Author: Kathryn Olivier

GemVision™ Camera System – Industry’s First CDI2 Fitness Solution

     |     


As the cash cycle continues to evolve, Central Banks are challenged to lower the costs associated with currency management while fighting new counterfeiting threats and improving the quality of circulating banknotes. The Authentix GemVision™ Camera System is the industry’s first CDI2 fitness solution. GemVision is powered by the Vision Inspector software solution developed by Boulder Imaging. The Vision Inspector solution allows for an unprecedented number of fitness related measurements to be made in a real time processing environment while operating on commercially available off the shelf Windows based servers. The high-speed (>40 banknotes per second), high-resolution (50-micron gray scale) imaging sensors and Image Evaluation Unit are designed in support of the new Common Detector Interface (CDI2) specification agreed to by the United States Federal Reserve Bank and the European Central Bank. This new standard allows for easy integration of 3rd party sensors into banknote processing systems.

This greatly helps cash visibility as it allows a Central Bank to select a fitness sensor with capabilities aligned to the fitness criteria that they value, whether it is accurate soiling determination, ink wear assessment on polymer notes or fitness determination of Level 1 features. Furthermore, the improved data access and direct control of note sorting provides Central Banks with the tools they need to increase cash cycle visibility. This CDI2 common specification also enables sensor fusion whereby results from sensors of multiple suppliers are combined to produce the best overall authentication and fitness decision for each processed banknote, bringing together ideas and solutions from various industry participants. GemVision provides unprecedented accuracy and speed for feature detection and fitness assessment of banknotes.

GemVision detection capabilities include:

• Detection of denomination, series and orientation of notes

• Multi-angle illumination and full color analysis for human-like fitness evaluation

• Industry-leading accuracy and repeatability for banknote evaluation results

• CDI2 compliant image/data streaming for use by other sensors and storage of combined data for research, analysis and system enhancements over time

• High accuracy (>99.99%) determination of serial numbers and smaller printed characters

GemVision Benefits for Central Banks:

• GemVision improves cash visibility by providing unprecedented access to banknote data and images acquired during high-speed banknote processing. This is significant to Federal Reserve Financial Services as it helps reduce the number of notes taken out of circulation prematurely.

• It increases the efficiency of banknote processing and extends the life of notes in circulation by making more intelligent sorting decisions regarding banknote authenticity and fitness.

• More intelligent banknote processing simultaneously reduces the cost of cash as well as its carbon footprint.

• The CDI2 standard also makes it easier for Central Banks to optimize processing environments by selecting their detectors from multiple suppliers. The new standard is further projected to be adopted industrywide by most Central Banks over the next several years and will provide far greater control for the processing of banknotes and make it easier to select best in breed detection platforms in the future.

• It enhances fitness sorting and lowers the cost to manage cash by decreasing the rate of pre-mature shredding events. In addition, it provides central banks with improved access to the sorting decisions and the data behind these decisions.

Enhanced note fitness assessment is driven by the sensor fusion and directly controlled by central banks regarding note sorting decisions. This enables central banks to assess the quality, wear and authenticity of banknotes with greater accuracy and precision. It empowers central banks to make more informed decisions regarding the circulation and withdrawal of currency, optimizing cash management strategies, maintaining the integrity of the currency supply and reducing the cost of currency management by lowering the rate of erroneous shredding of otherwise fit banknotes.

The most reliable High-Speed Fitness Sensors for Cash Processing

The Common Detector Interface 2 standard was jointly created by the European Central Bank and the U.S. Federal Reserve. The U.S. Federal Reserve is the first central bank to specify the standard as part of its upgrading of the cash processing environment. This is part of an unprecedented overhaul of the cash processing operations.

A key part of the standard is the Camera Sensor and Fitness Solution. Part of the requirements focus on the note presentation and specify a “belt free view” which enable a higher level of fitness evaluation as compared to transportation approaches where the note is partially obscured by transportation belts. More accurate fitness determination leads to better visibility regarding the quality of notes in circulation. The highly accurate reading of serial numbers and series year information supports note fitness monitoring programs where the change in fitness of a note is evaluated over time. The improved access to sensor data and the sharing of data between systems will lead to more insightful analysis regarding note quality determination.

Authentix and Boulder Imaging collaborated with the specification groups within the ECB and FRB by providing feedback on the standards. This was important as key learnings regarding a new standard are typically revealed the first time systems are built following the new specification.

