Influences for Packaging to 2023

If you wish to purchase this publication, please contact us.

The book explores a diverse range of potential technological developments that will shape and influence packaging in the future. Topics discussed in the book include:

  • 3 D Printing
  • 5G Mobile Technology
  • Augmented and Virtual Reality
  • Biodegradable / Sustainable Materials
  • Driverless Trucks
  • Drones
  • Flexible Displays
  • Biometric Monitors
  • Interactive Smart packaging
  • Mobile and On-the-Move Living
  • Personal Nutrition
  • Post Packaging Pasteurisation
  • Printed Electronics and Power Cells
  • Remote Shopping and e-Deliveries
  • Robots and Smart Environments
  • Shape Recognition & Sensing Technologies
  • Smart Wearables
  • Future Shopping and Dynamic Pricing

The book is a thought provoking experience aimed at:

  • Product Development Managers
  • Packaging Designers
  • Supply Chain Managers
  • Investors in Packaging
  • Suppliers of Packaging
  • Users of Packaging
  • Material Suppliers
  • Product Retailers

Security Substrates

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Overview
1.1 Introduction
1.2 Substrates in Security Applications
1.3 History
2. Paper and Packaging
2.1 Introduction
2.2 Security Features
2.2.1 Watermarks
2.2.2 Coating
2.2.3 UV dull stock
2.2.4 Inclusions in the paper
2.2.5 Paper security threads
2.2.6 Impregnation and Coating
2.2.7 Security Packaging Applications
3. Plastic
3.1 Introduction
3.1.1 Polyester
3.1.2 Polypropylene
3.1.3 Polyethylene
3.1.4 Polycarbonate
3.1.5 Polyvinyl Chloride
3.1.6 Nylon
3.1.7 Viscose (Rayon)
3.1.8 Polyvinyl Alcohol (PVOH)
3.1.9 Teslin ®
4. Composites
5. Glass
6. Metal
7. Future Developments
Glossary

Description

Published in early March 2003, this report provides a review of the range of substrates that are used in security applications, including paper, plastics, glass and metal and is particularly targeted towards product development managers, material scientists and brand packaging specialists concerned with the integration of security features into packaging, labels and documents.

A security substrate constitutes the starting point of virtually all anti-piracy systems. Today, the most widespread security substrate is paper where it is employed under a variety of guises such as documents, box board and packaging. Plastic films were initially developed to protect printed information and similar technology is used to produce plastic security products such as threads and tear tapes in their own right. More recently there has been a realisation that branded products are at risk from counterfeiters. This has resulted in the development of other secure substrates such as glass and metal that will form the basis of a new generation of security packaging control.

This report provides an overview of these features and discusses how secure substrates have become more intricate and sophisticated in order to meet the diverse needs of the end users.

Product Review

The properties of a security substrate may differ markedly from those used to manufacture conventional documents, packaging and board. Therefore, the selection of the most appropriate material is essential. The “Security Substrate” report provides sufficient information about substrate manufacture, security features and applications to become an appropriate reference tool for everyone with an interest in security technology.

In each of the substrate categories within the report there are examples of both former and current applications. Security substrate development is an on-going process. Materials that were initially hard to manufacture and of limited availability a few years ago, may be in common use today and therefore their security value has diminished. As a result, the development of new substrates and their derivatives is essential to keep ahead of the criminals looking to reproduce security documents and branded products.

A security substrate constitutes the starting point of virtually all anti-piracy systems. It needs to demonstrate a variety of properties:

– It must be compatible with the product or application in which it will be used.
– It provides the basis to which other security features are attached and therefore should not interfere with their performance.
– The substrate should ideally be difficult to manufacture by commercially available techniques or should consist of materials that are of limited or controlled availability.
– The substrate must be manufactured consistently over a protracted time period to ensure availability for the lifetime of the product that is being protected.

Interactive Overt Features

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Overview
1.1 Introduction
1.2 The multi-functional authentication device
1.3 Definition of security levels
1.4 Interactive Overt Features
1.5 Applications for Interactive Overt Features
2. Security Features
2.1 Introduction
2.2 Visual Features
2.2.1 Paper / Substrate Features
2.2.2 Print / Ink Features
2.2.3 Foiling and Coating Features
2.3 Contact Features
2.3.1 Paper / Substrate Features
2.3.2 Print / Ink Features
2.3.3 Foiling and Coating Features
2.4 Audible Features
2.5 Taste Features
2.6 Olfactory Features
2.7 Combination Features
3. Summary
4. Future Developments
Glossary

Description

Published in April 2003, this report provides an overview of security features and technologies that interact with the person undertaking the authentication of the product or packaging. It discusses verification techniques that employ human senses and explains how these can provide effective and innovative security systems that are sophisticated but do not require complex reading equipment.

