Preventative Measures

Slides:



Advertisements
Similar presentations
TRACK and Trace with Holograms. Track & Trace Counterfeit products are challenging today’s global market place, threating revenue streams, eroding margins,
Advertisements

A Bilcare Singapore Initiative Bilcare © 2007 Privileged Information The Oxford Conference on Innovation & Technology Transfer for Global Health, Oxford,
No /72, Level 2, Sri Balaji Mansion, Dr. Rajkumar Road, Rajajinagar 4th Block, Bangalore , India. Counterfeit Drug Detection | Fake Product.
Brand Protection through Nanotechnology Sun Innovation’s Anti-Counterfeiting Product Authentication.
Brand Protection: In the face of mounting counterfeiting, diversion & other infringements Jim Mentone | Director, Consumer Global Brand Protection.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Protecting Electronic Components Against Counterfeiting
preventing counterfeit …
International Telecommunication Union Counterfeiting and e-waste Keith Mainwaring – ITU Consultant.
1 Promoting Safe Medicine With Track and Trace Systems SRC Technologies, Inc.
Global Anti-counterfeit Packaging (Food and Beverages) Market
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
GS1 US INITIATIVES UPDATE MARCH 18, GS1 STANDARDS MAKES IT POSSIBLE 2 SAFETYSECURITY VISIBILITYEFFICIENCY COLLABORATION To apply standards to business.
Tackling the Illicit Trade – JTI’s Approach Sofia, June
Johnson & Johnson Overview Incorporated in 1887: Listed on NYSE in 1944 symbol JNJ 250 operating companies, 117K employees in 57 countries Three business.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
1 Good Intentions – Bad Drugs Washington, DC Thursday, 10 March 2005 Robert D. Moore, Executive Director; Global Security Group Merck & Co., Inc.
The Experts in Machine - Readable Authentication 1 Customized Security Solutions by InkSure Award Winner.
Information Warfare Playgrounds to Battlegrounds.
Framework for combating Importation, Supply and Use of Counterfeit/substandard terminals in EACO member states Presenter Mwende Njiraini Communications.
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
Counterfeits in Electrical Products. By Kevin Auguste.
COUNTERFEIT GOODS Detection Using Mobile Devices By Brian Wood.
 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Access Control System Market share to grow at 7.2% CAGR from.
Wireless Charging Market Analysis and Industry Trends, 2024
Verizon Intelligent Track and Trace: Serialization and Cold Chain
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
The time to address enterprise mobility is now
Physical Security Governance Model
The Marketing Research Industry
Identifying Counterfeits of Mobile Devices By: Pirvette Lee Department: Mechanical Engineering Technology Background Counterfeit tech carries significantly.
Date: March. 30, Monday Evening.
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
International TOP ups Business presentation
Smarter, safer Pharmaceuticals
ASSET - Automotive Software cyber SEcuriTy
Near Field Communication (NFC) Market
HQ in Bar Hill, Cambridge, England
Making Blockchain Real for Business
WCS’s work to combat the illegal wildlife trade
Wireless Charging Market Analysis
Multi-Functional Printer Market
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Present By:- Company Name: Global Market Forecastes Tel: / Web:
Breaking through with Blockchain
Pankaj Kumar, Tech Lead Bhuvaneswari Radhakrishnan, Senior Engineer
Customer Information Global Diversified Technology Company
Chapter 31 branding, packaging, and labeling Section 31.1 Branding
Lecture 1: Foundation of Network Security
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Chapter 25 Price Planning.
Millennium HongQiao Hotel Shanghai
Shanghai – 23/25 February 2011 ESIA ACTF Activities update
Supply Chain Transformation Highlights
FDA Regulated Special Interest Group
560+ people dedicated to innovation across 5 R&D labs
Stallion Systems & Solution Pvt Ltd
Applying for a Licence Under the Cannabis Act and its Regulations
Counterfeiting and Intellectual property theft in Medicines World Bank Symposium March 10, 2005 Washington DC Frederick Razzaghi Director of Technical.
When does your business need a mobile technology strategy? Stakeholders in your organization can be broadly divided into two categories namely,
Adroit Market Research +1 (214) Single Use License: US$ 4800 Request Sample Global.
I4.0 in Action The importance of people and culture in the Industry 4.0 transformation journey Industry 4.0 Industry 3.0 Industry 2.0 Industry 1.0 Cyber.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Sensor Market Size Growth During Forecast Period.
©2018 Graphical Research. All rights reserved. North America Enterprise Networking Market to trace exponential gain of $30bn.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Microprinting Market Size will witness a rapid growth to 2025.
Presentation transcript:

