If to at least one of these questions you’ve answered "yes", you should spend some time to familiarize yourself with the system. Besides, now in the pilot stage, we are ready to conduct introductions and present practically all necessary tools for launching, for free.
EMC DPO, functioning on the base of the platform Emer, allows the creation for the object(product) ‘s unique digital passport, kept in a decentralized database- the blockchain, and provides service for control of that passport. To put simply, it is possible for every unit of the product from the manufacturer to create a indestructible, non- replicable (and this isn’t a joke!) and easily checkable for authenticity electronic document.
EMC DPO antifake uses the properties of the technology DPO to defend the production from faking, and also serves as a tie between the digital passport and the production.
Thanks to the developed tools, all that which is (minimally) required from the producer is to apply to the product specialized tags and, possibly, install a specific security program for analysis of sales data, controllable through these digital passports, etc. (though even this isn’t required and may be done in and moment after initially using the technology).
You may try our technology right now- and it won’t cost anything. The task of the team of developers for the current moment – popularizing the solution, detecting weak points, and collecting feedback.
For products still at the factory (or the distributor’s storage), stickers with a 2D QR code are applied (or use of another form of marking is conducted, for instance, by inserting a tag into the package)..Each individual product gets its own tag, containing the serial number of the producer. The second code – the "purchase code" – exists inside the technical passport of the product, or on the inside of the two-layered tag (see image).
In the store, the buyer may scan the code with the use of any smartphone. The installation of specialized programs usually is not required (almost all smartphones already have the required applications), though to guarantee utmost safety and protection from "phishing", it is best to use specialized applications.
For the genuine, unbought product, a page appears to provide information about the product and the producer, generated in accord to the producer’s design. It is reported that the product is in free sale, and that it is authentic.
When a buyer obtains the product, another code may be accessed (found by tearing off the top layer of the two-layered tag, or finds it in the instructions) and may also be scanned. This will open another page, on which the code undergoes a cryptographic checking of authenticity, and, if the product is authentic (as the code is authentic), the buyer obtains the ability to register the purchase.
Upon registration they may have the ability to enter their name and create a password, with the help of which they may be able to in the future edit some of the data of the product (for instance, leave comments), and also take ownership with a record in the blockchain.<.p>
Optionally, the producer may offer the customer answers to questions, or to fill out any requested data, motivating them to do so in various ways (Extended warranty, cash bonus payment, service opportunity, technical support, future discounts, etc). The digital passport allows the manufacturer to verify the authenticity of the buyer.
Attackers who try to forge the goods do not have the opportunity to make new serial numbers tied to the manufacturer without having the cryptographic keys that the manufacturer possesses.
If people attempt to manufacture fake tags with nonexistent codes – they will not be recognized by the system, and the buyer will receive an error message when trying to verify the code.
A attacker may purchase one copy of the product themselves and copy their tag onto their own product. However, after the purchase of the very first forged product, all the other codes will be "burned" and the subsequent buyers will be shown a message that the product has already been purchased by a previous buyer. On top of that, the product initially purchased by the attacker will also become "unauthorized", which may help, among other things, to identify the criminal.
Only the holder of the private cryptographic key of the manufacturer can make labels that are capable of passing the testing. It is important that even the owners of technologies and sites – verifiers do not have such an opportunity. In essence, there may be a single existing key kept by the director of the company (though we strongly recommend making more copies in reserve!). None of the manufacturer's employees, none of us, the authors of our technology, no one around the world can make a fake label that will pass the test - except you! This is provided through decentralization- one of the main properties of the blockchain.
Also pay attention to that, cryptographic tokens ("coins", "crypto-currencies") are not used in the verification process, for this reason, authentication technology cannot be subject to any crypto-currency related restrictions.
Just contact us. You may also provide us with the materials for production of the tags. We’ll make the tags for you, and take all of that work on ourselves. You’ll only have to apply them to the product.
Good news – on the implementation stage we are ready to launch pilot projects, free of charge! By the way, mention of the EMCDPO antifake technology may serve as a additional advertisement for you.
We offer to all who are interested pilot implementations - several dozen tags with codes, the required cryptographic keys, all which is needed, "all included", will be ready within the duration of several days.
