Connected Products··35 min read

QR Code Authentication: Fight Counterfeits

Featured image for QR Code Authentication: Fight Counterfeits

QR Code Authentication: Fight Counterfeits

Key Takeaways

  • International trade in counterfeit and pirated goods exceeds $500 billion annually (OECD/EUIPO), representing up to 2.5% of world trade — with pharmaceuticals, luxury goods, spirits, cosmetics, and electronics among the hardest-hit categories.
  • QR code authentication works through server-side verification, not code secrecy: each unit gets a unique serialized code, and the cloud system flags anomalies (repeated scans, geographic inconsistency) rather than relying on the code being uncopyable.
  • First-scan detection and location validation allow brands to identify grey-market diversion and counterfeit operations within weeks of deployment — data that would never surface through traditional supply chain controls.
  • Authentication infrastructure built for anti-counterfeiting is the same infrastructure required for EU Digital Product Passport compliance, making it a dual-purpose investment rather than a standalone security cost.

Somewhere right now, a consumer is buying a product they believe is genuine. The packaging looks right. The price seems reasonable. The retailer appears legitimate. But the product inside is counterfeit — and neither the consumer nor the brand will know until something goes wrong.

Counterfeiting is not a niche problem. According to the OECD and the European Union Intellectual Property Office (EUIPO), international trade in counterfeit and pirated goods amounts to roughly $500 billion annually, representing up to 2.5% of world trade. That figure only accounts for goods crossing international borders — domestic counterfeiting pushes the real number even higher.

The industries hardest hit read like a list of sectors where trust matters most: pharmaceuticals, luxury goods, consumer electronics, automotive parts, food and beverage, and cosmetics. In each of these categories, counterfeits don't just steal revenue — they endanger consumers and erode the brand trust that companies spend decades building.

Traditional anti-counterfeiting measures have been fighting this battle for years, with limited success. But a new approach is emerging that shifts the power dynamic: QR code authentication through connected packaging. Instead of relying on supply chain professionals to catch fakes, this approach puts verification directly in the consumer's hands — and turns every authenticity check into a brand engagement opportunity.

Why Traditional Anti-Counterfeiting Measures Fall Short

Most anti-counterfeiting technologies share a fundamental flaw: they were designed for supply chain professionals, not for the people who actually buy the products. Holograms require trained eyes to assess. Serial numbers demand manual entry on a website. Security inks need specialised equipment to verify. At the moment that matters most — when a consumer is deciding whether to trust a product — none of these tools are usable. The conventional anti-counterfeiting toolkit protects brands at the inspection stage, not at the point of purchase. Brands invest in technically sophisticated features that consumers cannot practically evaluate, which means counterfeiters only need to fool the untrained eye, not the lab. Every category from pharmaceuticals to luxury goods faces this same accessibility gap. The ideal solution must work on hardware every consumer already carries, require zero training, and return an instant, unambiguous answer. That combination points directly to smartphones and QR codes as the delivery mechanism.

Holograms and Security Labels

Holograms have been the go-to anti-counterfeiting feature for decades. They appear on everything from credit cards to luxury handbags. The problem? Consumers have no idea what a "real" hologram looks like. They see a shiny, iridescent label and assume the product is genuine. Meanwhile, counterfeiters have become remarkably skilled at producing convincing holographic reproductions. A consumer comparing a fake hologram to a real one — without a reference sample side by side — will almost never spot the difference. Even security-grade holograms with micro-text and hidden features suffer from the same usability gap: verification requires magnification tools and trained eyes that consumers simply do not have. A hologram that nobody can reliably authenticate provides only psychological reassurance — it signals effort rather than proof. Until holograms can be verified in a second with a smartphone, they remain a feature that protects brand perception more than it stops skilled counterfeiters from copying packaging.

Serial Numbers and Batch Codes

Serial numbers provide traceability, which is valuable for supply chain management. But as a consumer-facing authentication tool, they fall flat. To verify a serial number, a consumer would need to visit a website, type in a long alphanumeric string, and wait for a response. The friction is enormous. In practice, almost no consumers bother — which means serial numbers protect against nothing at the point of purchase. Batch codes face the same problem at a larger scale: they identify production runs rather than individual units, making them useless for detecting a single counterfeit in an otherwise legitimate shipment. Serialisation adds unique per-unit identity, but without a frictionless scan mechanism to surface that identity to the consumer, the data lives entirely in the supply chain and never reaches the person most motivated to act on it. Consumers need verification in one step, not four.