Authentix and Boulder Imaging also chose to go beyond the base requirements of the standard and to implement note image capturing techniques and image processing algorithms that make it possible to assess the fitness of overt features. This is particularly important regarding cash visibility as these are the features that the public most relies upon to confirm authenticity and fitness. Unless the quality of these overt features is being inspected, a central bank is not receiving a complete view of the quality aspects of a note that may impact how the note is used by the public and retail sectors.

Capabilities that extend beyond the CDI2 requirements for the GemVision Camera Sensor and fitness solution include:

• High resolution (100 μm) full color images are captured at note speeds exceeding 10 meters per second (>40 notes/sec) that allow a high accuracy (less than 1 misread in 10,000 notes) of small text items such as the series year and intaglio plate letters and numbers. High-resolution images are also used to confirm the IR transparency of inks, the presence of windowed threads and resolve serial numbers and other text features.

• Balanced illumination is created by a pair of LED illuminators each at a precise angle to the plane perpendicular to the note motion. By capturing full color reflectance images using both balanced and asymmetric illumination, GemVision confirms the presence and activity of overt features. This creative imaging approach also determines if the quality of the overt feature has degraded over time and factor this information into the note fitness decision.

• Another unique innovation is detection of crumples and creasing on banknotes. The presence of shadows on GemVision images provides valuable information which can be used to determine the fitness of the note or the fitness of tactile features provided for the visually impaired.

• Novel scattering and shadow mask transmission images – GemVision relies upon a creative solution of using two types of scattering images to assess the fitness and authenticity of a banknote. A scattering transmission image is captured by the “back side” sensor housing while the balanced reflection image is captured on the “front side.” As the illumination is arriving on the note at an angle, the transmission image is created by light that is scattered forward into the collection optics. From these images GemVision confirms the presence of embedded security threads, paper “bridges” on windowed threads.

Using next-generation technology for the most reliable banknote security

• GemVision takes advantage of sensor fusion capabilities through the establishment of an Image Data Bus (IDB) to share images and a Data Machine Bus (DMB) to share denomination and orientation results made by the Camera System and its Image Evaluation Unit combined. This allows downstream sensors which require information such as the note denomination, orientation or series to receive this information from the DMB without having to generate an independent result. An aggregator module also supports sensor fusion allowing central banks to pool and weight multiple results from a collection of sensors to determine sorting decisions.

• CDI2 standard has not only disaggregated the sensor from the sorting machine but also disaggregated what was previously viewed as “the fitness sensor” into a Camera System and a separate Image Evaluation Unit. This means that entities with novel approaches to inspect a banknote or the analysis of the CDI2 images can choose where to focus using solutions like GemVision. Instead of providing a complete Camera System and IEU solution, they could target one or the other, either providing a new Camera System hardware design or connecting a device to the data buses to process the images that are shared with all sensors. This additional utility could replace an IEU or augment its results with additional image processing variables, potentially bolstering fitness results, authentication results and help Central Banks with complete cash visibility.

Conclusion

With nearly 20 years of high-speed sensor development experience, Authentix is a trusted partner for central banks and understands the complexity of the cash industry. Similarly, Boulder Imaging has been helping industry partners solve challenging inspection problems for over a decade. The top capabilities of each organization helped to make GemVision and its unprecedented fitness measurement capabilities a commercial reality. The industry will benefit greatly as CDI2 fitness solutions like GemVision become the industry standard and consequently introduce new and innovative ideas for collaboration among multiple stakeholders in the cash cycle.

Please contact us to learn more and schedule a meeting with one of our currency experts.

Download the PDF

Authentix Becomes Member of The Business Council for International Understanding (BCIU)

     |     

Authentix has been accepted as a new member of The Business Council for International Understanding (BCIU), which promotes international trade through special events and collaborations. BCIU works closely with the U.S. Department of Commerce and maintains good relationships with U.S. Embassies across the world, giving its 150+ member companies access to high-level connections for foreign commercial opportunities. This membership will enable Authentix to expand its global footprint and leverage BCIU’s extensive network to foster new business partnerships. Authentix looks forward to participating in BCIU’s initiatives and contributing to the organization’s mission of enhancing international trade. For more information, visit the BCIU website.

