The Role of Authentication Technologies in Combating Counterfeiting

AuthorMr. Ian M Lancaster
PositionDirector of Reconnaissance International, an expert on authentication devices as a means of detecting and deterring piracy and counterfeiting.

With the problem of product counterfeiting and software piracy now high up the international policy agenda, there is a growing need for quick and easy ways to differentiate fake products from genuine as a means of detecting and deterring counterfeits. Authentication products and technologies - the effective deployment of which requires close collaboration between IP rights holders and the organizations that inspect products - plays an important role in this area.

The function of authentication technology is to help examiners - customs, police and consumer protection agencies - identify the genuine product in ways that are not obvious to counterfeiters, who have become adept at accurately copying products and packaging. It enables the examiner to look beyond the obvious characteristics of the product in order to determine to a reasonable level of certainty whether the item is genuine. Conversely, the absence of the non-obvious characteristics will betray a fake, even though it may look exactly like the genuine product.

An authentication device embedded in a product may need to be multi-layered, so that, for example, the top layer is visible to the consumer, while a lower layer may contain a means of examination that is not apparent to the counterfeiter. The examination may be a two-stage process: the first in the field - in a raid on a warehouse or shop; the second in the laboratory, to obtain forensic proof that will stand up in court.

The layering of an authentication device is achieved through combinations of technologies which are characterized as follows:

* Overt devices. These are visible to the naked eye under standard viewing conditions, including holograms, color-change inks, iridescent thin films and retro-reflective materials.

* Hidden (also s emi-covert) devices. These are revealed to the...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT