Our Approach

“Any Sensor, any Identification – The scope is limitless”

Protecting the Digital World

The value of the digital corruption world is growing faster than ever before

READ article

A GLOBAL
EPIDEMIC

Globally, the market for counterfeit goods is estimated at $1.8 trillion

READ WHITE PAPER

Consumers are
Detectives

In order to turn the consumer to detective, there must be an incentive

learn more

DATA IS THE
NEW GOLD

An overlapping huge database of traceable data

READ ARTICLE
  • THE SOLUTION TO COUNTER ALL FAKES
  • A SOLUTION TO TRACEABILITY
THE SOLUTION TO COUNTER ALL FAKES

In the world of counterfeit, the only option to halt the counterfeits is to make it unviable to produce them

The heart of ACT is an engine so powerful, that detection of fakes is just microseconds away. Taking into account all current technologies used within the cyber security world, ACT is developing one of the most powerful detection solutions ever witnessed.

The solution is simple, and a familiar one. The beauty of the anti counterfeit solution is that, rather than trying to redesign the wheel, it takes an existing process and redesigns it for the 21st century.

The key to resolving counterfeiting is to tackle it at source. A solution combines two things: clear asset identities and an immutable chain of ownership from manufacture to end user. The only way counterfeit goods can enter the system is to either duplicate an identity or break the chain of ownership.

  • Templated Assets – map assets with unlimited scope and flexibility

  • Limitless Identifications – from biomarkers to RfID and intelligent substrates

  • Immutable Chains – securing the asset throughout its life cycle

The anti counterfeit solution makes this same process economical for a much broader range of assets, including low value items. The ACT solution creates virtual identities at the birth of a product leveraging Every Asset and links that identity to the product through any tagging technology. The blockchain architecture of Every Asset creates an immutable chain of ownership, securing the Asset throughout its life cycle.

Every Asset was developed on a 4-dimensional blockchain solution, something which has never been attempted, along with encryption, privacy and granular permissions, capable of protecting IP and sensitive data. People privacy is also a key part, with a solution developed to hide identities, self-encrypt and anonymise public facing data.

A SOLUTION TO TRACEABILITY

There are number of products which pertain to be the solution to counterfeits and / or traceability, but breakdown soon after raw material conversion, and are almost impossible to trace through the production and lifecycle phases.

They are simply one part of a much larger wheel, the wheel being ACT and the traceability from raw material, through production, packaging, supply, sale and the consumer. ACT has opened up a partner programme to embrace the current technologies and unite to produce the one product for every situation.

With a linked hierarchy back to the very origination of the raw material, it is impossible to inject a counterfeit product into the pipeline at any phase of the life. Instead, those products are now potential partners for ACT, entering in as part of the overall identification and lifecycle, not requiring specialist equipment during the phases after manufacture.

  • One Solution – uniting with all current solutions

  • Manufacturer Dictated – product identification choice is key

  • Cost Effective – even low cost mass produced items can be secured

Counterfeiters may try to copy barcodes and QR codes, but this is where the immutable chain of ownership comes in. Only the manufacturer can dictate which products have which codes. And the system of encrypted private keys means that only the manufacturer can transfer their asset to the next owner. A counterfeit asset would therefore still be recorded as belonging to the new owner. A potential purchaser of that counterfeit can quickly check through the app that the QR code and the asset are not registered to the counterfeiter and abandon the purchase.

This is exactly the same process that is used to secure vehicles through the vehicle identity, the VIN, the registration plate number (equivalent to a barcode or QR code) and the motor vehicles database.

Discover The Future of Anti Counterfeit

Manufacturers are able to build templates to contain complex data, including specifications, regulatory information, product use documentation, images, videos – the list is endless.

contact us