Authentix® Promotes Noreen Ang to Chief Financial Officer

     |     

Addison, Texas – 10 February 2025 – Authentix, Inc. is pleased to announce the promotion of Noreen Ang to the executive position of Chief Financial Officer. Ms. Ang joined Authentix in 2014 and has held positions of increasing responsibility during her tenure with the most recent title of Vice President, Corporate Controller since 2020. In her role as CFO, Ms. Ang is responsible for integrating business and finance strategy to further expand the global presence of Authentix and drive growth into key markets. She also oversees global finance, treasury, accounting, and taxation activities.

Bringing over twenty years of global financial leadership in the public and private sectors, Ang’s career began in public accounting with PricewaterhouseCoopers, and she has served in multiple senior roles including with NCR Corporation and Overhead Door Corporation, prior to joining Authentix. Ms. Ang holds a Bachelor of Science in Accounting from The University of the Philippines and is a licensed Certified Public Accountant.

About Authentix: As the authority in authentication solutions, Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products.

Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, and Africa serving clients worldwide. Media Contact: Kent Mansfield, Chief Sales and Marketing Officer – kent.mansfield@authentix.com

AI-Generated Visual Content and IP Challenges

     |     

This Authentix article has been published as a part of the Asia Video Industry Association’s Asia Video Report 2025. To learn more, please visit their website.

By Bharat Kapoor, Vice President, Online Brand Protection, Authentix

The creation of AI-generated visual content has profound implications for IP owners, especially in the context of copyright. When AI engines scrape images and videos to create new works, the critical question is whether such processing amounts to “reproduction” under copyright law. There also arises the vexed question of whether an AI-generated visual work is independently entitled to copyright protection. The few disputes that have so far reached courts have left many questions and concerns unaddressed. For example, in Getty Images v Stability AI (2023), Getty Images claimed before the UK High Court that Stability AI scraped millions of its copyrighted images to train its AI engine. While the court allowed the case to proceed to trial (finding that it involved a novel and previously undetermined question of law) it remains to be seen whether the parties decide to settle, thus scuttling the development of judicial guidelines on the subject. In Kneschke v LAION (2024), the Hamburg Regional Court in Germany rejected a similar claim by a stock image photographer against LAION, a non-profit AI company. Somewhat controversially, the court allowed LAION the benefit of an exemption normally reserved for research organizations. If courts begin to lean in this direction globally, copyright owners will struggle to be renumerated fairly. Given the deep links between certain non-profits and major tech companies, such an outcome might even be seen as patently unjust. Meanwhile, in Thaler v. Perlmutter (2023), the US District Court in Columbia upheld the US Copyright Office’s denial of copyright in an image created using AI, ruling that “human authorship” is a necessary ingredient of copyright ownership. But the ruling arguably fails to provide guidance in situations involving human authorship assisted by AI, or the highly creative use of an AI engine where the user goes beyond dictating mundane commands.

Alongside copyright, an overlooked area involves the use of trademarks in the creation of AI-generated visual content. To illustrate, Authentix Online Brand Protection conducted an experiment where multiple AI apps were instructed to create hundreds of images using well-known trademarks in (arguably) dilutionary contexts. The results were mixed. Some engines did not use the specified trademarks, contrary to our commands. Some slightly altered the specified trademarks and then used these versions. And some used all kinds of trademarks uninhibitedly, in contexts that would probably displease trademark owners (such as Ronald McDonald advertising KFC). Depending on context and jurisdiction, such uses might be prohibited as dilution/tarnishment, or permitted under fair use/criticism/parody exceptions.

In the end, AI can make the process of creating high-quality visual content quicker, easier, cheaper, more accessible and more scalable. This can benefit not only novice or low-budget content creators, but also large corporations wishing to expand their reach through social media. However, IP rights owners will likely argue in favor of laws and regulations governing the use of IP by AI engines. Rights owners may also advocate the adoption of licensing regimes (as a possible harbinger, OpenAI has reportedly been offering news organizations between USD 1 to 5 million in licensing fees to train its AI model). In both cases, copyright-related principles will probably be easier to concretize into laws and norms than trademark principles, and also receive higher prioritization. Yet, in all this, a fact that could be missed is that Western nations no longer monopolize the development of AI. AI engines that place IP owners at risk may well emanate from emerging Asian economies, with contrary viewpoints on the boundaries of IP protection. The bigger challenge for IP owners, therefore, may lie in ensuring the global acceptability of IP norms and the consent of governments and AI developers from emerging economies in the framing of such norms.

