What we’re doing to help during the COVID-19 pandemic. Learn more
The Standard of Trust for Physical Objects
Protecting people, brands, and national security.
Veracity Protocol enables any camera to create a tamper-proof Physical Code™ based on an item’s material structure. This secures its authenticity, identity, and security — without special hardware, embedded tags, chips, or markers.
Veracity Protocol enables any camera to create a tamper-proof Physical Code™ based on an item’s material structure.
This secures its authenticity, identity, and security — without special hardware, embedded tags, chips, or markers.
How it works
How it works
Every physical object has its own unique material structure and manufacturing characteristics.
No Proprietary Hardware
Veracity Protocol enables any camera to capture these characteristics and create a tamper-proof Physical Code™.
This allows anyone to verify an item's identity, authenticity, detect anomalies, and check for tampering.
Veracity Physical Code™ is a non-invasive and tamper-proof solution to represent an item’s unique material structure.
Types of code
Types of Physical code™
Protects each product on an individual basis, requires only the item itself.
Protects all products in a batch or SKU, requires only a small sample of items.
The secret sauce
Nobody can counterfeit, change or tamper with the Physical Code™ because it’s based on an item’s unique material structure — unlike tags, chips or markers.
High accuracy in wild conditions
Up to 99.9% accuracy with real-world applicability. Works in various light conditions, angles, and on many materials.
Fast verification on a smartphone
The entire process is simple, fast, and available on your smartphone today.
The Veracity AI Model™ uses a robust proprietary dataset with tens of millions of images.
No manufacturing changes
No need for special hardware. Durable and widely applicable across materials. Works even when 80% of the Physical Code™ is damaged.
Even when 80% of the Physical Code™ is damaged.
Across all sectors, industries, and many materials.
No external security elements. No proprietary hardware. No changes to the manufacturing.
Accuracy (up to)
No embedded security elements
0.1s / 3s
Speed per item, industrial / smartphone (up to)
Uses non-proprietary standard cameras with negligible costs
Leverage our technology to solve real challenges in the digital world.
Verify the authenticity of your products anytime, anywhere.
Ensure quality assurance for your products in a fully automated way with low costs.
Prioritize security by detecting unauthorized changes, tampering, or manipulation of your products.
Create an immutable digital twin of any product that securely connects its physical form to a digital entry in any database or blockchain.