RFID technology is great for inventory management, less so for brand protection

Radio-frequency identification (RFID) is an embedded technology that utilizes electromagnetic fields to identify and track tags attached to objects. An RFID tag contains a tiny radio transponder, radio receiver, and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, most often an identifying inventory number, back to the reader.

RFID tags can be used in logistics for supply chain visibility and inventory tracking in apparel, pharmaceuticals, and more. It can be attached to any product from documents to electronics and even to clothing. Many of your favorite brands use RFID for their products, bringing the total market value of RFID tags to over $12B.

Despite the introduction of new capabilities for inventory management, there are still a few shortcomings that have yet to be addressed. One of the main concerns is cost. To apply RFID tags to products at scale, companies must invest money and make alterations to their manufacturing and/or packaging processes. This increase prevents many from ever making the switch.

Many brands use RFID technology, but criminals are able to remove and/or duplicate the tags.

Another concern is accuracy and reliability. Tags are manufactured en masse, and companies often run into the issue where they don’t function properly or respond incorrectly. This problem was recently highlighted by RFID skimming events, when criminals used readers to steal information from nearby credit cards.

Many brands use RFID technology, but it’s expensive, invasive, and can be unfriendly depending on the environment.

As RFID becomes more common, questions have been raised about environmental sustainability too, as the tags are most commonly composed of polyethylene terephthalate (PET) plastic. Although PET can be recycled, RFID tags also contain metal radio parts. Moreover, because of the way they are embedded, it complicates the recycling process for the entire product. At scale, RFID tags create a significant amount of plastic waste that does not help in the battle towards a more circular economy.

RFID can be attached to any product from electronics to clothing.

Despite being an improvement from QR codes and barcodes, RFID technology is still not a complete security solution. The main reason is that RFID tags are external additions to each item. As a result, RFID tags are highly vulnerable to tampering and third-party manipulation. Louis Vuitton's recent $15 million counterfeit bust demonstrates how easy it is for embedded RFID tags to be removed and duplicated by criminals. A recent massive counterfeit operation uncovered a production of thousands of fake Louis Vuitton bags with NFC sensor chips, a feature even the real ones don’t have yet.

Criminals are able to remove and duplicate embedded RFID tags.

Veracity Protocol has addressed these shortcomings with the development of the Physical Codeᵀᴹ. Using computer vision technology, companies can now rely solely on a product’s unique material structure to protect itself. This allows for a highly accurate and quick authentication system that is non-invasive to the product.

Physical Code™ cannot be changed, manipulated, or tampered with because it is based on an item’s unique material structure — unlike tags, chips, or invisible markers.

Veracity Protocol’s technology can secure the authenticity, identity, and security of any product — without special hardware, embedded tags, chips, or markers. Consumers are able to easily identify products using just a smartphone camera. Veracity Protocol’s technology has 99.9% accuracy with real-world applicability and works in various light conditions, angles, and on many materials.

Physical Code™ is a non-invasive and tamper-proof solution to represent an item’s unique material structure.

Unlike RFID technology, the Physical Codeᵀᴹ is impossible to reverse-engineer, tamper with, or duplicate. Veracity Protocol can be seamlessly integrated within the manufacturing process and is also cost-efficient at scale at a fraction of the price of RFID tags, making it a cheaper, greener, and more effective alternative for many different use cases.

If a company still wants to keep their existing RFID mechanisms, Veracity Protocol can work in tandem with them. Our non-invasive and seamless integration allows it to work with RFID tags so that companies can take advantage of the strengths of both technologies.

To replace your RFID mechanisms — or to augment their security — reach out at hello@veracityprotocol.org.

Connect with us

Veracity Protocol is the protocol of trust for physical objects to protect customers, brands, and national security. Using advanced computer vision and machine learning, we enable any camera to create a tamper-proof Physical Code™ based on an object’s unique material structure — without embedded tags, chips, markers, or special hardware.

Follow us on Twitter, Facebook, and LinkedIn.

--

--

--

The Protocol of Trust for Physical Objects • Protecting customers, brands, and national security / #traceability #trust #authentication #protection #security

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Perfect Hit . . . Hack Free Resources Generator

@0xGuard are fast, trusted and reliable.

{UPDATE} Blocky XMAS Hack Free Resources Generator

{UPDATE} Sweet Candy Match 3 Blast Hack Free Resources Generator

Common Hacking Techniques

Privacy in a messenger: 9 options you should start using today

[Notice] DUCATO Announcement : Token Swap 5th Week Details

Cybersecurity for Hotels: Is there a real threat?

Cybersecurity threats in hotels

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Veracity Protocol

Veracity Protocol

The Protocol of Trust for Physical Objects • Protecting customers, brands, and national security / #traceability #trust #authentication #protection #security

More from Medium

A Different Approach to Raising Plants for the Beginner

Beautiful calibrachoa with lavender and purple flowers

Farewell Nakagin Tower

What’s the Deal with Trends Anyway?

THE 3 C’S OF ELITE TALENT DEVELOPMENT

Photo by TJ Dragotta on Unsplash