SlideShare a Scribd company logo
BRAND PROTECTION & 
ANTI-COUNTERFEITING SOLUTION 
A total technology platform for brand protection. 
A brief overview of how the 
Digital Mass Encryption (DME) technology 
works for anti-counterfeiting. 
© Bliss AdTech. All rights reserved.
Media Reports … 
© Bliss AdTech. All rights reserved.
An evolution in product coding — 
Digital Mass Encryption (DME) 
ENCRYPTION TECHNOLOGIES ARE SOFTWARE BASED 
• Centralized secured computer center 
• Proprietary encryption & decryption algorithm 
• Result — encrypted alphanumeric UID codes are generated 
KEY FEATURES 
• Each individual purchasable item has its own separate code 
• Codes can be applied in all manufacturing formats; high volumes 
• Coded products allow validation by consumers, agents, etc. 
FUNDAMENTAL BENEFITS 
• Code validation by encryption only — no database involved! 
• Removes all security concerns (external and internal) 
• Extreme performance and response times 
• Significant cost savings at high volumes 
© Bliss AdTech. All rights reserved.
Brand Protection 
All roads start with product serialization 
• Each individual product has its own unique ID (UID) 
• Easy to apply in most manufacturing processes 
• Once products are serialized, complete anti-counterfeiting protection is 
enabled. 
• Other offerings available to brand owner - consumer marketing and 
supply chain management. 
© Bliss AdTech. All rights reserved.
The Unique Serial numbers (UID) generated by 
server are placed on products in two ways 
Script form 2D barcode 
h3kcn8idm1na8fb 
m48caz0gm4lms5j 
7ba3qem5id2nd9m 
Each 2D barcode 
contains a unique 
serial code and secure 
link to Servers. 
• alphanumeric code 
• easily readable by consumers 
• each and every item will have its 
own unique serial number (UID) 
• international standard (widely in use now) 
• harmonize with emerging global standards 
• verification efficiency with barcode readers 
• combat counterfeiting & parallel imports 
India • Canada • Malaysia © Blisslogix Technology Solutions. © Bliss AdTech. All rights reserved. All rights reserved.
Option 1 — direct printing 
• 2D barcode + UID generated 
and transferred for printing 
• a unique code is printed 
directly onto each saleable 
item 
Option 2 — affixing labels 
• 2D barcode printed directly 
upon labels 
• coded label applied on 
package; instructions for 
authentication 
Server 
Production place 
Web 
UID IMPLEMENTATION 
© Bliss AdTech. All rights reserved.
Consumer Empowerment for Brand Protection 
Point of Sale verification through SMS or 2D barcode reader app using camera in 
mobile devices with Internet capability 
• Code Valid Message 
• Code NOT valid Message 
Bounce-back 
Message 
© Bliss AdTech. All rights reserved.
The DME 
advantage 
PATENTED ENCRYPTION TECHNOLOGY (DME) 
• Eliminates database storage of codes 
• Extreme performance; low cost; unparalleled security 
• Integrated with 2D barcode technology & GS1 standards 
Flexible implementation options 
• Direct package printing or label application 
• ON-LINE or OFF-LINE code transfer options 
• Customized software offers the ultimate in data security 
Diverse and powerful application features 
• Consumer empowerment for point-of-sale validation on a global scale 
• Instant authentication of package at any level through a single application 
• Track & Trace enabling to meet local and global requirements 
Customized Track & Trace implementation 
• Proprietary parent-child hierarchy building software 
• Full turn-key plant-level installation to meet all T&T needs 
• And offers a total solution 
A track-record of success 
• Excellent implementation record 
• Diverse group of partners and collaborators 
• A global company with global reach 
© Bliss AdTech. All rights reserved.
What can a counterfeiter do to 
bypass DME-protected brands? 
IGNORE ALTOGETHER — RELEASE FAKE PRODUCTS WITHOUT ANY CODES 
• corporate and consumer surveillance will easily detect counterfeits 
• interdiction risk to counterfeiter, distributor, and retailer 
Print bogus or arbitrary codes on fake products 
• DME codes are 15-digit alphanumeric — 3615combinations 
• impossible to guess a correct code 
• bogus codes will always fail authentication 
Obtain many genuine codes and apply individually to fake products 
