Entries by linksmart_admin

But All These Works Only When There Is High Consumer Authentication.

• Do Not Scratch Your Head Behind Something That Is Not A Problem in itself. If Technology Is Precise Even Abysmally Low Consumer Authentication Is Perfect. • High Consumer Authentication Is Required By Ordinary QRcode And Other Non-Precise Authentication Technologies. Misleading Scan Results Further De-Motivate The Consumer And Then Industry Start Spending On Marketing Campaigns […]

Whether Detecting Physical Duplicates Copies Can Render A Performing Authentication Technology?

• Not Really – Authentication Solution Should Equally Address Connivance By Supply Chain Partners Or Ground Investigation Agencies As These Can Be Manipulated By Them As Well. • It Should Give Precise Scan Result Going Beyond Mere Detecting Physical Duplicates. Example Ground Investigation Agencies Can Sponsor False Scan On Digital Image Of Original From Multiple […]

Money & Motivation Can Break Anything..!!

• Bad Statement, Really Because Money & Motivation Cannot Break Everything. Anything Fundamentally Strong Cannot Be Broken By Money & Motivation. • Did You Know In Security Domain – Public Key Encryption Was Invented More Than 35 Years Back And Despite Several Organised Effort In Different Part Of World, It Could Not Be Broken. • […]

Can QR codes be faked? In anti-counterfeiting Use-cases, what comes after QR codes?

Yes, QR codes can be duplicated. Even mathematically randomized and encrypted QR codes do not prevent physical duplication; they only make predicting the next QR code on future packaging more difficult. In reality, QR code-based solutions can worsen the counterfeiting problem because counterfeiters can easily create physical copies. Connived supply chain partners and ground-investigation agencies […]

What Are Deficiencies With Traditional Copy Detection Patterns That Many Companies Try To Implements?

Traditional copy detection methods often have critical shortcomings that make them ineffective against sophisticated counterfeiting techniques. These limitations include: Scan/Resize/Print: Methods like “Scan, Resize, Print” allow duplicates to pass as originals, making them easy to replicate. Algorithmic Regeneration: Many systems rely on algorithmic regeneration, which can be reverse-engineered or manipulated, enabling counterfeiters to create identical […]

How Many States Should Be For A Performing Authentication?

Linksmart paradigm has 5-state authentication where: Original: Indicates that the Artefact is original Duplicate: Indicates that the Artefact is Duplicate Tampered: Indicates the artefact was unofficially printed otherwise authorized vendors. Resized Duplicate: Indicates that the artefact is not of the Original Size ie. 10mm Digital Duplicate: Indicates the User has scanned Mere image of the […]

Reverse Interlinking Of Security Features, Does It Help With Unofficial Production Of Originals?

Most of copy-proof security features in themselves are not per-piece unique and especially CDP based features gets authenticated based on range-match rather than exact-method. Being range-match these can not be uniquely associated with unique QRcodes. Unofficial production requires Qrcode printed and reverse interlinked in 2nd pass print. LINKSMART impressions are unique per-piece and also exact-match […]

Leveraging Non-clonable Codes To Handle Threats From Connived Supply Chain Partners?

Connived Supply Chain Partners Include Authorized Distributors & Ground Investigation Agencies. Traditional security features could be misused in multiple ways to cause false alarms. For Example, fake ground investigation agencies can simply do digital cloning (and forward a mere image of originals to their network to sponsor false scans) and hand-twist the brand owners to […]