Fighting a Growing Global 2 Trillion USD Counterfeiting Market: The Role of Advanced Technologies in Product Safety & Secure Data Exchange

How Digital Identity, Verifiable Digital Product Passports, Traceability, and Anti-Counterfeiting Technologies are Securing Global Supply Chains and Protecting Consumers

Carsten Stöcker
23 min readJun 16, 2024

Abstract

The integration of Verifiable Digital Product Passports (vDPPs), Component or Finished Good Traceability, Anti-Counterfeiting Feature Verification (ACFV), Identity Wallets, and Authorized Trading Partner (ATP) Credentials represents a significant advancement in securing global supply chains. This convergence enhances supply chain visibility, ensures product authenticity, and provides robust protection against counterfeit goods, thereby safeguarding consumer and employee safety. By adopting these technologies, stakeholders can mitigate economic losses, ensure regulatory compliance, and improve product quality. This integrated approach is crucial for fostering trust and reliability in the marketplace, making it an essential strategy for modern supply chain management.

However, Digital Product Passports (DPPs) can be rendered ineffective if there is a significant presence of counterfeit products in the market. Additionally, the emergence of Generative AI (GenAI) generated fake DPPs for counterfeit products poses a new threat. At Spherity, we have already created fake DPPs using our Custom GenAI DPP integration in our laboratory at scale and fully automated, demonstrating how easily these can be fabricated. Therefore, it is imperative to merge verifiable DPPs (vDPPs) with secure product authenticity verification methods, akin to the security measures used in money printing. This should be a focal point for DIN and JTC24 standardization efforts to ensure the reliability and security of DPPs.

Much of the work on secure digital identity and anti-counterfeiting measures has been done in collaboration with the PharmaLedger R&D project.

Huge Counterfeit Problem to be solved:

Hypothesis: Merging vDPPs with Multi-factor Product Authenticity (MFPA) capabilities

The integration of Verifiable Digital Product Passports (vDPPs), Finished Good Traceability, Anti-counterfeiting Feature Verification (ACFV), Identity Wallets, and Authorized Trading Partner (ATP) Credentials is converging to enhance supply chain security by providing comprehensive visibility, ensuring product authenticity, and preventing the distribution of counterfeit goods.

Learning from ‘Money Printing’: Ensuring Product Authenticity with Multi-Factor Security

National mints utilize a sophisticated combination of serial numbers and multiple security features to safeguard the authenticity of banknotes. This multi-factor approach, which can be applied to other products, relies on the unique attributes of each note and advanced technology to prevent counterfeiting.

Serial Numbers: Each banknote is assigned a unique serial number, ensuring no two notes are alike. This uniqueness means that counterfeiters would need to create distinct serial numbers for each fake note, significantly increasing the complexity and cost of production. Banks and financial institutions record these numbers, allowing them to trace and flag notes that are lost or stolen, and detect duplicates during sorting and processing​ (Banknote World)​​ (Reserve Bank of Australia Banknotes)​.

Security Features: Banknotes incorporate various security features that are difficult to replicate. These include:

  1. Watermarks: Embedded during the paper manufacturing process, watermarks are visible when held up to light. They add a layer of complexity that is hard to duplicate​ (Banknote World)​.
  2. Holograms: These are incorporated into the note using security threads, stripes, or patches, providing a visible and tactile method to verify authenticity​ (Visual Capitalist)​.
  3. Microtext: Tiny text printed on the note that is only readable with a magnifying glass. This feature adds another level of difficulty for counterfeiters​ (Reserve Bank of Australia Banknotes)​.
  4. Color-Changing Ink: Certain areas of the note change color when viewed from different angles, making it easy for the public to check without special equipment​ (Reserve Bank of Australia Banknotes)​.
  5. UV Fluorescent Inks: These inks become visible under ultraviolet light, revealing hidden details that are not seen under normal lighting conditions. This feature can include serial numbers or other specific images that light up under UV light​ (Banknote World)​​ (Reserve Bank of Australia Banknotes)​.
  6. Security Threads: Embedded within the paper, these threads are often visible only under certain conditions, such as UV light, and can include micro-optics to add further complexity​ (Banknote World)​.

