Platform Capabilities
 
Universal Unique Unit Tracking

 

Authentag works by tracking any universally unique label or tag and connecting that tag to the individuals that interact with it and tracking those relationships from cradle-to-grave, from production to disposal, providing real-time chain-of-custody and current disposition for all parts. By using the unique identification of parts, people and places, Authentag can allow physical objects to carry information about their past and intended future.

The Authentag System provides robust analytics capabilities that spot erroneous behavior and help identify trends that streamline workflows and reduce costs.

 

The Authentag platform also provides robust analytics capabilities to help identify trends that streamline workflows and reduce costs and, with role-based access controls, can control who sees what subsets of information. This paradigm shift in logistics thinking has had surprisingly global-scale impacts, and this is why the U.S. Patent and Trademark Office granted Authentag Patent #9,076,024.

 

 

  • Can manage billions of unit identities

  • Integrates the latest developments in security for both iOS and Android integration

  • Carries bank level and higher security as standard

  • Is cloud-based or 

  • Can be hosted in your amber zone or your preffered cloud provider.

  • Allows multiple Tag states to comply with the most stringent secure supply chain auditing requirements

  • Can carry multiple identifiers for every single item, allowing integration with SAP, your own internal sequential systems, barcode GS1 and any other labeling system you want to keep

  • Link all your known data to a Tagged item; Customs declarations, Material Data Specifications, Constituent parts, usage instructions, care instructions, expiry dates, manufacture dates, cost per part etc

​​

  • Federates data; the ability to link any item to all the known information about that item while deciding which users should have access to which subset of that information

  • Can carry multiple identifiers for every single item, allowing integration with SAP, your own internal sequential systems, barcode GS1 and any other labeling system you want to keep

  • Link all your known data to a Tagged item; Customs declarations, Material Data Specifications, Constituent parts, usage instructions, care instructions, expiry dates, manufacture dates, cost per part etc

  • Federates data; the ability to link any item to all the known information about that item while deciding which users should have access to which subset of that information

 

Immutable

 

 

In Authentag every record, action or interaction generates its own unique event. Records cannot be altered or amended once created. These events are captured and stored in order, creating the digital threads that build the chain of custody for every inventory item. Users who trust each other share this information in trust pools, they control who, outside their trust pool has access to what information and when and where they can access it 

 

 

Blockchain

 

 

Records in Authentag cannot be altered or amended. New entries, that update the state of an item or a person or place registered with the system, are cryptographically locked and recorded chronologically.  Entries can only be viewed by those with the correct access keys.  Records are provable because the system locks them in blocks with hash codes - blockchain. Messages travelling between pools of data can carry the last known hash of that item, locking all the preceding records.

 

 

Record

 

 

Authentag is built around trust pools. Within a trust pool records are shared about the items tracked. Sharing is controlled by user type, location and activity to allow control within any organization or group of organizations that want to share information in a controlled manner.  Records can also be passed from one trust pool to another. As they move, the information carried with each record is minimized to maintain high transaction speeds. If necessary, downstream users with the correct permissions can request full data files to be passed to them.

 

 

Protect

 

With unique identification and the power of Authentags tracking platform, every item is managed in a continuous chain of custody.

 

If a counterfeiter introduces fake product anywhere in the controlled supply chain the system identifies false IDs and highlights suspect duplicates for further investigation.

 

Chain of Custody also allows firms to conduct highly focused recalls and know when an item has been collected and then destroyed and which user conducted that operation for them. This dramatically reduces the physical and administration cost of recall actions.

 

Optimize

 

Unique tracking creates a clear picture of exactly where your stock is and how it moves over time.

 

Authentag can be used to move and store your inventory more efficiently throughout your global supply network.

 

Network optimization programs lead to savings in the millions. Percentage improvements in both expanding and contracting verticals all gave savings  between 10% and 20%

All figures; DHL / Authentag Joint Presentation to Huawei Ltd 14 Aug 2015

Visibility

 

 

Traditionally stock checks occur if someone notices you are running low, you run out of something or because your accountants require it.

Authentag records every transaction as it occurs. Gathering data from Point of Sales, ERP, inventory management systems or by a user scanning and updating the status of an item; Authentag sorts and orders them all. 

 

Tracking your inventory with Authentag is instantaneous - just scan and go. For initial inventory onboarding, the system cleans up storage locations, sorts duplicates, and records who placed what, where and when for full accountability.

 

Notify

 

Once all your inventory is the system AI can analyze usage, location, and run rates to isolate tangible, useful information to help manage your business and reduce wastage.

  • Set minimum satisfactory storage levels for all your locations and know when you are running low or automatically trigger re-orders from manufacturing.

  • Rotate stock efficiently and inform users if they should find an alternative that is closer to expiry.

  • Propose alternative routing to balance out inventory levels across your supply network.

A warning can be sent to users smartphones, delivered to administrators inbox's or posted as a webhook to your firms chat service (such as Slack or Yammer).

 
 
Security

 

The Authentag System brings multiple layers of defense to protect participants in the Internet of Everything.

 

Tokenisation: Something you have

 

All interactions with the system can require authorized using your smartphone. Why? Because checking you have your smartphone is our first level of defense.

 

Anonymous users just use their phone to represent them, we don't need to take their email or any personal details, the system identifies the phone, not the user. This means anyone can join the ecosystem - however their access to data is limited.

 

Registered can migrate from one type of phone to another (ie Android to iOS) or between handsets and keep their data.

 

This is possible because your phone can be tokenized to become the 'something you have' factor in multifactor authorization.

 

Further Factors: Something you Know, Something you do, Somewhere you are

 

Authorized users need more controls. Designed so that firms can add their staff easily users can be added by invitation to teams or by their work email addresses. Controls can be geo-location based, bio-metric, as well as something you know or something you do. Erratic or abnormal behavior patterns can be analyzed.

 

Encryption

 

We use the latest industry-standard encryption for all data communications between phones and our servers.

For Company installations, we can sit behind your firewalls (Amber Zone). For government installations, we build, operate and then transfer into your protected domains giving you two levels of security.

 

DDOS and other style attacks

 

Data can be distributed between ledgers based on client requirements. For corporate clients, the platform will continue to operate for existing users even if your main site is under a DDOS style attack.