Track and Trace with Dual Serialization: A Tutorial

Transcription

Track and Trace with Dual Serialization: A Tutorial
Track and Trace with
Dual Serialization:
A Tutorial
January, 2014
© 2014 Kodak. K-182
Introduction
A Dual Serialization Track and Trace system employs both visible and invisible codes.
The invisible code creates a secondary backup if a visible code is intentionally removed
by diverters in an attempt to thwart investigations and enforcement actions. The invisible
codes are applied through variable printing and can be unique to each item, making this a
fully capable mass serialization process.
The Track and Trace System with Dual Serialization involves five major elements as
shown on the following slide. Implementation of Track and Trace usually requires
involvement from stakeholders in the departments aligned with each of these elements.
Element
Stakeholder Departments
➊
Marking Plan
Marketing (along with Production and Inspection)

Coding and Aggregation
Production
➌
Track Through Distribution
Distribution


Inspect
Inspection (e.g., Sales, Brand Protection, or Legal)
Enforce
Brand Enforcement (Brand Protection, Legal)
Track and Trace with Dual Serialization Tutorial
2
© 2014 Kodak
Track and Trace with Dual Serialization Tutorial
3
© 2014 Kodak
© 2014 Kodak
1. The Marking Plan
Determining the best method for marking
and authenticating the product is a key step
that drives effectiveness and cost of the
entire brand protection program
➊
MARKING
PLAN
–  Experience and expertise is required to
determine the best way to mark the product
given the product materials, label materials,
existence of caps, manufacturing process,
and Brand Protection goals
Invisible (covert)
serialization
code
Overt
serialization
code
–  Overt and Covert Serialization codes can be
in the form of human readable
alphanumeric, 2D barcodes, or QR codes
(e.g., for supporting customer loyalty
programs).
12345
67890
–  Codes can represent the same or dissimilar
serial numbers (dissimilar numbers would
be linked in a database)
QR
Code
–  A layered approach is usually called for that
requires using serialization coding for antidiversion plus both overt and covert
technologies to combat counterfeiting
Track and Trace with Dual Serialization Tutorial
2D Barcode
(e.g., Data
Matrix)
Visible
(“Overt”)
4
Alphanumeric
Invisible
(“Covert”)
© 2014 Kodak
2. Coding and Aggregation
Implementation of the marking plan requires
design and application of workflows for both
the printing of codes and recording of
aggregations into the database.

CODING &
AGGREGATION
Applying Codes:
–  Codes are assigned by the software and are
applied with continuous inkjet industrial printers
Reading Codes:
–  Codes must be read for verification and for
entry into the serialization database
–  Standard industrial vision systems are
augmented with the technology for reading
covert serialization codes
Pallet
Resulting Data
Structure
Aggregation:
Case
–  A set of serialization codes are associated to a
case code to facilitate tracking by case
–  A set of case codes are associated with a pallet
code to facilitate tracking through distribution by
pallet (other aggregation hierarchies are
possible as well)
Track and Trace with Dual Serialization Tutorial
Bottle
5
© 2014 Kodak
3. Track Through Distribution
Overt case and pallet codes (and the overt
code on the product) are used in the
distribution channels to track product
movement and changes of custody
–  Typically requires interfacing with existing
systems
➌
TRACK THROUGH
DISTRIBUTION
–  May choose to only track to Brand Owner’s
first tier distributors or, additionally, enable
cooperation with other channel partners
–  Distribution partners do not need to know of
the existence of the covert code on the
product
Track and Trace with Dual Serialization Tutorial
6
© 2014 Kodak
4. Inspect
Products can be inspected at point of sale or at
channel partner sites. Inspections can be
performed as part of a routine program or when
diversion is suspected or discovered.

INSPECT
By Inspectors
–  Overt code can be inspected via smartphone to
determine product’s intended distribution path
–  If the overt code has been altered product
diversion is suspected. Brand Protection
investigator can then use Traceless AD Viewer to
read the covert code to obtain distribution path
–  If the overt code has been altered and covert code
is not present, then counterfeit may be suspected
–  Inspectors could be brand owner’s employees or
3rd party investigators
By Consumers
–  Use their smartphones to scan a QR code as part
of a brand loyalty program. Invalid codes
submitted to loyalty system may indicate
counterfeit
–  Patterns of product scans may be used to
discover diversion
Track and Trace with Dual Serialization Tutorial
7
© 2014 Kodak
5. Enforce
An online incident monitoring system is
utilized to aid enforcement.

–  Data input to the monitoring system is via
the “Inspect” phase
ENFORCE
–  System access via mobile devices including
smartphones
–  Web portals allow Brand Managers to
monitor all activities and make decisions
based on the results of authentication plus
automated system analyses
–  Fully configured dashboards and reporting
for Brand Management
–  High level view of all security issues
categorized by “Counterfeit,” “Diversion,”
“Recall”, and “Theft”
–  Brand Managers are able drill down to
details of each incident and view incident
locations
–  Automated and configurable reporting at a
global, region, and country level to monitor
incidents and support the enforcement
process
Track and Trace with Dual Serialization Tutorial
8
© 2014 Kodak
Authentication Technologies
Numerous technologies are available to Brand Owners to protect their brand. A layering of
these technologies is often called for that serve the needs for both quick detection and
deterrence and detailed investigation of sophisticated counterfeits and diversions.
The following defines some of the terms often used to describe authentication technologies:
Forensic
In-lab Analysis: small molecule or DNA marking, elemental or
compositional characterization, Raman spectroscopy, mass spectrometry,
energy dispersive X-Ray diffraction (EDXRD)
Covert
Concealed: emissive taggants, magnetic taggants, unique microscopic
particles, optically variable devices (OVDs) with proprietary viewers, surface
roughness measurements, chemically responsive inks, hidden images,
invisible mass serialization
Semi-covert
Semi-concealed: micro-printing, UV or single wave-length IR-excitable
fluorescent inks, customized threads, encoded marks, photo-chromic inks
Overt
Visually Seen: overt holograms, color shifting ink, thermo-chromic ink,
decorative/ornate packaging, guilloches or ornate engravings, engineered
print defects, overt mass serialization
Track and Trace with Dual Serialization Tutorial
9
© 2014 Kodak
For more information about
solutions from Kodak visit:
For informational videos about
Track and Trace, visit Kodak’s
Brand Protection channel on
YouTube:
www.kodak.com/go/brandprotection
http://bit.ly/1d7UWwt
Eastman Kodak Company
343 State Street
Rochester, NY 14650 USA
Track and Trace with Dual Serialization Tutorial
See the video, “Introduction to
Track and Trace Demonstration.”
10
© 2014 Kodak