Preventative Measures Counterfeiting Protection & Reduction By: Rafael Mendez Department: Mechanical Engineering Technology Background: Discussion: Bilcare Technologies Counterfeit Detection & Track and Trace What is counterfeiting? Counterfeiting is the practice of manufacturing goods, often of inferior quality, and selling them under a brand name without the owner’s authorization. There are many well known brands around the world that fall victim to the counterfeiting industry every year. Counterfeiting is illegal, in many countries it is punishable by criminal laws and civil laws , with penalties ranging from injunctions to damages to imprisonment. nonClonableID™ system comprises of tags with a unique materials-based “fingerprint” that is prohibitively difficult to replicate. Bilcare has developed a robust reader that connects to a standard communication device, like a mobile phone or computer, along with the entire back-end information technology support platform for authenticating the tags and associated products. Tags are authenticated by swiping the tag and barcode in the reader Help to provide a secure authentication of any product. This solution provides a comprehensive anti-counterfeiting solution that also enables secure Track-n-Trace, leading to e-Pedigree (electronic documentation) of the products across the supply chain – from manufacturer to consumer. This technology innovatively exploits micro and nano-particulate materials together with their optical properties to provide a foolproof authentication solution. How serious is the counterfeiting problem? According to the International Anti-Counterfeiting Coalition, In the United States alone counterfeiting is a $600 billion a year industry and is one the fastest growing industries around the globe. It is currently estimated that counterfeit goods make up around 5-7% of world trade. Counterfeits are not only a serious threat to the commercial world but also to consumer safety and public health. Overview: In order to raise awareness relating to this issue, many companies have begun taking precautionary measures to protect their products from being counterfeited. But current methods have their own limitations. Preventative Measures Counterfeit Detection Instant product verification process with unique product ID. Diversion Detection Detect and identify the location of diverted products Marketing Acceleration Connectivity with the consumer beyond point of purchase. Track and Trace Unique ID provides manufactures instant track and trace capabilities Document Protection Protects the content of the entire document from modification. Real Time Metrics Real-time data integration, analysis and reporting. This technology is cost-effective and can be incorporated into almost any production market. It helps top provide real time data analysis that can identify any existing or potential discrepancies . This unique feature of non-reproducibility of the fingerprint ensures total security of the system even under circumstances wherein parts of the system may get compromised. Currently, this type of tag technology is not replicable. Conclusion: http://www.6dcp.com/ The counterfeiting industry is one the largest underground business in the world. Every year it continues to grow substantially and make its mark on the global market. This issue is cost billions of dollars in revenue to hard working businesses and industries. The use of counterfeited products not only affect industries, they cause serious harm to the consumers as well. Limitations As counterfeiters become more sophisticated, the security gaps in these technologies become open to exploitation. What strategies can companies implement for a more comprehensive anti-counterfeiting solution? For companies that are serious about finding a solution to counterfeiting there needs to be more involvement from top management by implementing essential periodic review. The key goal is to stop the distribution of counterfeited goods either at the point of origin or within the channels of supply chain. Companies need to deploy anti-counterfeiting strategies that set up various layers of security. In odder to challenge the counterfeiters, it is important to use a combination of overt and covert methods including such methods which reduce the dependence on human elements. Companies need to constantly look at new technologies to increase supply chain security for secure Track-n-Trace of products from point of origin to point of sale. Reference: “Six Degrees Counterfeit Prevention LLX”. http://www.6dcp.com/ Nov 30, 2013 “US Department of Defense Counterfeit Regulations Impact Global Suppliers ”. http://www.isuppli.com/Semiconductor-Value-Chain/News/pages/US-Department-of-Defense-Counterfeit-Regulations-Impact-Global-Suppl. Nov 25,2013 “Authentication, Secure Track n Trace, Drug e pedigree and Access Cards Security” http://www.bilcaretech.com/nonclonable/solutions.htmiers.aspx. Nov 23, 2013 http://www.inta.org/TrademarkBasics/FactSheets/Pages/Counterfeiting.aspx http://www.bilcaretech.com/nonclonable/nonclonable.htm