To Top
BEGIN: Page content CryptoAnchor Logo


CryptoAnchor Logo

Authenticate your brand, products and supply chain
with our irreproducible magnetic technology.




Multifactor software security systems have been around for years. Now, with CryptoAnchor we apply that same discipline to managing physical device authentications.

Broad Industry Application

As a result of the worldwide rise in counterfeit goods,
the need to Verify Authenticity and Trust the Supply Chain
is applicable to virtually all industries.

Packaging & Labels

To ensure packaged goods are original, CryptoAnchor can be incorporated into security labels and straps. Now shipped items can be verified as original goods.

Service Parts

Liability over the use of original service parts can be limited by tracking and verifying replacement date and time, as well as part authenticity.


Costly prescription drugs are an emerging target for counterfeiters. CryptoAnchor can be attached to pill bottles, bulk-packages, and even vaccine vials.

Electronics & ICs

CryptoAnchor can be adhered to or built into chip casings, printed circuit boards (PCBs), or other electrical components & assemblies.


The intrinsic simplicity of CryptoAnchor makes it easy to implement in many potential applications.

Counterfeit Impact

It's Everywhere

With the rise of worldwide manufacturing, counterfeiting has become easier and tracking the origin of malicious products has become more difficult. Companies must be vigilant, very cousciously selecting technologies to help them maintain authenticity and protect consumers.

The pharmaceuticals industry is increasingly investing in countermeasures, primarily in logistics and secure supply chain management, to minimize the impact of counterfeit drugs. With a targeted full implementation by 2023, The Drug Supply Chain Security Act (DSCSA) will establish an electronic, interoperable system to identify and trace certain prescription drugs as they move through the U.S. supply chain. However, the DSCSA relies on traditional, easily duplicated, printed barcode labels. CryptoAnchor brings a whole new level of security due to its irreproducibility.

The consequences of counterfeit integrated circuits can be obvious and devestating when critical systems fail. Estimates show that electronics vendors miss out on $100 billion in revenue because of counterfeiting, and roughly 1% of semiconductor sales are estimated to be counterfeit.

Great stuff needs great packaging.

As an example, for years Lexmark added tamper evident "security labels" to the outside carton of our toner supplies. Traditional security labels are uniquely serialized and often include a holographic element. However, the reality is, in the realm of elements necessary to clone a toner cartride the holographic security label is among the easiest components to reproduce.

The auto industry takes a $3 Billion hit annually from counterfeit parts; resulting in recalls, lawsuits, and maintenance issues. On the order of 1.5 Million injuries and 36 thousand deaths are linked to counterfeit auto parts each year.

The U.S. Customs and Border Protection agency seized 31,560 shipments in 2017, an 8.2% increase from the prior year. The majority of the counterfeit seizures are of Luxury Goods - watches, jewelry, electronics and similar high-end goods.

Brand protection is critical to Luxury retailers.

2023 Deployment
$183B Industry Size
Service Parts
1.5M Injuries
31,560 Border Seizures

CryptoAnchor SOLUTIONS

Securing What Matters to You

A security and authentication system is only as strong as its weakest link. We've put great effort into insuring the entire CryptoAnchor ecosystem is trustworthy. From irreproducible tags, to secure reader hardware, encrypted data analysis, and user visualization, the entire CryptoAnchor system was designed to help you protect your valuable assets.

CryptoAnchor Tag


Unique magnetic fingerprints.

CryptoAnchor tags contain highly magnetized rare earth metals of random shape, size, and rotation. These premagnitized metal flakes are suspended in fixed position within a binder resin.

The randomly oriented magnetic fields generated by each particle come together to form a multi-dimensional magnetic fingerprint.

  • Application specific binders
    • Particle size & density
    • Tag size & thickness
    • Hardware Reader Resolution
  • Robust to environment:
    • Scratch Resistant
    • Waterproof
    • Temperate
  • Overt or covert
  • Injection molded (optional)
  • Inexpensive
  • Irreproducible
CryptoAnchor Magnetic Reader


Select a reader technology suited to your industry/application.

A reader device is able to accurately capture the magnetic fingerprint of a CryptoAnchor tag. Application specific requirements will inevitably drive the selection of the most appropriate reader technology. Readers are built using a variety of magnetic sensing topologies.

  • Local of networked validation
  • Mobile
  • Handheld scanner
  • Single Hall sensor swipe
  • Multi-sensor arrays
  • Configurable X/Y/Z field capture
  • Scan Frequency
  • Multi-Layered Security
  • User Credentialed
CryptoAnchor Mobile App


A secure cloud backed ecosystem.

Developed to enable a trusted and secure supply chain, the CryptoAnchor software system consists of both a mobile authentication app and a web based administrative portal. The portal offers administrators the ability to control user roles, access, and scan permissions.

Built using secure industry standards:

  • Secure User Authentication
  • Data Encryption
  • Secure network communication
  • Data Isolation
  • Blockchain (optional)

CryptoAnchor Advantage


Protecting Awesome Stuff

Magnetized particles randomly dispersed within a substrate generate high-entropy multi-dimensional magnetic fingerprints. The physical form and structure of these fingerprints can be customized to meet the needs of your application.

OVERT Exposed

The unique fingerprint is visibly obvious. The world knows that a particular product, component, and/or service item is protected by the CryptoAnchor ecosystem. Scan locations are obvious and quick to measure.

Covert Hidden

The unique fingerprint can be painted, obscured, or even molded into objects themselves. The world cannot see that a CryptoAnchor unique device even exists, yet it can be scanned, managed, and tracked by our systems.

Forensic Investigative

Use the CryptoAnchor management software's monitoring capability to dive deeper into object scans. Determine where objects have been, when they were there, and who made the authorization scan.

Lexmark Ventures

Inventing and investing in advanced technologies.

Supplementing decades of imaging industry success, Lexmark Ventures is reaching beyond print and imaging to lever our multidisciplinary talents in engineering, global supply chain, and market development.

CryptoAnchor is one of those solutions that provides an ecosystem for thwarting counterfeit physical items.


Get In Touch

Lexmark Ventures

740 W. New Circle Rd
Lexington, KY 40550, United States

© 2022 Lexmark Ventures, LLC. All rights reserved.
The CryptoAnchor logo is a trademark of Lexmark Ventures, LLC, a wholly owned subsidiary of Lexmark International, Inc.