The key differentiators in Authentic Vision’s technology are our unique Holographic Fingerprint security label, the random serialization of the data matrix (2D) code, our computer vision, and the use of server-side analytics providing ultimate protection.
Actionable Data Precise geo-location of fake attempts provides actionable data.
Our Holographic Fingerprint label cannot be copied or replicated. Other competing solutions can be copied or counterfeited and are costly or complex to implement. Authentic Vision’s solution is secure, simple and smart.
We are a security solution provider. To ensure the highest security, the entire, end-to-end, solution, including the security labels, the mobile App, the mobile SDK, and the web portal, are all provided from a single source i.e., Authentic Vision.
Our Holographic Fingerprint is unique and even we cannot replicate it. Any potential security attacks would not be scalable because Authentic Vision has security measures in place to identify and mitigate or prevent such counterfeiting attempts.
Our solution offering consists of security labels, mobile App and access to our web portal. The exact costs are dependent on the volume of security labels, the type of mobile App (customer branded or SDK) and the software capabilities being used on the web portal.
Each Authentic Vision security label consists of the Holographic Fingerprint, a label ID, and a 2D code printed on the label. The first step of the authentication verifies the label ID and activation status via the 2D code. Once activation is verified, the authentication process starts using our computer vision technology, which compares and authenticates the Holographic Fingerprint™ and all its attributes.
Our label is clearly visible and encourages customers to verify the authenticity of products instantly with any smartphone and the CheckIfReal App. We do see a high acceptance and good scan rate based on the curiosity of users and the need to verify the authenticity of the products they are purchasing.
The scan rate is very much driven by how well our customers promote the solution and educate their customers.
A download of the freely available CheckIfReal App (or customer App with integrated SDK) is required. If the App is not already installed, when a user scans a label they will be redirected to the App Store to download the App. Upon installation of the App the user is guided smoothly through a simple product authentication process. This is the most secure mobile authentication method. We do not support a web browser or an instant app-based authentication currently, due to the lack of robust security in these methods.
No, by default, the label is not deactivated after scanning the first time, you can scan the label several times (e.g., to track a product in the supply chain). However, should there be a specific need to deactivate the label after a first (or certain number of scans), such functionality can be provided.
We rely on our certified and enabled printing partners to make sure that the product works smoothly, and our quality and security standards are met. However, if your situation demands that you use your label printer to produce Authentic Vision security labels, our team can work with you to enable and certify them.
The Holographic Fingerprint is small and customizable. We can integrate it into existing packaging, labels and closures – or even apply it to products directly. Our team will be happy to discuss various options tailored to your product.
Verification:“Are you a real label?” During a scan the attributes of a label are checked; ultimately checking the scanned label is indeed a real and existing label and a digital twin of this label exists.
Authentication:“Are you who you claim to be?” During the ‘authentication’ process the unique features of the label are checked, including the unique Holographic Fingerprint, and compared to the digital twin in the database.
The authentication of labels requires our free CheckIfReal App, or the integration of our mobile App SDK for Android and IOS where clients have their own mobile App; and the use of our backend authentication system.
Our solution is only for mobile authentication, based on computer vision algorithms and machine-learning, guaranteeing clear and verifiable results. A solution based on visual inspection is cumbersome and can never be truly accurate.