Workflow Explainer

Product Verification Workflow

End-to-end product authentication from manufacture to consumer

How Trailio TrueBrand deploys serialised digital identities on physical products - enabling scan-to-verify authentication at every point from distributor receipt through consumer purchase, with continuous counterfeit and grey market detection.

TrueBrand AssetTagTrueTrade

Counterfeiting and grey market diversion undermine brand equity at scale

Brand owners face two distinct but related threats: outright counterfeiting - fake products carrying their identity - and grey market diversion, where genuine products are sold outside authorised channels at prices that undercut authorised retailers and erode pricing structures.

Both threats are invisible without a product-level digital identity layer. Without serialisation, brands cannot distinguish an authentic product from a counterfeit at point of scan. Without channel monitoring, they cannot detect when authorised distributors are diverting product to unauthorised markets.

Product verification workflows solve both problems simultaneously - by giving every product unit a cryptographic identity and recording every scan event against that identity throughout the distribution chain.

Counterfeit products

Fake units carrying cloned brand identifiers in authorised retail channels

Grey market diversion

Genuine products sold outside authorised geography or retail environment

Distributor over-supply

Authorised distributors leaking surplus stock into unauthorised channels

Consumer deception

End consumers unable to verify authenticity at point of purchase

Invisible supply chain

No scan-level visibility of where product is in the distribution chain

How product verification operates end-to-end

From the moment a serialised identity is applied at manufacture to the moment a consumer scans it, every event is captured and verified.

  1. 1

    Identity Application

    Unique serial identity applied to each product unit

    At the point of manufacture or packaging, a serialised identifier - QR code, NFC tag, or printed data matrix - is applied to each product unit. The identifier is registered in the Trailio platform with the product's full identity: SKU, batch, origin facility, manufacture date, and intended market.

  2. 2

    Distribution Registration

    Product identity tracked through distribution channels

    As the product moves through the authorised distribution chain - manufacturer to distributor, distributor to retailer - each handoff is recorded in the platform. The product's current location in the authorised channel is always known, and any scan outside the expected pathway triggers an alert.

  3. 3

    Distributor Verification

    Distributor performs receipt scan

    On receipt of a consignment, the distributor scans each product unit to confirm authenticity and accept custody. Any unit that fails verification - due to cloned identifier, incorrect product, or unexpected provenance - is flagged before it enters the distributor's inventory.

  4. 4

    Retail Acceptance

    Retail scan confirms product is genuine before display

    At retail receipt, store staff scan products to confirm authenticity before placing them on display. This scan also transfers custody to the retailer and closes the distribution chain event. Products not verified at this stage are quarantined for investigation.

  5. 5

    Consumer Verification

    Consumer scans product to verify authenticity

    End consumers scan the product QR code or NFC tag using a smartphone. The platform returns a verification response - confirming the product is genuine, showing provenance detail, and indicating whether the product is within its authorised market. Suspicious repeat scans at the same unit are also detected.

  6. 6

    Alert & Response

    Counterfeit or diversion event triggers investigation

    When an anomaly is detected - duplicate scan, scan outside authorised market, identifier not in platform, or verification failure - an alert is routed to the brand protection team with full event context. Investigation workflows, enforcement notifications, and product hold instructions can be initiated from the platform.

Continuous verification intelligence

Duplicate scan detection

A product identity appearing in two geographic locations simultaneously indicates a cloned identifier.

Unauthorised market detection

Scans occurring in geographies outside the product's authorised distribution territory trigger a grey market alert.

Scan frequency anomalies

Unusually high consumer scan rates on a single unit may indicate a counterfeit product being verified repeatedly.

Distributor bypass detection

Products appearing at retail before a distributor scan event indicates the authorised channel was bypassed.

Consumer verification history

Full scan history per product identity - showing every verification event, location, and device.

Brand protection intelligence

Aggregated intelligence on counterfeit activity, diversion patterns, and enforcement priorities by market.

HSA physical products in this workflow

Product verification works at its most effective when the digital identity is paired with an HSA tamper-evident physical layer - making it impossible to remove or transfer the identifier without visible evidence of tampering.

HSA Security Labels

Product and packaging labels with serialised identifiers. Tamper-evident construction ensures the label cannot be transferred to a counterfeit product.

HSA NFC Tags

Embedded NFC chips in product labels or packaging. Cryptographic response verified against the Trailio identity record on consumer scan.

HSA Security Seals

Box and case-level seals indicating unopened product integrity. Verified at retail receipt to confirm the product has not been substituted.

HSA Security Bags

Transit packaging for high-value products. Bag serial number links to the product identity record - confirming the correct item is inside.

Deploy this workflow in your operation

Our solutions team works with enterprise and government clients to implement, configure, and integrate Trailio workflows into existing operational environments.