SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
The war against counterfeiting never been so simple
thanks to Authentica the first mobile platform to
authenticate products simply through the use of a
smartphone.
The Market:
L’ anti-contraffazione
FASHION

MEDICINES AND COSMETICS

FOOD&BEVERAGE
HI-TECH

WATCH&JEWELS

TOYS

HANDMADE PRODUCTS

EVERY PRODUCTS THAT CA BE
COUNTERFEIT
The Market Size
105
mln

COUNTERFEIT PRODUCTS

23
mln

FASHION

21
mln

TOYS

38
mln

DRUGS AND COSMETIC

22
mln

45

60
mld

1300
0
21
mld

HI-TECH
ILLEGAL WEB
PLATFORM
POLICE ACTIVITY

GLOBAL VALUE ITALIAN
SOUNDING EU

WW ITALIAN SOUNDING
VALUE
What is Authentica
Authentica is a mobile app that makes it possible to certify the originality of a
product protecting consumer and producer.
CONSUMER
thanks to the
application
can verify the
authenticity
of the product
purchased
in real time.

MANUFACTURER
Authentica with you
adds a further
degree of protection
against counterfeiting
On what is Authentica
based
Authentica is based on Scratch&Screen a powerfull, scalable, reliable
Application Sever built to generate and manage unique Code .
On what is Authentica based
Consumer FE
AJAX content

Application server

Business FE

FSAL foreign systems abstraction layer
Consumer backend

Decoder

Strong
Auth
Business backend Layer

Field systems
Campaign mgmt
Reporting

Tenancy filters
Cordova

Data
adaptors

HA distributed engine

BI
CRM

Platform
Core Engine

Data Engine
●
memcached
●
noSQL DB

ERP
QA, Pdt trk
Generic SQL

Social Networks

Management backend

Denorm SQL/file

Management FE
System admin

Billing & accounting

©2012 Millone
©2012 Millone SRL -- All rights reserved
All rights reserved
On what is Authentica based
Consumer Front End Development
Multi-platform
●
Android
●
IOS
●
(WinPhone)
●
(BlackBerry)
●
...

Multi-lang/script/locale
●
en-US, en-GB, ...
●
fr-FR, ...
●
it-IT, …
●
de, es, pt, (ru, he)
●
...

Multi-version
●
SnS-branded standard
●
(multi)branded skinned std
●
(multi)branded custom
●
(multi)branded host app
●
...

Platform build tools
Build PreProcessor

Common
codebase

Platform
dependent

i18n / l10n
repository

Customer
specific
custom content

m-platf HTML

native libs

lang files (BMP)

m-platf JS

look & feel CSS

CLDR XML

std skin CSS

static content

static content

©2012 Millone SRL - All rights reserved
On what is Authentica based
Business Front End Data adaptors

BI

ERP

CRM

Business Objects

SAP ERP

SugarCRM

Pentaho

MS Dynamics NAV

SalesForce.com

MS Reporting svcs

MS Dynamics AX

MS Dynamics CRM

Sage

SAP CRM
ACT!

SQL

Spreadsheet

File

Oracle DB

MS Excel

CSV

DB2

oo.o Calc

XML

MS SQL Server
MySQL
PostgreSQL

©2012 Millone SRL - All rights reserved
The Full Authentica
Process
ATHENTICA WORK IN A COMPLETE PROCESS: IT STARTS FROM THE
PRODUCER OF THE CONSUMABLE GOODS THAT RECEIVE THE
UNIQUE CODE FROM SCRATCH&SCREEN, TROUGHT THE PRINTER
SERVICES AND FINISH WITH THE CONSUMERS THAT AUTHENTICATE
THE PRODUCTS RECIVING ALL THE INFO ABOUT THE PRODUCT
We generate
the unique code
and we will
manage the
requests of
authentication
coming from
consumers

We deliver the
unique code in
a secure way to
be printed

Unique code
are printed on
the products
and the
products
shipped around
the world

With their
SmartPhone
consumers can
authenticate
the products
getting all the
info about the
products
The succesfull points
The succesfull point for Authentica are:
- You do not give the consumer the idea your products
can be counterfeit
- You tell the consumer you use the code to provide
additional information
- In fact as soon as the consumer read the code you
can get easily the following info:
- The full details of the bottle opened
- When
- Where
- By whom and you can start you direct
communication
- And in case the consumer is reading a fake code
you can get alerted
How it Works
STEP 1
THE QR CODE IS
CAPTURED
BY THE
MOBILE APP
How it Works

STEP 2
AUTHENTICA SENDS
THE INFORMATION TO
SCRATCH&SCREEN
APPLICATION SERVER
How it Works
STEP 3
AUTHENTICA SHOWS
CONSUMER
THE RESULT OF THE
VERIFICATION WITH
INFORMATION FOR
THE CONSUMER AND
THE GUARANTEE FOR
THE PRODUCER THE
PRODUCTS IS
AUTHENTIC
How it Works
AND IF ... THE PRODUCT WAS NOT
AUTHENTIC?
The customer does not have any feeling but
we can report the person and the place where
the fake wine has been consumed and we
can escalate the problem.

STEP 2

Authentica will immediately send a notice to
the producer.
How it Works

With Authentica you will have list of
products authenticated.

You can share with your friends the list
and your experience or report the products
Counterfeit using the major social network.
Authentica – Fight the «Grey Markets»?
The solution can also trace every
single bottle after bottling to
consumption. This becomes the
fundamental weapon to fight
against 'gray markets'. Rather than
having a few inspectors, the
reliability of which you can never
be 100% sure, we will have
thousands and thousands of
consumers that will tell us where
the products are consumed with
geographical precision and then
we can certainly identify products
that were consumed in countries
other than those where they were
sold.
And communication
instrument with customers
Authentica in addition of being a reliable
technology to verify the originality of the
products and to protect the originality of
the brands, it can also become, for
companies wishing to do so, a powerful
and innovative marketing tool: in fact,
the medium allows the opening a direct
communication channel with the end
user.
The consumer will then receive updates,
make known its views, socialize his
experiences, participate in contests and
collected points.
And a powerful marketing
tool
With Authentica the customer can easily
add information about the products, giving
to the consumer an innovative service and
quality.
You will know when a customer have
drunk a bottle, where the bottle have been
was drunk, by whom, and maybe even
with such friends, thanks to the integration
with social networks. All data collected can
be easily integrated with a CRM system.
Photos, videos and extra information can
be included in kit and will enrich the
experience of the end user and eventually
help consumers to move to buy the
products trough internet
COMPETITION
RFID:

-

-

High costs
Complexity
Uncommon
Technology
Not fully
integrated with
package
risks alteration

Unique Code with
Label:

Code managed
through website:

- High costs
- Complexity '
- Not fully
integrated with
package
- Difficult to adapt

-

High Cost
Can not use
mobile app
Complexity
No real time
Easy to create
a mirror
Award
Authentica guest at Smart &
App on La3

Authentica finalist at La Fiera
delle startUp Italy 2013

Authentica wins at Mobile
App Awards 2013 Consumer
Smau Turin Italy

Authentica semi-finalist at
TechCrunch Italy 2013
Technology overview

©2013 Millone SRL - All rights reserved
QR code: a means of
communication
Scratch & Screen technology uses the QR code as a tool for the
collection and transmission of information. At this time the QR code
has been chosen for a number of features that make it suitable:
- Stream strong growth
- Can hold a lot of information
- Affordability
- Aesthetics

Our technology, however, is completely independent from the
graphical representation of the code: if in the future there will be better
tools we could use them without making any changes to our code

©2012 Millone SRL - All rights reserved
Scratch Screen & the
unique code
INTRODUCTION
The QR code contains the unique code generated from Scratch &
Screen.
The process and algorithms for generating the unique code needed to
ensure maximum safety and non-replicability of the same neither
casual nor fraudulent.
To give an idea of the level of complexity of the process used, we note
that our technical direction was inspired by the process of issuing
visas applied by the Japanese immigration, of course the algorithms
and tools used in the process are different.

©2012 Millone SRL - All rights reserved
Scratch Screen & the
unique code
SAFETY FEATURES
- The ability to replicate the unique code happens to be equal to 1/10
to the 95 power
In case the code could be randomly replicated, would not be
significant, in fact:
- The data is opaque (taken alone has no meaning)
- The figure has put sense in connection with the information
present in the data base at that time
- The data is encrypted

©2012 Millone SRL - All rights reserved
Scratch Screen & the
unique code
FEATURES OF THE CODE
The code is composed of a random, generated with a high level of
sparseness by an algorithm that repeats the sequence after 2 high
635 combinations, and one part of the identification data opaque.
The code generated 256-bit 32-bit are injected containing useful
information to the system
Last, but not least, our codes when they reach the database, as they
are made​​, we are able to immediately recognize any code
"malformed" and then the system of foreign origin Scratch & Screen,
and take the appropriate defensive countermeasures

©2012 Millone SRL - All rights reserved
Scratch Screen & the
unique code
FEATURES OF THE DATABASE
-The database is of Big Data deployed, then we use a technique of
caching data in RAM that allows the management of distributed
parallel servers.
-The database allows you to manage Big Data and the interrelation of
huge amount of data even from heterogeneous sources, and provides
maximum scalability.
- The entire system is designed from the origin in a logic multitenancy.

©2012 Millone SRL - All rights reserved
ABOUT US
Gianni Millone
CTO & Co-Founder
@giannimillone

Matteo Del Corno
BDO & Co-Founder
@matteoGETIT

Mariacarla Millone
COO
@McMillone

S & S was founded in the fall of
2012 within the company Millone SRL
specializing in Shop & Office
Automation and Applications
management for both SMEs and large
companies.
The basic idea of Scratch & Screen is
develop a system
based on an application server
that “talking” with the devices
, regardless of the
operating system on which they
operate,
allows the use of tools
sophisticated in fast and simple way.

Loris Battistini
Country Sales Manager Italia
@slori

Authentica began as a specialized
application development platform
application server scartch & Screen
contacts
Authentica
Millone SRL
Corso Lancieri di aosta 11/F
11100 Aosta – Italy
Matteo Del Corno
Co-founder
Mobile: +39.340.3939908
Mail: matteo.delcorno@scratchandscreen.com
@matteogetit or @scratchnscreen
Thanks!

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Do you want to fight grey market, counterfeit and theft of products by using the most powerful 1to1 marketing application?

  • 1.
  • 2. The war against counterfeiting never been so simple thanks to Authentica the first mobile platform to authenticate products simply through the use of a smartphone.
  • 3. The Market: L’ anti-contraffazione FASHION MEDICINES AND COSMETICS FOOD&BEVERAGE HI-TECH WATCH&JEWELS TOYS HANDMADE PRODUCTS EVERY PRODUCTS THAT CA BE COUNTERFEIT
  • 4. The Market Size 105 mln COUNTERFEIT PRODUCTS 23 mln FASHION 21 mln TOYS 38 mln DRUGS AND COSMETIC 22 mln 45 60 mld 1300 0 21 mld HI-TECH ILLEGAL WEB PLATFORM POLICE ACTIVITY GLOBAL VALUE ITALIAN SOUNDING EU WW ITALIAN SOUNDING VALUE
  • 5. What is Authentica Authentica is a mobile app that makes it possible to certify the originality of a product protecting consumer and producer. CONSUMER thanks to the application can verify the authenticity of the product purchased in real time. MANUFACTURER Authentica with you adds a further degree of protection against counterfeiting
  • 6. On what is Authentica based Authentica is based on Scratch&Screen a powerfull, scalable, reliable Application Sever built to generate and manage unique Code .
  • 7. On what is Authentica based Consumer FE AJAX content Application server Business FE FSAL foreign systems abstraction layer Consumer backend Decoder Strong Auth Business backend Layer Field systems Campaign mgmt Reporting Tenancy filters Cordova Data adaptors HA distributed engine BI CRM Platform Core Engine Data Engine ● memcached ● noSQL DB ERP QA, Pdt trk Generic SQL Social Networks Management backend Denorm SQL/file Management FE System admin Billing & accounting ©2012 Millone ©2012 Millone SRL -- All rights reserved All rights reserved
  • 8. On what is Authentica based Consumer Front End Development Multi-platform ● Android ● IOS ● (WinPhone) ● (BlackBerry) ● ... Multi-lang/script/locale ● en-US, en-GB, ... ● fr-FR, ... ● it-IT, … ● de, es, pt, (ru, he) ● ... Multi-version ● SnS-branded standard ● (multi)branded skinned std ● (multi)branded custom ● (multi)branded host app ● ... Platform build tools Build PreProcessor Common codebase Platform dependent i18n / l10n repository Customer specific custom content m-platf HTML native libs lang files (BMP) m-platf JS look & feel CSS CLDR XML std skin CSS static content static content ©2012 Millone SRL - All rights reserved
  • 9. On what is Authentica based Business Front End Data adaptors BI ERP CRM Business Objects SAP ERP SugarCRM Pentaho MS Dynamics NAV SalesForce.com MS Reporting svcs MS Dynamics AX MS Dynamics CRM Sage SAP CRM ACT! SQL Spreadsheet File Oracle DB MS Excel CSV DB2 oo.o Calc XML MS SQL Server MySQL PostgreSQL ©2012 Millone SRL - All rights reserved
  • 10. The Full Authentica Process ATHENTICA WORK IN A COMPLETE PROCESS: IT STARTS FROM THE PRODUCER OF THE CONSUMABLE GOODS THAT RECEIVE THE UNIQUE CODE FROM SCRATCH&SCREEN, TROUGHT THE PRINTER SERVICES AND FINISH WITH THE CONSUMERS THAT AUTHENTICATE THE PRODUCTS RECIVING ALL THE INFO ABOUT THE PRODUCT We generate the unique code and we will manage the requests of authentication coming from consumers We deliver the unique code in a secure way to be printed Unique code are printed on the products and the products shipped around the world With their SmartPhone consumers can authenticate the products getting all the info about the products
  • 11. The succesfull points The succesfull point for Authentica are: - You do not give the consumer the idea your products can be counterfeit - You tell the consumer you use the code to provide additional information - In fact as soon as the consumer read the code you can get easily the following info: - The full details of the bottle opened - When - Where - By whom and you can start you direct communication - And in case the consumer is reading a fake code you can get alerted
  • 12. How it Works STEP 1 THE QR CODE IS CAPTURED BY THE MOBILE APP
  • 13. How it Works STEP 2 AUTHENTICA SENDS THE INFORMATION TO SCRATCH&SCREEN APPLICATION SERVER
  • 14. How it Works STEP 3 AUTHENTICA SHOWS CONSUMER THE RESULT OF THE VERIFICATION WITH INFORMATION FOR THE CONSUMER AND THE GUARANTEE FOR THE PRODUCER THE PRODUCTS IS AUTHENTIC
  • 15. How it Works AND IF ... THE PRODUCT WAS NOT AUTHENTIC? The customer does not have any feeling but we can report the person and the place where the fake wine has been consumed and we can escalate the problem. STEP 2 Authentica will immediately send a notice to the producer.
  • 16. How it Works With Authentica you will have list of products authenticated. You can share with your friends the list and your experience or report the products Counterfeit using the major social network.
  • 17. Authentica – Fight the «Grey Markets»? The solution can also trace every single bottle after bottling to consumption. This becomes the fundamental weapon to fight against 'gray markets'. Rather than having a few inspectors, the reliability of which you can never be 100% sure, we will have thousands and thousands of consumers that will tell us where the products are consumed with geographical precision and then we can certainly identify products that were consumed in countries other than those where they were sold.
