SlideShare a Scribd company logo
Use Anti-Counterfeit Tech as Fatal Weapon
to Combat Fakes in Electronics Industry
The Latest Market Analysis of the Electronics Market and the
Solution of Brand Protection
Presented by Alfons Futterer
Tel.: +852 2523 9959 / Mobile: +852 6056 9938
Agenda
1 Consumer Electronics Industry Overview
2 Challenges and Opportunities in Consumer Electronic
3 Brand Protection Implementation
4 Successful Cases
1 Consumer Electronic Industry Overview
The electronics industry, especially meaning
consumer electronics (CE), now become a
global industry worth billions of dollars.
The electronics industry encompasses a wide
range of different manufacturing processes and
products. The most visible products of the
electronics industry are consumer electronics
such as television sets, computers and cameras.
These visible products represent a tip of iceberg
situation as a large part of the electronics
products.
Highly Competitive, Dynamic, Changing Electronics
Industry
Source from :https://www.cbp.gov/sites/default/files/assets/documents/2016-Apr/FY%202015%20IPR%20Stats%20Presentation.pdf
According to U.S. Customs and Border Protection department statistics, consumer electronics has been ranked
the second most frequently seized fake products since 2014.
The Counterfeit in US Electronics Market
Counterfeit Alarm in the Consumer Electronics Industry
However, there comes an alarming issue
that some lawbreakers target at these
products due to the tremendous profit.
Asia is the most predominant regional
source of counterfeit CE products.
Additionally, Russia and India are
suspected sources, followed by Tai Wan,
Philippines and Malaysia.
Leading Counterfeit Electronic Countries
Counterfeit Electronic Cases
U.S. Department of Commerce (2015)
• More than 8% of total electronic
merchandize trade is counterfeit
• Estimated revenue loss USD 600 billion
Grey Market and Counterfeit Abatement, AGMA
(2014)
• 8-10% of all technology goods sold worldwide are
from grey market.
• Estimated revenue lost USD 100 billion.
U.S. Patent and Trademark Office
• USD 250 billion damage to the US economy due
to counterfeit and piracy.
• Cost to the industry in terms of product failures,
returns and litigation, cannot be assessed, but are
expected to be tremendous.
Semiconductor Industry Association (SIA)
• USD 7.5 billion lost revenue to semiconductor
manufacturer due to counterfeiting
• About 11,000 jobs lost.
US Customs and Border Protection and China’s
General Administration of Customs (2015)
• 245 thousand counterfeit consumer electronic
devices seized before they got exported out of
China.
China Customs Office in South China (2015)
• Over 6000 counterfeit radios seized which
infringed on Sony trademarks.
• Within less than 12 weeks the customs office
seized in total 11 consecutive batches of
infringement and counterfeit consumer
electronics products, including mobile phones,
earphones, game consoles.
2 Challenges and Opportunities in Consumer
Electronics
How Electronics Products are Counterfeited
• Relabeling
• Sanded and Remarked
• Blacktopped and Remarked
• Scrap Salvaging
• Illegal Manufacturing
• Etc.
Relabeling
Sanded & Remarked
Blacktopped & Remarked
Scrap Salvaging
Factors Contribute the Entry of Counterfeit
Electronics into the Supply Chain:
• Instant Pudding Mindset
Some OEMs pursue high productivity in a
short time, this results in shorter leading time
for components manufacturers. In this
situation, counterfeit electronics components
with short leading time appear in the market.
• No Inspection
In order to produce high quality components
with lower cost of time and money, some
OCMs omit the process of products
inspection. Consequently, no inspection
leaves supply chains vulnerable to counterfeit
entry.
• Weak Control on Offshore Production
Production outsourcing sacrifice control over
product manufacturing and flow
• Complicated Distributor Supply Chain
Few have supplier relationships or product
inspection programs, leaving many
opportunities for counterfeit product entry.
Counterfeiting
Problem
 Profit erosion
 Negative customer experience
 Product warranty & safety issues
Cause
 Violate the legitimate rights of sales
to the retailers
 Distributor channel conflict
 Supply & demand imbalance
 Disruptive pricing pressure
 Revenue cannibalization
Cause
 Knock-offs
 “Retreading” products
 Fake certificate
 Unauthorized, unofficial
manufacturer trading
 Absence of transparency
in supply chain
3 Major Challenges in Consumer
Electronic (CE) Industry
Irregularities in
E-commerce
Cause  Return fraud
 IP infringement
 Threaten the reputation
 Damage to the brand value
 Lack of an effective
monitoring in distribution
channels
3 Major Challenges in Consumer
Electronic (CE) Industry
Victims of Counterfeit Electronics
• Cause life-threatening accidents
(power bank explosion, electricity
leakage, fire broke )
• Personal information leakage
• Loss job opportunities
ConsumersCE Brand Owners
• Loss revenue from product sales
• Damage brand image and value
• Unwanted lawsuits and compensation from
customers (accidents, brand piracy lawsuit,)
More Fast & Accurate Verification Methods
keep the counterfeits away
TrackMatriX ® GEO TrackMatriX ® Lock
 Track & trace
 Supply chain monitoring
 Tracking and reporting
system
 Covert & forensic tracer
 Extremely difficult to copy
 Custom-made detectors
Taggant-Detecor combo
Upgrade Verification Methods
Increase Supply Chain
Traceability
 Better Brand Management
Opportunities in Consumer Electronic Industry
Counterfeiting Problems Grey Market Irregularities in E-commerce
 Secret-function-equipped
Code
 data encryption
 Absolute protection
Brand Protection Strategy
Counterfeiting
Problem
o Utilize hi-tech marking
material on the CE
o Improve the security
level of CE labels &
certificates
Strategy 1: Strategy 2: Strategy 3:
o Product track & trace system
o Superior inventory
management
o Product safety
o Data transparency
Irregularities in
E-commerce
o Strengthens CE
authentication approach
o Establish customer
engagement system
 Increase supply chain traceability
for better product controlling
 Interactive with your customers
for better brand management
 Upgrade your verification
methods
3 Brand Protection Implementation
For the Rest slides, please visit the following website to
download the entire presentation:
https://www.nanomatrixsecure.com/blog/successful-webinar-for-electronic-industry
Please do not hesitate to contact us for any further queries:
NanoMatriX International Limited
Tel: +852 523 9959
Mobile: + 852 6056 9938
Email: alfonsf@nanomatrixsecure.com
Website: www.nanomatrixsecure.com

