Cover
Detailed Project Report Confidential - For Evaluation Purposes
Physical Cryptography Platform

SACURA

Engineering Trust into the Physical World
A Physical Cryptography Platform for Tamper Evidence,
Anti-Counterfeiting, and Verifiable Object Identity

Prepared by
Aryan Saxena, Founder and CEO
India Entity
Fylfotone Ventures Private Limited
Swiss Entity
TepoTec Mavins GmbH
Project Brand
Sacura
Date
April 2026
Stage
Pre-Revenue · Bootstrapped
Index

Contents

16 Sections
Section 01

Executive Summary

Core Mission

Sacura is a cross-continental deep technology venture building the foundational infrastructure for a new discipline we define as Physical Cryptography: the application of mathematical proof logic to the material world, enabling physical objects to carry verifiable, tamper-evident, and unclonable proof of their own identity and integrity.

The problem Sacura addresses is fundamental and unsolved. Every mechanism used today to establish the authenticity and integrity of physical objects, including QR codes, holograms, RFID tags, serial numbers, and tamper-evident labels, is an overlay: digital information applied to a physical thing from the outside. Digital information can be copied perfectly.

This is the root cause of a problem that costs the global economy an estimated $4.5 trillion annually in counterfeiting and supply chain fraud, kills an estimated 500,000 people per year through counterfeit pharmaceuticals, and creates systemic national security vulnerabilities through counterfeit components in defence and critical infrastructure supply chains.

Why This Matters

Sacura's approach is categorically different. Instead of applying a representation of integrity to an object, Sacura derives integrity from the physics of the object itself. The security guarantee comes from the laws of thermodynamics, stochastic particle dynamics, and structural irreversibility, not from a label, a database, or a secret.

$4.5T
Annual global cost of counterfeiting and supply chain fraud
ICC-BASCAP / Frontier Economics
500K
Deaths per year from counterfeit pharmaceuticals
WHO / Lancet Infectious Diseases
10−200
Probability of accidental PUF replication
Theoretical configuration space
$40B+
Anti-counterfeiting industry - built entirely on overlay technologies
Industry Estimate
Platform

Three Scientific Principles

First, vacuum-state integrity: a sealed vacuum creates a thermodynamically governed security state that any breach instantly and irreversibly collapses.

Second, physical unclonable functions via stochastic particle distribution: micro-scale particles distributed under vacuum form a unique spatial fingerprint with a probability of accidental replication on the order of 10 to the power of negative 200.

Third, structural irreversibility: the system architecture ensures that accessing the contents necessarily produces permanent, irrefutable physical changes that cannot be concealed or reversed.

Verification
Critical Takeaway

Verification is performed using a standard consumer smartphone camera with on-device processing. No specialist hardware, no electronics on the product, no battery, no mandatory network connection.

IP

Foundation & Status

The first commercial expression of this platform is a tamper-evident vacuum pouch, protected under US Patent 11,897,642 B2, with an early-stage physical prototype developed and an additional patent application in preparation for the pouch architecture. Beyond this, Sacura is developing a physical tamper-proof lock for defence and high-security applications, and a steganographic signature detection system for hidden authentication in printed materials.

Sacura operates across two entities: Fylfotone Ventures Private Limited, incorporated in Jaipur, India in March 2025, which serves as the India operating entity responsible for deployment, scale, and commercialization; and TepoTec Mavins GmbH, based in Switzerland, which serves as the R&D and IP registration entity holding the foundational patent.

The venture is currently pre-revenue and bootstrapped. The core physics has been validated through independent third-party security review by Dr. Roger Johnston of Right Brain Sekurity, whose career includes defeating over 1,100 different security products. Sacura is seeking R&D partners, institutional collaborations, incubation support, and grant funding to accelerate the research programme, complete industrialization of the first product line, and build the verification infrastructure that will make physical trust accessible to anyone with a smartphone.

Section 02

The Founding Entities

India · Operating Entity
Fylfotone Ventures Private Limited
Deployment, Scale & Commercialization
Incorporated29 March 2025, Jaipur, Rajasthan
CINU74909RJ2025PTC101358
PANAAGCF3213P
Address126/A Khawas Ji Ka Bagh, Durgapura, Jaipur, Rajasthan 302018
Webfylfotone.com
Switzerland · R&D & IP Entity
TepoTec Mavins GmbH
R&D Foundation & IP Registration
RegisteredSwitzerland
Core IPUS Patent 11,897,642 B2
FocusEngineering rigour, material science expertise, IP protection framework
Websacura.ch
2.3

Relationship Between the Entities

Sacura operates as a cross-continental research and commercialization effort with no geographic boundary to the problem it addresses. TepoTec Mavins GmbH (Switzerland) holds the foundational IP and serves as the R&D and IP registration entity. Fylfotone Ventures Private Limited (India) is the operating entity responsible for deployment, scale, and commercialization. Both entities are led by Aryan Saxena.

A formal IP licensing agreement to bring the foundational IP under Fylfotone Ventures, or a structured cross-licensing arrangement, is planned as part of the company's growth-stage corporate structuring. Alternatively, a new dedicated entity may be established specifically for this purpose. This is a standard arrangement for cross-continental deep tech ventures and does not diminish Fylfotone's material access to and operational control over the core technology. All new IP generated through Indian R&D activities and institutional collaborations will be filed and held by Fylfotone Ventures Private Limited directly.

2.4

The Sacura Brand

Sacura is the project and product brand under which all Physical Cryptography products, research, and commercial activities are presented to the market. It represents the unifying identity of the platform across both entities and across all product lines. The tagline "Engineering Trust into the Physical World" captures the mission: building the infrastructure that allows physical objects to prove their own integrity through physics rather than assumption.

Section 03

The Problem

3.1

The Trust Gap in the Physical World

All systems humans build eventually require trust. Digital systems solved the trust problem four decades ago with public-key cryptography. When a bank authorizes a transaction, when a government signs a document digitally, when an encrypted message is sent, the trust does not rest on anyone's word. It rests on mathematics. The proof is the verification. No assumption required.

Physical systems never made this transition. The mechanisms used to establish the authenticity and integrity of physical objects today are, without exception, overlays: things applied to objects from the outside, representing integrity rather than deriving it from the object itself.

Key Insight

A hologram on a passport says that at some point, someone with the right equipment made this hologram. It does not say that this document has not been altered since. A QR code on a pharmaceutical pack says that this string of digits was registered in a database. It does not say that the substance inside this blister is the substance that was put there at manufacture. An RFID tag says that this tag responds to queries. It does not say that this tag is attached to the same object it was attached to when it was enrolled.

None of these mechanisms are intrinsic to the object. They can all be replicated, transferred, bypassed, or simply ignored. The security they provide is real but shallow: they raise the cost of certain attacks, they create legal accountability, they satisfy regulatory checkboxes. But against an adversary with modest resources and real economic motivation, none of them hold.

The adversary does not need to defeat cryptography. They just need to make a good-enough hologram, print a valid-looking QR code, clone an RFID tag, or manufacture a package that passes visual inspection. These are not exotic capabilities. They are available, at commercial scale, to anyone with manufacturing access and a reason to use them.

3.2

Why Existing Solutions Have Failed

The market has been aware of this problem for decades. The response has been substantial investment in what Dr. Roger Johnston of Right Brain Sekurity has described as "security theatre": measures that create the appearance of verification without providing its substance.

Holograms became standard and then became replicable. Colour-shifting inks and microprinting followed the same cycle: deployed as a security measure, industrially replicated within years. Serialized QR codes and barcodes are trivially copyable and verify only the existence of a registration record, not the physical object. RFID and NFC tags add digital readout but introduce a separation problem: the tag and the object have no intrinsic relationship, making removal, cloning, and reattachment straightforward.

The common failure mode is always the same: the security mechanism exists outside the object. It represents integrity rather than embodying it. And anything that represents integrity rather than embodying it can, in principle, be represented fraudulently. The question is only cost and effort.

Raising cost and effort matters. But it is not a permanent solution. Manufacturing capabilities improve. Replication costs fall. Economic incentives in counterfeiting are high enough that adversaries invest in defeating whatever new measure the market deploys. The history of anti-counterfeiting technology is a history of this cycle: new measure, widespread adoption, successful replication, next measure.

Root Cause
Critical Takeaway

Breaking the cycle requires getting off it entirely. That means building security that does not rest on a representation - one that is grounded in the physics of the object itself and cannot be separated from it.

3.3

The Scale of Consequence

The global cost of counterfeiting and supply chain fraud is estimated at $4.5 trillion annually, according to ICC-BASCAP and Frontier Economics. This figure represents the direct economic damage that is currently quantified. The harder-to-measure costs are the ones that matter most.

The World Health Organization estimates that 1 in 10 medical products in low-and-middle-income markets are substandard or falsified. An estimated 500,000 deaths annually are attributable to counterfeit pharmaceuticals, according to research published in The Lancet Infectious Diseases. The UNODC reported in 2023 that approximately 436,000 of these deaths occur in sub-Saharan Africa alone.

Counterfeit electronic components entering global supply chains represent over $200 billion annually according to OECD and EUIPO estimates. Multiple national security agencies have documented the deliberate infiltration of counterfeit electronic components into defence supply chains, including components that may fail at critical moments or carry undocumented modifications. This is not a commercial inconvenience. It is a systemic vulnerability in national infrastructure.

The OECD and EUIPO estimate the value of international trade in counterfeit goods alone at approximately $500 billion. Supply chain fraud has also become a geopolitical instrument, with state-sponsored programmes aimed at introducing vulnerabilities into systems they cannot defeat through direct confrontation.

The entire existing anti-counterfeiting industry, estimated at over $40 billion annually, is built on overlay technologies that have been deployed for decades. The problem has gotten worse, not better, because every one of these technologies can be replicated by an adversary with modest resources and economic motivation.

Section 04

The Vision

4.1

Physical Cryptography as a New Discipline

Sacura's mission is to establish a new discipline, Physical Cryptography, and to become the foundational infrastructure of that discipline globally.

Physical Cryptography applies the logic of mathematical proof to the material world. It asks: what if an object could carry its own verifiable identity, encoded not in a label or a chip but in its own physical structure? What if tamper evidence were not a seal that could be replaced, but a one-way physical function that could never be restored? What if the security of an object came not from a protection applied to it, but from the physics of what it is?

Cryptography gave the digital world mathematical certainty of identity. A digitally signed document is not trusted because it looks legitimate; it is verified, and the mathematics does not lie. The physical world has had no equivalent. Sacura exists to build one.

The scope of this ambition spans pharmaceuticals and food safety, aerospace and defence, luxury goods and agricultural provenance, identity documents and financial instruments, critical infrastructure and semiconductor supply chains. Every domain where the integrity of a physical object has consequence is a domain this work touches.

Long-Term Ambition

Sacura's vision, stated plainly: a world where physical trust is not assumed but proven. Where the verification is instant, universal, and costs nothing beyond the device already in your pocket. Where the forger, the counterfeiter, and the supply chain fraudster face not a regulation to evade or a label to replicate, but the fundamental laws of physics working against them.

4.2

The Long-Term Ambition

We are building the atomic equivalent of a digital signature, and making it readable by anyone, anywhere, for free.

The companies that established the standards for digital cryptography did not build businesses proportional to the cost of digital fraud they were preventing. They built businesses proportional to the value of digital commerce that their infrastructure made possible. The analogy for physical trust is meaningful. Sacura is not building a better seal. It is building the infrastructure layer that defines what physical verification means, with the ambition of becoming as fundamental to physical commerce as public-key cryptography became to digital commerce.

Why This Matters

This is not a product company. It is an infrastructure company building the foundational technology for a new category. The first implementation is one answer, applied to one class of problem. The research programme is the path toward a general answer.

Section 05

The Science

5.1
Stochastic Particle Distributions and Entropy

When micro-particles are distributed over a surface prior to vacuum sealing, their positions are determined by the initial application method, surface topology, inter-particle interactions, and the stochastic variation inherent in any physical process. The resulting arrangement is a high-entropy state drawn from an astronomically large set of possible configurations.

5.2
Vacuum Physics and Thermodynamic Lock-In

A vacuum-sealed system maintained at a pressure differential well below atmospheric contains a defined quantity of gas at a defined pressure. Any breach of the barrier allows gas to flow across the pressure differential until equilibrium is reached. This process is immediate and irreversible under any conditions accessible outside an industrial sealing facility.

5.3
Physical Unclonable Functions (PUFs)

Sacura's work generalizes PUF concepts beyond silicon to general physical materials and spatial particle distributions, creating optical PUFs whose signatures are captured by imaging rather than electrical measurement. The replication resistance is grounded in the resolution gap between verification imaging and fabrication capability.

5.4
Structural Irreversibility

The architecture ensures that accessing the contents necessarily produces permanent physical changes. This is distinct from tamper resistance - it is tamper inevitability. Rather than trying to prevent access, the system is designed so that undetected access is structurally impossible.

5.5
The Verification Layer

Designed from the outset around a single constraint: it must work on a standard consumer smartphone, with no specialist hardware, no mandatory network connection, and no requirement for technical training beyond a brief onboarding. Feature extraction and comparison happen on-device. Raw image data never leaves the phone.

5.6
The Cryptographic Bridge

Cryptographic commitment schemes allow a manufacturer to bind themselves to a specific physical signature at manufacture without revealing the signature. Zero-knowledge proof architectures allow authenticity to be demonstrated without revealing anything about the object's identity, supply chain path, or manufacturing provenance.

Physics
Critical Takeaway

The number of distinguishable spatial configurations available to even a modest particle distribution is combinatorially enormous - on the order of 10 to the power of (N log N) for N particles. The probability of two independent samples producing the same configuration is negligible to the point of physical impossibility: on the order of 10 to the power of negative 200.

5.5

The Verification Layer - Full Detail

Tamper state verification, detecting vacuum-state compromise, operates entirely offline. Pressure indicators embedded in the containment system produce visual signals readable by the smartphone camera. Computer vision algorithms running on the device interpret these signals and deliver a result in seconds. No network. No database. No authority.

Physical identity verification, PUF matching, queries an enrolled reference database when connectivity is available, with graceful degradation when it is not. The result is binary: genuine or not. Delivered in seconds.

The feature extraction pipeline draws on techniques from biometric matching (fingerprint and iris verification) and from content-based image retrieval, adapted for the specific characteristics of micro-particle distributions. Invariant feature descriptors extract local structure that is stable across the realistic range of capture variation. Compact binary representations enable fast similarity computation suitable for on-device processing.

5.6

The Cryptographic Bridge - Full Detail

Physical verification is local. Modern supply chains are global. Sacura's cryptographic layer bridges these two realities by transforming physical measurements and verification outcomes into mathematical proofs that can be shared, audited, and relied upon by parties who were not present for the physical verification.

Cryptographic commitment schemes allow a manufacturer to bind themselves to a specific physical signature at the time of manufacture without revealing the signature. Zero-knowledge proof architectures, implemented using a variant of the Schnorr identification scheme adapted for the specific mathematical structure of the physical similarity metric, allow authenticity to be demonstrated without revealing anything about the object's identity, supply chain path, or manufacturing provenance.

The distributed verification infrastructure uses a federated architecture in the near term, with enrolled references held across manufacturers, authorized distributors, and Sacura's verification service. The longer-term architecture is designed for progressive decentralization.

Section 06

Product Lines

01
Early-Stage Physical Prototype · Patent Granted
Sacura Tamper-Evident Vacuum Pouch

The first commercial expression of the Physical Cryptography platform. A vacuum-sealed packaging system with a dual-chamber architecture that separates the product containment region from a dedicated vacuum authentication chamber.

Within the secondary chamber resides a dense field of micro-scale circular particles. When vacuum is applied, particles are pulled into intimate contact, causing them to mechanically interlock and arrest their motion - spontaneously forming a highly complex, non-repeatable particle arrangement. Any tampering disrupts vacuum integrity, releasing locking forces and causing visible, irreversible particle displacement.

Patent Granted · United States
US Patent 11,897,642 B2

Covers dual-chamber architecture, particle-based physical authentication, and smartphone-native verification.

patents.google.com/patent/US11897642B2 ↗
PharmaceuticalsPremium Food & BeverageLuxury GoodsCrypto HardwareDefence ComponentsClinical Sample TransportConfidential Documents
02
Concept · Very Early Prototype · Patent Planned
Defence Tamper-Proof Lock

A physical tamper-proof lock for defence and high-security applications that goes beyond tamper evidence (detecting that tampering occurred) to tamper prevention (physically stopping unauthorized access). Combines advanced bulletproof-grade materials with embedded cryptographic verification using zero-knowledge proof systems.

The design intent is a lock that withstands physical attack (impact, cutting, drilling, thermal attack) while maintaining the integrity of its verification layer. No comparable product exists that combines ballistic-grade material engineering with embedded physical authentication systems.

Defence Supply ChainNuclear Material ContainmentClassified Document StorageHigh-Security EvidenceDiplomatic PouchIntelligence Community
03
Concept Stage · Feasibility Research
Steganographic Signature Detection

A parallel research track investigating the use of hidden cryptographic signatures embedded within printed materials (such as halftone patterns on packaging) as an additional authentication layer. Detectable reliably using only a standard smartphone camera and on-device computer vision processing.

The approach involves embedding signatures using techniques including LSB analysis, DCT/DWT transform-domain analysis, and CNN-based classification, adapted for the specific challenge of re-photographed printed material under uncontrolled conditions. When developed, steganographic signatures would serve as a complementary authentication channel providing defence-in-depth alongside the vacuum-PUF system.

Pharmaceutical PackagingIdentity Document SubstratesCurrency & Financial InstrumentsLuxury LabelsDefence Documentation
Section 07

Current Stage of Development

7.1

Sacura Pouch: Status and Progress

The Sacura tamper-evident vacuum pouch is at the early-stage physical prototype level. The core architecture has been defined and finalized. The mechanism has been validated theoretically and through the predecessor product form factor (BitBox). The US Patent 11,897,642 B2 has been granted covering the foundational mechanism. Functional logic has been established and an early-stage physical prototype of the pouch exists.

Why This Matters

What remains to be completed includes material validation (barrier film selection, multilayer architecture optimization, pressure indicator calibration), process integration (compatibility with existing packaging line equipment), industrial compatibility testing (vacuum stability under supply chain conditions, mechanical stress testing, environmental cycling), and establishing a scalable production pathway. The venture is not experimenting. It is industrializing. The concept is proven. The transition from concept to industrial-scale production is the current engineering challenge.

7.2

Defence Lock: Status and Progress

The defence tamper-proof lock is at concept stage with very early preliminary prototype work. The intersection of ballistic-grade material engineering with embedded authentication systems presents unsolved integration challenges. The lock must withstand physical attack while maintaining the integrity of its verification layer. Material behaviour under attack conditions and its effect on embedded cryptographic or PUF-based identity is not characterized in any existing commercial or academic work that has been identified.

Extensive R&D is required across material science, mechanical engineering, vacuum and packaging engineering, and AI/ML for verification systems. Prototype development is contingent on R&D partnerships, institutional collaborations, and grant funding.

7.3

Steganographic Detection: Status and Progress

Steganographic signature detection is at the concept and feasibility research stage. The core technical challenges include optical degradation from re-photographing printed material, environmental interference from variable ambient lighting, algorithmic constraints from on-device real-time processing requirements, and adversarial robustness against attempts to replicate or strip the hidden signature. This is an open research problem requiring sustained R&D effort.

Section 08

Intellectual Property Position

8.1

Granted Patents

Granted · United States
US Patent 11,897,642 B2

This patent covers the core invention underlying Sacura's Physical Trust Protocol: a vacuum-sealed containment system with a dedicated authentication chamber containing micro-scale particles that form a unique, non-repeatable spatial arrangement upon vacuum activation. The patent encompasses the dual-chamber architecture, particle-based physical authentication, and smartphone-native verification. This patent is held by TepoTec Mavins GmbH and forms the foundational IP upon which the entire Sacura programme is built.

patents.google.com/patent/US11897642B2 ↗
8.2

Pending and Planned Filings

A new patent application is in preparation for the physical prototype of the Sacura tamper-evident packaging system, covering specific engineering innovations in the pouch architecture, particle application method, sealing process, and verification workflow.

Planned IP filings include: a patent for the physical tamper-proof lock for defence applications, covering the combination of advanced materials with embedded cryptographic verification; a patent for the steganographic signature detection method, covering hidden cryptographic signatures in printed materials detectable via smartphone camera and on-device computer vision; Indian patent filings and international PCT applications planned as an immediate priority upon securing institutional support, leveraging available rebates on patent filing fees and access to fast-track patent examination schemes.

8.3

Proprietary Know-How and Trade Secrets

Beyond formal patent protection, the venture possesses substantial proprietary know-how developed through sustained R&D effort that constitutes trade secrets. This includes specialized knowledge in selection and characterization of micro-particle types for optimal PUF performance (optical properties, size distribution, surface interactions, scattering characteristics), dispersion methods that maximize spatial randomness, and material behaviour under vacuum-state conditions over extended periods.

Proprietary algorithms and methods have been developed for extracting invariant features from micro-particle spatial arrangements captured by consumer smartphone cameras, generating compact binary representations suitable for on-device processing, and tolerant matching architectures that achieve near-zero false-positive rates while accommodating real-world capture variation.

Proprietary protocol designs have been developed for hash-based commitment schemes binding manufacturers to enrolled physical fingerprints, zero-knowledge proof systems adapted for approximate physical similarity metrics, and on-device proof generation optimized for smartphone hardware constraints.

The integration of all these layers, including physics, materials, computer vision, cryptography, and steganography, into a single coherent product that works on a consumer smartphone without specialist hardware is itself a form of proprietary know-how. No published work or commercial offering combines these disciplines in this manner.

8.4

IP Strategy and Roadmap

Current phase: Leverages the existing granted US Patent as foundational IP, protects proprietary know-how as trade secrets, and prepares patent applications for the physical prototype and defence lock.

Next phase (upon securing institutional support and grant funding): Filing Indian patent applications, filing international PCT applications for key innovations, fast-tracking examination through available patent facilitation schemes, and formalizing the IP assignment/licensing structure between TepoTec Mavins GmbH and Fylfotone Ventures.

Growth phase: Continuous patent prosecution from the ongoing R&D programme, building a defensive patent portfolio across all core technology layers, and exploring IP licensing as a revenue stream for the Physical Trust Protocol standard.

Section 09

Third-Party Validation

9.1

Right Brain Sekurity Design Review

Dr. Roger G. Johnston, Ph.D., CPP, of Right Brain Sekurity conducted a comprehensive design review of the BitBox, the predecessor product form factor that validated the core particle-locking and vacuum-based tamper-evidence mechanism that underpins the current Sacura pouch architecture.

Dr. Johnston's credentials are significant. His career includes defeating over 1,100 different security products. He previously led the Vulnerability Assessment Team at Argonne National Laboratory, a U.S. Department of Energy facility, and is one of the world's foremost authorities on physical security, tamper-indicating seals, and vulnerability assessment.

"The BitBox is clever and possesses a number of important advantages over other designs for tags and seals."

Dr. Roger G. Johnston, Ph.D., CPP · Right Brain Sekurity · Design Review

Dr. Johnston's review specifically highlighted three critical strengths. First, "the very important ability to check that the particles are free to move when the seal is opened, a significant improvement over other complexity tag and seal designs and products." Second, that "the BitBox can be reused and, importantly, it can be reused without a substantial penalty or falloff in security," which "is not the case for many reusable tags and seals." Third, that "the BitBox is relatively low-tech and low-cost, and it can be read largely by eye, no expensive, proprietary, or complicated reader is needed."

Dr. Johnston also conducted practical attack testing, identifying potential vulnerability scenarios and recommending countermeasures. This adversarial analysis has directly informed the evolution from the BitBox form factor to the current Sacura pouch architecture, which addresses several of the attack vectors identified in the review by eliminating the Velcro interface, integrating the particle chamber directly into the pouch structure, and making the vacuum conduit an integral part of the sealed architecture rather than an external bag.

In a separate market viability opinion, Dr. Johnston stated: "Could the BitBox be a commercially viable product? Yes, though I give it about a 40% chance of succeeding. Keep in mind for calibration purposes, however, that vulnerability assessors tend to be pessimists, if not outright cynical as an occupational hazard." He also identified key success factors including the importance of educating potential customers, pursuing high-end and prestigious applications for reputation value, and developing a compelling demonstration capability, all of which are reflected in Sacura's current strategy.

Dr. Johnston strongly recommended the implementation of a blink comparator for image comparison, noting that it "usually will even outperform sophisticated computer image algorithms" and is "a dramatically more sensitive, reliable, and painless way to compare 'before' and 'after' images than by doing side-by-side image comparisons." Sacura's smartphone-based computer vision verification system builds directly on this recommendation, automating the comparison process with invariant feature extraction and tolerant matching architectures.

9.2

Independent Market Analysis

An independent market analysis was conducted by a team comprising Naomi Rocha dos Santos, Nathalie Meyer, David Duran, and Boris Vittek. The analysis evaluated the market potential across multiple industry verticals including luxury goods and jewellery (specifically luxury watches), pharmaceuticals and healthcare, automotive and aerospace parts (including electric vehicle components), crypto hardware and electronics, and banking and financial services.

The analysis included primary research through interviews with industry stakeholders at Medbase (pharmaceutical logistics), Porsche AG (VCU unit manufacturing and transport), Schindler (supply chain logistics), and AXPO Power AG (nuclear power plant operations). Key findings validated the market need across all verticals studied.

The Porsche interview revealed specific operational pain points directly addressable by Sacura's technology: VCU units going missing during customs processes, more sample pieces being taken than authorized without traceability, current packaging failing to protect against environmental contamination during transport, and the inability to use cost-effective sea transportation due to inadequate packaging protection. The implementation of Sacura packaging was identified as enabling the application of CLEANLINESS norms in packing and transportation, enabling sea transportation (versus the current requirement for air freight), ensuring completeness verification through vacuum measurement, and providing tamper evidence throughout the supply chain.

The AXPO interview confirmed potential in nuclear applications, with the senior project leader noting that "the product has potential when implemented properly in processes with requirements for high security and transparency" and that success "could be easily achieved if there is a demand for such a solution by ENSI [the Swiss federal nuclear safety inspectorate]. In that case the industry would have to implement such a solution no matter the costs."

The analysis identified Prooftag and its Bubble Tag technology as the closest direct competitor, noting Sacura's distinct advantages in providing physical evidence of tampering through an irreversible mechanism (versus static visual patterns), higher complexity in verification, and broader application versatility beyond product labelling.

9.3

Industry Interest and Early Engagement

Sacura has received expressions of interest from multiple parties across different sectors, representing a mix of documented and informal engagements.

Prize Indemnity & High-Value Event Security
SCA Promotions

Founded by Bob Hamman, SCA Promotions has shown interest in the Sacura technology. SCA has handled high-profile cases including the recovery of prize money from Lance Armstrong. Hamman is also considered one of the greatest bridge players of all time, with 12 world championships.

Pharmaceuticals & Consumer Healthcare
Mankind India

Interest from Mankind India representing potential application in the Indian pharmaceutical and consumer healthcare sector, one of Sacura's primary target verticals given India's position as the "pharmacy of the world" supplying 20% of global generic medicines.

Food & Beverage Provenance
European Wine & Cigar Suppliers

Interest from wine and cigar suppliers in Europe represents the food and beverage provenance verification use case, where geographic indication fraud and product adulteration are persistent commercial and safety issues.

Additional conversations are ongoing across multiple sectors, reflecting the breadth of the problem Sacura addresses. The technology's applicability across any domain where the integrity of a physical object carries consequence means that market engagement opportunities continue to expand as awareness of the platform grows.

Section 10

R&D Programme

10.1

Core Research Areas

The Sacura R&D programme operates across six interconnected research domains, each requiring original scientific and engineering work with no off-the-shelf components available.

I
Stochastic Particle Dynamics and Material Science

Extensive experimentation with micro-particle types (mineral granules, polymer spheres, metalate flakes), their optical properties (refractive index, scattering characteristics, size distribution), dispersion methods, and surface interactions. The goal is maximizing spatial randomness while maintaining sufficient particle density for robust feature extraction. Each material system requires independent characterization and testing under varying environmental conditions.

II
Vacuum-State Engineering

Selection and testing of multilayer barrier films combining aluminium foil layers with biaxially oriented polymer films and sealant layers, optimized for low gas permeability, mechanical resilience, irreversible bond formation under heat-seal conditions, and optical transparency for pressure indicator readability. Pressure indicator calibration requires iterative prototyping to produce distinguishable visual states at target pressure differential thresholds.

III
Physical Unclonable Function Architecture

Development of an optical PUF system based on controlled stochastic particle dispersion, extending PUF concepts traditionally confined to silicon chip security into general physical materials. This requires original scientific work in controlled dispersion methods, enrollment imaging protocols, and characterization of the configuration space.

IV
Computer Vision and Feature Extraction

Design and development of a feature extraction pipeline that produces compact binary representations of spatial particle arrangements, invariant to realistic capture variation including changes in illumination direction and intensity, minor perspective variation, and differences in sensor characteristics across consumer smartphone devices. Active research continues on improving invariance, compactness, and tolerance to challenging field conditions.

V
Cryptographic Layer and Zero-Knowledge Proof Systems

Implementation of hash-based commitment schemes for manufacturer enrollment, and a zero-knowledge proof protocol (variant of Schnorr identification scheme) adapted for the mathematical structure of the physical similarity metric. This enables verification without revealing enrolled references or field measurements, a novel application of ZKP to physical object authentication.

VI
Prototype Development and Testing

Physical prototype iterations of the vacuum-sealed tamper-evident pouch, testing seal integrity under simulated supply chain conditions (temperature cycling, humidity, vibration profiles for maritime and air freight), tamper detection sensitivity, and smartphone verification reliability across device generations.

10.2

Open Technical Uncertainties

The primary risk in this work is not whether customers will buy the product. The $4.5 trillion annual cost of counterfeiting and the approximately 500,000 annual deaths from counterfeit pharmaceuticals demonstrate overwhelming market demand. The primary risk is whether the technology can be built, proven, and made to work reliably at commercial scale across real-world conditions.

PUF Signature Stability. The particle fingerprint must remain stable and verifiable over the entire lifecycle of the product, which may include months of storage, transcontinental shipping, temperature extremes (-20°C to +50°C), humidity variation, mechanical vibration (maritime, air, and road freight profiles), and atmospheric pressure changes. No prior work exists on the long-term environmental stability of optical PUF signatures based on stochastic particle distributions in vacuum-sealed consumer packaging. Preliminary results are encouraging but insufficient for commercial confidence across all target deployment environments.

Feature Extraction and Matching Under Real-World Capture Variation. The feature extraction problem for micro-particle distributions is fundamentally different from established biometric matching because the features are at a scale near the resolution limit of consumer smartphone cameras, the capture environment is uncontrolled, device diversity is extreme, and the matching threshold must simultaneously achieve near-zero false positives and tolerate significant capture variation. A working prototype achieves acceptable matching under controlled and semi-controlled conditions. Performance at boundary conditions requires continued R&D.

Zero-Knowledge Proof Systems for Physical Verification. Standard ZKP systems operate on exact equality or algebraic relationships. Physical measurements are inherently noisy. Proving approximate similarity in zero-knowledge, with configurable tolerance thresholds, while maintaining proof compactness and verification speed suitable for on-device smartphone computation, is a non-trivial cryptographic research problem.

Replication Resistance Boundaries. The formal characterization of the replication resistance boundary under attack scenarios using current and foreseeable micro-fabrication and imaging technology is an open research question requiring adversarial analysis that models the capabilities of state-level attackers. Theoretical analysis based on resolution gap arguments is complete. Experimental adversarial testing is planned as part of institutional collaborations.

10.3

Planned Institutional Collaborations

Sacura is actively in discussions for formal R&D collaborations with leading institutions. Exploratory discussions are underway with Indian Institutes of Technology (IITs) for collaborative research in materials science, stochastic particle systems, and physical authentication, targeting MoU establishment with research labs specializing in advanced materials and applied physics.

Conversations have been initiated with Ivy League institutions in the United States with research groups working on applied cryptography, computer vision, and supply chain security for potential joint research programmes. Discussions are underway with ZHAW (Zurich University of Applied Sciences, Switzerland) for an R&D partnership leveraging ZHAW's strengths in materials science, engineering, and applied research, complementing Sacura's Swiss-origin IP.

These collaborations aim to accelerate the research programme across key open questions including stability of particle signatures under extreme distribution conditions, feature extraction performance at the lower bound of consumer imaging hardware, replication resistance boundaries under adversarial micro-fabrication attacks, hybrid physical-digital integrity architectures, and quantum-level signature generation.

10.4

Research Horizon

Near-term - Micro-scale Optical PUF (Current): Particle distributions at the micrometre scale, verified by consumer smartphone camera. This is the basis of the first commercial product.

Medium-term - Nanoscale and Quantum-Level Signatures: Future material systems will operate at smaller scales, where the randomness arises from quantum mechanical processes rather than bulk stochastic ones. Quantum dot distributions, plasmonic nanostructures, and photonic crystal systems all offer physical properties whose uniqueness is grounded in quantum indeterminacy rather than classical chaos.

Medium-term - Structural and Volumetric Identity: Structural identity systems would encode uniqueness into the full three-dimensional architecture of an object, verified through depth-sensing capabilities such as structured light imaging.

Medium-term - Hybrid Physical-Digital Architectures: Integration of passive digital elements, such as miniaturized environmental sensors in read-only, tamper-evident configurations, into sealed containment systems for condition history recording (temperature, humidity, shock, radiation exposure).

Long-term - Universal Verification Platform: A single application capable of handling any Sacura-protected object regardless of which physical mechanism was used, so that the verification experience for any participant in any supply chain remains consistent.

Section 11

Target Applications & Market Opportunity

11.1
Pharmaceuticals & Healthcare

Counterfeit pharmaceuticals are responsible for an estimated 500,000 deaths per year globally. India supplies 20% of global generic medicines. Sacura addresses both the packaging integrity question and the identity question. Individual-unit verification, without dependence on centralized serialization databases, is a meaningful capability advance. Compatible with EU Falsified Medicines Directive and US Drug Supply Chain Security Act.

11.2
Defence & Aerospace

A counterfeit component in an aircraft control system, a power grid switching station, or a military communications system may fail in a way that is catastrophic and irreversible. Multiple national governments have documented the systematic infiltration of counterfeit electronic components into defence supply chains. Sacura provides cryptographic proof of a component's physical identity and untampered condition without revealing commercially sensitive supply chain intelligence.

11.3
Luxury Goods

The counterfeit luxury goods market is an industrial-scale operation. The most sophisticated counterfeit watches, handbags, and fashion items are visually indistinguishable from genuine articles. PUF-based identity embedded in materials at manufacture provides an authentication layer that cannot be replicated regardless of the quality of the counterfeit's external appearance.

11.4
Food & Agriculture

Food fraud and adulteration affect every major food category. Olive oil labelled as extra virgin that is not, honey cut with industrial syrups, spices diluted with fillers, wines from one region sold as another. Physical provenance verification provides cryptographic proof that a product originated from a registered legitimate producer, the only mechanism that addresses geographic indication fraud at scale.

11.5
Semiconductors & Electronics

Counterfeit electronic components in global supply chains are estimated at over $200 billion annually. As India builds its semiconductor fabrication and packaging capacity through the India Semiconductor Mission, integrating indigenous authentication technology from the outset creates both security and competitive advantage.

11.6
Identity Documents & Credentials

Physical identity documents represent high-value targets for sophisticated adversaries with consequences extending to personal and national security. The PUF principle applied to document substrates provides an integrity layer that persists independently of printed content and cannot be replicated by any counterfeit production process.

Market Size

The total addressable market for physical trust infrastructure is not bounded by any single vertical. The $4.5 trillion annual cost of counterfeiting and supply chain fraud globally is a floor, not a ceiling. The existing anti-counterfeiting industry is estimated at over $40 billion annually. Sacura's technology does not compete within this existing paradigm. It replaces it. The value proposition is not a better version of what exists but a categorically different approach that derives security from physics rather than from representations that can be copied.

Section 12

Commercialization Strategy

12.1

Go-to-Market Model

Sacura's commercialization strategy is designed to present multiple pathways to market, reflecting the platform nature of the technology and the diversity of target verticals. The model is a combination of three approaches.

Direct enterprise sales. For high-value, high-security verticals such as pharmaceuticals, defence, and luxury goods, Sacura will engage directly with enterprise customers to implement the Physical Trust Protocol into their packaging and supply chain processes. This channel provides the highest margin and the deepest customer relationships, generating operational data that feeds back into the R&D programme.

Technology licensing. For verticals where existing packaging manufacturers have established relationships and distribution, Sacura will license the technology to packaging companies that integrate it into their production capabilities. This scales deployment without requiring Sacura to build manufacturing capacity across every sector. The licensing model generates recurring revenue and establishes the technology as a standard across multiple packaging platforms.

Co-development partnerships. For the industrialization phase, Sacura is seeking development partners with converting expertise, barrier film experience, vacuum sealing process knowledge, regulatory familiarity, pilot production capability, and engineering collaboration capacity. This is a co-creation model where partners contribute manufacturing expertise and infrastructure while Sacura contributes the core science and verification platform. Early partners gain a meaningful head start on a category that will become an industry standard, and they shape the development of the technology around real operational requirements.

12.2

Development Roadmap

The development roadmap follows a phase-based progression without fixed timelines, reflecting the reality that genuine R&D produces unpredictable timelines. The progression logic is clear even when the calendar is not.

1
Use Case Discovery

Define the highest-impact initial application vertical based on required barrier properties, target vacuum level, shelf life expectations, security sensitivity, and regulatory constraints. Deliver a clear first deployment vertical.

2
Material Architecture and Compliance

Define the physical composition including barrier stack materials, oxygen and moisture vapour transmission rates, seal integrity parameters, optical inspection window clarity, and vacuum conduit integrity. Determine mono-material versus multi-layer laminate versus recyclable architecture. Establish compliance with relevant regulatory frameworks (USFDA, FDA food contact, ISO, GMP).

3
Existing Packaging Line Integration

Assess whether Sacura is supplied as a finished pouch, integrated into existing pouch production lines, or deployed as a modular add-on architecture. Evaluate vacuum equipment compatibility, tooling modifications, additional sealing step requirements, capex implications, and throughput impact.

4
Prototype Converting

Physical realization including particle chamber fabrication and assembly, vacuum conduit engineering and flow testing, optical window precision and clarity optimization, secondary chamber sealing consistency, and vacuum stability validation under stress. Deliver a functional pre-pilot batch with validated repeatability of particle locking behaviour.

5
Testing and Validation

Comprehensive assurance covering mechanical testing (burst strength, seal strength, drop tests per ASTM standards, pressure cycling endurance), vacuum testing (retention time, leak sensitivity threshold, micro-perforation detection), environmental testing (moisture exposure, temperature variation cycling, supply chain handling simulation), and security testing (breach simulation attacks, reseal attempt detection, indirect tamper validation).

6
Parallel Digital Infrastructure

Development of the software and verification layer including reference image capture system, secure storage architecture, hashing and verification engine, track and trace logic, and SOC-compliant infrastructure.

7
Industrialization Decision Framework

Evaluation of centralized versus distributed production, licensing model versus direct supply, particle formulation optimization, cost per unit at scale, and integration depth into partner production lines. The focus throughout is on R&D and innovation and invention, while maintaining a clear orientation toward commercialization.

12.3

Partnership Strategy

Sacura is actively seeking partnerships across several categories. Development and R&D partners with packaging engineering expertise, converting capabilities, testing infrastructure, and line integration experience for industrializing the first product line. Institutional research partners at IITs, Ivy League institutions, and ZHAW for accelerating the research programme across open technical questions. Commercial deployment partners in pharmaceutical supply chains, premium food and beverage, luxury goods, and precision industrial components for early deployment that generates operational data. Strategic partners including existing seal and security manufacturers and vendors who can represent or distribute Sacura products.

As Dr. Johnston noted in his market analysis, "existing seal/security manufacturers and vendors can sell your product, even if theoretically competitors," as seal manufacturers and vendors "often sell their competitor's product at a loss as a way of being a 1-stop shop for their customers."

Section 13

Team

Aryan Saxena
Founder & CEO · Lead (End-to-End)

Aryan Saxena is the sole full-time operator of both Fylfotone Ventures and the Sacura programme, leading all aspects end-to-end: research, engineering, strategy, IP management, business development, and external engagement.

Aryan is a deep-tech researcher, builder, and strategic leader working at the crossroads of decentralization, systems thinking, and human impact. His background spans autonomous aerial vehicles to secure computing frameworks, tackling problems that do not fit any single discipline.

Research"Enhancing Security in Decentralized Applications: Strategies and Tools for Secure dApp Development and Deployment" (ResearchGate, January 2024); "Journey to 100 and Beyond!" (ResearchGate, July 2023); Bachelor's Thesis: "Invisible Proofs, Visible Impact: Leveraging Zero-Knowledge Digital Product Passports for a Sustainable Future" (Atria University, 2025)
CVE DiscoveryCVE-2023-33956 - Insecure Direct Object Reference vulnerability in Kanboard (GitHub/NVD, June 2023)
CertificationsStanford University (Cryptography I); Duke University (MLOps Specialisation); Palo Alto/ICT Academy (Cloud Security Fundamentals); AttackIQ (Foundations of Operationalizing MITRE ATT&CK v13); IBM (Cybersecurity Tools and Cyber Attacks); IsraelX (Unlocking Information Security: Cryptography to Buffer Overflows); Google (Foundations of Project Management)
ExperienceCo-Founder and Lead at Sacura by TepoTec Mavins GmbH; Founder's Office at AuctionX; R&D Lead at TrustGrid; Information Security Analyst at CyberOps InfoSec; COVID-19 Mutation Analysis Research led by Dr. Saurabh Mahajan at NCBS
AffiliationsAtria University (Alumnus, Founding Beyonder); UZH Blockchain Center, University of Zurich (Alumnus and Ambassador); Oasis Protocol (Sentinels Ambassador); TiE Bangalore (Student Sherpa, TiE Global Summit 2024); IEEE Atria University (Student Branch Chair)
EducationBTech Digital Transformation (Majored), Minors in Business and Innovation, Atria University (Founding Beyonder), 2021–2025; Deep Dive Into Blockchain (Summer School), University of Zurich, 2024
ProjectsCoterie: The Drone Project - implementation of computer vision in autonomous aerial vehicles including custom flight controller design (ESP8266), VTOL development, and wall-climbing drone for crack detection. Demonstrates cross-domain hardware-software integration capability directly applicable to physical-digital convergence systems.
13.2

Hiring and Team-Building Plan

Sacura is currently a solo-founder operation by deliberate choice at this stage: the foundational science, IP acquisition, strategic positioning, and early prototype work required a single decision-maker with cross-disciplinary capability working at high speed. As the venture moves into the industrialization and scale phase, the team will expand across several critical functions.

