Spelling suggestions: "subject:"counteracting"" "subject:"counterfeit""
51 |
La contrefaçon de propriété intellectuelle au Maroc / Counterfeiting of intellectual property in MoroccoChabbouba, Moulay Abdellah 12 December 2011 (has links)
La contrefaçon de la propriété intellectuelle constitue l'un des sujets d'actualité les plus marquants de nos jours. Un tel phénomène n'épargne à l'heure actuelle aucun pays et l'on se demande de quelle manière pourrait-on protéger la propriété intellectuelle, dans une ère où la contrefaçon peut atteindre tous les secteurs intellectuels. Au rebours du droit français qu'est assez avancé en ce domaine, le droit marocain y compris la jurisprudence marocaine quand bien même inspirée de la législation française ne sont qu'au stade du balbutiement. A cet égard, nous avons scindé notre thèse en deux parties, la première est consacrée aux éléments constitutifs de contrefaçon de propriété intellectuelle à savoir, les éléments constitutifs de la contrefaçon de propriété intellectuelle de la manière suivante. Après une introduction, le premier chapitre expose l'élément matériel (un comportement frauduleux) de contrefaçon en matière industrielle et en droit d'auteur et droits voisins. Le second chapitre présente un élément moral (la connaissance d'agir mal), le troisième chapitre traite l'élément légal (un texte de loi). Dans la deuxième partie, on a étudié, la procédure de lutte contre la contrefaçon de propriété intellectuelle, dans un premier temps on a traité la constatation préalable des faits de contrefaçon (Chapitre I), puis le déclenchement de la procédure de lutte contre la contrefaçon (Chapitre II) avant de nous attarder sur les mesures de lutte contre la contrefaçon de propriété intellectuelle (Chapitre III). / Our days, Counterfeiting of intellectual property is one of the most significant subject. Such a phenomenon touchs at present all countries and we wonder how can we preserve intellectual property in Morocco, in this era where counterfeiting can reach all intellectuals sectors. Contrary to French law which is quite advanced in this area, Moroccan law including Moroccan case law, inspired by French law are at the stage of babbling, in this regard, we have split our thesis in two parts .The first part focuses on the elements of infringement of intellectual property, as follows. After an introduction, the first chapter outlines the physical element of counterfeiting industrial matters and copyright and neighboring rights. The second chapter presents a moral element , the third chapter deals with the legal element (a law). In the second part, we have studied how to fight against counterfeiting of intellectual property, initially was treated prior determination of the facts of infringement (Chapter I), then the start of the procedure against counterfeiting (Chapter II) before dealing with measures against infringement of intellectual property rights (Chapter III).
|
52 |
Klamavé obchodní praktiky se zaměřením na porušování práv duševního vlastnictví / Misleading Commercial Practices with a Focus on Intellectual Property Rights InfringementsMálková, Lucie January 2011 (has links)
This master's thesis deals with a topical subject of intellectual property rights infringements as an example of a misleading commercial practice. The aim of the theoretical part is an analysis of the available data covering the topic. The paper also contains Czech and European statistics of goods infringing intellectual property rights. The thesis then focuses mainly on the issue of an illegal alcohol trade. The objective of the practical part is an analysis of consumer preferences and behaviour of Prague residents in the purchase and consumption of spirits. Another objective is an analysis of a change of consumer preferences and behaviour of Prague residents as an impact of recently revealed cases of a sell of harmful alcohol. The objectives are met via a quantitative questionnaire survey.
|
53 |
Contrefaçon du vin : développement de méthodes d'analyse multifactorielles rapides et non destructives pour l'authentification des bouteilles par des techniques spectrochimiques couplées à un rayonnement laser / Wine counterfeiting : development of fast, non-destructive and multifactorial laser-based spectrochemical methods for authentification of bottled wine.Grijalba Marijuan, Nagore 08 November 2017 (has links)
La connaissance du raisin et du vin est aussi vieille que l’histoire culturelle de l’humanité. Il est bien connu depuis l'ancienne civilisation l'influence du «terroir» sur le vin, c'est-à-dire un espace géographique délimité où une communauté humaine construit au cours de l’histoire un savoir collectif de production qui confère une typicité et engendrent une réputation pour un produit originaire de cet espace géographique. Les grands vins, tout comme les vins de moindre renommée, représentent une cible privilégiée des faussaires. La contrefaçon s’intensifie et se développe en grande partie en Chine. Selon la comission du vin et spiritueux du Comité National des Conseillers du Commerce Extérieur de la France, il existe au moins une bouteille de vin forgé pour chaque bouteille de vin français original. Bien que la Chine ne soit pas le seul fournisseur de vins contrefaits, la croissance rapide du marché du vin dans ce pays et l'absence de lois protégeant la propriété intellectuelle ont déclenché le marché noir. On estime que 20% des vins consommés dans le monde sont contrefaits. Selon l’Office de l’Union Européenne pour la propriété intellectuelle, l’industrie des vins et spiritueux européenne perd environ 1,3 milliard d’euros chaque année du fait de la contrefaçon sur le marché de l’UE, ce que correspond à 3,3% de ventes de ces secteurs, ce qui se traduisent en une perte directe d’environ 4800 emplois. La contrefaçon des vins peut revêtir plusieurs formes et les mesures de lutte contre la contrefaçon en vigueur ont montré leur manque d’efficacité. Ce sont des techniques invasives qui sont utilisés lors de la vérification des vins. Elles sont basées principalement sur une analyse du contenu et nécessitent donc l’ouverture de la bouteille, ce qui est dommageable lorsqu’il s’agit de vins de grande valeur. Le travail présenté ici, présente un nouvel outil de diagnostic non ambigu basé sur l'analyse ultra-trace des matériaux constituant l’emballage (verre, papier et encres, capsule) par ablation laser femtoseconde ICPMS. Cette technique non invasive est rapide (5 minutes environ), permet de détecter des traces élémentaires inférieures au ng/g et n’a pas d’équivalent en terme de performance à ce jour. Dans une première étape, nous avons designée et développé une nouvelle cellule d’ablation qui permet de réaliser l’analyse multiélémentaire direct en n’induisant aucune dégradation visible sur la bouteille. Dans une deuxième étape, la nouvelle cellule d’ablation a été apliquée a l’analyse direct de l’emballage. Pour l’analyse du papier et des encres, en raison du manque de matériaux de référence certifiés, représente un véritable challenge analytique. Nous avons mis au point une approche quantitative en développant nos propres standards par impression jet d’encre de papier à partir de solutions dopées. Finalement, un nouvel outil de diagnostic non ambigu basé sur l’espectroscopie Raman et Infrarouge a été développée pour l’analyse moleculaire qualitatif et direct du papier et des encres afin de compléter les résultats obtenus avec le fsLA-ICPMS. L’instrumentation et ces méthodes de caractérisation des emballages ont été appliquées avec succès à l’analyse d’un grand nombre de bouteilles (n>200) d’origine contrôlée et de bouteilles originaires d’autres pays. Les traitements statistiques des données basés sur une analyse multivariée (PCA, PLS, classification hiérarchique) montrent clairement la distinction entre les bouteilles d’origines et les bouteilles contrefaites en isolant et hiérarchisant les éléments traces à l’origine de cette discrimination. Il a par ailleurs été possible de différencier la signature chimique des bouteilles selon leur origine géographique et le millésime. / The knowledge of grape and wine is as old as the cultural history of humankind. It is well known since the ancient civilizations the influence of the "terroir" on wine, which is a limited geographical space where a human community constructs a collective knowledge of production, which gives wine grapes their distinctive character and generate a reputation for a product originating from this geographical area. The great wines are a prime target for counterfeiters because of their brand value, mostly originating from the Asian market. According to the National Committee of Foreign Trade Advisers of France (Comité National des Conseillers du Commerce Extérieur de la France, CNCCEF) the wine fraud is not just a matter of a few bottles but also includes an entire clandestine industry. According to the Wine and Spirits Commission of the CNCCEF, there is at least one bottle of forged wine for each bottle of original French wine in China. Although China is not the only supplier of counterfeited wines, the rapid growth of the wine market in this country and the absence of laws protecting intellectual property have triggered the counterfeit market. It is estimated that 20% of the wines consumed in the world are counterfeit. In fact, according to the European Union Intellectual Property Office, it is estimated that the legitimate industries losses approximately €1.3 billion of revenue annually due to the presence of counterfeit spirits (€740 million) and wine (€530 million) in the EU market, 3.3% of the sector’s sales, which results in a direct loss of about 4,800 jobs. Wine fraud may be categorized in several forms and anti-counterfeiting measures have shown lack of effectiveness. Unfortunately, invasive techniques are used for wine verification purposes, which are mainly based on liquid sampling, requiring opening the bottle that can be fateful when it comes to great value wines. This work presents a new unambiguous diagnostic tool based on the ultra-trace analysis of the wine packaging (glass, paper and inks, capsule) by femtosecond laser ablation coupled to ICPMS. This is a fast (about 5 minutes) and non-invasive technique, which allows detecting trace elements below ng/g and has no equivalent in terms of performance to date. In a first step, we have designed and developed a new ablation cell that allows direct and multi-elemental analysis of the packaging without causing any visible degradation on the bottle. In a second step, the new ablation cell has been applied to the direct analysis of the packaging components. For the analysis of paper and inks, as the lack of certified reference materials represents a real analytical challenge, we have developed a quantitative approach by developing our own standards by printing spiked solution with an inkjet printer. Finally, in order to complement the results obtained with fsLA-ICPMS, a new unambiguous diagnostic tool based on Raman spectroscopy and Infrared spectroscopy has been developed for the qualitative and direct molecular analysis of paper and inks. The instrumentation and packaging characterization methods have been applied to the analysis of a large number of bottles (n> 200) of controlled origin and bottles originating from other countries. The statistical processing of data based on multivariate analysis (PCA, PLS, hierarchical classification) clearly shows the distinction between authentic and counterfeited bottles by isolating and prioritizing the trace elements responsible for this discrimination. It was also possible to distinguish the chemical signature of the bottles according to their geographical origin and the vintage.
|
54 |
Towards Cyber-Physical Security for Additively Manufactured Parts via In Situ Monitoring and Electromechanical ImpedanceRaeker-Jordan, Nathan Alexander 22 January 2025 (has links)
The layer-by-layer nature of additive manufacturing (AM) allows for toolless fabrication of highly complex geometries that cannot be made via traditional processes. AM is unique in its ability to precisely define both the material properties and geometric shape throughout the volume of a part, giving designers unmatched freedom in the creation of new components. However, this freedom of design also creates numerous challenges in the qualification of these parts. As AM processes primitive material in real time to produce each voxel of part volume, manufacturing defects may be dispersed anywhere throughout the part. Many part designs may have complex geometries or material parameters that are challenging for traditional qualification and inspection techniques to inspect for such embedded errors. Even more troubling, this freedom of design also extends to malicious actors, who would then be able to embed intentional targeted defects within the volume of the part. As the AM process is driven almost entirely by computer controlled machines and cyber-domain data, the AM process is uniquely at risk of nearly undetectable cyber-physical attacks, or cyber attacks that can cause physical damage. Additionally, as much of the valuable intellectual property associated with the design and material parameters of parts are stored in digital form, theft of these design files could result in mass replication of lower quality counterfeit parts, putting the supply chain of these AM parts at risk.
In order to mitigate these vulnerabilities in the AM process, prior works have focused on in situ monitoring of the manufacturing process in order to ensure the part is constructed as expected. Typically for in situ monitoring, the constructed geometry is compared to the design files associated with the part in question using a monitoring system connected to either the AM machine or the larger network. However, such methods trust the validity of both the design files and monitoring systems used for verification, when either or both may have also been attacked. Therefore, a valid in situ monitoring method needs secure access to a provable set of validation data, while also isolating or air-gapping itself from the network to prevent cyber attacks on the monitoring system itself.
