Coherent Identifier About this item: 20.500.12592/6hzbx5

TECHNOLOGY AND SECURITY: COUNTERING CRIMINAL INFILTRATIONS IN THE LEGITIMATE SUPPLY CHAIN

9 July 2021

Summary

The adoption of these technology solutions is linked to the use of a back-end database within which each movement of goods along the supply-chain is recorded.23 This type of technology solution helps in the enhancement of vis- ibility of the product during the different stages of the supply chain. [...] Available technology options can be integrated to enhance the protection of the production and distribution process, especially since technology can be adapted to multiple ap- proaches such as the authentication of the package, the monitoring of the product through the supply chain, the chemical composition of the goods, or the combination of several techniques. [...] The codification and decodification of the data that is saved in the product provides stakeholders of the supply chain with a secure mechanism to corroborate the authenticity of the merchandise. [...] Non-intrusive: Identification of the product can be performed, without opening the package or testing the contents, through the use of scanners or special readers, in addition to tracking mechanisms that provide updated information about the status of the product in the supply chain without the need of physically checking the product. [...] Consumer education: When consumers are given the possibility to perform a check on the authenticity of the product at the time of purchase, they need to be aware of the security measures applied to the product and of how to scan the code or tag to obtain the information.

Pages
195

Create your FREE account to get started