More Related Content

Similar to Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Industry

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
NEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
NEW Momentum
 
Consumer electronic products business in india
Consumer electronic products business in indiaConsumer electronic products business in india
Consumer electronic products business in india
anand9934
 
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
VLSIresearch
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
ozgurv
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
Kristal Snider
 
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - WebinarUnder Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Ashleyw2m
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
IUSTechnologies
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Authentication Solution Providers' Association (ASPA)
 
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IH...
Counterfeiting and Semiconductor Value Chain Economics  by Mr. Rory King - IH...Counterfeiting and Semiconductor Value Chain Economics  by Mr. Rory King - IH...
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IH...
Rory King
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
IHS
 
Get connected 2020 - Key Takeaways
Get connected 2020 - Key TakeawaysGet connected 2020 - Key Takeaways
Get connected 2020 - Key Takeaways
Pierangelo Rosati
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Kristal Snider
 
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
VLSIresearch
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
William Gamble
 
Counterfeit parts-awareness
Counterfeit parts-awarenessCounterfeit parts-awareness
Counterfeit parts-awareness
Oziel Cardenas
 
Qualcomm: Strategic Innovation Part 2
Qualcomm: Strategic Innovation Part 2Qualcomm: Strategic Innovation Part 2
Qualcomm: Strategic Innovation Part 2
John A. Orlando
 
Fórum Brasil-Coreia - Sergio Bampi
Fórum Brasil-Coreia - Sergio BampiFórum Brasil-Coreia - Sergio Bampi
Fórum Brasil-Coreia - Sergio Bampibrasilcoreia
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdf
Shrikant Borkar
 

Similar to Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Industry (20)

Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Consumer electronic products business in india
Consumer electronic products business in indiaConsumer electronic products business in india
Consumer electronic products business in india
 
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
SemiWEEK: Coronavirus Watch. 450mm: Why it failed. Has Moore’s Law slowed?; 2...
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - WebinarUnder Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
Under Lock & Key; Theft Protection in Today's Utility Marketplace - Webinar
 
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
Webinar: Under Lock & Key; Theft Protection in Today's Utility Marketplace
 
Counterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-itCounterfeit threat-for-electronics-industry-on-rise-plug-it
Counterfeit threat-for-electronics-industry-on-rise-plug-it
 
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IH...
Counterfeiting and Semiconductor Value Chain Economics  by Mr. Rory King - IH...Counterfeiting and Semiconductor Value Chain Economics  by Mr. Rory King - IH...
Counterfeiting and Semiconductor Value Chain Economics by Mr. Rory King - IH...
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
Get connected 2020 - Key Takeaways
Get connected 2020 - Key TakeawaysGet connected 2020 - Key Takeaways
Get connected 2020 - Key Takeaways
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
SemiWEEK: SPIE Highlights, Coronavirus forecast scenarios; Semi Equip Outlook...
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Counterfeit parts-awareness
Counterfeit parts-awarenessCounterfeit parts-awareness
Counterfeit parts-awareness
 
Qualcomm: Strategic Innovation Part 2
Qualcomm: Strategic Innovation Part 2Qualcomm: Strategic Innovation Part 2
Qualcomm: Strategic Innovation Part 2
 
Fórum Brasil-Coreia - Sergio Bampi
Fórum Brasil-Coreia - Sergio BampiFórum Brasil-Coreia - Sergio Bampi
Fórum Brasil-Coreia - Sergio Bampi
 
electronics-manufacturing-services.pdf
electronics-manufacturing-services.pdfelectronics-manufacturing-services.pdf
electronics-manufacturing-services.pdf
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Industry

  • 1. Use Anti-Counterfeit Tech as Fatal Weapon to Combat Fakes in Electronics Industry The Latest Market Analysis of the Electronics Market and the Solution of Brand Protection Presented by Alfons Futterer Tel.: +852 2523 9959 / Mobile: +852 6056 9938
  • 2. Agenda 1 Consumer Electronics Industry Overview 2 Challenges and Opportunities in Consumer Electronic 3 Brand Protection Implementation 4 Successful Cases
  • 3. 1 Consumer Electronic Industry Overview
  • 4. The electronics industry, especially meaning consumer electronics (CE), now become a global industry worth billions of dollars. The electronics industry encompasses a wide range of different manufacturing processes and products. The most visible products of the electronics industry are consumer electronics such as television sets, computers and cameras. These visible products represent a tip of iceberg situation as a large part of the electronics products. Highly Competitive, Dynamic, Changing Electronics Industry
  • 5. Source from :https://www.cbp.gov/sites/default/files/assets/documents/2016-Apr/FY%202015%20IPR%20Stats%20Presentation.pdf According to U.S. Customs and Border Protection department statistics, consumer electronics has been ranked the second most frequently seized fake products since 2014. The Counterfeit in US Electronics Market Counterfeit Alarm in the Consumer Electronics Industry
  • 6. However, there comes an alarming issue that some lawbreakers target at these products due to the tremendous profit. Asia is the most predominant regional source of counterfeit CE products. Additionally, Russia and India are suspected sources, followed by Tai Wan, Philippines and Malaysia. Leading Counterfeit Electronic Countries
  • 7. Counterfeit Electronic Cases U.S. Department of Commerce (2015) • More than 8% of total electronic merchandize trade is counterfeit • Estimated revenue loss USD 600 billion Grey Market and Counterfeit Abatement, AGMA (2014) • 8-10% of all technology goods sold worldwide are from grey market. • Estimated revenue lost USD 100 billion. U.S. Patent and Trademark Office • USD 250 billion damage to the US economy due to counterfeit and piracy. • Cost to the industry in terms of product failures, returns and litigation, cannot be assessed, but are expected to be tremendous. Semiconductor Industry Association (SIA) • USD 7.5 billion lost revenue to semiconductor manufacturer due to counterfeiting • About 11,000 jobs lost. US Customs and Border Protection and China’s General Administration of Customs (2015) • 245 thousand counterfeit consumer electronic devices seized before they got exported out of China. China Customs Office in South China (2015) • Over 6000 counterfeit radios seized which infringed on Sony trademarks. • Within less than 12 weeks the customs office seized in total 11 consecutive batches of infringement and counterfeit consumer electronics products, including mobile phones, earphones, game consoles.
  • 8. 2 Challenges and Opportunities in Consumer Electronics
  • 9. How Electronics Products are Counterfeited • Relabeling • Sanded and Remarked • Blacktopped and Remarked • Scrap Salvaging • Illegal Manufacturing • Etc. Relabeling Sanded & Remarked Blacktopped & Remarked Scrap Salvaging
  • 10. Factors Contribute the Entry of Counterfeit Electronics into the Supply Chain: • Instant Pudding Mindset Some OEMs pursue high productivity in a short time, this results in shorter leading time for components manufacturers. In this situation, counterfeit electronics components with short leading time appear in the market. • No Inspection In order to produce high quality components with lower cost of time and money, some OCMs omit the process of products inspection. Consequently, no inspection leaves supply chains vulnerable to counterfeit entry. • Weak Control on Offshore Production Production outsourcing sacrifice control over product manufacturing and flow • Complicated Distributor Supply Chain Few have supplier relationships or product inspection programs, leaving many opportunities for counterfeit product entry.
  • 11. Counterfeiting Problem  Profit erosion  Negative customer experience  Product warranty & safety issues Cause  Violate the legitimate rights of sales to the retailers  Distributor channel conflict  Supply & demand imbalance  Disruptive pricing pressure  Revenue cannibalization Cause  Knock-offs  “Retreading” products  Fake certificate  Unauthorized, unofficial manufacturer trading  Absence of transparency in supply chain 3 Major Challenges in Consumer Electronic (CE) Industry
  • 12. Irregularities in E-commerce Cause  Return fraud  IP infringement  Threaten the reputation  Damage to the brand value  Lack of an effective monitoring in distribution channels 3 Major Challenges in Consumer Electronic (CE) Industry
  • 13. Victims of Counterfeit Electronics • Cause life-threatening accidents (power bank explosion, electricity leakage, fire broke ) • Personal information leakage • Loss job opportunities ConsumersCE Brand Owners • Loss revenue from product sales • Damage brand image and value • Unwanted lawsuits and compensation from customers (accidents, brand piracy lawsuit,)
  • 14. More Fast & Accurate Verification Methods keep the counterfeits away TrackMatriX ® GEO TrackMatriX ® Lock  Track & trace  Supply chain monitoring  Tracking and reporting system  Covert & forensic tracer  Extremely difficult to copy  Custom-made detectors Taggant-Detecor combo Upgrade Verification Methods Increase Supply Chain Traceability  Better Brand Management Opportunities in Consumer Electronic Industry Counterfeiting Problems Grey Market Irregularities in E-commerce  Secret-function-equipped Code  data encryption  Absolute protection
  • 15. Brand Protection Strategy Counterfeiting Problem o Utilize hi-tech marking material on the CE o Improve the security level of CE labels & certificates Strategy 1: Strategy 2: Strategy 3: o Product track & trace system o Superior inventory management o Product safety o Data transparency Irregularities in E-commerce o Strengthens CE authentication approach o Establish customer engagement system  Increase supply chain traceability for better product controlling  Interactive with your customers for better brand management  Upgrade your verification methods
  • 16. 3 Brand Protection Implementation
  • 17. For the Rest slides, please visit the following website to download the entire presentation: https://www.nanomatrixsecure.com/blog/successful-webinar-for-electronic-industry Please do not hesitate to contact us for any further queries: NanoMatriX International Limited Tel: +852 523 9959 Mobile: + 852 6056 9938 Email: alfonsf@nanomatrixsecure.com Website: www.nanomatrixsecure.com