Develop Authentication & Anti-Counterfeit Solutions
Counterfeits, replicas, fakes and illegal products are among the top challenges for many consumer brands globally. It has turned into battle against what is now a multi-billion dollar industry of counterfeit apparels, fashion, electronics, food & beverage, books, luxury items, pharmaceuticals and impacts nearly every product category. In most cases, the consumer will not be able to distinguish between a genuine product and a counterfeit.
Smart Products equipped with a Qliktag on a batch or serialisation level have the inherent ability to enable product authentication capabilities. With an ordinary smartphone, consumers can scan a Smart Product which can then run a product authentication check against it’s digital record on the Qliktag Platform and return a message conveying whether that specific serial instance of the product is authenticated as genuine.
A leading personal care brand requested Qliktag to setup a protoype demo for a fool-proof counterfeit detection solution to help alert the company when growing instances of counterfeiting are identified in a region.
Entities were configured with data models for Batch->SKU->SerialItem within the Qliktag Platform. Additionally an “AuthenticationLog” entity was also setup to store results of a check. Special “Trusted NFC” stickers were inlayed within the packaging. These “Trusted NFC” stickers generate a new unique identifier code on each tap by a smartphone app which is checked against an authentication server and the pass/fail result is then relayed to the Qliktag Platform along with the device location details. A “Digital Interaction” template was designed and applied to every “SerialItem” instance of the product. If the product passed the authentication check, the consumer would see an interaction page with their specific serial item number and a confirmation assuring them their purchase is genuine.
If the authentication check failed, other than notifying the consumer through the digital interaction, the serial number, date time and location of the failed attempt would be written to the log. This log could then be used to feed a visual map web application with location markers of the passed or failed attempts. A concentration of failed attempts within a specific area on the map would indicate possible counterfeiting.
Platform tools used in creating the solution include: