Course Overview
The course will cover various authentication techniques that are being used and developed to make counterfeiting of electronics more difficult. It will include overt and covert methods of authentications. The course will close with specific suggestions and recommendations how you can protect your supply chain including how to select distributors and monitor your suppliers. It will also have recommendations to the electronic part manufacturers, regulators, government enforcement and procurement agencies on how to reduce the risks from counterfeit electronic parts.
Course Outline
-
Introduction to counterfeit electronic parts
-
Definition
-
Associated risks
-
Participants of the supply chain
-
Types of distributors
-
Distributor assessment
-
-
Electronic part supply chain
-
Extent of the problem
-
Methods of generation of counterfeit parts
-
Examples
-
-
Counterfeit parts: types and examples
-
Excess inventories
-
Original manufacturers scrapped parts
-
Reclamation of parts during recycling
-
A look at the future: shift of high tech manufacturing to industrializing economies
-
-
Sources of counterfeit parts
-
Short term measures
-
Supply chain management
-
Authentication including inspection
-
-
Long term measures
-
-
Mitigation techniques
-
Testing and characterization efforts
-
Electrical characterization
-
Optical microscopy
-
X-Ray microscopy
-
Scanning acoustic microscopy
-
X-ray fluorescence spectroscopy
-
Environmental Scanning Electron Microscopy (ESEM) / Energy Dispersive Spectroscopy (EDS)
-
Materials characterization tools
-
-
Closing
The course can be tailored depending on the needs of the customers.
Here is the link to the current course.
Past Customers
|
|
|
Related Texts
Contact
Dr. Diganta Das
(301)-405-7770 | diganta@umd.edu
Bldg. 89, Rm. 1101
University of Maryland
College Park, MD 20742
Top