SlideShare a Scribd company logo
CYPHEME
August 1, 2020
Principle of Cypheme's solution
Authentic product:
Clients will receive the
certificate of authentication
as well as detailed
information about their
product and your brand.
Fake product:
Clients will be warned about the possibility the product
is a counterfeit. Any counterfeiter or fraudulent
distributor using the system will be geolocated and
additional evidence will be tagged and archived.
AUTHENTICATION
CHECKING THE AUTHENTICITY OF A PRODUCT HAS NEVER BEEN SO
SIMPLE.
TAKE A PICTURE OF THE TAG WITH OUR WEB-BASED APP OR:
WAIT A FEW SECONDS
AUTHENTICITY RECOGNITION IS AUTOMATIC “ORIGINAL” or
“FAKE”
FIND OUT ABOUT YOUR PRODUCT.
or
Hyperphotometry
- AI Anti-copy
- Reaction to UV light
- Reaction to IR anti-stokes
Unique and random chemically-
generated signature.
All these signatures are
photographed and sent to oursecure
Microsoft AZUR Cloud.
Unitary number per client, brand,
product, by batch, and or by SKU.
Security-cutting :
The certificate will tear with
any tampering.
The certificate will be
destroyed.
AI of authentication on a Cypheme security
seal
● Know in real time where your
authentic products are scanned
● Know in real time where fake
products are scanned
1- GEO-LOCALIZATION
2- TRACING
Some of your products end up
where they shouldn't?
For example, sold on e-markets
outside of your official
distribution network?
We can provide you with batches
of numbered tags. Provide each
of your distributors with a different
batch. Whenever one of your
product is found outside of its
regular circuit, you will know who
it came from.
3- TRACK AND TRACE
We don’t provide logistics and ERP
consulting, but we are compatible
with third party supply chain T&T
suppliers
TRACEABILITY
CYPHEME PROVIDES PRECISE GEOLOCATION REPORTS.
AI DATA INSPECTION
for the identification and monitoring of counterfeiter networks.
The client data set is analyzed by artificial intelligence to map
counterfeiter networks.
Different strategies can be implemented in relation to the
customer.
Actions :
We activate the data through our product, AI
Inspector and identified the primary network of
counterfeiters.
Names, contact details, addresses, and functions are
forwarded to the police. We went straight to the
heart of the network.
One month after an additional investigation, the
police put the entire network under lockdown, i.e. 18
counterfeiters arrested!
Customer:
Pharma,
World Group
Industry:
pharmaceutical industry
Needs Expressed:
∙ Know the extent of their
counterfeiting.
∙ Identify the different
networks of counterfeiters.
∙ Stopping these networks.
Benefits Realized:
∙ Saved client $10M / year.
∙ 681 estimated saved lives.
∙ Saved the brand’s image.
∙ Secured their patents.
Case Study : Stop counterfeiters
Success :
Our technology has reduced the counterfeit of this drug from 42% to 5%.
Summary of the advantages of the Cypheme solution
Benefits of the Cypheme solution
Clients benefits CRM benefits Legal benefits Marketing benfits
Cypheme certificate
Certificate of authenticity can be checked
before and after the purchase. The
distributor, retailer, and customer is
reassured. There is proof that the item is
authentic.
The visible page displays a welcome
message and a photo, texts promoting the
brand. The customer associates
themselves with the brand’s image..
The consumers become a loyal follower of
the brand on their Facebook page or
official WeChat account.
A link allows them to access the online
store to buy additional products and learn
more about the brand, etc.
Mapping of all authenticated clients.
These authentications are often done at
the client's location.
This makes it possible to bring the
locations of customers and shops closer
together to verify their correct
implementation.
Possibility to retrieve the customer's
identifier.
Statistics of number of purchases by
customer.
Geo-tracking Module :
Cartography of counterfeiting visualized on a map.
Provides evidence of the real percentage of
counterfeiting on a reliable statistical sample.
Classifies the most affected geographical areas,
cities, regions, countries, continents.
AI inspection module:
Allows an analysis of photos by AI to identify a
lambda user with a fake of a counterfeiter trying to
understand the technology.
Once spotted, the counterfeiter is trapped and
identified, traced to identify the entire network,
designer, printer, manufacturer, distribution
network. Data that will allow seizures and arrests
of the core network after a short police
investigation.
Customs, police, and inspectors can individually
verify the authenticity of the product and can react
instantly to fraud.
They do not need any training and only need to
use their smartphone.
They no longer need to call a brand expert or send
product photos for expertise.
Mystery shopper campaigns can easily be
organized to take pictures of certificates in shops.
Demonstrate the procession of a real or fake
product
Detection of occasional grey market.
Possibility of making a one-time survey by noting
down certain numbers that are sent to a
wholesaler or a shop to see in which geographical
area they are found.
Reassuring a customer during the
purchase
Enhance the brand's image
Capture followers on social networks
for free
Builds loyalty
Encouraging the customer to buy a
complementary item online
Additional benefits if certificates
are associated with each product.
Clients advantages CRM advantages Legal advantages Marketing advantages
Cypheme
certificate
Same as solution with
unique customer message
+
Certificate of Provenance or
Origin
Information directly related to
the product purchased
Same as solution without
database association
+
Localization with
identification of the
products and knowledge of
the manufacturing steps of
each product.
Statistics by customer of
the different models of
articles purchased
Same as solution without
database association
+
But with possible statistics
and mapping on a product-
by-product basis
Same as solution without
database association
+
Possibility to put links to a
targeted page of the online
shop according to the product
purchased
+
Customer purchase statistics
with knowledge over the years
of his purchases
Synoptic
Your customers:
Authentication and
access to a specific
product page with
links to go to your
website or your
onlin shop.
Fitting stickers with the
Cypheme security seal on
your products.
Focused field
actions and legal
actions.
Synoptic
Cartographic visualization,
statistics and analysis of
counterfeiting.
Creation of a database with date,
time, GPS location, "genuine
product" or "counterfeit
product", serial number and, if
desired, user ID.
Sending of products
How to use the application
Why we recommend an application on social
networks.
The type of application Download or direct access Level of security
An Android or IOS application Download
In fact, there are few
customers who will download
an application to authenticate
their product.
In China, none, the passage
through Wechat is mandatory.
Very good
The application is protected by
the Play Store or Apple Store.
An application on a website,
Web application
Direct access
Easy to use but access to the
webpage via a QR codes can
be dangerous
Risky
The website needs to be
verified or there could be a
fake website in parallel that will
always say "genuine product".
The removal of this site
requires legal action that can
take several years.
An application on social
networks
Direct access
Easy to use
Very good
The application is protected by
Facebook and Wechat.
Use through your Facebook page
Your Facebook
page on which we
add a button.
Customizable
operating
instructions with
video or
explanatory image
Take a picture of
our certificate.
Authentication
result
Your client can go
directly to your
public Facebook
page.
(You don't need to
have a Facebook
account.)
Or
Scan an official
Facebook QR
code to see if it
automatically
renders to official
page
Direct display of
the application
without the need
for downloading
www.soma.c
om
Use the application
Use the application
Soma Facebook page
http://www.soma.com/
Actual code
Use through Wechat
Customizable
operating
instructions with
video or
explanatory image
Take a picture of
our certificate.
Authentication
result
Your customer
can directly open
the mini program
under Wechat
Or
Scan an official
WeChat QR code
with Wechat's
scanner to see if it
automatically
renders to the
official account
Direct display of
the application
without the need
for downloading
Actual code
Contact Us
HEADQUARTERS
27 rue Bargue
75015 Paris - FRANCE
Anthony
Belasco
R&D
STATION F - 5 Parvis Alan Turing
75013 Paris - FRANCE
tony@cypheme.com
+1 252 422 1933
Contact us

