Many security technologies (Anonymous, Effective supply chain protection, 2002) have been developed to protect a wide range of products, documents, and individuals. The food industry has very specialized needs, and food products may be affected by criminal activities such as tampering, relabeling, unauthorized diversion, and counterfeiting. It is important to understand the attributes associated with security technologies so that the benefits may be weighed against the restrictions that arise when selecting appropriate solutions to protect the food supply chain. Security technology may be split into a number of categories: authentication, coding, tamper evidence, and tracking. Within each category the technology may be subdivided into overt, covert, and forensic features. No single technology provides an infallible solution to all problems, so the most enduring and effective solutions almost always comprise a combination of technologies that provide deterrence, aid detection, and assist with subsequent prosecution of perpetrators.
Skip Nav Destination
Close
Article navigation
Research Article|
June 01 2005
Authentication, Antitamper, and Track-and-Trace Technology Options To Protect Foods
RICHARD B. JOTCHAM
RICHARD B. JOTCHAM
*
Technology Services, Axess Technologies, Ltd., Andover, Hampshire SP11 7HB, UK
* Author for correspondence. Tel: +44 (0) 1264 369005; Fax: +44 (0) 1264 366750; E-mail: rjotcham@axesstechnologies.com.
Search for other works by this author on:
J Food Prot (2005) 68 (6): 1314–1317.
Article history
Received:
September 24 2004
Accepted:
March 02 2005
Citation
RICHARD B. JOTCHAM; Authentication, Antitamper, and Track-and-Trace Technology Options To Protect Foods. J Food Prot 1 June 2005; 68 (6): 1314–1317. doi: https://doi.org/10.4315/0362-028X-68.6.1314
Download citation file:
Close