Connected Products··16 min read

QR Code Authentication: Fight Counterfeits

Featured image for QR Code Authentication: Fight Counterfeits

QR Code Authentication: Fight Counterfeits

Key Takeaways

  • International trade in counterfeit and pirated goods exceeds $500 billion annually (OECD/EUIPO), representing up to 2.5% of world trade — with pharmaceuticals, luxury goods, spirits, cosmetics, and electronics among the hardest-hit categories.
  • QR code authentication works through server-side verification, not code secrecy: each unit gets a unique serialized code, and the cloud system flags anomalies (repeated scans, geographic inconsistency) rather than relying on the code being uncopyable.
  • First-scan detection and location validation allow brands to identify grey-market diversion and counterfeit operations within weeks of deployment — data that would never surface through traditional supply chain controls.
  • Authentication infrastructure built for anti-counterfeiting is the same infrastructure required for EU Digital Product Passport compliance, making it a dual-purpose investment rather than a standalone security cost.

Somewhere right now, a consumer is buying a product they believe is genuine. The packaging looks right. The price seems reasonable. The retailer appears legitimate. But the product inside is counterfeit — and neither the consumer nor the brand will know until something goes wrong.

Counterfeiting is not a niche problem. According to the OECD and the European Union Intellectual Property Office (EUIPO), international trade in counterfeit and pirated goods amounts to roughly $500 billion annually, representing up to 2.5% of world trade. That figure only accounts for goods crossing international borders — domestic counterfeiting pushes the real number even higher.

The industries hardest hit read like a list of sectors where trust matters most: pharmaceuticals, luxury goods, consumer electronics, automotive parts, food and beverage, and cosmetics. In each of these categories, counterfeits don't just steal revenue — they endanger consumers and erode the brand trust that companies spend decades building.

Traditional anti-counterfeiting measures have been fighting this battle for years, with limited success. But a new approach is emerging that shifts the power dynamic: QR code authentication through connected packaging. Instead of relying on supply chain professionals to catch fakes, this approach puts verification directly in the consumer's hands — and turns every authenticity check into a brand engagement opportunity.

Why Traditional Anti-Counterfeiting Measures Fall Short

Most anti-counterfeiting technologies share a fundamental flaw: they were designed for supply chain professionals, not for the people who actually buy the products. Here's why the conventional toolkit struggles:

Holograms and Security Labels

Holograms have been the go-to anti-counterfeiting feature for decades. They appear on everything from credit cards to luxury handbags. The problem? Consumers have no idea what a "real" hologram looks like. They see a shiny, iridescent label and assume the product is genuine. Meanwhile, counterfeiters have become remarkably skilled at producing convincing holographic reproductions. A consumer comparing a fake hologram to a real one — without a reference sample side by side — will almost never spot the difference.

Even security-grade holograms with micro-text and hidden features suffer from the same usability gap: the verification requires magnification tools and trained eyes that consumers simply don't have.

Serial Numbers and Batch Codes

Serial numbers provide traceability, which is valuable for supply chain management. But as a consumer-facing authentication tool, they fall flat. To verify a serial number, a consumer would need to visit a website, type in a long alphanumeric string, and wait for a response. The friction is enormous. In practice, almost no consumers bother — which means serial numbers protect against nothing at the point of purchase.

Special Inks, Materials, and Microprinting

Colour-shifting inks, security fibres, and microprinting are genuinely difficult to replicate. They're also expensive, hard to scale across product lines, and — critically — invisible to consumers without specialized equipment. A security feature that nobody checks is a security feature that doesn't work.

The Core Problem

The fundamental issue is a gap between detection capability and consumer accessibility. Brands invest in anti-counterfeiting measures that are technically sophisticated but practically useless at the moment that matters most: when a consumer is deciding whether to trust a product. The ideal solution would be something every consumer already carries, requires zero training, and delivers an instant, unambiguous answer.

That's where smartphones and QR codes enter the picture.

How QR Code Authentication Works

QR code authentication is built on a simple but powerful principle: every individual product unit gets a unique, serialized QR code, and a cloud-based system validates that code at the moment of scanning. This is fundamentally different from a standard QR code that simply links to a website — the uniqueness and server-side verification are what make it an authentication tool. If you are new to QR codes, QR Codes Demystified: Static vs. Dynamic explains the foundational concepts before diving into authentication.