Priority hires include a materials science and packaging engineer for barrier film optimization and vacuum system engineering, a computer vision and ML engineer for feature extraction pipeline development and smartphone-native verification, a mechanical/industrial engineer for prototype converting and production line integration, and a business development lead for enterprise sales and partnership management. The hiring strategy prioritizes depth of expertise in the specific disciplines that Sacura's R&D programme demands, with a preference for individuals who can work across disciplinary boundaries.

Section 14

Design Principles & Core Commitments

Sacura operates under four design constraints that govern every technical and product decision.

Passive

No battery. No chip. No network. Security that functions continuously without any active component that can fail, drain, or be jammed.

Self-Evident

Tamper evidence is readable without specialist training. The physics makes the breach obvious. Verification is a single scan, not a workflow.

Economically Asymmetric

The cost of defeating the system must be orders of magnitude higher than the value it protects. Physics-based security naturally satisfies this; representations do not.

Composable

Each physical layer is independent. Combining vacuum-state integrity with particle fingerprinting with structural irreversibility multiplies the security without multiplying the complexity.

Five Core Commitments

Physics first: the security guarantee must come from the laws of nature, not from a secret, a label, or a database.

Verification for everyone: verification must be possible with a smartphone, which is not a convenience but a security requirement.

No single point of failure: no central authority whose compromise breaks the system, no electronic component whose failure negates the integrity guarantee, no network dependency that can be frustrated by infrastructure limitations.

Honest about what we do not know: the research programme will produce surprises, and we commit to following the science where it leads.

The category before the product: we are building the infrastructure that defines a new standard, knowing that the standard creates the largest long-term value.

Section 15

What We Are Looking For

Inflection Point

Sacura is at an inflection point where the foundational science is established, the IP is secured, the first prototype exists, and third-party validation has been obtained. What is needed now is the support infrastructure to accelerate from early prototype to industrial deployment while continuing to deepen the research programme.

01
R&D and Institutional Partnerships

Formal collaborations with research institutions (IITs, international universities, applied research centres) for accelerating work on open technical questions across materials science, computer vision, applied cryptography, and vacuum engineering.

02
Incubation and Acceleration Support

Access to mentorship networks, industry connections, testing infrastructure, and the institutional credibility that comes with recognized incubation programmes.

03
Grant Funding

Non-dilutive capital for sustained R&D across all three product lines, with particular urgency for materials testing, environmental cycling validation, and feature extraction optimization for the Sacura pouch, and preliminary materials research for the defence lock.

04
Development Partners

Packaging engineering firms with converting expertise, barrier film experience, vacuum sealing process knowledge, and pilot production capability for co-developing the industrial production pathway.

05
Early Deployment Partners

Enterprise customers in pharmaceuticals, premium food and beverage, luxury goods, or precision industrial components willing to pilot the technology in real supply chain conditions, generating the operational data that accelerates the next generation of the research.

Mission
Closing Statement

The venture is open to the support structure that fits. The ambition is large. The principle is sound. What comes next will be determined by the science, by the demands of real-world deployment, and by the partnerships that enable both.

Section 16

Appendices

Appendix A
Patent Reference

US Patent 11,897,642 B2, accessible at patents.google.com/patent/US11897642B2. Covers tamper-evident vacuum packaging with dual-chamber architecture, particle-based physical authentication, and smartphone-native verification.

Appendix B
Entity Details
EntityFieldValue
Fylfotone Ventures Private LimitedCINU74909RJ2025PTC101358
Fylfotone Ventures Private LimitedRegistered Office126/A Khawas Ji Ka Bagh, Durgapura, Jaipur, Rajasthan 302018
Fylfotone Ventures Private LimitedPANAAGCF3213P
Fylfotone Ventures Private LimitedWebfylfotone.com
TepoTec Mavins GmbHRegisteredSwitzerland
TepoTec Mavins GmbHWebsacura.ch
Appendix C
Third-Party Review References

Right Brain Sekurity Design Review, January 26, 2020, by Dr. Roger G. Johnston, Ph.D., CPP. Full report available upon request under NDA.

Independent Market Analysis by Naomi Rocha dos Santos, Nathalie Meyer, David Duran, and Boris Vittek. Includes primary research interviews with Medbase, Porsche AG, Schindler, and AXPO Power AG. Full report available upon request.

Appendix D
Contact Information
RoleContact
Aryan Saxena, Founder and CEOaryan@sacura.ch
General Inquirieshey@sacura.ch
Phone+91 9214014049
Websacura.ch · fylfotone.com
Appendix E
Key Statistics Referenced
StatisticValueSource
Annual cost of counterfeiting and supply chain fraud globally$4.5 trillionICC-BASCAP / Frontier Economics
Deaths annually from counterfeit pharmaceuticals~500,000WHO / Lancet Infectious Diseases
Medical products in LMICs that are substandard or falsified1 in 10WHO
Annual value of counterfeit electronics in supply chains$200B+OECD / EUIPO
Value of international trade in counterfeit goods~$500BOECD / EUIPO
Probability of accidental PUF replication~10−200Theoretical calculation from configuration space
Appendix F
Comparison with Existing Technologies
Capability Sacura QR Codes Holograms RFID/NFC Serialisation DBs
Security derived from physics of the object itself
Tamper evidence governed by thermodynamic law
Unclonable physical identity (PUF)Trivially copyableIndustrially replicableCloneableDatabase records only
Works without electronics on productN/A
Works without batteriesActive: No / Passive: YesN/A
Works without network connectivityNeeds databaseVisual onlyNeeds reader + databaseNo
Verification by any smartphoneVisual subjectiveNeeds NFC readerNo
Irreversible after breachN/ACan be replacedCan be reattachedN/A
Fingerprint inseparable from objectExternal labelExternalSeparate componentExternal database
Further Exploration

If you’d like more detailed documentation or to explore this further, you can schedule time here.

Schedule Time