1 Knock It Off! Brands & the Counterfeiting Quandary Tuesday, November 11, 2008 Union League Club, NYC Technology Advancements.

Slides:



Advertisements
Similar presentations
Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what.
Advertisements

What do Immigration Officers look for in a travel document?
Confidential & Copyright - Megasoft Ltd. All rights reserved.
1. Documents types Visas (ID-2) ICAO standard passports (ID-3) ID cards and driving licences (ID-1) Travel and identity documents.
Mobile Smart Solutions Smart E-Purse the Debit/Credit System and mobile job report» – paying for itself Mobile Smart Solutions Smart E-Purse the Debit/Credit.
1 CONFIDENTIAL Copyright 2006, Toshiba Corporation. How to Ensure Theyre Genuine Toshiba Toner 2009 Toshiba America Business Solutions Inc.
Brand Protection & Authentication Solutions Confidential Information
TRACK and Trace with Holograms. Track & Trace Counterfeit products are challenging today’s global market place, threating revenue streams, eroding margins,
Even in this digital age, paper documentation retains its position as the leading embodiment of secure information – but it has to be a very special paper.
FDA Prescription Drug Importation - Public Meeting April 14, Prescription Drug Importation Public Meeting April 14, 2004 Jim Rittenburg Authentix.
Anti Counterfeiting Technologies EE126 Computer Engineering Clifford C Youn.
Combating Counterfeit Coupons The Next Steps April 23, 2014.
Protecting Electronic Components Against Counterfeiting
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
preventing counterfeit …
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
America’s Most complete source for Automatic identification Products & Machine Vision Inspection Systems DATA MATRIX LABEL PRINTING SYSTEMS MACHINE VISION.
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
Introduction ‘Have you ever played video games before? Look at the joystick movement. When you move the joystick to the left, the plane on the TV screen.
Chapter 6 Output. What is Output? What is output? Data that has been processed into a useful form, Output device is any hardware component that can convey.
Chapter 6 Output. What is Output? What is output? Data that has been processed into a useful form, Output device is any hardware component that can convey.
Adil Abdalla April What’s About..? Technology Image Synergy & Control Cost Effectiveness Providing a Smart Tag on Any Premises.
Computer… An electronic machine Monitor Mouse Printer (Inkjet) Key Board Cabinet UPS PPT
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Graphics cards: A video card (also called a graphics card) is an expansion card which generates a feed of output images to a display. Most video cards.
LESSON 2 Input and Output Devices
About a Company About a Company Mission Sytecs’ activities are concentrated in companies business processes optimization and efficiently improvement.
Discovering Computers 2010 Chapter 6 Output. Chapter 6 Objectives Describe the four categories of output Summarize the characteristics of LCD monitors,
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
Naming & Addressing ENUM, EPC, WINC overview JaeYoung Choi
Information Technology COMPUTERS Dr. GUVEN Aerospace Engineer (P.hD) Nuclear Science and Technology Engineer (M.Sc)
Track and Trace
By: Jason Fenwick. Monitor, Screen or Visual Display Unit are some of the names Monitor, Screen or Visual Display Unit are some of the names The monitor.
CHEMISTRY 1000 Topics of Interest #4: Organic Electronics on Banknotes.
Global Trends in Tobacco Tax Stamps
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
The Experts in Machine - Readable Authentication 1 Customized Security Solutions by InkSure Award Winner.
From Document Data Model to XML Trade Documents From Document Data Model to XML Trade Documents Electronic trade documents Document Data Model Supply Chain.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Digital IP A Growing Concern Chris Gardner Vice President AASA AASA Brand Protection Council Meeting November 14, 2006 Dearborn, MI.
Totalpost Services Plc. What is “Gone away” Mail? The generic term applied to mail that is “Returned to Sender” because… the recipient has returned it.
Build Customer Loyalty & Relationships Custom branded loyalty solution with cutting edge Smart Stamp. &
Website:
COUNTERFEIT GOODS Detection Using Mobile Devices By Brian Wood.
JAVA TRAINING IN NOIDA. Introduction to Java:  Java training in noida is a general-purpose computer programming language that is concurrent, class-based,
E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. E-commerce In this section: E-commerce.
Manufacturing. Mobile workforce management Asset management Intelligent track and trace Condition-based maintenance Remote monitoring Learn how to ramp.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
What do Immigration Officers look for in a travel document?
Make your packaging Smarter
Microwave Communication Project
Input and Output Devices
English for Advance Learners I
Preventative Measures
Application of ICT in business
Business Document Platform
COMPUTER HARDWARE CHAP 2.
A future without fakes 2m 2.5m 4m.
Healthcare Speaker notes:
Overview of Zero-Knowledge Systems Inc
California Tax Stamp Example
Brand iconography.
Information and communications technology
Tareq Khan, Ph.D. Assistant Professor,
Sharing Technologies for Cloud Computing
Automatic Identification and Data Collection Technology
Tri-State Office Products Personalized Service! Period!
The Acquisition Process Presented by: Stacy Haynes
Know the various types of cable connectors!
Anti-Counterfeit Labeling Method
Presentation transcript:

1 Knock It Off! Brands & the Counterfeiting Quandary Tuesday, November 11, 2008 Union League Club, NYC Technology Advancements

The Problem Counterfeiting...Authenticate All Products? Unauthorized Production...Account All Production? Diversion…Track All Products? The Solution

3 Major Forces of Change First 20 Years The Counterfeiting business model The Internet as a tool of the illicit trade

4 Security Technology n Liquid Crystal n Hologram n Diffractive n Electron Beam n Bio Markers n Luminescers n Microimaging n Encoding n Taggants n PS Label n TE Label n Two Tone Label n Hang Tag n Thread n Woven label n IMB 3DCD n Embedded Card n Security Print n Pouch n PS Laminate n Heat Laminate n Label & Write Resist n Stamping Foil n In Product Marking n Embedded Paper Verification Technology n Alphanumeric n Random Number n Linear Barcode n 2D Barcode n Proprietary Codes Delivery Technology Marking Technology n Visual n Laser Read n IR Laser Read n UV Read n Magnify n Decode n Machine Read n Chemical Test n Data Analysis n Forensic Information Technology On Line n Brand Management Internet Monitoring n Auctions n Trade Boards n IP Content n Domain Names n Price Watch Supply Chain Monitoring n Track & Trace Breadth of Technologies

5 Woven Label with Security Thread Footwear Label with Covert Security Hang Tag with Optical Security Device Apparel & Footwear Examples

The Problem Counterfeiting...Authenticate All Products Unauthorized Production...Account All Production Diversion…Track All Products The Solution

Delivering the Technology in Apparel and Footwear

Embracing The Digital Capabilities of The Technology Verify with Cell Phone Mobile Web Internet

9 Thank you