Unique Serialized Codes

The foundation of QR authentication is serialization. Rather than printing the same QR code on every unit of a product (which would tell you nothing about authenticity), each unit receives a code containing a unique identifier. This could be a serial number, a cryptographic token, or a combination of both. The key point is that no two products share the same code.

Scan-to-Verify

When a consumer scans the QR code with their smartphone camera, the code directs them to a verification server. The server checks the unique identifier against its database and returns a result — either confirming the product as authentic or raising a warning. The entire process takes seconds and requires nothing from the consumer beyond a single scan.

First-Scan Detection

Here's where QR authentication gets genuinely clever. If a counterfeiter copies a QR code from a legitimate product and prints it on fakes, the system can detect this through scan volume monitoring. A code that has been scanned hundreds of times across different locations is almost certainly being replicated. The system can flag these anomalies and alert both the brand and subsequent consumers who scan the same code.

Location Validation

Scan geography adds another layer of intelligence. If a product was manufactured and distributed for the European market, but its QR code is being scanned repeatedly in a region where it was never shipped, that's a strong signal of either counterfeiting or grey market diversion. Cross-referencing scan locations with expected distribution channels helps brands identify problems they might never catch through traditional means.

Real-Time Consumer Feedback

The consumer experience is straightforward: scan the code, see a clear result. An authentic product displays a verification confirmation along with product details, warranty information, and optional next steps. A suspicious code triggers a warning with guidance on what to do next. No ambiguity, no magnifying glass, no training required.

The Technical Architecture

Understanding the technical flow helps clarify why this approach is more robust than it might first appear:

Step 1: Serialization at Manufacturing

During production, each unit is assigned a unique identifier. This can be integrated into existing manufacturing execution systems (MES) or handled by dedicated serialization platforms. The identifier is stored in a secure, centralized database along with metadata: product type, batch number, manufacturing date, intended distribution region.

Step 2: Secure QR Code Generation

The unique identifier is encoded into a QR code. For added security, some implementations include a cryptographic signature — essentially a digital seal that can be verified without exposing the underlying key. This makes it significantly harder for counterfeiters to generate valid codes even if they understand the format.

Step 3: Cloud Verification

When scanned, the QR code directs to a verification endpoint. The server receives the unique identifier, checks it against the database, evaluates contextual signals (scan count, location, time patterns), and returns a verification result. This server-side logic is the real security layer — the QR code is just the consumer-friendly interface.

Step 4: Consumer Experience

The consumer sees a verification page that confirms authenticity and displays relevant product information. This is where authentication becomes more than just security — it becomes a customer experience touchpoint. A platform like BrandedMark can deliver this verification alongside product registration, support resources, user manuals, and accessory recommendations, turning a security check into the start of an ongoing brand relationship.

Beyond Verification: The Business Case

If QR code authentication only stopped counterfeits, it would already be worth considering. But the real strategic value extends far beyond security.

Every Scan Is an Engagement Touchpoint

Most brands struggle to establish direct relationships with end consumers, especially those selling through retail channels. Authentication scans change this equation. Every time a consumer verifies a product, they're voluntarily interacting with the brand — and that interaction can be the gateway to registration, support, loyalty programs, and more.

First-Party Data from Verification

Each authentication scan generates valuable data: who is buying your products, where, and when. In an era of increasing privacy regulation and the decline of third-party cookies, this kind of first-party, consent-based data is gold. Brands can use it to understand actual consumer demographics, identify geographic demand patterns, and tailor marketing efforts accordingly.

Post-Purchase Services at the Perfect Moment

The moment of authentication is arguably the best time to offer post-purchase services. The consumer has just confirmed their product is genuine — trust is high, attention is focused, and they're already interacting with your brand digitally. This is the ideal moment to initiate QR code product registration, offer access to user guides, product care tips, or complementary accessories. Connected packaging platforms like BrandedMark are designed to deliver exactly this kind of post-scan experience, combining authentication with a full suite of consumer engagement tools.

