Process
How it works
A transparent, evidence-first workflow. Every authentication ships with the proof.
01
Intake
Submit high-resolution photos of your item through our secure portal — front, back, and detail shots of any distinguishing marks.
02
Photo Archive Search
Our analysts and matching engine cross-reference broadcast video, wire service, team and league photo archives.
03
Forensic Comparison
We map unique identifiers — stitch breaks, paint marks, scuffs, repairs — pixel-for-pixel to the source photography.
04
Letter of Authenticity
You receive a numbered tamper-evident LOA, a detailed photo report, hologram, and a permanent entry in our public registry.
