Trade in merchandise that infringes on intellectual property rights has become a serious concern, with the globalization of product sales activities and diversification of Internet-based sales and other sales channels. Concerns include injuries and damages from counterfeit goods and the inclusion of imitation goods in bulk containers.Our solution enables consumers, as well as distributors and other stakeholders, to verify the authenticity of merchandise. This solution can provide your customers with reassurance and security as well as help to boost your company’s anti-counterfeiting efforts and brand image.

With our solution, potential customers use their smartphone to scan a ConnectedTag (an ID tag to certify that a product is genuine) affixed to or packaged with the product. The tag data are transmitted to a cloud server where the product’s authenticity is verified and the results are sent back and displayed on the smartphone’s screen. Several ConnectedTag verification methods are available, including NFC (RFID) tags, QR codes, or security codes.

  • Companies dealing with non-genuine products (counterfeits, products sold through unauthorized channels, etc.)
  • Companies wishing to provide more reassurance to consumers at the time of purchase and to enhance their brand image
  • Companies considering sales expansion strategies using, for example, domestic sales channels or international expansion
  • Easy & accurate way for consumers to verify authenticity of a product Digital data matching is used to verify the authenticity of the product. Consumers can obtain accurate verification results without any special knowledge or experience, or any dependence on visual confirmations or other specific skills. All the consumer needs to verify the authenticity of a product is a smartphone (no special devices or special filters are needed). This eliminates costs for companies introducing the solution while making the service accessible to ordinary consumers.
  • Customizable verification ID tags (ConnectedTags)ConnectedTag is an umbrella term for our tag products containing ID data that can be authenticated online. Examples include NFC (RFID) tags, variable QR codes, and security codes. Many variations are available, such as seals or cards, and the size and design of the tags can be tailored to suit any application. ConnectedTags work with consumer electronics, medical supplies, luxury goods, food and beverage products, and many other types of products.
  • Dynamic IT strategies
     
    Product authenticity verification logs (date and time, verification results, location information, tag ID data, running total of verifications, specific device information, etc.) can be analyzed and the analysis results can be used to drive users from the verification service app to your website or product pages on social media. Our solution can be utilized as a part of dynamic IT strategies to bolster your marketing strength.
  • Solution interfaces with IPM, the World Customs Organization’s anti-counterfeiting tool for customs authorities around the worldCustoms authorities that use IPM can verify the authenticity of products of companies using both IPM and C2V Connected, who wants to stop counterfeit products.
  • Providing our technology for verifying genuine Canon products in the China market as a cloud service Canon China has relied on the core technology of C2V Connected to verify genuine Canon-manufactured cameras since 2013. (See the solution case studies for details.) By using this technology as a cloud service, it will be possible to quickly and inexpensively roll out next-generation online product authenticity verifications.

Application (for verification)

We provide a smartphone app that lets consumers easily and accurately verify the authenticity of a product with the ID data contained in a ConnectedTag (web-browser based verification is also available).
You can customize the app’s screen (custom skins) to feature product images or your corporate logo.
Note: Screenshot images show a conceptual Android app.

Application (menu)

The smartphone app menus can also be customized.
Use custom menus for marketing purposes, such as enticing users to your website, a special campaign site, or a product information site.

導入企業様の管理者画面

Administrator screen

The C2V Connected cloud server keeps a log of the date and time when verifications are made, the verification results, user location information, tag ID data, the running total of verifications, and other statistics. Administrators at companies using the solution can view logs and download log data. Analyze log data to determine product usage by consumer region or to find trends in detections of non-genuine products.

Connectivity with IPM

Our solution can interface with IPM, an anti-counterfeiting tool supplied by the World Customs Organization (WCO) for customs authorities around the world.
Customs authorities that use IPM can verify the authenticity of products of companies using both IPM and C2V Connected, who wants to stop counterfeit products.
Note: To use IPM, it is needed to complete an agreement with the WCO.

The manufacturer or sales company attaches ID tags (ConnectedTags) to products prior to shipping.
Consumers scan the ConnectedTag with a smartphone browser or app and verify whether the product is genuine.
When the product is verified as genuine, the manufacturer or sales company can direct the consumer to its Internet content (websites, etc.). Administrators at the manufacturer or sales company can view verification logs via a web browser and download log data.

