Security Solutions > Overt Technologies > Prooftag > Prooftag FAQ
Brands using Bubble Tags™ give very clear information on how to check authenticity. This information can be consulted either on the product, or on the packaging, in accompanying documentation or on the Internet website. The more information the brand provides, the more the consumer is likely to check authenticity.
A Bubble Tag™ can be activated at any time by its rights holder. However, Prooftag recommends activation only after the the Bubble Tag™ has been implemented on the product.
The Bubble Tag™ results from a sort of manufactured chaos, whose generation is totally random and unforeseeable. It is the material itself which generates the position, the shape and the size of bubbles. It is almost impossible to calculate the statistical probabilities of finding two identical Bubble Tags™, since it is not possible to predetermine the shape of the bubbles. If we assume that the bubbles are perfectly round and that there are 40 bubbles in each Bubble Tag™, the probability of finding two identical Bubble Tags™ is inferior to 1/10160. The formula for calculation is :
The Bubble Tag™ cannot be reproduced, not even by its own manufacturer. The self-generation of bubbles in the material is totally chaotic. The probability of obtaining two identical Bubble Tags™ is therefore near zero.
The generation of a translucent tri-dimensional structure like the Bubble Tag is impossible to copy in an identical way using any other technique. The bubble is an absence of material within a material with very specific optical characteristics. The surface condition between the bubble and the material is the perfect result of the balance of gas/material forces during its creation. This complex convex surface reflects and reacts to light in a totally unique way.
The Bubble Tag™ can be produced on different materials (polyester, polycarbonate, metals, …). It can then be integrated into products, packaging, documents, cards, …
The Bubble Tag™ is a technological security solution based on the characteristics of a chaotic element.
Like any technology based on chaotic characteristics, the element is intrinsically secure. It is this mode of characterization which makes the technological concept sustainable. Indeed, this mode of characterization gets stronger with time. In this way, the level of security is not only maintained, but it increases.
See our complete product line Security Solutions Overt Technologies Color Shift Thermochromics Photochromics Prooftag Covert Technologies Fluorescent Dyes Polarized Hidden Image Technology (PTEC) Scrambled Indicia
Forensic Technologies Forensic Taggants Applied DNA Sciences (APDN) Security Equipment Counterfeiting News Resources & Links