...

TECHNOLOGIES

OUR TRACEABILITY SYSTEM

Logo

TECHNOLOGIES

OUR TRACEABILITY SYSTEM

KEY BENEFITS OF OUR IOT PLATFORM

ALL ABOUT CODIKETT

Codikett actively offers secure issuance of billions of unpredictable Unique Identifiers (UIDs) for your products. Therefore, we ensure transparency and visibility of global distribution channels, secured by Blockchain technology is provided. Additionally, you can benefit from multilingual consumer engagement, such as product-related verification and product information. Furthermore, we offer smart IoT applications to fulfill your specific use cases. 

KEY BENEFITS OF OUR IOT PLATFORM

ALL ABOUT CODIKETT

Codikett offers secure issuance of billions of unpredictable Unique Identifiers (UIDs) for your products. Thus, transparency and visibility of global distribution channels, secured by Blockchain technology is provided. Besides, you can benefit from multilingual consumer engagement, such as product-related verification and product information. We offer smart IoT applications to fulfill your specific use cases. 

CODIKETT - THE SYSTEM

Our modular system not only allows for easy self-configuration,  but also ensures trouble-free integration into existing systems. When Codikett UIDs are implemented for traceability, they simultaneously fulfill other communication tasks.

They are real masters of multi-tasking! To enhance communication in IoT, we print 2D codes as QR or datamatrix or add an NFC chip for even easier data capture. Consequently, Codikett becomes the basis of user-connectivity, providing valuable up to date information for your end user while also providing the brand owner with market intelligence and the opportunity for customer interaction.

With a secure and unique identifier, parallel market trading or counterfeiting can be detected within seconds. Codikett is a digital product and online service, created and powered by Securikett.

 

CODIKETT - THE SYSTEM

Our modular system allows for easy self-configuration and trouble-free integration into existing systems. Codikett UIDs, once implemented for traceability, will fulfill other communication tasks simultaneously.

They are real masters of multi-tasking! To enable communication in IoT, we print 2D codes as QR or datamatrix or add an NFC chip for even easier data capture. Thus, Codikett becomes the basis of user-connectivity, providing valuable up to date information for your end user while also providing the brand owner with market intelligence and the opportunity for customer interaction.

With a secure and unique identifier, parallel market trading or counterfieting may be detected within seconds. Codikett is a digital product and online service, created and powered by Securikett.

 

THE UID STORY - STEP BY STEP

IT IS SO EASY TO IDENTIFY THE REAL

STEP 2

HOW DOES THE UID GET ON THE PRODUCT?

Typically, the UID is a QR code, or some other type of barcode.
The UID can either be printed on tamper-proof labels, directly printed on packaging, or even directly printed on the product itself. 

UIDs can also be introduced in the form of a radio frequency tag such as an RFID or NFC tag.

STEP 3

WE PROVIDE SECURE UNIQUE IDENTIFIERS

To prevent fraud, we guarantee identifiers to be unique and not predictable. 
Our procedure for generation encypted UIDs is cutting-edge, highly scalable, and fast. In this respect, Securikett is among the pioneers in the world of product digitalization. 

STEP 4

HOW DOES THE PRODUCT GET TO ITS DIGITAL TWIN?

Our system works with product master data and event data. For example, production lot, expiration date, shipment, and supply chain transactions are such events. This results in a data set for each product, a kind of digital twin. 

We add data to the UIDs of the individual products within the production or packaging process. This can be done unit by unit, or batchwise. And we enrich it further during shipping and through the distribution channel all the way to the consumers. 

What is a digital twin?
A digital twin is a virtual representation of a product or process. The digital and real worlds are linked in this way.

STEP 5

ROUTE PLANNING AND TRACKING THE DISTRIBUTION CHAIN

Packaging aggregation – by creating parent child hierarchies, the UID of the pallet or shipping box knows what individual product UIDs are inside. This makes it possible to capture the desination as intended, as well as real touchpoints in the distribution chain all the way to consumers.

Out of this data, valuable supply chain insights are created. For example. you can easily identify gray market trades and other types of unauthorized distribution activities, or the time it takes for products to move through the distribution chain.

STEP 6

LET’S ENCOURAGE CONSUMERS TO SCAN AND QUERY

We offer numerous opportunities to encourage consumers to scan through the design of the label and other features, so to engage with consumers. 

Modern consumers want to know more about the origin of their product and its authenticity. But fas beyond that, they are interested in how, where and under which circumstances the product was manufactured, or what are the company’s sustainability policies. 

STEP 7

AUTOMATED ANALYSIS AND EXCEPTION REPORTING BRING VALUE FOR THE BRAND OWNER

The more scans, the better quality of data. Scans provide valuable information for brand owners and their authorized personnel. Data can be provided in either raw or analyzed form, and displayed through a dashboard with a customized graphical user interface for easy interpretation. 
Business rules can be programmed into the system to provide red flags and notifications of exceptions.

Logo

SIMPLE, QUICK, ONLINE

LET’S CONNECT DIGITAL AND PHYSICAL SECURITY

Codikett offers a modular architecture for all digital product security requirements. From our portfolio, we assemble the right package to protect products against fraud and counterfeiting, facilitate consumer communication, and manage distribution channels.

Our system combines highly secure UIDs, based on cryptographic methods along with a variety of physical security features. This approach ensures robustness against copying by using tamper-proof labels that utilize VOID technology, covert hash codes, and various overt and covert security features.

CODIKETT AT A GLANCE

REASONS TO USE CODIKETT

MODULARITY IS KEY

In order to roll out the system step by step and to adapt to various industry environments, the codikett system has a modular structure. This enables our customers to use the system fit to purpose, while it is futureproof for further steps towards product digitalization.

SECURE SAAS PLATFORM

The Codikett data management system ist highly reliable and is housed in a security data center with redundancy. It is operated in a self-healing cluster.
The Codikett software is validated against a stringent set of user requirements. This includes GAMP and computer system validation (CSV) practices for Software as a Service (SaaS).

ACCESS MANAGEMENT

Access rights can be customized for working with various personnel hierarchies as well as CMOs, and other third parties. Tracking of audit trails, i.e. access records, is ensured and secured in the bockchain depending on security requirements.
Scanning query rights are also structured according to user groups, right down to consumer-dedicated information.

LEAN DOCKING TO IT ENVIRONMENTS

The system is designed to be operated either independent from, or with various degrees of integration into a company's IT system such as their ERP or WMS. This flexibility allows for rapid implementation with increasing levels of integration over time if requested.
Our system is modular and suitable for a phased roll-out.

Logo

FAQs ABOUT CODIKETT

Codikett is Securikett’s digital platform for product traceability, verification, and authentication using unique identifiers (UIDs).

Product digitalization involves connecting a product to information in the cloud using a unique code for each item. Digitalization offers several key benefits: it enhances supply chain transparency through real-time tracking and data-driven decisions, improves efficiency and reduces costs, and boosts consumer engagement by enabling personalized experiences and direct communication channels, thereby fostering brand loyalty.

Today, product digitalization is an indispensable component to all anti-counterfeiting measures, which typically includes copy-proof technology and tampering verification features.

Product digitalization enables detailed data collection and analysis, providing insights into consumer behavior and market trends for strategic decision-making. It streamlines regulatory compliance by ensuring accurate and accessible documentation throughout the product lifecycle.

When using Codikett UIDs, a planned distribution chain is assigned to each product. By scanning the codes, distributors, consumers, and other users provide feedback on whether the products are in the correct market.
a. Grey trade will be unveiled immediately.
b. Packaging aggregation is one of the possible methods for assigning destinations.

Yes, Codikett provides real-time data analysis, allowing you to make informed decisions based on the latest information. Real-time data is also used to create alerts in case of fraudulent activities within the market.

Yes, Codikett is designed to meet the requirements of the Digital Product Passport for each industry sector. Two options are available, depending on industry requirements and public infrastructure. One option is to display DPP information directly in Codikett, and the other is to provide interoperability with a third-party industry provider.

Scan the QR code on the product’s security label with your smartphone to access the verification page and check the validity of the Unique Identifier. You will then receive further information on the product and its authenticity.

Yes, customers do scan the codes. Our software encourages scanning through features like gamification (e.g., slot machines and giveaways), interactive product information, and engaging content.

Securikett’s labels are designed to attract attention with their appealing designs. Codikett features, such as a hidden pin, additionally attract users while providing security against code cloning. These features work together to increase consumer interaction and engagement with the codes.

Yes, Codikett is available globally. You can track and verify products internationally, ensuring security and engagement with consumers no matter their location.

Codikett features intuitive interfaces that simplify use, customizable frontends tailored to production needs to ensure users only see relevant information, and role-specific views that allow different users to interact with data pertinent to their responsibilities, thereby enhancing productivity and usability.

The number of users is flexible and tailored to your needs. You can manage user roles independently through the Codikett platform, assigning specific permissions for different roles such as administrators, operational personnel, distributors, and inspectors. This allows you to control access and functionalities based on users’ responsibilities.

No, the displayed information is specially selected based on user roles, ensuring that only relevant and permitted data is shown to different stakeholders.

Codikett uses a modular pricing structure tailored to specific needs and the scale of implementation. As a SaaS (Software as a Service) platform, costs depend on the chosen features, number of items, and service level. For a detailed and customized pricing plan, please contact our sales team.

Codikett can be connected to and communicate with existing systems, including SAP/ERP and CRM, using customized APIs.

Yes, you can start with a small implementation of Codikett for a limited number of products or batches and gradually extend its use as your needs grow. You can begin with basic product verification and later expand to full track and trace capabilities or grey market detection as your requirements evolve. Additionally, you can initiate implementation in one part of your company or organization and gradually expand to more affiliates or Contract Manufacturing Organizations (CMOs).

Data is stored in the cloud at the highest available security level. If personal data is included, clients must manage it directly to comply with relevant regulations in each country.

APPLICATIONS OF CODIKETT CODE

Logo

2D-cODE ON SECURITY LABEL

nFC-CHIP IN A SECURITY LABEL

rfid cHIP WITH LOGISTICS MODULES

COMBINED CHIP
(RFID & NFC)

DIRECT MARKING ON PRODUCT

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU