Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

EVALUATION OF PRODUCT AUTHENTICATION TECHNOLOGIES: A DETAILED EVALUATION OF THE CURRENT AND EMERGING TECHNOLOGIES

Published

Author(s)

Yaw S. Obeng

Abstract

Product authentication is a critical capability for all supply chains in today’s globalized world. Manufacturers, distributors, retailers and customers of all products, from consumer goods to mission critical systems have a growing need to authenticate their products and protect their investments, their systems and even human life and safety in many cases. In this paper, we present an analysis of the currently available technologies for product authentication throughout the electronics supply chain. The paper lists most of the authentication technologies currently available and offers an evaluation of their key features, reasons for use, perceived challenges to implement, best known methods and examples. The paper does not purport to be an exhaustive piece of research of each of these technologies, but rather a summary of their key features. We believe that by consolidating the list of technologies into one paper and providing a brief analysis of each, users will be better informed and as a result will make better decisions regarding which technologies are best suited to their needs. It is important to note that the paper does not advocate nor endorse the use of any one technology as each technology has its strengths and weaknesses that depend on the specific risk and ultimately the decision comes down mitigating whichever risks the manufacturer or customer remain concerned about. Furthermore, It is not the purpose of this paper to discuss in detail the threats posed by counterfeit products to the electronics industry, however we highlight those threats that are persistent and growing; the frequency of instances of which are increasing as well as the potential consequences.
Proceedings Title
Symposium on Counterfeit Electronic Parts and Electronic Supply Chain
Conference Dates
June 23-25, 2015
Conference Location
College Park, MD

Keywords

Authentication, Anti-counterfeit, Technology evaluation, HDPUG, Clace

Citation

Obeng, Y. (2015), EVALUATION OF PRODUCT AUTHENTICATION TECHNOLOGIES: A DETAILED EVALUATION OF THE CURRENT AND EMERGING TECHNOLOGIES, Symposium on Counterfeit Electronic Parts and Electronic Supply Chain, College Park, MD (Accessed June 14, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created May 25, 2015, Updated November 15, 2017