• counterfeiter must first acquire many genuine products 
• extremely cumbersome and difficult — not cost effective 
Acquire a single genuine code and apply to many fake products 
• this is the most likely scenario 
• will not succeed for multiple reasons (next slide) 
© Bliss AdTech. All rights reserved.
Defeating The Counterfeiter 
LOGICAL PROTECTION 
• limit on public authentication 
• consumers are restricted to authentication of any code 
• multiple authentications of same code will raise a flag 
• authentication by security officers does not affect the code 
FORENSIC PROTECTION 
• mobile identity of false SMS authentications provided by Blisslogix 
• source of “same code–multiple authentications” can be identified 
• brand owner (or security agency) can gather intelligence 
• interdiction and enforcement efforts can be initiated at source 
• consumers authenticating the duplicate code will be alerted 
PSYCHOLOGICAL PROTECTION 
• retailers will realize the impact of point-of-sale authentication 
• counterfeiters will realize that their supply chain can be divulged 
• both corporate and consumer oversight represents a new dilemma 
• “fear of getting caught” will serve as powerful deterrence 
© Bliss AdTech. All rights reserved.
India • Canada • Malaysia © Blisslogix Technology Solutions. © Bliss AdTech. All rights reserved. All rights reserved.
Solutions for various industries 
Automotive OEMs (e.g., Fiat, Peugeot, Land Rover) 
• Anti-counterfeiting, warranty, end-customer loyalty, maintenance 
schedule adherence program, product recall 
Auto spare parts & accessories manufacturers (e.g., Michelin, 
Continental, Yuasa, Johnson Controls, etc.) 
• Anti-counterfeiting, warranty, mechanics/retailers loyalty program, 
product recall 
Consumer electronics, White goods, parts & accessories (e.g., 
Samsung, Sony, Whirlpool) 
• Anti-counterfeiting, warranty, consumer loyalty program, promotions, 
lucky draw 
Pharma, Medical devices, implants (e.g., GlaxoSmithKline, 
Sanofi, Omron) 
• Anti-counterfeiting, track-n-trace, product recall, clinical trials, patient 
adherence program, mobile-based customer authentication 
India • Canada • Malaysia © Blisslogix Technology Solutions. All rights reserved. 
© Bliss AdTech. All rights reserved.
Solutions for various industries 
Printers (e.g., Ricoh, Epson, Brother) 
• Anti-counterfeiting of printer cartridges, warranty 
International luxury products (e.g., Louis Vuitton, Gucci, Cartier, 
Rolex, Ray-Ban) 
• Anti-counterfeiting 
Sports goods (e.g., Adidas, Yonex) 
• Anti-counterfeiting, warranty 
Food (e.g., Nutella) 
• Anti-counterfeiting, promotional campaign 
Beauty products (e.g., L’oreal) 
• Anti-counterfeiting, consumer loyalty program, 
promotional campaign 
© Bliss AdTech. All rights reserved.
Solutions for various industries 
Beer and common liquor (e.g., Kingfisher, Heineken) 
• Anti-counterfeiting, promotions, contests and lucky draw 
Premium liquor (e.g., McDowell’s No.1, Absolut Vodka) 
• Anti-counterfeiting 
Watches, Calculators (e.g., Rolex, Casio) 
• Anti-counterfeiting, warranty 
Tobacco (PhilipMorris, British American Tobacco) 
• Anti-counterfeiting, FCTC regulation compliance 
FMCG (chocolate, chips, biscuits, shampoo, soap, etc.) 
• New product launch, Promotions, lucky draw, contests 
Tickets (sports events, cultural events, large parties, etc.) 
• Eliminate fake tickets and impersonation 
© Bliss AdTech. All rights reserved.
Solutions for various segments 
Government 
• Tax stamps for liquor, tobacco & other contraband / highly taxed products to 
increase tax collection and to control consumption / usage 
• Citizen ID cards, Passports, Welfare program card, Land records, birth certificates 
and any other documents susceptible to faking/duplicating 
Banks, Insurance and financial institutions 
• Loan, insurance documents, agreement, valuation records, etc. 
Universities, colleges, schools and technical training institutes 
• Prevent faking of degree certificates, mark sheets, etc. 
Book publishing 
• Anti-counterfeiting 
• Enable access to additional content in web, by providing a scratch off label 
(with a unique number beneath it) in the original books 
© Bliss AdTech. All rights reserved.
Thank You 
Bliss AdTech 
© Bliss AdTech. All rights reserved.

More Related Content

Similar to BUA Anti-Counterfeit Solutions

Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Authentic Vision
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
Jerry Horne
 
Presentation
PresentationPresentation
PresentationYourcoded
 
FMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit SolutionFMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit Solution
Toon Wee
 
Industrobots iDROID Engagement Scope.pdf
Industrobots iDROID Engagement Scope.pdfIndustrobots iDROID Engagement Scope.pdf
Industrobots iDROID Engagement Scope.pdf
mitali870346
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
adhinayakgohar2
 
BDG scratch cards 01-2011
BDG   scratch cards 01-2011BDG   scratch cards 01-2011
BDG scratch cards 01-2011
yigalchetrit
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
Priyanka Aash
 
Company Profile 2023 updated.pdf
Company Profile 2023 updated.pdfCompany Profile 2023 updated.pdf
Company Profile 2023 updated.pdf
JudelGuiraldo
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016Jatin Mehta
 
The Digital Innovation Award - INSTANDA
The Digital Innovation Award - INSTANDAThe Digital Innovation Award - INSTANDA
The Digital Innovation Award - INSTANDA
The Digital Insurer
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
Bilcareltd
 
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
Martin Ford
 
FakeProof , the Anti-Counterfeiting and Product Tracking Solution
FakeProof , the Anti-Counterfeiting and Product Tracking SolutionFakeProof , the Anti-Counterfeiting and Product Tracking Solution
FakeProof , the Anti-Counterfeiting and Product Tracking Solution
Amit Sharma
 
Efficient Automation For Food and Beverage Production
Efficient Automation For Food and Beverage ProductionEfficient Automation For Food and Beverage Production
Efficient Automation For Food and Beverage ProductionThorne & Derrick UK
 
Loqr
LoqrLoqr
External-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptxExternal-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptx
SattarKiani
 

Similar to BUA Anti-Counterfeit Solutions (20)

Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
 
Pack Expo 2008
Pack Expo 2008Pack Expo 2008
Pack Expo 2008
 
Presentation
PresentationPresentation
Presentation
 
FMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit SolutionFMCG Anti-Counterfeit Solution
FMCG Anti-Counterfeit Solution
 
Industrobots iDROID Engagement Scope.pdf
Industrobots iDROID Engagement Scope.pdfIndustrobots iDROID Engagement Scope.pdf
Industrobots iDROID Engagement Scope.pdf
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
BDG scratch cards 01-2011
BDG   scratch cards 01-2011BDG   scratch cards 01-2011
BDG scratch cards 01-2011
 
Legal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity VulnerabilitiesLegal Liability for IOT Cybersecurity Vulnerabilities
Legal Liability for IOT Cybersecurity Vulnerabilities
 
Company Profile 2023 updated.pdf
Company Profile 2023 updated.pdfCompany Profile 2023 updated.pdf
Company Profile 2023 updated.pdf
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
The Digital Innovation Award - INSTANDA
The Digital Innovation Award - INSTANDAThe Digital Innovation Award - INSTANDA
The Digital Innovation Award - INSTANDA
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
Proscan media - Premier Thermal and sheet label and thermal ribbons solutions...
 
