Brand Protection

Anti-Counterfeiting: Protect Your Products with Every Scan

Counterfeiting drains $467 billion annually from global trade (OECD, 2021 data, published May 2025). Sprouter combats this with three-layer protection built into every GS1 QR code: cryptographic verification, first-scan registration, and algorithmic clone detection that flags geographic impossibilities, velocity anomalies, and unauthorized region scans.

The Counterfeiting Problem

Counterfeit goods aren't just a luxury-brand problem. They affect pharmaceuticals, food, electronics, auto parts, and consumer goods at every price point.

$467B
Counterfeit trade value
OECD, 2021 data (published May 2025)
2.3%
Share of global imports
OECD, 2025
$4.2T
Total economic impact
ICC/BASCAP projection
4.2-5.4M
Jobs lost globally
ICC/BASCAP

Behind these numbers: consumers exposed to unsafe products, brands losing revenue and reputation, governments losing tax revenue, and an estimated 4.2-5.4 million jobs displaced globally. Traditional anti-counterfeiting measures — holograms, special inks, serial numbers — are increasingly insufficient against sophisticated counterfeiting operations.

Three-Layer Protection

Each layer adds a distinct security dimension. Together they create a defense-in-depth system that is mathematically difficult to defeat.

1

Verify

secure.gs

Cryptographic authentication

2

Register

lock.gs

Ownership establishment

3

Detect

Clone detection

Algorithmic anomaly analysis

Layer 1: SVT Verification

secure.gs Cryptographic

Every product QR code carries a Security Verification Token (SVT) — a cryptographic signature that proves the product was registered by an authorized manufacturer.

How SVT Works

  • Cryptographic signing: Each token is generated with a per-brand secret key
  • Tamper-proof: Any modification to the token invalidates verification
  • Time-bound: Tokens include timestamp validation to prevent replay attacks
  • Side-channel resistant: Verification uses constant-time comparison

Consumer Experience

  • Consumer scans the QR code with any smartphone
  • The embedded security token is automatically verified
  • The token is checked against the brand's registered credentials
  • Result: Authentic or Suspicious

Layer 2: First-Scan Registration

lock.gs Ownership

The first scan establishes a product's provenance. Every subsequent scan is compared against this baseline — creating a chain-of-custody record from factory to consumer.

How Registration Works

  • First scan of a unique serial is registered as the authentic instance
  • Registration records: device fingerprint, geographic location, timestamp
  • Subsequent scans are compared against the registration record
  • Different device or unexpected location triggers an alert

Why It Matters

  • Counterfeiters can copy a QR code, but they can't un-register the original scan
  • Establishes ground truth for each individual product unit
  • Enables serial-level tracking through the distribution chain
  • Provides forensic evidence for legal action against counterfeiters

Layer 3: Clone Detection

Algorithmic Analysis

Three detection algorithms run on every scan, analyzing patterns across the entire scan history to identify cloned products.

🌍

Geographic Impossibility

Critical

Same serial number scanned in two distant locations within a time window that makes physical transit impossible. Sprouter's detection algorithms analyze scan distances and timing to identify cloned QR codes.

Evidence collected: Distance between scans, time delta, scan IDs, location data

Velocity Anomaly

Warning

Same serial number scanned at an unusually high frequency. Indicates a potential counterfeiting operation where a single QR code has been photographed and duplicated across multiple products.

Evidence collected: Scan frequency per serial, device fingerprints, timestamps
🚫

Region Violation

Warning

Product scanned in a geography not authorized for that SKU's distribution. Identifies gray market activity, parallel imports, or supply chain diversion where products are being sold outside their intended markets.

Evidence collected: Scan geography, authorized region list, distributor mapping

Brand Protection Dashboard

Real-time monitoring and investigation tools for your security operations team.

Real-Time Alerts

Instant notifications when suspicious scan patterns are detected. Configurable alert thresholds and webhook delivery for integration with existing security tools (SIEM, incident management).

Geographic Heat Maps

Visualize scan activity by region to identify distribution patterns, gray market hotspots, and clusters of suspicious activity. Drill down from country to city level.

Scan Velocity Charts

Per-serial and per-product scan velocity trends over time. Spot emerging counterfeiting operations before they scale by identifying velocity spikes early.

Per-Serial Investigation

Drill into individual serial numbers for forensic analysis. View complete scan history — every device, location, and timestamp — to build evidence for enforcement.

How Protection Integrates with the Resolver

Anti-counterfeiting isn't a separate system — it's built into the scan flow. Every consumer scan triggers the full protection pipeline automatically.

1
Consumer scans QR code QR code encodes GS1 Digital Link URI with embedded security token
2
Token is verified Cryptographic token verified against Sprouter's secure infrastructure
3
Scan is logged Location, device, timestamp, serial recorded
4
Clone detection runs Geographic, velocity, and region checks executed
5
Alert if anomaly Suspicious patterns flagged with severity level
6
Brand notified Webhook delivery to brand's security operations

EU Traceability via Digital Product Passport

Anti-counterfeiting and traceability are converging under EU regulation. The ESPR framework requires product data transparency that naturally complements brand protection.

ESPR Compliance Scoring

Track your product data across 8 required ESPR compliance fields. Batteries are first (February 2027, confirmed), with textiles and electronics expected to follow.

Supply Chain Traceability

EPCIS 2.0 integration captures 4 event types (Object, Aggregation, Transaction, Transformation) across 14 business steps for full chain-of-custody documentation.

Material & Sourcing Disclosure

Machine-readable JSON-LD output for material composition, recycled content, carbon footprint, and sourcing data — accessible to regulators via the GS1 Digital Link resolver.

Protect Your Brand with Every Scan

Anti-counterfeiting is included in Connected Packaging Pro ($1,500/month). Enable three-layer protection on your GS1 QR codes — no additional integration required.

Anti-Counterfeiting FAQ

How does product authentication with QR codes work?

Each product gets a unique QR code with a cryptographic Security Verification Token (SVT). When a consumer scans, the token is verified against Sprouter's secure verification infrastructure — if the token is invalid, expired, or tampered, the product is flagged as suspicious.

What is first-scan registration?

The first time a product's QR code is scanned, it's registered as the authentic instance. Any subsequent scan from a different device or unexpected location triggers an alert, identifying potential counterfeits in the supply chain.

How does clone detection work?

Three algorithms work together: geographic impossibility detection (same serial scanned in two distant locations within a short time window), velocity anomaly detection (unusually high scan frequency for a single serial), and region violation detection (product scanned in an unauthorized geography).

How much does counterfeiting cost globally?

According to the OECD (2025 report, 2021 data), global trade in counterfeit goods reached $467 billion, representing 2.3% of global imports. The ICC/BASCAP estimates the broader economic drain at up to $4.2 trillion including secondary effects such as lost tax revenue and job displacement.

Last updated: April 2026