Skip to main content

Improving the Safety and Security of the Pharmaceutical Supply Chain

  • Chapter
Networked RFID Systems and Lightweight Cryptography

Abstract

This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Prescription Drug Marketing Act: Report to Congress. Available from: http://www.fda.gov/oc/pdma/report2001/default.htm.

    Google Scholar 

  2. Harrison, M.G.: Serialization options for tacking of pharmaceuticals using radiofrequency identification. In: Drug Security Network – White Papers (2005)

    Google Scholar 

  3. Inaba, T.: Technical issues of electronic pedigree inter-organizational transactions. In: Drug Security Network – White Papers (2005)

    Google Scholar 

  4. Harrison, M.G.: The drug security network – an overview and discussion of remaining issues. In: Drug Security Network – White papers (2005)

    Google Scholar 

  5. Royal decree modifying the royal decree of 21 December 2001 laying down the procedures, deadlines and conditions for intervention by the obligatory insurance for health care and benefits in the cost of proprietary medicinal products. Kingdom of Belgium (2003)

    Google Scholar 

  6. Bollini Legislation. Law 39 – 1st March 2002 (art. 40), Republic of Italy (2002)

    Google Scholar 

  7. Bollini Legislation. Law 14 – 3rd February 2003, Republic of Italy (2003)

    Google Scholar 

  8. XML and Digital Signatures. Available from: http://www.w3.org/Signature/

    Google Scholar 

  9. Open Universal Electronic Pedigree Interchange Format (2005). Available from: http://www.epedigree.org.

    Google Scholar 

  10. Florida Prescription Drug Protection Act (2003). Available from: http://election.dos.state.fl.us/laws/03laws/ch_2003–155.pdf

    Google Scholar 

  11. EPCglobal Network. Available from: http://www.autoidlabs.org/whitepapers

    Google Scholar 

  12. EPCglobal Architecture Framework Version 1.0. Available from: http://www.epcglobalinc.org/standards_technology/specifications.html

    Google Scholar 

  13. XML – Extensible Markup Language: W3C – World Wide Web Consortium. Available from: http://www.w3.org/XML

    Google Scholar 

  14. Unified Modelling Language (UML). Available from: http://www.uml.org/

    Google Scholar 

  15. The Accredited Standards Committee (ASC) X12

    Google Scholar 

  16. Harding, T., Drummond, R., Shih, C.: MIME-based secure peer-to-peer business data interchange over the Internet. In: RFC, IETF – Internet Engineering Task Force (2002). Available from: http://www.ietf.org/rfc/rfc3335.txt

    Google Scholar 

  17. Moberg, D., Drummond, R.: MIME-based secure peer-to-peer business data interchange using HTTP, Applicability Statement 2 (AS2). In: RFC, IETF - Internet Engineering Task Force (2005). Available from: http://www.ietf.org/rfc/rfc4130.txt

    Google Scholar 

  18. ebXML Messaging Service, OASIS – Organization for the Advancement of Structured Information Standards. Available from: http://www.oasis-open.org/ committees/ebxml-msg/

    Google Scholar 

  19. Canonical XML Version 1.0. W3C. Available from: http://www.w3.org/TR/ xml-c14n

    Google Scholar 

  20. Certification Authority and Digitial Signatures for Self-Authenticating Pedigree. Florida Department of Health. In: Florida Administrative Weekly (2.06.2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Harrison, M., Inaba, T. (2008). Improving the Safety and Security of the Pharmaceutical Supply Chain. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics