Anti-counterfeiting  Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
Who  cares? Who is  responsible for implementing anti-counterfeiting? Product companies/brand owners  are concerned due to Reduced market share, revenue and ability to benefit from innovation & IPR Increased liability and warranty claims (real and spurious) Negative impact on brand value and reputation Governments   are concerned due to  The threat to the welfare of the public Negative impact on the knowledge economy from IPR abuse Reduced tax revenues Substantial resources channelled to organised crime and terrorist groups Consumers   are concerned due to Health & safety risk
What is the impact of counterfeiting? It’s a  BIG  problem - Impact on world trade estimates range from $200B to $700B  The  SCOPE  is increasing – there is a notable shift from luxury to common products Increasing  REGULATION  & increasing emphasis placed on IPR protection
Further trends in counterfeiting Increasing infiltration of  legitimate supply chains Counterfeit goods are no longer restricted to informal markets Increasing use of the  internet  as a distribution channel Increasing  consumer awareness  and demand for transparency  Opportunity to use authentication as a marketing tool
Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
System level thinking enables us to plan to stay ahead of the counterfeiter  Technologies provide us with different levels of defence Technology  without  process can significantly limit our effectiveness How do we structure our approach? Effective anti-counterfeiting approaches derive their strength from a combination of rigorous system level thinking and technology
The logistics and supply chain ‘system’ Legitimate Illicit
An effective approach requires a clear understanding of the requirements  Cost effectiveness  – money spent on an anti-counterfeiting approach has to be proportional to the value of the item to be protected Robustness  – features employed need to be robust to normal usage and determined attack by a counterfeiter Ease of authentication  – features have to provide a rapid, robust and reliable authentication at low cost using overt or covert features  Brand protection  – approach should be neutral or have a positive impact on brand image  Granularity  – understanding of the scale of the item to be protected (pallet, packet or pill?) Ability to detect and trace counterfeit activity  – approach can enable information gathering to support further improvements
An effective approach also needs to understand the capabilities and nature of the counterfeiter and the users  We don’t know  what  the counterfeiters are developing and  when  it will be available Need to plan for the features being compromised Need to detect when this occurs Authentication approaches need to be “user proof” Users must be able to easily authenticate genuine products  Need to understand what users  do,  rather than what they  should do
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Effective solutions use a combination of technologies to deter, defend against, and detect the counterfeiter Single technologies provide a potential single point of failure  Multiple technologies can be layered to provide additional protection typically a combination of overt and covert features We can learn from other industries about how they have tackled similar problems Evolution of automotive security systems Protection of sensitive defence communication equipment We can identify where significant effort is being employed Protection of banknotes and documents Protection of pharmaceuticals
A combination of  overt  and covert features can be used to provide us with good coverage of the set of requirements  Examples   1D and 2D Bar Codes Holograms Optically Variable Devices (OVDs) Colour Security graphics Radio Frequency Identification (RFID) Overt Features    Visible deterrence against copying x  Needs to be robust against attack     Typically easy to authenticate from factory to end-user x  Typically easy to duplicate causing Denial of Service – “which one was the correct one?”
A combination of overt and  covert  features can be used to provide us with good coverage of the set of requirements  Covert Features   x  Limited deterrence effect at the outset x  Potential impact on robustness if secrecy lost  x  Requires custom reading hardware    Potentially more difficult to duplicate    Can be embedded at the highest level of granularity  Examples Ink properties (UV and IR) Embedded features (images and substrates) Hidden marks and digital watermarks Taggants (chemical, biological and micro-)
The development of portable, low-cost instrumentation is a key factor in the success of a number of covert authentication systems Instrumentation typically has challenging performance targets with the addition of low power consumption and use by unskilled staff Assumption is that these devices  will  fall into the hands of the counterfeiter We need to ensure that the technique cannot be easily reverse engineered We can engineer the solution around principles and components of secure systems  Ideally we need to retain flexibility in the design to allow evolution if all or part of the technique is compromised
Bayesian signal processing and information theory approaches provide significant benefits to authentication systems  Bayesian processing techniques can be used to provide optimal detection algorithms Reliable detection of features at low signal strengths These techniques enable a number of system level benefits  Allowing sensor hardware parameters to be relaxed (lower cost) Providing improved sensitivity (increased covertness of features) Provides a rigorous approach to system assumptions within signal processing
Radio Frequency Identification (RFID) technology provides the ability to securely encode a serial number within a device and store a trace history  Significant growth in Near Field Communication (NFC) devices in the consumer market Continued drive to reduce the costs of the devices Security and privacy issues need to be carefully balanced with brand protection
Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
Counterfeit products are becoming increasingly prevalent requiring a structured game plan - so is it roulette or chess we want to play?  If you play roulette your luck will run out sometime… A single technology alone may not be sufficient to protect a product The competition is not standing still Chess provides an ability to stay a step ahead Technology is an enabler for the brand owner as well as the counterfeiter System level thinking enables technologies to be used in combination We can learn from other’s successes and mistakes Looking to the future
For more information about the work in Authentication Systems at Cambridge Consultants please contact Ruth Thomson +44 (0)1223 420024 [email_address] Questions?
Contact details: Cambridge Consultants Ltd Cambridge Consultants Inc Science Park, Milton Road  101 Main Street Cambridge, CB4 0DW Cambridge MA 02142 England USA Tel: +44(0)1223 420024 Tel: +1 617 532 4700 Fax: +44(0)1223 423373 Fax: +1 617 737 9889 Registered No. 1036298 England [email_address] www.CambridgeConsultants.com ©  2009 Cambridge Consultants Ltd, Cambridge Consultants Inc. All rights reserved. Commercially Confidential   This Presentation contains ideas and information which are proprietary to Cambridge Consultants Limited and/or Cambridge Consultants Inc: it is given to you in confidence.  You are authorised to open and view any electronic copy we send you of this document within your organisation and to print a single copy.  Otherwise the material may not in whole or in part be copied, stored electronically or communicated to third parties without the prior written agreement of Cambridge Consultants Limited and/or Cambridge Consultants Inc.

More Related Content

PPTX
Computer Hacking Forensic Investigator - CHFI
PDF
Eurosmart etsi-e-io t-scs-presentation
PDF
Chapter 12 iso 27001 awareness
PDF
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
PPT
Compliance Awareness
PDF
Trustwave Cybersecurity Education Catalog
PPTX
The Cyber Security Training Gap: Rotarian Reach
PPT
GSA's Presentation on Improving Cyber Security Through Acquisition
Computer Hacking Forensic Investigator - CHFI
Eurosmart etsi-e-io t-scs-presentation
Chapter 12 iso 27001 awareness
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
Compliance Awareness
Trustwave Cybersecurity Education Catalog
The Cyber Security Training Gap: Rotarian Reach
GSA's Presentation on Improving Cyber Security Through Acquisition

What's hot (20)

PPTX
Cyber risks in supply chains
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
Information Security Management Education Program - Concept Document
PPTX
Securing your supply chain & vicarious liability (cyber security)
PDF
Identifying Code Risks in Software M&A
PPT
Employee Security Awareness Program
PPT
Info Sec2007 End Point Final
PDF
Irfan Ur Rehman
PDF
System of security controls
PPTX
Vulnerability in ai
PDF
The Security Challenge: What's Next?
PDF
Trustwave Cybersecurity Education Catalog 2019
PDF
Security Awareness Training
PDF
Private sector cyber resilience and the role of data diodes
PDF
Intel HIMSS WoHIT mhealth
PDF
Trustwave Cybersecurity Education Catalog 2018
PPT
Security Awareness in the Enterprise
PDF
Cyber Ranges: The (R)evolution in Cybersecurity Training
PDF
Building CSIRT and its competency
PDF
Assessing Risk: Developing a Client/Server Security Architecture,
Cyber risks in supply chains
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Information Security Management Education Program - Concept Document
Securing your supply chain & vicarious liability (cyber security)
Identifying Code Risks in Software M&A
Employee Security Awareness Program
Info Sec2007 End Point Final
Irfan Ur Rehman
System of security controls
Vulnerability in ai
The Security Challenge: What's Next?
Trustwave Cybersecurity Education Catalog 2019
Security Awareness Training
Private sector cyber resilience and the role of data diodes
Intel HIMSS WoHIT mhealth
Trustwave Cybersecurity Education Catalog 2018
Security Awareness in the Enterprise
Cyber Ranges: The (R)evolution in Cybersecurity Training
Building CSIRT and its competency
Assessing Risk: Developing a Client/Server Security Architecture,
Ad

