SlideShare a Scribd company logo
1 of 2
Download to read offline
Supply Chain/Subcontractor Overruns Application

Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when
subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply
chain. These items are often identical to the genuine products; however the contracting company is robbed of its
rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is
not able to undertake the necessary safety tests on the overrun products.

Bilcare Technologies’ solution
Imagine that you were able to attach a unique irreproducible barcode to every item you produced. The irreproducible
barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able
to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent
information about the individual barcode, and could also track information useful to you, such as when and where the
barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION.

How can you use this solution to protect your brand – particularly to
prevent subcontractors from making overruns? First the subcontractor
must be instructed to attach, or embed, a tag on or into each product being
produced in the factory. Each time this is done, it is logged in the remote
database. This means that you can track exactly how many items are being
produced each day, and if the factory is inspected each of the items produced
must have its own tag matching what has been updated in the database for
                                                                                    A demonstration swipe card containing a
that day. Similarly when the products leave the factory they must all have          working invisible Singular ID fingerprint.
active tags registered in the database. When the distributors receive the
shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active
in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale
will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized
to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed
allowing instantaneous secure product/warranty matching. We call this technology Singular ID.

Technology
Bilcare Technologies’ Singular ID solution is based on over five years of
intensive research and development. This research has allowed us to use
naturally occurring micro- and nanoscale disorder within materials to
uniquely identify items of value. Although we are able to make materials           A scanning electron micrograph of
each with its own unique structure (or “fingerprint”) we are unable to control     Singular ID fingerprint technology.
                                                                                   The fingerprint consists of micro- or
exactly what formation the disorder takes. This means that we are unable to        nanoscale features embedded within
make two pieces of material with the same fingerprint, and therefore believe       a material. Each fingerprint produces
                                                                                   its own unique signal and even we are
that it would impossible for someone else to control the disorder on this size     unable to reproduce a fingerprint.
scale in order to make a replica of any fingerprint. We have developed an
asset tracking system around this concept. Key components of the system
are:
•	 Unique tags attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint
     structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide
range of materials, including leather, fabric and textile, plastic and metal.
 •	    Portable devicesto read the fingerprints and retrieve information about the objects the tags are attached to. The
       readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint.



                                                                         3. Compare tag signature
                                                                            to database content


                                      2. Securely send the
                                         tag signature

                                                                                                                   4. Authenticate tag
                                                                                                                     and product
                               1. Scan the
                                  product tag

                                                                                                      /
                                                                                               5. Confirm
                                                                                                  authenticity




  Secure database: At the point of manufacture each fingerprint is stored in a secure database. The portable readers are
  able to connect to this secure database from anywhere in the world. The database compares the incoming fingerprint
  with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint.
  The database is an extremely valuable tool for brand protection since it can contain a wide variety of information
  about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a
  fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner.
  For example, brand owners can store customized information about tags and tagged products including to which
  distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’ Singular ID
  solution is therefore an excellent means to detect and deter product diversion, and to avert fraud.




         BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386
   BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555
                                               www.singular-id.com, enxure@singular-id.com



© 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’ solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE
                                         TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N.
                                                          Non-confidential document, reference: INFO-01 18.4, Feb 2009.

More Related Content

Similar to Supply Chain Usage

Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationBilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionPetr Cermak
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyIRJET Journal
 
True authentication of tablets
True authentication of tabletsTrue authentication of tablets
True authentication of tabletsPaulGlendenning2
 
Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonIRJET Journal
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry BrandAlfons Futterer
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
Track and trace
Track and traceTrack and trace
Track and traceBilcareltd
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Anti counterfeit packaging
Anti counterfeit packaging Anti counterfeit packaging
Anti counterfeit packaging Samiksha Sawant
 
New final tf--nfc_open_sense
New final tf--nfc_open_senseNew final tf--nfc_open_sense
New final tf--nfc_open_senseTim Johnson
 
Recheck - Product Digital Identity
Recheck - Product Digital IdentityRecheck - Product Digital Identity
Recheck - Product Digital Identityrecheck
 

Similar to Supply Chain Usage (20)

Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns Application
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protection
 
DNA_NEW
DNA_NEWDNA_NEW
DNA_NEW
 
Agrochemicals
AgrochemicalsAgrochemicals
Agrochemicals
 
The impact of barcode scanner technology
The impact of barcode scanner technologyThe impact of barcode scanner technology
The impact of barcode scanner technology
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
 
True authentication of tablets
True authentication of tabletsTrue authentication of tablets
True authentication of tablets
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using Python
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry Brand
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Fashion
FashionFashion
Fashion
 
Track and trace
Track and traceTrack and trace
Track and trace
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Anti counterfeit packaging
Anti counterfeit packaging Anti counterfeit packaging
Anti counterfeit packaging
 
New final tf--nfc_open_sense
New final tf--nfc_open_senseNew final tf--nfc_open_sense
New final tf--nfc_open_sense
 
Recheck - Product Digital Identity
Recheck - Product Digital IdentityRecheck - Product Digital Identity
Recheck - Product Digital Identity
 

More from Bilcare Research

Virtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeVirtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeBilcare Research
 
Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development FactsheetBilcare Research
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Bilcare Research
 
Anti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesAnti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesBilcare Research
 
Dispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DDispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DBilcare Research
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Research
 

More from Bilcare Research (13)

Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Cs Ivrs
Cs IvrsCs Ivrs
Cs Ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Virtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeVirtualization Helps Bilcare Optimize
Virtualization Helps Bilcare Optimize
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development Factsheet
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...
 
Anti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesAnti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging Technologies
 
Dispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DDispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &D
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business Growth
 

Recently uploaded

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Supply Chain Usage

  • 1. Supply Chain/Subcontractor Overruns Application Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply chain. These items are often identical to the genuine products; however the contracting company is robbed of its rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is not able to undertake the necessary safety tests on the overrun products. Bilcare Technologies’ solution Imagine that you were able to attach a unique irreproducible barcode to every item you produced. The irreproducible barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent information about the individual barcode, and could also track information useful to you, such as when and where the barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION. How can you use this solution to protect your brand – particularly to prevent subcontractors from making overruns? First the subcontractor must be instructed to attach, or embed, a tag on or into each product being produced in the factory. Each time this is done, it is logged in the remote database. This means that you can track exactly how many items are being produced each day, and if the factory is inspected each of the items produced must have its own tag matching what has been updated in the database for A demonstration swipe card containing a that day. Similarly when the products leave the factory they must all have working invisible Singular ID fingerprint. active tags registered in the database. When the distributors receive the shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed allowing instantaneous secure product/warranty matching. We call this technology Singular ID. Technology Bilcare Technologies’ Singular ID solution is based on over five years of intensive research and development. This research has allowed us to use naturally occurring micro- and nanoscale disorder within materials to uniquely identify items of value. Although we are able to make materials A scanning electron micrograph of each with its own unique structure (or “fingerprint”) we are unable to control Singular ID fingerprint technology. The fingerprint consists of micro- or exactly what formation the disorder takes. This means that we are unable to nanoscale features embedded within make two pieces of material with the same fingerprint, and therefore believe a material. Each fingerprint produces its own unique signal and even we are that it would impossible for someone else to control the disorder on this size unable to reproduce a fingerprint. scale in order to make a replica of any fingerprint. We have developed an asset tracking system around this concept. Key components of the system are: • Unique tags attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide
  • 2. range of materials, including leather, fabric and textile, plastic and metal. • Portable devicesto read the fingerprints and retrieve information about the objects the tags are attached to. The readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint. 3. Compare tag signature to database content 2. Securely send the tag signature 4. Authenticate tag and product 1. Scan the product tag / 5. Confirm authenticity Secure database: At the point of manufacture each fingerprint is stored in a secure database. The portable readers are able to connect to this secure database from anywhere in the world. The database compares the incoming fingerprint with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint. The database is an extremely valuable tool for brand protection since it can contain a wide variety of information about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner. For example, brand owners can store customized information about tags and tagged products including to which distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’ Singular ID solution is therefore an excellent means to detect and deter product diversion, and to avert fraud. BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386 BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555 www.singular-id.com, enxure@singular-id.com © 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’ solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N. Non-confidential document, reference: INFO-01 18.4, Feb 2009.