{"id":92031,"date":"2015-10-15T12:00:00","date_gmt":"2015-10-15T10:00:00","guid":{"rendered":"https:\/\/industry-science.com\/artikel\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/"},"modified":"2025-07-25T18:09:26","modified_gmt":"2025-07-25T16:09:26","slug":"increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures","status":"publish","type":"article","link":"https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/","title":{"rendered":"Increased Security Through Anti-Counterfeiting Protection Measures"},"content":{"rendered":"<p><!-- GITO PUB shortened content start --><\/p>\n<div class=\"gito-pub-frontend-post-protected\"><\/div>\n<p><!-- GITO PUB shortened content end --><\/p>\n<div style=\"display:block;text-align:center !important;margin:30px 0;\">\n<div style=\"display:inline-block;border:1px solid #555;padding:10px;max-width:600px;text-align:left;\">\n<h2 class=\"gito-pub-download-section\"><center>Access limited<\/center><\/h2>\n<p>You are currently <strong>not logged in \/ not yet registered<\/strong>.<\/p>\n<p>In order to download the desired file(s), you must be logged in and have an appropriate inclusive subscription. Alternatively, you can also obtain access by paying a one-off fee.<\/p>\n<div style=\"text-align:center;\">\n<table style=\"width:90% !important;margin-left:5% !important;\">\n<thead>\n<tr>\n<th>Subscription<\/th>\n<th style=\"text-align:center !important;\">included<\/th>\n<th style=\"text-align:right;\">Purchase<\/th>\n<tr><\/thead>\n<tbody>\n<tr>\n<td>without<\/td>\n<td style=\"text-align:center !important;\">&#8722;<\/td>\n<td style=\"text-align:right;\">29,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Digital<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Expert<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr>\n<tr>\n<td>Professional<\/td>\n<td style=\"text-align:center !important;\"><span style=\"color:var(--company-color);font-weight:bold;font-size:16px;\">&#10003;<\/span><\/td>\n<td style=\"text-align:right;\">0,00 \u20ac<\/td>\n<tr><\/tbody>\n<\/table>\n<p><button style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-login-register-link gito-pub-reporting-abo-button\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/92031\/\" data-type=\"abo-button-login\">Register \/ book subscription<\/button><a href=\"https:\/\/industry-science.com\/en\/checkout\/?add-to-cart=92031&#038;quantity=1\" style=\"font-size:14px;margin:10px;\" class=\"button gito-pub-reporting-abo-button\" data-type=\"abo-button-onetime\">Download for one time 29,00 \u20ac<\/a><\/p>\n<p><small>All prices include 7% VAT<\/small><\/p>\n<p><small>After purchasing access rights, you will automatically be redirected back to this page.<\/small><\/p>\n<\/div>\n<\/div>\n<\/div>\n<br>Potentials: <span class=\"gito-pub-tag-element\"><a href=\"\/potentials\/product-piracy\/\">Product Piracy<\/a><\/span> <div class=\"gito-pub-tags-social-share\" style=\"display:flex;justify-content:space-between;\"><div>Tags: <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/anti-counterfeiting\/\">Anti-Counterfeiting<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/countermeasures\/\">countermeasures<\/a><\/span> <span class=\"gito-pub-tag-element\"><a href=\"\/tag\/security-requirements\/\">security requirements<\/a><\/span> <\/div><div><div class=\"social-icons share-icons share-row relative\" ><a href=\"whatsapp:\/\/send?text=Increased%20Security%20Through%20Anti-Counterfeiting%20Protection%20Measures - https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/\" data-action=\"share\/whatsapp\/share\" class=\"icon button circle is-outline tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\"><i class=\"icon-whatsapp\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" rel=\"noopener nofollow\"><i class=\"icon-facebook\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/x.com\/share?url=https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip x\" title=\"Share on X\" aria-label=\"Share on X\" rel=\"noopener nofollow\"><i class=\"icon-x\" aria-hidden=\"true\"><\/i><\/a><a href=\"mailto:?subject=Increased%20Security%20Through%20Anti-Counterfeiting%20Protection%20Measures&body=Check%20this%20out%3A%20https%3A%2F%2Findustry-science.com%2Fen%2Farticles%2Fincreased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures%2F\" class=\"icon button circle is-outline tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" rel=\"nofollow\"><i class=\"icon-envelop\" aria-hidden=\"true\"><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/&title=Increased%20Security%20Through%20Anti-Counterfeiting%20Protection%20Measures\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" target=\"_blank\" class=\"icon button circle is-outline tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" rel=\"noopener nofollow\"><i class=\"icon-linkedin\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><hr style=\"margin-top:0px;\">\n","protected":false},"excerpt":{"rendered":"<p>Both globalization and digitalization yield high potential for an efficient exchange and use of information on the one hand, but on the other hand also require new levels of data management and security. In order to be able to exploit the full return on innovation, original producers need to secure their knowledge and competitive advantage, not ignoring the rising risk of being imitated any longer. Nowadays it is not sufficient to simply reduce the length of innovation cycles. Instead, companies have to actively invest into anti-counterfeiting measures in order to secure their local and global competitive advantage. Requirements relating to the security and effectivity of technical anti-counterfeiting concepts, and the development of such a security measure, are the subject of this article.