TRACK & TRACE SOFTWARE

Track & Trace begins with marking each individual item, carton (or assimilating package) and pallet with a unique code. A relationship between each item, package and pallet is established, generally referred to as a parent-child relationship. The items, packaging and pallet are usually identified with a 2D code or with RFID technology. The purpose of doing so would be to track the individual item from manufacture to final receipt by the consumer.

Pagemark Africa offers manufacturers a complete solution to track & trace their products as well as can provide an authentication technology in the same process. The authentication technology is based on the secure PeltaTM code which is encrypted in a proprietary format and cannot be recreated by counterfeiters or fraudsters. This technology is supported by a platform that when scanned with a smartphone, the geolocation of the scan will be recorded, and relevant authorities and/or brand owners will be informed of suspicious activities relating to their products for further investigation.

Benefits:

A multi-layered anti-counterfeit protection:

This is done as a result of establishing supply chain history of each item, as well as providing an authentication solution for brand owners, consumers, and law enforcement.

Pagemark Africa’s track & trace solution can be added to existing 2D codes:

The secure PeltaTM code can easily be added to most existing 2D code technology.

Easy to customise and integrate:

The track & trace solution can easily be customised and integrated into any existing variable printing workflow regardless of the complexity or number of systems used.

Global recall programmes:

The PeltaTM server can be used in the planning and management of global recall programmes.

Easily authenticate products:

The secure code can be authenticated by anyone, at any time in the supply chain.

Global product tracking:

The Pelta™ Server can provide geo-tracking data aggregation for global product tracking and provide customized alerts of suspicious or fraudulent activity

Empower consumers to authenticate products:

Consumers are even able to verify the authenticity of products before purchasing.