Radio-frequency identification (RFID) is an embedded technology that utilizes electromagnetic fields to identify and track tags attached to objects. An RFID tag contains a tiny radio transponder, radio receiver, and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, most often an identifying inventory number, back to the reader.
RFID tags can be used in logistics for supply chain visibility and inventory tracking in apparel, pharmaceuticals, and more. It can be attached to any product from documents to electronics and even to clothing. …
With the new year, FDA approval for various coronavirus vaccines has provided a glimpse of light at the end of the tunnel. However, there is still work to be done before we can fully overcome this virus. Now that we have developed working vaccines, the challenge is to ensure that they are properly distributed in a safe and efficient manner.
Unfortunately, the rising demand for vaccines has encouraged many criminals to offer counterfeit vaccines on the dark web and other online marketplaces. In a recent NPR interview, Interpol officials warned of numerous listings on the dark web that seem to…
You can find QR codes everywhere — from a bottle of wine to a new set of tires. QR (Quick Response) codes are a type of matrix barcode that contains information about the item to which it is attached. They are often used for coupons, mobile payments, social media, smart transportation, product verification, and even ID authentication. It’s estimated that 11M households will scan a QR Code in 2020 in the USA alone.
QR codes are convenient, but they can be easily copied.
QR codes are convenient for product identification, as they can be easily scanned with a smartphone and…
When we think of counterfeits, the first thing that comes to mind are the fake Gucci and Nike products that we see online or in vendor stalls on the sidewalk. Although forgery costs luxury apparel brands billions of dollars every year, there are numerous industries where counterfeiting can pose an even bigger risk.
Even though Veracity Protocol is a U.S. company, our roots are Czech—our founders are Czech, and the development team is based in the Czech Republic. This granted us the unique opportunity to join the Economic, Trade, and Investment Forum in Taiwan, accompanying Miloš Vystrčil, the President of the Senate of the Parliament of the Czech Republic. Taking place from August 29 to September 5, 2020, the purpose of the visit was to support Czech-Taiwanese trade and investment relationships as a driver for economic growth and prosperity.
Counterfeiting has a colorful history, spanning handbags to manufactured goods. Unlike other industries, inauthentic parts and components critical to the aerospace industry can have life or death consequences.
Counterfeit aircraft parts are usually made of low quality materials, manufactured within inadequate processes and aren’t tested properly. Such parts are only designed to resemble genuine parts. Inauthentic components are cheap to buy, far more profitable to sell than authentic ones, and have become nearly impossible to distinguish from originals. They may look identical, but the counterfeit has a much greater risk of failure.
As the COVID-19 pandemic negatively impacts supply chains, industries, and economies around the world, criminals are seizing this opportunity to profit in any way they can — even at the expense of innocent lives. From March 3–10, 2020, police, customs, and health authorities from 90 countries took part in Operation Pangea, a collective action against fraudulent medical sales online. Led by Interpol, Operation Pangea seized more than $14M USD worth of potentially dangerous pharmaceuticals, among them substandard hand sanitizers, unauthorized antiviral medications, and 34,000+ counterfeit surgical masks.
Trezor is a hardware wallet that allows people to securely store, send, and receive cryptocurrencies. Unlike traditional data storage methods such as offline storage and paper wallets, Trezor secures payments without exposing private keys to potentially compromised computers.
In light of the ongoing coronavirus (COVID-19) pandemic, countries across the globe are scrambling to protect as many lives as possible. Within workforces, this means a major push towards automation, with tech companies stepping in to bridge the gap and implement the necessary solutions.
Technologies like artificial intelligence (AI) and intelligent automation (IA) are already being put into practice across industries.
COVID-19 has clearly impacted global logistics with increased shipment delays, labor shortages, and flight cancellations, and manufacturers are transitioning towards better workflow automation.
With the lack of transparency and information about raw materials, AI technologies focused on end-to-end tracking…
For us here at Veracity Protocol, 2019 was a great push forward. From diving into the accelerator program at Techstars in NY as one of the top 10 most promising global blockchain startups, being featured at Plug & Play, and collaborating with names like Amazon and Microsoft, we wanted to reflect and appreciate just how far we’ve come with our tech and team while also filling you in on exactly what we have planned for 2020.
When it comes to our tech, here are some of our major accomplishments for 2019 in a nutshell:
The Protocol of Trust for Physical Objects • Protecting customers, brands, and national security / #traceability #trust #authentication #protection #security