About Authentix Online Brand Protection

Authentix provides some of the world’s most recognizable brands with sophisticated online brand protection tools and services to address a broad range of online infringement and counterfeit risks. From global online surveillance and enforcement, online investigations and site takedowns, target verification, and even offline investigations, Authentix helps major brands proactively reduce the threat of counterfeit products being sold online. Our online brand protection solutions combine cutting-edge technological tools and expert analysis to reduce infringements for our clients on online marketplaces, social media platforms, and websites by up to 90%.
Want to see what Authentix OBP can do for your company? Our team is committed to working with you, understanding your unique challenges and requirements, and providing tailored solutions that best fit your industry and the unique challenges your brand faces that make a tangible difference to your brand. Schedule a consultation with one of our brand protection experts to learn more.

Bharat Kapoor, Vice President, Online Brand Protection, Authentix
Formerly the CEO of Strategic IP Information Pte, now a part of Authentix, Bharat has been focused on building effective global brand protection programs for over 250 brands across sectors such as fashion, FMCG, pharma, cosmetics, sporting goods wines, and spirits. He has led the development of the best-in-class machine learning-based online brand protection technology and developed effective global teams to investigate counterfeiting and piracy on the ground in China, Asia, and Latin America. Bharat Kapoor has a B.A. Honors from the University of Technology, Sydney. Prior to joining SIPI, he was an Associate Director at Ernst & Young India, where he led the business development and advisory services program for companies operating in the media, e-commerce, and advertising sectors.

Combating illicit trade with tailored, multilayered brand protection strategies

     |     

This Authentix article has been published as a part of World Trademark Review’s Anti-Counterfeiting and Online Brand Enforcement: Global Guide 2024. To learn more, please visit their website.

By Kristi Browne, Authentix

Counterfeiting, smuggling, diversion and infringement – collectively known as illicit trade – are growing global problems for businesses and consumers. With an increasing volume of counterfeit goods being trafficked globally and seeping into supply chains, a well-strategised brand protection programme is more essential than ever to shield what matters most to businesses: customers, brand identity, reputation and revenue.

This growing epidemic of illicit trade extends across a multitude of industries, including food and beverages, pharmaceuticals, health and beauty, apparel and a host of other consumer and commercial products. Its effects translate into financial losses for brand owners and, more importantly, added risks to consumer health and safety. Falsified products manufactured without regard for standards, required ingredients, quality control or government oversight can imperil consumer safety and create a lack of confidence in a trusted brand.

Steps for developing and implementing a brand protection strategy

 

 

 

Creating a brand protection plan for companies means working together across different parts of the company and locations around the world. It also means building relationships with outside groups like Customs, police and government agencies, as well as stores, websites and suppliers.

The following steps are recommended when developing an effective brand protection programme.

1. Early evaluation: Before a company can take advantage of these benefits, it needs to fully understand how serious and widespread the problem of theft can be. The first step is to evaluate the problem. It is also important to evaluate which anti-counterfeiting security methods work best for a company’s product and industry. This will allow the brand owner to get the necessary information on possible security features and packaging design that might be required as part of the final product launch.

2. Risk assessment: When identifying product risk, it is important to develop a risk inventory for the products. The level of risk associated with each product will differ depending upon a multitude of factors, including supply chain complexity, geography in which the product is sold, price points, margins, complexity to copy and total expected demand. The next step is to assess the potential brand damage. With brands being among a company’s most valuable assets, the fragile bond of trust between consumers and products cannot be risked. Any injuries or deaths caused by counterfeits can destroy this relationship. Top management should be aware of this risk and committed to demonstrating leadership on the issue. Brand protection managers and the marketing team should also be involved and participate in assessing the risk of counterfeit attacks and the value of all proposed strategic solutions.

3. Strategy development: At this point, responses to the most pressing threats can be translated into action by organising a method for management, information and technology tools to respond to threats. This is also the time to allocate resources appropriately based on risk areas and to draft a communications plan that covers potential causes of risk, avoidance actions, transference and mitigation actions, and potential impacts and contingency actions.

4. Detection and monitoring: To effectively protect a brand against counterfeiting, businesses must employ comprehensive detection and monitoring strategies that show dedication to enforcing their intellectual property rights and prosecuting violators. This includes implementing a variety of security features on product packaging, conducting educational campaigns for public awareness, enhancing legal penalties for counterfeiting, inserting strict anti-counterfeiting terms in vendor contracts and performing unscheduled audits on distribution partners.

