SlideShare a Scribd company logo
1 of 2
Download to read offline
Supply Chain/Subcontractor Overruns Application

Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when
subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply
chain. These items are often identical to the genuine products; however the contracting company is robbed of its
rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is
not able to undertake the necessary safety tests on the overrun products.

Bilcare Technologies’ solution
Imagine that you were able to attach a unique irreproducible barcode to every item you produced. The irreproducible
barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able
to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent
information about the individual barcode, and could also track information useful to you, such as when and where the
barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION.

How can you use this solution to protect your brand – particularly to
prevent subcontractors from making overruns? First the subcontractor
must be instructed to attach, or embed, a tag on or into each product being
produced in the factory. Each time this is done, it is logged in the remote
database. This means that you can track exactly how many items are being
produced each day, and if the factory is inspected each of the items produced
must have its own tag matching what has been updated in the database for
                                                                                    A demonstration swipe card containing a
that day. Similarly when the products leave the factory they must all have          working invisible Singular ID fingerprint.
active tags registered in the database. When the distributors receive the
shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active
in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale
will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized
to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed
allowing instantaneous secure product/warranty matching. We call this technology Singular ID.

Technology
Bilcare Technologies’ Singular ID solution is based on over five years of
intensive research and development. This research has allowed us to use
naturally occurring micro- and nanoscale disorder within materials to
uniquely identify items of value. Although we are able to make materials           A scanning electron micrograph of
each with its own unique structure (or “fingerprint”) we are unable to control     Singular ID fingerprint technology.
                                                                                   The fingerprint consists of micro- or
exactly what formation the disorder takes. This means that we are unable to        nanoscale features embedded within
make two pieces of material with the same fingerprint, and therefore believe       a material. Each fingerprint produces
                                                                                   its own unique signal and even we are
that it would impossible for someone else to control the disorder on this size     unable to reproduce a fingerprint.
scale in order to make a replica of any fingerprint. We have developed an
asset tracking system around this concept. Key components of the system
are:
•	 Unique tags attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint
     structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide
range of materials, including leather, fabric and textile, plastic and metal.
 •	    Portable devicesto read the fingerprints and retrieve information about the objects the tags are attached to. The
       readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint.



                                                                         3. Compare tag signature
                                                                            to database content


                                      2. Securely send the
                                         tag signature

                                                                                                                   4. Authenticate tag
                                                                                                                     and product
                               1. Scan the
                                  product tag

                                                                                                      /
                                                                                               5. Confirm
                                                                                                  authenticity




  Secure database: At the point of manufacture each fingerprint is stored in a secure database. The portable readers are
  able to connect to this secure database from anywhere in the world. The database compares the incoming fingerprint
  with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint.
  The database is an extremely valuable tool for brand protection since it can contain a wide variety of information
  about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a
  fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner.
  For example, brand owners can store customized information about tags and tagged products including to which
  distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’ Singular ID
  solution is therefore an excellent means to detect and deter product diversion, and to avert fraud.




         BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386
   BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555
                                               www.singular-id.com, enxure@singular-id.com



© 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’ solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE
                                         TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N.
                                                          Non-confidential document, reference: INFO-01 18.4, Feb 2009.

More Related Content

Similar to Supply Chain Usage

Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationBilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionPetr Cermak
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyIRJET Journal
 
True authentication of tablets
True authentication of tabletsTrue authentication of tablets
True authentication of tabletsPaulGlendenning2
 
Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonIRJET Journal
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry BrandAlfons Futterer
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Journals
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterkingeSAT Publishing House
 
Track and trace
Track and traceTrack and trace
Track and traceBilcareltd
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Anti counterfeit packaging
Anti counterfeit packaging Anti counterfeit packaging
Anti counterfeit packaging Samiksha Sawant
 
New final tf--nfc_open_sense
New final tf--nfc_open_senseNew final tf--nfc_open_sense
New final tf--nfc_open_senseTim Johnson
 
Recheck - Product Digital Identity
Recheck - Product Digital IdentityRecheck - Product Digital Identity
Recheck - Product Digital Identityrecheck
 

Similar to Supply Chain Usage (20)

Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns Application
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Use of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protectionUse of cryptographic anchors and blockchain for product protection
Use of cryptographic anchors and blockchain for product protection
 
DNA_NEW
DNA_NEWDNA_NEW
DNA_NEW
 
Agrochemicals
AgrochemicalsAgrochemicals
Agrochemicals
 
The impact of barcode scanner technology
The impact of barcode scanner technologyThe impact of barcode scanner technology
The impact of barcode scanner technology
 
Fake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain TechnologyFake Product Detection Using Blockchain Technology
Fake Product Detection Using Blockchain Technology
 
True authentication of tablets
True authentication of tabletsTrue authentication of tablets
True authentication of tablets
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Smart Barcode Authentication System Using Python
Smart Barcode Authentication System Using PythonSmart Barcode Authentication System Using Python
Smart Barcode Authentication System Using Python
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry Brand
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Information security by biometric waterking
Information security by biometric waterkingInformation security by biometric waterking
Information security by biometric waterking
 
Fashion
FashionFashion
Fashion
 
Track and trace
Track and traceTrack and trace
Track and trace
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Anti counterfeit packaging
Anti counterfeit packaging Anti counterfeit packaging
Anti counterfeit packaging
 
New final tf--nfc_open_sense
New final tf--nfc_open_senseNew final tf--nfc_open_sense
New final tf--nfc_open_sense
 
Recheck - Product Digital Identity
Recheck - Product Digital IdentityRecheck - Product Digital Identity
Recheck - Product Digital Identity
 

More from Bilcare Research

Virtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeVirtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeBilcare Research
 
Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development FactsheetBilcare Research
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Bilcare Research
 
Anti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesAnti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesBilcare Research
 
Dispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DDispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DBilcare Research
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Research
 

More from Bilcare Research (13)

Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Cs Ivrs
Cs IvrsCs Ivrs
Cs Ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
Virtualization Helps Bilcare Optimize
Virtualization Helps Bilcare OptimizeVirtualization Helps Bilcare Optimize
Virtualization Helps Bilcare Optimize
 
Cs ivrs
Cs ivrsCs ivrs
Cs ivrs
 
Clinical Research & Development Factsheet
Clinical Research & Development FactsheetClinical Research & Development Factsheet
Clinical Research & Development Factsheet
 
Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...Micro and nanotechnology to enhance the physical security of credentials and ...
Micro and nanotechnology to enhance the physical security of credentials and ...
 
