Previous attempts to digitally secure goods have failed due to the cost and unwieldy nature of the infrastructure.

CJS Technology uses contactless smartcard technology to enable a standard smart-phone to accurately verify the provenance of an item.

This opens new possibilities to identify fakes anywhere in the world and to open up secure digital sales and marketing channels direct to the consumer.

 

Current counterfeiting measures are based on the observable differences between real and fake products. This requires expert knowledge and becomes a subjective measure of stitching, cloth, logo, fasteners etc. Publicising the observable differences to alert the public also alerts the counterfeiters on how to raise their game.

The globalisation of manufacturing technology and profitability of piracy means that indistinguishable copies are inevitable. Counterfeits are becoming more pervasive and persuasive than ever.

The whole DNA of a brand based on exclusivity, quality and desirability is increasingly at risk.

 

 

Why digital security?

. postage stamp sized devices

. no batteries or life limit

. waterproof and robust

. verify with a smart-phone

. secure encryption

. a platform for customer interaction

 

CJS Technology SOLUTIONS

Our digital verification puts incontrovertible proof in the hands of retailers, consumers, dealers and resellers. Provenance can be proven during distribution, at the point of sale or years into the future by anyone with a smart phone and online connection.

Postage stamp sized passive devices built into a product can be read by a consumer’s smart phone and the result verified by a secure server. A simple message on the phone confirms or denies the provenance of the item.

The secure device in the product is uniquely encoded and cannot be copied or reverse engineered. The smart phone application is free to download and contains no intelligence so cannot be hacked or compromised.

All secure information is held on a central server under the control of the producer.

 

A platform approach

 

The level of sophistication can be expanded to use the direct consumer connection as a sales, marketing and service channel.

Consumers can choose to destroy the security device once provenance is proven, or use the unique ID  embedded in their product to maintain a dialogue back to the producer.