Service:

Product Engineering, Service Design, Business Development, Go-to-Market

Industry

Manufacturing, IT Services

Blockchain Platform Analysis for use in Absolute Authentication of Product

Or, how to make sure that the customer is 100% assured that they have bought the right product from the actual company.

Background

How do you ensure that your distribution and retail is selling your product and not your duplicates?

PROBLEM / OPPORTUNITY STATEMENT

CRITICAL CONSTRAINTS

KEY OBSERVATIONS

SOLUTION

APPROACH TO SOLUTION

KEY SOLUTION METRICS

<p class="font_7">The problem of counterfieting has been around for decade and might continue to exist in some form or the other.&nbsp;</p>
<p class="font_7"><br></p>
<p class="font_7">Various solutions have been attempted, including complex technology driven solutions that sought to authenticate the product and tackle service through product authentication.</p>
<p class="font_7"><br></p>
<p class="font_7">Some of them work and many of them are costly.</p>
<p class="font_7"><br></p>
<p class="font_7">What did we achieve?</p>
<p class="font_7"><br></p>
<ul class="font_7">
<li><p class="font_7">Significant cost reduction to the counterfieting determent process</p></li>
<li><p class="font_7">Zero change process and zero knowledge security with built in privacy module</p></li>
<li><p class="font_7">Two way, multi breach point monitoring system, engineered to regulate and maintain transactions</p></li>
<li><p class="font_7">Immediate visibility on product movement and alignment with integrated processes</p></li>
<li><p class="font_7">Proof of trade serving as authentication of product sales</p></li>
<li><p class="font_7">No change to existing infrastructure</p></li>
<li><p class="font_7">No need for additional hardware</p></li>
</ul>
<p class="font_8">A unique solutioning that ensures breach from within is impossible.</p>
<p class="font_8"><br></p>

SOLUTION LIMITATIONS

PROCESS APPLIED

REVENUE IMPACT

AD-HOC CONTRIBUTORS

KEY BENEFITS OF SOLUTION