Engineering Trust into the Physical World
A Physical Cryptography Platform for Tamper Evidence,
Anti-Counterfeiting, and Verifiable Object Identity
Sacura is a cross-continental deep technology venture building the foundational infrastructure for a new discipline we define as Physical Cryptography: the application of mathematical proof logic to the material world, enabling physical objects to carry verifiable, tamper-evident, and unclonable proof of their own identity and integrity.
The problem Sacura addresses is fundamental and unsolved. Every mechanism used today to establish the authenticity and integrity of physical objects, including QR codes, holograms, RFID tags, serial numbers, and tamper-evident labels, is an overlay: digital information applied to a physical thing from the outside. Digital information can be copied perfectly.
This is the root cause of a problem that costs the global economy an estimated $4.5 trillion annually in counterfeiting and supply chain fraud, kills an estimated 500,000 people per year through counterfeit pharmaceuticals, and creates systemic national security vulnerabilities through counterfeit components in defence and critical infrastructure supply chains.
Sacura's approach is categorically different. Instead of applying a representation of integrity to an object, Sacura derives integrity from the physics of the object itself. The security guarantee comes from the laws of thermodynamics, stochastic particle dynamics, and structural irreversibility, not from a label, a database, or a secret.
First, vacuum-state integrity: a sealed vacuum creates a thermodynamically governed security state that any breach instantly and irreversibly collapses.
Second, physical unclonable functions via stochastic particle distribution: micro-scale particles distributed under vacuum form a unique spatial fingerprint with a probability of accidental replication on the order of 10 to the power of negative 200.
Third, structural irreversibility: the system architecture ensures that accessing the contents necessarily produces permanent, irrefutable physical changes that cannot be concealed or reversed.
Verification is performed using a standard consumer smartphone camera with on-device processing. No specialist hardware, no electronics on the product, no battery, no mandatory network connection.
The first commercial expression of this platform is a tamper-evident vacuum pouch, protected under US Patent 11,897,642 B2, with an early-stage physical prototype developed and an additional patent application in preparation for the pouch architecture. Beyond this, Sacura is developing a physical tamper-proof lock for defence and high-security applications, and a steganographic signature detection system for hidden authentication in printed materials.
Sacura operates across two entities: Fylfotone Ventures Private Limited, incorporated in Jaipur, India in March 2025, which serves as the India operating entity responsible for deployment, scale, and commercialization; and TepoTec Mavins GmbH, based in Switzerland, which serves as the R&D and IP registration entity holding the foundational patent.
The venture is currently pre-revenue and bootstrapped. The core physics has been validated through independent third-party security review by Dr. Roger Johnston of Right Brain Sekurity, whose career includes defeating over 1,100 different security products. Sacura is seeking R&D partners, institutional collaborations, incubation support, and grant funding to accelerate the research programme, complete industrialization of the first product line, and build the verification infrastructure that will make physical trust accessible to anyone with a smartphone.
Sacura operates as a cross-continental research and commercialization effort with no geographic boundary to the problem it addresses. TepoTec Mavins GmbH (Switzerland) holds the foundational IP and serves as the R&D and IP registration entity. Fylfotone Ventures Private Limited (India) is the operating entity responsible for deployment, scale, and commercialization. Both entities are led by Aryan Saxena.
A formal IP licensing agreement to bring the foundational IP under Fylfotone Ventures, or a structured cross-licensing arrangement, is planned as part of the company's growth-stage corporate structuring. Alternatively, a new dedicated entity may be established specifically for this purpose. This is a standard arrangement for cross-continental deep tech ventures and does not diminish Fylfotone's material access to and operational control over the core technology. All new IP generated through Indian R&D activities and institutional collaborations will be filed and held by Fylfotone Ventures Private Limited directly.
Sacura is the project and product brand under which all Physical Cryptography products, research, and commercial activities are presented to the market. It represents the unifying identity of the platform across both entities and across all product lines. The tagline "Engineering Trust into the Physical World" captures the mission: building the infrastructure that allows physical objects to prove their own integrity through physics rather than assumption.
All systems humans build eventually require trust. Digital systems solved the trust problem four decades ago with public-key cryptography. When a bank authorizes a transaction, when a government signs a document digitally, when an encrypted message is sent, the trust does not rest on anyone's word. It rests on mathematics. The proof is the verification. No assumption required.
Physical systems never made this transition. The mechanisms used to establish the authenticity and integrity of physical objects today are, without exception, overlays: things applied to objects from the outside, representing integrity rather than deriving it from the object itself.
A hologram on a passport says that at some point, someone with the right equipment made this hologram. It does not say that this document has not been altered since. A QR code on a pharmaceutical pack says that this string of digits was registered in a database. It does not say that the substance inside this blister is the substance that was put there at manufacture. An RFID tag says that this tag responds to queries. It does not say that this tag is attached to the same object it was attached to when it was enrolled.
None of these mechanisms are intrinsic to the object. They can all be replicated, transferred, bypassed, or simply ignored. The security they provide is real but shallow: they raise the cost of certain attacks, they create legal accountability, they satisfy regulatory checkboxes. But against an adversary with modest resources and real economic motivation, none of them hold.
The adversary does not need to defeat cryptography. They just need to make a good-enough hologram, print a valid-looking QR code, clone an RFID tag, or manufacture a package that passes visual inspection. These are not exotic capabilities. They are available, at commercial scale, to anyone with manufacturing access and a reason to use them.