Special Inks, Materials, and Microprinting

Colour-shifting inks, security fibres, and microprinting are genuinely difficult to replicate and represent real investments in product security. The challenge is not their sophistication — it is their invisibility. Consumers cannot see microprinting without magnification, cannot detect security fibres embedded in packaging substrates, and cannot tell a colour-shifting ink from a convincing imitation under typical retail lighting. A security feature that nobody checks is a security feature that does not work. These technologies function well as forensic markers — useful when investigators pull a suspect product from a shelf and examine it under controlled conditions. They add meaningful depth to a layered anti-counterfeiting strategy. But they cannot serve as primary consumer-facing verification because they require equipment and knowledge the average buyer does not possess and should not need to acquire just to confirm a purchase is genuine.

The Core Problem

The fundamental issue is a gap between detection capability and consumer accessibility. Brands invest in anti-counterfeiting measures that are technically sophisticated but practically useless at the moment that matters most: when a consumer is deciding whether to trust a product. Every hologram, serial number, and security ink shares the same limitation — verification depends on expertise or equipment that consumers do not carry. Counterfeiters exploit this gap deliberately: they do not need to defeat the technology, only the consumer's ability to recognise it. A workable solution must close this gap entirely. It must require no training, no equipment, and no prior knowledge. It must deliver a result in seconds, not minutes. And it must be available to every consumer, not just those who seek out verification resources. The smartphone in every pocket is the only device that meets all these requirements, and QR codes are the bridge that connects the physical product to a digital verification layer.

That's where smartphones and QR codes enter the picture.

How QR Code Authentication Works

QR code authentication answers one question every consumer wants answered at the moment of purchase: is this product genuine? The mechanism is straightforward. Every individual unit receives a unique, serialised QR code during manufacturing. When a consumer scans that code, their phone contacts a verification server that checks the unique identifier against a secure database and returns a result in seconds. This is fundamentally different from a standard QR code that simply links to a product page — the uniqueness and server-side verification are what make it an authentication tool rather than a marketing link. The security does not depend on the code being impossible to read. It depends on the cloud system detecting when a code behaves abnormally — scanned too many times, from too many locations, or in geographies inconsistent with the product's distribution. If you are new to QR codes, QR Codes Demystified: Static vs. Dynamic explains the foundational concepts before diving into authentication.

Unique Serialized Codes

The foundation of QR authentication is serialisation. Rather than printing the same QR code on every unit of a product — which would tell you nothing about authenticity — each unit receives a code containing a unique identifier. This could be a serial number, a cryptographic token, or a combination of both. The key point is that no two products share the same code. This uniqueness is what allows the server to reason about individual items rather than product lines. When the system knows that a specific code was assigned to one unit shipped to one distributor in one country, any scan that contradicts that context becomes a signal worth investigating. Serialisation also unlocks traceability beyond authentication: brands can follow a product's journey from factory to consumer, identify which batches were diverted to grey markets, and pinpoint where in the supply chain counterfeiting was introduced. Without unit-level serialisation, none of this forensic capability exists.

Scan-to-Verify

When a consumer scans the QR code with their smartphone camera, the code directs them to a verification server. The server receives the unique identifier, checks it against the database, evaluates contextual signals, and returns a result — either confirming the product as authentic or raising a warning. The entire process takes seconds and requires nothing from the consumer beyond a single scan. No app installation, no account creation, no manual data entry. This frictionless experience is critical to achieving meaningful scan rates: every additional step a consumer must take reduces the likelihood they complete the verification. The scan-to-verify flow succeeds precisely because it matches how consumers already use their phones. They point the camera, they tap a notification, and they read a result. Brands that communicate this capability clearly on their packaging can expect a meaningful share of customers to verify, particularly in categories where product safety or significant expenditure raises the stakes of buying a fake.

First-Scan Detection

Here's where QR authentication gets genuinely clever. If a counterfeiter copies a QR code from a legitimate product and prints it on fakes, the system can detect this through scan volume monitoring. A code that has been scanned hundreds of times across different locations is almost certainly being replicated. The system flags these anomalies and alerts both the brand and subsequent consumers who scan the same code. The first consumer to scan a copied code may see an authentic result — the server has no prior evidence of copying at that point. But by the second, tenth, or hundredth scan from a different device and location, the pattern becomes statistically impossible to explain through legitimate use. At that threshold, the system switches subsequent scans to a warning state, effectively neutralising the counterfeiter's copied codes across their entire fake inventory. This detection mechanism improves over time as scan data accumulates, making the system more sensitive the longer it operates.

