AU2021100984A4 - Data Science in Supply Chain Analysis using Blockchain Technology - Google Patents

Data Science in Supply Chain Analysis using Blockchain Technology Download PDF

Info

Publication number
AU2021100984A4
AU2021100984A4 AU2021100984A AU2021100984A AU2021100984A4 AU 2021100984 A4 AU2021100984 A4 AU 2021100984A4 AU 2021100984 A AU2021100984 A AU 2021100984A AU 2021100984 A AU2021100984 A AU 2021100984A AU 2021100984 A4 AU2021100984 A4 AU 2021100984A4
Authority
AU
Australia
Prior art keywords
data
custody
chain
block chain
supply chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021100984A
Inventor
Saravana Balaji B.
SaleemBasha M. S.
Mathiyalagan R.
Suganthi S. T.
Prabhu T. N.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Balaji B Saravana Dr
Original Assignee
Balaji B Saravana Dr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Balaji B Saravana Dr filed Critical Balaji B Saravana Dr
Priority to AU2021100984A priority Critical patent/AU2021100984A4/en
Application granted granted Critical
Publication of AU2021100984A4 publication Critical patent/AU2021100984A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/40Data acquisition and logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Databases & Information Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Our Invention "Data Science in Supply Chain Analysis using Blockchain Technology is a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation to final transfer or disposal. The invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and the through use of encryption key pairs and blockchain encryption technology an electronic document is created in an encrypted transaction log updated at each change of custody point. The invented technology is also a each such change of custody point the new custodians who receive the product are provided with the information generated by the originator. For example: because the system tracks all inputs and outputs to the system at each change of custody point any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified. The invented method and system to use a block chain infrastructure and smart contracts to monetize data transactions involving changes to data included into a data supply chain and the i describes a system and method to use smart contracts to monetize changes to data using a block chain infrastructure. The invention ia a system and method matches a data producer's data with a data buyer's specifications and enables micropayments for changed data responsive to observation of changes to data included into a data supply chain on a granular level. The implementation of block chain infrastructure for data transfer enables a new class of business methods that enables the maintenance of privacy of personal information while giving access to actionable data and implementing a fair and transparent market for data producers and data buyers to use redundant distributed ledgers of transactions on peer to peer networks. 20 MD. dm 10 1 Pr U7 3p i L? s 4 Xi

Description

MD.
dm 10 1 Pr U7
3p i L? s
4 Xi
Data Science in Supply Chain Analysis using Blockchain Technology
FIELD OF THE INVENTION
Our Invention is related to a Data Science in Supply Chain Analysis using Blockchain Technology and also relates to the field of asset and supply chain management and, more specifically, it relates to systems, methods, and processes used for ensuring the chain- of custody integrity of physical products as such products move along their respective supply chains. Such chain-of-custody integrity systems may be implemented and enhanced using aspects of blockchain encryption technology.
By way of one general example, the present invention teaches a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non repudiatable electronic log of each custody transfer at each transfer point from initial creation, manufacture, or registration all the way to final transfer, sale, use, or disposal. Through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log accessible at each change of custody point.
BACKGROUND OF THE INVENTION
Supply-chain, chain-of-custody, and asset integrity are age-old problems. But their importance has been growing as manufacturing has globalized, increasing the time, distance, and number of intermediaries between the originators of assets and the consumers of the assets. Furthermore, as production has consolidated, the volume and value of products traversing complex supply chains has increased their appeal as targets for counterfeiters, gray marketers, and terrorists. Given such consolidation and globalization of production and distribution, it has become increasingly difficult to understand or simply know the provenance of many products produced and distributed outside of a single location. By way of example, one effect of this problem within the electronics and software industries, is that several U.S. defense contractors will not allow products manufactured in certain countries into their data centers because of the potential risk that certain instructions (e.g., software, firmware, or other embedded instructions) may be hidden in the devices that may be part of an advanced persistent threat to exfiltrate confidential or proprietary data from the contractor and/or U.S. defense systems.
In the pharmaceuticals industry, the problem of counterfeit or compromised medications has prompted the enactment of the Drug Supply Chain Security Act ("DSCSA"). The DSCSA requires the serialization of medication packaging as well as the use of transaction documents in order to identify items in transit, using the U.S. National Drug Code, and to identify packaging lot and quantity of the pharmaceutical. Certain problems and issues faced in maintaining the integrity of a supply chain and the validation of the provenance of any product in the chain include:
1. Even where a product is serialized, a counterfeiter may nonetheless create products with duplicate serial numbers. Once created, the counterfeit products may be difficult to distinguish from the authentic products because both are marked with the same serial numbers. Any delay in determining the validity of the product may result in the counterfeit products entering the market and, in the case of pharmaceuticals, create a significant public health risk.
2. If authentic and legitimate products are surreptitiously diverted from the manufacturer's facility or the supply chain, such diversion may still take many weeks or months before the improper theft and sale of the gray-market products are discovered.
3. Similarly, if authentic and legitimate serialized packaging is surreptitiously diverted from the manufacturer's facility or the packaging supply chain, such diversion may take many weeks or months before the stolen or diverted packaging or products is discovered.
Moreover, the contents of these diverted packages may not be legitimate or authentic, which again, in the case of pharmaceuticals, could create a public health risk.
4. Where products are serialized, but not centrally registered, a counterfeiter may be able to create authentic-looking counterfeit packaging with his or her own serial numbers. It may be difficult for a downstream distributor, retailer, or end user to identify such counterfeit packaging or products, and/or verify the product serial numbers. At each supply chain point, each party would be required to separately contact the manufacturer to determine if the number on the product or package is a valid and authentic number. Even with such confirmation of the serial number by the manufacturer, the issue of duplicate serial numbers described under point 1 above still exists.
5. If products or packaging are not serialized, there is very little that can be undertaken to verify authenticity of the products or packaging other than possibly destructive testing. One scenario that has occurred in the pharmaceutical industry is where bad actors obtain or procure legitimate product and then dilute such product in order to increase or multiply the amount of the product to be distributed and sold.
To date, there is no comprehensive solution to these several supply chain integrity problems (including counterfeit products, gray market products, diluted or tainted products, and the creation and use of fabricated and improper transfer documentation) that has achieved market recognition or acceptance.
The present inventive system leverages aspects of encryption technology (such as blockchain technology - which is the technology that underlies Bitcoin and other crypto currencies) to create and maintain a secure chain-of-custody log to address these problems. More particularly, the log uses encryption to associate specific individuals or entities with the assets in their respective custody in a manner that allows for the custodian identity to be kept private. It further allows for these custodians (which may include manufacturers, miners, creators, or their downstream partners) to register products and to record the transfer of custody transactions at each change of custody point. The innovative system further may use techniques such as proof- of-work and proof-of-stake to append transactions to the log. These techniques create a distributed assurance in the integrity of the transaction log, including recording every time that the asset custody changes, with each such appended transaction being included in the encrypted transaction log. One current example of relevant encryption technology that provides certain of the required capabilities for such a system, is blockchain technology.
While there is substantial prior art on the use and application of blockchain encryption technology, most of the known prior art uses the blockchain technique merely to encrypt and decrypt documents. For example, seminal U.S. Patent No. 4,309,569, for ^Method of Providing Digital Signatures by Merkle, teaches a method of providing a digital signature for purposes of authenticating a message, using an authentication tree function of a one way function of a secret number. Nothing in Merkle shows a particular application of the technology disclosed, and shows no application to asset or chain-of-custody integrity.
Similarly, U.S. Patent No. 8,744,076, for a Method and Apparatus for Encrypting Data to Facilitate Resource Savings and Tamper Detection by Youn, discloses a method for generally preventing the tampering of encrypted data. The '076 patent more specifically focuses on the particular encryption technology used, and not on the application of such technology.
