Stop Counterfeiting Straight From the Farm

Aug. 10, 2017
TruTag’s optical microtag authentication technology will soon be utilized to protect China’s livestock in the supply chain, beginning with pigs.

First, there was the “connected cow,” a term used by Fujitsu to describe its cattle breeding support service that leverages the Internet of Things (IoT), Big Data and the cloud to monitor female cow behavior. The goal is to understand when the animal is ready to breed, thereby increasing the cow population for meat and dairy farmers.

Now, there’s the “secure swine,” a term that I just made up to describe a new use of microtags to authenticate livestock during meat packaging.

As Automation World reported late last year in the feature story Taking a Bite Out of Crime, TruTag Technologies offers “edible memory” in the form of tiny microscopic particles made of silicon dioxide, also called silica. Silica is a compound that is edible and resistant to high temperatures. In a pharmaceutical plant, the company’s microtags could be etched onto the individual pill as an optical signature that can be mixed into a coating or polymer. That means not just every bottle, but every pill can be tagged with authentication technology as an anti-counterfeiting measure across the supply chain.

Now, in a real world example of an edible barcode for food, TruTag has entered into a Memorandum of Understanding to establish a strategic partnership with Hongyang Biotechnology Co., Ltd, an animal health management and farm management provider in the livestock sector in China.

In this latest development, the partnership will seek to implement TruTag’s security platform across Hongyang’s growing livestock portfolio of 1,500 farms throughout China. The cooperation will initially target the pig industry with the potential to expand into other livestock categories. Areas of specific focus will include the direct marking and authentication of livestock and meat packaging.

This is a unique opportunity to safeguard the pig supply chain with advanced security technology, business intelligence and the ability to take corrective action to enforce authenticity. More importantly, this will protect consumers.

Just a few years ago, The New York Times reported that China’s Ministry of Public Security announced that the police had caught a gang of traders in eastern China who bought rat, fox and mink and sold it as mutton. It’s an international problem. Just last year, Fortune magazine reported that INTERPOL seized about 11,000 tons of counterfeit food as part of a joint effort with Europol, seizing monkey meat, illegal beef, buffalo meat, tilapia “unfit for human consumption,” sugar contaminated with fertilizer, as well as fake alcohol.

Here in the U.S., where manufacturers are under pressure to comply with the Food Safety Modernization Act, this technology could help secure the supply chain from farm-to-fork—for any form of meat, fruit or vegetables.

TruTag officials were unavailable to comment on whether this technology will penetrate the U.S. market in the near future, but in a statement TruTag CEO Michael Bartholomeusz commented on the recent news: “We are thrilled to have formed this partnership with Hongyang,” he said. “By combining TruTag’s products with Hongyang’s deep sectoral expertise, together we can offer a holistic solution that provides best in class supply chain security.”

About the Author

Stephanie Neil | Editor-in-Chief, OEM Magazine

Stephanie Neil has been reporting on business and technology for over 25 years and was named Editor-in-Chief of OEM magazine in 2018. She began her journalism career as a beat reporter for eWeek, a technology newspaper, later joining Managing Automation, a monthly B2B manufacturing magazine, as senior editor. During that time, Neil was also a correspondent for The Boston Globe, covering local news. She joined PMMI Media Group in 2015 as a senior editor for Automation World and continues to write for both AW and OEM, covering manufacturing news, technology trends, and workforce issues.

Sponsored Recommendations

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...

Creating A Digital Transformation Roadmap Using A Unified Namespace

Digital Transformation has become one of the most popular buzzwords in the automation industry, often used to describe any digital improvements to industrial technology. But what...