The market has been aware of this problem for decades. The response has been substantial investment in what Dr. Roger Johnston of Right Brain Sekurity has described as "security theatre": measures that create the appearance of verification without providing its substance.
Holograms became standard and then became replicable. Colour-shifting inks and microprinting followed the same cycle: deployed as a security measure, industrially replicated within years. Serialized QR codes and barcodes are trivially copyable and verify only the existence of a registration record, not the physical object. RFID and NFC tags add digital readout but introduce a separation problem: the tag and the object have no intrinsic relationship, making removal, cloning, and reattachment straightforward.
The common failure mode is always the same: the security mechanism exists outside the object. It represents integrity rather than embodying it. And anything that represents integrity rather than embodying it can, in principle, be represented fraudulently. The question is only cost and effort.
Raising cost and effort matters. But it is not a permanent solution. Manufacturing capabilities improve. Replication costs fall. Economic incentives in counterfeiting are high enough that adversaries invest in defeating whatever new measure the market deploys. The history of anti-counterfeiting technology is a history of this cycle: new measure, widespread adoption, successful replication, next measure.
Breaking the cycle requires getting off it entirely. That means building security that does not rest on a representation - one that is grounded in the physics of the object itself and cannot be separated from it.
The global cost of counterfeiting and supply chain fraud is estimated at $4.5 trillion annually, according to ICC-BASCAP and Frontier Economics. This figure represents the direct economic damage that is currently quantified. The harder-to-measure costs are the ones that matter most.
The World Health Organization estimates that 1 in 10 medical products in low-and-middle-income markets are substandard or falsified. An estimated 500,000 deaths annually are attributable to counterfeit pharmaceuticals, according to research published in The Lancet Infectious Diseases. The UNODC reported in 2023 that approximately 436,000 of these deaths occur in sub-Saharan Africa alone.
Counterfeit electronic components entering global supply chains represent over $200 billion annually according to OECD and EUIPO estimates. Multiple national security agencies have documented the deliberate infiltration of counterfeit electronic components into defence supply chains, including components that may fail at critical moments or carry undocumented modifications. This is not a commercial inconvenience. It is a systemic vulnerability in national infrastructure.
The OECD and EUIPO estimate the value of international trade in counterfeit goods alone at approximately $500 billion. Supply chain fraud has also become a geopolitical instrument, with state-sponsored programmes aimed at introducing vulnerabilities into systems they cannot defeat through direct confrontation.
The entire existing anti-counterfeiting industry, estimated at over $40 billion annually, is built on overlay technologies that have been deployed for decades. The problem has gotten worse, not better, because every one of these technologies can be replicated by an adversary with modest resources and economic motivation.
Sacura's mission is to establish a new discipline, Physical Cryptography, and to become the foundational infrastructure of that discipline globally.
Physical Cryptography applies the logic of mathematical proof to the material world. It asks: what if an object could carry its own verifiable identity, encoded not in a label or a chip but in its own physical structure? What if tamper evidence were not a seal that could be replaced, but a one-way physical function that could never be restored? What if the security of an object came not from a protection applied to it, but from the physics of what it is?
Cryptography gave the digital world mathematical certainty of identity. A digitally signed document is not trusted because it looks legitimate; it is verified, and the mathematics does not lie. The physical world has had no equivalent. Sacura exists to build one.
The scope of this ambition spans pharmaceuticals and food safety, aerospace and defence, luxury goods and agricultural provenance, identity documents and financial instruments, critical infrastructure and semiconductor supply chains. Every domain where the integrity of a physical object has consequence is a domain this work touches.
Sacura's vision, stated plainly: a world where physical trust is not assumed but proven. Where the verification is instant, universal, and costs nothing beyond the device already in your pocket. Where the forger, the counterfeiter, and the supply chain fraudster face not a regulation to evade or a label to replicate, but the fundamental laws of physics working against them.
We are building the atomic equivalent of a digital signature, and making it readable by anyone, anywhere, for free.
The companies that established the standards for digital cryptography did not build businesses proportional to the cost of digital fraud they were preventing. They built businesses proportional to the value of digital commerce that their infrastructure made possible. The analogy for physical trust is meaningful. Sacura is not building a better seal. It is building the infrastructure layer that defines what physical verification means, with the ambition of becoming as fundamental to physical commerce as public-key cryptography became to digital commerce.
This is not a product company. It is an infrastructure company building the foundational technology for a new category. The first implementation is one answer, applied to one class of problem. The research programme is the path toward a general answer.
When micro-particles are distributed over a surface prior to vacuum sealing, their positions are determined by the initial application method, surface topology, inter-particle interactions, and the stochastic variation inherent in any physical process. The resulting arrangement is a high-entropy state drawn from an astronomically large set of possible configurations.
A vacuum-sealed system maintained at a pressure differential well below atmospheric contains a defined quantity of gas at a defined pressure. Any breach of the barrier allows gas to flow across the pressure differential until equilibrium is reached. This process is immediate and irreversible under any conditions accessible outside an industrial sealing facility.
Sacura's work generalizes PUF concepts beyond silicon to general physical materials and spatial particle distributions, creating optical PUFs whose signatures are captured by imaging rather than electrical measurement. The replication resistance is grounded in the resolution gap between verification imaging and fabrication capability.