How Canon China uses an online verification solution:

Canon China uses an online verification solution to verify the authenticity of Canon digital SLR cameras.
Canon China seals product packages with a seal containing a verification ID tag. The seal also signals that the package has not been opened or tampered with. This lets consumers verify the product’s authenticity before purchasing.
A PUF-based RFID tag is used because it is practically impossible to duplicate.

Examples of products applicable for C2V Connected

  • Cosmetics, high-grade food products, food ingredients
    The circulation of counterfeit products may cause unexpected consequences for consumers and may even endanger their health.
  • Branded products (bags, watches, etc.)
    The circulation of counterfeits tarnishes the brand’s market value and prestige.
  • Electrical products
    Using counterfeit batteries or other non-genuine replacement parts may damage the original product or cause malfunctions.
  • Sporting goods
    Crude knock-offs of golf clubs, tennis rackets, and other sporting goods may cause injuries or accidents.

ConnectedTags (verification ID tags)

NFC tags

  • Verification tags that can be scanned with smartphones with an NFC reader.
  • We also provide high-security PUF-based RFID tags that are practically impossible to duplicate or fake.

QR code tags

  • QR code based verification tags that can be scanned with camera-equipped smartphones.
  • Cheaper to implement than NFC tags.

The following are samples of standard seal-type tags.
We also provide card-type NFC tags and tags with designs, materials, and sizes tailored for specific product packages.

Standard sample (1) — NFC, vulnerability seal-type tag

This is a NFC (RFID) seal-type tag with a vulnerability specification that can also be used to signal that the package has not been opened or tampered with. We also offer highly tamper-resistant PUF-based RFID tags that are practically impossible to duplicate.
(Size:58mm×32mm)

Standard sample (2) — Two-layer QR code seal-type tag

A two-layer seal, in which the cover seal is removed to reveal the QR code underneath.
(Size:diameter 30mm)

Standard sample (3) — Security code tag

This is a small seal-type tag. Users verify the product’s authenticity by entering the Security code into the smartphone app.
(Size:11mm×9mm)

Physical Unclonable Function (PUF) technology

Microstructures — so-called IC chip fingerprints — unique to each IC chip are formed in the chip-fabrication process. By digitizing and identifying these microstructures, they can function as PUF parameters. PUF parameters are distinguished by having unpredictable but permanent output patterns. Therefore, even if the LSI circuit pattern were copied, it would still be possible to differentiate between the original and the copy, which makes PUF technology very useful for stopping counterfeits.

Near Field Communication (NFC) functions

NFC is an ISO-standardized short-range wireless communication technology. More and more smartphones today use NFC to implement contactless IC card functions or reader / writer functions. NFC supports the Type A, Type B, FeliCa, and ISO 15693 communication protocols.

World Customs Organization (WCO)

The WCO is an international organization headquartered in Brussels, Belgium. It was established in 1952 with the aims of facilitating international trade and harmonizing and unifying customs procedures between countries. In cooperation with its member states, the organization advances international technical collaborations in such areas as conventions on customs, creation of international trade guidelines, and controlling cross-border trafficking of illegal drugs and products infringing on intellectual property rights. Funded by contributions from its member states, the WCO had 180 national and regional members as of December 2015. Japan joined the WCO in 1964.

The WCO website will open in a separate browser window

Interface Public-Members (IPM)

IPM is an online anti-counterfeiting system that connects customs authorities worldwide with rights holders through a common platform. The WCO develops and operates the IPM platform. Customs authorities with inspection powers are very effective in stemming the flow of counterfeit goods, as customs authorities discover approximately 70 percent of the counterfeit products seized around the world. IPM was launched in 2011 through discussions and collaborations between rights-holder groups and the WCO.
Rights holders who are IPM members register with the IPM system information about their trademarks and products that is used when assessing authenticity. Customs officers can access this information on the ground. IPM also provides a common interface for customs officers and rights holders to communicate with each other. As of December 2015, 91 of WCO’s 180 member countries had joined IPM, and the IPM database contained information on more than 20,000 specific products.
IPM can also interface with authenticity verification services provided by WCO-certified security solution providers (IPM Connected).

The IPM website will open in a separate browser window