SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
www.homai.org6
The Holography Times
Vol. 7, Issue 20
Steps to identify
authentication solutions
to curb counterfeiting
By C S Jeena
Counterfeiting is menace for brand owners and Government authorities. In
over a decade the problem has expanded rapidly and is now not limited to
luxury goods and developed economies. There are any numbers of reports
available on internet discussing the loss to industry and people due to
counterfeiting.
Over the years, in order to prevent counterfeiting from plaguing their
business, brand owners started using authentication solutions. With
the availability of various authentication solutions, companies and
Government authorities are facing problem in selection of a specific
authentication solution as the adoption of any given solution is a complex
question involving issues, amongst others, of cost, compatibility, feasibility
and reliability, and there are divergent views on which technologies
should be adopted and the timing for their adoption. While these
solutions can sometimes add to the problem, the right selection, usage
& implementation of authentication solutions helps companies and
authorities to keep them one step ahead of counterfeiting.
In this article, we try to explain, “Steps to identify authentication solutions
to curb counterfeiting”.
Introduction:
The selection of an authentication1
solutions that protects a document
or product is a complex process
and necessitates review of a
number of factors regarding the
role and implementation of the
technology. Not all authentication
solutions and security features are
appropriate for all applications.
It is important to understand the
strengths and limitations inherent
to different technologies, as well as
between similar features supplied
by different manufacturers.
For example: Use of a security
watermark2
in a liquor tax stamp3
which is afϐixed to bottles. The
goal is to introduce a security
watermark as a new overt feature.
The liquor tax stamp has a far
smaller user population (mostly
inspectors) than currency, and
this smaller population is better
trained and equipped to examine
taxstampsthanthegeneralhuman
being. This could allow for the
use of a covert (or even forensic)
feature,butithasbeendetermined
by authorities that in this case the
risk of counterfeiting is not great
enough to invest in equipment or
tools and that an overt feature is
preferred for the sake of simplicity.
The authentication of a watermark
is performed by holding the
document up to alight. But in this
case the document is a tax stamp
secured to a glass bottle and it will
only be possible to authenticate
the feature if the bottle and its
contents are transparent (or at
least translucent). Many liquor
bottles and liquors are opaque and
would not allow sufϐicient light
transmission for authentication. It
isdeterminedthateventhoughthe
user population would otherwise
be capable of authenticating this
feature, the wide range of the
environment–from transparent
to opaque–makes the use of a
Footnotes:
1. Authentication - Authentication is the
process of conϔirming that a product,
document or even person is authentic. This
is usually achieved by looking for speciϔic
attributes such as product and document
features and security additions such as
holograms, optically variable devices, optical
variable inks etc.
2. Watermark: A design, symbol or pattern
imparted in paper by a raised wire design
on a roll (a dandy roll) as the wet paper is
being formed on a mesh as it passes through
the wet-end drainage process on a paper-
making machine.
3. Tax stamp – A revenue stamp, tax stamp
or ϔiscal stamp is a (usually) adhesive label
used to collect taxes or fees on documents,
tobacco, alcoholic drinks, drugs and and
many other things. Used by governments
as duty and excise stamps. These are high
security documents which contained security
features such as hologram.
Cover Story
www.homai.org 7
The Holography Times
Vol. 7, Issue 20
Cover Story
security watermark in a liquor tax
stamp unusable. This situation is
an example of how a widely used
and popular feature is rendered
ineffective by environmental
circumstances. In order to avoid
such circumstances, Organisation
can follow basic guidelines such
as;
1. Purpose of using
authentication solutions
The organisation needs to
understand the purpose of using
authentication solutions. As a ϐirst
step most organisations should
assess the risk to their brand such
as
i) Does the product have chances
of being counterfeited or is it
already being counterfeited;
ii) If it is being counterfeited, then
isitinformoftampering,pilfering,
duplication or, by misleading the
consumer by adopting a look-a-
like form of identiϐication;
iii) Is the risk of counterfeiting in
the form of digital or non-digital?
iv) What the impact such
solutions may have on the brand?
Once the purpose is clear, the
organisation can evaluate the
authentication solutions or
security feature based on various
parameters.
2. Selection of
authentication solutions
In today’s fast changing
technological world, scores of
different authentication solutions
are available in the market. These
days,twofamiliesofauthentication
solutions are in use, physical4
and
logical security5
features to secure
packaging materials and products,
(see ϐigure 1). In selecting them
various trade-offs are necessary
between security and usability. To
evaluate whether a given solution
will address a given security
problem, the security problem
must ϐirst be clearly deϐined.
2.1 Basic property
The solutions should be
extremely difϐicult to copy and
tamper evident6
;
2.2 Audience
The solutions should provide
easy identiϐication to user,
and facilitate product
authentication. Security features
of authentication solutions must
be tailored to the intended user
population, the group of people
responsible for authenticating
the feature. The user population
could include the entire public-
4. Physical Security: Physical security features
are substances or products which are
introduced into, or attached to packaging
materials and / or products. The presence
of these security substances is veriϔied to
authenticate the protected item. As the
manufacturing process of security products
is conϔidential and highly secure and its
availability is strictly limited, it is very
difϔicult to counterfeit products secured in
this way.
5. Logical Security: Features are based
on encryption technologies, allowing
the integration of hidden data into
images / artworks (steganography /
digital watermarks) and supporting the
authentication of the product. It is also
possible to register the surface structure of
packaging material which is unique. With
this data, an individual “ϔingerprint” of each
individual packaging item can be made.
6. Tamper evident - Tamper-evident describes
a device or process that makes unauthorized
access to the protected object easily detected.
Seals, markings or other techniques may be
tamper indicating.
Figure 1: Overview of security technologies
Authentication
Solutions Serialisation
Security Technologies
Printed
PhysicalLogical
Cryptographic
Identiϐication
Structure
Analysis
Track and
Trace
Inks / Taggants OVDs and
Hologram
www.homai.org8
The Holography Times
Vol. 7, Issue 20
Cover Story
for example, if the product being
secured is currency, or if it is a
bottle of a widely sold over-the-
counter medication. The user
population might be a smaller
group in the case of a more
specialized product. If the user
population is large or has limited
interest in authenticating the
feature, it may be impractical
to supply complicated security
features, whereas if the user
population is small and
specialized, security features of
any complexity can be selected.
For example, in a survey by Dutch
National Bank to measure the
public understanding of security
features, it was revealed that out
of seven selected features, the
Hologram came out second with
55 per cent public recognition.
2.3 Authentication layers
The solutions should provide
multiple levels of authentication.
Generally most of the
authentication solutions provide
one or two level of authentication
layers. However, solutions such
as high security hologram can
provide three authentication
layers for different users. The
each level of security hologram is
designed for a speciϐic purpose.
Level one feature can be overt
(veriϐication by human eye) and
can be used for identiϐication and
veriϐication by consumer. Level
two, covert (veriϐication by a
predetermined device or a tool)
can be used by manufacturer
or their channel partner for an
advanced level of authentication
and veriϐication. The third level
is highly sophisticated and can be
used by forensic experts and can
be useful to law enforcement and
for evidence in case of litigation.
2.4 Environment factors
The solution should work well
in different environmental
situations (heat, cold, humidity,
water, ϐire, chemical exposure,
etc). For example, polyester
based security holographic excise
adhesive label (HEAL) are used
by excise authorities in India as
they does not wear during transit,
handling or in contact with water
because of its property and work
well in various environmental
and climatic conditions. The
security features incorporated
in HEAL does not varnish when
it comes in contact with water,
dust, heat, moisture, etc because
of non-usage of ink.
2.5 Easy integration
Authentication solutions should
have feasibility to be integrated
with the automated production/
packaginglineifrequired,especially
wherever the volumes are large.
While selecting authentication
solutions it is always
recommended to adopt a layered
approach combining use of overt,
semi-covert, and / or covert
technologies to provide a solution
that is more difϐicult to copy.
3. Selection of vendor7
providing authentication
solutions
Once you have identiϐied the
solution, you can proceed to the
