Introduction for classes of counterfeit parts
Introduction for classes of counterfeit parts
The production, sourcing, and distribution of counterfeit components take many forms. We will discuss the classification of such parts below:
1.Replication/Cloning
Cloning is the process that involves the manufacturing of reverse-engineered equipment matching with the original in terms of fit, use,
and structure. The products are manufactured with low-grade equipment. Hence, they will not meet the desired reliability requirements.
These devices are labeled and distributed as OCM parts.
2.Scrapping
During manufacturing, defective devices are sent to recyclers to recover valuable metals. Recyclers can certify destruction without scrapping
the equipment and later add them back to the supply chain.
3.Skimming
Skimming is a type of fraud that involves overproducing or declaring a low production yield. It leads to the sale of excess devices through
broker chains.
4.Sample devices are put back in the supply chain
OEMs and OCMs test, qualify, and certify large quantities of devices. The end-of-life evaluation process includes acceleration testing to
determine the performance and reliability of the product. Specimens/samples and stolen components can be sold back into the supply
chain as brand-new products. Most scrap units may still work after scrapping, making them a principal target for fraudsters.
5.Recreation
High-performance parts require stringent testing for applications like automotive, space, avionics, etc. But fraudsters procure
lower specifications components for these applications. Later, they re-mark and resell those parts at a high price.
Printed circuit boards play a significant role in the automotive sector. See our post on automotive PCB:
The chassis of the modern automotive industry for a better understanding.
6.Recovery and reuse
Many electronic appliances contain several working devices while scrapping. It is possible to recover valuable parts for reuse from these devices.
The improper removal of components damages their original performance, reliability, and durability. Later, the supply chain markets these parts.
7.Embedded malicious software
Counterfeiters often reprogram some programmable devices that cause potential damage to products. This reprogramming is hazardous,
especially in class 3 products such as military, aerospace boards, etc. It risks the safety and security of the system as well as users.
The malicious software hampers almost all the embedded servers resulting in critical consequences.
PCB Blog
Contact Us
E-mail: [email protected]
E-mail: [email protected]
Skype: [email protected]
Whatsapp: +86 15012972502
Add: 2F, BUILDING H, WANDA INDUSTRIAL ZONE, ZHOUSHI ROAD, LANGXIN COMMUNITY,SHIYAN STREET, BAO 'AN DISTRICT, SHENZHEN, GUANGDONG, CHINA