Vesdo Inc.
deen

Without a specific anticounterfeiting system in place, authentication is traditionally done by analysing the suspect sample in a laboratory and comparing the results to reference data. This works fine, however it requires highly skilled personnel using expensive equipment, is time consuming and costly. With a security technology, an easy and instantaneous verification of the authenticity of a product is possible. Such verification processes should be simple and therefore usable even by a layman after a short training.
Today the security industry offers a broad range of different technologies, allowing the protection of brand products against product piracy. These systems can be differentiated into two separate families:

Authentication Technologies

The security mechanism of the classical physical security devices is based on the fact that counterfeiters have no access to the corresponding encryption algorithms or hardware features produced in limited quantities in a secure environment using sophisticated technologies. These technologies allow an excellent authentication of the packaging or product originality. They are however of no help to fight against diversion.

Serialization and Traceability

By means of a unique number applied to each item or onto its package and linked to a central data base, logical security may be provided. This is an excellent platform to fight against both counterfeiting and diversion.

Optimal protection against product piracy can be provided by using a multilayer approach. The effects of combining both physical and logical security mechanisms will multiply, resulting in a high overall system effectiveness.