selection of an ethical vendor. The
selection of vendor is as important
as selection of authentication
solution. The ethical vendor will
work as your authentication
partner, will understand and
identify your problem areas
and concerns and will suggest
the optimised solution. The
brand owners can evaluate
authentication solutions provider
(vendor)onfollowingparameters;
3.1 Good corporate practices
Evaluate the vendor on its
corporate practices. Ideally, the
vendor should have adopted
good corporate practices, behave
in ethical manner and should
be following the prescribed
Code of Conduct of its industry
association.
3.2 Innovative
Being a step ahead is the mantra in
anti-counterfeiting industry. Most
7. Vendor – Here it means the manufacturer
& provider of authentication technology,
systems or solutions
www.homai.org 9
The Holography Times
Vol. 7, Issue 20
Cover Story
of the ethical vendors upgrade
their facilities and solutions to
keep themselves & their customer
one step ahead of counterfeiters.
They can suggest & provide
various solutions according to
brand protection objectives and
the changing times.
3.3 Secure environment
The vendor should have an
in-house facility to produce
these solutions under a secure
environment. The vendor must
take all possible measures and
precautions for maintaining
adequate security and secrecy.
3.4 Reference and experience
Vendor should have good
experience of providing
authentication solutions. A
vendor reference should always
be taken from his existing
customers, or you can get
the help from trade industry
association.
In case your vendor is security
hologram manufacturers, you can
add two more steps such as;
3.5 Member of HoMAI / IHMA
He should be a member of
trade bodies such as Hologram
Manufacturers Association of
India (HoMAI) or International
Hologram Manufacturer
Association (IHMA).
3.6 Registered hologram under
HIR8
The Hologram manufacturers
association of India has the
arrangement with Counterfeit
Intelligence Bureau (CIB)9
,
London so that each HOMAI
member can register their
security hologram with CIB.
The selection & usage of
solutions can be a complex
and time consuming process,
however, the selection and
proper implementation of the
right technologies will invariably
lead to long term beneϐits to the
brand owner.
As a further step, the Brand
Owner / Authorities can also
adopt a new ISO Standard ISO:
12931 titled “Performance
criteria for authentication tools
used in anti-counterfeiting or
material goods”. This is a very
useful document for a brand
owner wishing to adopt globally
accepted standards and approach
to ϐighting against the counterfeit.
This can be seen at http://
www.iso.org/iso/catalogue_
detail?csnumber=52210.
All effective solutions, broadly
speaking, help in identifying
and authenticating the original
from counterfeit. They deepen
the divide between genuine
products and their counterfeits
by making a genuine product
distinguishable in some manner
that is difϐicult to replicate
using commercially available
manufacturing processes.
However, it is very important that
a planned surveillance program
be in place to constantly monitor
that there is no infringement is
seen, an immediate action must
be taken so that the guilty is
punished.
Reference:
1. Brand protection challenges and solutions
by Pradip H Shroff, ϔirst published in the
holography times, February 2011, volume 4 &
issue 11.
2. ISO Standards 12931 “Performance criteria for
authenticationtoolsusedinanti-counterfeiting
or material goods” http://www.iso.org/iso/
catalogue_detail?csnumber=52210
3. How to select a security feature, published by
The Document Security Alliance and The North
American Security Products Organisation. www.
documentsecurityalliance.com; www.naspo.org
4. Authentication Technologies for Brand
Protection report published by National
Electrical Manufacturer Association (NEMA),
USA. www.nema.org
5. Hologram Manufacturers Association of India
(HoMAI), www.homai.org
6. International Hologram Manufacturers
Association (IHMA), www.ihma.org
7. Hologram Image Register, http://www.
iccwbo.org/Products-and-Ser vices/
Fighting-Commercial-Crime/Counterfeiting-
Intelligence-Bureau/Hologram-Image-
Register/
8. HIR –A unique and only image register in
security industry, where hologram producers
register their hologram.
9. Counterfeit Intelligence Bureau (CIB)- CIB
is one of the world’s leading organisations
dedicated to combating the counterfeiting
of products and documents, protecting the
integrity of intellectual property and brands,
and preventing copyright abuse. CIB has
a dedicated team of internet investigators
to combat this trade. CIB also hosts the
International Hologram Image Register.
C S Jeena is Secretary Hologram
Manufacturers Association of India,
Editor The Holography Times, member of
Association of Certified Fraud Examiner
(ACFE) & Global Association of Risk
Professionals (GARP). Comments are
welcome at cjhomai@gmail.com.