Grey Market Detection

Authentication scan data reveals distribution anomalies that would otherwise be invisible. If products intended for one market are being verified in another, brands can identify unauthorized distribution channels, enforce territorial agreements, and protect pricing structures — all from data generated passively through consumer scans.

Real-World Examples and Regulations

QR code authentication isn't theoretical. It's already being deployed across industries, and in some cases, it's legally mandated.

Scantrust

Scantrust is a Swiss company that specializes in secure QR codes for anti-counterfeiting. Their technology combines standard QR functionality with a proprietary secure graphic element that is extremely difficult to reproduce. They work with brands across luxury goods, spirits, and agricultural products, providing both authentication and supply chain traceability through a single code on the packaging.

Digimarc

Digimarc takes a different but complementary approach, embedding imperceptible digital watermarks directly into packaging artwork. These watermarks can coexist with QR codes to provide a multi-layered authentication strategy. The watermark is invisible to the naked eye but detectable by smartphones, adding a layer of security that counterfeiters can't easily identify or replicate.

The EU Falsified Medicines Directive (FMD)

Perhaps the most significant validation of serialized product authentication is the EU Falsified Medicines Directive, which has been in effect since February 2019. The FMD requires that every prescription medicine sold in the EU carries a unique identifier encoded in a 2D barcode on the packaging. The European Medicines Verification Organisation (EMVO) reports that the system now covers over 10 billion medicine packs annually across 30 European markets — the largest deployment of serialized product authentication in history and a proven model for consumer goods categories now facing similar mandates. At the point of dispensing, pharmacies must scan and verify each pack against a centralized database. If the code doesn't match, or if it has already been dispensed, the system flags it.

The FMD demonstrates that serialized verification works at massive scale — covering billions of medicine packs across the entire European market. It also illustrates the regulatory direction: governments increasingly see serialization and verification as essential tools for consumer protection.

Alibaba and Marketplace Authentication

Alibaba has invested heavily in authentication technology to combat counterfeiting on its platforms. The company has collaborated with brands to implement QR-based verification systems that allow consumers to check product authenticity before or after purchase. This marketplace-driven approach acknowledges a reality: in e-commerce, where consumers can't physically inspect products before buying, digital authentication becomes even more critical.

Limitations and Honest Considerations

QR code authentication is a powerful tool, but it's not infallible. Responsible implementation requires understanding its limitations.

QR Codes Can Be Copied

The QR code itself — the printed pattern — can be photographed and reproduced. This is an inherent limitation of any visible code. The security doesn't come from the code being uncopyable; it comes from the server-side logic that detects when a single code is being scanned across multiple locations or an implausible number of times. This is an important distinction that brands need to understand and communicate clearly.

Consumer Awareness and Willingness

Authentication only works if consumers actually scan. While QR code adoption has surged since the pandemic, not every consumer will bother to verify their purchase. Building awareness — through packaging design, point-of-sale messaging, and marketing — is essential for maximizing scan rates. Products in high-risk categories (pharmaceuticals, infant formula, luxury goods) tend to see higher verification engagement because consumers are more motivated to confirm authenticity.

Sophisticated Counterfeiters Adapt

The most sophisticated counterfeiting operations will study any authentication system and look for weaknesses. Some may attempt to register fake codes in verification databases. Others may replicate the verification experience itself, directing scans to a convincing but fraudulent confirmation page. No single technology eliminates counterfeiting entirely.

Part of a Multi-Layered Strategy

QR code authentication works best as one component of a broader anti-counterfeiting strategy — not as a standalone solution. Combining digital authentication with physical security features (tamper-evident packaging, security inks, specialized substrates), supply chain controls, and legal enforcement creates a defence-in-depth approach that is far harder for counterfeiters to defeat than any single measure.

Implementation Roadmap

For brands considering QR code authentication, here's a practical approach to getting started:

1. Start with Serialization

Before you can authenticate individual products, you need to identify them individually. Work with your manufacturing and packaging teams to implement unit-level serialization. This is the foundational step and often the most operationally complex, so start here.

2. Generate Secure QR Codes

Once serialization is in place, generate QR codes that encode the unique identifiers. Consider whether you need additional cryptographic signatures based on your risk profile and the sophistication of counterfeiting threats in your category.

