Applying Anti-Counterfeiting RFID Chip into Nike Shoes

Post on 08-Jul-2015

487 views 5 download

description

90% of Nikes on eBay are FAKE! PhoneKey provide an NFC tag that transmits a unique 'encrypted verification code' only once, via an NFC-enabled phone running a special app, and is then encoded with a new encrypted verification code, thereby preventing tag cloning.

Transcript of Applying Anti-Counterfeiting RFID Chip into Nike Shoes

Applying Anti-Counterfeiting RFID Chip into Nike Shoes

The World Customs Organization's (WCO) second Illicit Trade Reportreveals the most counterfeited brands by number of customs cases in 2013.

Nike came first in the top 15most counterfeited brands in 2013

Fake Nikes : 90% of Nikes on eBay are FAKE!Published by hieroglyphicx

Non-Replicable Tag

See more…New NFC Solution Prevents Counterfeit Liquor in Taiwan

An NFC tag that transmits a unique

'encrypted verification code' only

once, via an NFC-enabled phone

running a special app, and is then

encoded with a new encrypted

verification code, thereby

preventing tag cloning.

Tap the NFC tag to interrogate the verification code

1

2

3 4

1

2

3

4

To transmit the dynamic verification code which changed each time

it’s read, and the verification code will be expired in few seconds,

To transmit object’s ID, verification code(Code A) and event-based

data to global verification server

5

Global server encrypt ID-based and event-based data to generate

another verification code(Code B).

interrogate

Code A, UID, event data

Code A, UID, event data

Generate Code B

Compare Code A, B

5 To compare Code A and B will lead to the authentication result.

Any user can verify the authentication of products or documents before or after purchase via their mobile phone.

This certificate can not assure anything, this seller is still selling FAKE Nike shoes.

e-Commerce Authentication

The sellers can verify their products while put them

on shelves

Buyer can check the verification status before

purchase

Moreover, buyer can ask seller to do authentication

interactively online

e-Commerce Authentication

Verify it Now

Buyer can ask seller to do online authentication

e-Commerce Authentication

Verify It Now

Seller

Once buyer press w

1. It will trigger an interrogation screen pop on seller’s mobile phone.

2. Seller has to put the NFC mobile phone upon the RFID tag and send a verification code back to buyer.

Verify It Now

e-Commerce Authentication

Verify It Now

Seller has sent a verification code back:

83EC8BB7EBE405DCF9FB

After 30 seconds, code will be expired.

Verify it Cancel

Once the seller send back a verification code, buyer will see a pop screen for verification

Once push the verify it button, the code will send to Genuine Service Center for authentication.

e-Commerce Authentication

Verify It Now

Seller has sent a verification code back:

83EC8BB7EBE405DCF9FB

After 30 seconds, code will be expired.

Verify it Cancel

Once the seller send back a verification code, buyer will see a pop screen for verification, once push the verify it button, the code will send to Genuine Service Center for authentication.

The verification code will be changed each time

The verification code will be expired in seconds

Clone of verification code is ineffective to counterfeit products.

Product detail and count of verification will be displayed

e-Commerce Authentication

Verify It Now

Seller has sent a verification code back:

83EC8BB7EBE405DCF9FB

After 30 seconds, code will be expired.

Verify it Cancel

Once the seller send back a verification code, buyer will see a pop screen for verification, once push the verify it button, the code will send to Genuine Service Center for authentication.

1. The use of an NFC phone to read a tag on a consumer product in order to obtain a benefit provided by the manufacturer or retailer.

2. In return surprise the user with hidden benefits ranging from free merchandise toNIKE+ and a lot of options in-between.

PhoneKey NFC-based product can be enhance the power of marketing and promotions.

Situation when a producer or supplier bypasses the normal channel of distribution and sells directly to the end user.

Channel Conflict

Avoid Channel Conflict

When consumers verify their shoes with their mobile phone, Nike will obtain a product’s ID and a IP address, which can unveil where the product is.

Overproduction is a situation

characterized by an excess of a given

product or service on the market.

Overproduction

Avoid Overproduction

Shoe has its own batch number with RFID chip embedded, quantity of RFID chips are limited for each pilot production.

Manufacturer can not overproduction. Against counterfeiting and cloning.

Owner Registration

Buyer can register their product online, and they can claim their owner ship

Celebrities can donate their used products.

Draw a winning numberBuyers can scan their shoes to draw some rewards.

Thank you and see youwww.userstar.net