Mais conteúdo relacionado

Mais procurados

The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Authentication Times
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Authentication Times
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Authentication Times
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Authentication Times
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Authentication Times
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Authentication Times
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The Authentication Times
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Authentication Times
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Authentication Times
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times
 

Mais procurados (20)

Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...Authentication technology / Solutions Empowering Farmers, Industry and Govern...
Authentication technology / Solutions Empowering Farmers, Industry and Govern...
 
The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4The Holography Times, September 2008, Volume 2, Issue No 4
The Holography Times, September 2008, Volume 2, Issue No 4
 
The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19The Holography Times, October 2012, Volume 6, Issue no 19
The Holography Times, October 2012, Volume 6, Issue no 19
 
The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20The Holography Times, January 2013, Volume 7, Issue no 20
The Holography Times, January 2013, Volume 7, Issue no 20
 
The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7The Holography Times, July 2009, Volume 3, Issue No 7
The Holography Times, July 2009, Volume 3, Issue No 7
 
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
Ways to Curb Counterfeit in Crop Protection Industry: Solutions for Brand and...
 
The authentication times issue 35
The authentication times issue 35The authentication times issue 35
The authentication times issue 35
 
The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22The Holography Times, November 2013, Volume 7, Issue no 22
The Holography Times, November 2013, Volume 7, Issue no 22
 
How to select authentication solutions according to your needs
How to select authentication solutions according to your needsHow to select authentication solutions according to your needs
How to select authentication solutions according to your needs
 
Recent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in indiaRecent trends & developments in holographic tax stamp in india
Recent trends & developments in holographic tax stamp in india
 
The Authentication Times issue 32
The Authentication Times issue 32The Authentication Times issue 32
The Authentication Times issue 32
 
The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18The Holography Times, June 2012, Volume 6, Issue no 18
The Holography Times, June 2012, Volume 6, Issue no 18
 
The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26The authentication times march 2015 volume 9 issue 26
The authentication times march 2015 volume 9 issue 26
 
Ht issue 16 201112
Ht issue 16 201112Ht issue 16 201112
Ht issue 16 201112
 
The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21The Holography Times, June 2013, Volume 7, Issue no 21
The Holography Times, June 2013, Volume 7, Issue no 21
 
The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17The Holography Times, March 2012, Volume 6, Issue no 17
The Holography Times, March 2012, Volume 6, Issue no 17
 
The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25The Authentication Times, October 2014, Volume 8, Issue 25
The Authentication Times, October 2014, Volume 8, Issue 25
 
The Authentication Times, Issue 30
The Authentication Times, Issue 30The Authentication Times, Issue 30
The Authentication Times, Issue 30
 
How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?How to combat electrical and electronic components counterfeiting?
How to combat electrical and electronic components counterfeiting?
 
Fashion
FashionFashion
Fashion
 

Destaque

The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Authentication Times
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Authentication Times
 

Destaque (18)

Authentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious MedicinesAuthentication Solutions to stop the Scourge of Spurious Medicines
Authentication Solutions to stop the Scourge of Spurious Medicines
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Serialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overviewSerialization for the pharmaceutical industry an overview
Serialization for the pharmaceutical industry an overview
 
Identify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in IndiaIdentify fake pesticides with authentication solutions in India
Identify fake pesticides with authentication solutions in India
 
Tax stamp in india an overview
Tax stamp in india an overviewTax stamp in india an overview
Tax stamp in india an overview
 
Identity document challenges and solutions
Identity document challenges and solutionsIdentity document challenges and solutions
Identity document challenges and solutions
 
High tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeitingHigh tech hologram can uproot tobacco counterfeiting
High tech hologram can uproot tobacco counterfeiting
 
Evolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and ConsEvolution of Polymer Banknotes Pros and Cons
Evolution of Polymer Banknotes Pros and Cons
 
The Authentication Times Issue 28
The Authentication Times Issue 28The Authentication Times Issue 28
The Authentication Times Issue 28
 
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
Holographic Excise Adhesive Label: Securing Tax Revenue, Protecting Consumer ...
 
Increasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in IndiaIncreasing revenue and curbing illegal liquor in India
Increasing revenue and curbing illegal liquor in India
 
Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...Hologram provides measure to authenticate, identify and arrest counterfeits t...
Hologram provides measure to authenticate, identify and arrest counterfeits t...
 
HOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography marketHOMAI - Characterizing the Indian holography market
HOMAI - Characterizing the Indian holography market
 
Holographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenueHolographic tax stamps boost indian excise revenue
Holographic tax stamps boost indian excise revenue
 
How to combat Auto counterfeiting in India
How to combat Auto counterfeiting in IndiaHow to combat Auto counterfeiting in India
How to combat Auto counterfeiting in India
 
Holograms to authenticate and identify the counterfeit pharma export drugs
Holograms to authenticate and identify the counterfeit pharma export drugsHolograms to authenticate and identify the counterfeit pharma export drugs
Holograms to authenticate and identify the counterfeit pharma export drugs
 
The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24The Holography Times, May 2014, Volume 8, Issue no 24
The Holography Times, May 2014, Volume 8, Issue no 24
 
The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3 The Holography Times, June 2008, Volume 2, Issue No 3
The Holography Times, June 2008, Volume 2, Issue No 3
 

Semelhante a Steps to identify authentication solutions to curb counterfeiting

ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxRichardLightfoot8
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Peter Bihr
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrptmadhu ck
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptMarket Engel SAS
 
Shockwatch impact-indicator-labels-product-brief
Shockwatch impact-indicator-labels-product-briefShockwatch impact-indicator-labels-product-brief
Shockwatch impact-indicator-labels-product-briefaladanhf
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesWavestone
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionMichael Klein
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesLiberteks
 

Semelhante a Steps to identify authentication solutions to curb counterfeiting (20)

ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptx
 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
B crisis
B crisisB crisis
B crisis
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
Shockwatch impact-indicator-labels-product-brief
Shockwatch impact-indicator-labels-product-briefShockwatch impact-indicator-labels-product-brief
Shockwatch impact-indicator-labels-product-brief
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Collaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the CounterfeitersCollaborated Solutions Staying ahead of the Counterfeiters
Collaborated Solutions Staying ahead of the Counterfeiters
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
 
Advanced Physical Access Control for Dummies
Advanced Physical Access Control for DummiesAdvanced Physical Access Control for Dummies
Advanced Physical Access Control for Dummies
 

Mais de Authentication Solution Providers' Association (ASPA)

Mais de Authentication Solution Providers' Association (ASPA) (18)

Trends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in IndiaTrends and Developments in Tax Stamps in India
Trends and Developments in Tax Stamps in India
 
Covid 19 and counterfeiting
Covid 19 and counterfeitingCovid 19 and counterfeiting
Covid 19 and counterfeiting
 
Food Fraud Authentication and Traceability
Food Fraud Authentication and TraceabilityFood Fraud Authentication and Traceability
Food Fraud Authentication and Traceability
 
Tax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policyTax stamps role in implementing ideal state excise policy
Tax stamps role in implementing ideal state excise policy
 
Overview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for IndiaOverview of anti counterfeiting technologies and Opportunities for India
Overview of anti counterfeiting technologies and Opportunities for India
 
Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting Exploring the 5 W's of Counterfeiting
Exploring the 5 W's of Counterfeiting
 
How to make any serialization program successful
How to make any serialization program successful How to make any serialization program successful
How to make any serialization program successful
 
Cannabis in India & Canada
Cannabis in India & CanadaCannabis in India & Canada
Cannabis in India & Canada
 
Trends and drivers in tax stamps design
Trends and drivers in tax stamps design Trends and drivers in tax stamps design
Trends and drivers in tax stamps design
 
The Evolution of DOVID's on Banknotes
The Evolution of DOVID's on BanknotesThe Evolution of DOVID's on Banknotes
The Evolution of DOVID's on Banknotes
 
Predicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heijPredicting future banknote designs by a use centered approach dr hans de heij
Predicting future banknote designs by a use centered approach dr hans de heij
 
Combating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for IndiaCombating illicit tobacco trade; collaborative solutions for India
Combating illicit tobacco trade; collaborative solutions for India
 
How blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishingHow blockchain is strengthening tuna traceability to combat illegal fishing
How blockchain is strengthening tuna traceability to combat illegal fishing
 
Need of anti counterfeit secured packaging
Need of anti counterfeit secured packagingNeed of anti counterfeit secured packaging
Need of anti counterfeit secured packaging
 
Security features in passport, trends in the last two decades
Security features in passport, trends in the last two decadesSecurity features in passport, trends in the last two decades
Security features in passport, trends in the last two decades
 
Recent trends and developments in currency
Recent trends and developments in currencyRecent trends and developments in currency
Recent trends and developments in currency
 
Milk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menaceMilk adulteration and solutions to combat this menace
Milk adulteration and solutions to combat this menace
 
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menaceSituation of drug counterfeiting in Rajasthan and the ways to tackle this menace
Situation of drug counterfeiting in Rajasthan and the ways to tackle this menace
 

Último

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证kbdhl05e
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilabledollysharma2066
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)oannq
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxJackieSparrow3
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做j5bzwet6
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxShubham Rawat
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ EscortsDelhi Escorts Service
 

Último (9)

南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证南新罕布什尔大学毕业证学位证成绩单-学历认证
南新罕布什尔大学毕业证学位证成绩单-学历认证
 
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 AvilableCall Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
Call Girls In Karkardooma 83770 87607 Just-Dial Escorts Service 24X7 Avilable
 
(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)(南达科他州立大学毕业证学位证成绩单-永久存档)
(南达科他州立大学毕业证学位证成绩单-永久存档)
 
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Lado Sarai Delhi reach out to us at 🔝9953056974🔝
 
E J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptxE J Waggoner against Kellogg's Pantheism 8.pptx
E J Waggoner against Kellogg's Pantheism 8.pptx
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做西伦敦大学毕业证学位证成绩单-怎么样做
西伦敦大学毕业证学位证成绩单-怎么样做
 
Inspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptxInspiring Through Words Power of Inspiration.pptx
Inspiring Through Words Power of Inspiration.pptx
 
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
(No.1)↠Young Call Girls in Sikanderpur (Gurgaon) ꧁❤ 9711911712 ❤꧂ Escorts
 

