Se ha denunciado esta presentación.
Security hologram providesmeasure to authenticate,identify and arrestcounterfeits to curb illegalminingPresented by:Chander S JeenaHologram Manufacturers Association of IndiaPDI conference, IIC, New Delhi, Date: April 5, 2012
Presentation flowIntroduction - HOMAIIllegal mining – how it startedModus Operandi / ProblemRecommendation by Govt / Current statusCurrent usage by some StatesWhy hologram have been usedConclusion
HOMAI - IntroductionHologram Manufacturers Association of India, formed in 1998 isWorld 2nd and Asia’s only association representing holographyWe are allied with IHMA (International HologramManufacturers Association). More than 130 leading globalcompanies are part of our association, design, produce &manufacture high security anti-counterfeiting solutions understrict code of conduct of HOMAI & IHMA.We as a responsible association actively participate & workingwith Counterfeit Intelligence Bureau (CIB), UK and Interpoland all HOMAI member register their hologram with CIBIn India more than 10,000 brands use our high endsecurity products to fight against counterfeiting.
Security Holograms providing authentication, identification and arresting counterfeitIllegal mining how it started Iron Ore Monthly Price - US Dollars per Metric Ton 192.05 172.05 Price increase 152.05 Rising US Dollars per metric ton more than 150 times 132.05 global 112.05 iron-ore 92.05 prices 72.05 driven by 52.05 demand 32.05 12.05 Text Apr-02 Apr-03 Apr-04 Apr-05 Apr-06 Apr-07 Apr-08 Apr-09 Apr-10 Apr-11 Dec-02 Dec-03 Dec-04 Dec-05 Dec-06 Dec-07 Dec-08 Dec-09 Dec-10 Dec-11 Aug-02 Aug-03 Aug-04 Aug-05 Aug-06 Aug-07 Aug-08 Aug-09 Aug-10 Aug-11 Text Source: indexmondi.com
Security Holograms providing authentication, identification and arresting counterfeitModus operandi Need of Illegal miners solution started misuing / faking bulk permits and Differentiate trip sheets between fake and genuine document And difficult to With these fake Miners copy permits illegal exported miners do the illegally with & tampering lethal faking excavation shipping bill / Text resulting loss of Text without these revenue bills
Security Holograms providing authentication, identification and arresting counterfeitSteps recommendedby Centre Current situationTo curb this problem, Five States, UttarCentre suggested to Pradesh, Jharkhand,start the process of Gujarat, Karnataka andregistration of end Orissa have reported tousers, use of satellite have started use ofimagery to track down hologram in theirillegal mining, hologram- transport permitsmarking of transport Source: PIBpermit, etc. Text Text
Security Holograms providing authentication, identification and arresting counterfeitHow they are using •Director of Mines and Geology procures the High Security Holograms from the reputed hologram manufactures which are produced in highStep security environment. Each hologram carries various security features 1 including numbering to track and trace. •The Director of Mines and Geology – has a centralized systemStep to issue the Holograms from his office 2 •Based on the need, the Deputy Directors/Senior Geologists from theStep respective States placed their requirement of Holograms to the Director of Mines and Geology who in turn issue the Holograms after receipt of 3 signature of receiving official.Step •A stock issuing register is maintained in the concerned section in the 4 Office of the Director of Mines and Geology.Step •The Deputy Directors – the receiver of Holograms has to maintain a stock register by entering the Hologram Serial Number, date of issue, etc. and he 5 finally issues to the Stock Yard Text owner. Text The Stock Yard owner’s responsibility begins here by accurately using in dispatches and maintaining records.
Security Holograms providing authentication, identification and arresting counterfeitWhy security hologram has been used1. Provide multi-layered security features Level 3 Conforms to the level (Forensic of security features features) for authentication Level 2 suggested by (Covert features, hidden INTERPOL information) Level 1 Text (Overt features, Text visual authentication)
Security Holograms providing authentication, identification and arresting counterfeit Why security hologram has been used 2. Provide convenience of AuthenticationSecurity level Security Hologram Assisting / Inspection level features Level When the secured 1 OVERT document will be viewed by officer’s at various points during inspection Level When the secured document will 2 be subject to inspection by COVERT / senior officials Level When the secured document is 3 FORENSIC subject to forensic examination / in case of fraud
Security Holograms providing authentication, identification and arresting counterfeitWhy security hologram has been used3. Other benefits• Proven track record in deterring counterfeiters• Provide tamper evident solution• Easy to recognize / difficult to get copied• Easy to verify (visually and by machine)• Easy to apply and incorporate• It has been used because industry is doing continuous R&D
Security Holograms providing authentication, identification and arresting counterfeitConclusion The USP of security hologram is that it carries overt, covert and forensic security features which make it’s an optimal solution for identification & authentication. That is the reason it has been used by more than 100 Bank authorities in 150 bank denomination, passports, visa etc. In India more than 19 States Excise Department, all Electoral Department, Pharma & Automobile sector are using it as an tools to authenticate. No reason why it cannot be taken up as an industry initiative against counterfeit.
Holograms providing authentication, identification and arresting counterfeitThank You For more information, please contact HOMAI at email@example.com Text Text