• Do Not Scratch Your Head Behind Something That Is Not A Problem in itself. If Technology Is Precise Even Abysmally Low Consumer Authentication Is Perfect.

• High Consumer Authentication Is Required By Ordinary QRcode And Other Non-Precise Authentication Technologies. Misleading Scan Results Further De-Motivate The Consumer And Then Industry Start Spending On Marketing Campaigns And Eventually Nothing Works. It is Vicious Cycle.

• So, While Problem Seems Complex , Solution Is Simple – Just Focus On Fundamentally Strong And Precise Technology That Will Also Motivate More & More Consumers To Scans. It Is More Of A Technology Problem. In This Context, Technology Is King And Not The Consumers As Stated By Marketing Gurus.

• Non-manipulatable Technologies Saves Cost On Dealing With Fabricated incidences By Ground Investigators And Supply Chain Partners.

• Not Really – Authentication Solution Should Equally Address Connivance By Supply Chain Partners Or Ground Investigation Agencies As These Can Be Manipulated By Them As Well.

• It Should Give Precise Scan Result Going Beyond Mere Detecting Physical Duplicates. Example Ground Investigation Agencies Can Sponsor False Scan On Digital Image Of Original From Multiple Location And Hand Twisting Brand To Get Investigation Assignment.

• So, Problem Is Deeper And Technology Should Be Fundamentally Strong To Detect Digital Duplicates.

• Bad Statement, Really Because Money & Motivation Cannot Break Everything. Anything Fundamentally Strong Cannot Be Broken By Money & Motivation.

• Did You Know In Security Domain – Public Key Encryption Was Invented More Than 35 Years Back And Despite Several Organised Effort In Different Part Of World, It Could Not Be Broken.

• For Further Clarifications – Barcode Invented 70 Year Back Still Remains Default Tracking Technology Despite Advent Of QRcode / NFC Just Because It Is Fundamentally Strong, Simple, Performs & Cost-efficient.

The Capability To Underwrite Finacial Liability Aganist Cloning In Public Domain Is The Best Litmus Test To Judge The Credibility Of Non-clonable Security Features.

Yes, QR codes can be duplicated. Even mathematically randomized and encrypted QR codes do not prevent physical duplication; they only make predicting the next QR code on future packaging more difficult. In reality, QR code-based solutions can worsen the counterfeiting problem because counterfeiters can easily create physical copies. Connived supply chain partners and ground-investigation agencies can do digital cloning and sponsor false scans. It also requires high consumer authentication rate. To address this, Linksmart has developed non-clonable codes/labels that are immune to both physical and digital cloning. These codes utilize a unique automation grade micro-printing technique, ensuring each code is unique and cannot be copied or reproduced. Moreover, with Linksmart’s Reverse Interlinking Technology, even authorized printing and packaging vendors are prevented from replicating the product, enhancing security across the supply chain.

Our product stands out with its unique combination of security, sustainability, cost-effectiveness, and usability:

  • Cost-effectiveness: It utilizes single-pass printing, reducing production costs.
  • Sustainability: Being a print-only technology, it uses regular ink, making it sustainable & environmentally friendly.
  • Security: It is the only non-clonable solution that comes with a performance liability—if it gets cloned in the public domain, security with accountability.
  • Usability: It is appless, meaning users don’t need to install any application. They can simply scan it like a regular QR code, ensuring a seamless and user-friendly experience.

Traditional copy detection methods often have critical shortcomings that make them ineffective against sophisticated counterfeiting techniques. These limitations include:

Scan/Resize/Print: Methods like “Scan, Resize, Print” allow duplicates to pass as originals, making them easy to replicate.

Algorithmic Regeneration: Many systems rely on algorithmic regeneration, which can be reverse-engineered or manipulated, enabling counterfeiters to create identical copies.

Digital Cloning:  Mere images of original can be scanned leading to false reporting as originals

Inconclusive Duplicate Detection: Most solutions fail to provide conclusive proof of authenticity, requiring manual ground investigations that increase legal and operational costs.

No Performance Liability: Many providers claim high accuracy but do not take performance liability, leaving companies with ineffective solutions.

Linksmart paradigm has 5-state authentication where:

Original: Indicates that the Artefact is original

Duplicate: Indicates that the Artefact is Duplicate

Tampered: Indicates the artefact was unofficially printed otherwise authorized vendors.

Resized Duplicate: Indicates that the artefact is not of the Original Size ie. 10mm Digital Duplicate: Indicates the User has scanned Mere image of the original artefact.

Digital Duplicate: Indicates the User has scanned Mere image of the original artefact.

Click here to learn more about Non-clonable Codes.

Most of copy-proof security features in themselves are not per-piece unique and especially CDP based features gets authenticated based on range-match rather than exact-method. Being range-match these can not be uniquely associated with unique QRcodes. Unofficial production requires Qrcode printed and reverse interlinked in 2nd pass print.

LINKSMART impressions are unique per-piece and also exact-match and hence can be reverse interlinked with Unique QRcode printed in-house in 2nd pass and thus effectively and conclusively prevents unofficial production of non-clonable artefact by converter.

Connived Supply Chain Partners Include Authorized Distributors & Ground Investigation Agencies. Traditional security features could be misused in multiple ways to cause false alarms. For Example, fake ground investigation agencies can simply do digital cloning (and forward a mere image of originals to their network to sponsor false scans) and hand-twist the brand owners to assign ground investigation. Sometimes fake seizures are shown in the name of investigation. Distributors know the covert/overt feature and they can mix and match the originals with fakes and produce genuine documents even if an investigation happens. A performing non-clonable that is fundamentally strong can’t be misused to fool the brand owner. Brand owners, despite knowing all these manipulations remain helpless and optionless just because technology is weak. Non-clonable code solves these issues conclusively and systematically.