Steps to identify authentication solutions to curb counterfeiting

  • 1. www.homai.org6 The Holography Times Vol. 7, Issue 20 Steps to identify authentication solutions to curb counterfeiting By C S Jeena Counterfeiting is menace for brand owners and Government authorities. In over a decade the problem has expanded rapidly and is now not limited to luxury goods and developed economies. There are any numbers of reports available on internet discussing the loss to industry and people due to counterfeiting. Over the years, in order to prevent counterfeiting from plaguing their business, brand owners started using authentication solutions. With the availability of various authentication solutions, companies and Government authorities are facing problem in selection of a specific authentication solution as the adoption of any given solution is a complex question involving issues, amongst others, of cost, compatibility, feasibility and reliability, and there are divergent views on which technologies should be adopted and the timing for their adoption. While these solutions can sometimes add to the problem, the right selection, usage & implementation of authentication solutions helps companies and authorities to keep them one step ahead of counterfeiting. In this article, we try to explain, “Steps to identify authentication solutions to curb counterfeiting”. Introduction: The selection of an authentication1 solutions that protects a document or product is a complex process and necessitates review of a number of factors regarding the role and implementation of the technology. Not all authentication solutions and security features are appropriate for all applications. It is important to understand the strengths and limitations inherent to different technologies, as well as between similar features supplied by different manufacturers. For example: Use of a security watermark2 in a liquor tax stamp3 which is afϐixed to bottles. The goal is to introduce a security watermark as a new overt feature. The liquor tax stamp has a far smaller user population (mostly inspectors) than currency, and this smaller population is better trained and equipped to examine taxstampsthanthegeneralhuman being. This could allow for the use of a covert (or even forensic) feature,butithasbeendetermined by authorities that in this case the risk of counterfeiting is not great enough to invest in equipment or tools and that an overt feature is preferred for the sake of simplicity. The authentication of a watermark is performed by holding the document up to alight. But in this case the document is a tax stamp secured to a glass bottle and it will only be possible to authenticate the feature if the bottle and its contents are transparent (or at least translucent). Many liquor bottles and liquors are opaque and would not allow sufϐicient light transmission for authentication. It isdeterminedthateventhoughthe user population would otherwise be capable of authenticating this feature, the wide range of the environment–from transparent to opaque–makes the use of a Footnotes: 1. Authentication - Authentication is the process of conϔirming that a product, document or even person is authentic. This is usually achieved by looking for speciϔic attributes such as product and document features and security additions such as holograms, optically variable devices, optical variable inks etc. 2. Watermark: A design, symbol or pattern imparted in paper by a raised wire design on a roll (a dandy roll) as the wet paper is being formed on a mesh as it passes through the wet-end drainage process on a paper- making machine. 3. Tax stamp – A revenue stamp, tax stamp or ϔiscal stamp is a (usually) adhesive label used to collect taxes or fees on documents, tobacco, alcoholic drinks, drugs and and many other things. Used by governments as duty and excise stamps. These are high security documents which contained security features such as hologram. Cover Story
  • 2. www.homai.org 7 The Holography Times Vol. 7, Issue 20 Cover Story security watermark in a liquor tax stamp unusable. This situation is an example of how a widely used and popular feature is rendered ineffective by environmental circumstances. In order to avoid such circumstances, Organisation can follow basic guidelines such as; 1. Purpose of using authentication solutions The organisation needs to understand the purpose of using authentication solutions. As a ϐirst step most organisations should assess the risk to their brand such as i) Does the product have chances of being counterfeited or is it already being counterfeited; ii) If it is being counterfeited, then isitinformoftampering,pilfering, duplication or, by misleading the consumer by adopting a look-a- like form of identiϐication; iii) Is the risk of counterfeiting in the form of digital or non-digital? iv) What the impact such solutions may have on the brand? Once the purpose is clear, the organisation can evaluate the authentication solutions or security feature based on various parameters. 2. Selection of authentication solutions In today’s fast changing technological world, scores of different authentication solutions are available in the market. These days,twofamiliesofauthentication solutions are in use, physical4 and logical security5 features to secure packaging materials and products, (see ϐigure 1). In selecting them various trade-offs are necessary between security and usability. To evaluate whether a given solution will address a given security problem, the security problem must ϐirst be clearly deϐined. 2.1 Basic property The solutions should be extremely difϐicult to copy and tamper evident6 ; 2.2 Audience The solutions should provide easy identiϐication to user, and facilitate product authentication. Security features of authentication solutions must be tailored to the intended user population, the group of people responsible for authenticating the feature. The user population could include the entire public- 4. Physical Security: Physical security features are substances or products which are introduced into, or attached to packaging materials and / or products. The presence of these security substances is veriϔied to authenticate the protected item. As the manufacturing process of security products is conϔidential and highly secure and its availability is strictly limited, it is very difϔicult to counterfeit products secured in this way. 5. Logical Security: Features are based on encryption technologies, allowing the integration of hidden data into images / artworks (steganography / digital watermarks) and supporting the authentication of the product. It is also possible to register the surface structure of packaging material which is unique. With this data, an individual “ϔingerprint” of each individual packaging item can be made. 6. Tamper evident - Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings or other techniques may be tamper indicating. Figure 1: Overview of security technologies Authentication Solutions Serialisation Security Technologies Printed PhysicalLogical Cryptographic Identiϐication Structure Analysis Track and Trace Inks / Taggants OVDs and Hologram
