Process

How it works

A transparent, evidence-first workflow. Every authentication ships with the proof.

01

Intake

Submit high-resolution photos of your item through our secure portal — front, back, and detail shots of any distinguishing marks.

02

Photo Archive Search

Our analysts and matching engine cross-reference broadcast video, wire service, team and league photo archives.

03

Forensic Comparison

We map unique identifiers — stitch breaks, paint marks, scuffs, repairs — pixel-for-pixel to the source photography.

04

Letter of Authenticity

You receive a numbered tamper-evident LOA, a detailed photo report, hologram, and a permanent entry in our public registry.