  • 18. And communication instrument with customers Authentica in addition of being a reliable technology to verify the originality of the products and to protect the originality of the brands, it can also become, for companies wishing to do so, a powerful and innovative marketing tool: in fact, the medium allows the opening a direct communication channel with the end user. The consumer will then receive updates, make known its views, socialize his experiences, participate in contests and collected points.
  • 19. And a powerful marketing tool With Authentica the customer can easily add information about the products, giving to the consumer an innovative service and quality. You will know when a customer have drunk a bottle, where the bottle have been was drunk, by whom, and maybe even with such friends, thanks to the integration with social networks. All data collected can be easily integrated with a CRM system. Photos, videos and extra information can be included in kit and will enrich the experience of the end user and eventually help consumers to move to buy the products trough internet
  • 20. COMPETITION RFID: - - High costs Complexity Uncommon Technology Not fully integrated with package risks alteration Unique Code with Label: Code managed through website: - High costs - Complexity ' - Not fully integrated with package - Difficult to adapt - High Cost Can not use mobile app Complexity No real time Easy to create a mirror
  • 21. Award Authentica guest at Smart & App on La3 Authentica finalist at La Fiera delle startUp Italy 2013 Authentica wins at Mobile App Awards 2013 Consumer Smau Turin Italy Authentica semi-finalist at TechCrunch Italy 2013
  • 22. Technology overview ©2013 Millone SRL - All rights reserved
  • 23. QR code: a means of communication Scratch & Screen technology uses the QR code as a tool for the collection and transmission of information. At this time the QR code has been chosen for a number of features that make it suitable: - Stream strong growth - Can hold a lot of information - Affordability - Aesthetics Our technology, however, is completely independent from the graphical representation of the code: if in the future there will be better tools we could use them without making any changes to our code ©2012 Millone SRL - All rights reserved
  • 24. Scratch Screen & the unique code INTRODUCTION The QR code contains the unique code generated from Scratch & Screen. The process and algorithms for generating the unique code needed to ensure maximum safety and non-replicability of the same neither casual nor fraudulent. To give an idea of the level of complexity of the process used, we note that our technical direction was inspired by the process of issuing visas applied by the Japanese immigration, of course the algorithms and tools used in the process are different. ©2012 Millone SRL - All rights reserved
  • 25. Scratch Screen & the unique code SAFETY FEATURES - The ability to replicate the unique code happens to be equal to 1/10 to the 95 power In case the code could be randomly replicated, would not be significant, in fact: - The data is opaque (taken alone has no meaning) - The figure has put sense in connection with the information present in the data base at that time - The data is encrypted ©2012 Millone SRL - All rights reserved
  • 26. Scratch Screen & the unique code FEATURES OF THE CODE The code is composed of a random, generated with a high level of sparseness by an algorithm that repeats the sequence after 2 high 635 combinations, and one part of the identification data opaque. The code generated 256-bit 32-bit are injected containing useful information to the system Last, but not least, our codes when they reach the database, as they are made​​, we are able to immediately recognize any code "malformed" and then the system of foreign origin Scratch & Screen, and take the appropriate defensive countermeasures ©2012 Millone SRL - All rights reserved
  • 27. Scratch Screen & the unique code FEATURES OF THE DATABASE -The database is of Big Data deployed, then we use a technique of caching data in RAM that allows the management of distributed parallel servers. -The database allows you to manage Big Data and the interrelation of huge amount of data even from heterogeneous sources, and provides maximum scalability. - The entire system is designed from the origin in a logic multitenancy. ©2012 Millone SRL - All rights reserved
  • 28. ABOUT US Gianni Millone CTO & Co-Founder @giannimillone Matteo Del Corno BDO & Co-Founder @matteoGETIT Mariacarla Millone COO @McMillone S & S was founded in the fall of 2012 within the company Millone SRL specializing in Shop & Office Automation and Applications management for both SMEs and large companies. The basic idea of Scratch & Screen is develop a system based on an application server that “talking” with the devices , regardless of the operating system on which they operate, allows the use of tools sophisticated in fast and simple way. Loris Battistini Country Sales Manager Italia @slori Authentica began as a specialized application development platform application server scartch & Screen
  • 29. contacts Authentica Millone SRL Corso Lancieri di aosta 11/F 11100 Aosta – Italy Matteo Del Corno Co-founder Mobile: +39.340.3939908 Mail: matteo.delcorno@scratchandscreen.com @matteogetit or @scratchnscreen