Anti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging TechnologiesAnti-Counterfeit Packaging Technologies
Anti-Counterfeit Packaging Technologies
 
Dispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &DDispelling the Myths About Pharmaceutical R &D
Dispelling the Myths About Pharmaceutical R &D
 
Bilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business GrowthBilcare Cost Effectively Scales For Business Growth
Bilcare Cost Effectively Scales For Business Growth
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Supply Chain Usage

  • 1. Supply Chain/Subcontractor Overruns Application Counterfeiting is a growing problem. It comes in many forms, the most subtle and difficult to monitor occurs when subcontractors make overruns of a product and sell the overrun items directly into the market or existing supply chain. These items are often identical to the genuine products; however the contracting company is robbed of its rightful revenues from the sale of the products. In some cases safety is compromised as the contracting company is not able to undertake the necessary safety tests on the overrun products. Bilcare Technologies’ solution Imagine that you were able to attach a unique irreproducible barcode to every item you produced. The irreproducible barcodes are inexpensive and can be read from anywhere in the world using a portable reading device that is able to authenticate them by sending a signal back to a remote secure database. The database would provide pertinent information about the individual barcode, and could also track information useful to you, such as when and where the barcode was read. BILCARE TECHNOLOGIES OFFERS THIS SOLUTION. How can you use this solution to protect your brand – particularly to prevent subcontractors from making overruns? First the subcontractor must be instructed to attach, or embed, a tag on or into each product being produced in the factory. Each time this is done, it is logged in the remote database. This means that you can track exactly how many items are being produced each day, and if the factory is inspected each of the items produced must have its own tag matching what has been updated in the database for A demonstration swipe card containing a that day. Similarly when the products leave the factory they must all have working invisible Singular ID fingerprint. active tags registered in the database. When the distributors receive the shipment they can verify that all items are tagged and they can use a reading device to verify that the tags are active in the database. Finally the solution can even be implemented at the point of sale. A reading device at the point of sale will enable the retailer to assure the customer that they are buying a genuine product. This reader can be customized to print a warranty for the customer on site – the database will log exactly when and where the warranty was printed allowing instantaneous secure product/warranty matching. We call this technology Singular ID. Technology Bilcare Technologies’ Singular ID solution is based on over five years of intensive research and development. This research has allowed us to use naturally occurring micro- and nanoscale disorder within materials to uniquely identify items of value. Although we are able to make materials A scanning electron micrograph of each with its own unique structure (or “fingerprint”) we are unable to control Singular ID fingerprint technology. The fingerprint consists of micro- or exactly what formation the disorder takes. This means that we are unable to nanoscale features embedded within make two pieces of material with the same fingerprint, and therefore believe a material. Each fingerprint produces its own unique signal and even we are that it would impossible for someone else to control the disorder on this size unable to reproduce a fingerprint. scale in order to make a replica of any fingerprint. We have developed an asset tracking system around this concept. Key components of the system are: • Unique tags attached to, or embedded into, objects during manufacturing. Each individual tag has a fingerprint structure that confers it a unique signature. Singular ID tags can be incorporated overtly or covertly into a wide
  • 2. range of materials, including leather, fabric and textile, plastic and metal. • Portable devicesto read the fingerprints and retrieve information about the objects the tags are attached to. The readers can also be customized to print out a warranty on-site upon successful verification of the fingerprint. 3. Compare tag signature to database content 2. Securely send the tag signature 4. Authenticate tag and product 1. Scan the product tag / 5. Confirm authenticity Secure database: At the point of manufacture each fingerprint is stored in a secure database. The portable readers are able to connect to this secure database from anywhere in the world. The database compares the incoming fingerprint with that which has been stored previously, and sends a signal to the reader to verify the identity of the fingerprint. The database is an extremely valuable tool for brand protection since it can contain a wide variety of information about the product, some or all of which can be sent to the reader. It is also able to monitor exactly when and where a fingerprint was read. All this information can be tracked, monitored and analyzed for the benefit of the brand owner. For example, brand owners can store customized information about tags and tagged products including to which distributor tagged products were supplied and in which countries they can be sold. Bilcare Technologies’ Singular ID solution is therefore an excellent means to detect and deter product diversion, and to avert fraud. BILCARE TECHNOLOGIES SINGAPORE PTE LTD, 52 Changi South Street 1, Singapore 486161, Tel: +65 6545 1810, Fax: +65 6542 4386 BILCARE TECHNOLOGIES ITALIA, presso Veneto Nanotech, Via San Crispino 106, 35129 Padova, Italy, Tel: +39 049 7705522, Fax: +39 049 7705555 www.singular-id.com, enxure@singular-id.com © 2009 BILCARE TECHNOLOGIES SINGAPORE PTE LTD. BILCARE TECHNOLOGIES’ solutions are protected by both granted and pending patents. Singular ID is a trademark of BILCARE TECHNOLOGIES SINGAPORE PTE LTD. Company registration number 200416616N. Non-confidential document, reference: INFO-01 18.4, Feb 2009.