Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.

Slides:



Advertisements
Similar presentations
An action oriented strategy against counterfeiting: a major challenge posed by organized crime to the world economy Presentation by Sandro Calvani Director.
Advertisements

TRACK and Trace with Holograms. Track & Trace Counterfeit products are challenging today’s global market place, threating revenue streams, eroding margins,
Chapter 9: Branding and the Marketing program. Contents Branding and Product strategy Branding and Pricing strategy Branding and Distribution strategy.
A Bilcare Singapore Initiative Bilcare © 2007 Privileged Information The Oxford Conference on Innovation & Technology Transfer for Global Health, Oxford,
No /72, Level 2, Sri Balaji Mansion, Dr. Rajkumar Road, Rajajinagar 4th Block, Bangalore , India. Counterfeit Drug Detection | Fake Product.
Brand Protection through Nanotechnology Sun Innovation’s Anti-Counterfeiting Product Authentication.
Brand Protection: In the face of mounting counterfeiting, diversion & other infringements Jim Mentone | Director, Consumer Global Brand Protection.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Building and Deploying the world’s first commercial application to address product authentication, brand protection and anti-counterfeiting Alpharetta.
preventing counterfeit …
Chapter 6 Entrepreneurship and Business Planning.
International Telecommunication Union Counterfeiting and e-waste Keith Mainwaring – ITU Consultant.
Counterfeit Avoidance Mark Alliance® Forum for CAMA members, industry professionals, government leaders and concerned citizens to address the growing epidemic.
Blockchain holds the technology needed to combat counterfeit goods on an universal scale. There is a potential for blockchain solution to allow monitoring.
1 Promoting Safe Medicine With Track and Trace Systems SRC Technologies, Inc.
Shalagh Rigney, Tara Nolan, Kristen Sibilia March 26, 2008.
Global Anti-counterfeit Packaging (Food and Beverages) Market
Enterprise Systems Organizations are finding benefits from using information systems to coordinate activities and decisions spanning multiple functional.
Speed | Innovation | Happiness Confidential. © 2012 Bilcare Limited Bilcare Technologies and Fortified-ID Holdings Limited 2015 FAQ.
Our target markets Property Owners Material Suppliers Contractors Tradesmen.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. BUSINESS DRIVEN TECHNOLOGY Chapter Twelve: Integrating the Organization from.
MIS 2000 Globalization and Information Systems Updated Nov
Intellectual Property in the Context of Growth and Development of the World Economy Luciano Daffarra, Attorney at Law Daffarra, d’Addio & Partners China-Italy.
BUSINESS DRIVEN TECHNOLOGY
GS1 US INITIATIVES UPDATE MARCH 18, GS1 STANDARDS MAKES IT POSSIBLE 2 SAFETYSECURITY VISIBILITYEFFICIENCY COLLABORATION To apply standards to business.
Tackling the Illicit Trade – JTI’s Approach Sofia, June
International MIS International Dimension. ID-2 Study Questions Q1: How does the global economy impact organizations and processes? Q2: What are the characteristics.
SCHMITT & ORLOV in association with Helene & Associates Enforcement of Intellectual Property Rights in Cambodia 1.
The Eyeblaster ACM Advertising Campaign Management.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
 The Free Enterprise System.  Traits of Private Enterprise.
1 Good Intentions – Bad Drugs Washington, DC Thursday, 10 March 2005 Robert D. Moore, Executive Director; Global Security Group Merck & Co., Inc.
Are you looking for an opportunity to join a company that has a long history and an exciting future? A place where you can grow within an international.
Security Management Press Conference, April 14 th 2003 Russ Artzt, Executive Vice President, Computer Associates International, Inc. Joe Grillo, President.
Impact of Technology on Merchandising Course Project Ben Fudge Fashion Merchandising Planning and Control I.
Supply Chain and Security 17 November Cubic ©2009 All Rights Reserved 2 Security Challenges – Supply Chain 9/11 heightened fear of terrorist attacks.
The Experts in Machine - Readable Authentication 1 Customized Security Solutions by InkSure Award Winner.
Levi Strauss & Co Session 13. The Situation Should LS&Co continue sourcing and purchasing fabric in China Should the company make direct investments in.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
1 CASE STUDY ON DEUTSCHE BANK MARKET RISK MANAGEMENT SUBMITTED BY SNEHA B. SHAH SUBMITTED TO MS. MUDRA MISTRY 1.
Sustainability in the Supply Chain 5 © 2014 Pearson Education, Inc. SUPPLEMENT.
Published Date : 13 July 2015 World Anti-counterfeit Clothing and Accessories Packaging Market.
Counterfeits in Electrical Products. By Kevin Auguste.
Global Nutraceuticals Industry Analysis till 2017 – Emerging Markets in Asia-Pacific and Latin America to Drive Growth provides a comprehensive analysis.
COUNTERFEIT GOODS Detection Using Mobile Devices By Brian Wood.
 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Access Control System Market– Global Industry Analysis Report,
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fingerprint Access Control System Market share to grow at 7.2% CAGR from.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
Global Mobile Phone Insurance Market 2030 by Region: Asia Pacific, Europe, Latin & Central America, Middle East & Africa and North America
Preventative Measures
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
Smarter, safer Pharmaceuticals
Trade-offs to establish an integrated, comprehensive protection scheme
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 X-Ray Security Screening System.
Multi-Functional Printer Market
Global Enterprise Asset Management Market Enterprise Asset Management Market, Size, Share, Intelligence, Company Profiles, Market Trends, Strategy, Analysis,
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Supply Chain Transformation Highlights
Management 303 Mentoring Week 3.
Stallion Systems & Solution Pvt Ltd
Global Burden of Tobacco
Counterfeiting and Intellectual property theft in Medicines World Bank Symposium March 10, 2005 Washington DC Frederick Razzaghi Director of Technical.
Adroit Market Research +1 (214) Single Use License: US$ 4800 Request Sample Global.
ECONOMIC INTERDEPENDENCE & WORLD TRADE
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Microprinting Market Size will witness a rapid growth to 2025.
Presentation transcript:

Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez

Background  What is counterfeiting?  Counterfeiting is the practice of manufacturing goods, often of inferior quality, and selling them under a brand name without the owner’s authorization. There are many well known brands around the world that fall victim to the counterfeiting industry every year. Counterfeiting is illegal, in many countries it is punishable by criminal laws and civil laws, with penalties ranging from injunctions to damages to imprisonment.  The manufacturing of counterfeits is most prevalent in developing countries with a strong, inexpensive manufacturing capability, including many nations throughout Asia (such as China and Taiwan), although counterfeit goods are sold around the globe. Counterfeits are manufactured to a lesser degree in developed countries. (INTA.ORG)  How serious is the counterfeiting problem?  According to the International Anti-Counterfeiting Coalition, In the United States alone counterfeiting is a $600 billion a year industry and is one the fastest growing industries around the globe. It is currently estimated that counterfeit goods make up around 5-7% of world trade.  In the US, the FBI has called counterfeiting “the crime of the century”. Counterfeiting results in lost tax revenue for the government and also fuels black market trade. Counterfeits are not only a serious threat to the commercial world but also to consumer safety and public health.

IHS Inc.- a business information and analytics software company Non-U.S.-based suppliers accounted for more than $2 billion (revenue loss) during the five-year period from 2007 to About $400 Million per year. Global Economic Effect

Overview  In order to raise awareness relating to this issue, many companies have begun taking precautionary measures to protect their products from being counterfeited. Preventative Measures Counterfeit DetectionInstant product verification process with unique product ID. Diversion DetectionDetect and identify the location of diverted products Marketing AccelerationConnectivity with the consumer beyond point of purchase. Track and TraceUnique ID provides manufactures instant track and trace capabilities Document ProtectionProtects the content of the entire document from modification. Real Time MetricsReal-time data integration, analysis and reporting.

Limitations As counterfeiters become more sophisticated, the security gaps in these technologies become open to exploitation.

Bilcare Research nonCloneable ID™ Technologies  nonClonableID™ system comprises of tags with a unique materials-based “fingerprint” that is prohibitively difficult to replicate.  These can be seamlessly integrated into any supply chain system, and through the use of Bilcare’s reader.  Help to provide a secure authentication of any product.  This solution provides a comprehensive anti-counterfeiting solution that also enables secure Track-n-Trace, leading to e-Pedigree (electronic documentation) of the products across the supply chain – from manufacturer to consumer.  This technology innovatively exploits micro and nano-particulate materials together with their optical properties to provide a foolproof authentication solution.

Discussion Benefits & Advantages This technology is cost-effective and can be incorporated into almost any production market. It provides a real time data analysis that help to identify any existing or potential discrepancies. Currently, this type of tag technology is not replicable. This unique feature of non-reproducibility of the fingerprint ensures total security of the system even under circumstances wherein parts of the system may get compromised.

Conclusion The simplest way to begin the anti counterfeiting process is by informing the consumers about the effects and risk of counterfeit products. Explain the possible consequences related to the use of counterfeit products. The loss of jobs and cost to companies when there products are counterfeited. Additional safety measures:  What strategies can companies implement for a more comprehensive anti-counterfeiting solution?  For companies that are serious about finding a solution to counterfeiting, top management involvement with periodic review is necessary. Prohibition of counterfeit goods is essential either at the points of origin or within the channels of distribution.  Companies need to deploy anti-counterfeiting strategies that set up various layers of security. To challenge the counterfeiters, it is important to use a combination of overt and covert methods including such methods which reduce the dependence on human elements.  Companies need to constantly look at new technologies to increase supply chain security for secure Track- n-Trace of products from point of origin to point of sale.

Reference “Six Degrees Counterfeit Prevention LLX”. Nov 30, 2013 “US Department of Defense Counterfeit Regulations Impact Global Suppliers ”. Counterfeit-Regulations-Impact-Global-Suppl. Nov 25,2013 “Authentication, Secure Track n Trace, Drug e pedigree and Access Cards Security” Nov 23,

Bilcare Research nonCloneable ID™ Technologies Counterfeit Detection & Track and Trace  What strategies can companies implement for a more comprehensive anti-counterfeiting solution?  For companies that are serious about finding a solution to counterfeiting, top management involvement with periodic review is necessary. Prohibition of counterfeit goods is essential either at the points of origin or within the channels of distribution.  Companies need to deploy anti-counterfeiting strategies that set up various layers of security. To challenge the counterfeiters, it is important to use a combination of overt and covert methods including such methods which reduce the dependence on human elements.  Companies need to constantly look at new technologies to increase supply chain security for secure Track-n-Trace of products from point of origin to point of sale.