Location Validation

Scan geography adds another layer of intelligence to the authentication picture. If a product was manufactured and distributed for the European market, but its QR code is being scanned repeatedly in a region where it was never shipped, that is a strong signal of either counterfeiting or grey market diversion. Cross-referencing scan locations with expected distribution channels helps brands identify problems they might never catch through traditional supply chain controls. Location validation works passively — consumers do not need to share their location explicitly. Most scans include approximate geographic data through IP geolocation, which is sufficient to identify cross-border anomalies. Brands can set geographic rules per product line, SKU, or batch, and receive automated alerts when scan patterns deviate from expectations. This turns authentication infrastructure into a continuous distribution monitoring system, surfacing diversion and counterfeiting activity weeks or months earlier than it would appear through returns data, retail complaints, or customs seizures.

Real-Time Consumer Feedback

The consumer experience is straightforward: scan the code, see a clear result. An authentic product displays a verification confirmation along with product details, warranty information, and optional next steps. A suspicious code triggers a warning with guidance on what to do next. No ambiguity, no magnifying glass, no training required. The clarity of this feedback loop is what makes consumer-facing authentication viable at scale. Consumers do not need to interpret a hologram or assess a serial number — they receive a binary result in plain language, delivered in the same interaction pattern as every other QR scan in their daily life. For brands, the real-time feedback loop provides immediate visibility into where and how their products are being verified. Every scan is a data point. Aggregate scan behaviour across thousands of consumers reveals demand patterns, geographic distribution, and the health of the product's journey through the supply chain, all generated passively through normal consumer behaviour.

The Technical Architecture

Understanding the technical flow helps clarify why QR code authentication is more robust than it might first appear. The system has four stages: serialisation at manufacturing, secure code generation, cloud verification at scan time, and the consumer-facing experience. Each stage is distinct and can be implemented incrementally, which matters for brands that are new to serialisation or are integrating authentication into existing packaging workflows. The robustness comes from the combination: unique identifiers generated at the source, cryptographic integrity checks baked into the code format, server-side logic that evaluates each scan in context, and a consumer interface that delivers results instantly. No single stage is impenetrable in isolation, but together they create a system where defeating authentication requires simultaneous compromise of manufacturing records, cryptographic keys, and the verification server — a far harder target than copying a printed label.

Step 1: Serialization at Manufacturing

During production, each unit is assigned a unique identifier. This can be integrated into existing manufacturing execution systems (MES) or handled by dedicated serialisation platforms. The identifier is stored in a secure, centralised database along with metadata: product type, batch number, manufacturing date, and intended distribution region. Getting serialisation right at this stage is the most operationally demanding part of the entire system. It requires coordination between production teams, packaging suppliers, and IT infrastructure to ensure that every unit receives a unique, correctly formatted code before it leaves the facility. Errors at this stage — duplicate codes, unregistered codes, or codes attached to the wrong product — propagate through the entire supply chain and undermine verification accuracy downstream. Most brands find that piloting serialisation on a single SKU or product line before scaling across the full portfolio is the most practical way to identify and resolve manufacturing integration issues before they affect consumer-facing verification.

Step 2: Secure QR Code Generation

The unique identifier is encoded into a QR code. For added security, some implementations include a cryptographic signature — essentially a digital seal that can be verified without exposing the underlying key. This makes it significantly harder for counterfeiters to generate valid codes even if they understand the format. The cryptographic signature creates an asymmetric relationship between code generation and verification: the brand holds the private key used to sign each code, while the public key used to verify signatures can be freely shared with the verification server. Even if a counterfeiter extracts the public key and studies thousands of legitimate codes, they cannot reverse-engineer the private key needed to generate new valid signatures. This means any fabricated code — one not generated from the brand's own serialisation system — will fail signature verification immediately, before the server even checks the database. Cryptographic signing is most valuable in high-risk categories where counterfeiters are sophisticated and motivated.

