Influences for Packaging to 2023

If you wish to purchase this publication, please contact us.

The book explores a diverse range of potential technological developments that will shape and influence packaging in the future. Topics discussed in the book include:

  • 3 D Printing
  • 5G Mobile Technology
  • Augmented and Virtual Reality
  • Biodegradable / Sustainable Materials
  • Driverless Trucks
  • Drones
  • Flexible Displays
  • Biometric Monitors
  • Interactive Smart packaging
  • Mobile and On-the-Move Living
  • Personal Nutrition
  • Post Packaging Pasteurisation
  • Printed Electronics and Power Cells
  • Remote Shopping and e-Deliveries
  • Robots and Smart Environments
  • Shape Recognition & Sensing Technologies
  • Smart Wearables
  • Future Shopping and Dynamic Pricing

The book is a thought provoking experience aimed at:

  • Product Development Managers
  • Packaging Designers
  • Supply Chain Managers
  • Investors in Packaging
  • Suppliers of Packaging
  • Users of Packaging
  • Material Suppliers
  • Product Retailers

Security Substrates

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Overview
1.1 Introduction
1.2 Substrates in Security Applications
1.3 History
2. Paper and Packaging
2.1 Introduction
2.2 Security Features
2.2.1 Watermarks
2.2.2 Coating
2.2.3 UV dull stock
2.2.4 Inclusions in the paper
2.2.5 Paper security threads
2.2.6 Impregnation and Coating
2.2.7 Security Packaging Applications
3. Plastic
3.1 Introduction
3.1.1 Polyester
3.1.2 Polypropylene
3.1.3 Polyethylene
3.1.4 Polycarbonate
3.1.5 Polyvinyl Chloride
3.1.6 Nylon
3.1.7 Viscose (Rayon)
3.1.8 Polyvinyl Alcohol (PVOH)
3.1.9 Teslin ®
4. Composites
5. Glass
6. Metal
7. Future Developments
Glossary

Description

Published in early March 2003, this report provides a review of the range of substrates that are used in security applications, including paper, plastics, glass and metal and is particularly targeted towards product development managers, material scientists and brand packaging specialists concerned with the integration of security features into packaging, labels and documents.

A security substrate constitutes the starting point of virtually all anti-piracy systems. Today, the most widespread security substrate is paper where it is employed under a variety of guises such as documents, box board and packaging. Plastic films were initially developed to protect printed information and similar technology is used to produce plastic security products such as threads and tear tapes in their own right. More recently there has been a realisation that branded products are at risk from counterfeiters. This has resulted in the development of other secure substrates such as glass and metal that will form the basis of a new generation of security packaging control.

This report provides an overview of these features and discusses how secure substrates have become more intricate and sophisticated in order to meet the diverse needs of the end users.

Product Review

The properties of a security substrate may differ markedly from those used to manufacture conventional documents, packaging and board. Therefore, the selection of the most appropriate material is essential. The “Security Substrate” report provides sufficient information about substrate manufacture, security features and applications to become an appropriate reference tool for everyone with an interest in security technology.

In each of the substrate categories within the report there are examples of both former and current applications. Security substrate development is an on-going process. Materials that were initially hard to manufacture and of limited availability a few years ago, may be in common use today and therefore their security value has diminished. As a result, the development of new substrates and their derivatives is essential to keep ahead of the criminals looking to reproduce security documents and branded products.

A security substrate constitutes the starting point of virtually all anti-piracy systems. It needs to demonstrate a variety of properties:

– It must be compatible with the product or application in which it will be used.
– It provides the basis to which other security features are attached and therefore should not interfere with their performance.
– The substrate should ideally be difficult to manufacture by commercially available techniques or should consist of materials that are of limited or controlled availability.
– The substrate must be manufactured consistently over a protracted time period to ensure availability for the lifetime of the product that is being protected.

Interactive Overt Features

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Overview
1.1 Introduction
1.2 The multi-functional authentication device
1.3 Definition of security levels
1.4 Interactive Overt Features
1.5 Applications for Interactive Overt Features
2. Security Features
2.1 Introduction
2.2 Visual Features
2.2.1 Paper / Substrate Features
2.2.2 Print / Ink Features
2.2.3 Foiling and Coating Features
2.3 Contact Features
2.3.1 Paper / Substrate Features
2.3.2 Print / Ink Features
2.3.3 Foiling and Coating Features
2.4 Audible Features
2.5 Taste Features
2.6 Olfactory Features
2.7 Combination Features
3. Summary
4. Future Developments
Glossary

Description

Published in April 2003, this report provides an overview of security features and technologies that interact with the person undertaking the authentication of the product or packaging. It discusses verification techniques that employ human senses and explains how these can provide effective and innovative security systems that are sophisticated but do not require complex reading equipment.

There is a great diversity of technologies available for brand protection and document security, with an equally varied range of applications and authentication methods. This report focuses on interactive overt features. These are security features that are obvious and readily recognised and that can be actively authenticated by relatively unskilled or untrained users. Although brand and document protection is a serious issue, the introduction of a fun element can encourage or promote the authentication process. Therefore marketing elements may be able to serve a more serious role of security and protection.

The features and devices described in this report require no specialised viewing or reading equipment. Instead, they rely on the human body to act as a multi-functional authentication tool.

Security Holograms

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Introduction
1.0 What is a hologram?
1.1 History
1.2 Types of holograms
2. Manufacturing
2.1 Embossed holograms
2.2 Photopolymer holograms
2.3 Comparison of embossed /photopolymer
3. Product Forms
3.1 Introduction
3.2 Foils
3.3 Labels
3.4 Laminates
3.5 Threads
3.6 Packaging
3.7 Other product forms
4. Application Methods
4.1 Foiling
5. Holograms and security
5.1 Threats to holograms
5.2 Holograms in document security
5.3 Holograms in brand protection
5.4 IHMA/ Hologram Image Register
5.5 The importance of training and education
5.6 Hologram features and terminology
5.7 Hologram trade and trademark name
6. Future Developments
7. Summary
Glossary

Description

Published in December 2003, this report presents an impartial guide and an introduction to holograms as security devices. It is intended to be useful and accessible to non-technical readers, as well as to a more technical audience. It is not intended to be a detailed text on optical physics and includes only a very brief description of hologram origination. The main focus is on the various applications, application methods, security features and security issues relating to holograms in document security and brand protection. We also hope to provide assistance in jargon busting by explaining some of the many different terms that are used to describe different types of holograms and features.

From their invention in the 1940s and their first mass production in the 1970s, holograms have developed into arguably one of the most successful security devices in recent times. Their success stems from a number of factors: their striking visual appearance, the wide range of product formats in which they can be used, and their ability to incorporate overt, covert and forensic level authentication and tracking capabilities. They can also provide a platform or substrate for other security technologies.

Security Paper Threads

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Introduction
2. Security Threads in Paper
2.1 Security Thread History
2.1.1 Coloured and Magnetic Threads
2.1.2 Machine Readable Threads
2.1.3 Fluorescent Threads
2.1.4 Microprint Threads
2.1.5 Windowed Threads
2.1.6 Demetallised Threads
2.2 Recent Thread Developments
2.2.1 Two Colour Fluorescent Print
2.2.2 Magnetic Encoded Thread
2.2.3 Electrically Readable Threads
2.2.4 Wider Security Threads
2.2.5 Colour Change Threads
2.2.6 Holographic Security Threads
2.2.7 Thermochromic Security Threads
3. Manufacturing Processes
3.1 Materials Used
3.2 Holographic Threads
3.3 Printed Security Threads
3.4 Lamination Processes
3.5 Adhesive Formulations
3.6 Macro-slitting
3.7 Micro-slitting
4. Thread Structures
5. Strength, Durability and Lightfastness
6. Incorporation of Thread into Paper
6.1 Fully Embedded
6.2 Windowed
6.3 Spool Sizes
6.4 Thread Wander
6.5 Guillotining and Perforating Issues
7. Recycling and Broke Considerations
8. Future Developments
Glossary

Description

Published in January 2005: Our latest Technology Report describes security paper threads that have been used to protect documents for many years. These fundamental security applications have involved specialist technology that has been developed by the thread manufacturers.

This report provides an in depth review of the composition and manufacturing techniques associated with embedded security threads and describes the types of security features that can be accommodated. It also provides useful information about the implementation criteria and technical issues associated with the inclusion of these threads into security paper.

