FAQ’s Authentication Solution

Q). What is an Authentication?

In general terms, The process of identifying an individual, usually based on a user name and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual. While in brand protection it refers to the task of checking that a document or product is in fact authentic.

Q). What are types of authentication solutions?

There are a wide variety of technologies available today that support brand protection strategies. These technologies are applied in the three main areas of anti-counterfeiting, anti-tampering, and tracking and tracing.

  • Anti-Counterfeiting: The common feature of anti-counterfeiting technologies is that they assist in identifying a product as suspect. Some anti-counterfeiting technologies go further, however, and allow a product to be verified as genuine.
  • Anti-Tampering: Found more in the food and pharmaceutical industry that in the electrical industry, anti-tampering technologies are used to protect a product from adulteration or replacement. An anti-tampering device that is intact a product is a sign that the product is likely to be genuine.
  • Tracking and Tracing: Tracking and tracing technologies are used to determine where and when a product (taking its components into account) was manufactured, when it has been and when, and its current status in the supply chain. Some technologies allow for determining where a product is supposed to go. Thus, tracking and tracing technologies are used to fight unauthorized distribution, which is frequently linked to counterfeiting. 

Q). Why Brands needs authentication solutions?

Fighting counterfeiting is a Brand issue. In today’s world brand are under attack in forms of counterfeiting, tampering, pilfering, Authentication technologies play an important role in protecting brand reputation, value, market share and above all trust of customers.

Q). How to select authentication solutions & vendor?

In today’s fast changing technological world, scores of different security technologies are available in the market. Some are proven authentication technologies like security inks, taggants, Optically Variable Image Devices such as holograms, and some others are perceived to be an authentication technology. Bar Codes and serialisation are two examples of such perception. A bar code is a very good technology for tracking, logistics and inventory management solutions, but it is not an authentication technology. This has also been corroborated by the ISO:12931, which is a new standard that deals with counterfeiting of material goods. This is a very useful standard for a brand owner wishing to adopt globally accepted good business practice and systems to fight the menace of counterfeiting. This can be seen at http://www.iso.org/iso/catalogue_detail?csnumber=52210.

You can also read more information at following sources;