Back

Technology Bubble Tag™
 
Protection strategy Product authentication
Product identification
Type Covert or coded feature
System Code
Medium Secondary packaging
Authentication/Identificaton Authentication
Identification
Traceability Yes
Cost Price on request
Required equipment Access to the database (internet connection) or a reader
Vertification level User;
Pharmacist;
Authorities;
Laboratories
N.B. Already used for protection of high value products (wine, documents etc…).
Description The Bubble Tag™ is made of a translucent polymer inside which, as a result of a random phenomenon, self-generated bubbles appear. This constellation of bubbles forms the basis of the identity given to a product or document. Each Bubble Tag™ is unique and impossible to replicate, even by the manufacturer. Once generated, each Bubble Tag™ is associated with a unique identifier (alphanumeric reference, bar code, DataMatrix, RFID …). After association, the ‘identifier/Bubble Tag™’ couple is recorded in an authentication database. Rights owners apply the Bubble Tag™ to their products or documents. This recording becomes accessible over the Internet after authorization by rights holders (known as the ‘activation’ of Bubble Tags™). During this process, rights owners will enter a description of the product or document. The Bubble Tag™ can be authenticated by means of a visual or electronic comparison. Visual comparison: The number printed next to the Bubble Tag™ gives access to the image of the Bubble Tag™ already stored in a database for a unitary visual comparison. This checking method, accessible via a PC, a PDA or a mobile phone with an internet connection, is extremely easy. More than 99.5% of people who tested it were able to carry out a visual comparison in less than 5 seconds.
Electronic comparison: 3 types of reader exist, a desktop reader, an electronic OEM reader for integrators, a terminal for use during mobile checks.
 
Strengths No training needed;
Impossible to copy and unique;
Instant authentication with reader;
Robust : remains recognizable when partially destroyed;
Resistant to chemical attacks, bases and acids;
Can be added on a adhesive seal which would confer a high degree of protection (anti-tampering + authentication);
User verifiable;
 
Limitations Cost;
Added production cost;
Human interpretation;
 
  Links:http://www.prooftag.net/en/technology/chaometrics/bubble-tag

Back