THE TECHNOLOGY

Four modules.
One pipeline.
Zero manual work.

From your portfolio URL to a court-ready evidence package — fully automated, cryptographically secured, and legally binding in 127 jurisdictions.

M1 → EXTRACTOR
M2 → DETECTOR
M3 → FILTER
M4 → LEGAL ACT
DATA FLOW
● LIVE PROCESSING
M1 — EXTRACTOR
Deep Portfolio Scan
Input: your portfolio URL
  • Crawls site 2 levels deep via asyncio + playwright
  • Computes 64-bit pHash for every image found
  • Extracts EXIF: camera serial, GPS, shoot date, lens
  • Supports local mode: USB drive or folder upload
  • Stores all signatures in encrypted SQLite database
asyncioplaywright64-bit pHashEXIFSQLite
M2 — DETECTOR
Global Infringement Search
Input: 64-bit pHash signatures
  • Visual search across major image search engines simultaneously
  • Stealth anti-fraud bypass: rotating proxies + fingerprint spoofing
  • Parallel browser instances for maximum throughput
  • Auto-resume after CAPTCHA checkpoint — zero data loss
  • HAR file capture: full HTTP request log per finding
stealth visual search proxy rotation HAR
M3 — FILTER
AI Commercial Scoring
Input: raw search results
  • 3-level filter: domain blacklist → TLD scoring → commercial triggers
  • OSINT agent: company registration, VAT, address, court history
  • Cross-engine pHash comparison (4 algorithms: pHash, aHash, dHash, wHash)
  • AI recovery forecast: probability and expected amount per infringer
  • Wayback Machine verification: when was the stolen image first seen?
OSINT 4× pHash Hamming AI scoring
M4 — LEGAL ACT
Court-Ready Evidence Package
Output: complete legal package
  • .docx legal act with SHA-256 digital seals on every file
  • MP4 screen recording of the violation discovery (1920×1080)
  • Blockchain timestamp on Ethereum mainnet — immutable proof of date
  • HAR file + WHOIS + Wayback Machine archive links
  • Accepted in 127 jurisdictions worldwide — no additional notarization
SHA-256 blockchain MP4 .docx
M1 — EXTRACTOR

Every pixel fingerprinted.
Every photo registered.

The Extractor crawls your entire portfolio, computing a unique 64-bit perceptual hash for every image. Unlike MD5 or SHA, pHash survives cropping, colour adjustments, watermark removal and compression.

  • 64-bit pHash — tolerant to JPEG artifacts, scaling, minor edits
  • EXIF extraction — camera serial, GPS coordinates, exact shoot time
  • Local mode — works offline via USB drive or local folder, no upload required
  • Speed — 847 images processed in under 4 minutes on standard hardware
PHASH FINGERPRINT · LIVE COMPUTING
pHash (64-bit)a3f2c8b1d9e4f071
Camera serialSony A7R V · #5073829104
GPS48.8566°N 2.3522°E
Shoot date2024-03-15 09:42:17
SHA-256 seala3f2c8...9d41e7f2
M2 — DETECTOR

Invisible to anti-fraud.
Visible to nothing.

The Detector runs parallel stealth browser sessions against every major image search engine simultaneously. It rotates proxies, spoofs browser fingerprints, and auto-resumes after any CAPTCHA block.

  • Parallel scanning — multiple search engines queried simultaneously
  • Stealth mode — rotating residential proxies, TLS fingerprint randomization
  • HAR capture — full HTTP log per match, admissible in court as network evidence
  • Coverage — 40+ image databases and search engines worldwide
LIVE SCAN · batch_04 SCANNING
Search engineYandex.Images
Proxy nodeDE-Frankfurt-04
Matches found18
HAR files captured18
› elegance-studio.com/gallery/spring ✓
› luxe-interiors.net/portfolio ✓
› scanning brandflow.agency...
M3 — FILTER

Only the cases
worth pursuing.

The Filter eliminates noise and focuses exclusively on commercial infringers with real recovery potential. The OSINT agent assembles a complete legal dossier on each one.

  • 3-level scoring — blacklist → TLD → commercial trigger keywords
  • OSINT agent — VAT/company reg lookup, registered address, director names
  • Court history — past IP cases, settlement rate, judgment enforcement record
  • AI forecast — recovery probability and expected amount based on 23,000+ case database
OSINT DOSSIER CONFIRMED
Company
Elegance Beauty
Studio Ltd
VAT
GB294712038 ✓
Court cases
0 lost
AI Forecast
78% settle
Commercial scoreHIGH ✓
Est. recovery£8,500
Hamming distance2 bits / 64
M4 — LEGAL ACT

Open the folder.
Everything's inside.

M4 assembles the complete court-ready package: a structured .docx legal act, screen recording, blockchain timestamp, HAR file, WHOIS data, and Wayback Machine snapshots — all SHA-256 sealed into an unbreakable evidence chain.

  • .docx legal act — court-formatted, with tables, hashes, screenshots, WHOIS
  • Video evidence — 1920×1080 MP4, SHA-256 sealed, showing discovery in real time
  • Blockchain notary — Ethereum mainnet TX, public, immutable, verifiable by anyone
  • 127 jurisdictions — accepted globally without additional local notarization
📷
Original · Registered
SHA-256: a3f2c8...9d41e7 · 2024-03-15
Violation Detected
elegance-studio.com · pHash 97% · 2026-04-18
🎥
Video Evidence · Recorded
MP4 · 2:34 · SHA-256: b7e1...c4d1
Blockchain Notarized
TX: 0x7f3a...c891 · Block #19847234 · 3 confirmations
📄
Legal Act · COURT READY
act_C4821.docx · 14 pages · SHA-256: c9d2...a2b1

Technical questions,
straight answers.

How accurate is pHash matching? Can it produce false positives?

We use 4 independent hashing algorithms simultaneously: pHash, aHash, dHash, and wHash. A match is only flagged when ALL four agree within a Hamming distance threshold. The probability of a simultaneous false positive across all four is less than 0.001%.

+
Are the blockchain timestamps legally valid in court?

Yes. Ethereum mainnet transactions carry a public, cryptographically verifiable timestamp. The immutability of blockchain records has been accepted as evidence in courts across the EU, UK, USA, Singapore, UAE, and 122 other jurisdictions.

+
What if an infringer removes the image before the scan completes?

M2 captures a HAR file, a timestamped screenshot, and a Wayback Machine snapshot URL at the moment of detection — before the video recording even starts. Even if the infringer deletes the image seconds later, the evidence package is already sealed and immutable.

+
How long does the full pipeline take from start to legal act?

For a portfolio of 500 images: M1 takes ~3 minutes, M2 takes 4–8 hours, M3 runs within minutes of each match, M4 takes under 2 minutes per case. Total: typically 6–12 hours from scan start to downloadable .docx legal act.

+
What happens if an infringer is in a country with weak IP laws?

We prioritise infringers by jurisdiction strength and commercial score. For difficult jurisdictions, we focus on cross-border mechanisms: DMCA takedown, GDPR-based demands, and targeting payment processors or CDN providers — which are almost always in enforceable jurisdictions.

+
GET STARTED

Ready to see it work
on your portfolio?

No upfront cost. No risk. We start scanning within 48 hours of your application.

Tweaks

Home How it works Partners Pricing Infringer Registry