Survey of techniques for the fight against counterfeit goods and Intellectual Property Rights (IPR) infringement Gianmarco Baldini Igor Nai Fovino Riccardo Satta Aris Tsois Enrico Checchi 2015 EUR 27688 EN This publication is a Technical report by the Joint Research Centre, the European Commission’s in-house science service. It aims to provide evidence-based scientific support to the European policy-making process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. JRC Science Hub https://ec.europa.eu/jrc JRC98181 EUR 27688 EN ISBN 978-92-79-54544-3 (pdf) ISBN 978-92-79-54543-6 (print) ISSN 1831-9424 (online) ISSN 1018-5593 (print) doi:10.2788/97231 © European Union, 2015 All images © European Union 2015 Reproduction is authorised provided the source is acknowledged. How to cite: G. Baldini, I. Nai Fovino, R. Satta, A. Tsois, E. Checchi; Survey of techniques for the fight against counterfeit goods and Intellectual Property Rights (IPR) infringement; EUR 27688 EN; doi:10.2788/97231 Table of contents Acknowledgements: .............................................................................................. 5 Abstract ............................................................................................................... 6 1. Introduction ................................................................................................. 8 2. Classification of techniques for fight against counterfeiting and IPR infringement 10 3. Domains .................................................................................................... 14 3.1. Fast Moving Consumer Goods (FMCG) .................................................. 14 3.2. Textiles ............................................................................................ 14 3.3. Sporting Goods/Sports Equipment ....................................................... 14 3.4. Mechanical, Engineering, Automotive .................................................... 15 3.5. Electronics/Integrated Circuits/Semiconductors ............................................. 15 3.6. Phones/Smartphones/Tablets ...................................................................... 16 3.7. Food......................................................................................................... 16 3.8. Healthcare ............................................................................................... 16 3.9. Agriculture ............................................................................................... 17 3.10. Luxury Goods ......................................................................................... 17 3.11. Paper products........................................................................................ 17 4. Authentication technologies .......................................................................... 18 4.1. Introduction ............................................................................................. 18 4.2. Authentication based on electromagnetic spectrum emissions ........................ 20 4.3. Visual inspection with no augmentation ....................................................... 21 4.4. Augmented Visual inspection ....................................................................... 22 4.5. Chemical reaction for visual inspection ......................................................... 23 4.6. Statistical analysis of images of the good (object recognition) ......................... 23 4.7. Visual Identifiers inserted in the good (Overt and Covert) ............................... 25 4.8. Application of Radio Frequency emissions for fight against counterfeiting ......... 30 4.9. Induced emissions (spectroscopy, magnetic resonance and similar techniques) . 33 4.10. Authentication based on artefacts generated internally by the good ................ 38 4.11. Electrical Inspection ................................................................................. 41 4.12. Chemical Inspection ................................................................................. 43 4.13. Authentication based on Weight and Structural Tests .................................... 43 4.14. Authentication based on DNA ..................................................................... 46 4.15. Authentication based on Acoustics tests - Scanning Acoustic Microscopy (SAM) 47 4.16. Summary on the application of Authentication technologies for the fight against counterfeiting .................................................................................................. 48 5. Track and trace techniques ............................................................................... 50 5.1. Introduction .............................................................................................. 50 5.2. Mass Serialization Technologies ................................................................... 51 2 5.3. One dimension-Bar Code ............................................................................ 53 5.4. QR code and other two dimensional bar codes ............................................... 53 5.5. Physical Fingerprint Technology ................................................................... 53 5.6. Other overt technologies ............................................................................. 54 5.7. Other covert technologies ........................................................................... 54 5.8. Radio Frequency Identifier .......................................................................... 55 5.9. Other track and trace technologies ............................................................... 57 5.10. Analysis of track and trace based techniques for the fight against counterfeiting ...................................................................................................................... 58 6. Container tracking, packaging and sealing .......................................................... 61 6.1. Container tracking ..................................................................................... 61 6.2. Container seals .......................................................................................... 69 6.3. Packaging ................................................................................................. 70 6.4. Analysis on Container tracking, packaging and seals technologies for fight against counterfeiting .................................................................................................. 71 7. New Trends and technologies: Analysis of e-Commerce web sites and Internet of Things ............................................................................................................... 73 7.1. Techniques for fight against counterfeiting in E-Commerce .............................. 73 7.2. Application of Internet of Things (IoT) to fight against counterfeiting ................ 77 7.3. Correlation of data from difference elements/sources ..................................... 78 8. Organizational and procedural aspects and techniques ......................................... 80 8.1. Due Diligence and Supply Chain Management Responsibility ........................... 80 8.2. Informing consumers/Awareness ................................................................. 80 8.3. Harmonization of customs procedure ............................................................ 81 8.4. Establishing notification channels for end-users ............................................. 81 9. Government and Private Initiatives .................................................................... 82 9.1. World Customs Organization and IPM Connected ........................................... 82 9.2. Business Action to Stop Counterfeiting and Piracy (BASCAP) ........................... 82 9.3. Anti-Counterfeiting Trade Agreement (ACTA) ................................................ 83 9.4. Office for Harmonization in the Internal Market (OHIM) and European Observatory on Infringements of Intellectual Property Rights. .................................................. 83 10. Comparison Matrix ......................................................................................... 85 10.1. Introduction ....................................................................................... 85 10.2. Metrics .............................................................................................. 85 10.3. Comparison Matrixes ................................................................................ 86 11. Forecasting new threats for fight against counterfeiting ...................................... 88 12. Empowering the Consumer ............................................................................. 89 12.1. Introduction ............................................................................................ 89 12.2. Literature survey ...................................................................................... 91 12.3. Privacy aspects ........................................................................................ 95 3 13. Recommendations ......................................................................................... 97 14. Conclusions ................................................................................................... 99 References ......................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages133 Page
-
File Size-