By combining these multiple security features, national mints create a robust system that ensures the authenticity of banknotes. This multi-factor product authenticity (MFPA) approach can be adapted for use in other sectors, where each product is protected by a unique identifier (like a serial number) and several layered security features. This system not only deters counterfeiters but also provides a reliable method for verifying product legitimacy, ensuring the integrity of the supply chain from manufacturer to end-user.

Introduction:

In the complex landscape of global supply chains, ensuring product authenticity and integrity has become increasingly challenging. Counterfeiting poses significant risks, from financial losses and regulatory non-compliance to serious health and safety concerns. To combat these issues, a convergence of advanced technologies is emerging, promising to revolutionize supply chain security. This article explores the integration of Verifiable Digital Product Passports, Finished Good Traceability, Anti-counterfeiting Feature Verification, Identity Wallets, and Authorized Trading Partner (ATP) Credentials, highlighting their collective potential to create more secure and transparent supply chains.

Verifiable Digital Product Passports (vDPPs): vDPPs provide a comprehensive digital record of a product’s lifecycle, encompassing all stages from manufacturing to the end-user. These digital passports enhance traceability and transparency, ensuring that every product can be authenticated and its provenance verified. vDPPs play a crucial role in regulatory compliance, offering a reliable way to track and document product histories.

Finished Good Traceability: Traceability systems are essential for tracking products through each phase of the supply chain. By enabling precise identification of a product’s origin and movement, traceability helps prevent the infiltration of counterfeit goods. It also allows for efficient recall processes, reducing the impact of defective or harmful products.

Anti-counterfeiting Feature Verification (ACFV): ACFV employs sophisticated technologies, including blockchain, AI, and multi-factor packaging authentication, to verify product authenticity. Serialized products equipped with data carriers such as QR codes or RFID chips facilitate secure lookup mechanisms and end-to-end data delivery and verification infrastructure. This ensures that counterfeit products are detected and isolated quickly.

Identity Wallets and Authorized Trading Partner (ATP) Credentials: Identity Wallets securely store and manage digital identities and credentials for manufacturers and regulators. ATP Credentials verify that only authorized and verified entities participate in the supply chain, ensuring secure communication and data integrity. This is vital for maintaining trust and compliance across the supply chain.

Electronic Product Information (ePI): The term electronic Product Information (ePI) encompasses various features such as product authenticity verification, product recalls, documentation (e.g., eLeaflets, safety data sheets), adverse event reporting, and new forms of customer engagement. The integration of ePI with vDPPs and ACFV provides a holistic approach to managing and verifying product information.

The Convergence Hypothesis: The integration of these technologies — vDPPs, traceability, ACFV, Identity Wallets, and ATP Credentials — is hypothesized to significantly enhance supply chain security. By providing comprehensive visibility and ensuring product authenticity, this convergence can prevent the distribution of counterfeit goods, protect consumer safety, and uphold regulatory compliance.

Through detailed case studies and real-world examples, this article will showcase how this technological convergence is already being implemented to combat counterfeiting and secure supply chains across various industries. The insights provided will underscore the importance of adopting these integrated solutions to safeguard the integrity and reliability of global supply chains.

Potential for electronic Product Information (ePI) & Product Authenticity Verifications (Source: Spherity)

The Role of Verifiable Digital Product Passports (vDPPs)

Digital Record of a Product’s Lifecycle: Verifiable Digital Product Passports (vDPPs) serve as comprehensive digital records that track every stage of a product’s lifecycle, from initial manufacturing to the final end-user. These digital records encompass detailed information about the product’s origin, materials, manufacturing processes, and ownership history. By embedding this data within a secure digital framework, vDPPs ensure that each product’s journey is transparent and traceable, thereby enhancing the ability to verify authenticity and provenance.

Benefits of vDPPs:

  1. Regulatory Compliance: vDPPs streamline the compliance process by maintaining an immutable record of regulatory approvals and certifications. Regulatory approvals are particularly crucial in industries with stringent regulatory requirements, such as pharmaceuticals and automotive. In FMCG, regulatory approval of ePI data is not required, but requirements will evolve with new regulation such as the EU Green Claims initiative.
  2. Enhanced Transparency: By providing a transparent view of the product’s history and security features, vDPPs help build trust among consumers and stakeholders. This transparency is essential for verifying the authenticity of products, particularly in combating counterfeits.
  3. Efficiency in Recalls: In case of product recalls, vDPPs enable quick identification and isolation of affected items, minimizing health and safety risks and reducing economic losses.
  4. Sustainability: vDPPs support sustainable practices by tracking materials and ensuring adherence to eco-friendly manufacturing standards. This is aligned with broader regulatory frameworks like the Eco-design for Sustainable Products Regulation (ESPR).