<\/p>\n","protected":false},"featured_media":97149,"menu_order":0,"template":"","categories":[],"tags":[71502,74725,74726],"product_cat":[3300],"topic":[],"technology":[],"knowhow":[],"industry":[],"writer":[82407,81033,82405,82406],"content-type":[],"potential":[71038],"solution":[],"glossary":[],"class_list":{"0":"post-92031","1":"article","2":"type-article","3":"status-publish","4":"has-post-thumbnail","6":"tag-anti-counterfeiting","7":"tag-countermeasures","8":"tag-security-requirements","9":"product_cat-article","10":"writer-christian-kaegeler-en","11":"writer-eberhard-abele-en","12":"writer-eugenia-gossen-en","13":"writer-leonardo-gerardi-en","14":"potential-product-piracy","15":"product","16":"first","17":"instock","18":"downloadable","19":"virtual","20":"sold-individually","21":"taxable","22":"purchasable","23":"product-type-article"},"uagb_featured_image_src":{"full":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788.jpg",1400,788,false],"thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-150x150.jpg",150,150,true],"medium":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-666x375.jpg",666,375,true],"medium_large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-768x432.jpg",768,432,true],"large":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-1024x576.jpg",1020,574,true],"front-page-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-1032x320.jpg",1032,320,true],"post-entry":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-764x376.jpg",764,376,true],"post-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-392x320.jpg",392,320,true],"post-teaser-mobile":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-608x496.jpg",608,496,true],"post-custom-size":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-640x325.jpg",640,325,true],"whitepaper-teaser":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-274x376.jpg",274,376,true],"card-big":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-514x292.jpg",514,292,true],"card-portrait":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-320x440.jpg",320,440,true],"card-big-company":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-514x289.jpg",514,289,true],"gp-listing":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-196x180.jpg",196,180,true],"1536x1536":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788.jpg",1400,788,false],"2048x2048":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788.jpg",1400,788,false],"woocommerce_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-510x510.jpg",510,510,true],"woocommerce_single":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-510x287.jpg",510,287,true],"woocommerce_gallery_thumbnail":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-100x100.jpg",100,100,true],"dgwt-wcas-product-suggestion":["https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-64x36.jpg",64,36,true]},"uagb_author_info":{"display_name":"Christoph Brocks","author_link":"https:\/\/industry-science.com\/en\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Both globalization and digitalization yield high potential for an efficient exchange and use of information on the one hand, but on the other hand also require new levels of data management and security. In order to be able to exploit the full return on innovation, original producers need to secure their knowledge and competitive advantage,&hellip;","_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article\/92031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/article"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media\/97149"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=92031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/categories?post=92031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/tags?post=92031"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/product_cat?post=92031"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/topic?post=92031"},{"taxonomy":"technology","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/technology?post=92031"},{"taxonomy":"knowhow","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/knowhow?post=92031"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/industry?post=92031"},{"taxonomy":"writer","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/writer?post=92031"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/content-type?post=92031"},{"taxonomy":"potential","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/potential?post=92031"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/solution?post=92031"},{"taxonomy":"glossary","embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/glossary?post=92031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}