Choose the winning technology

PopimsCode technology is the best one, both for fighting counterfeiting and document fraud, and for personal identification.
Just compare!

Comparison with other technologies fighting counterfeiting and document fraud

PopimsCode ShiningFlakes

Purpose
Enabling end users authentication
Enabling brand owner authentication
Enabling laboratory authentication
Tracking
Tracing
Examples
Direct printing
Varnish spray
Security stickers (impossible to re-use on another product or document)
Corks capsules and covers automatically getting destroyed upon opening the container
Tags and other devices getting destroyed upon commissioning the product
Reams of coded paper
Coded plastic cards
Advantages
Strong authentication by the user, by the brand and by any expert
Automatic authentication with a smartphone
Cannot be copied or forged
Possible real-time database updating
Low cost
Drawbacks
Internet required (except for brand owners & laboratories)

Overt (visible features)

Purpose
Enabling end users authentication
Examples
Holograms
Optically Variable Devices
Color shifting Inks and films
Security Graphics
Sequential Product Numbering
Advantages
Semi-secure authentication by the user
Can be deterrent for counterfeiters
Drawbacks
No smartphone authentication
Require user education
Can be copied
Can give false insurance (unknown hologram)
Can be expensive

Covert (hidden markers requiring a device)

Purpose
Enabling brand owner authentication
Examples
Invisible printing
Embedded Image
Digital watermarks
Hidden marks and printing
Anti-copy and anti-scan designs
Laser coding
Substrates
Odors.
Advantages
Simple
Often low cost
Drawbacks
No smartphone authentication
No authentication by the user
Need secrecy to be kept
Can be copied

Forensic (requires a laboratory)

Purpose
Enabling laboratory authentication
Examples
Chemical taggants
Biological taggants
DNA taggants
Isotop Ratio
Micro taggants
Unique surface marking or topography
Advantages
High tech and secure
Drawbacks
No smartphone authentication
No authentication by the user
Significant cost
Implement complexity

Track & Trace, Serialization

Purpose
Tracing
Tracking
Enabling unsecure authentication
Examples
Serialization
Barcodes
RFID
Advantages
Unsecure authentication by the user
Remote authentication
Possible rewriting
Drawbacks
Can be copied
May be vulnerable to RFID hackers
Damaged labels may not be read
Remote reading leads to privacy concerns
may be expensive (RFID)

Comparison with other personal identification technologies

PopimsCard (ShiningFlakes)

Advantages
Provides secure face to face identification
Provides on line identification
No battery = works at all times
Impossible replication
Lost or stolen ? PIN protection against fraud + easy replacement (several cards /entity)

Telephone

Advantages
Provides on line identification
Drawbacks
No face to face identification
Out of battery = identification becomes impossible
May be hacked - identity may be stolen
Identification becomes impossible and identity may be stolen if lost or stolen

SmartCard

Advantages
Adapted to payment with a specific terminal
Compatible with existing terminals and cash dispensers
Drawbacks
Face to face identification is not secure
Requires a specific terminal
No battery = works at all times
Possible reproduction (skimming) = identity may be stolen
Identification becomes impossible and identity may be stolen if lost or stolen

Encrypted Barcode

Advantages
low cost
Drawbacks
Face to face identification is not secure
No battery = works at all times
identity may be stolen if reproduced
identity may be stolen (if not PIN protected) if lost or stolen