SlideShare a Scribd company logo
1 of 6
Download to read offline
Brand Protection &
Security of
Engineering
Components
nonClonableIDTM
LABEL WITH BARCODE
Bilcare Technologies is a
division of Bilcare Ltd. focused
on creating next-generation
anti-counterfeiting, security,
and brand protection solutions
for a broad range of
industry sectors.
With breakthrough research in
nanotechnology, Bilcare
has developed a unique
technology-nonClonableID™-
that enables products to be
authenticated as they move
through the supply chain to
the end consumer.
elephantdesign.com
© 2010, Bilcare Ltd. All Rights Reserved. All product names, and logos mentioned herein are the trademarks or reg-
istered trademarks of Bilcare. No part of this document should be circulated, quoted, or reproduced for distribution
without prior written approval from Bilcare Ltd.
www.bilcaretech.com
tech@bilcare.com
Americas
USA
Bilcare Inc.
300 Kimberton Road Phoenixville, PA 19460
+1 610 422 3305
Europe
UK
Bilcare Technologies
Malvern Hills Science Park, Geraldine Road,
Malvern, WR14 3SZ, United Kingdom
+44 (0) 1684 585 257
Italy
Bilcare Technologies Italia Srl
Presso Veneto Nanotech,
Via San Crispino 106,
35129 Padua, Italy
+39 (049) 7705514
Asia
India
Bilcare Ltd.
601, ICC Tower, B Wing,
Pune 411 016
+91 (20) 30257700
Singapore
Bilcare Technologies Singapore Pte. Ltd.
52 Changi South Street
1, Singapore 486161
+65 63954130
Counterfeit components –
a major safety concern
The extent of
the problem
Counterfeit components have long been a problem in the engineering and automotive
components industry.
According to a report by the Federal Trade Commission counterfeiting is estimated to
cost the global automotive parts industry $12 billion a year in lost sales; $3 billion of
that total is in the United States. (“Intellectual Property: Protecting Valuable Assets in
a Global Market,” MEMA Brand Protection Council, 3rd Edition, June 2009.)
While, genuine parts undergo
rigorous testing for reliability,
safety and environmental
compliance, fake parts do not
go through this approval
process. As a result, these
potentially dangerous
components could fail to operate
correctly in an emergency or
life-threatening situation.
In India alone, it is estimated
that more than 37 percent of
aftermarket parts are fake.
Between 5 to 10 percent of all
replacement auto parts in the
European Union are counterfeits.
(Source: Autoweb, “Intellectual
Property Theft in the Automobile
Industry,” July 2006.)
PROBLEM PROBLEM
PROBLEM NEED
Problems impacting
brand reputation,
revenues and safety
Need to enhance
supply chain security
Counterfeiting is a major concern in the automotive, aircraft and machinery spares
industry. A significant influx of counterfeit products causes manufacturers to lose
market share and affects their brand reputation, leading to loss of revenue. Furthermore,
poor quality counterfeit products compromise the safety of consumers.
•	 Counterfeiting
•	 Product overruns
•	 Inadequate supply
chain security
•	 Inadequate supply
chain visibility
•	 Inaccurate warranty
management
•	 Warranty returns
Over the years, counterfeiters
have exploited vulnerabilities in
the supply chain to introduce
fake parts in legitimate channels,
whilst authentic components
are being siphoned off for grey
market sales. As a result, Original
Equipment Manufacturers (OEMs)
and Tier 1  2 suppliers need to
maintain a high level of control
in the supply chain to prevent
counterfeit parts from entering
the system. This is particularly
the case in the aftermarket sales /
replacement parts market.
nonClonableID™ LABEL WITH BAR CODE
SOLUTIONS SOLUTIONS
The nonClonableID™
advantage
Foolproof security
Security solutions currently available for engineering components use serial numbers,
holograms or bar codes that can be effortlessly duplicated.
nonClonableID™ employs a
unique tamper-evident, materials-
based “fingerprint” for each
component. This fingerprint is
prohibitively difficult to copy (the
fingerprint cannot be duplicated
even by Bilcare).
The nonClonableID™ label is a
unique, materials-based
fingerprint consisting of randomly
distributed particles and cannot
be reproduced even by Bilcare.
Bilcare Technologies offers a
comprehensive solution to
combat counterfeiting through
the implementation of its unique
nonClonableID™ technology.
nonClonableID™ enables
identification, authentication and
brand protection with secure
track-and-trace capabilities.
It enables increased visibility
across the supply chain, providing
insight and agility to manage
risks and tackle issues of diversion
and theft.
nonClonableID™ Data Matrix Labels for Engineering Components
10 mm
Top view
Side view
400 micron
Authentication and verification of engineering components
Confirm
authenticity
Compare
nonClonableIDTM
fingerprint with
database content
Securely send
the nonClonableIDTM
fingerprint
Scan the
product label
Authenticate
label and product
1
2
3
4
SOLUTIONS SOLUTIONS
A comprehensive
approach
How it works
The solution enables real-time authentication across the supply chain through
proprietary hand-held portable readers.
Through a GPRS/Internet/3G
Network, the reader
communicates with the back-
end server which is pre-loaded
with the database of the material
patterns. At the back-end server
the material pattern read from
the field is compared with the
original record and a suitable
communication about the
authenticity and pedigree of the
item is sent back, which can be
viewed on a mobile phone or PC.
Post authentication, further
details such as the date of
manufacturing, the destination
of the products to be sold and
warranty information can be
retrieved. Product recall and
part-fitment issues can also be
managed through the real-time
flow of information.
Product with
nonClonableID™ label
Compare with
the original record
Database
server
BENEFITS BENEFITS
Integrated
anti-counterfeiting
solution
•	 Product verification at any
point in the distribution
system, including point-of-sale
and after sales repairs.
•	 Increased supply chain security
and secure track-and-trace
prevent product diversion and
entry of fake products.
•	 Each component has
information stored in a
powerful database, facilitating
tracking of stock supply.
•	 Stakeholders, including
distributors, vendors and
customers, authenticate the
product in real-time to confirm
the parts are genuine.
•	 Helps dealers handle warranty
claims more efficiently.
Secure product tracking
and brand protection
•	 Increase supply chain security
to combat counterfeiting
•	 Ensure brand protection
through the authentication of
products in real-time
•	 Ensure real-time visibility across
the supply chain
•	 Enhance consumer safety
•	 Improve operations and supply
chain efficiency
•	 Manage warranty returns and
customer services
•	 Manage servicing, parts
replacement and fleet
management more effectively