Viewers also liked (10)

PPTX
Business action to stop counterfeiting and piracy
PDF
Counterfeiting : a global problem
PPT
Savelife foundation and; anr vs union of india and anr
PDF
Counterfeiting Presentation 2009 Handout
PPTX
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
PDF
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
PDF
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
PPT
Genuine Products, Genuine Benefits
PDF
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
PDF
TEDx Manchester: AI & The Future of Work
Business action to stop counterfeiting and piracy
Counterfeiting : a global problem
Savelife foundation and; anr vs union of india and anr
Counterfeiting Presentation 2009 Handout
2013 09 18 - Fighting Counterfeiting, A Compilation of Anti-Counterfeiting Aw...
Emerging trends in IP searching: Machine/AI based searching - Anoop Cheeran &...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
Genuine Products, Genuine Benefits
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
TEDx Manchester: AI & The Future of Work
Ad

Similar to Anti Counterfeiting - Playing Roulette Or Chess? (20)

PDF
Authentication Technologies An Overview
PDF
2014 the future evolution of cybersecurity
PPTX
Ravi i ot-security
PPT
Life After Compliance march 2010 v2
PDF
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
PPTX
EU GDPR: What You Really Need to Know
PPTX
chapter 6 ethics emerging technology.pptx
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
The challenges of Retail Security
PPTX
Strengthening Data Rooms Amidst Rising Cyber Threats
PPTX
Top Challenges in Connected Device Development and How to Overcome Them (1).pptx
PPTX
Ashar Shaikh A-84 SEMINAR.pptx
PPT
Ethicalhackingalicencetohack 120223062548-phpapp01
PPT
Ethical hacking a licence to hack
PDF
What is Cybersecurity and career paths.
PDF
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
PDF
Cyber-Security-Whitepaper.pdf
PDF
Cyber-Security-Whitepaper.pdf
PDF
Understanding Endpoint Security: A Guide For Everyone
PPTX
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
Authentication Technologies An Overview
2014 the future evolution of cybersecurity
Ravi i ot-security
Life After Compliance march 2010 v2
Service2Media: Webinar Security & Management (17 March 2014) by Derk Tegeler
EU GDPR: What You Really Need to Know
chapter 6 ethics emerging technology.pptx
Future of Cybersecurity 2016 - M.Rosenquist
The challenges of Retail Security
Strengthening Data Rooms Amidst Rising Cyber Threats
Top Challenges in Connected Device Development and How to Overcome Them (1).pptx
Ashar Shaikh A-84 SEMINAR.pptx
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethical hacking a licence to hack
What is Cybersecurity and career paths.
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Understanding Endpoint Security: A Guide For Everyone
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...

More from Ruth Thomson (7)

PDF
How to develop a novel wearable product?
PDF
'Does one size fit all?' - presentation on Wearable Technology
PDF
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
PDF
Innovative product development - how to use technology demonstrators for busi...
PPT
Genuine Products, Genuine Benefits
PDF
Bio presentation counterfeiting & serialization
PDF
Creating a culture for Open Innovation
How to develop a novel wearable product?
'Does one size fit all?' - presentation on Wearable Technology
Why Smart Meters need to define interfaces to the Internet and Consumer HAN
Innovative product development - how to use technology demonstrators for busi...
Genuine Products, Genuine Benefits
Bio presentation counterfeiting & serialization
Creating a culture for Open Innovation

Recently uploaded (20)

PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
DOCX
search engine optimization ppt fir known well about this
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Geologic Time for studying geology for geologist
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPT
What is a Computer? Input Devices /output devices
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Configure Apache Mutual Authentication
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
DOCX
Basics of Cloud Computing - Cloud Ecosystem
The influence of sentiment analysis in enhancing early warning system model f...
sustainability-14-14877-v2.pddhzftheheeeee
search engine optimization ppt fir known well about this
Final SEM Unit 1 for mit wpu at pune .pptx
Geologic Time for studying geology for geologist
Improvisation in detection of pomegranate leaf disease using transfer learni...
NewMind AI Weekly Chronicles – August ’25 Week III
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
What is a Computer? Input Devices /output devices
Convolutional neural network based encoder-decoder for efficient real-time ob...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Zenith AI: Advanced Artificial Intelligence
Configure Apache Mutual Authentication
A review of recent deep learning applications in wood surface defect identifi...
Flame analysis and combustion estimation using large language and vision assi...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Module 1.ppt Iot fundamentals and Architecture
Taming the Chaos: How to Turn Unstructured Data into Decisions
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Basics of Cloud Computing - Cloud Ecosystem

Anti Counterfeiting - Playing Roulette Or Chess?

