Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Access This Premium Content

Options To Access This Article:

What Subscribers Are Saying

  • "Probably the best investment I've ever made."
    Steve Meizlish, President & CEO, MeizCorp Services, Inc.
  • "I have found that RFID Journal provides an objective viewpoint of RFID. It you are looking for a resource that provides insights as to the application and implications of deploying RFID, RFID Journal will meet your needs, It gives you a broad perspective of RFID, beyond the retail supply chain."
    Mike O'Shea, Director of Corporate AutoID/RFID Strategies & Technologies, Kimberly-Clark Corp.
  • "No other source provides the consistent value-added insight that Mark Robert and his staff do. In a world dominated by press release after press release, RFID Journal is developing as the one place to go to make the most sense out of the present and future of RFID in commerce."
    Bob Hurley, Project Leader for RFID, Bayer HealthCare's Consumer Care Division
  • "RFID Journal is the one go-to source for information on the latest in RFID technology."
    Bruce Keim, Director, Hewlett-Packard
  • "RFID Journal is the only source I need to keep up to the minute with the happenings in the RFID world."
    Blair Hawley, VP of Supply Chain, Remington Products Company

EPC as an Anti-counterfeiting Tool

Tags combined with an extended EPCglobal Network could eradicate a scourge.
By Elgar Fleisch and Thorsten Staake
Feb 01, 2005—In 2004, counterfeit products accounted for some 7 percent of world trade—a market volume of $500 billion. Many companies use holograms, watermarks and other technology to try to thwart counterfeiters, but these techniques are either unsuitable for automated tests of product authenticity or do not provide the required level of security. The EPCglobal Network, conceived as a means of sharing EPC data among supply chain partners, could help solve the counterfeiting problem by enabling companies to quickly and automatically authenticate unique items.

Today, bar codes identify only the type of product, not the individual item. So if a clever counterfeiter creates a good replica of a Prada handbag or Rolex watch, complete with a bar code, no one could easily determine whether the product is real or fake. And if a third-party
manufacturer hired to make jeans for Levi’s runs off an extra 10,000 and sells them without the brand owner ever knowing, these goods are impossible to distinguish from legitimate items.

With EPC tags, however, the brand owners could assign a specific serial number to each item they make or is made for them. These unique identification numbers could be stored in a database on the EPCglobal Network, and when the goods are shipped to a retailer, the retailer could scan the tags and look up whether the numbers are among those assigned by the brand owner, indicating the products are legitimate. All parties in the supply chain could also share track-and-trace information to check whether a product entered the supply chain through legitimate means.

But there’s a major drawback to this solution: EPC tags can be cloned and attached to illicit products. Unscrupulous retailers could cheat the system by not recording the sale of legitimate items and then repeatedly using the serial numbers from those items’ tags on bogus goods.

Simple track and trace might work for fast-moving consumer goods, where the overall number of illicit products has to be reduced but a small number of counterfeits can be tolerated. But this solution is not sufficient for high-value goods or in cases where illicit products impose a high risk to health and safety. The Auto-ID Lab at St. Gallen near Zurich, Switzerland, has set up a special interest group (SIG) to work with companies to develop more sophisticated anticounterfeiting systems using EPC tags and the EPCglobal Network.

One way to avert cloning attacks is to develop secure authentication mechanisms, such as the challenge-response techniques that are common in today’s contactless smart cards. To implement this in the EPCglobal Network, two changes are required: First, a Product Authentication Service must be defined at the server side; it generates a random challenge, sends it to a tag and verifies the response. Second, EPC tags have to be augmented with a small crypto-engine to generate the response. These secure authentication EPC (SA-EPC) tags will be more expensive than standard transponders but can be cost-effective on high-value goods that are often counterfeited.

The goal of the anticounterfeiting SIG is to define an open standard for the authentication procedures. Member companies, which could be any organization grappling with product counterfeiting, support the development process by specifying their requirements, ensuring that the resulting concepts help to solve real-world problems. For this purpose, the SIG will examine both technical and business-related issues. In close cooperation with the Auto-ID Lab staff, companies will define and evaluate economically promising scenarios for the use of RFID to combat counterfeiting, develop appropriate solutions and identify potential combinations with other technologies. The SIG will propose a standard and demonstrate its technical feasibility to EPCglobal’s board members. The SIG will also compile adoption roadmaps and business cases for various application scenarios, in order to enable knowledge transfer to the participating organizations.

Counterfeiting will never be eliminated, but we believe the EPCglobal Network can help to greatly reduce the problem.

Elgar Fleisch, a professor at the University of St. Gallen and the ETH Zurich, co-chairs the St. Gallen Auto-ID Lab. Thorsten Staake, a senior researcher at the St. Gallen Auto-ID Lab, organizes the Anticounterfeiting special interest group. To comment on this article, click on the link below.
To continue reading this article, please log in or choose a purchase option.

Option 1: Become a Premium Member.

One-year subscription, unlimited access to Premium Content: $189

Gain access to all of our premium content and receive 10% off RFID Reports and RFID Events!

Option 2: Purchase access to this specific article.

This article contains 685 words and 1 page. Purchase Price: $19.99

Upgrade now, and you'll get immediate access to:

  • Case Studies

    Our in-dept case-study articles show you, step by step, how early adopters assessed the business case for an application, piloted it and rolled out the technology.

    Free Sample: How Cognizant Cut Costs by Deploying RFID to Track IT Assets

  • Best Practices

    The best way to avoid pitfalls is to know what best practices early adopters have already established. Our best practices have helped hundreds of companies do just that.

  • How-To Articles

    Don’t waste time trying to figure out how to RFID-enable a forklift, or deciding whether to use fixed or mobile readers. Our how-to articles provide practical advice and reliable answers to many implementation questions.

  • Features

    These informative articles focus on adoption issues, standards and other important trends in the RFID industry.

    Free Sample: Europe Is Rolling Out RFID

  • Magazine Articles

    All RFID Journal Premium Subscribers receive our bimonthly RFID Journal print magazine at no extra cost, and also have access to the complete online archive of magazine articles from past years.

Become a member today!

RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations