Interesting

Beat Product Piracy with Blockchain Technology

Product piracy – manufacturing and selling counterfeit goods – causes damage worth billions of euros. And the damage is not only financial. If counterfeit parts make it into machines, the consequences can be fatal. The car industry and the engineering sectors are particularly strongly affected by the dangers of product piracy. Read on to discover how blockchain technology can help protect your products.

The economic impact of fake goods

Product piracy and brand piracy cause damage worth billions, mainly through violating intellectual property rights  (IPR). A 2020 study by the European Union Intellectual Property Office gives the following figures which illustrate the economic value of intellectual property:

…the total contribution of IPR-intensive industries to the EU economy accounts for approximately 45 % of gross domestic product (GDP) and 29 % of employment (with another 10 % generated in sectors that supply goods and services to the IPR-intensive industries). Those sectors account for the bulk of the EU’s trade with the rest of the world, generating 96 % of goods exports from the EU.[1]

And this is where organised crime begins to pay attention. There is money to be made here, by making and selling pirated copies of what these industries produce. The risk of being discovered, let alone punished, is relatively low. However, the following figures show the drastic effect on the economy:

According to a study carried out by the EUIPO and the Organisation for Economic Co-operation and Development (OECD) in 2019, estimates of IPR infringement in international trade in 2016 could reach as much as 3.3 % of world trade. Up to 6.8 % of EU imports, or EUR 121 billion per year, are fake goods. […] These losses totalled more than EUR 83 billion per year during the period 2013-2017. In addition, more than 671 000 jobs in legitimate businesses were lost, and the Member States lost EUR 15 billion per year in tax revenue[2].

One IP intensive sector strongly affected by product piracy is engineering. If we look at the concrete example of German car engineering, the VDMA were quoted by the magazine Automobilwoche in May 2020 as estimating the annual value of counterfeiting at 7.6 billion euro, which equates to 35,000 German fulltime jobs.

Fake goods and their effect on product safety

The above looked at the economic impact of fake goods. However, in engineering, counterfeit goods also carry quite different risks. The most chilling are the way they undermine quality and safety.  Spare parts which are seemingly identical copies of originals, yet haven’t been subject to any quality tests or standards can cause damage with potentially lethal consequences.  The trade press is therefore unfortunately full of shocking reports such as:

  • Brake pads which set fire during an emergency brake,
  • Oil pumps which don’t properly lubricate the engine, leading to engine failure
  • Car bonnets (hoods) without a crumple zone, which pushes the impact of a frontal crash onto the driver and passengers
  • Windscreens (windshields) which are not made of shatter-proof glass so that on impact shards fly into the car’s interior like daggers.

The internet is the favoured distribution channel for the counterfeiters. On the one hand it’s an easy place to hide, on the other hand they have access to distributions channels worldwide which they can flood with their pirated copies. But how are these entering the supply chain in the first place? And – even more importantly – what can be done about it?

Use blockchain technology to protect against product piracy

How does blockchain work?

A blockchain is a chain of small data records. These records are called blocks and are created in a decentralized proof of work process. Each block is cryptographically hashed and a checksum is calculated. Each hash is added to the following record. This creates an immutable blockchain. Copies of this blockchain are stored with all participants, making manipulation more difficult and automatically distributing the data. A smart contract regulates permitted transactions and enables any cases of plagiarism by any participant to be automatically detected.

Find out more in our article Blockchain or EDI in the Supply Chain?

Using blockchain technology to prevent product piracy

Blockchain technology could be an interesting approach to combat product piracy. Goods could be given RFID smart labels and tracked seamlessly through the supply chain. Employing techniques like non-fungible tokens on a blockchain’s decentralised ledger, it will become almost impossible for counterfeiters to introduce their pirated versions into the supply chain and the classic handover points. Full transaction data for a specific item such as its place of manufacture, delivery date and movements along the supply chain would be saved on a blockchain, where it can no longer be altered, changed or exchanged.

Figure 1: Using the SEEBURGER Business Integration Suite to integrate with blockchain technology

How can SEEBURGER help you use a blockchain?

Find out how SEEBURGER customers use integration tools and technology such as  IoT-, API management and SAP add ons  (such as for creating smart RFID labels) alongside blockchain technology to combat counterfeit goods and to make their supply chain more digital and transparent.