The architecture ensures that accessing the contents necessarily produces permanent physical changes. This is distinct from tamper resistance - it is tamper inevitability. Rather than trying to prevent access, the system is designed so that undetected access is structurally impossible.
Designed from the outset around a single constraint: it must work on a standard consumer smartphone, with no specialist hardware, no mandatory network connection, and no requirement for technical training beyond a brief onboarding. Feature extraction and comparison happen on-device. Raw image data never leaves the phone.
Cryptographic commitment schemes allow a manufacturer to bind themselves to a specific physical signature at manufacture without revealing the signature. Zero-knowledge proof architectures allow authenticity to be demonstrated without revealing anything about the object's identity, supply chain path, or manufacturing provenance.
The number of distinguishable spatial configurations available to even a modest particle distribution is combinatorially enormous - on the order of 10 to the power of (N log N) for N particles. The probability of two independent samples producing the same configuration is negligible to the point of physical impossibility: on the order of 10 to the power of negative 200.
Tamper state verification, detecting vacuum-state compromise, operates entirely offline. Pressure indicators embedded in the containment system produce visual signals readable by the smartphone camera. Computer vision algorithms running on the device interpret these signals and deliver a result in seconds. No network. No database. No authority.
Physical identity verification, PUF matching, queries an enrolled reference database when connectivity is available, with graceful degradation when it is not. The result is binary: genuine or not. Delivered in seconds.
The feature extraction pipeline draws on techniques from biometric matching (fingerprint and iris verification) and from content-based image retrieval, adapted for the specific characteristics of micro-particle distributions. Invariant feature descriptors extract local structure that is stable across the realistic range of capture variation. Compact binary representations enable fast similarity computation suitable for on-device processing.
Physical verification is local. Modern supply chains are global. Sacura's cryptographic layer bridges these two realities by transforming physical measurements and verification outcomes into mathematical proofs that can be shared, audited, and relied upon by parties who were not present for the physical verification.
Cryptographic commitment schemes allow a manufacturer to bind themselves to a specific physical signature at the time of manufacture without revealing the signature. Zero-knowledge proof architectures, implemented using a variant of the Schnorr identification scheme adapted for the specific mathematical structure of the physical similarity metric, allow authenticity to be demonstrated without revealing anything about the object's identity, supply chain path, or manufacturing provenance.
The distributed verification infrastructure uses a federated architecture in the near term, with enrolled references held across manufacturers, authorized distributors, and Sacura's verification service. The longer-term architecture is designed for progressive decentralization.
The first commercial expression of the Physical Cryptography platform. A vacuum-sealed packaging system with a dual-chamber architecture that separates the product containment region from a dedicated vacuum authentication chamber.
Within the secondary chamber resides a dense field of micro-scale circular particles. When vacuum is applied, particles are pulled into intimate contact, causing them to mechanically interlock and arrest their motion - spontaneously forming a highly complex, non-repeatable particle arrangement. Any tampering disrupts vacuum integrity, releasing locking forces and causing visible, irreversible particle displacement.
Covers dual-chamber architecture, particle-based physical authentication, and smartphone-native verification.
patents.google.com/patent/US11897642B2 ↗A physical tamper-proof lock for defence and high-security applications that goes beyond tamper evidence (detecting that tampering occurred) to tamper prevention (physically stopping unauthorized access). Combines advanced bulletproof-grade materials with embedded cryptographic verification using zero-knowledge proof systems.
The design intent is a lock that withstands physical attack (impact, cutting, drilling, thermal attack) while maintaining the integrity of its verification layer. No comparable product exists that combines ballistic-grade material engineering with embedded physical authentication systems.
A parallel research track investigating the use of hidden cryptographic signatures embedded within printed materials (such as halftone patterns on packaging) as an additional authentication layer. Detectable reliably using only a standard smartphone camera and on-device computer vision processing.
The approach involves embedding signatures using techniques including LSB analysis, DCT/DWT transform-domain analysis, and CNN-based classification, adapted for the specific challenge of re-photographed printed material under uncontrolled conditions. When developed, steganographic signatures would serve as a complementary authentication channel providing defence-in-depth alongside the vacuum-PUF system.
The Sacura tamper-evident vacuum pouch is at the early-stage physical prototype level. The core architecture has been defined and finalized. The mechanism has been validated theoretically and through the predecessor product form factor (BitBox). The US Patent 11,897,642 B2 has been granted covering the foundational mechanism. Functional logic has been established and an early-stage physical prototype of the pouch exists.
What remains to be completed includes material validation (barrier film selection, multilayer architecture optimization, pressure indicator calibration), process integration (compatibility with existing packaging line equipment), industrial compatibility testing (vacuum stability under supply chain conditions, mechanical stress testing, environmental cycling), and establishing a scalable production pathway. The venture is not experimenting. It is industrializing. The concept is proven. The transition from concept to industrial-scale production is the current engineering challenge.
The defence tamper-proof lock is at concept stage with very early preliminary prototype work. The intersection of ballistic-grade material engineering with embedded authentication systems presents unsolved integration challenges. The lock must withstand physical attack while maintaining the integrity of its verification layer. Material behaviour under attack conditions and its effect on embedded cryptographic or PUF-based identity is not characterized in any existing commercial or academic work that has been identified.
Extensive R&D is required across material science, mechanical engineering, vacuum and packaging engineering, and AI/ML for verification systems. Prototype development is contingent on R&D partnerships, institutional collaborations, and grant funding.
Steganographic signature detection is at the concept and feasibility research stage. The core technical challenges include optical degradation from re-photographing printed material, environmental interference from variable ambient lighting, algorithmic constraints from on-device real-time processing requirements, and adversarial robustness against attempts to replicate or strip the hidden signature. This is an open research problem requiring sustained R&D effort.
This patent covers the core invention underlying Sacura's Physical Trust Protocol: a vacuum-sealed containment system with a dedicated authentication chamber containing micro-scale particles that form a unique, non-repeatable spatial arrangement upon vacuum activation. The patent encompasses the dual-chamber architecture, particle-based physical authentication, and smartphone-native verification. This patent is held by TepoTec Mavins GmbH and forms the foundational IP upon which the entire Sacura programme is built.
patents.google.com/patent/US11897642B2 ↗A new patent application is in preparation for the physical prototype of the Sacura tamper-evident packaging system, covering specific engineering innovations in the pouch architecture, particle application method, sealing process, and verification workflow.
Planned IP filings include: a patent for the physical tamper-proof lock for defence applications, covering the combination of advanced materials with embedded cryptographic verification; a patent for the steganographic signature detection method, covering hidden cryptographic signatures in printed materials detectable via smartphone camera and on-device computer vision; Indian patent filings and international PCT applications planned as an immediate priority upon securing institutional support, leveraging available rebates on patent filing fees and access to fast-track patent examination schemes.
Beyond formal patent protection, the venture possesses substantial proprietary know-how developed through sustained R&D effort that constitutes trade secrets. This includes specialized knowledge in selection and characterization of micro-particle types for optimal PUF performance (optical properties, size distribution, surface interactions, scattering characteristics), dispersion methods that maximize spatial randomness, and material behaviour under vacuum-state conditions over extended periods.
Proprietary algorithms and methods have been developed for extracting invariant features from micro-particle spatial arrangements captured by consumer smartphone cameras, generating compact binary representations suitable for on-device processing, and tolerant matching architectures that achieve near-zero false-positive rates while accommodating real-world capture variation.
Proprietary protocol designs have been developed for hash-based commitment schemes binding manufacturers to enrolled physical fingerprints, zero-knowledge proof systems adapted for approximate physical similarity metrics, and on-device proof generation optimized for smartphone hardware constraints.
The integration of all these layers, including physics, materials, computer vision, cryptography, and steganography, into a single coherent product that works on a consumer smartphone without specialist hardware is itself a form of proprietary know-how. No published work or commercial offering combines these disciplines in this manner.
Current phase: Leverages the existing granted US Patent as foundational IP, protects proprietary know-how as trade secrets, and prepares patent applications for the physical prototype and defence lock.
Next phase (upon securing institutional support and grant funding): Filing Indian patent applications, filing international PCT applications for key innovations, fast-tracking examination through available patent facilitation schemes, and formalizing the IP assignment/licensing structure between TepoTec Mavins GmbH and Fylfotone Ventures.
Growth phase: Continuous patent prosecution from the ongoing R&D programme, building a defensive patent portfolio across all core technology layers, and exploring IP licensing as a revenue stream for the Physical Trust Protocol standard.
Dr. Roger G. Johnston, Ph.D., CPP, of Right Brain Sekurity conducted a comprehensive design review of the BitBox, the predecessor product form factor that validated the core particle-locking and vacuum-based tamper-evidence mechanism that underpins the current Sacura pouch architecture.
Dr. Johnston's credentials are significant. His career includes defeating over 1,100 different security products. He previously led the Vulnerability Assessment Team at Argonne National Laboratory, a U.S. Department of Energy facility, and is one of the world's foremost authorities on physical security, tamper-indicating seals, and vulnerability assessment.
"The BitBox is clever and possesses a number of important advantages over other designs for tags and seals."
Dr. Johnston's review specifically highlighted three critical strengths. First, "the very important ability to check that the particles are free to move when the seal is opened, a significant improvement over other complexity tag and seal designs and products." Second, that "the BitBox can be reused and, importantly, it can be reused without a substantial penalty or falloff in security," which "is not the case for many reusable tags and seals." Third, that "the BitBox is relatively low-tech and low-cost, and it can be read largely by eye, no expensive, proprietary, or complicated reader is needed."
Dr. Johnston also conducted practical attack testing, identifying potential vulnerability scenarios and recommending countermeasures. This adversarial analysis has directly informed the evolution from the BitBox form factor to the current Sacura pouch architecture, which addresses several of the attack vectors identified in the review by eliminating the Velcro interface, integrating the particle chamber directly into the pouch structure, and making the vacuum conduit an integral part of the sealed architecture rather than an external bag.
In a separate market viability opinion, Dr. Johnston stated: "Could the BitBox be a commercially viable product? Yes, though I give it about a 40% chance of succeeding. Keep in mind for calibration purposes, however, that vulnerability assessors tend to be pessimists, if not outright cynical as an occupational hazard." He also identified key success factors including the importance of educating potential customers, pursuing high-end and prestigious applications for reputation value, and developing a compelling demonstration capability, all of which are reflected in Sacura's current strategy.
