TECHNOLOGIES

OUR TRACEABILITY SYSTEM

Logo

TECHNOLOGIES

OUR TRACEABILITY SYSTEM

KEY BENEFITS OF OUR IOT PLATFORM

ALL ABOUT CODIKETT

Codikett offers secure issuance of billions of unpredictable Unique Identifiers (UIDs) for your products. Thus, transparency and visibility of global distribution channels, secured by Blockchain technology is provided. Besides, you can benefit from multilingual consumer engagement, such as product-related verification and product information. We offer smart IoT applications to fulfill your specific use cases. 

KEY BENEFITS OF OUR IOT PLATFORM

ALL ABOUT CODIKETT

Codikett offers secure issuance of billions of unpredictable Unique Identifiers (UIDs) for your products. Thus, transparency and visibility of global distribution channels, secured by Blockchain technology is provided. Besides, you can benefit from multilingual consumer engagement, such as product-related verification and product information. We offer smart IoT applications to fulfill your specific use cases. 

CODIKETT - THE SYSTEM

Our modular system allows for easy self-configuration and trouble-free integration into existing systems. Codikett UIDs, once implemented for traceability, will fulfill other communication tasks simultaneously.

They are real masters of multi-tasking! To enable communication in IoT, we print 2D codes as QR or datamatrix or add an NFC chip for even easier data capture. Thus, Codikett becomes the basis of user-connectivity, providing valuable up to date information for your end user while also providing the brand owner with market intelligence and the opportunity for customer interaction.

With a secure and unique identifier, parallel market trading or counterfieting may be detected within seconds. Codikett is a digital product and online service, created and powered by Securikett.

 

CODIKETT - THE SYSTEM

Our modular system allows for easy self-configuration and trouble-free integration into existing systems. Codikett UIDs, once implemented for traceability, will fulfill other communication tasks simultaneously.

They are real masters of multi-tasking! To enable communication in IoT, we print 2D codes as QR or datamatrix or add an NFC chip for even easier data capture. Thus, Codikett becomes the basis of user-connectivity, providing valuable up to date information for your end user while also providing the brand owner with market intelligence and the opportunity for customer interaction.

With a secure and unique identifier, parallel market trading or counterfieting may be detected within seconds. Codikett is a digital product and online service, created and powered by Securikett.

 

THE UID STORY - STEP BY STEP

IT IS SO EASY TO IDENTIFY THE REAL

STEP 2

HOW DOES THE UID GET ON THE PRODUCT?

Typically, the UID is a QR code, or some other type of barcode.
The UID can either be printed on tamper-proof labels, directly printed on packaging, or even directly printed on the product itself. 

UIDs can also be introduced in the form of a radio frequency tag such as an RFID or NFC tag.

STEP 3

WE PROVIDE SECURE UNIQUE IDENTIFIERS

To prevent fraud, we guarantee identifiers to be unique and not predictable. 
Our procedure for generation encypted UIDs is cutting-edge, highly scalable, and fast. In this respect, Securikett is among the pioneers in the world of product digitalization. 

STEP 4

HOW DOES THE PRODUCT GET TO ITS DIGITAL TWIN?

Our system works with product master data and event data. For example, production lot, expiration date, shipment, and supply chain transactions are such events. This results in a data set for each product, a kind of digital twin. 

We add data to the UIDs of the individual products within the production or packaging process. This can be done unit by unit, or batchwise. And we enrich it further during shipping and through the distribution channel all the way to the consumers. 

What is a digital twin?
A digital twin is a virtual representation of a product or process. The digital and real worlds are linked in this way.

STEP 5

ROUTE PLANNING AND TRACKING THE DISTRIBUTION CHAIN

Packaging aggregation – by creating parent child hierarchies, the UID of the pallet or shipping box knows what individual product UIDs are inside. This makes it possible to capture the desination as intended, as well as real touchpoints in the distribution chain all the way to consumers.

Out of this data, valuable supply chain insights are created. For example. you can easily identify gray market trades and other types of unauthorized distribution activities, or the time it takes for products to move through the distribution chain.

STEP 6

LET'S ENCOURAGE CONSUMERS TO SCAN AND QUERY

We offer numerous opportunities to encourage consumers to scan through the design of the label and other features, so to engage with consumers. 

Modern consumers want to know more about the origin of their product and its authenticity. But fas beyond that, they are interested in how, where and under which circumstances the product was manufactured, or what are the company’s sustainability policies. 

STEP 7

AUTOMATED ANALYSIS AND EXCEPTION REPORTING BRING VALUE FOR THE BRAND OWNER

The more scans, the better quality of data. Scans provide valuable information for brand owners and their authorized personnel. Data can be provided in either raw or analyzed form, and displayed through a dashboard with a customized graphical user interface for easy interpretation. 
Business rules can be programmed into the system to provide red flags and notifications of exceptions.

Logo

SIMPLE, QUICK, ONLINE

LET’S CONNECT DIGITAL AND PHYSICAL SECURITY

Codikett provides a modular architecture for all digital product security requirements. Out of our portfolio we compose the right package to protect products against fraud and counterfeiting, to enable consumer communication and to control distribution channels. 

Our system combines highly secure UIDs, based on cryptographic methods along with a variety of physical security features. This integrated approach is made robust against copying by using tamper-proof labels employing VOID technology, covert hash codes, and various overt and covert security features.

CODIKETT AT A GLANCE

REASONS TO USE CODIKETT

MODULARITY IS KEY

In order to roll out the system step by step and to adapt to various industry environments, the codikett system has a modular structure. This enables our customers to use the system fit to purpose, while it is futureproof for further steps towards product digitalization.

SECURE SAAS PLATFORM

The Codikett data management system ist highly reliable and is housed in a security data center with redundancy. It is operated in a self-healing cluster.
The Codikett software is validated against a stringent set of user requirements. This includes GAMP and computer system validation (CSV) practices for Software as a Service (SaaS).

ACCESS MANAGEMENT

Access rights can be customized for working with various personnel hierarchies as well as CMOs, and other third parties. Tracking of audit trails, i.e. access records, is ensured and secured in the bockchain depending on security requirements.
Scanning query rights are also structured according to user groups, right down to consumer-dedicated information.

LEAN DOCKING TO IT ENVIRONMENTS

The system is designed to be operated either independent from, or with various degrees of integration into a company's IT system such as their ERP or WMS. This flexibility allows for rapid implementation with increasing levels of integration over time if requested.
Our system is modular and suitable for a phased roll-out.

Logo

APPLICATIONS OF CODIKETT CODE

Logo

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU
Mr. Jean Hazim

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU
Mr. Jean Hazim