Step 3: Cloud Verification

When scanned, the QR code directs to a verification endpoint. The server receives the unique identifier, checks it against the database, evaluates contextual signals — scan count, location, time patterns — and returns a verification result. This server-side logic is the real security layer; the QR code is just the consumer-friendly interface. Cloud verification enables the system to reason about each scan in the context of all prior scans for that code, something no printed feature can do. The server can apply rules that become more sophisticated over time: flagging codes scanned more than once within a short window from different devices, codes scanned outside their expected geographic territory, or codes presented after their product's expected shelf life. These rules are configurable and can be tuned based on the counterfeiting patterns a brand actually observes in the field, making the verification system adaptive rather than static. Centralised logging also creates an audit trail that supports legal action against counterfeiters.

Step 4: Consumer Experience

The consumer sees a verification page that confirms authenticity and displays relevant product information. This is where authentication becomes more than just security — it becomes a customer experience touchpoint. A platform like BrandedMark can deliver this verification alongside product registration, support resources, user manuals, and accessory recommendations, turning a security check into the start of an ongoing brand relationship. The design of the verification page matters significantly for consumer trust and downstream engagement. A sparse page that simply says "authentic" confirms the product but misses the opportunity to begin a relationship. A well-designed page confirms authenticity, shows product details that match what the consumer purchased, and offers clear next steps — register your product, access support, join a loyalty programme. Brands that treat the verification moment as a marketing touchpoint, not just a security gate, consistently see higher post-scan engagement and better data capture rates than those that optimise for security alone.

Beyond Verification: The Business Case

QR code authentication delivers more than counterfeit protection — it generates ongoing commercial value from the same infrastructure. Every scan is a voluntary consumer interaction, which is increasingly rare in an era of ad-blocking, privacy regulation, and declining third-party data availability. The business case for authentication therefore extends well beyond loss prevention. Brands that deploy authentication as part of a connected packaging strategy gain a direct channel to end consumers that bypasses retail intermediaries, a source of first-party data generated at the point of highest consumer intent, and a platform for delivering post-purchase services at precisely the moment when engagement is most likely. For brands selling through retail channels or third-party marketplaces, authentication scans may represent the only direct digital touchpoint they have with the actual end user. That makes the infrastructure strategically valuable regardless of the counterfeiting risk in any given category.

Every Scan Is an Engagement Touchpoint

Most brands struggle to establish direct relationships with end consumers, especially those selling through retail channels. Authentication scans change this equation. Every time a consumer verifies a product, they are voluntarily interacting with the brand — and that interaction can be the gateway to registration, support, loyalty programmes, and ongoing communication. The value of this touchpoint compounds over time. A consumer who verifies a product and then registers it has provided consent-based contact information, confirmed their purchase, and demonstrated active engagement with the brand experience. That is a significantly higher-quality lead than an anonymous website visitor or a social media follower. Brands can design the post-verification experience to guide consumers toward the next logical action: registering a warranty, accessing a user guide, or joining a loyalty programme. Each step deepens the relationship while delivering immediate value to the consumer, creating a positive association between authentication and helpfulness rather than security friction.

First-Party Data from Verification

Each authentication scan generates valuable data: who is buying your products, where, and when. In an era of increasing privacy regulation and the decline of third-party cookies, this kind of first-party, consent-based data is genuinely scarce and strategically important. Brands can use scan data to understand actual consumer demographics, identify geographic demand patterns, measure the velocity of product movement through retail channels, and detect demand in markets where the brand has no direct presence. Unlike survey data or panel research, scan data reflects real purchasing behaviour rather than self-reported preferences. It is generated passively, at scale, without recruiting participants or designing studies. Brands that combine scan data with post-verification registration flows gain additional richness: they can link scan events to named consumers, enabling personalised follow-up communications, targeted warranty outreach, and product recall notifications that reach the actual owner rather than just the original purchaser.

Post-Purchase Services at the Perfect Moment

The moment of authentication is arguably the best time to offer post-purchase services. The consumer has just confirmed their product is genuine — trust is high, attention is focused, and they are already interacting with your brand digitally. This is the ideal moment to initiate QR code product registration, offer access to user guides, product care tips, or complementary accessories. Connected packaging platforms like BrandedMark are designed to deliver exactly this kind of post-scan experience, combining authentication with a full suite of consumer engagement tools. The timing advantage is significant. Post-purchase engagement campaigns delivered through email or direct mail arrive when consumer attention has already shifted elsewhere. The verification scan, by contrast, occurs at peak product engagement — the moment of unboxing or first use. Brands that deliver value at this precise moment see higher engagement rates, better conversion on warranty registration, and stronger recall of post-purchase communications than those relying on delayed outreach channels.

