An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
EVALUATION OF PRODUCT AUTHENTICATION TECHNOLOGIES: A DETAILED EVALUATION OF THE CURRENT AND EMERGING TECHNOLOGIES
Published
Author(s)
Yaw S. Obeng
Abstract
Product authentication is a critical capability for all supply chains in todays globalized world. Manufacturers, distributors, retailers and customers of all products, from consumer goods to mission critical systems have a growing need to authenticate their products and protect their investments, their systems and even human life and safety in many cases. In this paper, we present an analysis of the currently available technologies for product authentication throughout the electronics supply chain. The paper lists most of the authentication technologies currently available and offers an evaluation of their key features, reasons for use, perceived challenges to implement, best known methods and examples. The paper does not purport to be an exhaustive piece of research of each of these technologies, but rather a summary of their key features. We believe that by consolidating the list of technologies into one paper and providing a brief analysis of each, users will be better informed and as a result will make better decisions regarding which technologies are best suited to their needs. It is important to note that the paper does not advocate nor endorse the use of any one technology as each technology has its strengths and weaknesses that depend on the specific risk and ultimately the decision comes down mitigating whichever risks the manufacturer or customer remain concerned about. Furthermore, It is not the purpose of this paper to discuss in detail the threats posed by counterfeit products to the electronics industry, however we highlight those threats that are persistent and growing; the frequency of instances of which are increasing as well as the potential consequences.
Proceedings Title
Symposium on Counterfeit Electronic Parts and Electronic Supply Chain
Obeng, Y.
(2015),
EVALUATION OF PRODUCT AUTHENTICATION TECHNOLOGIES: A DETAILED EVALUATION OF THE CURRENT AND EMERGING TECHNOLOGIES, Symposium on Counterfeit Electronic Parts and Electronic Supply Chain, College Park, MD
(Accessed October 4, 2024)