SolutionsTechnologyApplications by IndustryCases
O-key
SolutionsTechnologyApplications by Industry
Learn more
ContactAboutFAQ
Knowledge
Professors corner
CasesWhitepapers
Highlighted article
The invention of O—KEYs
We live in an age where Rembrandts and Rolexes are copied in a quality where we cannot tell authentic from counterfeit”
Read article
Looking for a new career? 
Get in touch
O-key
SolutionsTechnologyApplications by Industry
Learn more
ContactAboutFAQ
Knowledge
Professors cornerCasesWhitepapers
Highlighted article
The invention of O—KEYs
We live in an age where Rembrandts and Rolexes are copied in a quality where we cannot tell authentic from counterfeit”
Read article
book meeting
Close
Do you want to know more?

We’re a team of product experts, engineers and researchers — ready to explore options for protecting and verifying your products. Get in touch for more information on how we can collaborate.

Book a demo

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Different Teams. Different Needs.
Discover how an O-KEY solution helps your team secure products, trace supply chains, and meet compliance.

O-KEY vs QR vs RFID

How is the O-KEY solution different from QR codes or RFID tags?

Traditional QR codes, barcodes, and RFID tags are not secure identifiers.

They can be easily copied, faked, or tampered with, and they offer no built-in authentication. They were built for tracking, not for trust.

An O-KEY is a patented, unclonable optical fingerprint embedded in or printed on your product. It is readable with a standard smartphone and provides instant, tamper-proof authentication.

- Cannot be copied, cloned, or spoofed
- Delivers authentication and traceability
- Compatible with any smartphone camera
- Strong enough to be used as legal proof

‍

Security Standards

How secure is the O-KEY solution?

The O-KEY solution combines physical security with encrypted, cloud-based infrastructure.

Each O-KEY is a unique physical pattern generated through a stochastic process that is physically unclonable. Verification is handled through a secure, proprietary image-matching algorithm. All data is stored and accessed through end-to-end encrypted connections.

- Patented physical security features
- Encrypted verification and cloud database access
- Court-recognized authentication trail
- Zero exposure of sensitive product data to external devices

‍

Brand & Revenue Protection

How can legal teams stop unauthorized retail and prove authenticity in court?

Counterfeit products and gray market resale pose legal and financial threats to global brands.

Unauthorized sellers erode revenue, dilute brand equity, and expose businesses to liability. Traditional QR codes and barcodes cannot be used as legal evidence of authenticity as they are not tamper-proof. Legal teams need solutions that provide defensible, court-recognized proof.

An O-KEY solution delivers unclonable authentication embedded into each product. Scan records create a secure audit trail. The digital identity can be presented in legal proceedings to shut down violators and protect trademark rights.

- Patented, unclonable physical security
- Verifiable product identity for litigation and IP enforcement
- Secure scan records serve as traceable chain-of-custody evidence
- Proven value in protecting revenue across unauthorized retail channels

‍

Supply Chain Visibility

How can I trace every product and detect supply chain leaks in real time?

Global supply chains face risk from theft, diversion, and lack of real-time visibility. Traditional logistics tools do not provide item-level authentication or location-aware validation. Shrinkage and unauthorized shipments go undetected until it is too late.

An O-KEY solution enables secure, verifiable traceability throughout the product journey. Each scan records location, time, and product metadata. This creates a tamper-proof log of every handoff, making leakage or diversion instantly visible.

- End-to-end product traceability at item level
- Real-time alerts for unauthorized movement or shipment
- Authentication across all supply chain checkpoints
- Cloud-based visibility without disrupting existing processes

‍

Regulatory Compliance

How can I make my products ready for the EU Digital Product Passport and future-proof compliance?

Regulations like the EU Digital Product Passport mandate dynamic, accessible product data. Static identifiers such as barcodes or QR codes cannot be updated after production. Compliance teams need tools that link to flexible, verifiable data that meets evolving legal frameworks.

An O-KEY solution connects each product to a dynamic digital record that can be updated anytime. From materials sourcing to recycling instructions, the information lives securely online and is accessible with a smartphone scan.

- Digital Product Passport compliance for EU regulations
- Dynamic data management and real-time updates
- Audit-ready product traceability and legal record-keeping
- Seamless integration with sustainability and regulatory systems

‍

Sustainability & Circularity

How can I prove my brand's sustainability claims and enable circularity?

Environmental impact reporting and circular economy models require traceable product data. Without proof of origin, ownership history, and lifecycle events, sustainability claims fall short of expectations from regulators and consumers. Brands need technology that turns sustainability into verifiable action.

An O-KEY solution creates a digital identity for each product that includes carbon footprint, recycling readiness, and service records. Every action across the lifecycle can be logged, validated, and shared.

- Proven support for circular economy initiatives
- Ownership tracking and end-of-life recycling logs
- Consumer-facing transparency for ESG reporting
- Easy scanning and no specialized hardware needed

‍

Customer Engagement

How can I build customer trust and engagement with authentication?

