Use Case: Consumer Product Authentication

Overview

This use case describes how consumers use Plings identifiers to verify product authenticity when making purchases, especially in secondary markets where counterfeit risk is high.

Business Value

  • Consumer Protection: Prevent counterfeit purchases worth billions annually
  • Brand Protection: Maintain brand value through authenticity assurance
  • Market Trust: Enable confident secondary market transactions
  • Instant Verification: No expertise required to spot fakes

User Stories

Primary Story

As a consumer, I want to verify product authenticity before purchase so that I don’t buy counterfeit goods.

Supporting Stories

  • As a buyer, I want to check ownership history so that I know the item isn’t stolen
  • As a seller, I want to prove authenticity so that I can get fair market value
  • As a marketplace, I want to offer verification services so that buyers trust our platform

Actors

Primary Actors

  • Consumer/Buyer: Person considering a purchase
  • Seller: Person or business selling the item
  • Plings System: Verification infrastructure

Secondary Actors

  • Manufacturer: Original producer of the item
  • Previous Owners: Chain of custody
  • Marketplace Platform: eBay, Facebook Marketplace, etc.

Scenarios

Scenario 1: Luxury Handbag at Consignment Shop

Setup: Maria is shopping at a luxury consignment store and finds a Louis Vuitton bag priced at $2,000.

Without Plings:

  • Relies on store’s authentication
  • No way to verify independently
  • Risk of sophisticated fakes
  • No ownership history

With Plings:

  1. Discovery: Maria notices small Plings QR code inside bag
  2. Scan: Uses phone camera to scan code
  3. Instant Results:
    ✓ Authentic Louis Vuitton Speedy 30
    ✓ Manufactured: March 2019, France
    ✓ First Sold: Bergdorf Goodman, NYC
    ✓ Previous Owners: 2
    ✓ Last Transfer: 6 months ago
    ✓ No theft reports
    
  4. Verification Details:
    • Cryptographic proof of LV origin
    • Manufacturing batch traceable
    • Retail history documented
  5. Purchase Decision: Buys with confidence
  6. Transfer: Seller transfers ownership to Maria

Scenario 2: Online Marketplace Watch

Setup: James finds a Rolex Submariner on Facebook Marketplace for $8,000.

Plings Verification Process:

  1. Seller Provides: Photos including Plings identifier
  2. Remote Scan: James scans QR from photo
  3. Verification Shows: ``` Path: G.4.2.2019.1847 + Class: 4K7mX9abDcE
    • G: Rolex (manufacturer ID)
    • 4: Professional collection
    • 2: Submariner model variant
    • 2019: Production year
    • 1847: Unique instance
    • Class Pointer: 4K7mX9abDcE (Submariner authentication) ```
  4. Deep Verification:
    • Confirms genuine Rolex cryptographic signature
    • Shows authorized dealer sale
    • Lists service history at Rolex centers
  5. Video Verification: Seller does live video showing tag
  6. Escrow Integration: Payment protected until delivery

Scenario 3: Sneaker Authentication

Setup: Alex wants to buy limited edition Air Jordans at a sneaker convention.

Quick Authentication Flow:

  1. Visual Check: Sees Plings NFC tag in tongue
  2. Tap to Verify: Phone instantly shows result
  3. Batch Verification:
    Nike Air Jordan 1 Retro High
    Path: 9.2.G.2020.8934 + Class: 3K7mX9abDcE
    Limited Edition: Chicago Colorway
    Release: Only 10,000 produced
    This Pair: #8,934 of 10,000
    Class Pointer: 3K7mX9abDcE (Jordan 1 Chicago authentication)
    
  4. Social Proof: Previous owner reviews visible
  5. Price Validation: Shows recent sale prices

Technical Flow

URL Structure for Authentication

https://s.plings.io?t=q&p=G.4.2.2019.1847&cp=4K7mX9abDcE&i=A7Kj9mN2pQ8Rt5KdBUoD3fCRJcyPbTWTBf2n8Z4Vt9u2K7s

Decoded:

  • t=q: QR code scan
  • p=G.4.2.2019.1847: HD wallet path showing manufacturer hierarchy (class pointer separate)
  • cp=4K7mX9abDcE: Class pointer (proves it’s genuine Rolex Submariner)
  • i=A7Kj9mN2pQ8Rt5KdBUoD3fCRJcyPbTWTBf2n8Z4Vt9u2K7s: Solana address (unique to this watch)

Verification Levels

Level 1: Basic (Instant)

  • What: Valid Plings identifier exists
  • How: URL resolves to valid object
  • Trust: Low - confirms Plings tag present

Level 2: Cryptographic (Offline)

  • What: Manufacturer verification
  • How: Class key validates against known manufacturer
  • Trust: High - proves genuine manufacturer

Level 3: Full (Online)

  • What: Complete history and status
  • How: Database lookup with ownership chain
  • Trust: Highest - full transparency

Anti-Counterfeiting Measures

Why Counterfeiters Can’t Fake It

  1. No Valid Path: Can’t generate valid manufacturer path
  2. No Class Pointer: Can’t create verifiable class pointer authentication
  3. Database Mismatch: Fake IDs won’t match database
  4. Cryptographic Proof: Math prevents forgery

Example Attack Scenarios

Counterfeiter Attempts:
1. Copy Existing QR → Scan shows "Already owned by someone else"
2. Generate Random → "Invalid manufacturer signature"
3. Modify Path → "Cryptographic verification failed"
4. Clone NFC → "Duplicate identifier detected"

User Interface

Mobile Scan Result

┌─────────────────────────────┐
│   ✅ AUTHENTICATED          │
│                             │
│   [Product Image]           │
│                             │
│   Rolex Submariner          │
│   Model: 116610LN           │
│                             │
│   Manufactured: March 2019  │
│   First Sale: June 2019     │
│   Previous Owners: 2        │
│                             │
│   [View Full History]       │
│   [Contact Seller]          │
│   [Report Issue]            │
└─────────────────────────────┘

Progressive Disclosure

  1. Instant: Green checkmark or red X
  2. Summary: Key facts in 5 seconds
  3. Details: Full history on demand
  4. Actions: Context-appropriate options

Business Rules

Ownership Transfer

  • Current owner must initiate
  • Buyer confirms receipt
  • Timestamp recorded
  • Previous owner retained in history

Privacy Protection

  • Owner names optional
  • Location data generalized
  • Contact through platform
  • Opt-out available

Dispute Resolution

  • Photo evidence required
  • Timestamp verification
  • Multi-party confirmation
  • Escrow integration

Success Metrics

Consumer Protection

  • Counterfeit purchases prevented
  • Average transaction value protected
  • Consumer confidence scores
  • Repeat usage rates

Market Impact

  • Secondary market volume increase
  • Price premium for verified items
  • Fraud report reduction
  • Platform adoption rates

Brand Protection

  • Counterfeit detection rate
  • Brand value preservation
  • Authorized dealer compliance
  • Gray market reduction

Implementation Phases

Phase 1: Luxury Goods

  • High-value items
  • Motivated buyers
  • Clear ROI
  • Brand partnerships

Phase 2: Electronics

  • Serial number integration
  • Warranty automation
  • Service history
  • Recycling tracking

Phase 3: Mass Market

  • Everyday products
  • Retail integration
  • Consumer education
  • Platform APIs