Dr. Johnston strongly recommended the implementation of a blink comparator for image comparison, noting that it "usually will even outperform sophisticated computer image algorithms" and is "a dramatically more sensitive, reliable, and painless way to compare 'before' and 'after' images than by doing side-by-side image comparisons." Sacura's smartphone-based computer vision verification system builds directly on this recommendation, automating the comparison process with invariant feature extraction and tolerant matching architectures.
An independent market analysis was conducted by a team comprising Naomi Rocha dos Santos, Nathalie Meyer, David Duran, and Boris Vittek. The analysis evaluated the market potential across multiple industry verticals including luxury goods and jewellery (specifically luxury watches), pharmaceuticals and healthcare, automotive and aerospace parts (including electric vehicle components), crypto hardware and electronics, and banking and financial services.
The analysis included primary research through interviews with industry stakeholders at Medbase (pharmaceutical logistics), Porsche AG (VCU unit manufacturing and transport), Schindler (supply chain logistics), and AXPO Power AG (nuclear power plant operations). Key findings validated the market need across all verticals studied.
The Porsche interview revealed specific operational pain points directly addressable by Sacura's technology: VCU units going missing during customs processes, more sample pieces being taken than authorized without traceability, current packaging failing to protect against environmental contamination during transport, and the inability to use cost-effective sea transportation due to inadequate packaging protection. The implementation of Sacura packaging was identified as enabling the application of CLEANLINESS norms in packing and transportation, enabling sea transportation (versus the current requirement for air freight), ensuring completeness verification through vacuum measurement, and providing tamper evidence throughout the supply chain.
The AXPO interview confirmed potential in nuclear applications, with the senior project leader noting that "the product has potential when implemented properly in processes with requirements for high security and transparency" and that success "could be easily achieved if there is a demand for such a solution by ENSI [the Swiss federal nuclear safety inspectorate]. In that case the industry would have to implement such a solution no matter the costs."
The analysis identified Prooftag and its Bubble Tag technology as the closest direct competitor, noting Sacura's distinct advantages in providing physical evidence of tampering through an irreversible mechanism (versus static visual patterns), higher complexity in verification, and broader application versatility beyond product labelling.
Sacura has received expressions of interest from multiple parties across different sectors, representing a mix of documented and informal engagements.
Founded by Bob Hamman, SCA Promotions has shown interest in the Sacura technology. SCA has handled high-profile cases including the recovery of prize money from Lance Armstrong. Hamman is also considered one of the greatest bridge players of all time, with 12 world championships.
Interest from Mankind India representing potential application in the Indian pharmaceutical and consumer healthcare sector, one of Sacura's primary target verticals given India's position as the "pharmacy of the world" supplying 20% of global generic medicines.
Interest from wine and cigar suppliers in Europe represents the food and beverage provenance verification use case, where geographic indication fraud and product adulteration are persistent commercial and safety issues.
Additional conversations are ongoing across multiple sectors, reflecting the breadth of the problem Sacura addresses. The technology's applicability across any domain where the integrity of a physical object carries consequence means that market engagement opportunities continue to expand as awareness of the platform grows.
The Sacura R&D programme operates across six interconnected research domains, each requiring original scientific and engineering work with no off-the-shelf components available.
Extensive experimentation with micro-particle types (mineral granules, polymer spheres, metalate flakes), their optical properties (refractive index, scattering characteristics, size distribution), dispersion methods, and surface interactions. The goal is maximizing spatial randomness while maintaining sufficient particle density for robust feature extraction. Each material system requires independent characterization and testing under varying environmental conditions.
Selection and testing of multilayer barrier films combining aluminium foil layers with biaxially oriented polymer films and sealant layers, optimized for low gas permeability, mechanical resilience, irreversible bond formation under heat-seal conditions, and optical transparency for pressure indicator readability. Pressure indicator calibration requires iterative prototyping to produce distinguishable visual states at target pressure differential thresholds.
Development of an optical PUF system based on controlled stochastic particle dispersion, extending PUF concepts traditionally confined to silicon chip security into general physical materials. This requires original scientific work in controlled dispersion methods, enrollment imaging protocols, and characterization of the configuration space.
Design and development of a feature extraction pipeline that produces compact binary representations of spatial particle arrangements, invariant to realistic capture variation including changes in illumination direction and intensity, minor perspective variation, and differences in sensor characteristics across consumer smartphone devices. Active research continues on improving invariance, compactness, and tolerance to challenging field conditions.
Implementation of hash-based commitment schemes for manufacturer enrollment, and a zero-knowledge proof protocol (variant of Schnorr identification scheme) adapted for the mathematical structure of the physical similarity metric. This enables verification without revealing enrolled references or field measurements, a novel application of ZKP to physical object authentication.
Physical prototype iterations of the vacuum-sealed tamper-evident pouch, testing seal integrity under simulated supply chain conditions (temperature cycling, humidity, vibration profiles for maritime and air freight), tamper detection sensitivity, and smartphone verification reliability across device generations.
The primary risk in this work is not whether customers will buy the product. The $4.5 trillion annual cost of counterfeiting and the approximately 500,000 annual deaths from counterfeit pharmaceuticals demonstrate overwhelming market demand. The primary risk is whether the technology can be built, proven, and made to work reliably at commercial scale across real-world conditions.
PUF Signature Stability. The particle fingerprint must remain stable and verifiable over the entire lifecycle of the product, which may include months of storage, transcontinental shipping, temperature extremes (-20°C to +50°C), humidity variation, mechanical vibration (maritime, air, and road freight profiles), and atmospheric pressure changes. No prior work exists on the long-term environmental stability of optical PUF signatures based on stochastic particle distributions in vacuum-sealed consumer packaging. Preliminary results are encouraging but insufficient for commercial confidence across all target deployment environments.
Feature Extraction and Matching Under Real-World Capture Variation. The feature extraction problem for micro-particle distributions is fundamentally different from established biometric matching because the features are at a scale near the resolution limit of consumer smartphone cameras, the capture environment is uncontrolled, device diversity is extreme, and the matching threshold must simultaneously achieve near-zero false positives and tolerate significant capture variation. A working prototype achieves acceptable matching under controlled and semi-controlled conditions. Performance at boundary conditions requires continued R&D.
Zero-Knowledge Proof Systems for Physical Verification. Standard ZKP systems operate on exact equality or algebraic relationships. Physical measurements are inherently noisy. Proving approximate similarity in zero-knowledge, with configurable tolerance thresholds, while maintaining proof compactness and verification speed suitable for on-device smartphone computation, is a non-trivial cryptographic research problem.
Replication Resistance Boundaries. The formal characterization of the replication resistance boundary under attack scenarios using current and foreseeable micro-fabrication and imaging technology is an open research question requiring adversarial analysis that models the capabilities of state-level attackers. Theoretical analysis based on resolution gap arguments is complete. Experimental adversarial testing is planned as part of institutional collaborations.
Sacura is actively in discussions for formal R&D collaborations with leading institutions. Exploratory discussions are underway with Indian Institutes of Technology (IITs) for collaborative research in materials science, stochastic particle systems, and physical authentication, targeting MoU establishment with research labs specializing in advanced materials and applied physics.
Conversations have been initiated with Ivy League institutions in the United States with research groups working on applied cryptography, computer vision, and supply chain security for potential joint research programmes. Discussions are underway with ZHAW (Zurich University of Applied Sciences, Switzerland) for an R&D partnership leveraging ZHAW's strengths in materials science, engineering, and applied research, complementing Sacura's Swiss-origin IP.
These collaborations aim to accelerate the research programme across key open questions including stability of particle signatures under extreme distribution conditions, feature extraction performance at the lower bound of consumer imaging hardware, replication resistance boundaries under adversarial micro-fabrication attacks, hybrid physical-digital integrity architectures, and quantum-level signature generation.
Near-term - Micro-scale Optical PUF (Current): Particle distributions at the micrometre scale, verified by consumer smartphone camera. This is the basis of the first commercial product.
Medium-term - Nanoscale and Quantum-Level Signatures: Future material systems will operate at smaller scales, where the randomness arises from quantum mechanical processes rather than bulk stochastic ones. Quantum dot distributions, plasmonic nanostructures, and photonic crystal systems all offer physical properties whose uniqueness is grounded in quantum indeterminacy rather than classical chaos.
Medium-term - Structural and Volumetric Identity: Structural identity systems would encode uniqueness into the full three-dimensional architecture of an object, verified through depth-sensing capabilities such as structured light imaging.
Medium-term - Hybrid Physical-Digital Architectures: Integration of passive digital elements, such as miniaturized environmental sensors in read-only, tamper-evident configurations, into sealed containment systems for condition history recording (temperature, humidity, shock, radiation exposure).
Long-term - Universal Verification Platform: A single application capable of handling any Sacura-protected object regardless of which physical mechanism was used, so that the verification experience for any participant in any supply chain remains consistent.
Counterfeit pharmaceuticals are responsible for an estimated 500,000 deaths per year globally. India supplies 20% of global generic medicines. Sacura addresses both the packaging integrity question and the identity question. Individual-unit verification, without dependence on centralized serialization databases, is a meaningful capability advance. Compatible with EU Falsified Medicines Directive and US Drug Supply Chain Security Act.
A counterfeit component in an aircraft control system, a power grid switching station, or a military communications system may fail in a way that is catastrophic and irreversible. Multiple national governments have documented the systematic infiltration of counterfeit electronic components into defence supply chains. Sacura provides cryptographic proof of a component's physical identity and untampered condition without revealing commercially sensitive supply chain intelligence.
The counterfeit luxury goods market is an industrial-scale operation. The most sophisticated counterfeit watches, handbags, and fashion items are visually indistinguishable from genuine articles. PUF-based identity embedded in materials at manufacture provides an authentication layer that cannot be replicated regardless of the quality of the counterfeit's external appearance.
Food fraud and adulteration affect every major food category. Olive oil labelled as extra virgin that is not, honey cut with industrial syrups, spices diluted with fillers, wines from one region sold as another. Physical provenance verification provides cryptographic proof that a product originated from a registered legitimate producer, the only mechanism that addresses geographic indication fraud at scale.
Counterfeit electronic components in global supply chains are estimated at over $200 billion annually. As India builds its semiconductor fabrication and packaging capacity through the India Semiconductor Mission, integrating indigenous authentication technology from the outset creates both security and competitive advantage.
Physical identity documents represent high-value targets for sophisticated adversaries with consequences extending to personal and national security. The PUF principle applied to document substrates provides an integrity layer that persists independently of printed content and cannot be replicated by any counterfeit production process.
