About Intellectual Property IP Training IP Outreach IP for… IP and... IP in... Patent & Technology Information Trademark Information Industrial Design Information Geographical Indication Information Plant Variety Information (UPOV) IP Laws, Treaties & Judgements IP Resources IP Reports Patent Protection Trademark Protection Industrial Design Protection Geographical Indication Protection Plant Variety Protection (UPOV) IP Dispute Resolution IP Office Business Solutions Paying for IP Services Negotiation & Decision-Making Development Cooperation Innovation Support Public-Private Partnerships The Organization Working with WIPO Accountability Patents Trademarks Industrial Designs Geographical Indications Copyright Trade Secrets WIPO Academy Workshops & Seminars World IP Day WIPO Magazine Raising Awareness Case Studies & Success Stories IP News WIPO Awards Business Universities Indigenous Peoples Judiciaries Genetic Resources, Traditional Knowledge and Traditional Cultural Expressions Economics Gender Equality Global Health Climate Change Competition Policy Sustainable Development Goals Enforcement Frontier Technologies Mobile Applications Sports Tourism PATENTSCOPE Patent Analytics International Patent Classification ARDI – Research for Innovation ASPI – Specialized Patent Information Global Brand Database Madrid Monitor Article 6ter Express Database Nice Classification Vienna Classification Global Design Database International Designs Bulletin Hague Express Database Locarno Classification Lisbon Express Database Global Brand Database for GIs PLUTO Plant Variety Database GENIE Database WIPO-Administered Treaties WIPO Lex - IP Laws, Treaties & Judgments WIPO Standards IP Statistics WIPO Pearl (Terminology) WIPO Publications Country IP Profiles WIPO Knowledge Center WIPO Technology Trends Global Innovation Index World Intellectual Property Report PCT – The International Patent System ePCT Budapest – The International Microorganism Deposit System Madrid – The International Trademark System eMadrid Article 6ter (armorial bearings, flags, state emblems) Hague – The International Design System eHague Lisbon – The International System of Appellations of Origin and Geographical Indications eLisbon UPOV PRISMA Mediation Arbitration Expert Determination Domain Name Disputes Centralized Access to Search and Examination (CASE) Digital Access Service (DAS) WIPO Pay Current Account at WIPO WIPO Assemblies Standing Committees Calendar of Meetings WIPO Official Documents Development Agenda Technical Assistance IP Training Institutions COVID-19 Support National IP Strategies Policy & Legislative Advice Cooperation Hub Technology and Innovation Support Centers (TISC) Technology Transfer Inventor Assistance Program WIPO GREEN WIPO's Pat-INFORMED Accessible Books Consortium WIPO for Creators WIPO ALERT Member States Observers Director General Activities by Unit External Offices Job Vacancies Procurement Results & Budget Financial Reporting Oversight

The Role of Authentication Technologies in Combating Counterfeiting

April 2006

This article was written for WIPO Magazine by Mr. Ian M Lancaster, Director of Reconnaissance International, an expert on authentication devices as a means of detecting and deterring piracy and counterfeiting.

With the problem of product counterfeiting and software piracy now high up the international policy agenda, there is a growing need for quick and easy ways to differentiate fake products from genuine as a means of detecting and deterring counterfeits. Authentication products and technologies – the effective deployment of which requires close collaboration between IP rights holders and the organizations that inspect products – plays an important role in this area.

The function of authentication technology is to help examiners – customs, police and consumer protection agencies – identify the genuine product in ways that are not obvious to counterfeiters, who have become adept at accurately copying products and packaging. It enables the examiner to look beyond the obvious characteristics of the product in order to determine to a reasonable level of certainty whether the item is genuine. Conversely, the absence of the non-obvious characteristics will betray a fake, even though it may look exactly like the genuine product.

An authentication device embedded in a product may need to be multi-layered, so that, for example, the top layer is visible to the consumer, while a lower layer may contain a means of examination that is not apparent to the counterfeiter. The examination may be a two-stage process: the first in the field – in a raid on a warehouse or shop; the second in the laboratory, to obtain forensic proof that will stand up in court.

The layering of an authentication device is achieved through combinations of technologies which are characterized as follows:

  • Overt devices. These are visible to the naked eye under standard viewing conditions, including holograms, color-change inks, iridescent thin films and retro-reflective materials.
  • Hidden (also s emi-covert) devices. These are revealed to the human eye through use of a handheld inspection tool, such as a plastic film overlay, a UV light, a magnifying glass or a laser pointer. Includes ultraviolet/infrared-sensitive inks, microtext, scrambled images, holograms.
  • Covert devices. These require a more sophisticated detection tool or kit . They may be chemical-based, such as chemical taggants and markers incorporated in the product or the packaging; or electronic, such as a code number or similar identifier (which may require connection to a central database). Covert devices also include DNA and molecular taggants, magnetic labels and embedded codes.
  • Forensic devices.  These require laboratory analysis, which can include analysis of the composition of the product as well as forensic analysis of the authentication marker.

These elements may be found separately or incorporated into a single authentication device. For example, a hologram – the most commonly used device – is an overt feature which can contain hidden and covert images, plus the optical "fingerprint" of the original hologram, which can be examined in a laboratory.

Research conducted by Reconnaissance or by the IPR owners themselves – including case-studies on Allied Domecq, Microsoft, Chanel, Epson and the Turkish Caykur Tea Company – indicate that the properly applied use of authentication devices within a comprehensive anti-counterfeiting strategy can make an effective contribution to reducing counterfeiting and more than recover their cost.

For more information see:  http://www.Reconnaissance-Intl.com

The WIPO Magazine is intended to help broaden public understanding of intellectual property and of WIPO’s work, and is not an official document of WIPO. The designations employed and the presentation of material throughout this publication do not imply the expression of any opinion whatsoever on the part of WIPO concerning the legal status of any country, territory or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication is not intended to reflect the views of the Member States or the WIPO Secretariat. The mention of specific companies or products of manufacturers does not imply that they are endorsed or recommended by WIPO in preference to others of a similar nature that are not mentioned.