The bounty hunter concept

11
Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved. These images were used as examples. In no way are they endorsing The Bounty Hunter Stop International Piracy In Its’ Tracks

description

Stop counterfeits through social media

Transcript of The bounty hunter concept

Page 1: The bounty hunter concept

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Stop International Piracy In Its’ Tracks

Page 2: The bounty hunter concept

The Technology - How It Works

Companies register with the bounty hunter social network.

Stop International Piracy In Its’ Tracks

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Otterbox builds a special reader that works with the Clixit System

Page 3: The bounty hunter concept

The Technology - How It Works

Bounty hunter issues RFID encrypted tags to its members. Manufactures install the tags on their products. Regional small batches are encrypted and created to keep counterfeiters on their toes.

Stop International Piracy In Its’ Tracks

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 4: The bounty hunter concept

How It Works

The bounty is announced through social networking and the Bounty Hunter Web Site. The best bounty hunters get perks for their work in enforcing international patent laws.

Stop International Piracy In Its’ Tracks

$1,000,000: 45 days

Bounty Hunter announces that the bounty has been set for a known counterfeit product. Smart phones with NFC enabled are able to start scanning product. Anyone with an NCF enabled smart phone can start scanning

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 5: The bounty hunter concept

How It Works

Bounty owners work with authorities to arrest and stop counterfeiters in their tracks.

Stop International Piracy In Its’ Tracks

Bounty Hunters start scanning product around the world. The clock is ticking to win the bounty.

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 6: The bounty hunter concept

How It Works

Bounty owners work with authorities to arrest and stop counterfeiters in their tracks.

Stop International Piracy In Its’ Tracks

The bounty period ends. Law enforcement is monitored for closing cases and busting organized crime rings. If actions are not taken, they are reported as being corrupt to the WTO

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 7: The bounty hunter concept

How It Works

When counterfeiters are removed from the database, maps are cleared up.

Stop International Piracy In Its’ Tracks

Rewards are issued and statistics are announced on the bounty hunter web site as to how many counterfeiters have been removed. Maps are created for everyone to see where these products are being produced and sold. New bounties are released every day. It becomes very profitable for bounty hunters.

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 8: The bounty hunter concept

Factshttp://www.priority1design.com.au/rfid_coil_antenna.html

RFID cost ~$.07 to implement on every package

RFID encryption is needed to keep the counterfeiters on their toes

RFID smart phones are coming out now.

Samsung

Otterbox can make RFID reader modules that snap on the back of their phone cases with the Clixit system. These modules communicate to any smart phone through Bluetooth.

Long distance readers are available for ~$40USD in COGS. Law enforcement may purchase these super extender readers.

A complex database is needed to manage events and locations

Stop International Piracy In Its’ Tracks

Pat

Co

nar

ro©

20

13

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 9: The bounty hunter concept

Example:

Otterbox puts up a $1M bounty on pirates

End users search for counterfeits with their smart phones and or Clixit RFID reader smart modules.

Bounty hunters sign up on the app to receive rewards

Police municipalities get tools to locate the pirates when found.

Each hunter and police agencies split the bounty once the counterfeiter has been processed

Police are monitored for their response to the crime through the ap.

Social media ranks police by how corrupt they are.

Business Model: $500 bounty for finds of 100 or more counterfeit products ($1,000,000÷$500)= 2,000 counterfeiters arrested and taken off the streets.

Stop International Piracy In Its’ Tracks

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 10: The bounty hunter concept

Embed RFID tags in all Otterbox Cases ~$.10USD/unit

Use encryption to keep the counterfeiters confused

Ship specific RFID product to specific locations

Use social networking to launch a bounty on pirates

Corporate victims post the bounty.

Social networks let everyone know what is the latest bounty

Smart phones use an Bounty Hunter application to find frauds

Once the product is located global mapping is used to find the source.

The bounty hunter that finds the source is rewarded a bounty.

Smart phones become a revenue stream for bounty hunters.

Stop International Piracy In Its’ Tracks

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter

Page 11: The bounty hunter concept

Thank You!

Stop International Piracy In Its’ Tracks

Dog The Bounty Hunter All Rites Reserved, Apple, Gucci, Adidas, Sony, Otterbox all rights reserved.These images were used as examples. In no way are they endorsing The Bounty Hunter