Abstracted Definition Beyond ESPR: While the Eco-design for Sustainable Products Regulation (ESPR) provides a framework for digital product passports focused on sustainability, our definition of vDPPs is more abstracted and expansive. It not only includes sustainability metrics but also integrates comprehensive data on regulatory compliance, anti-counterfeiting measures, and end-to-end traceability. This broader approach ensures that vDPPs can address a wider range of challenges across different industries, providing a holistic tool for enhancing supply chain security and product integrity.

By leveraging the capabilities of vDPPs, manufacturers and regulators can ensure that products meet all necessary standards and are genuinely what they claim to be..

Parts and Finished Good Traceability Next Level

Importance of Traceability: Traceability is crucial for tracking products through every stage of the supply chain. By maintaining detailed records of a product’s journey from manufacturing to the end-user, traceability systems ensure that each step is documented and verifiable. This comprehensive tracking allows companies to monitor the flow of goods, manage inventory efficiently, and respond quickly to any issues that arise, such as recalls or quality defects.

Preventing Counterfeit Infiltration: Traceability helps in identifying the origin of products, making it easier to detect and prevent counterfeit goods from entering the supply chain. By having a clear record of each product’s source, including the raw materials used and the manufacturing process, companies can verify the authenticity of their products at any point in the supply chain. This not only protects the brand’s integrity but also ensures consumer safety by preventing counterfeit and potentially harmful products from reaching the market.

Additionally, traceability systems enhance transparency and accountability, as each product can be traced back to its origin, ensuring that all stakeholders, including regulators, manufacturers, and consumers, have access to accurate and reliable information.

Solution Architecture for Anti-counterfeiting Feature Verification (ACFV)

Methods and Technologies:

  1. Secure Look-up Infrastructure: Utilizing a secure look-up infrastructure ensures data integrity and confidentiality during the verification process. The Federated Verification Routing System (VRS) in the US pharma supply chain is a prime example of such an infrastructure. VRS ensures business confidentiality of look-up requests and is integral for compliance with the Drug Supply Chain Security Act (DSCSA). Leveraging this existing infrastructure for ePI and ACFV enhances its value and utility.
  2. Artificial Intelligence (AI): AI algorithms analyze large datasets to detect patterns and anomalies indicative of counterfeit products. Machine learning models continuously improve accuracy by learning from verified instances.
  3. Multi-factor Packaging Authentication: This involves embedding multiple security features such as QR codes, holograms, and RFID chips on product packaging. These features can be scanned and verified using smartphones or specialized devices to ensure authenticity.
  4. End-user Obfuscation Feature: To protect the privacy of end-users and prevent centralized look-up registries from collecting metadata, obfuscation techniques such as client-side or server-side proxies, the TOR network for onion routing, or load balancer privacy controls are employed. These measures ensure that the metadata about who is scanning what product, when, and where remains confidential, preventing potential misuse of this information.

Role in Verifying Authenticity and Protecting Brands: ACFV is crucial for ensuring product authenticity and protecting brands from counterfeit risks. By integrating these advanced technologies and methods:

  • Maintain Brand Integrity: Authentic products reinforce the brand’s reputation.
  • Enhance Consumer Trust: Reliable verification methods build consumer confidence.
  • Comply with Regulations: Meets regulatory requirements, particularly in highly regulated industries like pharmaceuticals.
  • Prevent Financial Losses: Reduces the economic impact of counterfeit goods through effective detection and isolation.

By employing secure look-up infrastructures, AI, multi-factor authentication, and obfuscation techniques, ACFV creates a secure and trustworthy supply chain, safeguarding products from counterfeits and ensuring consumer safety.

Identity Wallets and Authorized Trading Partner (ATP) Credentials

The Role of Identity Wallets: Identity Wallets, such as those provided by Spherity’s CARO solution, are essential tools for securely managing digital identities and credentials of manufacturers, regulators, and other supply chain participants. They facilitate seamless interactions between different entities by providing a trusted source of identity verification, thereby enabling secure authentication, authorization and ePI data provenance verification.

