blockchain to combat counterfeit products final 2

23
Blockchain to Combat Counterfeit Products 28 June 2016 ITU Workshop Presentation-Geneva Dr. Adrian McCullagh PhD (IT Sec), LLB (Hons) ODMOB Lawyers [email protected] Professor John Flood PhD (Sociology), LLB, LLM Director of the Law Futures Centre Griffith University [email protected]

Upload: admac57

Post on 07-Jul-2016

15 views

Category:

Documents


1 download

DESCRIPTION

This is the presentation that Professor John Flood and I presented at teh ITU workshop in Geneva on 28 June 2016.The presentation concentrates on one possible use of blockchain technology in combating counterfeit products.Counterfeit products are a major problem in trade as it occurs not only in high value consumer goods but also in telecommunications equipment that is used to support critical infrastructure. Counterfeit products are also prevalent in the pharmaceutical sector. This paper presents a research and development construct that Griffith University in working on through a multi-disciplinary apprach involving lawyers and IT researchers.

TRANSCRIPT

Blockchain to Combat Counterfeit

Products

28 June 2016

ITU Workshop Presentation-GenevaDr. Adrian McCullagh PhD (IT Sec), LLB (Hons)

ODMOB Lawyers

[email protected]

Professor John Flood PhD (Sociology), LLB, LLM

Director of the Law Futures Centre

Griffith University

[email protected]

Disclaimer PLEASE NOTE: the information disclosed in the presentation is NOT the

provision of Legal advice or Professional Services advice. If a reader/attendee has an issue then they should seek appropriate legal/technical advice. The author/presenter makes no warranty as to correctness of anything contained in this presentation. The topic of this presentation is ever changing at a rapid rate and as such this presentation is the sole opinion of the author/presenter and must not be relied upon as either legal or technical advice. Every situation is different and as such proper analysis must be undertaken when seeking professional advice.

Consequently, the author/presenter takes no responsibility for any errors that may exist in this paper and certainly takes no responsibility if any reader/attendee takes any actions based on what is (expressly or by implication) contained in this paper/presentation.

All readers/attendees take full responsibility for anything they may do in reliance of anything contained in this paper/presentation.

28 June 2016

2

Agenda

What is the Blockchain?

Advantages of the Blockchain

Blockchain Disadvantages

Blockchain: Disruptive Technology

against Counterfeiters

Future Research

Conclusion

3

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: The Genesis Thesis

A blockchain is basically a distributed ledger (multiple

copies of the same thing) that has the following

characteristics:

• Once a transaction is recorded in the blockchain

it cannot be deleted or edited without leaving

some trace of such deletion or alteration. It

becomes in effect a permanent record for

eternity

• Any attempted changes to the record will

automatically be identified which will cause all

parties to investigate what has gone wrong

• In essence, the blockchain becomes a tamper

evident record of transactions (immutable)

4

28 June 2016

Blockchain: No Single Point of Failure

No central party will necessarily control the

blockchain; BUT some private blockchains that

are being developed will be controlled by a

central authority

Being a distributed ledger, a number of copies will

be established which makes it difficult for

unauthorised third parties to successfully hack

every copy of the ledger

Therefore, there is no single point of failure. It

would require a hacker to simultaneously attack

at least 51% of all copies which is just not feasible

5

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Access Control Blockchain can be designed as a permissioned

blockchain or as a permissionless blockchain

(Bitcoin)

Permissioned blockchains will only allow

authorised persons the right to read and add to

the blockchain and R3CEV is an example

Further, with a permissioned blockchain it is

possible to allow everyone access to read the

blockchain but only a few to add to the

blockchain

6

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain Advantages

The blockchain has the following advantages:

• reliable and available to all participants

• transparent as all participants have read access

• immutable integrity is guaranteed

• deployed in non-face-to-face transactions

• time reduction between the transaction start and

settlement

• covers any type of asset (intangible and tangible),

not just bitcoin, e.g. diamonds, land, and securities

• reduces friction costs by disintermediating third

party involvement

7

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain Disadvantages Blockchains are simple a fairly dumb data repository that still

require a software application layered on top to achieve any

benefit.

Sir Mark Walport, UK Chief Scientist, says: “the implementation of

distributive ledgers with embedded smart contracts should lead to

substantial improvements in compliance, cost efficiency and

accountability”.

Sir Mark is correct but as yet there is very few smart-contracts in

place and further investigation needs to be undertaken.

Hence the disadvantage is the current lack of commercially

oriented and robust smart contracts.

Carefully structured applications/smart-contracts can disrupt

counterfeiters in the market place

8

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Disruptive Technology Against

Counterfeiters Having an immutable record of manufacture for

a product is only a partial solution

Instead of preventing counterfeiters producing a

product, the blockchain can disrupt their market

by arming the user with tools to authenticate their

acquired product

9

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Disruptive Scheme

Each product will need to be marked with a

tamper-proof mark which can be scanned by a

hand-held device

The number of smartphone users is forecast to

grow from 1.5 billion in 2014 to around 2.5 billion

in 2019, with increased smartphone penetration

rates as well

Smartphones are ideal mobile devices to assist in

disrupting the counterfeiter

10

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Disruptive Scheme (cont.) QR codes are ideal tamper-evident marks

QR codes are coded with unique reference codes which are the hash of the following information probably a Merkle tree will utilised:

Manufacturer details

Product details

Serial number of the product

Manufacture date

Batch number of manufacture

Date of manufacture

Factory location for manufacture

11

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Disruptive Scheme (cont.)

Users will download an authorised smartphone

application (Authentication App) from the

manufacturer’s site that has been enhanced with

extended validation certificates for SSL

communications

Authentication Apps have specific and

restricted/limited functionality

People who download the Authentication App

will need to register in order to download.

12

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Functionality: Authentication App Authentication App functionality:

• It will read embedded QR codes on the user’s

device which will be a unique hash code.

• It will only be directed to a specific IP address

• It will cause the blockchain to be interrogated

to deliver the information validating the

product in question

Manufacturer’s system will undertake a challenge

response to allow the Authentication App access.

13

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Authentication App Protocol

The proposed high level protocol is as follows:

• Each manufacturer will register the public key

embedded in an X509 v3 certificate that

corresponds to their software signing private

key with each reputable browser

manufacturer

• The Authentication App will be validated

through the X509 Cert within the browser

14

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: New Protocol Development

The high level protocol will require counterfeiters to infiltrate every user’s smartphone in order to fool the system.

For certain items in may be prudent to double validate thus requiring two hand held devices to corroborate the information embedded in the QR Code and the information on the blockchain.

Further, the Authentication Protocol need not just be available for end users but will also be able to be utilised by custom agents who monitor importation of products.

It will also be available for law enforcement.

15

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: New Protocol Development

The above is not a fool-proof solution as counterfeiters will try to spoof the manufacturer’s website to fool users into downloading false authentication apps

New security protocols should be investigated to reduce the risk of spoofing attacks.

The best way to do this is to have mutual authentication protocols whereby the manufacturer can authenticate the end user applying for the download as well as the end user being able to authenticate the store site so as not be fooled into downloading a false app.

16

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Blockchain: Double Substitution

Requirements The security of QR codes on each product must be

embedded/impressed so they cannot be substituted

Even if there is a substitution, it will result in failure as the true

Authentication App will only interrogate the true blockchain

In other words, the counterfeiter needs to perform a double

substitution to be successful

It gives more control to the user in authenticating each

product as it is received and can be applied to multiple

commercial industry sectors including high valued products

and pharmaceuticals and by law enforcement and customs.

17

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Future Research

The rapid growth globally of the Internet of Things will

also need to be investigated, especially where such

physical items are connected to a smart contract that

is operating on a blockchain

How the data flows from these items will necessitate

appropriate management and regulation

A series of decentralised autonomous organisations

(DAO) could run the process without human

intervention

How the law will deal with the DAO remains

outstanding

18

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Future Research (cont.)

The use of smart contracts will need investigation

especially from a multi-jurisdiction perspective

The general proposal for smart contracts is that they

will operative purely within a cyber-environment and

thus without borders

There are social and regulatory challenges to these

developments, so to what extent will users need to be

aware of blockchain/smart contract/DAO activity?

What entities will be regulated? By whom? Who is the

consumer of a DAO? What would be the nature of a

DAO? What would the sanctions be for misfeasance?

19

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Future Research (cont.)

Are there competition issues if DAOs/blockchains

collaborate with each other?

How do we educate/train the future generations

of professionals for this work? Do we need to

establish micro-credentialing via blockchain to do

this?

20

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Conclusion A private blockchain could greatly assist in reducing

the available market for counterfeit products

The system will allow users to identify in absolute terms

whether a product is authentic

Instead of concentrating on the counterfeiter per se

this system concentrates on the user which should

obviate the marketability of counterfeit products

New protocols should be investigated so that a

counterfeiter cannot fraudulently impersonate a

manufacturer with the downloading of a false

Authentication App

21

Dr. Adrian McCullagh & Professor John Flood28 June 2016

Conclusion

Users must be guaranteed that they only use true

Authentication Apps

This use of the blockchain gives power to the user

by allowing them to ensure that what they are

paying for is authentic product and not

counterfeit product

That is value for money

22

Dr. Adrian McCullagh & Professor John Flood28 June 2016

?????????

23

?? ANY QUESTIONS ??

Dr. Adrian McCullagh & Professor John Flood

?????????

28 June 2016