There is a great diversity of technologies available for brand protection and document security, with an equally varied range of applications and authentication methods. This report focuses on interactive overt features. These are security features that are obvious and readily recognised and that can be actively authenticated by relatively unskilled or untrained users. Although brand and document protection is a serious issue, the introduction of a fun element can encourage or promote the authentication process. Therefore marketing elements may be able to serve a more serious role of security and protection.

The features and devices described in this report require no specialised viewing or reading equipment. Instead, they rely on the human body to act as a multi-functional authentication tool.

Security Holograms

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Introduction
1.0 What is a hologram?
1.1 History
1.2 Types of holograms
2. Manufacturing
2.1 Embossed holograms
2.2 Photopolymer holograms
2.3 Comparison of embossed /photopolymer
3. Product Forms
3.1 Introduction
3.2 Foils
3.3 Labels
3.4 Laminates
3.5 Threads
3.6 Packaging
3.7 Other product forms
4. Application Methods
4.1 Foiling
5. Holograms and security
5.1 Threats to holograms
5.2 Holograms in document security
5.3 Holograms in brand protection
5.4 IHMA/ Hologram Image Register
5.5 The importance of training and education
5.6 Hologram features and terminology
5.7 Hologram trade and trademark name
6. Future Developments
7. Summary
Glossary

Description

Published in December 2003, this report presents an impartial guide and an introduction to holograms as security devices. It is intended to be useful and accessible to non-technical readers, as well as to a more technical audience. It is not intended to be a detailed text on optical physics and includes only a very brief description of hologram origination. The main focus is on the various applications, application methods, security features and security issues relating to holograms in document security and brand protection. We also hope to provide assistance in jargon busting by explaining some of the many different terms that are used to describe different types of holograms and features.

From their invention in the 1940s and their first mass production in the 1970s, holograms have developed into arguably one of the most successful security devices in recent times. Their success stems from a number of factors: their striking visual appearance, the wide range of product formats in which they can be used, and their ability to incorporate overt, covert and forensic level authentication and tracking capabilities. They can also provide a platform or substrate for other security technologies.

Security Paper Threads

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

1. Introduction
2. Security Threads in Paper
2.1 Security Thread History
2.1.1 Coloured and Magnetic Threads
2.1.2 Machine Readable Threads
2.1.3 Fluorescent Threads
2.1.4 Microprint Threads
2.1.5 Windowed Threads
2.1.6 Demetallised Threads
2.2 Recent Thread Developments
2.2.1 Two Colour Fluorescent Print
2.2.2 Magnetic Encoded Thread
2.2.3 Electrically Readable Threads
2.2.4 Wider Security Threads
2.2.5 Colour Change Threads
2.2.6 Holographic Security Threads
2.2.7 Thermochromic Security Threads
3. Manufacturing Processes
3.1 Materials Used
3.2 Holographic Threads
3.3 Printed Security Threads
3.4 Lamination Processes
3.5 Adhesive Formulations
3.6 Macro-slitting
3.7 Micro-slitting
4. Thread Structures
5. Strength, Durability and Lightfastness
6. Incorporation of Thread into Paper
6.1 Fully Embedded
6.2 Windowed
6.3 Spool Sizes
6.4 Thread Wander
6.5 Guillotining and Perforating Issues
7. Recycling and Broke Considerations
8. Future Developments
Glossary

Description

Published in January 2005: Our latest Technology Report describes security paper threads that have been used to protect documents for many years. These fundamental security applications have involved specialist technology that has been developed by the thread manufacturers.

This report provides an in depth review of the composition and manufacturing techniques associated with embedded security threads and describes the types of security features that can be accommodated. It also provides useful information about the implementation criteria and technical issues associated with the inclusion of these threads into security paper.

Defining and Implementing a Brand Protection Strategy

If you wish to purchase this publication, please contact us. Alternatively you can download our order form and post it to us.

Contents

  1. The current threat to brands
  2. What market drivers affect Brand Owner strategies
  3. How to find and implement a solution to fraud
  4. Measuring the success of the Implementation

Description

A three-hour course on a double DVD written and presented by Richard Jotcham – Chairman of Axess Technologies.