Architecture Context for Product vDPP, ePI, and Product Authenticity Verification (Source: Spherity GmbH)

Importance of ATP Credentials: Authorized Trading Partner (ATP) Credentials play a critical role in ensuring that only authorized and verified entities can participate in the supply chain. ATP Credentials are vital for compliance with regulations such as the Drug Supply Chain Security Act (DSCSA) in the pharmaceutical industry. By verifying the legitimacy of trading partners, ATP Credentials help prevent unauthorized entities from entering the supply chain, thus reducing the risk of counterfeit products. CARO’s credentialing service integrates with leading Verification Routing Services (VRS) to automate ATP checks, providing a reliable and efficient way to comply with regulatory requirements and ensure secure product verifications​​.

Contribution to Secure Communication and Verification Processes: Identity Wallets and ATP Credentials contribute significantly to secure communication and verification processes by:

  • Ensuring Data Authenticity & Provenance: By securely storing and managing credentials, Identity Wallets ensure that the data remains intact and unaltered throughout its lifecycle.
  • Automating Verification: Integration with a look-up or VRS mechanism allows for automated verification of trading partners and products, reducing manual errors and increasing efficiency.
  • Enhancing Transparency: Real-time validation and automated audit trails provide a transparent and traceable record of all transactions and interactions within the supply chain.

Spherity’s experience with ePI and ACFV implementations, coupled with the robust infrastructure provided by CARO’s Identity Wallet and ATP Credentialing solutions, demonstrates a practical and effective approach to enhancing supply chain security. The integration of these technologies ensures that products are genuine, regulatory compliant, and safe for consumers, thereby protecting brands and fostering trust in the global market.

For more information on CARO Wallet and ATP Credentials, visit CARO. Please check out the addendum to learn more about the detailed application architecture.

Case Study 1: Counterfeit Ozempic and Patient Health — “Why Counterfeit Ozempic Is a Global-Growth Industry”

Background: Counterfeit versions of Ozempic, a popular medication for type 2 diabetes and weight loss, have emerged as a significant global issue. The high demand and sometimes limited availability of Ozempic have created lucrative opportunities for counterfeiters. These counterfeit products not only fail to provide the intended therapeutic benefits but also pose severe health risks to patients.

Health Risks: Counterfeit Ozempic often contains incorrect or harmful substances. In some reported cases, fake Ozempic pens have been found to contain insulin instead of semaglutide, the active ingredient in genuine Ozempic. This substitution has led to severe side effects, including hypoglycemia and convulsions, as patients inadvertently administer the wrong medication.

Economic Impact: The rise of counterfeit Ozempic has substantial economic repercussions. Pharmaceutical companies suffer significant financial losses due to the infiltration of counterfeit products into the market, which undermines consumer trust and reduces legitimate sales. Additionally, the healthcare system faces increased costs associated with treating the adverse effects caused by counterfeit medications​ (Managed Healthcare Executive)​.

Learn more and go deeper: Why Counterfeit Ozempic Is a Global-Growth Industry

Case Study 2: Counterfeit Industrial Products — “Boeing and Airbus may have used ‘counterfeit’ titanium in planes, FAA says”

Background: Counterfeit industrial products, such as bearings and electronic components, present significant operational and safety concerns. These counterfeit items often infiltrate supply chains unnoticed, leading to serious repercussions for industries reliant on high-quality, reliable components. Notably, recent allegations have surfaced regarding counterfeit titanium used in the aerospace industry, highlighting the pervasive nature of this issue.

Operational Risks: Counterfeit bearings can lead to machinery failures and increased maintenance costs. Bearings are critical components in various industrial applications, and their failure can cause significant downtime and expensive repairs. For example, counterfeit bearings might not meet the required specifications, leading to premature wear and failure under operational stress (BEARING NEWS)​​ (Electronics360)​.

Safety Concerns: The use of counterfeit electronic components in critical systems, such as military equipment, poses severe risks. These components may fail to meet safety standards, leading to malfunctions that can have catastrophic consequences. A recent and alarming instance involves Boeing and Airbus, where titanium parts were supplied with falsified documentation, triggering an investigation by the Federal Aviation Administration (FAA). The counterfeit titanium parts, identified through fraudulent paperwork, raised significant safety concerns as they were used in the construction of aircraft NBC News.

