Conferences related to Counterfeiting

Back to Top

2023 Annual International Conference of the IEEE Engineering in Medicine & Biology Conference (EMBC)

The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC)

The conference focuses on networking, sensing and control three areas, but also opens to some emerging subjects in information technology, such as data science and machine learning.


More Conferences

Periodicals related to Counterfeiting

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Components and Packaging Technologies, IEEE Transactions on

Component parts, hybrid microelectronics, materials, packaging techniques, and manufacturing technology.


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Counterfeiting

Back to Top

Xplore Articles related to Counterfeiting

Back to Top

Anti-counterfeiting using phosphor PUF

2008 2nd International Conference on Anti-counterfeiting, Security and Identification, 2008

Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the ...


The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting

2010 International Conference on Machine Learning and Cybernetics, 2010

Anti-collision in RFID will occur when multiple tags or readers transmit data simultaneously, and these data will affect each other and cannot be recognized. While anti-counterfeiting in RFID occurs when a duplicated tag is used in the goods, and the reader will not be able to discover that it is a fake tag. Anti-collision and anti-counterfeiting mechanisms are usually operated ...


Research on Anti-counterfeiting Image Generation Algorithm Based on Halftone-Micro-Character

2018 IEEE 18th International Conference on Communication Technology (ICCT), 2018

Micro-character is a widely used method in the field of anti-counterfeiting. This method puts forward a high demand for the graphic information processing and printing reproducing technology, so it is used in securities and bills. According to the feature of carrier image and the requirement of printing technology, this method hides the halftone-micro-character information in the carrier image to realize ...


Smart tags for brand protection and anti-counterfeiting in wine industry

2018 23rd International Scientific-Professional Conference on Information Technology (IT), 2018

Counterfeit wine presents a significant issue for winemakers since it affects producer's reputation, profit and most importantly it can be harmful for the consumers. This paper describes a brand protection and anti-counterfeiting solution for wine industry based on smart tags and Cloud enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported ...


Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

2009 11th International Conference on Advanced Communication Technology, 2009

One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi- fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is ...


More Xplore Articles

Educational Resources on Counterfeiting

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Counterfeiting"

IEEE-USA E-Books

  • Anti-counterfeiting using phosphor PUF

    Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the counterfeit products could easily cheat the anti- counterfeiting system. This paper continues our work on the anti- counterfeiting system applying phosphor physical uncloneable function (PUF). An offline anti-counterfeiting system is proposed in this paper prevailing over the previously proposed online system as it does not require any online database. Furthermore, a prototype software running on the commodity mobile phone of consumers for verification is designed.

  • The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting

    Anti-collision in RFID will occur when multiple tags or readers transmit data simultaneously, and these data will affect each other and cannot be recognized. While anti-counterfeiting in RFID occurs when a duplicated tag is used in the goods, and the reader will not be able to discover that it is a fake tag. Anti-collision and anti-counterfeiting mechanisms are usually operated separately in the past, but they may have to perform at the same time in some cases. For example, when RFID-based exhibition tickets are used for entrance purpose both mechanisms will be needed simultaneously. To counter forgery attack, it is important that we have to meet not only anti-collision but also anti-counterfeiting requirement. Therefore, in this paper, we propose a suitable communication protocol of RFID tag with the function of anticollision and anti-counterfeiting called A Combined Active RFID Tag Collision Resolution Protocol Against Counterfeiting (CRPAC). In our proposed scheme, when the anti-collision mechanism is in progress, the anti- counterfeiting scheme is working along with it. Eventually, the new scheme effectively reduces the workload of RFID system and significantly decreases collision probability of the active tags.

  • Research on Anti-counterfeiting Image Generation Algorithm Based on Halftone-Micro-Character

    Micro-character is a widely used method in the field of anti-counterfeiting. This method puts forward a high demand for the graphic information processing and printing reproducing technology, so it is used in securities and bills. According to the feature of carrier image and the requirement of printing technology, this method hides the halftone-micro-character information in the carrier image to realize the effect of anti-counterfeiting and information hiding, and achieves the effect of artistic performance. The hidden effect of information is a key factor reflecting the level of this technology, in particular, the structural characteristics of square Chinese characters put forward higher requirements for the realization of this method. By matching the features of carrier image with the templates, using the calibration result of the templates and the unit image to select the best matching template, and use this template to fill the unit image to achieve the effect of anti- counterfeiting and information hiding, and achieve the artistic performance.