  • 1. Anti-counterfeiting Playing roulette or chess? Innovation Day 2009 Dr Frances Metcalfe Group Leader Industrial & Scientific Products
  • 2. Agenda Counterfeiting – the problem 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 3. Historically associated with forging of bank notes, counterfeiting has spread into other potentially less challenging but more lucrative areas
  • 4. Who cares? Who is responsible for implementing anti-counterfeiting? Product companies/brand owners are concerned due to Reduced market share, revenue and ability to benefit from innovation & IPR Increased liability and warranty claims (real and spurious) Negative impact on brand value and reputation Governments are concerned due to The threat to the welfare of the public Negative impact on the knowledge economy from IPR abuse Reduced tax revenues Substantial resources channelled to organised crime and terrorist groups Consumers are concerned due to Health & safety risk
  • 5. What is the impact of counterfeiting? It’s a BIG problem - Impact on world trade estimates range from $200B to $700B The SCOPE is increasing – there is a notable shift from luxury to common products Increasing REGULATION & increasing emphasis placed on IPR protection
  • 6. Further trends in counterfeiting Increasing infiltration of legitimate supply chains Counterfeit goods are no longer restricted to informal markets Increasing use of the internet as a distribution channel Increasing consumer awareness and demand for transparency Opportunity to use authentication as a marketing tool
  • 7. Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 8. System level thinking enables us to plan to stay ahead of the counterfeiter Technologies provide us with different levels of defence Technology without process can significantly limit our effectiveness How do we structure our approach? Effective anti-counterfeiting approaches derive their strength from a combination of rigorous system level thinking and technology
  • 9. The logistics and supply chain ‘system’ Legitimate Illicit
  • 10. An effective approach requires a clear understanding of the requirements Cost effectiveness – money spent on an anti-counterfeiting approach has to be proportional to the value of the item to be protected Robustness – features employed need to be robust to normal usage and determined attack by a counterfeiter Ease of authentication – features have to provide a rapid, robust and reliable authentication at low cost using overt or covert features Brand protection – approach should be neutral or have a positive impact on brand image Granularity – understanding of the scale of the item to be protected (pallet, packet or pill?) Ability to detect and trace counterfeit activity – approach can enable information gathering to support further improvements
  • 11. An effective approach also needs to understand the capabilities and nature of the counterfeiter and the users We don’t know what the counterfeiters are developing and when it will be available Need to plan for the features being compromised Need to detect when this occurs Authentication approaches need to be “user proof” Users must be able to easily authenticate genuine products Need to understand what users do, rather than what they should do
  • 12. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 13. Effective solutions use a combination of technologies to deter, defend against, and detect the counterfeiter Single technologies provide a potential single point of failure Multiple technologies can be layered to provide additional protection typically a combination of overt and covert features We can learn from other industries about how they have tackled similar problems Evolution of automotive security systems Protection of sensitive defence communication equipment We can identify where significant effort is being employed Protection of banknotes and documents Protection of pharmaceuticals
  • 14. A combination of overt and covert features can be used to provide us with good coverage of the set of requirements Examples 1D and 2D Bar Codes Holograms Optically Variable Devices (OVDs) Colour Security graphics Radio Frequency Identification (RFID) Overt Features  Visible deterrence against copying x Needs to be robust against attack  Typically easy to authenticate from factory to end-user x Typically easy to duplicate causing Denial of Service – “which one was the correct one?”
  • 15. A combination of overt and covert features can be used to provide us with good coverage of the set of requirements Covert Features x Limited deterrence effect at the outset x Potential impact on robustness if secrecy lost x Requires custom reading hardware  Potentially more difficult to duplicate  Can be embedded at the highest level of granularity Examples Ink properties (UV and IR) Embedded features (images and substrates) Hidden marks and digital watermarks Taggants (chemical, biological and micro-)
  • 16. The development of portable, low-cost instrumentation is a key factor in the success of a number of covert authentication systems Instrumentation typically has challenging performance targets with the addition of low power consumption and use by unskilled staff Assumption is that these devices will fall into the hands of the counterfeiter We need to ensure that the technique cannot be easily reverse engineered We can engineer the solution around principles and components of secure systems Ideally we need to retain flexibility in the design to allow evolution if all or part of the technique is compromised
  • 17. Bayesian signal processing and information theory approaches provide significant benefits to authentication systems Bayesian processing techniques can be used to provide optimal detection algorithms Reliable detection of features at low signal strengths These techniques enable a number of system level benefits Allowing sensor hardware parameters to be relaxed (lower cost) Providing improved sensitivity (increased covertness of features) Provides a rigorous approach to system assumptions within signal processing
  • 18. Radio Frequency Identification (RFID) technology provides the ability to securely encode a serial number within a device and store a trace history Significant growth in Near Field Communication (NFC) devices in the consumer market Continued drive to reduce the costs of the devices Security and privacy issues need to be carefully balanced with brand protection
  • 19. Agenda Introduction 1 How do we design an effective approach? 2 The role of technology in the solution 3 Looking to the future 4
  • 20. Counterfeit products are becoming increasingly prevalent requiring a structured game plan - so is it roulette or chess we want to play? If you play roulette your luck will run out sometime… A single technology alone may not be sufficient to protect a product The competition is not standing still Chess provides an ability to stay a step ahead Technology is an enabler for the brand owner as well as the counterfeiter System level thinking enables technologies to be used in combination We can learn from other’s successes and mistakes Looking to the future
  • 21. For more information about the work in Authentication Systems at Cambridge Consultants please contact Ruth Thomson +44 (0)1223 420024 [email_address] Questions?
  • 22. Contact details: Cambridge Consultants Ltd Cambridge Consultants Inc Science Park, Milton Road 101 Main Street Cambridge, CB4 0DW Cambridge MA 02142 England USA Tel: +44(0)1223 420024 Tel: +1 617 532 4700 Fax: +44(0)1223 423373 Fax: +1 617 737 9889 Registered No. 1036298 England [email_address] www.CambridgeConsultants.com © 2009 Cambridge Consultants Ltd, Cambridge Consultants Inc. All rights reserved. Commercially Confidential This Presentation contains ideas and information which are proprietary to Cambridge Consultants Limited and/or Cambridge Consultants Inc: it is given to you in confidence. You are authorised to open and view any electronic copy we send you of this document within your organisation and to print a single copy. Otherwise the material may not in whole or in part be copied, stored electronically or communicated to third parties without the prior written agreement of Cambridge Consultants Limited and/or Cambridge Consultants Inc.