Innovative New Technologies in Security for the Packaging Industry - PowerPoint PPT Presentation

1 / 59
About This Presentation
Title:

Innovative New Technologies in Security for the Packaging Industry

Description:

Innovative New Technologies in Security for the Packaging Industry – PowerPoint PPT presentation

Number of Views:828
Avg rating:3.0/5.0
Slides: 60
Provided by: bbur5
Category:

less

Transcript and Presenter's Notes

Title: Innovative New Technologies in Security for the Packaging Industry


1
Innovative New Technologies in Security for the
Packaging Industry
  • Brand Protection Conferences
  • Integrating Security Innovations
  • at Graphics of the Americas
  • February 28-29, 2008 in Miami Beach, FL

2
Goals of Security for the Packaging Industry
  • Prevent the use of the package by an unauthorized
    party
  • Prevent the creation of a counterfeit that could
    be sold by an unauthorized party
  • To accomplish security in a method that does not
    adversely impact the cost of the packaging
  • To accomplish security in a manner that does not
    adversely impact the speed or ease of use

3
To sum it all up. . .
Yep, its just like they said, Scrambler,
40,000 of equipment and 10 hours of testing. .
Its a genuine bag of Cheetos, alright!
4
Layers of security - Examples
Serial Numbers
Watermark
Security Thread
Microprint
Color Shift Ink
5
Three Categories of ACMs
  • Obviously present
  • Hard to get or difficult to reproduce
  • Often integrated into packaging design and
    marketing strategies
  • Includes items such as color shifting inks,
    holograms, thermochromic materials, etc.

Used by 69 of CACP Surveyed4
  • Hidden technologies
  • Require field devices to verify
  • Include items such as invisible bar codes,
    lenticulars, polarized hidden images, invisible
    images, etc.

Used by 82 of CACP Surveyed 4
  • Hidden Technologies
  • Require laboratory examination with specialized
    equipment
  • Include items such as micro-taggants, nanotext,
    etc.

Used by 36 of CACP Surveyed4
6
Overt Technologies for the arsenal
7
Covert technologies for the Arsenal
8
Forensic Technologies for Arsenal
9
Overt Techniques
10
  • Holograms

11
Arsenal Comparative Strengths Weaknesses -
Holograms
12
Case Study Butane Lighter
  • Counterfeits noticed in the Brazilian market
    three years before any action was taken
  • No action taken even when legal claims filed
    against the brand owners for fires and explosions
    from the fakes
  • Finally a 30 loss in sales to counterfeits
    initiated action
  • They banded together WITH THEIR COMPETITION and
    approached a GOVERNMENT AGENCY (INMETRO)

13
Case Study Butane Lighter
  • Program that was designed is estimated to have
    cost 2 million to start and 1 million/year
    thereafter
  • Program included
  • Overt Security hologram with covert features
  • Government Legislation
  • First year they realized a 28 increase in sales.
    The second year showed an additional 55 growth.
  • Program and security label now in their 5th year
    of use

14
SANDS-SECURE COLOR SHIFT
The same type of ink that helps protect our
currency is now available to help protect your
products

15
Arsenal Comparative Strengths Weaknesses
Color Shift (OVI)
16
Thermochromic Pigments
These aint your mamas mood rings
  • Technology that color changes similar to the
    mood ring of the 1970s can now be used to
    protect your brand.
  • The colors can be customized to meet almost any
    need.
  • The temperatures for change can be customized
    between (-10C) and 69C
  • Colors and temperatures are independent factors
    and can be matched in any combination.
  • Customization provides a Unique Thermochromic
    Signature, Proprietary to your brand.

17
Thermochromic Pigments
Cholesteric Liquid Crystals
Binary Thermochromes
18
Arsenal Comparative Strengths Weaknesses -
Thermochromes
19
Arsenal Comparative Strengths Weaknesses -
Microprint
20
Photochromic Dyes
  • Photochromics reversibly alter their color upon
    exposure to ultraviolet sources. This function is
    similar to the new color changing eyewear that
    has recently entered the market.
  • The dyes respond to natural solar irradiation as
    well as artificial sources.

21
Covert Techniques
22
Invisible Dyes Pigments
UV
Visible
Commonly mistaken for optical brighteners,
these UV down-converters are
available in a variety of colors and can be
blended in most ink and polymer systems
23
Invisible Particles
Visible
UV
Fibers/Threads Ambient Light
Fibers/Threads UV-Light
Micro-spheres Ambient Light
Micro-spheres UV-Light
24
Invisible Pigments
Visible
IR
Ambient Light
IR-Laser
These pigments can be tuned to fluoresce at a
specific detection wavelength.
25
Arsenal Comparative Strengths Weaknesses
Invisible Inks
26
Lenticular Images
  • Historically, due to the high production cost of
    tooling for the lenses, lenticulars have been
    limited to a small set of resolutions (number of
    lines per inch (lpi)).
  • Security was not high due to the fact that
    finding the correct lpi was typically a choice of
    one of four.

27
Hidden Image Technology (HIT)
A New Twist on a classic idea . . . .
Custom Proprietary Lenticulars
  • Resolution can be custom made down to one line
    per inch (lpi) accuracy
  • i.e. Customer A has lenses supplied at 121 lpi
    while Customer B gets his lenses at 296 lpi
  • There can be multiple images at multiple angles
  • There can be multiple images at several
    different resolutions on the same print area.
  • The Technology supports sequential numbering,
    serialization, etc.

28
Hidden Image Technology (HIT)
29
Hidden Image Technology (HIT)
30
Hidden Image Technology (HIT)
31
Hidden Image Technology (HIT) Revealed with a 60
cent lens
Hidden Verification numbers revealed
32
HIT Application Examples
33
Arsenal Comparative Strengths Weaknesses
Scrambled Print
34
Polarized Hidden Images
SANDS-SECURE PTEC is a Polarized Hidden Image
TEChnology. The image is invisible to the naked
eye until viewed through a polarized lens.
35
PTEC Application Examples
Product Seals
Pharmaceutical Packaging
36
Arsenal Comparative Strengths Weaknesses
Polarized Images
37
We know there is a small problem but we are not
sure it is worth addressing. We would be happy
with a 6 increase in revenues Belarusian
Province
Denial. . .
from case study in Belarus
38
Case Study Ticket with OVERT Anti-Counterfeiting
Measures
OVERT Security Holographic Stripe
39
Ticket with Covert Anti-Counterfeiting Measures
Polarized lens reveals covert security
40
Impact. . .
  • We were extremely surprised to see an immediate
    40 increase in revenues from the implementation
    of ACM. Obviously, our problem was larger than
    we realized.
  • Belarusian Province

41
Case Study Russian Tax Stamps
  • A Russian Government was aware of a problem but
    did not know the extent of it.
  • They indicated that a 10 increase in revenues
    would be considered an overwhelming success.

42
Case Study Russian Tax Stamps
  • They realized a 300 increase in revenues!!

43
Forensic Methods
44
Microtaggant Identification Glitter Particles
  • Through The Glass

100 Micron Flake 12 Micron M
500 X Magnification
45
Microtaggant Identification Glitter Particles
  • Increased Magnification Brings the Logo Into
    Focus

100 Micron Flakes
4 X
100 X
200 X
500 X
1000 X
46
Microtaggant Identification Glitter Particles
  • Measuring the Logo

L1 Measuring the Logo 11.928 Microns
L 2 8.946 Microns
47
Microtaggant Identification Glitter Particles
What Size Is The Logo?
Logo Shown is 12 Micron, Half The Diameter of a
Human Hair
48
Microtaggant Identification Glitter Particles
Imagine Your Brand Logo or Security Measure Here!
49
Combining Techniques
  • In addition to the new technologies that are
    evolving, a rapidly growing strategy is to
    combine techniques for enhanced security. For
    example
  • Hidden Lenticular inside a polarized image
  • Hidden barcode within a lenticular
  • Lenticular printed with invisible inks
  • Micro-taggants printed beside colorshift ink

50
Combining Techniques
Example 1
  • Blank Birth Certificate
  • Overt Technologies include
  • Security paper with color coded fibers
  • Intaglio printing
  • Water mark

51
Combining Techniques
Example 1
  • Blank Birth Certificate
  • Covert Technologies include
  • UV-Vis Invisible printing (state of Florida)
  • UV-Fluorescent taggant embedded in the paper
    itself

52
Combining Techniques
Example 1
Embedded fluorescent fibers
53
Combining Techniques
Example 1
Blank Birth Certificate Additional Covert
Measure Lenticular image hidden in the invisible
ink.
54
Combining Techniques
Example 2
  • The Hologram
  • Strengths
  • Ltd. No. of producers
  • Requires special equipment
  • Add Flash to packaging
  • Weaknesses
  • Can be (and are) copied
  • Verifiers stop their check when they see a
    hologram ANY hologram

55
Combining Techniques
Example 2
  • Hidden Image Technology
  • An ordinary laser pointer
  • Perpendicular viewing surface
  • A Hidden Refractive Image
  • Target spot on the hologram

56
Combining Techniques
Example 2
  • Using E-Beam we increase the resolution factor
    several times and can produce microscopic text
  • Can be viewed through a 15 field microscope
  • Cannot be copied from a hologram in the field due
    to resolution loss

57
Combining Techniques
Example 3
58
References
1 International Chamber of Commerce Commercial
Crimes Services, A Brief Overview of
Counterfeiting, July 2004 2 Fighting the
Fakers, The Engineer, April 16, 2002 Philip
Broussard, Dangerous Fakes, World Press Review,
January, 1999. 3 Scott Shifrel, Car Dealers
Busted in Scam, New York Daily News, December 1,
2004. 4Coalition Against Counterfeiting and
Piracy Technology Task Force survey, July 2006 5
Business Week, July 2, 2005 6 BBC News, March 24,
2006 7 Forbes.com/Reuters, June 11, 2003 8 The
New York Times, February 20, 2007 9 IACC.org
resources, Facts on Fakes 10 IACC.org
Submission of the IACC to the US Trade
Representative, Special 301 Recommendations 11
IACC.org Fakes by the Numbers
59
Resources
  • United States Chamber of Commerce
    www.thetruecosts.org
  • The International Anticounterfeiting Coalition
    www.iacc.org
  • Business Action to Stop Counterfeiting and Piracy
    www.bascap.com
  • Interpol www.interpol.int/Public/FinancialCrime/In
    tellectualProperty/Default.asp
  • www.cdc.gov, Recent Warning About Counterfeit
    Artesunate, Illustrated. 5th edition, July 2006
    (1.3 MB 10 pages. Courtesy Wellcome Trust Oxford
    SE Asian Tropical Medicine Research Units)
    Updated July 2006
Write a Comment
User Comments (0)
About PowerShow.com