Case Study 3: Counterfeit Automotive Parts in Germany — “Counterfeit automotive parts increasingly putting consumer safety at risk”

Background: Counterfeit automotive parts have emerged as a critical issue in Germany, posing significant risks to vehicle safety and integrity. The automotive industry, which relies on stringent quality and safety standards, is particularly vulnerable to the infiltration of fake parts. These counterfeit components range from essential safety parts to various engine and electronic parts, jeopardizing the overall reliability and performance of vehicles.

Impact on Safety: Counterfeit parts frequently fail to meet necessary safety standards, leading to hazardous situations. For instance, fake brake pads may disintegrate under pressure, resulting in brake failure, while counterfeit airbags might not deploy correctly in a collision, increasing the risk of injury or death. Recent reports from the European Union Intellectual Property Office (EUIPO) highlight that counterfeit automotive parts, such as tires and batteries, cause significant safety concerns. These parts often do not meet the stringent safety requirements necessary for vehicle components, leading to potential malfunctions and accidents​ (World Trademark Review)​​ (Automotive Logistics)​.

Economic Consequences: The economic impact of counterfeit automotive parts is substantial, with billions of euros lost annually. According to the EUIPO, the legitimate parts industry in Europe loses approximately €2.2 billion each year due to counterfeit tire sales and an additional €180 million due to counterfeit battery sales. These financial burdens not only affect manufacturers but also lead to increased maintenance costs and diminished consumer trust in automotive brands​. The World Trademark Review further corroborates these figures, noting the broader economic and safety implications of counterfeit automotive parts worldwide.

Merging Capabilities

Illustrating Integration: The integration of Verifiable Digital Product Passports (vDPPs), Finished Good Traceability, Anti-counterfeiting Feature Verification (ACFV), Identity Wallets, and Authorized Trading Partner (ATP) Credentials creates a robust framework for supply chain security. Here’s how these elements converge to enhance supply chain integrity:

  1. Verifiable Digital Product Passports (vDPPs): vDPPs provide a comprehensive digital record of a product’s lifecycle, documenting every stage from manufacturing to end-user. This ensures that all product information is transparent and verifiable, facilitating regulatory compliance and enhancing trust.
  2. Finished Good Traceability: Traceability systems track products through each stage of the supply chain, ensuring that the origin and journey of each product are well-documented. This prevents counterfeit infiltration by enabling quick identification and isolation of non-compliant products.
  3. Anti-counterfeiting Feature Verification (ACFV): ACFV employs technologies such as secure look-up infrastructure, AI, and multi-factor packaging authentication to verify product authenticity. This includes methods like serialized QR codes and RFID chips that provide real-time verification capabilities, ensuring that products are genuine.
  4. Identity Wallets: Identity Wallets securely store and manage digital identities and credentials for manufacturers and regulators. They ensure that only authorized entities participate in the supply chain, enhancing security and trust.
  5. Authorized Trading Partner (ATP) Credentials: ATP Credentials verify the legitimacy of trading partners, ensuring that all entities involved in the supply chain are authenticated and compliant with regulations. This prevents unauthorized entities from infiltrating the supply chain and introducing counterfeit products.
ePI, eLeaflet and Anti-counterfeiting Feature Verification Application Implementation (Source: Spherity)

Examples of Successful Implementations:

  1. Pharmaceutical Industry: The US pharma supply chain has successfully implemented the Verification Routing Service (VRS) infrastructure for DSCSA compliance. This system facilitates secure look-up requests and ensures business confidentiality, providing a robust framework for product verification and traceability. Companies like Pfizer and Johnson & Johnson utilize such systems to ensure the authenticity of their products and compliance with regulatory standards​​​​.
  2. Automotive Industry: Companies such as BMW and Daimler have integrated advanced traceability systems and anti-counterfeiting measures to combat counterfeit parts. By implementing RFID tags and secure look-up systems, these manufacturers can trace the origin of parts and verify their authenticity, thereby enhancing supply chain security and protecting consumer safety​.
  3. Electronics Industry: Leading electronics manufacturers like Apple and Samsung use vDPPs and traceability systems to ensure the integrity of their supply chains. These companies employ serialization and secure authentication methods to prevent counterfeit components from entering their products, ensuring that customers receive genuine and safe electronics​ (Electronics360)​.

By integrating these technologies, industries can create a cohesive and secure supply chain framework and protect brands from the adverse impacts of counterfeiting.

