Counterfeiting, smuggling, diversion, and infringement — collectively known as illicit trade, — continues to be a growing global problem for businesses and consumers. With the increasing volume of counterfeit goods trafficked across the globe and seeping into multiple supply chains, a well-strategized brand protection program is more essential than ever to shield what matters most to businesses – customers, brand identity, reputation, and revenue.
Overt Security:
Visible security features are valuable in product authentication. Visible to the naked eye or felt via touch, this category includes holograms, color-shifting inks, and security threads that are difficult to reproduce or copy. Other examples include microtext, thermographic ink, and even micro-optics (the blue lenticular strip found on the current U.S. $100 bill).
Although visible security features are a starting point, counterfeiters are creative. Even if a visible authentication feature is hard to recreate perfectly, a counterfeiter with the right tools and illegal intent only needs to copy it closely enough to confuse a consumer who just gives a package a quick glance. Additional measures create layers of security – making it more difficult, even impossible in some cases, to copy or duplicate security features.
Overt Security Tactics Include:
- Optically variable inks
- Color-shifting inks
- Pearlescent inks
- Gold and silver inks
- Thermographic ink
- Microtext
- Anti-tampering technologies (tamper-evident closures and labels)
- Optical security technologies (holographic seals and labels)
Covert Security:
High-security covert features can be embedded into labels, closure seals, or other features of product packaging. Although these covert markers are invisible to the naked eye, they can be found and measured with specialized handheld instruments using proprietary optics and detection algorithms for rapid, secure field authentication. Additional forensic layers of security can be embedded into materials and confirmed through more extensive laboratory analysis for evidence to further prosecute profiteers.
Covert Security Tactics include:
- Heat-activated inks
- Light-activated inks
- Fugitive inks
- Inks or materials with specialized fluorescing taggants
- Ultraviolet activated inks
- Machine-readable Electro ink
Semi-Covert Security:
As the name suggests, these are features that might not be noticed until someone closely examines the product or package.
- Forensic Security: Forensic analysis involves laboratory testing of products via an embedded component or molecule added to a substrate or solution to determine authenticity. Unique product elements are examined so brand owners can generate compelling evidence of counterfeiting for legal proceedings. However, the ability to trace a product back to its origin is not supported unless a unique hidden tracing element is added to the product.
Case Study: Pharmaceuticals
The Challenge:
Counterfeit copies of a major pharmaceutical brand were turning up in the U.S. market, but the brand had no security measures in place to allow patients or inspectors to tell real products from the fake. Consequently, $1 billion worth of product, already in the distribution pipeline, could not be sold until a method of allowing patients and retailers to verify that the medicine is authentic could be implemented.
The Solution:
The customer’s product was repackaged to include a variety of authentication features that could be identified by patients and inspectors, both in the field and in the laboratory. These included:
- Overt, color-shifting inks: Readily distinguishable by patients
- Covert, machine-readable inks: Detected in the field by inspection staff with appropriate readers
- Forensic markers: Only detected under laboratory analysis
The Outcome:
The Authentix solution to the customer’s counterfeiting problem provided a secure means of instantly differentiating authentic from counterfeit medicines. The benefits were immediate and significant:
- $1 billion worth of product: Frozen within the supply chain was released for sale
- The expense of a full product recall: Was averted
- The customer: Was able to mitigate the risk of potential lawsuits
- Most importantly, confidence in the brand: Was restored among physicians, pharmacists, and patients
Learn more: https://authentix.com/protecting-1-billion-pipeline-of-medicine-case-study/
- Chemical and Physical Markers: These can be hidden from consumers and counterfeiters and can only be seen with specific detectors that are calibrated to a specific wavelength to verify authenticity.
- Tamper Evident Packaging: These are labels, stickers, or seals that, when opened or tampered with, provide immediate evidence that the product has been compromised.
- Serialization: In the serialization process, a company applies individual unique codes and/or signatures at the point of manufacture (giving each product an identifiable attribute) and defines scanning locations where retrieval and association of the unit can be linked to the scanning transaction.These transactions uniquely capture, track, and store data from those markings in a managed database that allows authorized personnel to monitor the product journey by unit or larger groups. Most are familiar with this process as it applies to shipping a package overnight where it is tracked online until it reaches its destination.
- Digital QR Codes: Products can be scanned and authenticated without the need for an app, using a smartphone camera that can then further engage consumers by directing them to other web pages where they can register their warranty, learn more about the product, and even suggest other complementary products. As the product travels through the supply chain, the unique number or symbol can be collected in the database and added to its history.This information is available to a credentialed user via a mobile app or localized database. In a track and trace system, for instance, the information flow can be bi-directional, so the collection of the symbol, the scanning event, and the unique call to the database can be recorded and appended to the product record for verification purposes.
- Online Brand Protection: The rise in online sales has been unfortunately accompanied by the rise in counterfeiting on online marketplaces, social media platforms, and websites. As mentioned earlier in this guide, online brand protection tools include keyword monitoring, logo detection, image matching, and the use of advanced brand protection technology like Artificial Intelligence (AI) and Machine Learning. Online brand protection allows your company to easily scan web pages and marketplaces, social media platforms, e-commerce apps, messaging apps like WeChat, payment sites, and the dark web for infringing content and listings and get them taken down.
Download the Complete Brand Protection Guide
Complete this form for access to the pdf version of the guide.