Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2017 | 8 | 4 | 368-374

Article title

Protection System Against Products Counterfeit Based on NFC and Barcode Technologies

Content

Title variants

Languages of publication

EN

Abstracts

EN
Abstract The objective of this report is to provide a protective system architecture and analysis for NFC and Barcode technology that can be use to empower consumer in the fight against counter-feiting and IPR infringing products using mobile devices. This report focuses on the technology that can empower the consumer in the field in the presence of the goods itself by using technical tools and devices, which are easily available. The report identifies the main immediate empower-ring tool for consumers. This is represented by a modern smartphone (or similar device like a tablet) to be use as a tool to empower the consumer in the fight against counterfeiting. The modern smartphone is equipped with a high resolution camera, support for different standards for wireless connectivity, a powerful processor able to support the implementation of sophisticated algorithms and support for NFC and Barcode readers. In addition, the smartphone can be integrated and aug-mented with a wide range of plug-in devices and tools (e.g., an USB microscope). The concept of empowering the consumer can be an important element to support Due Diligence practices and Supply Chain Integrity because the different categories of consumer can authenticate the goods in different parts of the supply chain and report the presence of non-compliances (e.g., counterfeit products).

Year

Volume

8

Issue

4

Pages

368-374

Physical description

Contributors

author
  • Ph.D., associate Professor, Vladimir State University n.a. A.G. and N.G. Stoletovs, Russia
  • Master Student, National Research University Higher School of Economics, Russia
  • D.Sc., professor, National Research University Higher School of Economics, Russia

References

  • Ali et al., (2005). A New Circularly Polarized Rectenna for Wireless Power Transmission and Data Communication. Ieee Antennas And Wireless Propagation Letters, 4.
  • Bilcare (2015). Smart Devices by Adrian Burden at Bilcare Technologies. Retrived from: http://www.bilcaretech.com/pdf/whitepaper/Technology-has-a-habit ofconverging.pdf (8.2015).
  • ICC (1997). Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights.
  • NDEF (2016). Retrived from: ibadrinath.blogspot.com/2012/07/nfc-data-exchange-format-ndef.html (13.09.2017).
  • PC World. NEC Smartphone Tech Can Spot Counterfeit Goods. Retrived from: http://www.pc-world.idg.com.au/article/559250/nec-smartphone-tech-can spotcounterfeit-goods/ (10.11.2014).
  • Resonant Coupling. Retrived from: web.archive.org/web/20120930022841/http://www.wireless-powerconsortium.com/technology/resonant-coupling.html (13.09.2017).

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-3ba4d137-c42d-4c28-8eb9-f5871b5afd87
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.