Similarly, other works have focused on mitigating the risk of counterfeiting by novel means of part identification tailored for the AM process. Many of these identification methods leverage stochastic or prescribed features, such as surface patterns measured via visible or ultraviolet scanning, or internal porosity features measured via x-ray computed tomography (CT) scanning. However, these surface features are not impacted by alterations or damage to the part in areas away from the specific features being measured, possibly preventing the detection of attacks or damage to other areas of the part in transit. CT scanning can be used to detect damage or alterations to more areas of the part and incorporate this measurement into the identification mechanism, but may be prohibitively expensive while also possibly failing to properly penetrate and measure a sufficiently complex AM part.
In this work, efforts to expand the cyber-physical security of the AM process are explored, including (1) a novel method of in situ process validation by means of covertly transmit- ting process quality information to an otherwise air-gapped monitoring system, (2) a novel method of metal AM part identification via a low-cost piezoelectric sensor-actuator able to record a part frequency response that is dependent on the geometry and material properties of the part as a whole, (3) an exploration of part-to-part variation across AM processes, again measured via a piezoelectric sensor-actuator, and (4) a novel means of using the same piezoelectric sensor-actuator for detecting the presence of remaining powder in metal AM parts. / Doctor of Philosophy / Additive manufacturing (AM), or 3D printing, allows for the creation of highly complex parts.
AM machines do this by building parts layer-by-layer, processing (e.g., selectively melting metal powder) and placing each segment of a part from the bottom up, allowing it to make internal features which would be impossible with traditional manufacturing processes, such as machining.. However, because these parts can be so complicated, it is difficult to validate that a part is "good", i.e., is free from defects. As the entire volume of the part is built layer- by-layer, any layer anywhere in the part could be defective, with very few techniques being capable of detecting the defect from the outside. Worse, because the AM process is driven by digital design files and other data, cyber attacks have the ability to maliciously change the design of a part before it is made, resulting in physical damage. These cyber-physical attacks can similarly affect existing validation methods, allowing these attacked parts to slip through undetected. Alternatively, part designs can be stolen, allowing the thieves to produce unauthorized and possibly subpar counterfeits. These dangers require new means of validating the AM process and the parts it can produce.
In order to detect a cyber-physical attack, previous studies have looked to recording and monitoring the physical actions of the AM process in order to ensure the part is built layer- by-layer as expected. Typically, the part design files are sent to the network-connected monitoring system, which then compares the files to the as-built geometry being recorded.
However, in this case, the design files can themselves be attacked, as can the monitoring system recording and comparing the part geometry. In order to detect bad parts without exposing the system to cyber attacks, the monitoring system needs a way to validate the AM part without relying on the part design files directly or being connected to the network.
To determine is a part is counterfeit or not, previous studies have tried to create "fingerprints" for parts, allowing a unique part to be identified. However, many of these techniques require changes to the part in question, or rely on features that could be duplicated (i.e. copying the fingerprint) by a skilled attacker. Certain methods using x-ray computed tomography (CT) scanning, while effective at fingerprinting small parts, can be very expensive, and may not work for parts which are too large or complex for x-rays to cleanly pass through. To be successful, a fingerprint needs to be simple to measure, and dependent on the entirety of the part itself, not just a handful of manufactured features. This can be done using the frequency response of the part, or how much the part vibrates over a range of frequencies.
This response is dependent on the entire part, including the geometry and the material properties, and can be measured using low-cost equipment, allowing it to be used for a variety of different purposes.
In this work, several methods to enhance the cyber-physical security of the AM process are explored. These include (1) a method of validating the AM process by covertly transmitting information to a network disconnected monitoring system, (2) a method of identifying metal AM parts identification using the parts frequency response as a fingerprint, (3) an exploration of part frequency response for fingerprinting across other AM processes, including both metal and polymer parts, and (4) a means of using the frequency response of a part for detecting the presence of residual powder from powder-based AM processes.
|
55 |
O fake nas mídias: simulações irônicasEmérito, Matheus Barbosa 22 October 2012 (has links)
Made available in DSpace on 2016-04-26T18:12:25Z (GMT). No. of bitstreams: 1
Matheus Barbosa Emerito.pdf: 6717538 bytes, checksum: f97974fd0640e1d4039cb759ef7f0266 (MD5)
Previous issue date: 2012-10-22 / Conselho Nacional de Desenvolvimento Científico e Tecnológico / This research deals with a study about photographic fake that have increasingly
present in the media and advertising world of the XXI century. The term fake is used
both to define false objects the really try to mistake people, and others which only
simulate and have no intention to deceive as a priority. In order to prove the
potential of the photographic fake as a critical element of media, even being part of
it, so this work made a distinction between the concepts of forgery and simulation.
The fake photographs or the ones produced as simulations are considered as devices
for reflection elements of the production process itself or its representation as an
element of culture. Through consideration of the studies of Hans Tietze and Nelson
Goodman, it was observed that faking is a cultural practice that exists since the
middle age. This practice is quite common in human social behavior, is directly
related to the concepts of identity, originality and authenticity, concepts treated by
Umberto Eco, who guided the approach about the false in this thesis. On the other
side, there is the fake as simulation that uses the parody to promote critics. Through
the studies of Linda Hutcheon, who gives the parody an ironic characteristic, this
work defines one side of the fake as a parodic and ironic simulation. It was
considered then as a corpus, a set of parody models: Not the Financial Times, which
criticizes the traditional printed The Financial Times through imitation; BC Byte
Series, archaeological work that relates the fictional work of art with the artefact;
Esquire magazine, which publishes fiction news, among others. By selecting a diverse
group, we verified that some examples present the hints that are responsible by the
construction of the parodic sense in a concealed mode. So, a parody becomes a
mock and determines the parodic and radical simulation. While examining the diverse
photographic material chosen, it was observed that the manipulations are applied as
forgeries, ironic or radical parodic simulations. The parodic radical simulative
photography is pointed out through the analysis of photographer Joan Fontcuberta s
works, who designs faked photographs of animals, vegetables and even photo
biographies. It is clear, therefore, the existence of a critical reflection on the creative
process and the nature of truth that, traditionally, is the ethos of photography. The
concepts and the classification presented, together with the analysis, seek to
highlight the importance of proper fake as ironic parody of reflective media,
continuing dissertation The fake documentary, previous research by this author / Esta pesquisa traz um estudo sobre fake fotográfico, cada dia mais presente na
imprensa e na publicidade mundiais. O termo fake é utilizado por abranger das
produções falsas até aquelas que apenas simulam, sem ter como prioridade a
intenção de enganar. Com o objetivo de comprovar o potencial do fake fotográfico,
como elemento de crítica ao suporte midiático em que também está inserido, este
trabalho fez uma distinção entre os conceitos de falsificação e simulação. As
fotografias falsificadas ou produzidas como simulações são consideradas dispositivos
para reflexão, seja a respeito do processo de produção em si ou de sua
representação como elemento da cultura. Por meio da consideração dos estudos de
Hans Tietze e Nelson Goodman, observou-se que a falsificação é uma prática cultural
que data da Idade Média. Esta prática, bastante comum no comportamento social
humano, está diretamente relacionada com os conceitos de identidade, originalidade
e autenticidade, conceitos estes tratados por Umberto Eco, e que guiaram a
abordagem do falso nesta pesquisa. Todavia, o fake, como simulação, utiliza a
paródia para promover a crítica. Por meio dos estudos de Linda Hutcheon, que
conferem à paródia uma característica essencialmente irônica, este trabalho define
um primeiro aspecto do fake como simulação paródica irônica. Foi examinado, então,
a título de corpus, um conjunto de modelos paródicos: Not the Financial Times,
impresso que critica o tradicional The Financial Times através da imitação; B.C. Byte
Series, trabalho arqueológico ficcional que relaciona a obra de arte com o artefato; a
revista Esquire, que divulga notícias ficcionais, entre outros. Ao selecionar um grupo
tão diversificado, verificou-se que alguns exemplos apresentam, de forma velada, as
pistas responsáveis pela construção do sentido paródico. Assim, uma paródia tornase
trote e determina a simulação paródica radical. Ainda examinando o diverso
material fotográfico escolhido, observou-se que as manipulações são recorrentes,
como falsificações, simulações paródicas irônicas ou radicais. A fotografia simulativa
paródica radical é destacada através da análise dos trabalhos do fotógrafo Joan
Fontcuberta, que compõe fotos fictícias, como as de animais, vegetais e até
fotobiografias. Percebe-se, assim, a existência de uma reflexão crítica ao processo
criativo e ao caráter de verdade que, tradicionalmente, constitui o ethos fotográfico.