FakeProof , the Anti-Counterfeiting and Product Tracking Solution
FakeProof , the Anti-Counterfeiting and Product Tracking SolutionFakeProof , the Anti-Counterfeiting and Product Tracking Solution
FakeProof , the Anti-Counterfeiting and Product Tracking Solution
 
Efficient Automation For Food and Beverage Production
Efficient Automation For Food and Beverage ProductionEfficient Automation For Food and Beverage Production
Efficient Automation For Food and Beverage Production
 
Loqr
LoqrLoqr
Loqr
 
Company Presentation Li
Company Presentation  LiCompany Presentation  Li
Company Presentation Li
 
PRISYM 360 EU Datasheet
PRISYM 360 EU DatasheetPRISYM 360 EU Datasheet
PRISYM 360 EU Datasheet
 
alltech profile
alltech profilealltech profile
alltech profile
 
External-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptxExternal-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

BUA Anti-Counterfeit Solutions

  • 1. BRAND PROTECTION & ANTI-COUNTERFEITING SOLUTION A total technology platform for brand protection. A brief overview of how the Digital Mass Encryption (DME) technology works for anti-counterfeiting. © Bliss AdTech. All rights reserved.
  • 2. Media Reports … © Bliss AdTech. All rights reserved.
  • 3. An evolution in product coding — Digital Mass Encryption (DME) ENCRYPTION TECHNOLOGIES ARE SOFTWARE BASED • Centralized secured computer center • Proprietary encryption & decryption algorithm • Result — encrypted alphanumeric UID codes are generated KEY FEATURES • Each individual purchasable item has its own separate code • Codes can be applied in all manufacturing formats; high volumes • Coded products allow validation by consumers, agents, etc. FUNDAMENTAL BENEFITS • Code validation by encryption only — no database involved! • Removes all security concerns (external and internal) • Extreme performance and response times • Significant cost savings at high volumes © Bliss AdTech. All rights reserved.
  • 4. Brand Protection All roads start with product serialization • Each individual product has its own unique ID (UID) • Easy to apply in most manufacturing processes • Once products are serialized, complete anti-counterfeiting protection is enabled. • Other offerings available to brand owner - consumer marketing and supply chain management. © Bliss AdTech. All rights reserved.
  • 5. The Unique Serial numbers (UID) generated by server are placed on products in two ways Script form 2D barcode h3kcn8idm1na8fb m48caz0gm4lms5j 7ba3qem5id2nd9m Each 2D barcode contains a unique serial code and secure link to Servers. • alphanumeric code • easily readable by consumers • each and every item will have its own unique serial number (UID) • international standard (widely in use now) • harmonize with emerging global standards • verification efficiency with barcode readers • combat counterfeiting & parallel imports India • Canada • Malaysia © Blisslogix Technology Solutions. © Bliss AdTech. All rights reserved. All rights reserved.
  • 6. Option 1 — direct printing • 2D barcode + UID generated and transferred for printing • a unique code is printed directly onto each saleable item Option 2 — affixing labels • 2D barcode printed directly upon labels • coded label applied on package; instructions for authentication Server Production place Web UID IMPLEMENTATION © Bliss AdTech. All rights reserved.
  • 7. Consumer Empowerment for Brand Protection Point of Sale verification through SMS or 2D barcode reader app using camera in mobile devices with Internet capability • Code Valid Message • Code NOT valid Message Bounce-back Message © Bliss AdTech. All rights reserved.
  • 8. The DME advantage PATENTED ENCRYPTION TECHNOLOGY (DME) • Eliminates database storage of codes • Extreme performance; low cost; unparalleled security • Integrated with 2D barcode technology & GS1 standards Flexible implementation options • Direct package printing or label application • ON-LINE or OFF-LINE code transfer options • Customized software offers the ultimate in data security Diverse and powerful application features • Consumer empowerment for point-of-sale validation on a global scale • Instant authentication of package at any level through a single application • Track & Trace enabling to meet local and global requirements Customized Track & Trace implementation • Proprietary parent-child hierarchy building software • Full turn-key plant-level installation to meet all T&T needs • And offers a total solution A track-record of success • Excellent implementation record • Diverse group of partners and collaborators • A global company with global reach © Bliss AdTech. All rights reserved.
