Machines with built-in copy protection

December 10, 2012
Researchers are developing technical safeguards. Credit: Volker Steger

Pirated goods cost German industry billions, and expensive industrial goods like machining systems are becoming a growing target. Scientists are turning the tables on the forgers by studying their methods and developing anti-counterfeit solutions.

The annual cost to industry of of branded products is estimated at a staggering 650 billion U.S. dollars worldwide, and German machine tool manufacturers are becoming an increasingly popular target for pirating operations. Around one third of all companies have seen their business eroded by cheap imitations of their products, especially manufacturers of textile machines, compressors and plastics processing equipment. "Most companies have absolutely no idea just how easily their products can be copied," says Bartol Filipovic, head of the Product Protection department at the Fraunhofer Research Institution for Applied and Integrated Security AISEC in Garching near Munich. The AISEC advises companies on how best to protect their products and IT services from unlawful attacks on their proprietary rights (overview of product protection:

In the world of industrial machines, there are forgeries of almost everything that can be copied, from housing design to instruction manuals. The most critical elements are those that give a product its "intrinsic value": and software that constitute its . This makes embedded systems with measurement, control, or signal processing functions prime targets for forgers. Product pirates tend to steer clear of getting their own hands dirty, preferring to engage the services of those offering "reverse engineering". This involves performing the same development process only in the opposite direction, which begins by analyzing exactly how the hardware is put together and creating circuit diagrams of the original product. Reverse engineers can then rip the software and reconstruct the machine's control system and functions, thereby gaining access to the manufacturer's key know-how.

In addition to conducting research, AISEC's most important role is instructive. Many companies react only once counterfeits of their own products have surfaced on the market. Although it is then too late to prevent fake copies, it is possible to tag the original so that it can be distinguished from imitations. The aviation industry marks safety-critical spare parts with copy-resistant holograms; it is also possible to build a kind of indelible electronic fingerprint into the circuit. But taking any number of safety precautions is not going to be enough to deter manufacturers of fake products, and trade in them can only be stopped when customs officers, distributors and customers are all equipped with the devices needed to read and decode the markings. As this is often not the case, companies should see to it that suitable protection mechanisms are placed deep within the hardware when developing each new product range. The optimum scenario is for clients to consult AISEC before completing this phase, and have their developers share the proposed hardware setup, circuit diagrams and software with AISEC's product protection team – in strictest confidence, of course. AISEC's researchers analyze this information to identify any weaknesses and offer suggestions for making the product more secure.

Targeted technical methods guard against forgery

One option is to install cryptographic devices that encrypt the data stored within the machine. These devices generate the corresponding decryption key based on the duration of electrical signals on the microchip. The signals emitted by other chips, even those from the same production batch, will be of a slightly different duration, rendering the key unusable. Another option is to use hardwired control units. These purpose-built chips make it extremely difficult for offenders to rip the software and run it using standard chips built into product imitations. However, it is possible for companies to safeguard computer programs without the need for special hardware; for instance by adopting obfuscation techniques. It is definitely worthwhile for companies to analyze and develop suitable technical safeguards, says Bartol Filipovic. "The service we provide is less costly than the damages inflicted by product piracy." The cost of such services varies according to the scope of analysis and the extent of the protection required.

Through its advice, AISEC aims to buy companies as much time as possible. Companies that have implemented AISEC recommendations enjoy at least five to ten years relief from attacks by product counterfeiters. This time lead is crucial for companies to protect their expensive investments. The technological know-how required to manufacture industrial goods does not go out of date as quickly as that for consumer goods, making it thoroughly worthwhile for forgers to copy a machine even if it has already been on the market for five years. Equipping goods with the latest protection methods means that forgers would simply be wasting their time. "I'm not aware of a single case where someone has successfully broken through our safeguards," says Filipovic.

Explore further: Fingerprint makes chips counterfeit-proof

Related Stories

Fingerprint makes chips counterfeit-proof

February 8, 2011

Product counterfeiters are increasingly targeting chips and electronic components, with attacks on hardware modules becoming commonplace. Tailor-made security technology utilizes a component‘s individual material properties ...

Secure updates for navigation systems and company

October 5, 2011

At the push of a button by the driver, control units download the car manufacturer's new software -- such as enhanced map material for the navigation system. To ensure that this data channel is protected from hacker attack, ...

Explosives prevent technology theft

June 25, 2009

Product piracy causes billions worth of damage worldwide. A combination of visible and invisible copy protection is really effective against this. Explosive embossing is an economical procedure and can be used for mass-produced ...

New statistics on business innovation released by NSF

October 6, 2010

Preliminary figures from the Business R&D and Innovation Survey (BRDIS)--fielded for the first time in 2009--indicate that some 22 percent of companies in manufacturing industries reported one or more product innovations ...

NEC Develops Software to Give Companies Competitive Edge

December 4, 2007

NEC has developed a software that will aid companies in essential decision making for releasing new products. In addition, the software will monitor and analyze a company´s competitors products and services to keep up with ...

Software with X- Factor

July 29, 2004

Cambridge Consultants launches xIDE - a generic Integrated Development Environment (IDE) that can be customized for embedded system and semiconductor companies to create software development kits for ASSP, structured ASIC, ...

Recommended for you

A not-quite-random walk demystifies the algorithm

December 15, 2017

The algorithm is having a cultural moment. Originally a math and computer science term, algorithms are now used to account for everything from military drone strikes and financial market forecasts to Google search results.

US faces moment of truth on 'net neutrality'

December 14, 2017

The acrimonious battle over "net neutrality" in America comes to a head Thursday with a US agency set to vote to roll back rules enacted two years earlier aimed at preventing a "two-speed" internet.

FCC votes along party lines to end 'net neutrality' (Update)

December 14, 2017

The Federal Communications Commission repealed the Obama-era "net neutrality" rules Thursday, giving internet service providers like Verizon, Comcast and AT&T a free hand to slow or block websites and apps as they see fit ...

The wet road to fast and stable batteries

December 14, 2017

An international team of scientists—including several researchers from the U.S. Department of Energy's (DOE) Argonne National Laboratory—has discovered an anode battery material with superfast charging and stable operation ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.