Take part in our SEEBURGER events and learn out more!

Blockchain has the potential to be a game changer in several areas of business and industries. SEEBURGER can help drive the digital transformation of your business by drawing on our three core strengths of technology, business and experience. We will support you by helping you stand out from the competition and to lay the foundations for future growth.

[1] 2020 Status Report on IPR Infringement,P5, June 2020, EUIPO, Executive Summary | ISBN 978-92-9156-277-0 doi: 10.2814/165063 TB-04-20-265-EN-N | © European Union Intellectual Property Office, 2020 | Reproduction is authorised provided the source is acknowledged

[2] Ibid, PP 5-6


Source: https://blog.seeburger.com/beat-product-piracy-with-blockchain-technology/

Inline Feedbacks
View all comments
guest

SEEBURGER’s New Online Help for the Cloud

Digitalisation is a hot topic at the moment. It has also been driving progress and change at SEEBURGER....

Don’t miss another post, with the SEEBURGER blog newsletter

Let good, relevant articles find you. Our new blog newsletter tells you when new, relevant content has been...

Digital Darwinism – Part 3: How Fear and Skepticism Inhibit Disruptive Innovations

Moving forward into unknown territory may feel like jumping off a cliff. However, as digital Darwinism accelerates the...

Digitalization of the Automotive Industry: From Traditional EDI to Modern EDI Trends

EDI (Electronic Data Interchange) is a time-tested yet advanced technology for harmonized electronic document and information exchange. By...

Cyber Security in the Metaverse

Challenges of futuristic business ecosystems Most people are familiar with the term “metaverse” these days, especially since Facebook’s...

VDA4998 – The First Industry-Wide Recommendation for Using APIs in the Automotive Supply Chain

The auto industry is no stranger to electronic data interchange – EDI for short – and has been...

Predictive Maintenance – Part 1: Predictive Maintenance 101 – What Is It and Where Is It Used?

Sooner or later, components in constant use start to wear out. You need to repair or replace them...

What Matters Most to Your New Retail Customers?

Improved replenishment strategies The looming question is “How do I address what matters most to today’s New Retail...

Human Intelligence, Artificial Intelligence: Teenager vs. Machine in SEEBURGER Enrichment Project

Machines can learn things. However, just like people, they need to be trained in their specific tasks. SEEBURGER...

Integrate Your Supply Chain in the Cloud

Trade fair strives to help shape the future of logistics From 10 to 11 November 2021, ICT &...

What is edge computing, and why is edge computing important for processing real-time data?

Edge computing is cutting-edge technology that is transforming the way we process data in digitally networked ecosystems. But...

What is Digital Twin Energy Management and Why is it Important?

Disruptive technologies have taken the world by storm, and businesses have responded by undertaking digital transformation journeys in...

Digital Preparedness – An Imperative

A futuristic perspective of Southeast Asia The COVID-19 pandemic tested the resiliency of every industry and adversely impacted,...

The Digital Product Passport: Driving Sustainability with Digital Transparency

Soon, EU businesses will have to adopt Digital Product Passports (DPPs) for product lifecycle transparency or face penalties....

Artificial Intelligence in Cloud Monitoring – How Bird Watching Helps Predict the Weather

What does bird watching have to do with cloud monitoring? It would appear that songbirds are able to...

The Evolution of the Internet – Web 1.0, Web 2.0, Web 3.0, Web 4.0

From humble beginnings to the groundbreaking innovations of today, the World Wide Web has come a long way....

Learning Is a Lifelong Task– Also for AI Language Models?

Learning is a lifelong task, and is the only way to stay up-to-date with today’s stream of information,...

How Do You Use the Kano Model?

Kano Series Part 2 – Surveying your customers. The Kano model lends itself particularly well to complex products...

Digital Darwinism Part 2: Digital Transformation is Key to Survival

Digital Darwinism has changed the way we communicate, socialize, shop and experience life. In Digital Darwinism Part 1:...

Making Your Business Artificially Intelligent: How Machine Learning Makes Sense of Your Data and Lets You Automate

“Artificial general intelligence is a system which can perform well over a whole range of different tasks at...