Consumers expect proof of authenticity and personalized experiences from premium brands. Without instant authentication, trust erodes and counterfeits undercut your product’s value. A lack of engagement touchpoints leaves opportunity on the table.

An O-KEY solution delivers instant product authentication via smartphone scan. It can also unlock tailored digital content, service portals, or warranty registration. This improves loyalty, reduces returns, and enhances premium positioning.

- Authenticate products instantly at point of sale or unboxing
- Deliver digital content, loyalty perks, or onboarding flows
- Differentiate premium goods with trust and transparency
- Protect reputation while enhancing user experience

‍

Production Implementation

How can I integrate secure product identity without disrupting operations?

Digital transformation often stalls due to complex integration and legacy systems. Security upgrades that require specialized hardware or production changes create friction and cost. IT teams need flexible, scalable solutions that plug into existing infrastructure.

An O-KEY solution is API-first, cloud-based, and hardware-agnostic. It fits into existing ERP, PLM, and CRM environments without requiring changes to your production line or devices. The solution scales globally with low overhead.

- Cloud-native architecture and scalable infrastructure
- REST APIs and easy integration into existing IT stacks
- Smartphone-based verification; no proprietary scanners
- Enterprise-grade security with minimal deployment friction

‍

Go-Live Timeline

How long does it take to go live with the O-KEY solution?

Whether you start with a commercial pilot, or full-scale integration, we're ready to go in as little as 30 days.

Depending on your setup, you can go from kickoff to product authentication in 30-90 days, with no production downtime. Label-based pilots require no production line change. For embedded or print-on-product deployments, our team will provide design and integration support.

- MVP pilot possible in well under 3 months
- Labels or prints designed in collaboration with your team
- Includes app, data manager, and training
- Easily scales to full production

‍

Data Control

Can I control what customers see after scanning an O-KEY?

The O-KEY solution gives you complete control over the scan experience, user access, and scan history. While PUFIN-ID ensures every O-KEY is secure and verifiable, we never access your proprietary data. You define what’s displayed, who can see it, and how it evolves. Your product, your data, your rules.

Each O-KEY is linked to a digital profile that you can manage using our cloud-based data platform. You can change what appears after a scan in real time, including product info, sustainability data, digital manuals, videos, or support contact.

- Customizable post-scan experience
- Real-time updates without touching the product
- Role-based access control for internal vs. external users
- Full flexibility without developer dependency

‍

Ease of Use

Do I need a special scanner or device to use the O-KEY solution?

An O-KEY can be scanned with any modern smartphone.

The O-KEY verifier app processes the image and confirms authenticity in real time. There is no need for dedicated hardware or specialized scanners. This ensures seamless adoption at factories, warehouses, retail stores, and by end-customers.

- Mobile-first scan and verification
- Compatible with iOS and Android smartphones
- App available with custom branding options
- No additional hardware needed

‍

Pricing Structure

How is pricing structured for the O-KEY solution?

Designed to scale with your needs, our pricing is optimized for high security at lower cost than traditional RFID or NFC systems.

The O-KEY solution includes a one-time registration fee per O-KEY, an annual service fee based on active volume tiers, and optional consulting or development support. All packages include access to the verifier app and data management tools. Compared to RFID and NFC solutions, the O-KEY solution offers better scalability, stronger security, and lower implementation costs.

- Transparent volume-based fees
- Option to purchase from our own secure production, or produce our patented tech in-house
- Full enterprise pricing tailored to your needs
- No long-term commitment required for pilots

‍

Your guide to the most secure, flexible, and scalable product authentication solution on the market.

Insights unlocked

We’re constantly exploring how to further strengthen and improve product authentication and verification processes. Read thoughts from our professor on the blog, dive into guides and ressources and join our community of learners and leaders right here.

Anti-counterfeiting

By simply adding a unique tag to your product, you can increase brand trust by always being able to document the product journey and verify that the product is genuine. This makes it possible to efficiently avoid counterfeiting.

Full traceability

Embedded Trust, Invisible & Indisputable
‍
Seamlessly integrated into your product during manufacturing, the O-KEY Droplet tracks ownership, stops counterfeits, and unlocks lifecycle visibility. Perfect for high-risk goods and instances where aesthetics matter.

Is your product at risk?
Try the assesment to see if you will benefit from O-KEY.

We are a team of product experts, engineers and researchers - ready to explore options for protecting and verifying your products. Get in touch for more information on how we can collaborate.

try Product Protection Assesment ™
Talk to sales
General terms of usePrivacy policyCode of conductGeneral terms and conditions
Download the app now.
App Store logoGoogle Play Logo
All rights reserved. Registered company in Denmark and EU. VAT DK40911332

All content is the property of PUFIN—ID. No parts of this site including text and images, may be reproduced without prior written consent of PUFIN—ID.
O—KEY is developed, designed and patented by