Grey Market Detection

Authentication scan data reveals distribution anomalies that would otherwise be invisible. If products intended for one market are being verified in another, brands can identify unauthorised distribution channels, enforce territorial agreements, and protect pricing structures — all from data generated passively through consumer scans. Grey market diversion is a significant commercial problem for brands operating tiered pricing strategies across regions. Products sold at lower prices in one market undercut authorised distributors in premium markets, erode margin, and create retailer relationship issues that are difficult to resolve without evidence of the diversion chain. Authentication scan data provides that evidence. When a product's QR codes generate a clear trail of scans in a market outside its designated territory, the brand has a documented basis for investigating the distribution chain, terminating unauthorised relationships, and calculating the commercial impact of the diversion. This intelligence has direct commercial value that sits entirely outside the anti-counterfeiting use case.

Real-World Examples and Regulations

QR code authentication is not theoretical — it is already deployed at scale across industries, and in some cases it is legally mandated. The EU Falsified Medicines Directive has made serialised verification compulsory for prescription medicines across 30 European markets, covering more than 10 billion packs annually. Consumer goods brands are following a similar trajectory as regulation expands and the cost of authentication infrastructure falls. Understanding how other companies and regulators have approached authentication helps brands evaluate their own options with realistic expectations. The implementations below span different industries, different technical approaches, and different regulatory contexts — but they share a common thread: serialised, scan-based verification works at scale, delivers measurable anti-counterfeiting benefits, and generates data that improves supply chain visibility far beyond what traditional controls provide. Each example also illustrates a different dimension of the business case: security, aesthetics, regulatory compliance, and marketplace trust.

Scantrust

Scantrust is a Swiss company that specializes in secure QR codes for anti-counterfeiting. Their technology combines standard QR functionality with a proprietary secure graphic element that is extremely difficult to reproduce. They work with brands across luxury goods, spirits, and agricultural products, providing both authentication and supply chain traceability through a single code on the packaging. The secure element adds a physical layer of protection that complements the server-side verification logic. Even if a counterfeiter photographs the QR code and reproduces the data digitally, the secure graphic element printed on the original packaging cannot be accurately replicated through standard printing processes. This means a counterfeit product using a copied code will fail both the graphic inspection and, over time, the scan anomaly detection. Scantrust's approach illustrates a principle that applies broadly: layering physical and digital authentication creates a system that is significantly harder to defeat than either approach alone, without requiring consumers to do anything beyond a single scan.

Digimarc

Digimarc takes a different but complementary approach, embedding imperceptible digital watermarks directly into packaging artwork. These watermarks can coexist with QR codes to provide a multi-layered authentication strategy. The watermark is invisible to the naked eye but detectable by smartphones, adding a layer of security that counterfeiters cannot easily identify or replicate. Because the watermark is distributed invisibly across the entire packaging surface rather than confined to a single printed symbol, counterfeiters cannot simply crop it out or cover it without visibly damaging the design. A consumer scanning the packaging with a Digimarc-enabled app receives the same type of verification result as a QR scan, but without a visible code to photograph and copy. Digimarc is particularly well-suited to luxury goods and high-end cosmetics where packaging design integrity is commercially important and brands are reluctant to add visible security symbols that disrupt the premium aesthetic. It also demonstrates that QR codes are one implementation of digital authentication, not the only one.

The EU Falsified Medicines Directive (FMD)

Perhaps the most significant validation of serialised product authentication is the EU Falsified Medicines Directive, which has been in effect since February 2019. The FMD requires that every prescription medicine sold in the EU carries a unique identifier encoded in a 2D barcode on the packaging. The European Medicines Verification Organisation (EMVO) reports that the system now covers over 10 billion medicine packs annually across 30 European markets — the largest deployment of serialised product authentication in history and a proven model for consumer goods categories now facing similar mandates. At the point of dispensing, pharmacies must scan and verify each pack against a centralised database. If the code does not match, or if it has already been dispensed, the system flags it immediately. The FMD demonstrates that serialised verification operates reliably at massive scale and that the regulatory direction across industries is toward mandated authentication. Brands that build this infrastructure ahead of regulatory deadlines avoid the cost and disruption of compliance-driven implementation under time pressure.

