Download presentation
Presentation is loading. Please wait.
1
Preventative Measures
Counterfeiting Protection & Reduction By: Rafael Mendez Department: Mechanical Engineering Technology Background: Discussion: Bilcare Technologies Counterfeit Detection & Track and Trace What is counterfeiting? Counterfeiting is the practice of manufacturing goods, often of inferior quality, and selling them under a brand name without the owner’s authorization. There are many well known brands around the world that fall victim to the counterfeiting industry every year. Counterfeiting is illegal, in many countries it is punishable by criminal laws and civil laws , with penalties ranging from injunctions to damages to imprisonment. nonClonableID™ system comprises of tags with a unique materials-based “fingerprint” that is prohibitively difficult to replicate. Bilcare has developed a robust reader that connects to a standard communication device, like a mobile phone or computer, along with the entire back-end information technology support platform for authenticating the tags and associated products. Tags are authenticated by swiping the tag and barcode in the reader Help to provide a secure authentication of any product. This solution provides a comprehensive anti-counterfeiting solution that also enables secure Track-n-Trace, leading to e-Pedigree (electronic documentation) of the products across the supply chain – from manufacturer to consumer. This technology innovatively exploits micro and nano-particulate materials together with their optical properties to provide a foolproof authentication solution. How serious is the counterfeiting problem? According to the International Anti-Counterfeiting Coalition, In the United States alone counterfeiting is a $600 billion a year industry and is one the fastest growing industries around the globe. It is currently estimated that counterfeit goods make up around 5-7% of world trade. Counterfeits are not only a serious threat to the commercial world but also to consumer safety and public health. Overview: In order to raise awareness relating to this issue, many companies have begun taking precautionary measures to protect their products from being counterfeited. But current methods have their own limitations. Preventative Measures Counterfeit Detection Instant product verification process with unique product ID. Diversion Detection Detect and identify the location of diverted products Marketing Acceleration Connectivity with the consumer beyond point of purchase. Track and Trace Unique ID provides manufactures instant track and trace capabilities Document Protection Protects the content of the entire document from modification. Real Time Metrics Real-time data integration, analysis and reporting. This technology is cost-effective and can be incorporated into almost any production market. It helps top provide real time data analysis that can identify any existing or potential discrepancies . This unique feature of non-reproducibility of the fingerprint ensures total security of the system even under circumstances wherein parts of the system may get compromised. Currently, this type of tag technology is not replicable. Conclusion: The counterfeiting industry is one the largest underground business in the world. Every year it continues to grow substantially and make its mark on the global market. This issue is cost billions of dollars in revenue to hard working businesses and industries. The use of counterfeited products not only affect industries, they cause serious harm to the consumers as well. Limitations As counterfeiters become more sophisticated, the security gaps in these technologies become open to exploitation. What strategies can companies implement for a more comprehensive anti-counterfeiting solution? For companies that are serious about finding a solution to counterfeiting there needs to be more involvement from top management by implementing essential periodic review. The key goal is to stop the distribution of counterfeited goods either at the point of origin or within the channels of supply chain. Companies need to deploy anti-counterfeiting strategies that set up various layers of security. In odder to challenge the counterfeiters, it is important to use a combination of overt and covert methods including such methods which reduce the dependence on human elements. Companies need to constantly look at new technologies to increase supply chain security for secure Track-n-Trace of products from point of origin to point of sale. Reference: “Six Degrees Counterfeit Prevention LLX”. Nov 30, 2013 “US Department of Defense Counterfeit Regulations Impact Global Suppliers ”. Nov 25,2013 “Authentication, Secure Track n Trace, Drug e pedigree and Access Cards Security” Nov 23, 2013
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.