top of page
Writer's pictureBlue Cromos

Brand protection out of the box

Updated: Oct 2, 2023

From the very start, we at Blue Cromos have focused on making Product Authentication easy to do, through isAuthentic. We make it easy by doing it differently. No application of complex labels, no invisible ink, no tags or microchip. Just use a smartphone camera and the isAuthentic app.

Identification and authentication of bulk items

But until now, we too have worked on authenticating packaged products. Downstream of production.

No more. Not only.

With our latest technology, we also identify and authenticate components delivered in bulk, at the ENTRY point of production, or elsewhere in your supply chain.

Vast new possibilities by authentication at the entry of the production line

No box, no package, no labels – just components and their data.

That opens up great new possibilities:

🔵 Automatic authentication of key components, critical for the functionality of the finished product.

🔵 Increased control over quality and configurations by automatic identification of components ahead of assembly, minimizing the risk of human error

🔵 Greater granularity of production data/ease of pinpointing batches in case of quality issues, minimizing their impact

🔵 And....well, it's up to you and your imagination!

All carried by GS1 standards and certifications in respective industry segments, of course.

We're the ones cutting the edge

At Blue Cromos, we don't add fancy labels. We don't add "magic" ink. Nor do we add any transmitters of any kind. We do product authentication like nobody else, using our patented fingerprinting technology. We're cutting the edge of technology to make life easy for you.


Curious? Get in touch!

Do you want to learn more about how isAuthentic can help you fight the counterfeiters? Just get in touch here

With our latest technology, we identify and authenticate components delivered in bulk, at the ENTRY point of production or elsewhere in your supply chain.  No box, no package, no labels – just components and their data. That opens up great new possibilities.
Why limit authentication to finished, packaged products only?

Image from iStock

8 views
bottom of page