Product Verification Workflow
End-to-end product authentication from manufacture to consumer
How Trailio TrueBrand deploys serialised digital identities on physical products - enabling scan-to-verify authentication at every point from distributor receipt through consumer purchase, with continuous counterfeit and grey market detection.
Operational Problem
Counterfeiting and grey market diversion undermine brand equity at scale
Brand owners face two distinct but related threats: outright counterfeiting - fake products carrying their identity - and grey market diversion, where genuine products are sold outside authorised channels at prices that undercut authorised retailers and erode pricing structures.
Both threats are invisible without a product-level digital identity layer. Without serialisation, brands cannot distinguish an authentic product from a counterfeit at point of scan. Without channel monitoring, they cannot detect when authorised distributors are diverting product to unauthorised markets.
Product verification workflows solve both problems simultaneously - by giving every product unit a cryptographic identity and recording every scan event against that identity throughout the distribution chain.
Counterfeit products
Fake units carrying cloned brand identifiers in authorised retail channels
Grey market diversion
Genuine products sold outside authorised geography or retail environment
Distributor over-supply
Authorised distributors leaking surplus stock into unauthorised channels
Consumer deception
End consumers unable to verify authenticity at point of purchase
Invisible supply chain
No scan-level visibility of where product is in the distribution chain
Step-by-Step Workflow
How product verification operates end-to-end
From the moment a serialised identity is applied at manufacture to the moment a consumer scans it, every event is captured and verified.
- 1
Identity Application
Unique serial identity applied to each product unit
At the point of manufacture or packaging, a serialised identifier - QR code, NFC tag, or printed data matrix - is applied to each product unit. The identifier is registered in the Trailio platform with the product's full identity: SKU, batch, origin facility, manufacture date, and intended market.
- 2
Distribution Registration
Product identity tracked through distribution channels
As the product moves through the authorised distribution chain - manufacturer to distributor, distributor to retailer - each handoff is recorded in the platform. The product's current location in the authorised channel is always known, and any scan outside the expected pathway triggers an alert.
- 3
Distributor Verification
Distributor performs receipt scan
On receipt of a consignment, the distributor scans each product unit to confirm authenticity and accept custody. Any unit that fails verification - due to cloned identifier, incorrect product, or unexpected provenance - is flagged before it enters the distributor's inventory.
- 4
Retail Acceptance
Retail scan confirms product is genuine before display
At retail receipt, store staff scan products to confirm authenticity before placing them on display. This scan also transfers custody to the retailer and closes the distribution chain event. Products not verified at this stage are quarantined for investigation.
- 5
Consumer Verification
Consumer scans product to verify authenticity
End consumers scan the product QR code or NFC tag using a smartphone. The platform returns a verification response - confirming the product is genuine, showing provenance detail, and indicating whether the product is within its authorised market. Suspicious repeat scans at the same unit are also detected.
- 6
Alert & Response
Counterfeit or diversion event triggers investigation
When an anomaly is detected - duplicate scan, scan outside authorised market, identifier not in platform, or verification failure - an alert is routed to the brand protection team with full event context. Investigation workflows, enforcement notifications, and product hold instructions can be initiated from the platform.
Intelligence Layer
Continuous verification intelligence
Duplicate scan detection
A product identity appearing in two geographic locations simultaneously indicates a cloned identifier.
Unauthorised market detection
Scans occurring in geographies outside the product's authorised distribution territory trigger a grey market alert.
Scan frequency anomalies
Unusually high consumer scan rates on a single unit may indicate a counterfeit product being verified repeatedly.
Distributor bypass detection
Products appearing at retail before a distributor scan event indicates the authorised channel was bypassed.
Consumer verification history
Full scan history per product identity - showing every verification event, location, and device.
Brand protection intelligence
Aggregated intelligence on counterfeit activity, diversion patterns, and enforcement priorities by market.
Physical Security Integration
HSA physical products in this workflow
Product verification works at its most effective when the digital identity is paired with an HSA tamper-evident physical layer - making it impossible to remove or transfer the identifier without visible evidence of tampering.
HSA Security Labels
Product and packaging labels with serialised identifiers. Tamper-evident construction ensures the label cannot be transferred to a counterfeit product.
HSA NFC Tags
Embedded NFC chips in product labels or packaging. Cryptographic response verified against the Trailio identity record on consumer scan.
HSA Security Seals
Box and case-level seals indicating unopened product integrity. Verified at retail receipt to confirm the product has not been substituted.
HSA Security Bags
Transit packaging for high-value products. Bag serial number links to the product identity record - confirming the correct item is inside.
Related resources
Industries
Related Workflows
Case Studies
Glossary
Deploy this workflow in your operation
Our solutions team works with enterprise and government clients to implement, configure, and integrate Trailio workflows into existing operational environments.