Technischer Leitfaden  gegen Produkt- und Markenpiraterie, EUIPO,  ACAPT-Leitfaden, Rechtsanwalt, Markenrecht, Designrecht, Patentrecht

Guide

Against

from

Product and trademark piracy is a major problem for many companies. But how can you defend yourself against it and, above all, make your own products distinguishable from fakes and protect them against counterfeiting?

The growing threat of counterfeiting

Product and trademark piracy is one of the biggest challenges for companies in the globalized economy. According to a study by the European Union Intellectual Property Office (EUIPO ), counterfeit products accounted for up to 5.8% of EU imports in 2019 – a value of around 119 billion euros. The economic consequences are devastating: estimated losses of 670,000 direct jobs and 15 billion euros in tax revenue in the EU. Small and medium-sized enterprises (SMEs) are particularly affected, as counterfeiting is far more likely to force them to close down than larger companies.

To counter this threat, the EUIPO has developed the comprehensive anti-counterfeiting and anti-piracy technology guide (ACAPT Guide) a valuable resource for right holders and businesses of all sizes.

What is the ACAPT guide?

The ACAPT Guide is a comprehensive guide developed by the European Observatory on Infringements of Intellectual Property Rights in cooperation with the Italian Patent and Trademark Office. The guide provides a knowledge base of over 40 to 46 different technologies to combat counterfeiting and piracy.

The guide is explicitly aimed at:

  • Retailers and companies of all sizes
  • Small and medium-sized enterprises (SMEs)
  • Industry-independent traders
  • Both experts and beginners in the field of anti-counterfeiting

The special feature: The ACAPT guide is made available as an interactive web tool.

Technology categories in the ACAPT guide

The guide structures the available technologies into different categories, which differ according to the application method:

Electronic technologies

This category includes electronic identification, authentication and tracking devices that are connected to the product:

RFID (Radio Frequency Identification): RFID tags can store extensive data about a product, including origin, date of manufacture and unique identifiers. This information is read by RFID readers at various points in the supply chain to ensure that the product is authentic and has not been tampered with. Battery-powered RFID tags in particular offer the advantage of larger, potentially rewritable memories and the ability to process and store information.

NFC (Near Field Communication): NFC enables the authentication of products by simply scanning them with a smartphone. This technology offers a low-threshold way for consumers to check the authenticity of a product.

Other electronic technologies:

  • Electronic seals
  • Magnetic strip
  • Contact chips

2. marking technologies

Visible or invisible trademarks that are incorporated into the product or packaging:

Security holograms: Holograms are used to authenticate products and are difficult to replicate due to their complex structure. They can contain multiple layers of information, which makes them highly secure. Successful authentication requires knowledge of the original hologram as a basis for comparison.

Special inks:

  • UV-sensitive inks
  • Reactive inks
  • Thermochromic inks (color-changing inks)

Other marking technologies:

  • Optical memory strips
  • Machine-readable codes (e.g. QR codes in combination with other authentication technologies)
  • Encrypted images
  • Watermark
  • Microtexts
  • Unique identification marks
  • Copy Detection Patterns (secure graphics)

Chemical and physical technologies

Chemical or physical processes or substances are used to mark and verify the product:

DNA coding: DNA coding involves embedding a unique DNA marker in a product or its packaging. This trademark is virtually impossible to replicate and offers the highest level of security. The technology uses synthetic DNA sequences that serve as a counterfeit-proof “molecular fingerprint”.

Laser engraving: Laser engraving can be used to mark products with unique identifiers that are difficult to change or remove. This technology provides permanent and tamper-proof markings.

Mechanical technologies

Material elements or processes applied to the product for authentication and/or tamper protection:

  • Sealing devices that hermetically seal packaging
  • Special locking systems
  • Tamper-proof packaging elements

Technologies for digital content

Especially for the protection of digital products:

Digital watermarking: This technology embeds information in digital files that can be used to verify their authenticity.

DRM (Digital Rights Management): DRM systems control the use of digital content and prevent unauthorized copying and distribution. These technologies are essential for companies that trade in digital products such as software, music and videos.