3. Build or Adopt a Verification Platform

You need a cloud-based system that receives scan requests, validates codes, detects anomalies, and serves the consumer-facing verification experience. This is where a connected packaging platform like BrandedMark comes in — rather than building verification infrastructure from scratch, brands can leverage an existing platform that combines authentication with broader post-purchase engagement capabilities.

4. Integrate with Packaging Production

Connect your QR code generation with your packaging printing workflow. This may involve variable data printing (VDP) capabilities, where each unit's packaging is printed with its unique code. Work closely with your packaging supplier to ensure print quality is sufficient for reliable scanning.

5. Launch a Consumer Awareness Campaign

The best authentication system in the world is useless if consumers don't know it exists. Design your packaging to clearly communicate the verification capability. Include simple instructions — "Scan to verify authenticity" — and ensure the post-scan experience reinforces trust and delivers value beyond a simple "authentic" message.

6. Monitor, Analyse, and Respond

Once live, actively monitor scan data for anomalies. Establish protocols for responding to potential counterfeiting signals. Use the data to refine your strategy, identify geographic hotspots, and measure the effectiveness of your broader anti-counterfeiting efforts.

The Convergence of Security and Experience

What makes QR code authentication particularly compelling is that it sits at the intersection of brand protection and customer experience. Serialised unit-level tracking is also a prerequisite for the EU Digital Product Passport, which requires unique identifiers on every product — so the authentication infrastructure you build now doubles as DPP compliance readiness. Traditional anti-counterfeiting measures are pure cost centres — they protect against losses but generate no direct value. QR authentication, embedded within a connected packaging strategy, does both. It protects against counterfeits while simultaneously creating direct consumer relationships, generating first-party data, and enabling post-purchase engagement.

This convergence is why authentication is increasingly seen not as a standalone security initiative but as a core component of connected packaging strategy. When every product can verify itself and every verification is a conversation starter, the business case for authentication extends well beyond loss prevention.

Counterfeiting isn't going away. But the tools available to fight it are getting smarter, more consumer-friendly, and more strategically valuable. QR code authentication through connected packaging — powered by BrandedMark's product identity infrastructure — is one of the most practical steps a brand can take today — protecting consumers, protecting revenue, and building the direct relationships that define modern brand success. For brands managing complex products with many components, product component transparency explores how serialised identity extends through the supply chain.


Ready to explore how connected packaging can protect your products and engage your customers? Join the BrandedMark waitlist to get early access to our authentication and post-purchase engagement platform.


Frequently Asked Questions

Can't counterfeiters just copy the QR code and print it on fake products?

They can copy the printed code, yes. But the security layer isn't the code itself — it's the server-side verification. When a copied code gets scanned dozens or hundreds of times across different locations, the system flags it as compromised. Subsequent consumers scanning that code receive a warning rather than a verification. This is why serialization (unique codes per unit) is essential — a shared QR code that links to a generic website offers no authentication value.

How is QR code authentication different from the QR codes already on my products?

Most QR codes on packaging today are static codes that link every consumer to the same URL — a product page, a how-to video, or a support site. Authentication QR codes are unique to each individual unit and connect to a verification server that checks the specific code against a database. The difference is between a generic link and a unique digital identity for every single product you sell.

What industries benefit most from QR code authentication?

Any industry where counterfeiting poses a risk to consumer safety, brand reputation, or revenue benefits from authentication. Pharmaceuticals, luxury goods, spirits and wine, cosmetics, automotive parts, electronics, and infant nutrition are among the most active adopters. The EU Falsified Medicines Directive has already made serialized verification mandatory for prescription medicines across Europe, and similar regulations are emerging in other regions and industries.

Do consumers actually scan QR codes to verify products?

Scan rates vary significantly by product category and consumer motivation. Products where safety is a concern — medicines, baby products, food supplements — see higher voluntary verification rates because consumers have strong personal incentives to check. For other categories, scan rates depend on how well brands communicate the feature and what value they deliver beyond the authentication message itself. Offering product registration, warranty activation, or exclusive content alongside verification significantly increases engagement.

See how BrandedMark handles this

Turn every post-purchase moment into an opportunity to build loyalty and drive revenue.

Join the Waitlist — It's Free