Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 29, 2024 Mon

Time: 10:13 pm

Results for product counterfeiting

3 results found

Author: ETH Zurick

Title: Problem-Analysis Report on Counterfeiting and Illicit Trade

Summary: Counterfeiting and product piracy constitute a serious and ever growing problem against legally run businesses and owners of intellectual property rights. Counterfeiting is not specific to any industry but it affects a large number of sectors such as the music, software, and luxury goods industries, and also pharmaceutical industry, automobile industry, fast moving consumer goods industry, and toys. According to the International Chamber of Commerce, “[c]ounterfeiting and piracy are growing exponentially in terms of volume, sophistication, range of goods, and countries affected - this has significant negative economic and social impact for governments, consumers and businesses [...].” Product counterfeiting has many victims: Different kinds of counterfeit products threaten the health and safety of end-users and consumers, sometimes with the most serious consequences. Legally run businesses and governments are affected by a number of direct and indirect economic losses which decreases the welfare of affected societies. By understanding and continuously surveying the problem and available countermeasures, however, companies can protect their products and mitigate the negative impacts and ensure the safety of consumers. In addition, alongside with the development of technologies that enable counterfeiting on an industry scale, technology also allows for novel countermeasures. Most importantly, mass-serialization is changing the way product information is managed by giving unique identities to individual items. One implication of this higher level of information granularity is that the physical security of products can be improved in terms of novel anti-counterfeiting techniques, as well as with the detection of illicit trade activities. The potential of RFID and the EPCnetwork in enabling these novel anti-counterfeiting and anti-fraud techniques is well recognized. Even though it seems that there will never be one silver bullet solution against illicit trade, industries and academia see mass-serialization among the most promising single countermeasures. There are two major reasons for using EPCnetwork technology in anti-counterfeiting: First, RFID allows for new, automated and secure ways to efficiently authenticate physical items. Secondly, as many companies invest in networked RFID technology for varying supply chain applications, the item-level data will be gathered in any case – so why not using it to find counterfeit products? This report will provide a problem analysis of product counterfeiting and illicit trade as a first step towards making use of the potential of networked RFID technology to counter the problem of illicit trade.

Details: Paris(?): BRIDGE (Building Radio Frequency IDentification for the Global Environment), 2007. 55p.

Source: Internet Resource: Accessed October 3, 2011 at: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20%20Anti-Counterfeiting%20Problem%20Analysis.pdf

Year: 2007

Country: International

URL: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20%20Anti-Counterfeiting%20Problem%20Analysis.pdf

Shelf Number: 122969

Keywords:
Consumer Fraud
Crime Prevention
Illicit Trade
Intellectual Property Rights
Product Counterfeiting

Author: ETH Zurich

Title: Anti-counterfeiting Requirements Report

Summary: This deliverable presents the requirements analysis for the anti-counterfeiting system that is under development in this work package. The envisaged system will authenticate products and it can be used to prevent counterfeit products from entering the distribution channel of genuine products. We define authentication of products as the verification of a product’s claimed identity. Because WP5 of the BRIDGE project is a business work package without a specific intended end-user company for the investigated anti-counterfeiting solution, this deliverable focuses on analyzing how potential technical solutions fit the requirements of anti-counterfeiting rather than on describing a list of requirements of a specific system. Interviews with different industries revealed that the end-users of the product authentication system, that is companies affected by product counterfeiting, need a fast and reliable online check that could be used by all business partners and for different kinds of products. Companies would also like to have the RFID-based product authentication system to be closely linked to other services, for instance to support supply chain management activities. Different industries have different requirements regarding the specific use of the RFID-based product authentication system. These requirements mostly relate to how the RFID tags are integrated into the products, what kind of RFID tags should be used, and how the tags are read. The level of security in RFID-based product authentication systems is an important cost factor because a higher level of security is achieved by cryptographic RFID tags that are more expensive than the common RFID tags. Overall, companies desire a secure and inexpensive system but find it hard to precisely specify the required level of security. Interviews with customs revealed that having a standard solution that can be used to authenticate different products is of primary importance for them. According to the interviews, customs officers would most benefit from a system that could be used to authenticate suspicious products with mobile devices. Analysis of functional security requirements of product authentication in general shows that there are three distinct approaches to authenticate products, depending on how the tag cloning attack is mitigated. Tag cloning attack refers to copying a genuine product’s ID number onto another tag that is attached to a counterfeit product. These approaches are: tag authentication (i.e. use of cryptographic tags), location-based authentication (i.e. track and trace based plausibility check), and authentication based on object-specific security features (i.e. product’s physical fingerprint). We have identified several solution concepts to to authenticate RFID-tagged products in the EPC network. Analysis of the current EPC network’s conformance to the identified requirements revealed that the network’s support for the detection of cloned tags is far from optimal and should be improved by an automated analysis of the track and trace data of the product’s locations. Completely automated product authentication check (instead of such that relies on users of the system analyzing the traces of products by themselves) is furthermore required by the industries as well as customs. Therefore in the future steps of this work package we will opt for the development of a track and trace based product authentication system that automatically detects the cloned tags. The goal of this work package is to study how the existing RFID and EPC technologies can be applied to anti-counterfeiting. Hence, the development of completely new technical solutions such as novel cryptographic tag authentication protocols is out of the scope of work package. The technical contribution of this work package will focus on application areas of the existing techniques, such as how to use the RFID track and trace data to detect cloned tags.

Details: Paris(?): BRIDGE (Building Radio frequency IDentification for the Global Environment), 2007. 85p.

Source: Internet Resource: Accessed October 3, 2011 at: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20Anti-Counterfeiting%20Requirements%20Report.pdf

Year: 2007

Country: International

URL: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20Anti-Counterfeiting%20Requirements%20Report.pdf

Shelf Number: 122978

Keywords:
Consumer Fraud
Crime Prevention
Intellectural Property Rights
Product Counterfeiting

Author: International Chamber of Commerce (ICC)

Title: Roles and Responsibilities of Intermediaries: Fighting Counterfeiting and Piracy in the Supply Chain

Summary: Millions of intermediaries are operating throughout the global supply chain and the vast majority of these players are conscientious, trustworthy and reliable partners. ICC's own membership includes millions of companies: many are brand and copyright owners; many are intermediaries; and others have no direct interest or link to the topics covered in this paper. So while this paper does not and cannot reflect the views of all ICC members, nor is it a consensus of the global business community, it has undertaken to ensure accuracy, balance and consistency with ICC's long-standing opposition to counterfeiting and piracy, intellectual property rights infringement, unfair trade, illegal commerce and corruption. For the most part, this body of work substantiates actions intermediaries are already taking independently or in collaboration with rights holders and government authorities to deal with supply chain vulnerabilities. Where these current efforts have been inadequate in protecting against IP infringements, suggestions for better or best practices are put forward. The result is a product that challenges the status quo and offers a roadmap for discussion, collaboration and resolution. We offer the findings and suggested best practices as a springboard for an ongoing dialog among trademark and copyright owners, intermediaries and governments to find solutions to the infiltration of counterfeiting and piracy into the legitimate supply chain. Our hope is that the suggested best practices will help responsible intermediaries more effectively deal with vulnerabilities in their operations and encourage intermediaries who knowingly facilitate IP infringement to stop.

Details: Paris: ICC and BASCAP, 2015. 108p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.gacg.org/Content/Upload/Documents/2015%20BASCAP%20Intermediares_HR%20(1)%20(1).pdf

Year: 2015

Country: International

URL: http://www.gacg.org/Content/Upload/Documents/2015%20BASCAP%20Intermediares_HR%20(1)%20(1).pdf

Shelf Number: 137197

Keywords:
Counterfeit Goods
Counterfeit Products
Crimes Against Businesses
Product Counterfeiting
Product Piracy
Supply Chains