SACURA
🇨🇭 🇮🇳 Anti-Counterfeit & Anti-Tamper Tech

Everything digital can be copied. Physics cannot.

Engineering Trust into the Physical World.

Patent US11897642B2 ↗

Two unsolved problems.
One shared root cause.

Every method used today - QR codes, holograms, RFID chips, serial numbers - is digital information stuck onto a physical thing. Digital information can be copied perfectly. That is the root cause.

The security mechanism exists outside the object. Anything that represents integrity can be represented fraudulently.

Breaking this cycle means building security from the physics of the object itself.

Counterfeiting

Fake products enter supply chains undetected. From medicines to electronics to luxury goods - copies are indistinguishable because every existing verification method can itself be copied.

Tampering

Products are opened, altered, and resealed during shipping. Consumers have no reliable way to know - because tamper seals can be replaced.

-
Estimated annual cost of counterfeiting and supply chain fraud globally
*ICC-BASCAP / Frontier Economics, 2017 estimate (high-end of $1.7T–$4.5T range)
-
Deaths per year attributed to counterfeit or substandard medicines worldwide
*WHO estimate; UNODC 2023 reports ~436K in sub-Saharan Africa alone
1 in 10
Medical products in low- and middle-income countries are substandard or falsified
*WHO, 2017
-
Value of international trade in counterfeit goods alone
*OECD / EUIPO, 2021 data published 2025

What if the object
itself was the proof?

Nature produces random physical events that cannot be replicated. When microscopic particles settle under vacuum pressure, they form a spatial pattern that exists nowhere else in the universe.

That pattern is the proof. The physics enforces it. The moment anyone breaks the seal - the pattern is destroyed. Permanently. Irreversibly. Detectably.

Physical entropy is the only lock that cannot be copied.
Pattern locked - unique to this instance
Patterns generated: 1

Three physical principles.
One unbreakable guarantee.

SEALED - INTACT
Vacuum 0.08 atm

Press to simulate a breach

Tamper Evidence

Vacuum-State Integrity

A sealed vacuum contains a defined pressure state. Any breach - puncture, cutting, delamination - instantly collapses it. You cannot restore a vacuum without industrial equipment that makes concealment impossible.

This is thermodynamic law working as your security guarantee.

Passive - no battery, no chipOffline smartphone verificationGoverned by gas physics
Anti-Counterfeit

Physical Unclonable Identity

When micro-particles are distributed across a surface under vacuum, their positions are determined by pure physical randomness - stochastic particle dynamics that no manufacturing process can reproduce.

A fingerprint unique to each unit - down to particle positions accurate within micrometres. Even the manufacturer cannot produce a second unit with the same fingerprint.

Each arrangement one-of-a-kindMatched by smartphone cameraReplication requires impossible precision
Seal A
Seal B
Probability of a match: ≈10−200
Sealed
Breached
Evidence

Particles are locked under vacuum. Break the seal to see what happens.

Structural Irreversibility

Tamper Leaves Permanent Evidence

Opening the seal breaks the vacuum. Air rushes in. Particles scatter beyond recovery. This is not a record in a database. The physical state of the object itself becomes the permanent, irrefutable evidence.

No way to conceal. No way to restore. No way to argue with physics.

Cannot be concealedCannot be restoredPhysical evidenceNo database needed

This is not a product.
It is a proof of principle.

The first implementation of the Physical Trust Protocol: a vacuum-sealed packaging system with particle-based fingerprinting and smartphone verification.

The vacuum-sealed tamper-evident packaging is the first physical manifestation of our research - demonstrating that objects can carry irrefutable proof of their own integrity. No electronics. No network. No third party.

ClassificationProtocol Expression No. 001
Core MechanismStochastic particle distribution under vacuum
Power sourceNone
ElectronicsNone
VerificationConsumer smartphone, offline capable
Concept PatentUS11897642B2 ↗
PrototypePatent Application Pending
Download Detailed Brochure
AUTHENTICATION LAYER PRODUCT REGION PATENT PENDING - CONFIDENTIAL

Protocol Expression No. 001 · Sacura Physical Trust System
Design detail withheld pending patent application

9:41 ◆ SACURA
SCANNING
0x────────
SEAL INTACT
Vacuum state: −1.0 ATM
PUF match: 99.4% confidence
Chain of custody: Verified
0x7F2A…9B1C

One scan.
Any smartphone.
Instant answer.

A standard consumer smartphone is already a precision sensing platform. Sacura's verification layer builds on cameras already in a billion pockets.

No specialist hardware. No network required for tamper-state checks. No training beyond a brief onboarding.

01Point camera at seal indicator
02On-device processing captures particle arrangement
03Compare against enrolled fingerprint
04Binary result: Genuine or Tampered

For consumers: Know if your product has been tampered with before you use it. The tamper indicator is visible, immediate, and requires no expertise.

From factory to field.

01

Particles Applied

Micro-particles are distributed over the authentication surface. Their positions are determined by physics - unpredictable, non-repeatable, unique.

02

Vacuum Sealed

The system is sealed under vacuum. Pressure locks the particle arrangement into a fixed state - frozen by thermodynamics.

03

Fingerprint Enrolled

A high-resolution image is captured and converted into a compact identifier - the enrolled record for this specific unit.

04

Verified Anywhere

Open the app. Scan the seal. If the vacuum holds and the pattern matches - verified. If anything changed - the evidence is already there.

The same physics.
Every industry.

The principle is industry-agnostic. What changes across domains is the engineering of the specific implementation - not the underlying physics.

01

Pharmaceuticals

Individual-unit verification in the field - offline, no specialist equipment. Up to 1 million people die from counterfeit drugs each year.*

Patient safety · Regulatory compliance
02

Defence & Aerospace

Authentication at the object level, not the document level - addressing national security supply chain vulnerabilities.

Mission criticality · Infrastructure integrity
03

Luxury Goods

The fingerprint is in the material, not on the surface. A counterfeit that looks identical fails verification instantly.

Brand integrity · Consumer trust
04

Food & Agriculture

Geographic indication verification. Cryptographic proof that a product originated from a registered legitimate producer.

Provenance · Consumer safety
05

Identity Documents

PUF identity embedded into document substrates at manufacture. Verification at any checkpoint without connectivity.

National security · Fraud prevention
06

Semiconductors

Verify chips and boards haven't been touched between factory and deployment. Hardware tamper evidence without hardware modification.

Infrastructure security · Reliability

The first product is one expression.
The research programme is the answer.

Now

Micro-scale optical PUF

Particle distributions at the micrometre scale, verified by consumer smartphone camera. Commercially deployed.

Near Term

Nanoscale & quantum signatures

Uniqueness grounded in quantum indeterminacy. Replication resistance becomes theoretically absolute.

Horizon

Universal verification platform

One application, any Sacura-protected object. The infrastructure layer for physical trust.

"The physical world is overdue for the same transformation that mathematics brought to digital systems."- Sacura Team

Four constraints.
Every design decision follows.

Passive

No battery. No chip. No network. Security that functions continuously without any active component that can fail, drain, or be jammed.

Self-Evident

Tamper evidence is readable without specialist training. The physics makes the breach obvious. Verification is a single scan, not a workflow.

Economically Asymmetric

The cost of defeating the system must be orders of magnitude higher than the value it protects. Physics-based security naturally satisfies this; representations do not.

Composable

Each physical layer is independent. Combining vacuum-state integrity with particle fingerprinting with structural irreversibility multiplies the security without multiplying the complexity.

Open for
research grants.

Sacura is actively seeking research grants and institutional partnerships to accelerate the R&D programme. We welcome collaboration with organisations working in materials science, supply chain security, physical authentication, and related disciplines.

We are also open to collaboration with university labs and industrial R&D teams.

Grant Inquiry →

Research areas of interest

  • Stochastic particle dynamics and micro-scale PUF systems
  • Feature extraction for physical fingerprinting under adverse conditions
  • Quantum-level signature generation and imaging
  • Hybrid physical-digital integrity architectures
  • Supply chain authentication in low-connectivity environments
  • Zero-knowledge proof systems for physical verification
Aryan Avatar

Aryan Saxena

Lead (End-to-End)
"How do you engineer trust in a world that's allergic to it? Trust isn't a feature. It's the operating system. And ours is full of bugs."

Problem solver working at the crossroads of decentralisation, systems thinking, and human impact. From autonomous aerial vehicles to secure computing frameworks - tackling problems that don't fit any single discipline. Whiteboard to deployment, across domains.

Trust SystemsDecentralised InfrastructurePhysical-Digital ConvergenceCross-domain Builder

Built across two continents.
One mission.

Sacura is a cross-continental research effort - working together on a problem with no geographic boundary.

Switzerland

Engineering rigour · R&D foundation · IP registration · Material science

India

Systems thinking · Scale · Cross-domain building · Deployment

Objects should not
be trusted.
They should prove
themselves.

Sacura is building the tools to close the gap between digital trust - which rests on mathematics - and physical trust, which currently rests on assumptions.

We are not the first to notice this gap. We intend to be the ones who close it.