Technology
AI Powered Authentication
AI POWERED AUTHENTICATION
- Portable Device that magnifies the images 260x with uniform lighting (Luxury Authentication only)
- Mobile app that guides the user through the process of image collection
- Machine learning algorithms, operating securely in the cloud.
Data and Algorithms: Foundations of Our Authentication Solution
Data Sources
Partnering with some of the most prominent and trustworthy businesses around the world, our data teams have collected millions of images from a variety of categories of physical goods (bags & accessories, shoes, watches), building a data set that is rich, diverse and completely unmatched.
Data Quality
To ensure our data meets the highest quality standards, we run all submitted data through three layers of filtering, two manual and one algorithmic. This enables us to correct any possible errors while guaranteeing the algorithms are fed only extremely high-quality information during the machine-training process.
Data Processes
Entrupy’s data includes styles created between 80 years ago and today. Our data teams track new releases from brands, capturing and incorporating their data into our solutions as soon as possible, giving customers the ability to perform verification services across the widest possible time range for supported brands.
To learn more about the data science that makes Entrupy’s authentication system possible, please check out the following white paper written by Entrupy’s co-founders and published by The Association for Computing Machinery (ACM).
The Fake vs Real Goods Problem: Microscopy and Machine Learning to the Rescue
Ashlesh Sharma (Entrupy Inc); Vidyuth Srinivasan (Entrupy Inc); Vishal Kanchan (Entrupy Inc); Lakshminarayanan Subramanian (Entrupy Inc)
Entrupy published on KDD.org