Options
SToP: "Stop Tampering of Products"
Type
applied research project
Start Date
01 November 2006
End Date
30 April 2009
Status
completed
Keywords
RFID
Anti-Counterfeiting
Product Piracy
Illicit Trade
Description
The SToP project aims at developing ambient intelligence-based and network-oriented systems for the efficient and secure authentication of products. It thereby helps to reduce the problems imposed by counterfeiting and product privacy.
An important building block is the duality of existence, in the physical and the virtual world, for the secure authentication of products. The technological foundation is RFID (Radio Frequency Identification), which allows secure tagging, reliable and easy-to-use identification, and dynamic authentication. The RFID label itself serves both as a security feature and as a bridge between the physical and the virtual, i.e. digital, world.
The objective of the SToP project is to create a solution for product authentication, which satisfies a complex set of requirements. The solution must be secure, meaning that tags are protected against manipulations and they must not be cloneable. Security is further supported through the tracking capabilities provided by RFID. It must be user-friendly and cost-effective, being usable by a wide range of parties such as manufacturers, vendors, customs authorities, and consumers. This helps to detect counterfeit goods as early as possible or even prevent them from entering into the supply chain in the first place. As a network-based solution, it supports the alignment and information of stakeholders. It encourages information sharing on counterfeiting related problems and promotes closer cooperation. It improves communication with consumers, providing them with better ways of risk mitigation and education.
A good solution must take into consideration the specific requirements of various industries. There are significant differences regarding various aspects of product authentication. For example, who bears the risk caused by counterfeit items, and who is in the best position to establish the authenticity of an item? Which items must be verified, those procured by a company, or those produced? Which cost of product authentication is acceptable? Many more questions remain to be answered.
An important building block is the duality of existence, in the physical and the virtual world, for the secure authentication of products. The technological foundation is RFID (Radio Frequency Identification), which allows secure tagging, reliable and easy-to-use identification, and dynamic authentication. The RFID label itself serves both as a security feature and as a bridge between the physical and the virtual, i.e. digital, world.
The objective of the SToP project is to create a solution for product authentication, which satisfies a complex set of requirements. The solution must be secure, meaning that tags are protected against manipulations and they must not be cloneable. Security is further supported through the tracking capabilities provided by RFID. It must be user-friendly and cost-effective, being usable by a wide range of parties such as manufacturers, vendors, customs authorities, and consumers. This helps to detect counterfeit goods as early as possible or even prevent them from entering into the supply chain in the first place. As a network-based solution, it supports the alignment and information of stakeholders. It encourages information sharing on counterfeiting related problems and promotes closer cooperation. It improves communication with consumers, providing them with better ways of risk mitigation and education.
A good solution must take into consideration the specific requirements of various industries. There are significant differences regarding various aspects of product authentication. For example, who bears the risk caused by counterfeit items, and who is in the best position to establish the authenticity of an item? Which items must be verified, those procured by a company, or those produced? Which cost of product authentication is acceptable? Many more questions remain to be answered.
Leader contributor(s)
Member contributor(s)
Ippisch, Tobias
Partner(s)
SAP, HSG, Novartis, Richemont, Airbus, Bundesdruckerei, Spacecode, Oria Computers
Funder(s)
Topic(s)
-
Method(s)
-
Range
HSG Internal
Range (De)
HSG Intern
Division(s)
Eprints ID
35157
1 results
Now showing
1 - 1 of 1
-
PublicationEstimating the Global Scale of Counterfeit Trade( 2008-08-08)
;Staake, Thorsten ;Thiesse, FredericTaking successful measures against international trade in counterfeit goods requires a thorough understanding of the characteristics of the illicit market. However, the clandestine nature of the phenomenon makes an investigation a challenging exercise. Even the validity of existing estimates on its size seems highly questionable. Against this background, this contribution proposes a framework for estimating the extent of counterfeit trade which relies on various public data sources. We apply our framework to the examples of the North-American and the European market and draw conclusions on the share of counterfeits among world merchandise trade.Type: conference paper