safe and secure shipping and distribution of food products that end up in consumer's hands. To protect the 25 million babies born every year in India, it is essential to protect baby milk powders and other nutritional products from the scourge of counterfeiting. This can be achieved by securing supply chains through authentication, track-and-trace and other digital solutions, as well as by applying tamper-proof or tamper-evident physical solutions onto packaging, such as security labels and holograms. Government has a big role to play in mandating such measures in the interest of public health and safety while also generating awareness of the
issue. Only by all stakeholders - industry, government, solution providers - coming together can we protect the health of the
most vulnerable members of our society.”
In Rajasthan few departments and brand owners are adopting / using authentication solutions, however, there is the need to increase the awareness. For example, Rajasthan State Food & Civil Supplies Corporation is applying security hologram on daily household food items like Tea, Salt, Pulses, Spices, Atta etc. to secure life and health of people. Similar kind of solutions can easily be implemented to fight drug counterfeiting by putting high security hologram with 2D and alphanumeric codes on each individual blister pack, bottle or injectable vial.” The menace of counterfeit pharmaceutical drugs in Rajasthan can be easily addressed by the State Government and consumers, with the adoption of these consumer-friendly authentication solutions.
More from Authentication Solution Providers' Association (ASPA) (17)
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Authentication Technologies An Overview
1. www.aspaglobal.com
12
The Authentication Times
Inaugural Issue
Authentication:
With the increase in
counterfeiting, Authentication
technologies play an important
role in supporting brand
strategies, helping to reduce
the risk of fraud by deterring
criminals and enabling
stakeholders to identify and track
genuine product with fake one.
Today, there are various number
of authentication technologies
available in the market, although
all these technologies are applied
in the three main areas of
i) Anti-Counterfeiting
ii) Anti-Tampering, and
iii) Track and Trace
Anti-Counterfeiting:
The common feature of anti-
counterfeiting technologies is
that they are edrtremely difficult
tobecounterfeited.Consequently,
they help in identifying a
genuine product. Based on the
authentication requirements,
such technologies may consist
of overt, covert and forensic
features, or a mix thereof.
Anti-Tampering:
Such solutions are found more
in the food and pharmaceutical
industry where there is a need
to protect a product from
adulteration or replacement. An
intact anti-tampering feature is
the consumers’ assurance that
the contents are genuine and not
tampered or adulterated.
Track and Trace:
Track and trace technologies use
mass serialization to provide a
unique identity to each SKU. The
IT technology then allows to keep
a watch on each SKU through
customised software that allow
an authorised user to track the
movement of this SKU across the
entire supply chain. Depending
upon the authorization level,
each user may also be able to
access additional information
pertaining to the product such as
manufacturing date and factory,
expiry date, the market such SKU
is meant for etc.
All these technologies can be
categorised as either overt,
covert, forensic or digital.
Overt, Covert, Forensic or
Digital
Overt: Overt technologies are
authentication devices built into
labels, documents and packaging
which are visible to the user and
show dynamic visual effects.
Their main advantage is the
fast and easy, on the spot,
visual authentication where no
Overview Authentication
Technologies
All about Authentication
With the availability of various authentication solutions, companies and Government authorities are facing
problem in selection of a specific authentication solution as the adoption of any given solution is a complex
question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are
divergent views on which technologies should be adopted and the timing for their adoption. While these
solutions can sometimes add to the problem, the right selection, usage & implementation of authentication
solutions helps companies and authorities to keep them one step ahead of counterfeiting. For the reason
The Authentication Times team decided to start a series of article on Authentication Technoligies. This is
the first article of this series giving an overview of authentication technologies to the reader, and this will
be followed by detailed articles on anti-counterfeiting, anti-tampering and tracking and tracing.
2. www.aspaglobal.com
13
The Authentication Times
Inaugural Issue
additional devices are needed.
Overt features are expected to
fulfil three main criteria;
- Communicate with the
verifier
- Be easy to identify
- Be hard to copy and imitate
Physical secure solutions offering
overt features include fine-
line design, security guilloches,
holograms, optically variable
devices (OVDs), watermarks,
colour-shift and thermochromic
inks, threads, foils and laminates,
embossable and laser markable
films and security papers.