The total addressable market for physical trust infrastructure is not bounded by any single vertical. The $4.5 trillion annual cost of counterfeiting and supply chain fraud globally is a floor, not a ceiling. The existing anti-counterfeiting industry is estimated at over $40 billion annually. Sacura's technology does not compete within this existing paradigm. It replaces it. The value proposition is not a better version of what exists but a categorically different approach that derives security from physics rather than from representations that can be copied.
Sacura's commercialization strategy is designed to present multiple pathways to market, reflecting the platform nature of the technology and the diversity of target verticals. The model is a combination of three approaches.
Direct enterprise sales. For high-value, high-security verticals such as pharmaceuticals, defence, and luxury goods, Sacura will engage directly with enterprise customers to implement the Physical Trust Protocol into their packaging and supply chain processes. This channel provides the highest margin and the deepest customer relationships, generating operational data that feeds back into the R&D programme.
Technology licensing. For verticals where existing packaging manufacturers have established relationships and distribution, Sacura will license the technology to packaging companies that integrate it into their production capabilities. This scales deployment without requiring Sacura to build manufacturing capacity across every sector. The licensing model generates recurring revenue and establishes the technology as a standard across multiple packaging platforms.
Co-development partnerships. For the industrialization phase, Sacura is seeking development partners with converting expertise, barrier film experience, vacuum sealing process knowledge, regulatory familiarity, pilot production capability, and engineering collaboration capacity. This is a co-creation model where partners contribute manufacturing expertise and infrastructure while Sacura contributes the core science and verification platform. Early partners gain a meaningful head start on a category that will become an industry standard, and they shape the development of the technology around real operational requirements.
The development roadmap follows a phase-based progression without fixed timelines, reflecting the reality that genuine R&D produces unpredictable timelines. The progression logic is clear even when the calendar is not.
Define the highest-impact initial application vertical based on required barrier properties, target vacuum level, shelf life expectations, security sensitivity, and regulatory constraints. Deliver a clear first deployment vertical.
Define the physical composition including barrier stack materials, oxygen and moisture vapour transmission rates, seal integrity parameters, optical inspection window clarity, and vacuum conduit integrity. Determine mono-material versus multi-layer laminate versus recyclable architecture. Establish compliance with relevant regulatory frameworks (USFDA, FDA food contact, ISO, GMP).
Assess whether Sacura is supplied as a finished pouch, integrated into existing pouch production lines, or deployed as a modular add-on architecture. Evaluate vacuum equipment compatibility, tooling modifications, additional sealing step requirements, capex implications, and throughput impact.
Physical realization including particle chamber fabrication and assembly, vacuum conduit engineering and flow testing, optical window precision and clarity optimization, secondary chamber sealing consistency, and vacuum stability validation under stress. Deliver a functional pre-pilot batch with validated repeatability of particle locking behaviour.
Comprehensive assurance covering mechanical testing (burst strength, seal strength, drop tests per ASTM standards, pressure cycling endurance), vacuum testing (retention time, leak sensitivity threshold, micro-perforation detection), environmental testing (moisture exposure, temperature variation cycling, supply chain handling simulation), and security testing (breach simulation attacks, reseal attempt detection, indirect tamper validation).
Development of the software and verification layer including reference image capture system, secure storage architecture, hashing and verification engine, track and trace logic, and SOC-compliant infrastructure.
Evaluation of centralized versus distributed production, licensing model versus direct supply, particle formulation optimization, cost per unit at scale, and integration depth into partner production lines. The focus throughout is on R&D and innovation and invention, while maintaining a clear orientation toward commercialization.
Sacura is actively seeking partnerships across several categories. Development and R&D partners with packaging engineering expertise, converting capabilities, testing infrastructure, and line integration experience for industrializing the first product line. Institutional research partners at IITs, Ivy League institutions, and ZHAW for accelerating the research programme across open technical questions. Commercial deployment partners in pharmaceutical supply chains, premium food and beverage, luxury goods, and precision industrial components for early deployment that generates operational data. Strategic partners including existing seal and security manufacturers and vendors who can represent or distribute Sacura products.
As Dr. Johnston noted in his market analysis, "existing seal/security manufacturers and vendors can sell your product, even if theoretically competitors," as seal manufacturers and vendors "often sell their competitor's product at a loss as a way of being a 1-stop shop for their customers."
Aryan Saxena is the sole full-time operator of both Fylfotone Ventures and the Sacura programme, leading all aspects end-to-end: research, engineering, strategy, IP management, business development, and external engagement.
Aryan is a deep-tech researcher, builder, and strategic leader working at the crossroads of decentralization, systems thinking, and human impact. His background spans autonomous aerial vehicles to secure computing frameworks, tackling problems that do not fit any single discipline.
Sacura is currently a solo-founder operation by deliberate choice at this stage: the foundational science, IP acquisition, strategic positioning, and early prototype work required a single decision-maker with cross-disciplinary capability working at high speed. As the venture moves into the industrialization and scale phase, the team will expand across several critical functions.
Priority hires include a materials science and packaging engineer for barrier film optimization and vacuum system engineering, a computer vision and ML engineer for feature extraction pipeline development and smartphone-native verification, a mechanical/industrial engineer for prototype converting and production line integration, and a business development lead for enterprise sales and partnership management. The hiring strategy prioritizes depth of expertise in the specific disciplines that Sacura's R&D programme demands, with a preference for individuals who can work across disciplinary boundaries.
Sacura operates under four design constraints that govern every technical and product decision.
