Interesting

Beat Product Piracy with Blockchain Technology

Product piracy – manufacturing and selling counterfeit goods – causes damage worth billions of euros. And the damage is not only financial. If counterfeit parts make it into machines, the consequences can be fatal. The car industry and the engineering sectors are particularly strongly affected by the dangers of product piracy. Read on to discover how blockchain technology can help protect your products.

The economic impact of fake goods

Product piracy and brand piracy cause damage worth billions, mainly through violating intellectual property rights  (IPR). A 2020 study by the European Union Intellectual Property Office gives the following figures which illustrate the economic value of intellectual property:

…the total contribution of IPR-intensive industries to the EU economy accounts for approximately 45 % of gross domestic product (GDP) and 29 % of employment (with another 10 % generated in sectors that supply goods and services to the IPR-intensive industries). Those sectors account for the bulk of the EU’s trade with the rest of the world, generating 96 % of goods exports from the EU.[1]

And this is where organised crime begins to pay attention. There is money to be made here, by making and selling pirated copies of what these industries produce. The risk of being discovered, let alone punished, is relatively low. However, the following figures show the drastic effect on the economy:

According to a study carried out by the EUIPO and the Organisation for Economic Co-operation and Development (OECD) in 2019, estimates of IPR infringement in international trade in 2016 could reach as much as 3.3 % of world trade. Up to 6.8 % of EU imports, or EUR 121 billion per year, are fake goods. […] These losses totalled more than EUR 83 billion per year during the period 2013-2017. In addition, more than 671 000 jobs in legitimate businesses were lost, and the Member States lost EUR 15 billion per year in tax revenue[2].

One IP intensive sector strongly affected by product piracy is engineering. If we look at the concrete example of German car engineering, the VDMA were quoted by the magazine Automobilwoche in May 2020 as estimating the annual value of counterfeiting at 7.6 billion euro, which equates to 35,000 German fulltime jobs.

Fake goods and their effect on product safety

The above looked at the economic impact of fake goods. However, in engineering, counterfeit goods also carry quite different risks. The most chilling are the way they undermine quality and safety.  Spare parts which are seemingly identical copies of originals, yet haven’t been subject to any quality tests or standards can cause damage with potentially lethal consequences.  The trade press is therefore unfortunately full of shocking reports such as:

  • Brake pads which set fire during an emergency brake,
  • Oil pumps which don’t properly lubricate the engine, leading to engine failure
  • Car bonnets (hoods) without a crumple zone, which pushes the impact of a frontal crash onto the driver and passengers
  • Windscreens (windshields) which are not made of shatter-proof glass so that on impact shards fly into the car’s interior like daggers.

The internet is the favoured distribution channel for the counterfeiters. On the one hand it’s an easy place to hide, on the other hand they have access to distributions channels worldwide which they can flood with their pirated copies. But how are these entering the supply chain in the first place? And – even more importantly – what can be done about it?

Use blockchain technology to protect against product piracy

How does blockchain work?

A blockchain is a chain of small data records. These records are called blocks and are created in a decentralized proof of work process. Each block is cryptographically hashed and a checksum is calculated. Each hash is added to the following record. This creates an immutable blockchain. Copies of this blockchain are stored with all participants, making manipulation more difficult and automatically distributing the data. A smart contract regulates permitted transactions and enables any cases of plagiarism by any participant to be automatically detected.

Find out more in our article Blockchain or EDI in the Supply Chain?

Using blockchain technology to prevent product piracy

Blockchain technology could be an interesting approach to combat product piracy. Goods could be given RFID smart labels and tracked seamlessly through the supply chain. Employing techniques like non-fungible tokens on a blockchain’s decentralised ledger, it will become almost impossible for counterfeiters to introduce their pirated versions into the supply chain and the classic handover points. Full transaction data for a specific item such as its place of manufacture, delivery date and movements along the supply chain would be saved on a blockchain, where it can no longer be altered, changed or exchanged.

Figure 1: Using the SEEBURGER Business Integration Suite to integrate with blockchain technology

How can SEEBURGER help you use a blockchain?

Find out how SEEBURGER customers use integration tools and technology such as  IoT-, API management and SAP add ons  (such as for creating smart RFID labels) alongside blockchain technology to combat counterfeit goods and to make their supply chain more digital and transparent.