It is also crucial to vigilantly monitor online and physical marketplaces for unauthorised sales, fake profiles and counterfeit listings, and to deploy anti-phishing software. This is essential to detecting threats early and acting swiftly to mitigate brand infringement.

5. Enforcement: Keeping a brand safe means making sure that rules and responsibilities related to intellectual property are properly observed, both online and in the physical world. This task often requires collaborating with the right authorities to handle issues like illicit manufacturing, copyright infringement and counterfeit products being sold, shutting down fake websites, and taking down counterfeit listings.

6. Data analysis, reporting and KPI tracking: Businesses should prioritise thorough reporting and analysis, as well as the tracking of key performance indicators in order to monitor the effectiveness of a brand protection strategy and prevent counterfeit activity as much as possible. This enables them to assess the extent of intellectual property violations and tailor strategies to enhance security measures, moving beyond mere takedown metrics to focus on substantial reduction of infringements. By shifting their perspective on brand protection from a cost to a strategic investment, companies can not only safeguard their assets but also unlock new revenue streams through focused and outcome-oriented actions.

What brand protection solutions are right for my company?

Anti-counterfeiting features may be both overt and covert and can be applied in many ways. These include in-product, on-product in the form of labels and closure seals, on cartons where containers of products are stored, into plastic parts of individual packaging, and even onto metal and glass components of packaging.

Each feature serves a unique purpose. Covert or invisible markings enable trained inspectors to quickly authenticate genuine products in the supply chain, identify the source of diversion, or determine other illicit activities. Overt features allow the end consumer to verify the authenticity of their purchased product. When combined with careful design and production quality controls in authentic product manufacturing, these features raise the bar of complexity for counterfeiters and make the product a less attractive target.

Overt security

Visible security features are valuable to product authentication. Such measures include holograms, colour-shifting inks and security threads that are visible to the naked eye or felt by touch, and that are difficult to reproduce or copy. Other examples include microtext, thermographic ink and even micro-optics (such as the blue lenticular strip found on the current US $100 bill).

Although visible security features are a starting point, counterfeiters are creative. Even if a visible authentication feature is hard to recreate perfectly, a counterfeiter with the right tools and illegal intent only needs to copy it closely enough to confuse a consumer who just glances at a package. Additional measures create layers of security that make it more difficult, even impossible in some cases, to copy or duplicate security features.

Overt security tactics can include:
• optically variable inks;
• nano-optics with 3D vivid motion, depth and colour;
• colour-shifting foils and inks;
• holographic/pictorial foils;
• pearlescent inks;
• gold and silver inks;
• thermographic ink;
• microtext;
• anti-tampering technologies (tamper-evident closures and labels); and
• optical security technologies (holographic seals and labels).

Covert security

High-security covert features can be embedded into labels, closure seals or other features of product packaging. Although these covert markers are invisible to the naked eye, they can be found and measured with specialised handheld instruments using proprietary optics and detection algorithms for rapid, secure field authentication. Additional forensic layers of security can be embedded into materials and confirmed through more extensive laboratory analysis for evidence to further prosecute profiteers.

Covert security tactics can include
• heat-activated inks;
• light-activated inks;
• fugitive inks;
• inks or materials with specialised fluorescing taggants;
• ultraviolet activated inks; and
• machine-readable electro ink.

Semi-covert security

As the name suggests, these are features that might not be noticed until someone closely examines the product or package.

