H. W. Sands logo
 
PRODUCT CATEGORIES
 

 Search our catalogContact H.W. Sands

      

 

FAQS DOCUMENTS SECURITY

Question How does one ensure the integrity of document content with a Bubble Tag™?
  Answer The Bubble Tag™ guarantees the integrity of a document through its digital signature which, when taken in association with the content of the document, guarantees that it has not been forged. During authentication, it is thus possible to verify that the content of the document has not been altered.
   
Question Is the Bubble Tag™ a complement to the chip on a card or does it compete with it?
  Answer  The Bubble Tag™ is a physical security feature which makes it possible, by means of its signature, to forge a link to the logical security of a document. The Bubble Tag™ is thus a complement to the chip.

 

FAQS BRAND PROTECTION

Question:  How can the consumer control the authenticity at the point of sale?
  Answer:  Consumers can check the authenticity of a Bubble Tag™ at the point of sale using a basic mobile phone with an Internet connection. They simply have to enter the tag reference on the website mentioned, in order to access the image of the Bubble Tag™ and the product description.
   
Question:  How can one encourage the consumer to check authenticity?  
  Answer: 

Brands using Bubble Tags™ give very clear information on how to check authenticity. This information can be consulted either on the product, or on the packaging, in accompanying documentation or on the Internet website.  The more information the brand provides, the more the consumer is likely to check authenticity.

   
Question:  Is there a minimum quantity to order?
  Answer:  Bubble Seals™ are individually produced. Therefore there is no minimum quantity order, since no special tool is necessary for the production, the personalization, or the recording of a standard Bubble Seal™.
   
Question:  How can the Bubble Tag™ become a marketing tool for brands?
  Answer:  The Bubble Tag™ creates a link between the brand and the consumer when a check on authenticity is made. Access to a specific internet page also gives access to information which can help consumers in their choice at the moment of purchase.
   
Question:  Is the Bubble Tag™ limited to a certain category of products?
  Answer:  The Bubble Tag™ can be directly or indirectly applied to any type of product. Depending on the type of product, the Bubble Tag™ can be positioned on the outer packaging, the packaging, the product itself, or on a certificate accompanying the product.
   
Question:  How does one ensure the logistical security of the Bubble Tag™?
  Answer:  It is important to differentiate the stage at which the Bubble Tags™ are delivered from the stage at which they are activated. On delivery, the Bubble Tags™ have not been activated, therefore no verification is possible. It is up to the rights holders to decide whether or not, and when, to prepare them for authentication, through an operation known as 'activation', which is their sole responsibility. 
   
Question:  When should one activate a Bubble Tag™?
  Answer: 

A Bubble Tag™ can be activated at any time by its rights holder. However, Prooftag recommends activation only after the the Bubble Tag™ has been implemented on the product. 

 

FAQS TECHNOLOGY

Question:  Why each Bubble Tag™ is always unique ?
  Answer: 

The Bubble Tag™ results from a sort of manufactured chaos, whose generation is totally random and unforeseeable.

It is the material itself which generates the position, the shape and the size of bubbles. It is almost impossible to calculate the statistical probabilities of finding two identical Bubble Tags™, since it is not possible to predetermine the shape of the bubbles. If we assume that the bubbles are perfectly round and that there are 40 bubbles in each Bubble Tag™, the probability of finding two identical Bubble Tags™ is inferior to 1/10160. The formula for calculation is :

   
Question:  Why is it impossible to reproduce the Bubble Tag™?  
  Answer: 

The Bubble Tag™ cannot be reproduced, not even by its own manufacturer. The self-generation of bubbles in the material is totally chaotic. The probability of obtaining two identical Bubble Tags™ is therefore near zero.

The generation of a translucent tri-dimensional structure like the Bubble Tag is impossible to copy in an identical way using any other technique. The bubble is an absence of material within a material with very specific optical characteristics. The surface condition between the bubble and the material is the perfect result of the balance of gas/material forces during its creation. This complex convex surface reflects and reacts to light in a totally unique way.

   
Question:  Is there anything electronic in the Bubble Tag™?
  Answer:  The Bubble Tag™ is made of a complex inert polymer which remains stable over time. It does not contain any electronic components. It is acid and alkaline proof, and does not break down.
   
Question:  Can one check the Bubble Tag™ with any type of mobile phone?
  Answer:  Any mobile phone equipped with a wap or html browser can be used to check a Bubble Tag™ visually. iPphone 3GS owners have a free I-Proof application which can be downloaded from Apple store. This application provides easy access to the contents of the databases necessary for visual authentication.
   
Question:  Can one integrate the Bubble Tag™ into any type of material?
  Answer: 

The Bubble Tag™ can be produced on different materials (polyester, polycarbonate, metals, …). It can then be integrated into products, packaging, documents, cards, … 

   
Question:  Is it possible to tear off a Bubble Tag™?
  Answer:  Bubble Tags™ can be produced on tamper-evident material making any attempt at their removal visible. These Bubble Tags™ are thus irreversibly marked, proving that an attempt to tear them off has been made.
   
Question:  What is chaometrics ?
  Answer:  Chaometrics is based on the characteristics of a randomly generated physical phenomenon, used to create a unique identifier enabling authentication. A similar example is biometrics, a chaometric science which uses biological chaos to identify, and consequently to authenticate the identity of human beings.
   
Question:  Why choose a visible solution ?
  Answer:  Most technical solutions for visible authentication are counterfeited sooner or later, since they are based on reproducible systems. The Bubble Tag™ offers the advantages of a highly secure visible solution. This visible authentication solution acts as a deterrent to counterfeiters, as well as a warning signal for those checking the product.
   
Question:  Why is the Bubble Tag™ a sustainable solution ?
  Answer: 

The Bubble Tag™ is a technological security solution based on the characteristics of a chaotic element.

Like any technology based on chaotic characteristics, the element is intrinsically secure. It is this mode of characterization which makes the technological concept sustainable. Indeed, this mode of characterization gets stronger with time. In this way, the level of security is not only maintained, but it increases.

 

For additional information on any of our security technologies please contact our Security Team.

 

See our complete product line

Security Solutions
     Overt Technologies          
          Color Shift
          Thermochromics
          Photochromics
          Prooftag
     Covert Technologies
            Fluorescent Dyes
            Polarized Hidden Image
                Technology (PTEC)
            Scrambled Indicia

 


     
Forensic Technologies
            Forensic Taggants
            Applied DNA Sciences (APDN)
     Security Equipment
     Counterfeiting News
     Resources & Links
           

Catalog Number Product Name Application Abs. Max. (nm)