How it works
In just a few minutes, we scan the Web for sites selling counterfeit versions of your proprietary products and then ask every major search engine to remove those sites. Now, their customers can't find them anymore. It's really that simple.
-
Upload your images and create search terms
Get pictures
Identify keywordsWe'll start by uploading images of your products and compiling a complete list of potential search terms that customers could use to search for your products. These are terms that counterfeiters also use to target your customers or to find people looking for bargains or discounts.
-
Gather a list of suspect sites
Pictures + Texts
Our DataBaseThen we use Google to scan the Web for every site using those search terms and build a list of sites. And because we repeat this search every 30 minutes, as soon as a counterfeit site appears in search results, we already have it in our sights. They can't hide from us.
-
Scrape sites and collect images
Our DataBase
of suspects
Identified incidentsEach time we compile a complete list of suspected sites, we scrape every product image from each site and collect them. This gives us a database of images for our software to search through.
-
Identify stolen images
Identified incidents
Identify stolen imagesIn just a few seconds our software can compare these scraped images to the images that you provided. Counterfeiters often take product images from your site. But they can also shoot entirely new images. Our software can look at all of their photos and identify hide it.
-
File DMCA with major traffic sources
DMCA to Google, Yahoo and other...Once we build a list of suspect sites that contains counterfeit products, we file DMCA takedown notices with the major search engines within 30 minutes of starting this process. We can remove sites from search engines, social networks, hosting services and marketplaces right away. Counterfeiters will quickly run out of customers.