Shenzhen Hopetime Industry Co.,Limited
HopetimePCB & GWT

Introduction for classes of counterfeit parts

Introduction for classes of counterfeit parts

The production, sourcing, and distribution of counterfeit components take many forms. We will discuss the classification of such parts below: 

1.Replication/Cloning

Cloning is the process that involves the manufacturing of reverse-engineered equipment matching with the original in terms of fit, use, 

and structure. The products are manufactured with low-grade equipment. Hence, they will not meet the desired reliability requirements. 

These devices are labeled and distributed as OCM parts.

2.Scrapping

During manufacturing, defective devices are sent to recyclers to recover valuable metals. Recyclers can certify destruction without scrapping 

the equipment and later add them back to the supply chain.

3.Skimming

Skimming is a type of fraud that involves overproducing or declaring a low production yield. It leads to the sale of excess devices through 

broker chains. 

4.Sample devices are put back in the supply chain

OEMs and OCMs test, qualify, and certify large quantities of devices. The end-of-life evaluation process includes acceleration testing to 

determine the performance and reliability of the product. Specimens/samples and stolen components can be sold back into the supply 

chain as brand-new products. Most scrap units may still work after scrapping, making them a principal target for fraudsters.

5.Recreation

High-performance parts require stringent testing for applications like automotive, space, avionics, etc. But fraudsters procure 

lower specifications components for these applications. Later, they re-mark and resell those parts at a high price. 

Printed circuit boards play a significant role in the automotive sector. See our post on automotive PCB: 

The chassis of the modern automotive industry for a better understanding.

6.Recovery and reuse

Many electronic appliances contain several working devices while scrapping. It is possible to recover valuable parts for reuse from these devices. 

The improper removal of components damages their original performance, reliability, and durability. Later, the supply chain markets these parts.

7.Embedded malicious software

Counterfeiters often reprogram some programmable devices that cause potential damage to products. This reprogramming is hazardous, 

especially in class 3 products such as military, aerospace boards, etc. It risks the safety and security of the system as well as users. 

The malicious software hampers almost all the embedded servers resulting in critical consequences.


Contact Us

E-mail: [email protected]

E-mail: [email protected]

Skype: [email protected]

Whatsapp: +86 15012972502

Add: 2F, BUILDING H, WANDA INDUSTRIAL ZONE, ZHOUSHI ROAD, LANGXIN COMMUNITY,SHIYAN STREET, BAO 'AN DISTRICT, SHENZHEN, GUANGDONG, CHINA

Link