Authentication, antitamper, and track-and-trace technology options to protect foods

被引:2
|
作者
Jotcham, RB [1 ]
机构
[1] Axess Technol Ltd, Technol Serv, Andover SP11 7HB, Hants, England
关键词
D O I
10.4315/0362-028X-68.6.1314
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
Many security technologies (Anonymous, Effective supply chain protection, 2002) have been developed to protect a wide range of products, documents, and individuals. The food industry has very specialized needs, and food products may be affected by criminal activities such as tampering, relabeling, unauthorized diversion, and counterfeiting. It is important to understand the attributes associated with security technologies so that the benefits may be weighed against the restrictions that arise when selecting appropriate solutions to protect the food supply chain. Security technology may be split into a number of categories: authentication, coding, tamper evidence, and tracking. Within each category the technology may be subdivided into overt, covert, and forensic features. No single technology provides an infallible solution to all problems, so the most enduring and effective solutions almost always comprise a combination of technologies that provide deterrence, aid detection, and assist with subsequent prosecution of perpetrators.
引用
收藏
页码:1314 / 1317
页数:4
相关论文
共 20 条