Alibaba and Marketplace Authentication

Alibaba has invested heavily in authentication technology to combat counterfeiting on its platforms. The company has collaborated with brands to implement QR-based verification systems that allow consumers to check product authenticity before or after purchase. This marketplace-driven approach acknowledges a commercial reality: in e-commerce, where consumers cannot physically inspect products before buying, digital authentication becomes the primary — and sometimes only — mechanism for distinguishing genuine goods from counterfeits. The Alibaba example is significant because it shows authentication pressure coming from platforms as well as regulators. As major marketplaces tighten their anti-counterfeiting policies and begin requiring brands to implement verifiable authentication, brands without existing infrastructure will face compliance costs and potential delisting risks. Investing in authentication ahead of marketplace mandates positions brands as preferred partners and reduces the friction of compliance when requirements tighten, which the trajectory of major e-commerce platforms strongly suggests they will.

Limitations and Honest Considerations

QR code authentication is a powerful tool, but it is not infallible and should not be presented as a complete solution to counterfeiting. The system has genuine limitations that brands must understand before deploying it and communicate clearly to consumers and partners. The security of any authentication system ultimately depends on the integrity of the manufacturing process, the robustness of the verification infrastructure, and the willingness of consumers to engage with it. A well-designed system addresses all three, but none can be taken for granted. Understanding the limitations also helps brands set realistic expectations internally: authentication will reduce counterfeiting impact and generate early warning signals, but it will not eliminate sophisticated counterfeit operations entirely. The appropriate response is to deploy authentication as one layer in a broader strategy, not to position it as a standalone guarantee that every product bearing the brand's name is genuine.

QR Codes Can Be Copied

The QR code itself — the printed pattern — can be photographed and reproduced. This is an inherent limitation of any visible code. The security does not come from the code being uncopyable; it comes from the server-side logic that detects when a single code is being scanned across multiple locations or an implausible number of times. This is an important distinction that brands need to understand and communicate clearly. The practical implication is that QR authentication is most effective when scan rates are high enough to generate the anomaly data needed for detection. A copied code applied to a small batch of counterfeits sold in a single geographic area may not accumulate enough scans to trigger automated alerts before the inventory is sold. Brands in high-risk categories should supplement scan anomaly detection with active monitoring of grey market channels, customer complaints, and distributor feedback to catch low-volume counterfeiting operations that may not surface through scan data alone.

Consumer Awareness and Willingness

Authentication only works if consumers actually scan. While QR code adoption has surged since the pandemic, not every consumer will bother to verify their purchase. Building awareness — through packaging design, point-of-sale messaging, and marketing — is essential for maximising scan rates. Products in high-risk categories such as pharmaceuticals, infant formula, and luxury goods tend to see higher verification engagement because consumers are more motivated to confirm authenticity. For categories where consumers perceive lower counterfeiting risk, scan rates will depend heavily on how compelling the post-scan experience is. Consumers who receive only a basic "authentic" confirmation have little incentive to scan on future purchases. Consumers who receive warranty activation, exclusive content, or personalised product care information develop a habit of scanning because the interaction consistently delivers value. Brands that optimise the post-scan experience for engagement, not just security, build the consumer behaviour that makes authentication data meaningful over time.

Sophisticated Counterfeiters Adapt

The most sophisticated counterfeiting operations study authentication systems and look for weaknesses. Some may attempt to register fake codes in verification databases through fraudulent supplier relationships. Others may replicate the verification experience itself, directing scans to a convincing but fraudulent confirmation page that mimics the brand's legitimate verification flow. No single technology eliminates counterfeiting entirely. Brands should design their verification infrastructure to minimise these attack surfaces: use domain names and visual design that are difficult to replicate convincingly, implement certificate pinning in any dedicated verification app, and monitor for phishing domains that impersonate the verification experience. The security posture should assume that sophisticated counterfeiters will study the system and attempt to defeat it, then design layered defences accordingly. The goal is not to make counterfeiting impossible — that is unachievable — but to raise the cost and complexity high enough that the margin on fake goods no longer justifies the investment.

Part of a Multi-Layered Strategy

QR code authentication works best as one component of a broader anti-counterfeiting strategy — not as a standalone solution. Combining digital authentication with physical security features such as tamper-evident packaging, security inks, and specialised substrates, alongside supply chain controls and legal enforcement, creates a defence-in-depth approach that is far harder for counterfeiters to defeat than any single measure. Each layer addresses a different attack vector. Physical security features raise the cost and complexity of producing convincing counterfeits. Digital authentication detects distribution of counterfeits after they reach consumers. Supply chain controls limit the channels through which counterfeits can reach retail. Legal enforcement removes the economic incentive by imposing consequences on caught operations. No brand can afford to implement every possible layer at maximum intensity, but a deliberate combination of two or three complementary approaches creates substantially better protection than a single sophisticated technology deployed in isolation.