  • 9. What can a counterfeiter do to bypass DME-protected brands? IGNORE ALTOGETHER — RELEASE FAKE PRODUCTS WITHOUT ANY CODES • corporate and consumer surveillance will easily detect counterfeits • interdiction risk to counterfeiter, distributor, and retailer Print bogus or arbitrary codes on fake products • DME codes are 15-digit alphanumeric — 3615combinations • impossible to guess a correct code • bogus codes will always fail authentication Obtain many genuine codes and apply individually to fake products • counterfeiter must first acquire many genuine products • extremely cumbersome and difficult — not cost effective Acquire a single genuine code and apply to many fake products • this is the most likely scenario • will not succeed for multiple reasons (next slide) © Bliss AdTech. All rights reserved.
  • 10. Defeating The Counterfeiter LOGICAL PROTECTION • limit on public authentication • consumers are restricted to authentication of any code • multiple authentications of same code will raise a flag • authentication by security officers does not affect the code FORENSIC PROTECTION • mobile identity of false SMS authentications provided by Blisslogix • source of “same code–multiple authentications” can be identified • brand owner (or security agency) can gather intelligence • interdiction and enforcement efforts can be initiated at source • consumers authenticating the duplicate code will be alerted PSYCHOLOGICAL PROTECTION • retailers will realize the impact of point-of-sale authentication • counterfeiters will realize that their supply chain can be divulged • both corporate and consumer oversight represents a new dilemma • “fear of getting caught” will serve as powerful deterrence © Bliss AdTech. All rights reserved.
  • 11. India • Canada • Malaysia © Blisslogix Technology Solutions. © Bliss AdTech. All rights reserved. All rights reserved.
  • 12. Solutions for various industries Automotive OEMs (e.g., Fiat, Peugeot, Land Rover) • Anti-counterfeiting, warranty, end-customer loyalty, maintenance schedule adherence program, product recall Auto spare parts & accessories manufacturers (e.g., Michelin, Continental, Yuasa, Johnson Controls, etc.) • Anti-counterfeiting, warranty, mechanics/retailers loyalty program, product recall Consumer electronics, White goods, parts & accessories (e.g., Samsung, Sony, Whirlpool) • Anti-counterfeiting, warranty, consumer loyalty program, promotions, lucky draw Pharma, Medical devices, implants (e.g., GlaxoSmithKline, Sanofi, Omron) • Anti-counterfeiting, track-n-trace, product recall, clinical trials, patient adherence program, mobile-based customer authentication India • Canada • Malaysia © Blisslogix Technology Solutions. All rights reserved. © Bliss AdTech. All rights reserved.
  • 13. Solutions for various industries Printers (e.g., Ricoh, Epson, Brother) • Anti-counterfeiting of printer cartridges, warranty International luxury products (e.g., Louis Vuitton, Gucci, Cartier, Rolex, Ray-Ban) • Anti-counterfeiting Sports goods (e.g., Adidas, Yonex) • Anti-counterfeiting, warranty Food (e.g., Nutella) • Anti-counterfeiting, promotional campaign Beauty products (e.g., L’oreal) • Anti-counterfeiting, consumer loyalty program, promotional campaign © Bliss AdTech. All rights reserved.
  • 14. Solutions for various industries Beer and common liquor (e.g., Kingfisher, Heineken) • Anti-counterfeiting, promotions, contests and lucky draw Premium liquor (e.g., McDowell’s No.1, Absolut Vodka) • Anti-counterfeiting Watches, Calculators (e.g., Rolex, Casio) • Anti-counterfeiting, warranty Tobacco (PhilipMorris, British American Tobacco) • Anti-counterfeiting, FCTC regulation compliance FMCG (chocolate, chips, biscuits, shampoo, soap, etc.) • New product launch, Promotions, lucky draw, contests Tickets (sports events, cultural events, large parties, etc.) • Eliminate fake tickets and impersonation © Bliss AdTech. All rights reserved.
  • 15. Solutions for various segments Government • Tax stamps for liquor, tobacco & other contraband / highly taxed products to increase tax collection and to control consumption / usage • Citizen ID cards, Passports, Welfare program card, Land records, birth certificates and any other documents susceptible to faking/duplicating Banks, Insurance and financial institutions • Loan, insurance documents, agreement, valuation records, etc. Universities, colleges, schools and technical training institutes • Prevent faking of degree certificates, mark sheets, etc. Book publishing • Anti-counterfeiting • Enable access to additional content in web, by providing a scratch off label (with a unique number beneath it) in the original books © Bliss AdTech. All rights reserved.
  • 16. Thank You Bliss AdTech © Bliss AdTech. All rights reserved.