The Role of Serial Numbers in Detecting Counterfeit Products

Serial numbers are essential for ensuring product authenticity and detecting counterfeit products. They provide a unique identifier for each item, allowing for detailed tracking and verification throughout the product’s lifecycle. When a serial number is registered in a look-up directory, it can be validated against a trusted source, ensuring the product has not been duplicated.

Product identity verification often involves sending a message to the manufacturer’s system to confirm that the product details match the records. This ensures that the scanned serial number corresponds to the correct item description. Validating the batch expiry or production date ensures the product is still within its usable period, preventing the distribution of expired or unsafe items.

The serial number itself must be valid and unique, confirming legitimate production and recording. Checking the product status, such as whether it has been released to the market or recalled, ensures it is safe for sale. Products flagged as suspect are identified and investigated to prevent counterfeit items from reaching consumers.

Incorporating anti-counterfeiting security features, such as holograms, tamper-evident seals, and UV markings, adds additional layers of security. These features are validated against the manufacturer’s secure database to ensure authenticity and integrity, protecting the supply chain from counterfeit threats.

Anti-counterfeiting Security Features for Consumer Products

Pharmaceutical companies employ a variety of sophisticated anti-counterfeiting security features to ensure product authenticity and protect consumer safety. These features can be categorized into visible, hidden, and forensic elements, each providing a layer of security against counterfeit products.

Visible Features:

  1. Holograms: Used on packaging to create complex visual effects that are difficult to replicate, enhancing visual verification.
  2. Color-shifting Inks: These inks change color when viewed from different angles, providing an easy way to authenticate products visually.
  3. Tamper-evident Seals: These seals show if a product has been opened or tampered with, ensuring the integrity of the packaging.

Hidden Features:

  1. Micro Text or artwork structures: Involves printing tiny text or artwork patterns that is invisible to the naked eye and requires magnification to read, making replication difficult.
  2. Thermochromic Inks: These inks change color with temperature variations, indicating proper storage conditions.
  3. Secure QR Codes and Data Matrix Codes: Scannable by mobile devices, these codes link to the manufacturer’s database for real-time verification of product authenticity. These special QR codes include a fingerprint of the individual printer that produced the QR code.

Forensic Features:

  1. DNA Markers: Unique DNA sequences printed in specific areas can be verified with special reagents.
  2. Nanoparticle Taggants: Microscopic particles embedded in the packaging material require advanced equipment for detection.

In addition to Pharma, luxury goods and fashion industry has started adopting anti-counterfeiting features as well:

Anti-counterfeit ink ribbon (Source: Dai Nippon Priting)

The anti-counterfeit ink ribbon by Dai Nippon Printing (DNP) uses ultraviolet (UV) resin to produce fluorescence under UV light, making printed information invisible under normal lighting conditions. This innovative feature enhances security and authenticity verification. When exposed to UV light, the hidden information becomes visible, allowing users to confirm the product’s legitimacy. This method is particularly effective for protecting against counterfeiting and can be integrated into various security applications, ensuring the traceability and authenticity of products.

Example JSON data structure as part of a verifiable credential provided form the authentic manaufacturer for verifying the authenticity of a sustainable T-shirt:

{
"@context": "https://schema.org/",
"@type": "Product",
"productID": "12345",
"name": "Sustainable T-Shirt",
"description": "A high-quality sustainable t-shirt made from organic cotton.",
"serialNumber": "SN123456789",
"productionDate": "2024-02-01",
"expiryDate": "2025-02-01",
"batchID": "BATCH001",
"validations": {
"isRegisteredProduct": true,
"isProductMatch": true,
"isValidBatchExpiryDate": true,
"isValidSerialNumber": true,
"isValidProductStatus": true,
"isNotFlaggedAsSuspect": true,
},
"antiCounterfeitingFeatures": {
"identityVerification": {
"verificationAPI": {
"apiEndpoint": "https://api.ecowear.com/verify",
"apiMethod": "GET",
"apiParameters": {
"serialNumber": "SN123456789",
"productionDate": "2024-02-01"
},
"apiResponse": {
"status": "Valid",
"message": "Product is genuine"
}
}
},
"dnPHologram": {
"hologramID": "HOLO123",
"hologramDescription": "DNP hologram with unique pattern",
"verificationMethod": "Visual inspection"
},
"uvLightVerification": {
"uvFeatureID": "UV123",
"uvFeatureDescription": "Invisible ink visible under UV light",
"verificationMethod": "UV light inspection"
},
"additionalSecurityFeatures": {
"rfidTag": {
"tagID": "RFID123",
"description": "RFID tag embedded in label"
},
"tamperEvidentSeal": {
"sealID": "SEAL123",
"description": "Tamper-evident seal on packaging"
},
"securityInks": {
"inkID": "INK123",
"description": "Special security inks used in printing"
},
"microText": {
"microTextID": "MICRO123",
"description": "Microtext printed on label"
}
}
}
}

Merck KGaA employs a combination of advanced features for secure supply chain tracking, including serialized QR codes that can be scanned by mobile devices to verify product information. Their multi-layered approach incorporates p-Chip microtransponders, which serve as crypto-anchors providing digital twins for physical products. Additionally, Merck utilizes special pigments and technologies derived from money printing, such as holograms, tamper-evident seals, and thermochromic inks. These features are communicated securely to the end-user app via encrypted data transmission and validated against the manufacturer’s secure database, ensuring the authenticity and integrity of the data. This comprehensive solution enables companies to fully leverage the Industrial Internet of Things (IIoT) with confidence, ensuring seamless interoperability and robust security across the supply chain. (European Pharmaceutical Manufacturer)​ (Pharmaceutical Manufacturer)​.

Random serial numbers and unique security features can be combined for Multi-factor Product Authentication (MFPA), providing a robust method to verify product authenticity by leveraging multiple independent verification elements.

These measures, combined with an identity wallet and trust infrastructure like the Open Credentialing Initiative (OCI) in the US, form a robust infrastructure for verifying the authenticity of features that are communicated by the manufacturer to the verification module of an end-user device.

Industrial Product Security: A Multi-Factor Approach to Authentication

Industrial products deploy various advanced security features to ensure authenticity and protect against counterfeiting. This multi-factor approach combines both physical and digital technologies, creating robust security layers that deter unauthorized replication and provide reliable verification.

Unique Serial Numbers: Each product is assigned a unique serial number that can be tracked in a central database. This prevents duplication and allows for traceability throughout the supply chain.

RFID and NFC Tags: These tags facilitate contactless verification and real-time tracking. They are widely used in supply chain management to ensure products remain genuine from production to end-user delivery.

Holograms and Optical Variable Devices: These features provide a visual security layer. They change appearance when viewed from different angles or under different lighting conditions, making them difficult to replicate.

Tamper-Evident Seals: Designed to show visible signs if a product has been tampered with, these seals ensure the product’s integrity until it reaches the consumer.

Microtext and Fine Printing: Using extremely small text that requires magnification to read, this feature adds an intricate level of security that is challenging to duplicate.

Examples from Industry:

  • Merck uses p-Chip microtransponders and special pigments to create digital twins of physical products, ensuring their authenticity throughout the lifecycle.
  • NXP Semiconductors provides secure element technologies for IoT and automotive applications, including secure car access systems and smart label ICs for high-volume supply chain management.
  • Honeywell incorporates phosphorescent pigments and detection devices into their products, providing advanced materials for authentication needs across various industries​ (NXP® Semiconductors Official Site)​​ (Home)​.

These security features ensure that industrial products can be trusted by consumers and stakeholders alike, providing a robust defense against counterfeiting and ensuring the integrity of the supply chain.

Physical Unclonable Functions (PUFs)

Physical Unclonable Functions (PUFs) are an advanced anti-counterfeiting technology that leverages the inherent physical variations of materials to create unique, unclonable identifiers for products. These identifiers are derived from the microscopic physical properties of the material, such as the random imperfections in silicon chips or the unique fiber patterns in paper. PUFs are highly secure because they are practically impossible to replicate or predict, even by the original manufacturer.

PUFs can be integrated into product packaging or components to provide a robust layer of security. When combined with digital verification systems, PUFs offer a powerful tool for ensuring product authenticity and preventing counterfeiting. For instance, a product equipped with a PUF can be verified using a dedicated reader or even a mobile device, which compares the physical identifier with the manufacturer’s database to confirm authenticity.

