Download presentation
Presentation is loading. Please wait.
Published byNaomi Washington Modified over 6 years ago
1
Authentication of product items in the supply chain: Role of the chain of custody
4/5-October-2017
2
There is safety to be found in the implementation of the full suite of GS1 standards – capitalise on operations visibility as opposed to covert markings
3
e-Pedigree as a pre-requisite for authentication
Different approaches to traceability Traceability models: Honesty models – e.g. Fair Trade strictly non-real time, e-pedigree refer to shipments and volumes of product and is subject to verification by means of physical audits Batch-and-order models – e.g. most of pharmaceutical and FMCG tracking real time and/or non-real time, e-pedigree based on batch and volumes of product and, in some instances, can be hard, but mostly not Item instance model – e.g. the SCC-system operating in the South African cotton industry strictly real time, inherently forensically hard Use GS1 set of standards: Link internal stock codes to GS1 codes Mark using EPC Track using EPCIS
4
Capture history per item handling event
Trigger: Relate output items to input items through all value-add process steps A one-to-many situation where: I = item, i = item instance number, n = the number of items produced under the specific batch/WO/Lot
5
Capture history per item handling event
Trigger: Each new event inherits the past and adds an additional line
6
Capture history per item handling event
Trigger: Create a single traceability audit trail across the supply chain Single version of the truth A B C D
7
Capture history per item handling event
Trigger: Item handling events tie up with purchase orders and sales orders Purchase Contract Sales Contract Purchase order Sales order Receive Transformation Out Dispatch In
8
An example: The Sustainable Cotton Cluster - system
9
Tracking all supply-chains in the cotton value chain
The cotton value chain supported by the SCC-system Cotton Pilot: achievements since 2013 200% increase in SA cotton production 35% Increase in local cotton beneficiation about 500 jobs created 1300 small farmers established 1600 people received BCI training 11 integrated supply chain programmes (product lines) created ZAR 2,5 billion integrated supply chain value throughput
10
Authenticating against a trusted body of evidence
11
A forensically hard body of evidence
Summary of authentication triggers S-GTIN – A SGTIN number can be issued once only per item instance Input-Transformation-Output – Reference-ability between product items and raw material items (by instance level ID) and manufacturing process Accumulated history – shows a known history of item handling events from origin – built in real time - cannot be changed or added after the event – absence of such history a risk trigger Traceability audit trail creation – this audit trail follows the supply chain – created through machine-to-machine communications – automatically structured as organisations trade – no human intervention in this procedure Contracts-orders-items – link items visibly to legitimate orders and contracts and role players – information structured accordingly throughout the supply chain
12
Share in our future for the benefit of yours!
Edited version of IQ-Thentic video
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.