Every scan checked for safety and authenticity
How It Works

Protect people from unsafe QR codes - and spot copied products faster

QR-1st applies two protection layers to every scan. First, it checks whether the QR destination looks safe. Then it verifies the fingerprint embedded in the QR code and looks for scan patterns that may indicate copying or counterfeiting

Request pilot
Example scan engine
Live verification flow SCAN 10:42
URL character consistency
PASS
Safe browsing risk check
PASS
Domain age review
WATCH
Trusted partner whitelist
MATCH
QR brand protection rules
PASS
Fingerprint validation
VALID
Repeat fingerprint scans
REVIEW
Location and time logging
RECORDED

Two protection layers in every scan

QR-1st separates user safety from product authenticity, so the system can protect the person scanning while also helping the brand identify misuse, cloning, or counterfeit activity

lock

User Protection

Before opening the destination, QR-1st checks whether the link looks deceptive, risky, unfamiliar, or inconsistent with trusted brand rules

  • Checks the URL uses a single character set to reduce mixed-language spoofing risk
  • Uses Google Safe Browsing style risk checks for phishing and malware signals
  • Reviews domain age using registration records
  • Matches trusted partner destinations against an approved whitelist
  • Checks the QR itself against brand protection criteria
package_2

Electronic Product Verification

QR-1st also verifies the product fingerprint embedded in the code and assesses whether scan behaviour looks normal or suspicious

  • Validates the fingerprint stored in the QR code
  • Checks how many times that fingerprint has already been scanned
  • Records scan time and location when permission is available
  • Highlights repeated use of the same fingerprint as a counterfeit signal
  • Supports brand and supply chain visibility into suspicious activity

How a scan is processed

Each QR code moves through a simple five-stage flow, designed to be easy for users and informative for the organisation behind the product

1

Read the code

The scanner reads the destination URL, QR structure, and embedded product fingerprint

2

Run safety checks

URL character consistency, browsing risk, domain age, partner whitelist, and QR trust rules are evaluated

3

Verify fingerprint

The embedded fingerprint is checked against the verification system to confirm it is recognised and valid

4

Analyse patterns

Repeat scans, time, and location patterns are reviewed to spot cloned or suspiciously reused codes

5

Return a result

The user gets a clear outcome while the brand gains evidence for risk monitoring and follow-up

Behind the scenes checks

The front-end result is simple. The back-end logic is layered, so safety signals and authenticity signals can be assessed together

User Protection checks
  • Single-character-set URL check: helps identify visually spoofed addresses using mixed-language characters
  • Risk intelligence lookup: screens the destination for phishing, malware, or unsafe reputation signals
  • Domain age review: flags newly created websites that may be more suspicious
  • Partner whitelist match: confirms destinations that belong to known trusted parties
  • QR trust rules: verifies that the QR itself meets expected brand protection criteria
Product verification checks
  • Fingerprint validation: checks that the code carries a valid issued fingerprint
  • Repeat-scan review: checks how many times the same fingerprint has appeared before
  • Time and location recording: records scan context when the user or system permits it
  • Pattern detection: identifies suspicious behaviour such as repeated scans of the same fingerprint in unexpected contexts
  • Counterfeit indicator: multiple scans tied to the same fingerprint can indicate copying or counterfeit distribution

Clear outcomes for the person scanning

The user-facing result stays simple, even when the decision behind it uses several checks

Verified and Safe

The destination appears safe and the product fingerprint behaves as expected

Caution

The destination may be safe, but product authenticity or scan behaviour needs review

Warning

The code, destination, or fingerprint pattern looks suspicious and may indicate fraud or counterfeit activity