Committed to connecting the world

WTISD

Demo on ​a solution to combat Counterfeiting of ICT products based on the Digital Object Architecture

22 APRIL 2015, 14:30-15:45, ITU, GENEVA

At the planned SG11 meeting (22-29 April 2015) Q8/11 will start its work running a demonstration on "A solution to combat Counterfeiting of ICT products based on the Digital Object Architecture (DOA)" scheduled on 22 April 2015 (14:30-15:45). The aim of this event is to show how a digital object architecture (DOA) based solution may be implemented to combat counterfeiting of ICT products. Using DOA the demonstration showcases features allowing the full supply chain tracking and tracing from the manufacturer to the retailer of mobile devices.

SPEAKER:
Alexander NTOKO (Chief, Operations and Planning Department/TSB) [ Biography ] [ Presentation ]

OBJECTIVES:
The DEMO has the objectives to show how a DOA based solution may be implemented to combat counterfeiting of ICT products. TSB will also be running a Q&A session to further explain DOA and also its relationship with Recommendation ITU-T X.1255 and PP-14 Resolution 188 (BUSAN, 2014) "Combating counterfeit telecommunication/information and communication technology devices".

SCOPE:
Using DOA, this demo showcases features allowing the full supply chain tracking and tracing from the manufacturer to the retailer of mobile devices. Utilizing the built-in public key infrastructure (PKI) of the DOA, this concept solution uses digital signatures for authentication and data integrity of the mobile device information. This same PKI is also used in conjunction with strong cryptographic hash and additional mathematical functions to create a digital fingerprint of the mobile device at the time of manufacturing. This ensures strong authentication and digital integrity of the information for the mobile device. This process is repeated during validation of the device where the fingerprint of the device created during the manufacturing process is compared with the fingerprint generated based on the candidate device. The device's fingerprint, several properties of the device (including some of its unique identifiers such as IMEI, MAC address, device serial number etc.)  plus logistical information are together used in the validation process.

RELATED ITU NEWSLOG

CONTACT:
tsbsg11@itu.int