  • 3. www.homai.org8 The Holography Times Vol. 7, Issue 20 Cover Story for example, if the product being secured is currency, or if it is a bottle of a widely sold over-the- counter medication. The user population might be a smaller group in the case of a more specialized product. If the user population is large or has limited interest in authenticating the feature, it may be impractical to supply complicated security features, whereas if the user population is small and specialized, security features of any complexity can be selected. For example, in a survey by Dutch National Bank to measure the public understanding of security features, it was revealed that out of seven selected features, the Hologram came out second with 55 per cent public recognition. 2.3 Authentication layers The solutions should provide multiple levels of authentication. Generally most of the authentication solutions provide one or two level of authentication layers. However, solutions such as high security hologram can provide three authentication layers for different users. The each level of security hologram is designed for a speciϐic purpose. Level one feature can be overt (veriϐication by human eye) and can be used for identiϐication and veriϐication by consumer. Level two, covert (veriϐication by a predetermined device or a tool) can be used by manufacturer or their channel partner for an advanced level of authentication and veriϐication. The third level is highly sophisticated and can be used by forensic experts and can be useful to law enforcement and for evidence in case of litigation. 2.4 Environment factors The solution should work well in different environmental situations (heat, cold, humidity, water, ϐire, chemical exposure, etc). For example, polyester based security holographic excise adhesive label (HEAL) are used by excise authorities in India as they does not wear during transit, handling or in contact with water because of its property and work well in various environmental and climatic conditions. The security features incorporated in HEAL does not varnish when it comes in contact with water, dust, heat, moisture, etc because of non-usage of ink. 2.5 Easy integration Authentication solutions should have feasibility to be integrated with the automated production/ packaginglineifrequired,especially wherever the volumes are large. While selecting authentication solutions it is always recommended to adopt a layered approach combining use of overt, semi-covert, and / or covert technologies to provide a solution that is more difϐicult to copy. 3. Selection of vendor7 providing authentication solutions Once you have identiϐied the solution, you can proceed to the selection of an ethical vendor. The selection of vendor is as important as selection of authentication solution. The ethical vendor will work as your authentication partner, will understand and identify your problem areas and concerns and will suggest the optimised solution. The brand owners can evaluate authentication solutions provider (vendor)onfollowingparameters; 3.1 Good corporate practices Evaluate the vendor on its corporate practices. Ideally, the vendor should have adopted good corporate practices, behave in ethical manner and should be following the prescribed Code of Conduct of its industry association. 3.2 Innovative Being a step ahead is the mantra in anti-counterfeiting industry. Most 7. Vendor – Here it means the manufacturer & provider of authentication technology, systems or solutions
  • 4. www.homai.org 9 The Holography Times Vol. 7, Issue 20 Cover Story of the ethical vendors upgrade their facilities and solutions to keep themselves & their customer one step ahead of counterfeiters. They can suggest & provide various solutions according to brand protection objectives and the changing times. 3.3 Secure environment The vendor should have an in-house facility to produce these solutions under a secure environment. The vendor must take all possible measures and precautions for maintaining adequate security and secrecy. 3.4 Reference and experience Vendor should have good experience of providing authentication solutions. A vendor reference should always be taken from his existing customers, or you can get the help from trade industry association. In case your vendor is security hologram manufacturers, you can add two more steps such as; 3.5 Member of HoMAI / IHMA He should be a member of trade bodies such as Hologram Manufacturers Association of India (HoMAI) or International Hologram Manufacturer Association (IHMA). 3.6 Registered hologram under HIR8 The Hologram manufacturers association of India has the arrangement with Counterfeit Intelligence Bureau (CIB)9 , London so that each HOMAI member can register their security hologram with CIB. The selection & usage of solutions can be a complex and time consuming process, however, the selection and proper implementation of the right technologies will invariably lead to long term beneϐits to the brand owner. As a further step, the Brand Owner / Authorities can also adopt a new ISO Standard ISO: 12931 titled “Performance criteria for authentication tools used in anti-counterfeiting or material goods”. This is a very useful document for a brand owner wishing to adopt globally accepted standards and approach to ϐighting against the counterfeit. This can be seen at http:// www.iso.org/iso/catalogue_ detail?csnumber=52210. All effective solutions, broadly speaking, help in identifying and authenticating the original from counterfeit. They deepen the divide between genuine products and their counterfeits by making a genuine product distinguishable in some manner that is difϐicult to replicate using commercially available manufacturing processes. However, it is very important that a planned surveillance program be in place to constantly monitor that there is no infringement is seen, an immediate action must be taken so that the guilty is punished. Reference: 1. Brand protection challenges and solutions by Pradip H Shroff, ϔirst published in the holography times, February 2011, volume 4 & issue 11. 2. ISO Standards 12931 “Performance criteria for authenticationtoolsusedinanti-counterfeiting or material goods” http://www.iso.org/iso/ catalogue_detail?csnumber=52210 3. How to select a security feature, published by The Document Security Alliance and The North American Security Products Organisation. www. documentsecurityalliance.com; www.naspo.org 4. Authentication Technologies for Brand Protection report published by National Electrical Manufacturer Association (NEMA), USA. www.nema.org 5. Hologram Manufacturers Association of India (HoMAI), www.homai.org 6. International Hologram Manufacturers Association (IHMA), www.ihma.org 7. Hologram Image Register, http://www. iccwbo.org/Products-and-Ser vices/ Fighting-Commercial-Crime/Counterfeiting- Intelligence-Bureau/Hologram-Image- Register/ 8. HIR –A unique and only image register in security industry, where hologram producers register their hologram. 9. Counterfeit Intelligence Bureau (CIB)- CIB is one of the world’s leading organisations dedicated to combating the counterfeiting of products and documents, protecting the integrity of intellectual property and brands, and preventing copyright abuse. CIB has a dedicated team of internet investigators to combat this trade. CIB also hosts the International Hologram Image Register. C S Jeena is Secretary Hologram Manufacturers Association of India, Editor The Holography Times, member of Association of Certified Fraud Examiner (ACFE) & Global Association of Risk Professionals (GARP). Comments are welcome at cjhomai@gmail.com.