Disclaimer

FAQ’s Authentication Solution

Q). What is an Authentication?

Authentication: In general terms, The process of identifying an individual, usually based on a user name and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. While in brand protection it refers to the task of checking that a document or product is in fact authentic.

The authentication of a product is the ability to certify that a product is what it claims to be. The value of an authentication (or authenticating) device is therefore based on this character of non-falsifiability and on the degree of certainty it confers to the user. A consumer should be able to spot any attempt to imitate an authentication marker, and it should be extremely difficult, if not impossible to for counterfeiters to have access to the technology necessary for reproducing marker of authenticity.

Identification : The identification of a product refers to the ability to differentiate it among others in a batch. A number or a bar code for example performs this function. It also meets other needs than those related to the fight against counterfeiting (inventory management, invoicing, etc.), and the affixing of an identification device is also a prerequisite to the traceability of a product. Identification differs from authentication: identification does not guarantee the authentic character of a product. Identification processes are often reproducible (for example, a bar code can be photocopied). Identification devices play a role in the implementation of the strategies to combat counterfeiting, but cannot rightly be qualified as “anti-counterfeiting technologies.”

Q). What are types of authentication solutions?

There are a wide variety of technologies available today that support brand protection strategies. These technologies are applied in the three main areas of anti-counterfeiting, anti-tampering, and tracking and tracing.

  • Anti-Counterfeiting: The common feature of anti-counterfeiting technologies is that they assist in identifying a product as suspect. Some anti-counterfeiting technologies go further, however, and allow a product to be verified as genuine.
  • Anti-Tampering: Found more in the food and pharmaceutical industry that in the electrical industry, anti-tampering technologies are used to protect a product from adulteration or replacement. An anti-tampering device that is intact a product is a sign that the product is likely to be genuine.
  • Tracking and Tracing: Tracking and tracing technologies are used to determine where and when a product (taking its components into account) was manufactured, when it has been and when, and its current status in the supply chain. Some technologies allow for determining where a product is supposed to go. Thus, tracking and tracing technologies are used to fight unauthorized distribution, which is frequently linked to counterfeiting.  

Q). Why Brands & Organisation needs authentication solutions?

Counterfeiting is termed as crime of 21st century. It is growing and increasingly in almost all sectors. For example, According to US Center for medicine in the public interest, “15 percent of medicines sold worldwide are fake, killing around 7,00,000 people in a year’’. Unfortunately, there are no signs that the criminals associated with fraud are slowing down. Brands are under attack in form of counterfeiting, tampering and diversion taking away human life and causing unnecessary misery and human suffering. What more, it can harm manufacturer by leading to loss of revenue, liability in case of lawsuits, and loss of brand integrity. At this situation, we believe that you must be taking suitable action at your end. However, we just want to remind you that anti-counterfeiting technologies with combination of tracking technologies play an important part in your anti-counterfeiting strategy in your fight against counterfeiting.

Q). How to select authentication solutions & vendor?

We are mentioning few points below which could be of your help in adopting / identifying right authentication solution according to your needs.

1. Purpose of using security technology: The organisation needs to understand the purpose of using security technology. As a first step most organisations should assess the risk to their brand.

2. Selection of security technologiesWhile selecting authentication solutions it is always recommended to adopt a layered approach combining use of overt, semi-covert, and / or covert technologies to provide a solution that is easy to identify and extremely difficult to replicate.

3. Selection of vendor providing authentication solutions: Once the solution is identified, the next stage is to identify an ethical vendor. The selection of vendor is as important as selection of authentication solution. The
ethical vendor will work as your authentication partner, will understand and identify your problem areas and
concerns and will suggest the optimised solution. Get help from trade association in selecting ethical vendor (ASPA members list) and best practices and resources for fighting counterfeiting.

All effective solutions, broadly speaking, help in identifying and authenticating the original from counterfeit. They deepen the divide between genuine products and their counterfeits by making a genuine product distinguishable in some manner that is difficult to replicate using commercially available manufacturing processes. However, it is very important that a market surveillance program is in place, so that as soon as an infringement is identified, it is immediately tackled using administrative and/or legal recourse to punish the guilty.

In today’s fast changing technological world, scores of different security technologies are available in the market. Some are proven authentication technologies like security inks, taggants, Optically Variable Image Devices such as holograms, and some others are perceived to be an authentication technology. Bar Codes are example of such perception. A bar code is a very good technology for tracking, logistics and inventory management solutions, but it is not an authentication technology. This has also been corroborated by the ISO:12931, which is a new standard that deals with counterfeiting of material goods. This is a very useful standard for a brand owner wishing to adopt globally accepted good business practice and systems to fight the menace of counterfeiting. This can be seen at http://www.iso.org/iso/catalogue_detail?csnumber=52210.

You can also read more information at following sources;

We hope you are using / considering authentication technologies / solutions as your brand authentication partner. However, in case, if you required any further assistance, please feel free to contact us or write to us at info@aspaglobal.com.