More Related Content

Similar to 2020 cypheme global presentation

Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your infoadhinayakgohar2
 
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...Steve Hobbs
 
Authentica for wine & pharma
Authentica for wine & pharma Authentica for wine & pharma
Authentica for wine & pharma Scratch&Screen
 
Anti counterfeit-technique
Anti counterfeit-techniqueAnti counterfeit-technique
Anti counterfeit-techniqueVeera Mani
 
Real-Time Fraud Prevention: Why a Clean, High-Quality Mobile AdTech Ecosyste...
Real-Time Fraud Prevention:  Why a Clean, High-Quality Mobile AdTech Ecosyste...Real-Time Fraud Prevention:  Why a Clean, High-Quality Mobile AdTech Ecosyste...
Real-Time Fraud Prevention: Why a Clean, High-Quality Mobile AdTech Ecosyste...AppLift
 
Entrepreneurship presention for new products
Entrepreneurship presention for new productsEntrepreneurship presention for new products
Entrepreneurship presention for new productsSiti Kasturi Ismail
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramFākR™
 
Ihatefake22 9-11
Ihatefake22 9-11Ihatefake22 9-11
Ihatefake22 9-11rajeshg111
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014360insights
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
 
Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsKenan Marks
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxRichardLightfoot8
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiEcommerce HUB
 

Similar to 2020 cypheme global presentation (20)

Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...
Unicheck's SEiD (Security and iDentity) platform - Global Platform for Track ...
 
Authentica for wine & pharma
Authentica for wine & pharma Authentica for wine & pharma
Authentica for wine & pharma
 
Anti counterfeit-technique
Anti counterfeit-techniqueAnti counterfeit-technique
Anti counterfeit-technique
 
Real-Time Fraud Prevention: Why a Clean, High-Quality Mobile AdTech Ecosyste...
Real-Time Fraud Prevention:  Why a Clean, High-Quality Mobile AdTech Ecosyste...Real-Time Fraud Prevention:  Why a Clean, High-Quality Mobile AdTech Ecosyste...
Real-Time Fraud Prevention: Why a Clean, High-Quality Mobile AdTech Ecosyste...
 
Entrepreneurship presention for new products
Entrepreneurship presention for new productsEntrepreneurship presention for new products
Entrepreneurship presention for new products
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection Program
 
Seecure Columbia
Seecure ColumbiaSeecure Columbia
Seecure Columbia
 
UPITag_write_upP1_toP3
UPITag_write_upP1_toP3UPITag_write_upP1_toP3
UPITag_write_upP1_toP3
 
Ihatefake22 9-11
Ihatefake22 9-11Ihatefake22 9-11
Ihatefake22 9-11
 
m commerce solution
m commerce solutionm commerce solution
m commerce solution
 
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
ASPA & IPAMA Workshop on Integration of Authentication Solutions at PRINTPACK...
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014Infographic: Sales Channel Incentive Fraud Trends For 2014
Infographic: Sales Channel Incentive Fraud Trends For 2014
 
The Retail Reality Check
The Retail Reality CheckThe Retail Reality Check
The Retail Reality Check
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
Media-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-TagsMedia-Scanner-for-Data-Protection-Ad-Tags
Media-Scanner-for-Data-Protection-Ad-Tags
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptx
 
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamentiPaola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
Paola Trecarichi - I nuovi scenari di pagamenti digitali: tendenze e cambiamenti
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

2020 cypheme global presentation

  • 2. Principle of Cypheme's solution Authentic product: Clients will receive the certificate of authentication as well as detailed information about their product and your brand. Fake product: Clients will be warned about the possibility the product is a counterfeit. Any counterfeiter or fraudulent distributor using the system will be geolocated and additional evidence will be tagged and archived.
  • 3. AUTHENTICATION CHECKING THE AUTHENTICITY OF A PRODUCT HAS NEVER BEEN SO SIMPLE. TAKE A PICTURE OF THE TAG WITH OUR WEB-BASED APP OR: WAIT A FEW SECONDS AUTHENTICITY RECOGNITION IS AUTOMATIC “ORIGINAL” or “FAKE” FIND OUT ABOUT YOUR PRODUCT. or
  • 4. Hyperphotometry - AI Anti-copy - Reaction to UV light - Reaction to IR anti-stokes Unique and random chemically- generated signature. All these signatures are photographed and sent to oursecure Microsoft AZUR Cloud. Unitary number per client, brand, product, by batch, and or by SKU. Security-cutting : The certificate will tear with any tampering. The certificate will be destroyed. AI of authentication on a Cypheme security seal
  • 5. ● Know in real time where your authentic products are scanned ● Know in real time where fake products are scanned 1- GEO-LOCALIZATION 2- TRACING Some of your products end up where they shouldn't? For example, sold on e-markets outside of your official distribution network? We can provide you with batches of numbered tags. Provide each of your distributors with a different batch. Whenever one of your product is found outside of its regular circuit, you will know who it came from. 3- TRACK AND TRACE We don’t provide logistics and ERP consulting, but we are compatible with third party supply chain T&T suppliers TRACEABILITY CYPHEME PROVIDES PRECISE GEOLOCATION REPORTS.
  • 6. AI DATA INSPECTION for the identification and monitoring of counterfeiter networks. The client data set is analyzed by artificial intelligence to map counterfeiter networks. Different strategies can be implemented in relation to the customer.
  • 7. Actions : We activate the data through our product, AI Inspector and identified the primary network of counterfeiters. Names, contact details, addresses, and functions are forwarded to the police. We went straight to the heart of the network. One month after an additional investigation, the police put the entire network under lockdown, i.e. 18 counterfeiters arrested! Customer: Pharma, World Group Industry: pharmaceutical industry Needs Expressed: ∙ Know the extent of their counterfeiting. ∙ Identify the different networks of counterfeiters. ∙ Stopping these networks. Benefits Realized: ∙ Saved client $10M / year. ∙ 681 estimated saved lives. ∙ Saved the brand’s image. ∙ Secured their patents. Case Study : Stop counterfeiters Success : Our technology has reduced the counterfeit of this drug from 42% to 5%.
  • 8. Summary of the advantages of the Cypheme solution
  • 9. Benefits of the Cypheme solution Clients benefits CRM benefits Legal benefits Marketing benfits Cypheme certificate Certificate of authenticity can be checked before and after the purchase. The distributor, retailer, and customer is reassured. There is proof that the item is authentic. The visible page displays a welcome message and a photo, texts promoting the brand. The customer associates themselves with the brand’s image.. The consumers become a loyal follower of the brand on their Facebook page or official WeChat account. A link allows them to access the online store to buy additional products and learn more about the brand, etc. Mapping of all authenticated clients. These authentications are often done at the client's location. This makes it possible to bring the locations of customers and shops closer together to verify their correct implementation. Possibility to retrieve the customer's identifier. Statistics of number of purchases by customer. Geo-tracking Module : Cartography of counterfeiting visualized on a map. Provides evidence of the real percentage of counterfeiting on a reliable statistical sample. Classifies the most affected geographical areas, cities, regions, countries, continents. AI inspection module: Allows an analysis of photos by AI to identify a lambda user with a fake of a counterfeiter trying to understand the technology. Once spotted, the counterfeiter is trapped and identified, traced to identify the entire network, designer, printer, manufacturer, distribution network. Data that will allow seizures and arrests of the core network after a short police investigation. Customs, police, and inspectors can individually verify the authenticity of the product and can react instantly to fraud. They do not need any training and only need to use their smartphone. They no longer need to call a brand expert or send product photos for expertise. Mystery shopper campaigns can easily be organized to take pictures of certificates in shops. Demonstrate the procession of a real or fake product Detection of occasional grey market. Possibility of making a one-time survey by noting down certain numbers that are sent to a wholesaler or a shop to see in which geographical area they are found. Reassuring a customer during the purchase Enhance the brand's image Capture followers on social networks for free Builds loyalty Encouraging the customer to buy a complementary item online
  • 10. Additional benefits if certificates are associated with each product. Clients advantages CRM advantages Legal advantages Marketing advantages Cypheme certificate Same as solution with unique customer message + Certificate of Provenance or Origin Information directly related to the product purchased Same as solution without database association + Localization with identification of the products and knowledge of the manufacturing steps of each product. Statistics by customer of the different models of articles purchased Same as solution without database association + But with possible statistics and mapping on a product- by-product basis Same as solution without database association + Possibility to put links to a targeted page of the online shop according to the product purchased + Customer purchase statistics with knowledge over the years of his purchases
  • 11. Synoptic Your customers: Authentication and access to a specific product page with links to go to your website or your onlin shop. Fitting stickers with the Cypheme security seal on your products. Focused field actions and legal actions. Synoptic Cartographic visualization, statistics and analysis of counterfeiting. Creation of a database with date, time, GPS location, "genuine product" or "counterfeit product", serial number and, if desired, user ID. Sending of products
  • 12. How to use the application
  • 13. Why we recommend an application on social networks. The type of application Download or direct access Level of security An Android or IOS application Download In fact, there are few customers who will download an application to authenticate their product. In China, none, the passage through Wechat is mandatory. Very good The application is protected by the Play Store or Apple Store. An application on a website, Web application Direct access Easy to use but access to the webpage via a QR codes can be dangerous Risky The website needs to be verified or there could be a fake website in parallel that will always say "genuine product". The removal of this site requires legal action that can take several years. An application on social networks Direct access Easy to use Very good The application is protected by Facebook and Wechat.
  • 14. Use through your Facebook page Your Facebook page on which we add a button. Customizable operating instructions with video or explanatory image Take a picture of our certificate. Authentication result Your client can go directly to your public Facebook page. (You don't need to have a Facebook account.) Or Scan an official Facebook QR code to see if it automatically renders to official page Direct display of the application without the need for downloading www.soma.c om Use the application Use the application Soma Facebook page http://www.soma.com/ Actual code
  • 15. Use through Wechat Customizable operating instructions with video or explanatory image Take a picture of our certificate. Authentication result Your customer can directly open the mini program under Wechat Or Scan an official WeChat QR code with Wechat's scanner to see if it automatically renders to the official account Direct display of the application without the need for downloading Actual code
  • 16. Contact Us HEADQUARTERS 27 rue Bargue 75015 Paris - FRANCE Anthony Belasco R&D STATION F - 5 Parvis Alan Turing 75013 Paris - FRANCE tony@cypheme.com +1 252 422 1933 Contact us