OUR TECHNOLOGIES

SECURE
DATA ENCODING FOR CODE CLONING SECURITY

data encoding code cloning security
data encoding code cloning security
Logo

OUR TECHNOLOGIES

SECURE
DATA ENCODING FOR CODE CLONING SECURITY

data encoding code cloning security

AUTHENTICATION AND TRACEABILITY BASED ON UNIQUE IDENTIFIERS

RAISING RESILIENCE AGAINST CODE CLONING

When it comes to unique codes for product authentication, code cloning security plays a major role. But how can counterfeiters and other criminal entities be prevented from copying and reprinting codes or bypassing traceability systems?
data encoding code cloning security labels

AUTHENTICATION AND TRACEABILITY BASED ON UNIQUE IDENTIFIERS

RAISING RESILIENCE AGAINST CODE CLONING

When it comes to unique codes for product authentication, code cloning security plays a major role. But how can counterfeiters and other criminal entities be prevented from copying and reprinting codes or bypassing traceability systems?
data encoding code cloning security labels

TECH HIGHLIGHTS

PRINCIPLES FOR COMBATTING CODE-CLONING AND
OTHER TYPES OF PRODUCT FRAUD BY SECURE DATA ENCODING

Encryption resp. electronic signature of serials provide security against guessing or predicting Unique Identifiers (UIDs).

CODIKETT is based on this copy-free principle. The data encoding system typically creates 16-digit alphanumeric codes, which cannot be guessed or anticipated.

UIDs, based on encryption can only be reprinted, when collected or stolen, piece by piece. Reprint of larger series, based on the knowledge of one or a few codes, is impossible.

Together with immediate feedback on previous verifications, reprints and copies are quickly detected.

Upon verification of a UID there should be an immediate check on frequency and location of previous checks of the same number
  • This is a very core functionality of CODIKETT and comparable platforms, to detect reprints and initiate an alarm. This functionality quickly out rules most – but not all – code reprints.
  • It is important that the anti copy checks are done immediately and online, upon scanning and verification.
  • Settings for alarm generation are defined by our customers, such as:
    • How often may a single UID be scanned?
    • What, if the scans are in different geo-locations?
    • What, if the scans are done from different IP-addresses – this can be evaluated, even if the IP is distorted for data privacy reasons?
    • When and to whom should an alarm be sent at the brand owner’s end?
    • Should the person, which verifies the code, be informed about irregularities and/or should he or she be called to action?
Securing the entry point by a dedicated app provides resilience against spoofing of the complete traceability system.
  • Users should know their reliable app or brand web address.
  • A basic version of this concept would check the URL/web address – is it listed as a trustful service? MILLEPEDIA is an interoperable app by Securikett to demonstrate the concept.
  • A more complex version is based on ISO 22385, ISO 22376. In this architecture, all UIDs originating from trusted parties receive an additional electronic signature. This additional layer of encryption is issued by a trusted and independent third party. The layer is checked and decrypted by an interoperable app, known to the users. Only after this first check the UID is routed to its authoritative source for verification. The association VDSIC-OTENTIK Network supports this architecture.
UID printing should be safeguarded against unnoticed reproduction by physical means of authentication. Thus, we offer a wide range of cloning cyber security technologies, which can be used individually or combined.

Many of them are supported by electronic anti-copy checks, using the smartphone camera. There may be links integrated into the response pages for UID-verification.
Logo

GET MORE DETAILS ON PHYSICAL
COPY PROTECTION

WE HAVE COMPILED OUR SECURE DATA ENCODING KNOWLEDGE INTO A WHITEPAPER THAT WE ARE HAPPY TO SHARE WITH YOU
Please enable JavaScript in your browser to complete this form.
Please send me the following Whitepaper(s):
Contact (optional)
Privacy Policy

BEST PRACTICE

OUR SECURE DATA ENCODING SOLUTIONS ARE IN USE FOR MANY APPLICATIONS
Logo

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU

TALK TO US

OUR EXPERTS ARE HAPPY TO HELP YOU