Forensic security

Forensic analysis involves laboratory testing of products via an embedded component or molecule added to a substrate or solution to determine authenticity. Unique product elements are examined so brand owners can generate compelling evidence of counterfeiting for legal proceedings. However, the ability to trace a product back to its origin is not supported unless a unique hidden tracing element is added to the product.
• Chemical and physical markers: These can be hidden from consumers and counterfeiters and can only be seen with specific detectors that are calibrated to a specific wavelength to verify authenticity.
• Tamper-evident packaging: These are labels, stickers or seals that, when opened or tampered with, provide immediate evidence that the product has been compromised.
• Serialisation: In the serialisation process, a company applies individual unique codes and/or signatures at the point of manufacture (giving each product an identifiable attribute) and defines scanning locations where retrieval and association of the unit can be linked to the scanning transaction. These transactions uniquely capture, track and store data from those markings in a managed database that allows authorised personnel to monitor the product journey by unit or larger groups. Most are familiar with this process as it applies to shipping a package overnight, where it is tracked online until it reaches its destination.
• Digital QR codes: Products can be scanned and authenticated without the need for an app, using a smartphone camera that can then further engage consumers by directing them to other web pages where they can register their warranty, learn more about the product, and even suggest other complementary products. As the product travels through the supply chain, the unique number or symbol can be collected in the database and added to its history. This information is available to a credentialed user via a mobile app or localised database. In a track and trace system, for instance, the information flow can be bi-directional, so the collection of the symbol, the scanning event and the unique call to the database can be recorded and appended to the product record for verification purposes.
• Online brand protection: The rise in online sales has unfortunately been accompanied by a rise in counterfeiting on online marketplaces, social media platforms and websites. Online brand protection tools include keyword monitoring, logo detection, image matching and the use of advanced brand protection technology like artificial intelligence and machine learning. Online brand protection allows your company to easily scan web pages and marketplaces, social media platforms, e-commerce apps, messaging apps like WeChat, payment sites and the dark web for infringing content and listings and get them taken down.

Case study 1: Pharmaceuticals

The challenge

Counterfeit copies of a major pharmaceutical brand were turning up in the US market, but the brand had no security measures in place to allow patients or inspectors to tell real products from fake. Consequently, $1 billion worth of product, already in the distribution pipeline, could not be sold until a method of allowing patients and retailers to verify that the medicine is authentic could be implemented.

The solution

The customer’s product was repackaged to include a variety of authentication features that could be identified by patients and inspectors, both in the field and in the laboratory. These included:
• overt, colour-shifting inks that were readily distinguishable by patients;
• covert, machine-readable inks that could be detected in the field by inspection staff with appropriate readers; and
• forensic markers that could only detected under laboratory analysis.

The outcome

The solution to the customer’s counterfeiting problem provided a secure way to instantly differentiate authentic from counterfeit medicines. The benefits were immediate and significant:
• $1 billion worth of product frozen within the supply chain was released for sale;
• the expense of a full product recall was averted;
• the customer was able to mitigate the risk of potential lawsuits; and, most importantly,
• confidence in the brand was restored among physicians, pharmacists and patients.

Implementing a multilayered approach: How brand protection works

The reality today is that one level of security is rarely sufficient. Counterfeiting technology is constantly evolving, so a simple one-dimensional technology to combat illicit trade isn’t enough. An effective multilayered approach in which overt, covert, and forensic features are applied is the most effective long-term solution.

These features can be incorporated into labels, closure seals, storage cartons, plastic, metal and glass packaging at very reasonable costs. Each type of feature serves a unique purpose, from colour-shifting inks that allow end-users to quickly identify a branded product as genuine to covert markings that enable an inspector to identify many factors involved with the source of authenticity.

Multilayered security options include:
• overt;
• covert;
• forensic;
• online monitoring;
• analysis – data collection and insight; and
• intellectual property and trademark enforcement.

Since any trademarked product can be counterfeited, it is imperative to have a brand protection strategy in place.
An effective brand protection programme spans many company departments, including marketing, legal, production, design, supply chain and logistics. That is a lot of moving parts to manage internally while companies are already busy making and selling the best products possible. The time these departments can dedicate to brand protection can be severely limited.

Having an external brand protection partner allows companies to have an entire team of experts in their corner, providing custom brand protection solutions built for each company’s unique situation using the most advanced technology paired with expert analysis.
A brand protection partner will also be able to share valuable insights and analytics to make further recommendations for what next steps the company can take to combat counterfeits. Brand protection partners can work with external teams, including law enforcement, border authorities, and investigators, to tackle counterfeit products at the source.

Case study 2: Wine and spirits

The challenge

A spirits brand based in South America needed help addressing counterfeiting and adulteration. It was losing millions in sales and experiencing a 30–40 per cent counterfeit rate, which put public safety and brand reputation at risk. An authentication solution was needed to make it easier for law enforcement and health agencies to distinguish authentic from counterfeit products in the field.