Os conceitos e a classificação que apresentamos, juntamente com as análises,
buscam evidenciar a devida relevância do fake como paródia irônica reflexiva dos
meios, dando continuidade à dissertação de mestrado O falso documentário,
pesquisa previamente realizada por este autor
|
56 |
La protection des marques en Algérie : propositions pour une modification du droit de marque / Trademark protection in Algeria : proposals for a modification of the trademark lawBenaired, Abdelghani 11 January 2019 (has links)
En Algérie, la protection des marques est mise à l’épreuve par différentes formes d’atteintes, favorisant ainsi, un sentiment d’insécurité juridique très profond. Ce travail de recherche a vocation à effectuer une étude du droit positif algérien afin d’évaluer les dispositions relatives à la protection de la marque et d’en cerner les dispositions lacunaires pour tenter d’apporter des solutions. Nous allons analyser l’existence juridique de la marque afin de comprendre quand le titulaire bénéficie d’une protection sur sa marque, pour ensuite, exposer les instruments prévus dans la législation pour mettre en œuvre cette protection accordée à la marque avant et après son enregistrement. Tel est l’objet de la première partie. Nous allons ensuite dans la seconde partie étudier la protection de la marque au regard du droit comparé en analysant des notions et des principes prévus dans des droits étrangers, tels que l’acquisition de la protection de la marque par l’usage, la protection des marques non visuelles et le risque d’association dans l’esprit du public des consommateurs. Nous nous sommes également intéressés à la recherche d’un système procédural plus complet que celui déjà adopté en droit algérien. Serait important un recours judiciaire contre le refus d’enregistrement et de la procédure d’opposition contre les demandes d’enregistrement de marques, deux procédures négligées en droit algérien. Pour à la fin tenter de chercher une meilleure protection de la marque notoire, afin de proposer ces notions et principes, après avoir tenté de les adapter à la situation en Algérie, comme solutions pour rendre le droit positif algérien plus efficace et complet / In Algeria, trademark protection is put to the test by various forms of infringement, thus favoring a very deep sense of legal uncertainty. This research is intended to carry out a study of Algerian positive law in order to evaluate the provisions relating to the protection of the brand and to identify the incomplete provisions to try to provide solutions. We will analyze the legal existence of the mark in order to understand when the holder benefits from a protection on his mark, then to expose the instruments envisaged in the legislation to implement the protection granted to the mark before and after its registration, which is the purpose of the first part. In the second part, we will study the protection of the brand with regard to comparative law by analyzing concepts and principles provided for in foreign rights, such as the acquisition of trademark protection by use, the protection of non-visual marks and the risk of association in the minds of the consumers. We are also interested in the search for a more complete procedural system than that already adopted in Algerian law. It would be important to have a judicial appeal against the refusal of registration and the opposition procedure against trademark applications ; two procedures neglected by the Algerian legislator. In the end, we try to seek a better protection of the well-known brand, to propose these concepts and principles, after trying to adapt them to the situation in Algeria, as solutions to make Algerian positive law more effective and complete
|
57 |
A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian GamesAlzahrani, Naif Saeed 16 July 2019 (has links)
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains.
Existing approaches suffer from two main drawbacks. They cannot detect tag reapplication attacks, wherein a counterfeiter removes a legitimate tag from a genuine product and reapplies it to a counterfeit or expired product. Second, most existing approaches typically rely on a central server to authenticate products. This is not scalable and creates tremendous processing burden on the server, since significant volumes of products flood through the supply chain's nodes. In addition, centralized supply chains require substantial data storage to store authentication records for all products. Moreover, as with centralized systems, traditional supply chains inherently have the problem of a single-point of failure.
The thesis of this dissertation is that a robust, scalable, counterfeiting-resistant supply chain that addresses the above drawbacks and can be simultaneously achieved by (i) using a combination of NFC tags on products and a distributed ledger such as blockchain for reapplication-proof, decentralized, and transparent product authentication (ii) a novel game-theoretical consensus protocol for enforcing true decentralization, and enhancing the protocol's security and performance.
In this dissertation, we first propose a new Tag Reapplication Detection (TRD) system to detect reapplication attacks using low-cost NFC tags and public key cryptography. To detect reapplication attacks, TRD tracks the number of times a tag has been read in the supply chain using a 'central' authentication server. Second, leveraging the blockchain technology, we propose the Block-Supply Chain, a transformation of TRD into a decentralized supply chain. In this chain, each node maintains a blockchain (distributed public ledger) per product. This blockchain comprises chained blocks, where each is an authentication event. The Block-Supply Chain can detect tag reapplication attacks and can replace the centralized supply chain design, thus overcoming the centralization issues.
One of the fundamental characteristics of blockchain technology is the consensus protocol. Consensus protocols ensure that all nodes in the blockchain network agree on the validity of a block to be included in the public ledger. The first and most popular of the existing consensus protocols is Proof of Work (PoW). However, PoW requires massive computational effort, resulting in high energy and computing resources consumption. Alternatively, Byzantine Fault Tolerance (BFT) protocols, such as Tendermint, were adapted in blockchain technology to be efficient and easy to implement. Nevertheless, not all of BFT protocols guarantee true decentralization, and they are mostly based on fixed-validators. BFT fixed-validators protocols typically rely on fixed, static validators responsible for validating all newly proposed blocks. This opens the door for adversaries to launch several attacks on these validators, such as Distributed Denial of Service (DDoS) and Eclipse attacks. In contrast, a truly decentralized protocol ensures that variable sets of anonymous validators execute the blocks' validations. Building on this observation, we propose the TrueBFT, a truly decentralized BFT-based consensus protocol that does not require PoW and randomly employs a different set of validators on each block's proposal. TrueBFT is designed for permissioned blockchains (in such blockchains, the participants who can transact on the blockchain are limited, and each participant is required to have permission to join the system). Our simulations show that TrueBFT offers remarkable performance with a satisfactory level of security compared to the state-of-the-art protocol Tendermint.
Another issue with current consensus protocols, particularly the BFT, is that the majority of them do not take the number of employed validators into consideration. The number of validators in a blockchain network influences its security and performance substantially. In response, we integrate a game theoretical model into TrueBFT that analyzes the risk likelihood of each proposer (i.e., the node that creates and proposes the new block). Consequently, each time a new block is proposed, the 'number of validators' becomes proportional to the risk likelihood block's proposer. Additionally, the game model reinforces the honest behavior of the validators by rewarding honest validators and punishing dishonest ones.
Together, TRD, Block-Supply Chain, and the game-theoretical TrueBFT consensus protocol enable robust, scalable, decentralized anti-counterfeiting supply chain that is resistant to tag reapplication attacks, as well as attacks to consensus protocols such as DDoS and Eclipse attacks.
|
58 |
Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsareSavostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
<p>Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. </p><p>The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. </p><p>Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. </p><p>Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.</p>
|
59 |
La contraffazione degli accessori moda di lusso: dalla vulnerabilità del mercato alle opportunità criminali / The Market of Counterfeit Luxury Leather Fashion Products: from Vulnerabilities to Opportunities for CrimeCALOVI, FRANCESCA 09 March 2007 (has links)
Questa tesi esplora il problema della contraffazione degli accessori moda di lusso allo scopo di capire le opportunità criminali che derivano dalle vulnerabilità del settore. Viene fornita prima una panoramica della contraffazione nel settore moda al fine di descrivere le caratteristiche principali del mercato illegale. Allo scopo di approfondire la conoscenza del fenomeno e delle opportunità criminali create dal mercato legale, viene quindi analizzata la struttura e il funzionamento del settore applicando la metodologia sviluppata dal centro di ricerca IRCP, la Methodology for and Assessment of the Vulnerability of Markets. Le domande principali a cui questa tesi vuole rispondere sono:
- Quanto è vulnerabile il mercato italiano degli accessori moda di lusso alla contraffazione?
- A quali fattori è imputabile la vulnerabilità alla contraffazione delle imprese italiane del settore moda? / This thesis is concerned with the problem of counterfeiting of leather luxury fashion goods and it is aimed at understanding the opportunities to crime produced by the vulnerabilities of this sector. First, it provides an overview of fashion counterfeiting trying to describe what the main features of the illegal market are. Then, in order to acquire a deeper knowledge of the phenomenon and of the opportunities arising in the legal market for the carrying out of illegal activities it analyses the structure and functioning of the sector in order to identify its vulnerabilities to this crime by applying the methodology for licit market scanning developed by the IRCP, the Methodology for and Assessment of the Vulnerability of Markets.
The main questions this thesis wants to answer are:
- To what extent are Italian luxury fashion companies vulnerable to counterfeit products?
- To what factors can be ascribed to the vulnerability to counterfeiting of Italian legitimate fashion companies?
|
60 |
Il Crime-Proofing della legislazione applicato alla contraffazione. Il caso del settore moda italiano / Crime-Proofing Regulation Against Counterfeiting. The Case of the Italian Fashion SectorMARTOCCHIA, SARA 10 March 2008 (has links)
Il crime-proofing è uno strumento di prevenzione criminale promosso dalla Commissione Europea fin dal 2000. Il concetto di crime-proofing parte dall'idea che la regolamentazione dei mercati legittimi possa essere criminogenica, ossia produrre involontariamente opportunità criminali (nuove tecniche, maggiori profitti e/o minori rischi a favore dei criminali). Lo scopo è identificare queste opportunità, se presenti, ed individuare possibili strategie di contrasto.
Questa tesi indaga il crime-proofing partendo da un modello di Crime Risk Assessment (CRAM) elaborato a questo scopo per la Commissione Europea. Il CRAM è stato adattato e applicato ad un fenomeno criminale di estrema attualità: la contraffazione dei marchi, con particolare riferimento al settore moda in Italia. La contraffazione è oggi una forma di economia sotterranea che ha alti impatti economici e sociali. Il settore moda è uno dei più colpiti, a causa dell'alta domanda di beni contraffatti e di basse barriere di ingresso al mercato. L'Italia è un paese leader nel mercato mondiale ed è fortemente vulnerabile alla contraffazione. Il crime risk assessment presentato in questo studio evidenzia come il quadro normativo italiano agevoli inavvertitamente l'industria della contraffazione, attraverso opportunità non previste e scappatoie nella regolazione.
Obiettivo finale è quello di verificare se il crime-proofing funziona, se la metodologia attuale può essere migliorata e come questa possa essere inserita nei processi di produzione legislativa, per minimizzare il rischio di conseguenze inattese. / Crime-proofing is a crime prevention method promoted by the EU Commission since 2000. It starts from the assumption that the regulation governing legitimate sectors/markets might be criminogenic, i.e. producing unexpected opportunities for crime, in terms of new techniques, higher rewards and/or lower risk to criminals. It therefore aims at identifying such opportunities, if any, and finding out possible remedies. This thesis explores the crime-proofing approach, starting from a Crime Risk Assessment Mechanism (CRAM) that was developed to this purpose for the EU Commission. This is adapted and applied to a topical criminal phenomenon: the counterfeiting of trademarks, with special reference to the Italian fashion sector. Counterfeiting is nowadays a form of underground economy, which produces negative economic and social impacts. Fashion is one of the most affected industries, because of high consumer demand of counterfeit goods and low barriers for market entry. Italy is a leader country in the global fashion industry and is highly vulnerable to counterfeiting. The crime risk assessment undertaken in this study highlights how the Italian regulatory framework may inadvertently facilitate the counterfeiting industry, through unintended opportunities and regulatory loopholes.
The ultimate goal is to check the crime-proofing functioning, whether the methodology can be improved and how it can be implemented at law-making level to minimize the risk of unexpected effects.
|
Page generated in 0.1186 seconds