Defining and Implementing a Brand Protection Strategy

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

  1. The current threat to brands
  2. What market drivers affect Brand Owner strategies
  3. How to find and implement a solution to fraud
  4. Measuring the success of the Implementation

Description

A three-hour course on a double DVD written and presented by Richard Jotcham – Chairman of Axess Technologies.

Richard Jotcham

Richard Jotcham is Director and a founder of Axess Technologies Ltd.

Richard has over 20 years experience in the sourcing, management and development of security technologies and their implementation, ranging from banknotes to ID technologies to product identification and product piracy protection. His particular area of expertise lies in the development of anti-counterfeiting strategies and systems. He also has specialist knowledge in the development of secure substrates, as well as tagging and tracking systems.

As an acknowledged industry expert, Richard has managed projects for a number of global organisations, providing assistance in product and packaging development, as well as in the identification, sourcing and application of relevant security technologies. He is retained by a number of organisations to provide on-going technology reviews and assistance in various development projects and is also an accredited monitor for government and EU projects. Richard has a BSc (Hons) in Applied Chemistry. He is also a Chartered Chemist (C.Chem), a Member of the Royal Society of Chemistry (MRSC) and an Associate of the Institute of Packaging (A.Inst.Pkg). In 2000 he won the First Prize for Innovation (Royal Society of Chemistry). Richard is the author of numerous patent applications related to document security.

His expertise is regularly called upon for contributions to security industry related books, international security magazines and as a speaker at security industry conferences.

rjotcham@axesstechnologies.com

David Philips

If you are in North America you may wish to contact our representative.

David Phillips has over 30 years of multi-national and diversified business development experience as an executive, starting with ICI in London. Over the past ten years he has been CEO of two companies involved in brand protection, document security and supply chain management. Prior to becoming President and CEO of PhotoSecure, a photonics enabled information company, Mr. Phillips was President and CEO of Biocode (now Authentix), a biotechnology start-up company that offers antibody detection methodology for brand protection by product marking. Previously, he was President and CEO of two specialty chemical companies. He served as CEO of the Sherex Chemical Company, Inc. with sales of $200 million/year. Prior to this assignment, he performed a similar role for RioTinto Zinc Plc.

Mr. Phillips has a B.A. (Honors), B.Sc. and M.A. all from Oxford University, where he majored in Chemistry. He was born in the United Kingdom but has lived in the U.S.A. for the last 30 years and is a United States citizen based in New York and London.

dphillips@axesstechnologies.com

Cliff Crosfield

Cliff Crosfield has worked in the Brand Protection and Anti-Counterfeit sectors for many years, dealing with solution development and security technologies for leading security print and label companies.

He has extensive experience in packaging and printing and has worked in Australia and the UK, as well as Consultancies in Saudi Arabia, Europe, and UK.

Cliff has worked for Walsall Brand Protection & Walsall Security Printers, and prior to that with Linpac Packaging UK, Amcor Packaging Australia, and D.S.Smith, UK. He attended Lincoln University where he studied MBA Marketing (Cert) and has Diploma & Certificates in Administrative Management.

He has been involved in the development of security technologies and their application to labels and packaging.

ccrosfield@axesstechnologies.com

John Lagunowich

John Lagunowich at Banknote Technologies, Inc. based in the US has worked in the banknote industry for over 30 years. John held senior sales and marketing positions for US, French, Canadian and Swedish security paper mills supplying a broad range of document and currency papers globally. In the early 1980’s he was a Senior Vice President at American Banknote Company in New York where he introduced the first security holograms to MasterCard and Visa.

Many of the brand protection security features used today were derived from the banknote industry. Today, these features are combined with new digital print and authentication technologies to provide the complete security solution for brand companies. John Lagunowich provides advisory services for the implementation of strategic security solutions for brand companies utilizing his managerial background in security papers, packaging and printing. Every product risk and the overall level of corporate threat from counterfeit and diversion is evaluated for the short and long term.

John presents clients with multiple proven and cost efficient security solution options for the stated requirements. John ensures that vetted solutions can be deployed in the existing production of the product or packaging in line at present process speeds with no costly off line operations to add the overt, covert or the track and trace security features that are implemented.

jlagunowich@axesstechnologies.com