6 Supplementary tools and standards

Blockchain (Shared Ledger Technology): The guide also discusses blockchain as a tool that can be used in combination with other technologies to strengthen overall anti-counterfeiting measures. Blockchain provides tamper-proof, transparent records of the entire supply chain.

ISO standards: Relevant ISO standards are explained that support the implementation and effectiveness of anti-counterfeiting strategies.

Practical functions of the ACAPT guide

The ACAPT guide offers several search functions to support rights holders in selecting the appropriate technology:

  1. Free search: Search for any terms with additional filters
  2. Guided search: A series of questions leads you to the right technology
  3. Category-based search: Browse categories, subcategories and knowledge articles
  4. Glossary: Definitions of important terms and concepts

The search results can be filtered according to various criteria:

  • Product type (physical or digital)
  • Intended use of the technology
  • Industry-specific requirements

How companies benefit from the ACAPT guidelines

Strategic advantages

  • Comprehensive information base: The guide provides detailed descriptions of each technology, practical implementation advice and application examples.
  • Cost efficiency: For SMEs in particular, it is crucial to find the right technical solution without making costly mistakes. The guide helps to identify the optimal technology for specific needs and budgets.
  • Preventive measures: According to an EUIPO study from 2022, the most common reason for SMEs to register intellectual property laws was to prevent copying. The ACAPT guide supports this preventive strategy with technological solutions.
  • Risk minimization: Product counterfeiting significantly increases the risk of an SME being forced to close down or even become insolvent. These risks can be minimized through suitable protective measures.

Practical application for own products

Step 1: Needs analysis Use the guided search in the ACAPT guide to identify suitable technologies based on your product characteristics, industry and protection requirements.

Step 2: Technology comparison Compare different technologies in terms of:

  • Implementation costs
  • Security level
  • User-friendliness for consumers
  • Integration options in existing processes
  • Scalability

Step 3: Combination strategies Many technologies only develop their full effect in combination. For example, QR codes can be combined with holograms, copy detection patterns or unique identifiers to enable automated authentication via smartphone scan.

Step 4: Integration into the supply chain Electronic technologies such as RFID enable the tracking and authentication of products along the entire supply chain – from the manufacturer to the end consumer.

Step 5: Consumer engagement Technologies such as NFC and QR codes allow consumers to verify the authenticity of products themselves, which strengthens trust in the trademark .

Conclusion: A tool in the fight against counterfeiting

The EUIPO’s ACAPT Guide is more than just a source of information – it is a strategic tool for rights holders to develop a tailored anti-counterfeiting strategy. At a time when counterfeiting no longer only affects luxury goods, but also everyday products such as food, cosmetics, textiles and even essential spare parts for wind turbines, trains and airplanes, proactive protection is essential.

The variety of technologies presented – from established solutions such as holograms to innovative approaches such as DNA coding and blockchain – enables companies of all sizes and industries to find the optimal solution for their specific needs.

For rights holders, investing in suitable anti-counterfeiting technologies is a sensible measure to protect the trademark, the customers and ultimately the existence of the company.

We are happy to

advise you about

Trademark law!

Our services

GTC for e-commerce

We create, check and design customized and legally compliant GTC for your e-commerce project and advise you on all questions of GTC law.

Mehr erfahren

Advice on competition law

We advise you on all questions relating to competition law and unfair competition law, examine advertising measures and advise you on advertising measures.

Mehr erfahren

Advice on patent law

We advise you on all questions of patent law, in particular licensing and enforcement of patent claims. We work together with external patent attorneys on applications and searches.

Mehr erfahren

Successful against infringement of trade secrets

We defend your know-how and trade secrets and take action against infringements to combat them quickly and effectively.

Mehr erfahren

Effective defense for trade secret infringement

Effective defense of cease and desist letters and trade secret infringement claims to achieve the best possible legal and economic outcome.

Mehr erfahren

External data protection officer

Through our cooperation partner, Obsecom GmbH, we offer external data protection officers for data controllers and processors.

Mehr erfahren

Relevant posts

Do you have any questions?

We are happy to help you.

Contact

Maximum file size: 10MB