Consulting Areas
Home |
Imprint |
Legal |
© BlueOcean SBC


Product restrictions are nothing new, but the Internet opens up completely new and highly efficient distribution channels to counterfeiters and their accomplices. Large quantities of counterfeit products can be sold with a certain level of sophistication to consumers through simple online shops and spamming. The authorities and industries affected openly admit that this illegal market has seen a huge growth.
Accordingly, the consequences are becoming increasingly serious. This results not just in considerable losses and pressures on list prices but also has an adverse effect on a company's and product's image.
However, highly sophisticated, semantics-based technologies allow illegal online shops to be recognised automatically, to identify the individuals responsible and to obtain the necessary information necessary to pursue successful legal action.

Counterfeits move around the Internet with almost complete freedom

The Internet provides an ideal platform for trading in pharmaceutical products irrespective of whether these are original products or counterfeit drugs.
Criminal organisations also know the benefits of using the Internet distribution channel. It is not so much the large e-commerce portals or the classical "Internet pharmacies" that play a role here, but the tens of thousands of smaller online shops that form part of the "long tail" of the Internet and make up the illegal trade.
Long-tail e-commerce gives dubious providers the advantage of being able to operate highly flexibly around the world. The Internet presence of such providers may not have a particularly professional appearance, but it is often a question of (a large number of) smaller websites. They can be set up quickly, use spam to advertise their presence and be renamed or relaunched at a different address. This reduces the risk of discovery in official spot-checks and of legal action since anti-counterfeiting by companies and the authorities is on the whole performed sporadically in the form of campaigns or in response to notification by consumers.
Blue Ocean supports the discovery and identification of such portals and the masterminds behind them using modern, semantics-based Internet technologies.


-successful thanks to semantic-based intelligence and a systematic process

Over the last 10 years we at BlueOcean have developed and implemented the semantics- based web technologies for a wide range of business processes that are necessary in order to be able, for example, to model and support the anti-counterfeiting process. This covers the following technologies:
Crawler and spider technologies used to identify and monitor relevant sources, including forums, social networks and other parts of the long tail of the Internet (deep web)
Monitoring, analysis and classification of the content of these relevant sources using semantics-based intelligence and specific ontology
Entity extraction and identification of personal profiles as well as personal and company networks from the Internet and professional databases
This allows hundreds of thousands of online shops to be systematically and to a large degree automatically monitored with regard to the sale of a large number of (illegal) products and for those individuals and companies responsible to be comprehensively analysed.

Our offer...
...Your benefit

We use an specific Internet search to identify websites (worldwide) which contain instances of particular generic designations of the product (e.g. disk brake), product names (e.g. Levitra) or the names of substances (e.g. Vardenafil).
We check whether these websites are online shops or not.
We determine whether these online shops are being used to sell unauthorised or counterfeit products or whether the sites should be investigated further.
We document the website with regard to product- and retail- specific characteristics, such as composition, dosage, packaging, billing process etc. that might indicate product counterfeiting.
We create personal and company profiles for the relevant online shops in order to identify who is behind them.
We gather evidence via test purchases (mystery shopping).
We put together documentation that will stand up in a court of law as a preliminary stepin the process of e.g. taking legal action, establishing communication or issuing a warning, etc.
[Back ...]