The solution

Multilayered security options were implemented throughout the programme, including a combination of in-product, on-package marking, and distribution channel monitoring. For on-package authentication purposes, an overt feature was added as tamper evidence for consumers and a covert feature was added for official retail inspectors to detect via handheld field verification readers and test kits. In addition, covert features were incorporated into the spirit itself for field and forensic lab verification.

The outcome

• Within the first year of the programme, 75 million litres of spirits were protected (approximately 100 million bottles).
• More than 1,300 inspectors in 28 states inspected more than 300 retail outlets.
• Of these, 10 per cent were found to contain counterfeits; five retail outlets were investigated, resulting in arrests.
• The brand owner experienced a 25 per cent increase in sales over the same period.

Conclusion

Employing an effective brand protection solution brings a wide range of benefits to businesses. Improving sales and revenue is always important in any industry. By eliminating infringements and counterfeits, a company can increase revenue and market share.

Having a brand protection partner that manages detecting, monitoring and taking down counterfeiters allows businesses to save valuable time and focus on producing and selling instead of worrying about bad actors. Customers will also notice a rise in brand standards once the lower-quality infringing products are removed from the market. This generates goodwill and improves brand reputation.

Eliminating low-quality, counterfeit products not only saves businesses from financial drain but also solidifies their reputation among consumers and partners alike. This newfound trust translates into lasting customer loyalty and gives businesses a competitive edge. Additionally, brand protection strategies reduce legal risks and provide actionable insights by having greater supply chain visibility and data, setting the company up for even greater success.

For a more complete guide to brand protection- why it is necessary, how infringement harms brands and customers, how to develop and implement an effective program, and insights into the brand protection strategies of the future – download our Complete Brand Protection Guide.

Download the Guide

About Authentix

As the authority in authentication solutions, Authentix can help brands create a customized plan to tackle counterfeit products from every angle, collect actionable data, and protect brands and consumers. Authentix works with each company to determine which brand protection solutions are right for their situation.

Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products. Through a proven partnership model and sector expertise, clients experience custom solution design, rapid implementation, consumer engagement, and complete program management to ensure product safety, revenue protection, and consumer trust for the best known global brands on the market. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, and Africa serving clients worldwide.

How to Protect Your Critical Documents From Counterfeiting and Fraud

     |     

Discover the importance of secure document protection in preventing fraud when printing certificates, tax stamps, visas, and brand protection labels. Advanced technologies and security solutions, including complex personalized artwork, and anti-counterfeiting techniques allow you to add multiple layers of security to your documents. Watch the video to learn more about the latest secure printing solutions. 

Can a Company Be Truly Sustainable Without Preventing Counterfeits?

     |     

Discover how sustainability and anti-counterfeiting solutions work together to protect brands and the environment. Watch this video to learn how preventing counterfeits can reduce pollution and exploitative labor practices.

Want to learn more about what brand protection solutions are right for you? Schedule a consultation with our team today.









By clicking on the button below, I accept the Terms of Use and Privacy Policy as provided through the Authentix® website (www.authentix.com) including the use of individual personal data subject to the EU Data Privacy Act 2018 and General Data Protection Regulation (EU/GDPR)

The Global Problem of Fake Food

     |     

By Ryne Ambrose, Brand Protection Sales Manager, Authentix

In recent years, the food industry has faced a growing challenge: food fraud. This issue has been exacerbated by the rise of e-commerce, where consumers increasingly shop for groceries online. While this shift offers convenience, it also opens the door for bad actors to sell counterfeit products, misleading consumers and posing significant risks to both health and brand reputation.

Understanding Food Fraud

Food fraud encompasses various deceptive practices including substitution, tampering, and counterfeiting. Substitution involves mixing lower-quality materials with products to increase profit margins. Tampering involves the addition of non-approved ingredients that may be dangerous or toxic. Counterfeiting is passing off an illegitimate product to mimic the genuine for ill-gotten profits or gain. These practices not only attempt to deceive consumers but also can pose serious health risks as well. For instance, a study by the University of California found that 69% of store-bought extra virgin olive oils in the U.S. were likely fake, failing to meet international standards.

The Impact on Consumers and Brands

The consequences of food fraud are far-reaching. For consumers, the risks include exposure to unidentified allergens or hazardous ingredients. As awareness of these risks grows, many consumers are becoming more vigilant about food safety. For well-known brands, the stakes are equally as high. Food fraud can severely damage the brand’s reputation and erode consumer trust. This underscores the importance of companies taking proactive measures to protect their investment in a premium brand as well as their consumers health and trust.