Implementation Roadmap

For brands considering QR code authentication, here is a practical approach to getting started. The sequence matters: serialisation must precede code generation, which must precede platform integration, which must precede consumer-facing launch. Skipping or compressing any stage creates gaps that undermine the system's effectiveness. The implementation also has a natural pilot structure — starting with one SKU or product line allows the brand to resolve manufacturing, printing, and platform integration issues before committing to full-scale rollout. Most brands that have gone through this process find that the operational challenges are concentrated at the serialisation and printing integration stages, not the platform or consumer experience stages. Early investment in getting those foundations right pays dividends when the system scales across the full product portfolio. Budget planning should account for manufacturing integration, variable data printing capability, platform licensing, and the consumer awareness campaign needed to drive meaningful scan rates from launch.

1. Start with Serialization

Before you can authenticate individual products, you need to identify them individually. Work with your manufacturing and packaging teams to implement unit-level serialisation. This is the foundational step and often the most operationally complex part of the entire implementation. Serialisation requires changes to the manufacturing execution system, coordination with packaging suppliers on variable data printing capability, and a database to store and manage the unique identifiers generated for each unit. The complexity scales with production volume: a brand producing thousands of units per day faces different serialisation challenges than one producing millions. Starting with a single SKU at lower production volumes allows the team to stress-test the workflow, identify failure modes in the identifier generation process, and validate that codes are being correctly assigned and recorded before committing to a full-scale rollout. Serialisation infrastructure built correctly at this stage supports not just authentication but also the EU Digital Product Passport requirements that are approaching for many product categories.

2. Generate Secure QR Codes

Once serialisation is in place, generate QR codes that encode the unique identifiers. Consider whether you need additional cryptographic signatures based on your risk profile and the sophistication of counterfeiting threats in your category. High-risk categories — pharmaceuticals, premium spirits, luxury accessories — typically justify the additional complexity of cryptographic signing because the counterfeiting operations they face are technically sophisticated and well-resourced. Lower-risk categories may find that unique identifiers with anomaly detection provide sufficient protection without the overhead of managing cryptographic keys. The QR code specification itself requires careful attention: error correction level, module size, and quiet zone dimensions all affect reliable scanning in real-world conditions. Packaging that looks elegant in design may fail to scan reliably in low-light retail environments or after minor damage. Test scanning across a range of devices, lighting conditions, and packaging states before committing to a code format for production.

3. Build or Adopt a Verification Platform

You need a cloud-based system that receives scan requests, validates codes, detects anomalies, and serves the consumer-facing verification experience. This is where a connected packaging platform like BrandedMark comes in — rather than building verification infrastructure from scratch, brands can leverage an existing platform that combines authentication with broader post-purchase engagement capabilities. The build-vs-buy decision for verification infrastructure depends on volume, customisation requirements, and internal engineering capacity. Custom-built platforms offer complete control over verification logic and consumer experience, but require ongoing maintenance, security updates, and capacity planning. Established platforms offer faster deployment, proven reliability at scale, and feature sets that extend beyond basic authentication to include product registration, consumer analytics, and post-purchase engagement. For most brands, adopting an established platform and customising the consumer-facing experience is the most cost-effective path to production-ready authentication.

4. Integrate with Packaging Production

Connect your QR code generation with your packaging printing workflow. This may involve variable data printing (VDP) capabilities, where each unit's packaging is printed with its unique code. Work closely with your packaging supplier to ensure print quality is sufficient for reliable scanning across the range of conditions your product will encounter in the field. Packaging integration is where implementation plans most frequently encounter unexpected friction. Packaging suppliers vary significantly in their VDP capabilities, lead time flexibility, and quality control processes for variable-printed elements. Some suppliers run variable data printing as a separate production step that adds cost and time; others can integrate it into the primary print run with minimal impact on unit economics. Understanding your supplier's capabilities early — ideally during the pilot phase rather than at scale — prevents the situation where a verified authentication system is ready but cannot be applied to packaging within the required production schedule.

