Tag: counterfeit

Elevating Your Brand Protection Strategy with Multilayered Security Solutions

     |     

By: Jeff Conroy, Chief Scientist, Authentix

Many companies are thinking more broadly about how to implement coordinated anti-counterfeiting, anti-diversion strategies across their brands and throughout different regions of the world. Just as tamper-evident seals on bottles of pills and liquid formulations became more common due to a tampering scare in the 1980s, attitudes toward anti-counterfeiting technologies are beginning to evolve.

Once viewing such measures narrowly as an “extra feature” that only “added cost” to the bottom line, brand owners are beginning to realize the importance of protecting the integrity of their brands and the most important part of the equation: protecting the safety of consumers. As serialization technologies continue to evolve, the tracking of individual units through the supply chain could enable very secure and traceable evidence of authentic products being supplied by manufacturers and distributors to end users.

Different Features, Different Purpose

Anti-counterfeiting features that can authenticate products are both overt and covert, and they can be applied in numerous ways: on labels, onto closure seals, on cartons where containers of products are stored, into plastic parts of individual packaging, and even onto metal and glass components of packaging.

The different types of features all serve a different purpose, from enabling end users to quickly identify a branded product as genuine, to covert markings that enable a manufacturer or inspector to identify the source of diversion or other illicit activity. When combined with the careful design and production quality controls used in authentic product manufacturing, these features raise the bar of complexity for counterfeiters and make the product a less attractive target.

With that said, it’s worth considering the value of individual security features versus a multilayered approach.

Overt security features: Visible security features serve a valuable purpose in the authentication stack. They offer a way for individuals to inspect packaging without any specialized tools, and the specialized color-shifting inks (similar to those used on currency) are often difficult to reproduce using scanners or reprographic methods. There are other types of optically variable features as well, including holograms, micro-optics (like the blue stripe found on the current US $100 bill), and reflective features.

Visible security features are a starting point, but counterfeiters are extremely creative and clever. Even if a visible authentication feature is hard to recreate perfectly, a counterfeiter only needs to copy it closely enough to confuse a consumer who just gives a package a quick glance. Additional features create layers of security.

Covert security features: High security covert features can be embedded into labels, closure seals, or other features of product packaging. Although such markers are invisible to the naked eye, they can be detected using specialized handheld surface spectrophotometers. Field instruments use proprietary excitation and detection optics and detection algorithms for rapid, secure field authentication. Additional forensic layers of security are also embedded into the materials and can be confirmed through more extensive laboratory analysis. This additional layer of security proves very difficult for the counterfeiter, but easily verified by field inspectors.

Serialization: In the serialization process, a company marks individual units at the point of manufacture (giving each a unique serial number) and implements stations to read those markings, capture the tracking data, and drop that information into a managed database that allows authorized personnel to monitor where products go after they leave the manufacturing facility. You’re probably most familiar with this process as it applies to shipping a package overnight, when you can track it on the Internet until it reaches its destination.

An effective anti-counterfeiting solution contains multiple, layered components

As a brand owner, it’s good to have options. However, the counterfeiter also has options. Fortunately, technology continues to evolve to help you protect your end users. Today’s reality is that one level of security isn’t enough.

Recently a number of technologies have become available that offer the benefit of not having to add any additional features to the packaging, but the imaging requirements on the production lines can be quite demanding and difficult to implement at speed. Once captured, the identification of the package can take place with conventional cameras, allowing widespread authentication and tracking by inspectors, retailers, or even consumers.

Any combination of covert or overt features or serialization enhance your anti-counterfeiting, anti-diversion strategies. Click here to learn more about brand protection. You can also contact Authentix at info@authentix.com.

Inspector Led Authentication’s Contribution to Brand Protection Programs

     |     

By: Andrzej Hornostaj, VP Brand Solutions, Authentix

Identification of an at-risk product and implementing an authentication solution is not the end of the story, it is just the beginning. Constant inspection of the product in the supply chain and marketplace is required to ensure useful actionable insights is generated to minimize counterfeit and diversion practices while protecting your brand and bottom line.

Let’s Begin with Inspection Design

Inspection design is determined by the objectives of the inspection. Let’s consider two relevant approaches. Will the inspection be reactive to a specific counterfeit event, or proactive determining the scale of counterfeiting and generating actionable insights?

Ideally, inspections, like any investigation, should follow a holistic approach involving several stakeholder teams including product, brand protection, investigative, and legal. Each team has its own requirements for the actionable insights generated from an inspection. Some critical stakeholder questions may be as follows:

Product: What’s the scale and location of the counterfeiting problem for a product?

Brand protection: What’s the level of sophistication of the counterfeit operation (production and logistics)? Are security features being copied? Are packaging design changes required?

Investigative: Can the right data be gathered to support investigations into the counterfeit’s supply chain and to identify the manufacturing source? Is the evidence strong enough that it can be passed on to legal and law enforcement to perform raids and prosecutions?

Who will conduct the inspections?

The boots on the ground can either be members of the brand owner’s staff or third-party inspection agencies working on their behalf. Ideally, to infer useful insights from an inspection, the more data collected the better. This need pushes the brand toward engaging a third-party that can provide the coverage and inspector numbers to achieve data volume.

As always, inspector safety is paramount and consideration should be taken as to whether the inspector needs to be accompanied by law enforcement representatives.

Where to direct initial inspection efforts?

I would suggest initial efforts begin at the retail level where products of interest are typically more accessible to covert inspection. This type of insight helps to determine the scale or extent of the problem and generates a suitable baseline against which further inspections and remediation efforts may be compared. As pharmaceuticals are usually not accessible at pharmacies, other locations in the supply chain should be the initial focus.

Once a baseline is established, then testing of supply chain integrity should be performed. Keep in mind, some obstacles may be encountered at this stage as it is not always possible to accurately track the route by which products reach the end user beyond the first tier distributors.

To assist access / auditing of stock at distributors, brands should ensure that cooperation agreements allow for inspections with short notification times. This will prevent suspect items from being removed from the audit location by a guilty party.

Which inspection tools should be used?

Having the right tools during an inspection to automatically capture the data required for each stakeholder is important and ensures that repeat testing is minimised. With the right type of reader paired with a smart device, inspectors are equipped to not only identify counterfeit products, but also capture location data and photographs of the packaging. This complete picture of the scale and sophistication of the counterfeit operation can form the basis of effective enforcement actions.

Click here to learn more about brand protection. You can also contact Authentix at info@authentix.com.

Back To Top