Issue link: http://winesandvines.uberflip.com/i/347498
W i n e s & V i n e s A U G U s T 2 0 1 4 45 These features, which generally offer a good level of security, are extremely vari- able in terms of cost and complexity of integration. If the taggants are easy to add to an ink or dye, integration of an RFID or NFC chip adds complexity to the pro- cess. A connection to a database contain- ing references may also prove necessary. Covert technologies covered are either extrinsic (added to the product or its packaging during the manufacturing pro- cess) or intrinsic (they result from risks associated with the material used or the manufacturing process). Within this tech- nological family, the most frequently used form of intrinsic marking is the imaging of a specific zone of the product. This image becomes the product's authenticat- ing signature. The "chaos" of materials usually found on the market includes bubbles, particles and fibers. This "chaos" may be obtained by the addition of materials to a product or by using the intrinsic characteristics of this product. fEaTurES involving SCiEnTifiC analySiS (forEnSiC) "Forensic"-type features include physical markers such as taggants (radio frequency microchips), or biological markers such as DNA and other physical and chemical parameters (isotopes, etc.). Portable analysis equip- ment or laboratory material is necessary to carry out this type of check properly. For them to be particularly reliable, these elements demand a rigorous and some- times lengthy protocol for checking. Forensic technologies are based on scientific analysis, and they necessitate the use of laboratory tools. Great prog- ress has been made in the miniaturization and mobility of these tools. A rigorous protocol must then be put in place to capture the elements used for authentica- tion. In some sectors it may be necessary to take samples, but in the case of wine this would entail the destruction of the product. TraCk anD TraCE TEChnologiES These technologies come from the logis- tics industry and make it possible to ensure that goods are traceable. As a re- sult of numerous incidents involving the recall of goods, a diverse range of tech- nologies has emerged in this area of activ- ity. The barcode and RFID are the two most frequently quoted technologies in this environment. The application of radio-frequency identification has been extended as a result of the anti-counter- feiting campaign, since many counterfeit- ing risks can emanate from the heart of the supply-chain (transporter, importer, etc.) and necessitate not only traceability but also identification by unit. TaMPEr-EviDEnT fEaTurES Tamper- evident features are procedures that pre- vent access to the protected objects. Seals or markers form part of such techniques. Turchini reveals in his study from the University of Florence that the Italian government created official seals to pro- tect the highest quality wines under the designations DOC and DOCG. Yet such a technique cannot protect against mali- cious acts by counterfeiters, as the unique character of the official seal cannot be guaranteed. Finally, the practice of refilling bottles poses a major problem in the develop- ment of anti-counterfeiting techniques. This problem arises the same way an empty box from a high-end supplier may be used to repackage a counterfeit prod- uct. For the purpose of protecting wines C M Y CM MY CY CMY K AACWVAdcovered48I201402p.pdf 1 6/26/14 1:57 PM t e c h n o l o g y