No battery. No chip. No network. Security that functions continuously without any active component that can fail, drain, or be jammed.
Tamper evidence is readable without specialist training. The physics makes the breach obvious. Verification is a single scan, not a workflow.
The cost of defeating the system must be orders of magnitude higher than the value it protects. Physics-based security naturally satisfies this; representations do not.
Each physical layer is independent. Combining vacuum-state integrity with particle fingerprinting with structural irreversibility multiplies the security without multiplying the complexity.
Physics first: the security guarantee must come from the laws of nature, not from a secret, a label, or a database.
Verification for everyone: verification must be possible with a smartphone, which is not a convenience but a security requirement.
No single point of failure: no central authority whose compromise breaks the system, no electronic component whose failure negates the integrity guarantee, no network dependency that can be frustrated by infrastructure limitations.
Honest about what we do not know: the research programme will produce surprises, and we commit to following the science where it leads.
The category before the product: we are building the infrastructure that defines a new standard, knowing that the standard creates the largest long-term value.
Sacura is at an inflection point where the foundational science is established, the IP is secured, the first prototype exists, and third-party validation has been obtained. What is needed now is the support infrastructure to accelerate from early prototype to industrial deployment while continuing to deepen the research programme.
Formal collaborations with research institutions (IITs, international universities, applied research centres) for accelerating work on open technical questions across materials science, computer vision, applied cryptography, and vacuum engineering.
Access to mentorship networks, industry connections, testing infrastructure, and the institutional credibility that comes with recognized incubation programmes.
Non-dilutive capital for sustained R&D across all three product lines, with particular urgency for materials testing, environmental cycling validation, and feature extraction optimization for the Sacura pouch, and preliminary materials research for the defence lock.
Packaging engineering firms with converting expertise, barrier film experience, vacuum sealing process knowledge, and pilot production capability for co-developing the industrial production pathway.
Enterprise customers in pharmaceuticals, premium food and beverage, luxury goods, or precision industrial components willing to pilot the technology in real supply chain conditions, generating the operational data that accelerates the next generation of the research.
The venture is open to the support structure that fits. The ambition is large. The principle is sound. What comes next will be determined by the science, by the demands of real-world deployment, and by the partnerships that enable both.
US Patent 11,897,642 B2, accessible at patents.google.com/patent/US11897642B2. Covers tamper-evident vacuum packaging with dual-chamber architecture, particle-based physical authentication, and smartphone-native verification.
| Entity | Field | Value |
|---|---|---|
| Fylfotone Ventures Private Limited | CIN | U74909RJ2025PTC101358 |
| Fylfotone Ventures Private Limited | Registered Office | 126/A Khawas Ji Ka Bagh, Durgapura, Jaipur, Rajasthan 302018 |
| Fylfotone Ventures Private Limited | PAN | AAGCF3213P |
| Fylfotone Ventures Private Limited | Web | fylfotone.com |
| TepoTec Mavins GmbH | Registered | Switzerland |
| TepoTec Mavins GmbH | Web | sacura.ch |
Right Brain Sekurity Design Review, January 26, 2020, by Dr. Roger G. Johnston, Ph.D., CPP. Full report available upon request under NDA.
Independent Market Analysis by Naomi Rocha dos Santos, Nathalie Meyer, David Duran, and Boris Vittek. Includes primary research interviews with Medbase, Porsche AG, Schindler, and AXPO Power AG. Full report available upon request.
| Role | Contact |
|---|---|
| Aryan Saxena, Founder and CEO | aryan@sacura.ch |
| General Inquiries | hey@sacura.ch |
| Phone | +91 9214014049 |
| Web | sacura.ch · fylfotone.com |
| Statistic | Value | Source |
|---|---|---|
| Annual cost of counterfeiting and supply chain fraud globally | $4.5 trillion | ICC-BASCAP / Frontier Economics |
| Deaths annually from counterfeit pharmaceuticals | ~500,000 | WHO / Lancet Infectious Diseases |
| Medical products in LMICs that are substandard or falsified | 1 in 10 | WHO |
| Annual value of counterfeit electronics in supply chains | $200B+ | OECD / EUIPO |
| Value of international trade in counterfeit goods | ~$500B | OECD / EUIPO |
| Probability of accidental PUF replication | ~10−200 | Theoretical calculation from configuration space |
| Capability | Sacura | QR Codes | Holograms | RFID/NFC | Serialisation DBs |
|---|---|---|---|---|---|
| Security derived from physics of the object itself | ✓ | ✗ | ✗ | ✗ | ✗ |
| Tamper evidence governed by thermodynamic law | ✓ | ✗ | ✗ | ✗ | ✗ |
| Unclonable physical identity (PUF) | ✓ | Trivially copyable | Industrially replicable | Cloneable | Database records only |
| Works without electronics on product | ✓ | ✓ | ✓ | ✗ | N/A |
| Works without batteries | ✓ | ✓ | ✓ | Active: No / Passive: Yes | N/A |
| Works without network connectivity | ✓ | Needs database | Visual only | Needs reader + database | No |
| Verification by any smartphone | ✓ | ✓ | Visual subjective | Needs NFC reader | No |
| Irreversible after breach | ✓ | N/A | Can be replaced | Can be reattached | N/A |
| Fingerprint inseparable from object | ✓ | External label | External | Separate component | External database |
If you’d like more detailed documentation or to explore this further, you can schedule time here.
Schedule Time