More Related Content

What's hot

European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationFIDO Alliance
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsFIDO Alliance
 
Enhancing Security with FIDO
Enhancing Security with FIDOEnhancing Security with FIDO
Enhancing Security with FIDOFIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Alliance
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectKeet Sugathadasa
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)FIDO Alliance
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaFIDO Alliance
 
Deployment Snapshots from Japan
Deployment Snapshots from JapanDeployment Snapshots from Japan
Deployment Snapshots from JapanFIDO Alliance
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for MarketersRashish Pandey
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry BrandAlfons Futterer
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...FIDO Alliance
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationFIDO Alliance
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
 
FIDO Authentication in Europe the Momentum and Opportunities
FIDO Authentication in Europe the Momentum and OpportunitiesFIDO Authentication in Europe the Momentum and Opportunities
FIDO Authentication in Europe the Momentum and OpportunitiesFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
FIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Alliance
 
Enterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKTEnterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKTFIDO Alliance
 

What's hot (20)

European Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer AuthenticationEuropean Regulation And The Need For Strong Customer Authentication
European Regulation And The Need For Strong Customer Authentication
 
Strong Customer Authentication & Biometrics
Strong Customer Authentication & BiometricsStrong Customer Authentication & Biometrics
Strong Customer Authentication & Biometrics
 
Enhancing Security with FIDO
Enhancing Security with FIDOEnhancing Security with FIDO
Enhancing Security with FIDO
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
Revolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connectRevolutionizing digital authentication with gsma mobile connect
Revolutionizing digital authentication with gsma mobile connect
 
Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
Protecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO AuthenticationProtecting IDAAS with FIDO Authentication
Protecting IDAAS with FIDO Authentication
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
Deployment Snapshots from Japan
Deployment Snapshots from JapanDeployment Snapshots from Japan
Deployment Snapshots from Japan
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for Marketers
 
Protect your Jewelry Brand
Protect your Jewelry BrandProtect your Jewelry Brand
Protect your Jewelry Brand
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
 
Mobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA PresentationMobile Connections – FIDO Alliance and GSMA Presentation
Mobile Connections – FIDO Alliance and GSMA Presentation
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
FIDO Authentication in Europe the Momentum and Opportunities
FIDO Authentication in Europe the Momentum and OpportunitiesFIDO Authentication in Europe the Momentum and Opportunities
FIDO Authentication in Europe the Momentum and Opportunities
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
FIDO Ecosystem in China
FIDO Ecosystem in ChinaFIDO Ecosystem in China
FIDO Ecosystem in China
 
Enterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKTEnterprise Deployment of FIDO in SKT
Enterprise Deployment of FIDO in SKT
 

Similar to Brand Protection & Security of Engineering Components

Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing Barcoding, Inc.
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety SolutionEddie Cohen
 
Future of supply chain using 5G, IoT and Blockchain by Murali Venkatesh
Future of supply chain using 5G, IoT and Blockchain by Murali VenkateshFuture of supply chain using 5G, IoT and Blockchain by Murali Venkatesh
Future of supply chain using 5G, IoT and Blockchain by Murali VenkateshMurali Venkatesh
 
Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Kristal Snider
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
 
Track and trace
Track and traceTrack and trace
Track and traceBilcareltd
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chaintomkat58
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit RiskKristal Snider
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
FMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit SolutionFMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit SolutionToon Wee
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 
Sanden's automotive air-con compressors-sanden-case-study
Sanden's automotive air-con compressors-sanden-case-studySanden's automotive air-con compressors-sanden-case-study
Sanden's automotive air-con compressors-sanden-case-studyBilcareltd
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in ManufacturingPreran Prasad J M
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problemBilcareltd
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Bitsofproof Tamas Blummer
Bitsofproof Tamas BlummerBitsofproof Tamas Blummer
Bitsofproof Tamas BlummerElfriede Sixt
 
PICDEM2PlusUserGuide.pdf
PICDEM2PlusUserGuide.pdfPICDEM2PlusUserGuide.pdf
PICDEM2PlusUserGuide.pdfasconindia
 

Similar to Brand Protection & Security of Engineering Components (20)

Agrochemicals
AgrochemicalsAgrochemicals
Agrochemicals
 
Traceability in Manufacturing
Traceability in Manufacturing Traceability in Manufacturing
Traceability in Manufacturing
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
 
Future of supply chain using 5G, IoT and Blockchain by Murali Venkatesh
Future of supply chain using 5G, IoT and Blockchain by Murali VenkateshFuture of supply chain using 5G, IoT and Blockchain by Murali Venkatesh
Future of supply chain using 5G, IoT and Blockchain by Murali Venkatesh
 
Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
Track and trace
Track and traceTrack and trace
Track and trace
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit Risk
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
FMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit SolutionFMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit Solution
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Sanden's automotive air-con compressors-sanden-case-study
Sanden's automotive air-con compressors-sanden-case-studySanden's automotive air-con compressors-sanden-case-study
Sanden's automotive air-con compressors-sanden-case-study
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Traceability in Manufacturing
Traceability in ManufacturingTraceability in Manufacturing
Traceability in Manufacturing
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Bitsofproof Tamas Blummer
Bitsofproof Tamas BlummerBitsofproof Tamas Blummer
Bitsofproof Tamas Blummer
 
PICDEM2PlusUserGuide.pdf
PICDEM2PlusUserGuide.pdfPICDEM2PlusUserGuide.pdf
PICDEM2PlusUserGuide.pdf
 

More from Bilcareltd

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpakBilcareltd
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016Bilcareltd
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Bilcareltd
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayBilcareltd
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcareltd
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged worldBilcareltd
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali MemoriesBilcareltd
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Bilcareltd
 
Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015Bilcareltd
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain UsageBilcareltd
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_applicationBilcareltd
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for PropertiesBilcareltd
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualBilcareltd
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leafletBilcareltd
 
Deploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingDeploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingBilcareltd
 

More from Bilcareltd (20)

Bilcare brandpak
Bilcare brandpakBilcare brandpak
Bilcare brandpak
 
Patient first
Patient firstPatient first
Patient first
 
Blood Donation 2016
Blood Donation 2016Blood Donation 2016
Blood Donation 2016
 
Plant a tree make earth pollution free!
Plant a tree make earth pollution free!Plant a tree make earth pollution free!
Plant a tree make earth pollution free!
 
Team Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga DayTeam Bilcare practicing Yoga during World Yoga Day
Team Bilcare practicing Yoga during World Yoga Day
 
Bilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired CertificateBilcare GCS Asia's Admired Certificate
Bilcare GCS Asia's Admired Certificate
 
A dialogue manager in a converged world
A dialogue manager in a converged worldA dialogue manager in a converged world
A dialogue manager in a converged world
 
Diwali Memories
Diwali MemoriesDiwali Memories
Diwali Memories
 
Elite conference mumbai sept 2015
Elite conference mumbai sept 2015Elite conference mumbai sept 2015
Elite conference mumbai sept 2015
 
Annual day 15 August 2015
Annual day 15 August 2015Annual day 15 August 2015
Annual day 15 August 2015
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_application
 
Document Authentication for Properties
Document Authentication for PropertiesDocument Authentication for Properties
Document Authentication for Properties
 
Security
SecuritySecurity
Security
 
Pharma
PharmaPharma
Pharma
 
Currency
CurrencyCurrency
Currency
 
Art brochure
Art brochureArt brochure
Art brochure
 
nonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User ManualnonClonableID™ Reader SX21 User Manual
nonClonableID™ Reader SX21 User Manual
 
Primary pack leaflet
Primary pack leafletPrimary pack leaflet
Primary pack leaflet
 
Deploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeitingDeploying technology to_fight_counterfeiting
Deploying technology to_fight_counterfeiting
 

Brand Protection & Security of Engineering Components

  • 1. Brand Protection & Security of Engineering Components nonClonableIDTM LABEL WITH BARCODE Bilcare Technologies is a division of Bilcare Ltd. focused on creating next-generation anti-counterfeiting, security, and brand protection solutions for a broad range of industry sectors. With breakthrough research in nanotechnology, Bilcare has developed a unique technology-nonClonableID™- that enables products to be authenticated as they move through the supply chain to the end consumer. elephantdesign.com © 2010, Bilcare Ltd. All Rights Reserved. All product names, and logos mentioned herein are the trademarks or reg- istered trademarks of Bilcare. No part of this document should be circulated, quoted, or reproduced for distribution without prior written approval from Bilcare Ltd. www.bilcaretech.com tech@bilcare.com Americas USA Bilcare Inc. 300 Kimberton Road Phoenixville, PA 19460 +1 610 422 3305 Europe UK Bilcare Technologies Malvern Hills Science Park, Geraldine Road, Malvern, WR14 3SZ, United Kingdom +44 (0) 1684 585 257 Italy Bilcare Technologies Italia Srl Presso Veneto Nanotech, Via San Crispino 106, 35129 Padua, Italy +39 (049) 7705514 Asia India Bilcare Ltd. 601, ICC Tower, B Wing, Pune 411 016 +91 (20) 30257700 Singapore Bilcare Technologies Singapore Pte. Ltd. 52 Changi South Street 1, Singapore 486161 +65 63954130
  • 2. Counterfeit components – a major safety concern The extent of the problem Counterfeit components have long been a problem in the engineering and automotive components industry. According to a report by the Federal Trade Commission counterfeiting is estimated to cost the global automotive parts industry $12 billion a year in lost sales; $3 billion of that total is in the United States. (“Intellectual Property: Protecting Valuable Assets in a Global Market,” MEMA Brand Protection Council, 3rd Edition, June 2009.) While, genuine parts undergo rigorous testing for reliability, safety and environmental compliance, fake parts do not go through this approval process. As a result, these potentially dangerous components could fail to operate correctly in an emergency or life-threatening situation. In India alone, it is estimated that more than 37 percent of aftermarket parts are fake. Between 5 to 10 percent of all replacement auto parts in the European Union are counterfeits. (Source: Autoweb, “Intellectual Property Theft in the Automobile Industry,” July 2006.) PROBLEM PROBLEM
  • 3. PROBLEM NEED Problems impacting brand reputation, revenues and safety Need to enhance supply chain security Counterfeiting is a major concern in the automotive, aircraft and machinery spares industry. A significant influx of counterfeit products causes manufacturers to lose market share and affects their brand reputation, leading to loss of revenue. Furthermore, poor quality counterfeit products compromise the safety of consumers. • Counterfeiting • Product overruns • Inadequate supply chain security • Inadequate supply chain visibility • Inaccurate warranty management • Warranty returns Over the years, counterfeiters have exploited vulnerabilities in the supply chain to introduce fake parts in legitimate channels, whilst authentic components are being siphoned off for grey market sales. As a result, Original Equipment Manufacturers (OEMs) and Tier 1 2 suppliers need to maintain a high level of control in the supply chain to prevent counterfeit parts from entering the system. This is particularly the case in the aftermarket sales / replacement parts market.
  • 4. nonClonableID™ LABEL WITH BAR CODE SOLUTIONS SOLUTIONS The nonClonableID™ advantage Foolproof security Security solutions currently available for engineering components use serial numbers, holograms or bar codes that can be effortlessly duplicated. nonClonableID™ employs a unique tamper-evident, materials- based “fingerprint” for each component. This fingerprint is prohibitively difficult to copy (the fingerprint cannot be duplicated even by Bilcare). The nonClonableID™ label is a unique, materials-based fingerprint consisting of randomly distributed particles and cannot be reproduced even by Bilcare. Bilcare Technologies offers a comprehensive solution to combat counterfeiting through the implementation of its unique nonClonableID™ technology. nonClonableID™ enables identification, authentication and brand protection with secure track-and-trace capabilities. It enables increased visibility across the supply chain, providing insight and agility to manage risks and tackle issues of diversion and theft. nonClonableID™ Data Matrix Labels for Engineering Components 10 mm Top view Side view 400 micron
  • 5. Authentication and verification of engineering components Confirm authenticity Compare nonClonableIDTM fingerprint with database content Securely send the nonClonableIDTM fingerprint Scan the product label Authenticate label and product 1 2 3 4 SOLUTIONS SOLUTIONS A comprehensive approach How it works The solution enables real-time authentication across the supply chain through proprietary hand-held portable readers. Through a GPRS/Internet/3G Network, the reader communicates with the back- end server which is pre-loaded with the database of the material patterns. At the back-end server the material pattern read from the field is compared with the original record and a suitable communication about the authenticity and pedigree of the item is sent back, which can be viewed on a mobile phone or PC. Post authentication, further details such as the date of manufacturing, the destination of the products to be sold and warranty information can be retrieved. Product recall and part-fitment issues can also be managed through the real-time flow of information. Product with nonClonableID™ label Compare with the original record Database server
  • 6. BENEFITS BENEFITS Integrated anti-counterfeiting solution • Product verification at any point in the distribution system, including point-of-sale and after sales repairs. • Increased supply chain security and secure track-and-trace prevent product diversion and entry of fake products. • Each component has information stored in a powerful database, facilitating tracking of stock supply. • Stakeholders, including distributors, vendors and customers, authenticate the product in real-time to confirm the parts are genuine. • Helps dealers handle warranty claims more efficiently. Secure product tracking and brand protection • Increase supply chain security to combat counterfeiting • Ensure brand protection through the authentication of products in real-time • Ensure real-time visibility across the supply chain • Enhance consumer safety • Improve operations and supply chain efficiency • Manage warranty returns and customer services • Manage servicing, parts replacement and fleet management more effectively