5. Launch a Consumer Awareness Campaign

The best authentication system in the world is useless if consumers do not know it exists. Design your packaging to clearly communicate the verification capability. Include simple instructions — "Scan to verify authenticity" — and ensure the post-scan experience reinforces trust and delivers value beyond a simple "authentic" message. Consumer awareness investment should be proportional to the brand's counterfeiting risk profile. In categories where consumers actively worry about fakes — luxury goods, pharmaceuticals, premium supplements — even a simple callout on packaging drives meaningful scan rates because the consumer motivation is already present. In lower-risk categories, a broader awareness campaign that explains why verification matters and what the post-scan experience delivers is needed to build the habit. Point-of-sale materials, packaging inserts, and digital channels can all reinforce the message. The goal is to make scanning the QR code feel like a natural part of the purchase experience, not an unusual security procedure that implies the brand expects fakes in the market.

6. Monitor, Analyse, and Respond

Once live, actively monitor scan data for anomalies. Establish protocols for responding to potential counterfeiting signals. Use the data to refine your strategy, identify geographic hotspots, and measure the effectiveness of your broader anti-counterfeiting efforts. Monitoring should be both automated and human-reviewed. Automated alerts handle the high-volume pattern detection — codes scanned too many times, geographic distribution anomalies, scan velocity spikes that suggest a batch of products has entered an unexpected channel. Human review handles the ambiguous cases and the strategic interpretation of trends. A regional spike in scans might indicate strong organic demand, a successful retailer promotion, or grey market activity — distinguishing between these outcomes requires context that automated rules cannot always apply. Build a regular cadence for reviewing authentication data with the supply chain and commercial teams, not just the security function, to ensure that the intelligence generated by the system reaches the people who can act on it.

The Convergence of Security and Experience

QR code authentication sits at the intersection of brand protection and customer experience — what distinguishes it from every other anti-counterfeiting technology. Traditional security measures are pure cost centres: they protect against losses but generate no direct commercial value. Authentication infrastructure, embedded within a connected packaging strategy, does both. It stops counterfeits while creating direct consumer relationships, generating first-party data, and enabling post-purchase engagement. Serialised unit-level tracking is also a prerequisite for the EU Digital Product Passport, so authentication infrastructure doubles as DPP compliance readiness. The business case is strongest when authentication, engagement, and compliance requirements share one investment. QR code authentication powered by BrandedMark's product identity infrastructure protects consumers, protects revenue, and builds direct brand relationships. For brands with complex product lines, product component transparency explores how serialised identity extends through the supply chain.


Ready to explore how connected packaging can protect your products and engage your customers? Join the BrandedMark waitlist to get early access to our authentication and post-purchase engagement platform.


Frequently Asked Questions

Can't counterfeiters just copy the QR code and print it on fake products?

They can copy the printed code, yes. But the security layer isn't the code itself — it's the server-side verification. When a copied code gets scanned dozens or hundreds of times across different locations, the system flags it as compromised. Subsequent consumers scanning that code receive a warning rather than a verification. This is why serialization (unique codes per unit) is essential — a shared QR code that links to a generic website offers no authentication value.

How is QR code authentication different from the QR codes already on my products?

Most QR codes on packaging today are static codes that link every consumer to the same URL — a product page, a how-to video, or a support site. Authentication QR codes are unique to each individual unit and connect to a verification server that checks the specific code against a database. The difference is between a generic link and a unique digital identity for every single product you sell.

What industries benefit most from QR code authentication?

Any industry where counterfeiting poses a risk to consumer safety, brand reputation, or revenue benefits from authentication. Pharmaceuticals, luxury goods, spirits and wine, cosmetics, automotive parts, electronics, and infant nutrition are among the most active adopters. The EU Falsified Medicines Directive has already made serialized verification mandatory for prescription medicines across Europe, and similar regulations are emerging in other regions and industries.

Do consumers actually scan QR codes to verify products?

Scan rates vary significantly by product category and consumer motivation. Products where safety is a concern — medicines, baby products, food supplements — see higher voluntary verification rates because consumers have strong personal incentives to check. For other categories, scan rates depend on how well brands communicate the feature and what value they deliver beyond the authentication message itself. Offering product registration, warranty activation, or exclusive content alongside verification significantly increases engagement.

See how BrandedMark handles this

Turn every post-purchase moment into an opportunity to build loyalty and drive revenue.

Join the Waitlist — It's Free