around $1.6 trillion as of today. There are a handful of partial solutions available, but none is really solving the core problem.
The solution to address the largest segment of merchandise counterfeited (ranging from $20 to $1000) need to be foolproof, and cost effective. The typical solutions offered today are holograms, rfid based tags, random 2D graph, scratchable QR codes, and Digital number based SMS system.
I found that every partial solution offered today to address counterfeiting can be counterfeited, meaning the tags or the scheme they employ can be copied and replicated easily. Below are my findings and rough estimate on how much it costs a counterfeiter to replicate and fool the solution provided.
Let’s explore each solution one by one:
All it takes to copy the hologram is, give one of the original to the hologram printer company and it will give you exact copies of it. It will even cost less to the Counterfeiter to get the exact Tags/Labels/Stickers from any hologram printing lab near him. Usually the price ranges from less than 1¢ to 50¢ depending on the complexity, colors, layers, materials, and size involved.
Some companies claim they generate or print certain shape or graphs on the label whose photo can be taken and sent to the cloud servers to authenticate.
Unfortunately, they are still the same, no matter what the company claims about running a Machine Learning or AI to scan the image on the cloud. The truth is anyone who can take photos of the sticker and print them on a paper would pass the counterfeit-check.
As long as the server gets the same scanned photo, regardless of the source (genuine sticker or copied sticker), it will pass the check.
RFID is no different than holograms when it comes to copying them. It is even easier, all you need is the RFID code set in one of the original item and set the same code in cloned RFID labels/tags, and you will be ready to pass the counterfeit check!
Usual cost varies from few cents to dollars based on type of RFID tags (active/passive).
Companies, who provide the unique code per product, make more sense. There are two type of Codes usually provided:
If the codes are open (not protected by some scratchable layer), then it is of not much use, anyone can copy them and pass the counterfeit check, no matter what company claim about the crypto tech or AI tech they use in the backend (although with the help of geo-location tech and AI, red flags can be raised for some cases).
Truth is, if you have the same code as the original, which you can see without buying the product, then you can copy it and pass the counterfeit-check.
These are the physically protected QR or Barcode or Alphanumeric codes and you must buy the item before you can see the code, for example, scratchable card, and then verify with the backend server.
This does protect the item and if the backend technology is implemented properly, i.e. non-guessable codes are generated, then this will prevent the counterfeit.
But problem is, user has no idea before buying the item if it will be genuine or not, not only this company who has not implemented the backend properly may pass some items which may be fake, or may pass already scratched code again and again.
Secondly, if their DB is hacked then it will be very simple for the hackers to sell the codes to Counterfeiters.
The development and more importantly maintenance and security of such system is not simple and usually costs good maintenance cost. And the authenticating servers will have to be always online.
Finally to provide better anti-counterfeit protection, we designed and implemented Neurotags technology. We kept mainly 3 things in mind:
This is the most difficult part to design. After careful thoughts, we have introduced two tags which go together, one hidden and one open and each is unique for each product.
User can scan the open tag before buying and get a good estimation of genuineness of the product and check any RED flags. And scanning the protected tag after purchase provides complete genuineness information.
There are two protection we have given to Open Tag:
Protection to Protected Tag:
Security of the auth system and tags are the most important criteria in designing the system.
Being an ethical hacker and experience fighting hackers in gaming companies in past (Gala Net) and designing the secure systems for finance companies (Paypal) has helped not to overlook any potential cases where security can be a problem.
I can not expose more here, but our tags info is one way "scrypt" and private key secured so even if someone gets the DB of tags he or she can not get the tags code.
We have provided iOS and Android app (soon Windows app is coming) to scan the Neurotags and manage the purchases, warranty of the products and access to customer support.
Codes can also be scanned by any scanner app specially popular apps, such as, WeChat in China.
The technology is cost effective, on the cloud and efficient to use so that it can be used by any company of any scale, without worrying about the cost.
The money saved by preventing counterfeits will always be many times more than the cost to use Neurotags.
The valuable insight of consumer behavior data collected with Neurotags will help improve the Business Intelligence.
Warranty and support modules can help up-sell the extended warranty protection and consumable parts of the products.
Bundling the loyalty programs with Neurotags would further increase the repeat sales.