• Title/Summary/Keyword: Anti-Counterfeiting

Search Result 18, Processing Time 0.021 seconds

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol (RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

Analysis of Actual Condition of Counterfeits and Anti-Counterfeiting Strategies of Korean Fashion Firms (국내 패션기업의 위조상품 관리실태 및 대응전략분석)

  • 김용주
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • The purpose of this study was to analyze anti-counterfeiting strategies of fashion firms in Korea. Data was collected by in-depth interviews for 25 fashion firms and 5 buying offices who had been victims of counterfeiting. The result showed that fashion firms recognized the counterfeiting, especially deceptive counterfeiting, as a serious problem in Korea and seek for stronger protection. Fashion firms adopted diverse strategies for the protection of trademark and for the protection of design; (1) Investigation and Surveillance, (2) Warning, (3) Prosecution, (4) Lawsuit, (5) Consumer education (6) High-tech tabooing, (7) Provide incentives, (8) Penalty, (9) Do nothing. Despite the diverse efforts, they proposed the most desirable strategies to deter the counterfeiting as the changes of consumer attitude and stronger legal protection.

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

Antecedents of attitudes toward counterfeit luxury fashion goods (패션명품 복제품 태도에 대한 선행변수)

  • Park, Hye-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.2
    • /
    • pp.310-325
    • /
    • 2015
  • The market for counterfeit luxury fashion goods is proliferating across the globe. In an effort to provide some insight into this phenomenon, this study aimed to identify the antecedents of attitudes toward counterfeits of luxury fashion goods. As antecedents, counterfeit proneness and attitudes toward counterfeiting were considered. It was hypothesized that counterfeit proneness not only influences attitudes toward counterfeits of luxury fashion goods directly but also indirectly through attitudes toward counterfeiting. Data were gathered by surveying university students in Seoul, using convenience sampling. Three hundred five questionnaires were used in the statistical analysis. SPSS was used for exploratory factor analysis, and AMOS was used for confirmatory factor analysis and path analysis. The results showed that all the fit statistics for the variable measures were quite acceptable. In addition, the overall fits of the hypothesized model suggest that the model fits the data well. Factor analysis revealed that counterfeit proneness and attitudes toward counterfeits of luxury fashion goods were uni-dimensional and that attitudes toward counterfeiting were two dimensional, which are 'normatively less susceptible' and 'value conscious'. Test of the hypothesized path showed that counterfeit proneness influences attitudes toward counterfeits of luxury fashion goods indirectly through the two factors of attitudes toward counterfeiting. The results suggest some implications for anti-counterfeit businesses.

U.S. Consumers' Motivations for Purchasing and Not Purchasing Fashion Counterfeit Goods

  • Kim, Hye-Jeong;Latour, Brittany N.
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.11-27
    • /
    • 2012
  • This study explores U.S. consumers' perceptions about fashion counterfeit goods and counter feiting and motivations for purchasing and not purchasing those goods. A qualitative research technique utilizing self-administered essay questions was used to collect data. A convenience sample of female college students(N=128) drawn from classes at Midwestern and Southern universities in the U.S. participated in this study. This study found that a majority of consumers tended to perceive that fashion counterfeit goods are merely imitations of the legitimate goods and that counterfeiting is producing and selling fake goods, but a small number of consumers associated those goods with illegally produced goods and illegal practices or violations of intellectual property rights. The major motivations for purchasing counterfeit fashion goods were found to be price/value consciousness, appearance of counterfeit goods, status consumption, availability of the goods, desire for souvenirs, and social(family and peer) influences. In addition, the major deterrents to purchasing these goods were identified as integrity/ethical judgment, poor quality of counterfeit goods, self-image/status, and unavailability of the goods. This study provides policy makers and anti-counterfeit coalitions with information to develop effective educational programs or campaigns to influence consumers' counterfeit fashion purchasing behavior.

Enhanced RFID Mutual Authentication Protocol on Efficient Supply Chain Management (효율적인 공급망 관리를 위한 강화된 RFID 상호 인증 프로토콜)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.691-698
    • /
    • 2009
  • Chen et al. proposed a RFID authentication protocol for anti-counterfeiting and privacy protection. A feasible security mechanism for anti-counterfeiting and privacy protection was proposed using XOR and random number shifting operations to enhance RFID tag's security providing a low cost. However, their authentication protocol has some drawbacks and security problems because they did not consider the surrounding environments. We conduct analysis on the protocol and identify problematic areas for improvement of the research. We also provide enhanced authentication and update scheme based on the comment for efficient supply chain management. The proposed protocol was analyzed and compared with typical XOR based RFID authentication protocols and it was confirmed that our protocol has high safety and low communication cost.

  • PDF

Aerosol Synthesis of Gd2O3:Eu/Bi Nanophosphor for Preparation of Photofunctional Pearl Pigment as Security Material

  • Jung, Kyeong Youl;Han, Jang Hoon;Kim, Dae Sung;Choi, Byung-Ki;Kang, Wkang-Jung
    • Journal of the Korean Ceramic Society
    • /
    • v.55 no.5
    • /
    • pp.461-472
    • /
    • 2018
  • $Gd_2O_3:Eu/Bi$ nanoparticles were synthesized via spray pyrolysis and applied for the preparation of a luminescent pearl pigment as an anti-counterfeiting material. The luminescence properties were optimized by changing the $Eu^{3+}$ and $Bi^{3+}$ concentration. Ethylene glycol was used as an organic additive to prepare the $Gd_2O_3:Eu/Bi$ nanoparticles. The highest emission intensity was achieved when the total dopant content was 10.0 at.% and the mole fraction of Bi was 0.1. The concentration quenching was mainly due to dipole-dipole interactions between the same activators, and the critical distances were 9.0 and $19.6{\AA}$ for $Eu^{3+}$ and $Bi^{3+}$, respectively. The prepared $Gd_2O_3:Eu/Bi$ powder exhibited an average size of approximately 82.5 nm and a narrow size distribution. Finally, the $Gd_2O_3:Eu/Bi$ nanophosphor coated on the surface of the pearl pigment was confirmed to have good red emission under irradiation from a portable ultraviolet light-emitting diode lamp (365 nm).

Luminescent Properties and Anti-Counterfeiting Applications of SrWO4:RE3+ (RE=Dy, Sm, Dy/Sm) Phosphors Doped with Several Activator Ions (다양한 활성제 이온이 도핑된 SrWO4:RE3+ (RE=Dy, Sm, Dy/Sm) 형광체의 특성과 위조 방지 응용)

  • Yoon, Soohwan;Cho, Shinho
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.5
    • /
    • pp.393-399
    • /
    • 2020
  • A series of phosphors, SrWO4:5 mol% Dy3+, SrWO4:5 mol% Sm3+, and SrWO4:5 mol% Dy3+:x Sm3+ (x=1~15 mol%), were prepared using a facile co-precipitation. The crystal structure, morphology, photoluminescence properties, and application in anti-counterfeiting fields were investigated. The crystalline structures of the prepared phosphors were found to be tetragonal systems with the dominant peak occurring at the (112) plane. The excitation spectra of the Dy3+ singly-doped SrWO4 phosphors were composed of an intense charge-transfer band centered at 246 nm in the range of 210~270 nm and two weak peaks at 351 nm and 387 nm due to the 6H15/26P7/2 and 6H15/24I13/2 transitions of Dy3+ ions, respectively. The wavelength of 246 nm was optimum for exciting the luminescence of Dy3+ and Sm3+ co-doped SrWO4 phosphors. The emission spectra consisted of two intense blue and yellow emission bands at 480 nm and 573 nm corresponding to the 4F9/26H15/2 and 4F9/26H13/2 transitions of Dy3+, and two strong emission peaks at 599 nm and 643 nm originating from the 4G5/26H7/2 and 4G5/26H9/2 transitions of Sm3+, respectively. As the concentration of Sm3+ ions increased, the emission intensities of Dy3+ rapidly decreased, while the emission intensities of Sm3+ gradually increased. These results suggest that the color of the emission light can be tuned from yellow to white by changing the concentration of Sm3+ ions at a fixed 5 mol% Dy3+. Furthermore, the fluorescent security inks were synthesized for use in anti-counterfeiting applications.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.