  • Smart tags for brand protection and anti-counterfeiting in wine industry

    Counterfeit wine presents a significant issue for winemakers since it affects producer's reputation, profit and most importantly it can be harmful for the consumers. This paper describes a brand protection and anti-counterfeiting solution for wine industry based on smart tags and Cloud enabled technologies. The main idea behind smart tags is to utilize quick response codes and functional inks supported by the Cloud system and two-way communication between the winemaker and end-user. The proposed system is expected to make wine counterfeiting hard and unprofitable.

  • Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi- fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification does not affect the fidelity of the watermarked images.

  • EPC Events in Logistics Process and the Design of Anti-counterfeiting Patterns

    In order to solve the application problems of EPC Network, the anti- counterfeiting system with anti-counterfeiting model and rules are used in this paper. By research on the supply chains in the logistics field, we set up models to represent the real supply chain and we also work out some rules based on the model to achieve the anti-counterfeiting function. A basic model is shown as an example to represent one supply chain model of a product. The system using model and rules shows the right anti-counterfeiting results in several test situations and also the system should be run under some conditions. The supply chain model and related rules in the system can cover most anti-counterfeiting cases and thus the applications of EPC Network can be easily achieved.

  • Design of an anti-counterfeiting system based on SMS

    By the developing of information technology, anti-counterfeiting technology developed from non-digital way to digital way. In this paper, a convenient anti-counterfeiting system including identity authentication, anti-counterfeit query and electronic payment is put forward by using digital signature and encryption technology. In purchaser subsystem, mobile terminal with J2ME supported query the anti-counterfeiting information by short message service (SMS). System network topology and communication protocols of SMS message format have discussed in the following parts of this paper.

  • Development and Implementation of Novel UHF Paper-Based RFID Designs for Anti-counterfeiting and Security Applications

    In this paper, we proposed the development and implementation of novel paper- based UHF RFID designs for anti-counterfeiting and security. Miniaturization and global-band antenna configurations and utilization of inkjet printing techniques in/on organic substrates, such as paper, that will enable the low cost and large-scale implementation of RFID-enabled semi-autonomous sensors for "cognitive-intelligence" applications, are also discussed for a variety of security-related areas, featuring a great potential for low-cost large-scale solutions.

  • Combatting IC counterfeiting using secure chip odometers

    Integrated circuit counterfeiting is a significant and growing problem for electronics manufacturers, system integrators, and end users. The widespread prevalence of counterfeit ICs in the manufacturing supply chain raises significant security and reliability concerns. To combat IC counterfeiting, a secure chip odometer was designed to provide ICs with both a secure gauge of use/age and an authentication of provenance enabling simple, secure, robust differentiation between genuine and counterfeit parts. The secure chip odometers employ chained one-shot binary aging elements (BAEs) that use intentional accelerated device aging to measure use and age of the chip. A prototype secure odometer was taped out on a 1.2mm × 1.7mm testchip in a 65nm bulk CMOS process as a proof-of-concept.

  • Next generation technologies to combat counterfeiting of electronic components

    Counterfeiting is now a global problem that accounts for close to 9% of all worldwide trade, according to the International Anti-Counterfeiting Association (IACA). Unfortunately counterfeiting is no longer restricted to clothes, designer watches, and stereos. The high technology industry has been hugely impacted by this activity. The reason is simple, economics, and availability. Counterfeiters, many of whom are agents of organized crime, wage campaigns that do little more than steal the intellectual property of large technology firms. Fortune 500 technology companies currently employ teams that do little less than conceive ways to protect the companies IP and secure their products - but most importantly secure their brand. Many of these programs entail the use of covert, or invisible, technologies to mark authentic product. How serious is this issue, important enough to have some of the worlds top CEOs spend an entire day at the World Economic Forum discussing how to combat the counterfeiting issue. In today's world, many companies are turning to new "Covert" technologies to mark their products. Tools such as chemically altered dyes and inks are employed to invisibly label authentic products, and to foil the efforts of counterfeiting criminals.



Standards related to Counterfeiting

Back to Top

IEEE Standard for Rechargeable Batteries for Cellular Telephones

This standard establishes criteria for design analysis for qualification, quality, and reliability of rechargeable lithium ion and lithium ion polymer batteries for cellular telephone applications. Also included in the standard are: battery pack electrical and mechanical construction, packaging technologies, and pack and cell level charge and discharge controls and overall system considerations.



Jobs related to Counterfeiting

Back to Top

No jobs are currently tagged "Counterfeiting"