Optical Smart™ Labels
Product traceability and identification
Optical Smart™ Labels
Merging optical and digital know-how, SURYS has devoted significant R&D investments to digital content recognition technologies for Brand Protection applications: Optical Smart™ Labels. They allow the authentication of optical security features working with market available Smartphones. Applications, detect, capture, analyse and authenticate images from an optical security device.
Optokey™ security labels are developed to be applied directly on a box, a bottle or any type of packaging. They combine overt, covert and forensic security levels.
They present an additional outstanding second level security feature: automated authentication functionality, readable with a Smartphone. The application – working in tandem with a magnifier adds on the Smartphone (iPhone or Android) – captures simultaneousely the label optical image and the encrypted data matrix, recognizes and authenticates the label. The Optokey™ allow connectivity only for optically verified genuine labels.
DROP™ label offers higher security level of authentication, each label being enrolled in a database, every label being unique. DROP™ labels use the latest technology and combine optical security with digital authentication features. The automated authentication by smartphone relies on the combination of the analysis of the optical signature of the feature and of the unique image signature stored in the data-base.
Thanks to Optical Smart™ Labels solutions each label can be identified individually to track where products traveled. This total traceability, from production to distribution, facilitates the dismantling of parallel markets.
Personalize your security labels
Depending on the information to be checked, appropriate numbering can be added to the whole range of Hologram. Industries labels. It will be used, either alphanumeric characters for a visual identification, or a bar code or 2D data matrix for an automatic reading. These random codes are generated with specific software.
Different printing techniques are available in SURYS to write the code in a secure way according to the product considered and the purpose to achieve (inkjet, thermal printing, laser engraving, micro encoding…).
Once generated the codes are stored in a specific database. For each specific application, SURYS proposes the development of the secured database and of the interface to allow a complete traceability from the production to the final customer. The codes can be verified either by a network of inspectors or by the consumer by phone or on the Internet, directly on the associated website of SURYS: http://www.checkcloser.com/new/
Different accesses are available whatever the solution chosen, depending on the controller profile:
> 1st level control: this access is for the consumer who needs to authenticate easily and quickly the product
> 2nd level control: this is a specific access for a professional controller who needs to have higher level elements.