SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when
subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply
chain. These items are often identical to the genuine products; however the contracting company is robbed of its
rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is
not able to undertake the necessary safety tests on the overrun products.
Bilcare Technologies’solution
Imagine that you were able to attach a unique irreproducible barcode to every item you produced.The irreproducible
barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able
to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent
information about the individual barcode, and could also track information useful to you, such as when and where the
barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION.
How can you use this solution to protect your brand – particularly to
prevent subcontractors from making overruns? First the subcontractor
must be instructed to attach, or embed, a tag on or into each product being
produced in the factory. Each time this is done, it is logged in the remote
database. This means that you can track exactly how many items are being
producedeachday,andifthefactoryisinspectedeachoftheitemsproduced
must have its own tag matching what has been updated in the database for
that day. Similarly when the products leave the factory they must all have
active tags registered in the database. When the distributors receive the
shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active
in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale
will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized
to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed
allowing instantaneous secure product/warranty matching. We call this technology Singular ID.
Technology
Bilcare Technologies’ Singular ID solution is based on over five years of
intensive research and development. This research has allowed us to use
naturally occurring micro- and nanoscale disorder within materials to
uniquely identify items of value. Although we are able to make materials
each with its own unique structure (or“fingerprint”) we are unable to control
exactly what formation the disorder takes. This means that we are unable to
make two pieces of material with the same fingerprint, and therefore believe
that it would impossible for someone else to control the disorder on this size
scale in order to make a replica of any fingerprint. We have developed an
asset tracking system around this concept. Key components of the system
are:
Unique tags•	 attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint
structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide
Supply Chain/Subcontractor Overruns Application
A scanning electron micrograph of
Singular ID fingerprint technology.
The fingerprint consists of micro- or
nanoscale features embedded within
a material. Each fingerprint produces
its own unique signal and even we are
unable to reproduce a fingerprint.
A demonstration swipe card containing a
working invisible Singular ID fingerprint.
range of materials, including leather, fabric and textile, plastic and metal.
Portable devices•	 to read the fingerprints and retrieve information about the objects the tags are attached to. The
readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint.
© 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE
TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N.
Non-confidential document, reference: INFO-01 18.4, Feb 2009.
BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386
BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555
www.singular-id.com, enxure@singular-id.com
1. Scan the
product tag
2. Securely send the
tag signature
3. Compare tag signature
to database content
4. Authenticate tag
and product
5. Confirm
authenticity
/
Secure database: At the point of manufacture each fingerprint is stored in a secure database.The portable readers are
able to connect to this secure database from anywhere in the world.The database compares the incoming fingerprint
with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint.
The database is an extremely valuable tool for brand protection since it can contain a wide variety of information
about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a
fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner.
For example, brand owners can store customized information about tags and tagged products including to which
distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’Singular ID
solution is therefore an excellent means to detect and deter product diversion, and to avert fraud.

Contenu connexe

Tendances

Jewellery management using rfid
Jewellery management using rfidJewellery management using rfid
Jewellery management using rfidSaurav Suman
 
Rfid in jewelry management system
Rfid in jewelry management systemRfid in jewelry management system
Rfid in jewelry management systemiaitoinfotech
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
Woolet B2B presentation
Woolet B2B presentationWoolet B2B presentation
Woolet B2B presentationMarek Ciesla
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesHoueida Kammourié
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.docArtechno7
 
Brochure_Biowatch_December 2016
Brochure_Biowatch_December 2016Brochure_Biowatch_December 2016
Brochure_Biowatch_December 2016Marc-Etienne Jan
 
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit lab
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit labOpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit lab
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit labRobert Wolff
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24Umesh Starteck
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
RFID Technology for the Cultural Sector
RFID Technology for the Cultural SectorRFID Technology for the Cultural Sector
RFID Technology for the Cultural SectorAxiell ALM
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBilcareltd
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Androidtodbotdotcom
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainExistco Pty Ltd
 

Tendances (19)

Jewellery management using rfid
Jewellery management using rfidJewellery management using rfid
Jewellery management using rfid
 
Rfid in jewelry management system
Rfid in jewelry management systemRfid in jewelry management system
Rfid in jewelry management system
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Woolet B2B presentation
Woolet B2B presentationWoolet B2B presentation
Woolet B2B presentation
 
Technology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. BarcodesTechnology and Libraries:RFID vs. Barcodes
Technology and Libraries:RFID vs. Barcodes
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.doc
 
Brochure_Biowatch_December 2016
Brochure_Biowatch_December 2016Brochure_Biowatch_December 2016
Brochure_Biowatch_December 2016
 
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit lab
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit labOpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit lab
OpenHours #63 - Brazilian Partners and 96Boards take over Qualcomm Thinkabit lab
 
Bar code VS RFID
Bar code VS RFIDBar code VS RFID
Bar code VS RFID
 
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsBeyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
Beyond Touch ID: Mobile Fingerprinting & Advances in Biometrics
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24NEW STARTECK PROFILE 24
NEW STARTECK PROFILE 24
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
RFID Technology for the Cultural Sector
RFID Technology for the Cultural SectorRFID Technology for the Cultural Sector
RFID Technology for the Cultural Sector
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
Identive | Press Release | Identive Introduces TouchSecure® OpenAccess Wall M...
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 
Barcode & RFiD in Supply Chain
Barcode & RFiD in Supply ChainBarcode & RFiD in Supply Chain
Barcode & RFiD in Supply Chain
 

Similaire à Supply Chain/Subcontractor Overruns Application

Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonIRJET Journal
 
Supply chain traceability technology tools.pdf
Supply chain traceability technology tools.pdfSupply chain traceability technology tools.pdf
Supply chain traceability technology tools.pdfTommy Cui
 
Supply Chain Traceability Technology Tools
Supply Chain Traceability Technology ToolsSupply Chain Traceability Technology Tools
Supply Chain Traceability Technology ToolsLaura Olson
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyIRJET Journal
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in ManufacturingPreran Prasad J M
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...Vladimir Kulyukin
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionPetr Cermak
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologiesBilcareltd
 
Track and trace
Track and traceTrack and trace
Track and traceBilcareltd
 

Similaire à Supply Chain/Subcontractor Overruns Application (20)

Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using Python
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
The impact of barcode scanner technology
The impact of barcode scanner technologyThe impact of barcode scanner technology
The impact of barcode scanner technology
 
Supply chain traceability technology tools.pdf
Supply chain traceability technology tools.pdfSupply chain traceability technology tools.pdf
Supply chain traceability technology tools.pdf
 
Supply Chain Traceability Technology Tools
Supply Chain Traceability Technology ToolsSupply Chain Traceability Technology Tools
Supply Chain Traceability Technology Tools
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
 
BSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdfBSecured - Securing Originals on BlockChain Technology.pdf
BSecured - Securing Originals on BlockChain Technology.pdf
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in Manufacturing
 
UPITag_write_upP1_toP3
UPITag_write_upP1_toP3UPITag_write_upP1_toP3
UPITag_write_upP1_toP3
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
Blockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecuredBlockchain Secured Ecosystem - BSecured
Blockchain Secured Ecosystem - BSecured
 
BeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdfBeSecured_Brochure_02 (1).pdf
BeSecured_Brochure_02 (1).pdf
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...
Eye-Free Barcode Detection on Smartphones with Niblack's Binarization and Sup...
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protection
 
barcode in the retail industry.pptx
barcode in the retail industry.pptxbarcode in the retail industry.pptx
barcode in the retail industry.pptx
 
Non clonableid technologies
Non clonableid technologiesNon clonableid technologies
Non clonableid technologies
 
Fashion
FashionFashion
Fashion
 
Track and trace
Track and traceTrack and trace
Track and trace
 

Plus de Bilcareltd

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpakBilcareltd
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016Bilcareltd
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Bilcareltd
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayBilcareltd
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcareltd
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged worldBilcareltd
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali MemoriesBilcareltd
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Bilcareltd
 
Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015Bilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_applicationBilcareltd
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for PropertiesBilcareltd
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualBilcareltd
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leafletBilcareltd
 
Deploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingDeploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingBilcareltd
 

Plus de Bilcareltd (20)

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpak
 
Patient first
Patient firstPatient first
Patient first
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga Day
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired Certificate
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged world
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali Memories
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015
 
Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_application
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for Properties
 
Security
SecuritySecurity
Security
 
Pharma
PharmaPharma
Pharma
 
Currency
CurrencyCurrency
Currency
 
Art brochure
Art brochureArt brochure
Art brochure
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User Manual
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leaflet
 
Deploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingDeploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeiting
 

Dernier

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Dernier (20)

It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

Supply Chain/Subcontractor Overruns Application

  • 1. Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply chain. These items are often identical to the genuine products; however the contracting company is robbed of its rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is not able to undertake the necessary safety tests on the overrun products. Bilcare Technologies’solution Imagine that you were able to attach a unique irreproducible barcode to every item you produced.The irreproducible barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent information about the individual barcode, and could also track information useful to you, such as when and where the barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION. How can you use this solution to protect your brand – particularly to prevent subcontractors from making overruns? First the subcontractor must be instructed to attach, or embed, a tag on or into each product being produced in the factory. Each time this is done, it is logged in the remote database. This means that you can track exactly how many items are being producedeachday,andifthefactoryisinspectedeachoftheitemsproduced must have its own tag matching what has been updated in the database for that day. Similarly when the products leave the factory they must all have active tags registered in the database. When the distributors receive the shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed allowing instantaneous secure product/warranty matching. We call this technology Singular ID. Technology Bilcare Technologies’ Singular ID solution is based on over five years of intensive research and development. This research has allowed us to use naturally occurring micro- and nanoscale disorder within materials to uniquely identify items of value. Although we are able to make materials each with its own unique structure (or“fingerprint”) we are unable to control exactly what formation the disorder takes. This means that we are unable to make two pieces of material with the same fingerprint, and therefore believe that it would impossible for someone else to control the disorder on this size scale in order to make a replica of any fingerprint. We have developed an asset tracking system around this concept. Key components of the system are: Unique tags• attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide Supply Chain/Subcontractor Overruns Application A scanning electron micrograph of Singular ID fingerprint technology. The fingerprint consists of micro- or nanoscale features embedded within a material. Each fingerprint produces its own unique signal and even we are unable to reproduce a fingerprint. A demonstration swipe card containing a working invisible Singular ID fingerprint.
  • 2. range of materials, including leather, fabric and textile, plastic and metal. Portable devices• to read the fingerprints and retrieve information about the objects the tags are attached to. The readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint. © 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N. Non-confidential document, reference: INFO-01 18.4, Feb 2009. BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386 BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555 www.singular-id.com, enxure@singular-id.com 1. Scan the product tag 2. Securely send the tag signature 3. Compare tag signature to database content 4. Authenticate tag and product 5. Confirm authenticity / Secure database: At the point of manufacture each fingerprint is stored in a secure database.The portable readers are able to connect to this secure database from anywhere in the world.The database compares the incoming fingerprint with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint. The database is an extremely valuable tool for brand protection since it can contain a wide variety of information about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner. For example, brand owners can store customized information about tags and tagged products including to which distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’Singular ID solution is therefore an excellent means to detect and deter product diversion, and to avert fraud.