There are several possible schemes of work to accomplish this – from completely autonomous work (you will not need us in this case at all – download the software, configure the verification servers, of if you want to use the ones we provide, create the keys and make the serial numbers) – to the simplest case, where all you have to do is generate the serial numbers and secret key with the help of the openscource utility that we can provide to you, and the rest of the work will be on us. In any of these cases, the most time-consuming process would be to apply the tags onto the products.
With the help of your smartphone (installation of specialized programs not being required) you scan the tag on the product. A page opens, similar to https://emcdpo.info/key/DEMO-1030 , where information about the manufacturer and the particular product is displayed upon a green background. It is also reported that the product is for sale and is genuine.
If the product is counterfeited, there will either be no page, or a page with a error message will appear, and in the case that a attacker copied a tag of a original product and reproduced it, you will receive a message that the product has already been purchased, similar to this- https://emcdpo.info/key/DEMO-1001 However, if the product is genuine, and you like it – you may buy it. As the product is being purchased, it will have to pass one more check.
The product is authentic, and you wish to buy it. You purchase it, tear off the outer layer of the two-layer tag by pulling the tab (see picture). Underneath it is another code that you scan to get to the purchase page. There you register the purchase (and get any provided bonuses from the manufacturer, if they are there), create a password which you can use to change the purchase data in the future, claim the provided bonuses and gain access to its services, or even transfer ownership of the product to another person. After the purchase, scanning both the first and second code will result in a page like https://emcdpo.info/key/DEMO-1001 , on which you may do the specified actions with the product after you enter the password that was provided to you in the registration.
And you have the password needed to access the record.
In the very beginning, your record (or the digital passport of the product) is stored by the issuer, but you can request its transfer to your address and store it yourself. Blockchain technology makes this possible, and after the transfer of the name, no one (not the manufacturer, nor the issuer, nor even the Supreme Court) will be able to take away from you control (possession) of this record - unless you yourself wish to transfer it to another person.
The manufacturer may create loyalty programs and surveys for buyers of goods in which they can participate (though these are optional). These can be surveys (which may also be paid), improver terms of service, discounts, and much more. Thanks to the electronic passport, it will be easy for you to prove that you are the owner of a purchased product.
That is bad news. The good news is, that as long as the serial number is not erased from the product - anyone knowing about the EMC DPO system can easily state that it's stolen. By the way, by having the thief know of this fact will lower the probability that anything will get stolen in the first place.
It is possible then, that the unwary thief, unknowing of EMC DPO, will receive justice – and the police will find it much easier to find you and return your stolen property.
EMC DPO antifake – is not a absolute defense against theft. However, it provides real mechanisms to reduce its risk.
Thanks to the presence of the electronic passport of the product, an outsider who has not bought the product will be unable to impersonate the buyer. This gives the possibility to motivate the buyer – as well as the money – to participate in surveys, provide information about themselves, etc.
Some methods of motivation have already been suggested in the introduction – these being getting discounts, special services, extending the warranty and much more.
Due to that all records are placed into the blockchain, and a environment in which the cryptographic payment tokens (crypto currency) EMC function, you can motivate the buyer to answer your questions and maintain activity, transferring rewards to the product owner’s account. At the same time, the producer does not have to know anything about the customer, and the system will continue to function even in the case that the right to own and use the product is transferred to another person! In essence, you have in your hands the "eternal reliable phone" connection with the customer that owns your product – just don’t forget to motivate them to "take the phone".
The cost of entering one name in the NVS blockchain Emer is approximately 0.2 EMC (or four cents of the US dollar, as of the beginning of spring 2017). The cost of printing one tag strongly depends on the volume and the size of the label and can come at about 1-10 cents for smaller volumes. The cost of the sticker for the tags will also depend on the specifics of the product and the type of tag, but it is unlikely to exceed 5-10 cents, even for very small volumes. For large volumes, these figures will of course be significantly lower.
When compared to the cost to produce a product that is worth more than several dollars, this cost becomes nearly invisible. Constant costs for the operation of the system are practically absent for any volume of products.