Benefits of Integration

Consumer and Employee Safety: The most critical benefit of integrating Verifiable Digital Product Passports (vDPPs), Finished Good Traceability, Anti-counterfeiting Feature Verification (ACFV), Identity Wallets, and Authorized Trading Partner (ATP) Credentials is the enhanced safety for both consumers and employees. By ensuring that all products and components are genuine and meet stringent safety standards, these technologies protect users from the hazards posed by counterfeit goods. For example, counterfeit airbags and brake pads in vehicles can lead to severe accidents, while fake pharmaceuticals can cause significant health risks. Ensuring product authenticity directly translates to safer products, safeguarding consumers and employees from potential harm​ (World Trademark Review)​​ (Automotive Logistics)​.

Increased Consumer Trust: Integrating these technologies significantly boosts consumer trust. When consumers can easily verify the authenticity and provenance of products, they feel more confident in their purchases. This transparency helps build strong, trust-based relationships between consumers and brands, fostering loyalty and repeat business. For instance, in the pharmaceutical industry, implementing these technologies ensures that patients receive genuine medications, crucial for their safety and health​​​​.

Reduced Economic Losses: Counterfeiting results in billions of dollars in annual losses across various industries. By integrating advanced security measures, companies can substantially reduce these economic losses. Improved traceability and authentication prevent counterfeit goods from entering the supply chain, protecting revenue and reducing costs related to recalls, legal actions, and reputational damage. The automotive industry, for example, saves significantly by avoiding the costs associated with counterfeit parts, such as repairs and legal liabilities​ (World Trademark Review)​​ (Automotive Logistics)​.

Enhanced Regulatory Compliance: Regulatory compliance is crucial, especially in highly regulated industries like pharmaceuticals and automotive. Integrating vDPPs, traceability systems, and ACFV ensures that products meet all regulatory requirements by providing accurate and verifiable data on product origins, manufacturing processes, and distribution channels. This compliance not only prevents legal penalties but also ensures that products are safe and effective for consumer use. For example, the US pharma supply chain’s VRS infrastructure helps companies comply with the Drug Supply Chain Security Act (DSCSA) by facilitating secure look-up requests and ensuring business confidentiality​​​​.

More Efficient Supply Chain Operations: The convergence of these technologies leads to more efficient supply chain operations by streamlining verification processes and reducing the time and resources needed to track and authenticate products. Automated verification and real-time data sharing minimize manual checks and reduce the likelihood of human error. This efficiency translates to faster production cycles, quicker response times to potential issues, and overall improved supply chain management. Companies like BMW and Daimler have leveraged these technologies to enhance their operational efficiency, ensuring that their supply chains are both secure and agile​ (Automotive Logistics)​​ (World Trademark Review)​.

Improved Product Quality: Ensuring that only genuine, high-quality products reach the market is a direct benefit of integrating vDPPs, traceability, ACFV, Identity Wallets, and ATP Credentials. These technologies allow for rigorous monitoring and verification of each component and product throughout the supply chain. This oversight ensures that any substandard or counterfeit products are identified and removed before reaching consumers, thereby maintaining high product quality and protecting brand reputation. In the electronics industry, companies like Apple and Samsung utilize these systems to guarantee the authenticity and quality of their products, enhancing consumer satisfaction and brand loyalty​ (Electronics360)​.

The underlying technology and process convergence represents a significant advancement in securing and optimizing supply chains across various industries.

Conclusion

Integrating Verifiable Digital Product Passports (vDPPs), Finished Good Traceability, Anti-counterfeiting Feature Verification (ACFV), Identity Wallets, and Authorized Trading Partner (ATP) Credentials is essential for enhancing supply chain security. This integration ensures comprehensive visibility, product authenticity, and protection against counterfeiting, thereby safeguarding consumer and employee safety. By adopting these technologies, stakeholders can significantly reduce economic losses, enhance regulatory compliance, and improve overall product quality. Embracing this technological convergence is crucial for securing and optimizing global supply chains, ultimately fostering trust and reliability in the marketplace.

About Spherity

Spherity is a German decentralized digital identity software provider, bringing secure identities to enterprises, machines, products, data, and even algorithms. Spherity provides the enabling technology to digitalize and automate compliance processes in highly-regulated technical sectors. Spherity’s products for enterprise wallets and object identity empower cyber security, efficiency, and data interoperability among digital value chain actors.

Stay sphered by joining Spherity’s Newsletter list and following us on LinkedIn. For press relations, contact info@spherity.com.

--

--

Carsten Stöcker

Founder of Spherity GmbH. Decentralised identity, digital twinning & cloud agents for 4th industrial revolution | born 329.43 ppm