Veracity Protocol’s smart technology is easy to use, fast, and 100% tamper-proof.

Radio-frequency identification (RFID) is an embedded technology that utilizes electromagnetic fields to identify and track tags attached to objects. An RFID tag contains a tiny radio transponder, radio receiver, and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, most often an identifying inventory number, back to the reader.

RFID tags can be used in logistics for supply chain visibility and inventory tracking in apparel, pharmaceuticals, and more. It can be attached to any product from documents to electronics and even to clothing. …


With the new year, FDA approval for various coronavirus vaccines has provided a glimpse of light at the end of the tunnel. However, there is still work to be done before we can fully overcome this virus. Now that we have developed working vaccines, the challenge is to ensure that they are properly distributed in a safe and efficient manner.

Danger of Counterfeit Vaccines

Unfortunately, the rising demand for vaccines has encouraged many criminals to offer counterfeit vaccines on the dark web and other online marketplaces. In a recent NPR interview, Interpol officials warned of numerous listings on the dark web that seem to…


Veracity Protocol can verify product’s authenticity with 99.9% accuracy — without tags, chips, or markers

You can find QR codes everywhere — from a bottle of wine to a new set of tires. QR (Quick Response) codes are a type of matrix barcode that contains information about the item to which it is attached. They are often used for coupons, mobile payments, social media, smart transportation, product verification, and even ID authentication. It’s estimated that 11M households will scan a QR Code in 2020 in the USA alone.

QR codes are convenient, but they can be easily copied.

QR codes are convenient for product identification, as they can be easily scanned with a smartphone and…


Veracity Protocol detects fraudulent documents with speed and high accuracy

When we think of counterfeits, the first thing that comes to mind are the fake Gucci and Nike products that we see online or in vendor stalls on the sidewalk. Although forgery costs luxury apparel brands billions of dollars every year, there are numerous industries where counterfeiting can pose an even bigger risk.

Forgery of important government documents, such as driver IDs, passports, and visas, contribute to a growing national security risk for countries around the world. …


As part of the cooperation, Veracity Protocol is protecting one million of each type of mask free of charge.

MOEA Minister Wang Mei-hua (fifth left), National Development Council Minister Kung Ming-hsin (fourth left), Czech Republic Senate President Milos Vystrcil (third right), and other representatives. Source: https://taiwantoday.tw/news.php?unit=6&post=184347

Even though Veracity Protocol is a U.S. company, our roots are Czech—our founders are Czech, and the development team is based in the Czech Republic. This granted us the unique opportunity to join the Economic, Trade, and Investment Forum in Taiwan, accompanying Miloš Vystrčil, the President of the Senate of the Parliament of the Czech Republic. Taking place from August 29 to September 5, 2020, the purpose of the visit was to support Czech-Taiwanese trade and investment relationships as a driver for economic growth and prosperity.

The United States is Taiwan’s second largest trading partner in the world, with Japan…


Veracity Protocol’s technology can secure components in the aerospace and aviation industry

Counterfeiting has a colorful history, spanning handbags to manufactured goods. Unlike other industries, inauthentic parts and components critical to the aerospace industry can have life or death consequences.

Counterfeit aircraft parts are usually made of low quality materials, manufactured within inadequate processes and aren’t tested properly. Such parts are only designed to resemble genuine parts. Inauthentic components are cheap to buy, far more profitable to sell than authentic ones, and have become nearly impossible to distinguish from originals. They may look identical, but the counterfeit has a much greater risk of failure.

Faulty parts have been found in both civilian…


As the COVID-19 pandemic negatively impacts supply chains, industries, and economies around the world, criminals are seizing this opportunity to profit in any way they can — even at the expense of innocent lives. From March 3–10, 2020, police, customs, and health authorities from 90 countries took part in Operation Pangea, a collective action against fraudulent medical sales online. Led by Interpol, Operation Pangea seized more than $14M USD worth of potentially dangerous pharmaceuticals, among them substandard hand sanitizers, unauthorized antiviral medications, and 34,000+ counterfeit surgical masks.

It doesn’t stop there. Countries desperate to purchase more protective gear are finding…


The counterfeit problem

Trezor is a hardware wallet that allows people to securely store, send, and receive cryptocurrencies. Unlike traditional data storage methods such as offline storage and paper wallets, Trezor secures payments without exposing private keys to potentially compromised computers.


Automation across industries

In light of the ongoing coronavirus (COVID-19) pandemic, countries across the globe are scrambling to protect as many lives as possible. Within workforces, this means a major push towards automation, with tech companies stepping in to bridge the gap and implement the necessary solutions.

Technologies like artificial intelligence (AI) and intelligent automation (IA) are already being put into practice across industries.

Workflow automation and supply chains

COVID-19 has clearly impacted global logistics with increased shipment delays, labor shortages, and flight cancellations, and manufacturers are transitioning towards better workflow automation.

With the lack of transparency and information about raw materials, AI technologies focused on end-to-end tracking…


For us here at Veracity Protocol, 2019 was a great push forward. From diving into the accelerator program at Techstars in NY as one of the top 10 most promising global blockchain startups, being featured at Plug & Play, and collaborating with names like Amazon and Microsoft, we wanted to reflect and appreciate just how far we’ve come with our tech and team while also filling you in on exactly what we have planned for 2020.

Our tech advancements

When it comes to our tech, here are some of our major accomplishments for 2019 in a nutshell:

  • Launched a software development kit (SDK)…

Veracity Protocol

The Protocol of Trust for Physical Objects • Protecting customers, brands, and national security / #traceability #trust #authentication #protection #security

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store