Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 49

2.2 Supply Chain Security Solutions to address the risk scenarios

Step 6 – Distortion of competition.

If the supply chain is secured through the use of this multilayer technology solution, criminals may find it more difficult to implement their criminal plan and distort competition. This can be seen as a by-product of the implementation of the technology.

Scenario 3: E-commerce: criminal infiltration of online supermarket chains for home delivery of fake food Step 1 – Control of legitimate e-operators. Step 2 – Selling fraudulent food as genuine through the controlled e-supermarkets.

Through the creation of a strong ID for the product through its biometric properties and the control of its movements. However, since in many cases the product is directly sold to the final consumer avoiding any other intermediary passages, consumers may also have a role to play in this case.

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app. Step 4 – Creation of dedicated social network groups/pages to sell fraudulent products to final customers.

2.2.5 Innovative marking methods and satellite integration Technology submission 5 Multilayer security linked to the use of blockchain is also a key element in a different submission received. The proposed technology solution comprises a blockchain with a bridge-database, combined with accurate time and position data from satellite navigation, and an option to digitally encrypt data from a product-level food signature at origin to verify against printed packaging codes, using cryptographic keys. The blockchain can be public or private, or a combination of both, depending on the user groups involved. A trusted computing platform is used to secure interfacing to the internal systems of manufacturers. The different processes offered by this technology solution can be divided into: 1) Product fingerprint: The unique identification of the product (characteristics or chemical fingerprint) is obtained and linked to the traceability system. It can be read by using a smartphone or through a fast μ-level-3D scan if the digital fingerprint is on the product. At its current stage, the use of a chemical fingerprint is a proposal that can be adopted in this technology option if a partnership is created with other providers that have developed the technology or if it will later be developed by the company. 2) Primary packaging: The initial digital fingerprint is linked to the primary packaging using cryptography to create a code. This code is verifiable by scanning it with a smartphone. 3) Further package: If the product needs further packaging, the process can be repeated. The code on the new package is linked to the other different codes used, starting with the product-linked code. All barcodes are uploaded to the blockchain. 4) Blockchain tracking: Blockchain is used to protect the product fingerprint and the rest of the cryptographically secured codes that were used for packaging. The data is logged in a “bridge-database”

48


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.