We offer you to protect your products, your brand and your consumers with anti-counterfeiting technologies and solutions.
Overt anti-counterfeiting technologies are solutions that are perceptible by the senses without additional tools. These may be solutions that are visible to the naked eye, sensitive to touch or even, for some, to hearing.
These technologies are generally intended for the general public as they do not require tools to be verified. We can quote as a non-exhaustive list some technologies such as watermarks, holograms, iridescent inks.
These anti-counterfeiting technologies are intended for the general public.
These anti-counterfeiting solutions are perceptible to the greatest number of people.
These anti-counterfeiting technologies require wide dissemination of information to users so that they know what needs to be verified.
The result of the authentication can be subject to interpretation as it requires a good knowledge of the starting repository.
These anti-counterfeiting technologies are generally more easily reproducible by counterfeiters because they are perceptible. But this depends on the level of popularization of the anti-counterfeiting solution. The older it is and the more widely it uses industrial production equipment, the more likely it is to be counterfeited itself.
Prooftag offers you overt solutions to provide visible proof of authenticity to your distributors and consumers. These security technologies can be used independently or in combination with other covert security technologies that are not perceptible.
Covert anti-counterfeiting technologies are used for solutions that are not perceptible without the use of small additional tools. They can be solutions requiring a particular light, a filter, a magnifying glass to be authenticated.
As a non-exhaustive example we can quote visible inks under UV or IR light, hidden prints requiring an optical filter or a magnifying glass to be revealed, requiring an electronic verification device.
These anti-counterfeiting technologies are for professional use because they require a minimum of equipment.
These anti-counterfeiting solutions are not directly detectable by counterfeiters.
The authentication result is usually fast and binary (true/false) because the goal is in most cases to validate their presence and more rarely their accuracy.
These anti-counterfeiting technologies require the dissemination of a tool and training to the people who have to verify them.
If the "secret" of the implementation of these anti-counterfeiting solutions is discovered by the counterfeiter, he will try to reproduce it.
Prooftag offers you covert type solutions or predictive analysis of printed security codes to provide non-visible proof of authenticity. These security technologies can be used independently or in combination with other perceptible security technologies.
We can also integrate them into an Internet of Things solution for online authentication. They can also be associated with a solution of unitary traceability of the products.
Forensic-type anti-counterfeiting technologies are used for solutions that are not perceptible and require laboratory analysis or dedicated proprietary equipment to be authenticated.
As a non-exhaustive example we can cite the composition of the material, chemical tracers of conductive inks or chemical markers / DNA synthesis.
These anti-counterfeiting technologies are for use by expert professionals.
These anti-counterfeiting solutions are not detectable and therefore generally difficult to implement identically by counterfeiters.
Authentication result is binary (true/false).
These anti-counterfeiting technologies require dedicated, more or less complex authentication equipment that may sometimes require the destruction of the product/packaging to be authenticated. Authentication may also require the return of the product for analysis.
The result of authentication is rarely immediate.
Prooftag does not offer Forensic solutions because they do not allow easy authentication by professionals and consumers.
We concentrate our developments on technologies or combinations of technologies Overt, Covert and Internet of Things and traceability systems.
Traceability solutions using mass serialization can also be used to fight against counterfeiting.
Mass serialization relies on the use of a unique serial number/code applied to each product. This unit reference is generally applied in the form of a matrix code (Datamatrix or QR Code) in order to make it readable by optical equipment while occupying the minimum space on the product.
These solutions cannot really certify the authenticity of a product but at least help to prove that it is a fake. Indeed, if the reference applied to a product does not exist in the producer’s database, then it is inevitably a fake. However, if the reference does exist, this does not prove that it is a real one since the reference could have been copied without any difficulty by a counterfeiter.
The solutions of traceability are more and more often used in connection with an on-line verification via a QR Code containing a URL, in order to validate the unit reference on the site of the producer.
These anti-counterfeiting solutions are for professional use.
Beyond product identification, it is possible to aggregate product information.
It is primarily an identification solution and to a lesser extent an authentication solution.
The TackCerv module of our Prooftag Cerv online services platform continues to track products in the supply chain. You can thus manage all your unit traceability issues from your production sites to the consumer.
Authentication solutions linked to the Internet of Things use a unique reference system linked to an online database. The concept consists in checking if the marking element present on the product is well registered in the manufacturer’s database. The marking element can take several forms.
It can be a public technology or the subject of an international standard such as a QR Code or an NFC chip. In this case the reading of this element is accessible to all with a reader or an application on a smartphone for the general public.
This kind of solution is aimed at a large public but often at the expense of security. It relies on an Internet of Things (IOT) platform to manage the assignment of identifiers.
It can also involve proprietary elements requiring a dedicated application or specific reading equipment. This type of means restricts the use of the solution to professionals but has the advantage of being more secure.
These anti-counterfeiting solutions, according to the type of marker, are intended for professional and/or general public use.
Beyond proof of authenticity, the connection to a database provides access to commercial and traceability information on the product.
The use of a QR Code is accessible to everyone with a cell phone.
The use of NFC is still restricted to certain phones.
The use of a proprietary application requires the download of this application. It is therefore better to reserve its use to professionals only.
Prooftag is at the origin of the principle of online authentication. In 2004, when the very first smartphones began to allow access to the Internet, Prooftag developed the Bubble Seal®. At that time, the alphanumeric reference of the seal had to be entered on a dedicated page to consult the image of the Bubble Tag. A few years later, as the QR Code became more widely available, the first Bubble Seals with QR Code appeared.
Prooftag is then a forerunner in the development of the first platform dedicated to the Internet of Things: the Prooftag Cerv. A few years later, the producers of overt technologies began to offer holographic seals with a QR Code.