Take part in our SEEBURGER events and learn out more!

Blockchain has the potential to be a game changer in several areas of business and industries. SEEBURGER can help drive the digital transformation of your business by drawing on our three core strengths of technology, business and experience. We will support you by helping you stand out from the competition and to lay the foundations for future growth.

[1] 2020 Status Report on IPR Infringement,P5, June 2020, EUIPO, Executive Summary | ISBN 978-92-9156-277-0 doi: 10.2814/165063 TB-04-20-265-EN-N | © European Union Intellectual Property Office, 2020 | Reproduction is authorised provided the source is acknowledged

[2] Ibid, PP 5-6


Source: https://blog.seeburger.com/beat-product-piracy-with-blockchain-technology/

Inline Feedbacks
View all comments
guest

The Future of Automation: Meaningful Blockchain Use in Digital Process Automation

Once you start looking into topics like data processing, digitalization or automation, it doesn’t take long until you...

Digitalization of the Automotive Industry: From Traditional EDI to Modern EDI Trends

EDI (Electronic Data Interchange) is a time-tested yet advanced technology for harmonized electronic document and information exchange. By...

Artificial Intelligence and the SEEBURGER BIS

Artificial intelligence is playing an ever greater part in our everyday lives. Intelligent systems are behind ever more...

4 Logistics Trends – Keep Your Supply Chain Moving and Digitally Enabled through Integration

Although the pandemic and economic disruptions of the past year have shocked supply chains and impacted the logistics...

EU-NIS2 to Increase Cyber Security

The EU-NIS2 and EU-RCE Directives are to be transposed into German law by the Bundestag this year and...

ACER certifies the European Transparency Platform Powered by SEEBURGER as REMIT Inside Information Platform (IIP)

SEEBURGER’s European Transparency Platform was certified by ACER as one of the first Inside Information Platforms (IIPs) in...

Predictive Maintenance – Part 2: How does predictive maintenance work?

This article follows our piece on Predictive Maintenance 101 – What Is It and Where Is It Used?...

EU-NIS2 and Cyber Security: What Should Companies Know?

Cyber security – ensuring it presents companies with an almost insurmountable task. Yet with the rise of new...

Digital Preparedness – An Imperative

A futuristic perspective of Southeast Asia The COVID-19 pandemic tested the resiliency of every industry and adversely impacted,...

Extended Reality (XR) in the World of Work: Is A New Dimension of Productivity and Collaboration on the Verge of a Breakthrough?

In recent years, virtual reality (VR) and augmented reality (AR) have developed into fascinating technologies that are not...

Learning Is a Lifelong Task– Also for AI Language Models?

Learning is a lifelong task, and is the only way to stay up-to-date with today’s stream of information,...

How Can You Interpret Your Kano Results?

Kano series part 3 – Analysing and interpreting your results. Kano questionaires can give you valuable insights into...

Backup, Disaster Recovery or Backup-As-Code — What Really Protects?

Companies face the challenge of protecting their IT systems against data loss, cyber attacks and unexpected outages. But...

Digital Transformation in Logistics

Digital logistics. Automated logistics. Logistics automation. (I)IoT in logistics. What is your current favourite buzzword for digitalization in...

The Chemistry of Integration: How SEEBURGER Brings Order to Business Chaos

What do the periodic table of elements and the SEEBURGER BIS Platform have in common? Just like elements...

Multi-Project Management: Project management tools and resource planning for a clear project portfolio

Maintaining an overview in project management is often a challenge. How do you set priorities? Which processes are...

Types of Company Fusion and Their Effect on the Corporate IT Landscape

After mergers and acquisitions (M&A), the integration of the IT infrastructures of the companies involved is always an...

Industry 4.0 and Lean Management – How to Manage the Chaos

Value chains are becoming increasingly complex and networked. This is not only due to globalisation, but also to...

Cyber Security in the Metaverse

Challenges of futuristic business ecosystems Most people are familiar with the term “metaverse” these days, especially since Facebook’s...

The Digital Product Passport: Driving Sustainability with Digital Transparency

Soon, EU businesses will have to adopt Digital Product Passports (DPPs) for product lifecycle transparency or face penalties....