Title: Innovative New Technologies in Security for the Packaging Industry
1Innovative New Technologies in Security for the
Packaging Industry
- Brand Protection Conferences
- Integrating Security Innovations
- at Graphics of the Americas
- February 28-29, 2008 in Miami Beach, FL
2Goals of Security for the Packaging Industry
- Prevent the use of the package by an unauthorized
party - Prevent the creation of a counterfeit that could
be sold by an unauthorized party - To accomplish security in a method that does not
adversely impact the cost of the packaging - To accomplish security in a manner that does not
adversely impact the speed or ease of use
3To sum it all up. . .
Yep, its just like they said, Scrambler,
40,000 of equipment and 10 hours of testing. .
Its a genuine bag of Cheetos, alright!
4Layers of security - Examples
Serial Numbers
Watermark
Security Thread
Microprint
Color Shift Ink
5Three Categories of ACMs
- Obviously present
- Hard to get or difficult to reproduce
- Often integrated into packaging design and
marketing strategies - Includes items such as color shifting inks,
holograms, thermochromic materials, etc.
Used by 69 of CACP Surveyed4
- Hidden technologies
- Require field devices to verify
- Include items such as invisible bar codes,
lenticulars, polarized hidden images, invisible
images, etc.
Used by 82 of CACP Surveyed 4
- Hidden Technologies
- Require laboratory examination with specialized
equipment - Include items such as micro-taggants, nanotext,
etc.
Used by 36 of CACP Surveyed4
6Overt Technologies for the arsenal
7Covert technologies for the Arsenal
8Forensic Technologies for Arsenal
9Overt Techniques
10 11Arsenal Comparative Strengths Weaknesses -
Holograms
12Case Study Butane Lighter
- Counterfeits noticed in the Brazilian market
three years before any action was taken - No action taken even when legal claims filed
against the brand owners for fires and explosions
from the fakes - Finally a 30 loss in sales to counterfeits
initiated action - They banded together WITH THEIR COMPETITION and
approached a GOVERNMENT AGENCY (INMETRO)
13Case Study Butane Lighter
- Program that was designed is estimated to have
cost 2 million to start and 1 million/year
thereafter - Program included
- Overt Security hologram with covert features
- Government Legislation
- First year they realized a 28 increase in sales.
The second year showed an additional 55 growth. - Program and security label now in their 5th year
of use
14SANDS-SECURE COLOR SHIFT
The same type of ink that helps protect our
currency is now available to help protect your
products
15Arsenal Comparative Strengths Weaknesses
Color Shift (OVI)
16Thermochromic Pigments
These aint your mamas mood rings
- Technology that color changes similar to the
mood ring of the 1970s can now be used to
protect your brand. - The colors can be customized to meet almost any
need. - The temperatures for change can be customized
between (-10C) and 69C - Colors and temperatures are independent factors
and can be matched in any combination. - Customization provides a Unique Thermochromic
Signature, Proprietary to your brand.
17Thermochromic Pigments
Cholesteric Liquid Crystals
Binary Thermochromes
18Arsenal Comparative Strengths Weaknesses -
Thermochromes
19Arsenal Comparative Strengths Weaknesses -
Microprint
20Photochromic Dyes
-
- Photochromics reversibly alter their color upon
exposure to ultraviolet sources. This function is
similar to the new color changing eyewear that
has recently entered the market. - The dyes respond to natural solar irradiation as
well as artificial sources. -
21Covert Techniques
22Invisible Dyes Pigments
UV
Visible
Commonly mistaken for optical brighteners,
these UV down-converters are
available in a variety of colors and can be
blended in most ink and polymer systems
23Invisible Particles
Visible
UV
Fibers/Threads Ambient Light
Fibers/Threads UV-Light
Micro-spheres Ambient Light
Micro-spheres UV-Light
24Invisible Pigments
Visible
IR
Ambient Light
IR-Laser
These pigments can be tuned to fluoresce at a
specific detection wavelength.
25Arsenal Comparative Strengths Weaknesses
Invisible Inks
26Lenticular Images
- Historically, due to the high production cost of
tooling for the lenses, lenticulars have been
limited to a small set of resolutions (number of
lines per inch (lpi)). - Security was not high due to the fact that
finding the correct lpi was typically a choice of
one of four.
27Hidden Image Technology (HIT)
A New Twist on a classic idea . . . .
Custom Proprietary Lenticulars
- Resolution can be custom made down to one line
per inch (lpi) accuracy - i.e. Customer A has lenses supplied at 121 lpi
while Customer B gets his lenses at 296 lpi - There can be multiple images at multiple angles
- There can be multiple images at several
different resolutions on the same print area. - The Technology supports sequential numbering,
serialization, etc.
28Hidden Image Technology (HIT)
29Hidden Image Technology (HIT)
30Hidden Image Technology (HIT)
31Hidden Image Technology (HIT) Revealed with a 60
cent lens
Hidden Verification numbers revealed
32HIT Application Examples
33Arsenal Comparative Strengths Weaknesses
Scrambled Print
34Polarized Hidden Images
SANDS-SECURE PTEC is a Polarized Hidden Image
TEChnology. The image is invisible to the naked
eye until viewed through a polarized lens.
35PTEC Application Examples
Product Seals
Pharmaceutical Packaging
36Arsenal Comparative Strengths Weaknesses
Polarized Images
37We know there is a small problem but we are not
sure it is worth addressing. We would be happy
with a 6 increase in revenues Belarusian
Province
Denial. . .
from case study in Belarus
38Case Study Ticket with OVERT Anti-Counterfeiting
Measures
OVERT Security Holographic Stripe
39Ticket with Covert Anti-Counterfeiting Measures
Polarized lens reveals covert security
40Impact. . .
- We were extremely surprised to see an immediate
40 increase in revenues from the implementation
of ACM. Obviously, our problem was larger than
we realized. - Belarusian Province
41Case Study Russian Tax Stamps
- A Russian Government was aware of a problem but
did not know the extent of it. - They indicated that a 10 increase in revenues
would be considered an overwhelming success.
42Case Study Russian Tax Stamps
- They realized a 300 increase in revenues!!
43Forensic Methods
44 Microtaggant Identification Glitter Particles
100 Micron Flake 12 Micron M
500 X Magnification
45 Microtaggant Identification Glitter Particles
- Increased Magnification Brings the Logo Into
Focus
100 Micron Flakes
4 X
100 X
200 X
500 X
1000 X
46Microtaggant Identification Glitter Particles
L1 Measuring the Logo 11.928 Microns
L 2 8.946 Microns
47Microtaggant Identification Glitter Particles
What Size Is The Logo?
Logo Shown is 12 Micron, Half The Diameter of a
Human Hair
48Microtaggant Identification Glitter Particles
Imagine Your Brand Logo or Security Measure Here!
49Combining Techniques
- In addition to the new technologies that are
evolving, a rapidly growing strategy is to
combine techniques for enhanced security. For
example - Hidden Lenticular inside a polarized image
- Hidden barcode within a lenticular
- Lenticular printed with invisible inks
- Micro-taggants printed beside colorshift ink
50Combining Techniques
Example 1
- Blank Birth Certificate
- Overt Technologies include
- Security paper with color coded fibers
- Intaglio printing
- Water mark
51Combining Techniques
Example 1
- Blank Birth Certificate
- Covert Technologies include
- UV-Vis Invisible printing (state of Florida)
- UV-Fluorescent taggant embedded in the paper
itself
52Combining Techniques
Example 1
Embedded fluorescent fibers
53Combining Techniques
Example 1
Blank Birth Certificate Additional Covert
Measure Lenticular image hidden in the invisible
ink.
54Combining Techniques
Example 2
- Strengths
- Ltd. No. of producers
- Requires special equipment
- Add Flash to packaging
- Weaknesses
- Can be (and are) copied
- Verifiers stop their check when they see a
hologram ANY hologram
55Combining Techniques
Example 2
- Hidden Image Technology
- An ordinary laser pointer
- Perpendicular viewing surface
- A Hidden Refractive Image
- Target spot on the hologram
56Combining Techniques
Example 2
- Using E-Beam we increase the resolution factor
several times and can produce microscopic text - Can be viewed through a 15 field microscope
- Cannot be copied from a hologram in the field due
to resolution loss
57Combining Techniques
Example 3
58References
1 International Chamber of Commerce Commercial
Crimes Services, A Brief Overview of
Counterfeiting, July 2004 2 Fighting the
Fakers, The Engineer, April 16, 2002 Philip
Broussard, Dangerous Fakes, World Press Review,
January, 1999. 3 Scott Shifrel, Car Dealers
Busted in Scam, New York Daily News, December 1,
2004. 4Coalition Against Counterfeiting and
Piracy Technology Task Force survey, July 2006 5
Business Week, July 2, 2005 6 BBC News, March 24,
2006 7 Forbes.com/Reuters, June 11, 2003 8 The
New York Times, February 20, 2007 9 IACC.org
resources, Facts on Fakes 10 IACC.org
Submission of the IACC to the US Trade
Representative, Special 301 Recommendations 11
IACC.org Fakes by the Numbers
59Resources
- United States Chamber of Commerce
www.thetruecosts.org - The International Anticounterfeiting Coalition
www.iacc.org - Business Action to Stop Counterfeiting and Piracy
www.bascap.com - Interpol www.interpol.int/Public/FinancialCrime/In
tellectualProperty/Default.asp - www.cdc.gov, Recent Warning About Counterfeit
Artesunate, Illustrated. 5th edition, July 2006
(1.3 MB 10 pages. Courtesy Wellcome Trust Oxford
SE Asian Tropical Medicine Research Units)
Updated July 2006