Preventing Food Fraud

There is no single solution to prevent food fraud; instead, an effective prevention program should include a combination of approaches. One key strategy is conducting supplier risk and vulnerability assessments. By identifying partners and assessing the level of vulnerability associated with the fulfillment of these orders, brands can often determine where to focus monitoring efforts and implement security measures. Building strong supplier relationships is crucial, as effective supplier management is essential for maintaining oversight on supply chain risk.

Another important tool is the Hazard Analysis & Critical Control Point (HACCP) concept, which has been extensively used to control food safety risks in the food industry for decades. Investing in technology to proactively remove fraudulent online listings is also vital. The right technology can detect fakes across various online channels and enforce intellectual property efficiently.

Brand Protection for the Food Industry

Brand protection for the food industry should involve a multifaceted approach that safeguards a brand’s unique identity, quality, and intellectual property. This involves a blend of strategies and legal tools designed to protect everything that makes a food brand special, from its name, logo, and packaging to its secret recipes and distinctive flavors. Effective brand protection ensures that every product bearing the brand’s mark meets consumer expectations, preserving the brand’s reputation and authenticity.

Methods for Brand Protection

Several methods can be employed to protect food brands from threats. Trademark registration provides legal defense against infringement and counterfeiting. Securing patents for unique food processing methods or recipes and maintaining trade secrets with confidentiality agreements can protect innovative products and production techniques. Implementing rigorous quality control measures and obtaining certifications like ISO or HACCP can assure consumers of product quality and safety.

Supply chain management is another critical aspect, as establishing a transparent and secure supply chain with trusted suppliers and distributors helps prevent the introduction of counterfeit products. Utilizing covert and/or overt anti-counterfeiting technologies and tamper-evident packaging can also help consumers and company inspectors alike to help identify authentic products. Monitoring the internet and social media for unauthorized use of the brand and employing digital watermarking and tracking technology for product traceability can also be an effective tool today’s digital age.

Conclusion

Proper risk assessment, supply chain analysis, and deploying brand protection technology in the food industry is essential for ensuring product integrity, consumer trust, and long-term success. By leveraging a combination of food regulation, innovative technologies, and digital solutions, companies can effectively protect their brands, detect and combat food fraud and maintain their standards. A robust brand protection strategy is indispensable in the digital age, safeguarding the culinary experience that consumers expect and trust.

Contact Authentix today to learn more about how our brand protection strategies can help maintain your brand’s integrity in the global marketplace.

About Authentix

As the authority in authentication solutions, Authentix brings enhanced visibility and traceability to today’s complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products. Through a proven partnership model and sector expertise, clients experience custom solution design, rapid implementation, consumer engagement, and complete program management to ensure product safety, revenue protection, and consumer trust for the best known global brands on the market. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, Australia and Africa serving clients worldwide.

Ryne Ambrose, Brand Protection Sales Manager, Authentix
With a decade of dedicated service in the brand protection and supply chain industry, Ryne Ambrose is a seasoned expert in safeguarding brand integrity and optimizing supply chain operations. Ryne is well-versed in implementing cutting-edge brand protection strategies. He has a proven track record of identifying and mitigating counterfeit products, trademark infringements, and unauthorized distribution channels. He also possesses a deep understanding of supply chain dynamics. He has consistently contributed to streamlining operations, reducing costs, and enhancing efficiency within distribution centers.
To learn more about Authentix’s brand protection solutions or have general questions around your brand and supply chain, please email ryne.ambrose@authentix.com.

Banknote Technology Report Features Authentix

     |     

Authentix was recently featured in the 2024 Banknote Technology Report Anniversary Edition published by Banknote Industry News which provides valuable insights from leading banknote suppliers regarding technological advancements, innovations and trends in banknote production.

In the report, Authentix shares how we’re redefining banknote security with next generation nano optic overt technology, level 3 covert solutions, and high-speed fitness sensors for cash processing.

Read the Authentix articles here.

To download a copy of the full report, visit: https://www.banknote-industry-news.com/btr10

The Art and History of Intaglio Printing

     |     

Intaglio printing is a laborious and expensive process that combines historical craftsmanship with modern technology. Learn about the intricate details of this printing technique, its applications in security printing, and the evolution of the process from traditional engraving to computer-controlled laser etching.

Download PDF.

Back To Top