Overt features can be made
more secure by combining them
with covert, forensic and digital
features. As Overt can be used for
identification and verification by
consumer, Covert (Verification by
a predetermined device or a tool)
can be used by manufacturer
Microtext/
Nanotext/
Guilloche
Microtext/
Nanotext/
Guilloche
Holograms /
Zero diffraction
Devices/Floating/
Sinking image
films/color
shifting films/
retroreflective
films
Holograms /
Zero diffraction
Devices/Floating/
Sinking image
films/color
shifting films/
retroreflective
films
Intaglio ink/
Fluorescent ink/
infrared ink/
thermochromic /
optically variable
ink /pearlescent
varnishes/tagged
inks
Intaglio ink/
Fluorescent ink/
infrared ink/
thermochromic /
optically variable
ink /pearlescent
varnishes/tagged
inks
Fig: Diagram showing the primarily used authentication technologies
Authentication TechnologiesAuthentication Technologies
Anti-counterfeitingAnti-counterfeiting TrackingTracking
Tamper Evident
Labels
Tamper Evident
Labels
Tear Tapes/
Delaminating
Films/Patterned
Destruct Films /
Labels
Tear Tapes/
Delaminating
Films/Patterned
Destruct Films /
Labels
Security
Printing
Security
Printing
Optical Security
Technologies
Optical Security
Technologies
Chemical and
molecular
taggants and
nanotechnologies
Chemical and
molecular
taggants and
nanotechnologies
Tamper
Evident Closures
Tamper
Evident Closures
Shrink Sleeves or
Films/ Induction
Seals
Shrink Sleeves or
Films/ Induction
Seals
Security inks and
coatings
Security inks and
coatings
Substrates-
Security Papers
Substrates-
Security Papers
Anti-tamperAnti-tamper
Track & Trace
Systems
Track & Trace
Systems
EAS Tag &
Systems
EAS Tag &
Systems
All about Authentication
3. www.aspaglobal.com
14
The Authentication Times
Inaugural Issue
or their channel partner for an
advanced level of authentication
and verification. The third level is
highly sophisticated and can be
used by forensic experts and can
be useful to law enforcement and
for evidence in case of litigation.
Mainly classified as overt
technologies holograms
produced in high security
environment provide covert as
well as forensic features.
Covert: Covert technologies
are not instantly recognisable.
They require a special reader
or detector to be able to verify
their presence and validity, and
people using covert technologies
will normally require some kind
of training. Covert technologies
include ultraviolet and infrared
inks, micro text, unique synthetic
tagging etc.
Forensic: Forensic technologies,
being covert, are not readily
recognisable and require special
toolsfordetectionandvalidation.
Whereas covert technologies can
be detected and validated in the
field, forensic technologies must
often be taken to a laboratory
with specialised equipment.
Digital: Digital technologies may
be either overt or covert, but all
require an electronic means for
detection and validation. Digital
technologies are most associated
with RFID tags or with serialised
numbers that can be compared
to a remote database.
Conclusion
In today’s world when brand
are under attack in forms of
counterfeiting, tampering,
pilfering, Authentication
technologies play an important
role in protecting brand
reputation, value, market share
and above all trust of customers.
Counterfeiters target well known
brands for illegal profit, which is
further used to finance terrorist
organization. Therefore, a
product without authentication
technologies represents a
significant potential risk to
society at large. There is no
single solution to every problem,
hence, a proper brand protection
strategy involve combination
of technologies with proper
enforcement. It is pertinent
to mention here ISO:12931
titled “Performance criteria for
authentication solutions used to
combatcounterfeitingofmaterial
goods”. This standard lays down
some of the best practices to help
brand owners to strategise and
fight counterfeiting effectively.
We believe that this tool should
be adopted by all brand owners
to eliminate counterfeit.
The next article will focus on
anti-counterfeiting technologies
in more details.
Diagram: Overt feature (security hologram strip) applied on pharmaceutical
product label
All about Authentication