One application of blockchain technology is, as described above, used for the creation, maintenance and administration of cryptocurrencies such as Bitcoin. However, the use of blockchain technology in Bitcoin, and in other blockchain based cryptocurrencies, is to create virtual currencies that have no physical form and are not controlled or valued by a central authority. By comparison, the currently described system and methodology is specifically used to monitor, record, and ensure the integrity of physical supply chain products.
A different disclosure relating to chain-of-custody security is Patent Cooperation Treaty application PCT/CA2014/050805 (WO 2015024129) for a Method to Securely Establish, Affirm, and Transfer Ownership of Artworks, by Mc Conaghy, et al. While the '805 application addresses the integrity of the transfer of physical objects, it does not use any blockchain encryption technology, nor does it create any chain-of-custody log. Instead, the'805
methodology merely links ownership of a work of art to an electronic account such as an email address or a Bitcoin address. While the '805 application does reference the Bitcoin master ledger, that Bitcoin ledger pertains only to the transfer of Bitcoins and does not provide any detailed information about the artwork, including product description, quantity, serial numbers, or other important records.
There are other disclosures that provide a description of or use data integrity checking.
However, none appear to use blockchain encryption. For example, U.S. Patent Application Serial No. US 10/522,794 for a System and Method to Provide Supply Chain Integrity, by Pretorius, et al. creates an integrity index based on deviations from "normal behavior in the chain." There is no reference or suggestion of use of any blockchain software or technology within the '794 application. Similarly, U.S. Patent No. 8,714,442 for a System for and Method of Securing Articles Along a Supply Chain, by Sharma, et al. merely authenticates products in a supply chain that have an assigned serial number or some other type of identifier. More specifically, the '442 patent discloses the authentication of products "from the captured identification information at each point" along the supply chain, but does not use or suggest the use of any blockchain software as part of that authentication process.
Further, with respect to supply chain monitoring, U.S. Patent No. 9,015,812, for
Transparent Control of Access Invoking Real-Time Analysis of the Query History, by Hasso Plattner and Matthieu-Patrick Schapranow, describes a method for granting access to a repository for use in a supply chain, a product tracking system, a medical care environment or a power grid, a repository storing data, the data being sensitive business data pertaining to one or more supply chains, event data pertaining to one or more traceable products, medical data pertaining to one or more patients, or measurement data pertaining to one or more measurements, and wherein an access control server (ACS) is connected to the repository via a link. There is no reference to or suggestion of use of any blockchain technology or encryption technology.
Accordingly, there is a compelling need for new systems, processes and methodologies for ensuring the chain-of-custody integrity of physical products as such products move along their respective supply chains. Such chain-of-custody integrity systems may be implemented and enhanced using aspects of blockchain encryption technology. The present invention recognizes the deficiencies and drawbacks of the current supply chain systems, and the prior attempts to address some of the problems and weaknesses of supply chain integrity. The present innovative system, process and methodology incorporates blockchain software technology to address this challenge and resolve several of the flaws inherent in the current systems and processes.
PRIOR ART SEARCH
W02001035253A1*1999-11-082001-05-17Usertrust, Inc. Legal-based or fiduciary based data management process US20010042050A1*2000-01-052001-11-15Procure.Com Inc. Secure electronic procurement system and method US20020046346A1 *1996-09-272002-04-18Evans Jae A. Electronic medical records system US20030074556A1*2001-10-172003-04-17Chapman Charles B. Chain of custody system and method US20040252053A1 *2003-06-132004-12-16Harvey A. Stephen Security system including a method and system for acquiring GPS satellite position
US20050149739A1*2003-12-312005-07-07Hewlett-Packard Development Company, L.P.PIN verification using cipher block chaining US7181017B1*2001-03-232007-02-20David FelsherSystem and method for secure three-party communications US20080133295A1*2006-12-012008-06-05Acupay System LlcDocument processing systems and methods for regulatory certifications US20150205929A1*2014-01-232015-07-23Dror Samuel BramaMethod, System and Program Product for Transferring Genetic and Health Data CN105630609A *2016-02-242016-06-01 Block chain packing and storing method CN105809062A*2016-03-012016-07-27 Contract construction and execution methods and apparatuses CN105893042A*2016-03-312016-08-24 Intelligent contract implementation method based on block chain US20160261690A1*2015-03-022016-09-08Dell Products L.P.Computing device configuration and management using a secure decentralized transaction ledger US20160261685A1*2015-03-022016-09-08Dell Products L.P.Deferred configuration or instruction execution using a secure distributed transaction ledger
OBJECTIVES OF THE INVENTION
1. The objective of the invention is to a system for tracking and recording the chain of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation to final transfer or disposal. 2. The other objective of the invention is to the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and the through use of encryption key pairs and blockchain encryption technology an electronic document is created in an encrypted transaction log updated at each change of custody point. 3. The other objective of the invention is to each such change of custody points the new custodians who receive the product are provided with the information generated by the originator. For example: because the system tracks all inputs and outputs to the system at each change of custody point any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified. 4. The other objective of the invention is to block chain infrastructure and smart contracts to monetize data transactions involving changes to data included into a data supply chain and the i describes a system and method to use smart contracts to monetize changes to data using a block chain infrastructure. 5. The other objective of the invention is to system and method matches a data producer's data with a data buyer's specifications and enables micropayments for changed data responsive to observation of changes to data included into a data supply chain on a granular level.
6. The other objective of the invention is to block chain infrastructure for data transfer enables a new class of business methods that enables the maintenance of privacy of personal information while giving access to actionable data and implementing a fair and transparent market for data producers and data buyers to use redundant distributed ledgers of transactions on peer to peer networks.
SUMMARY OF THE INVENTION
The present invention overcomes the disadvantages of the prior art and fulfills the needs described above by providing systems and methods for ensuring the integrity of an asset supply chain through creation and use of an electronic chain-of-custody data file where such data file uses encryption technology to record and maintain relevant transaction information.
A preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of-custody data file, and the data file being built upon encryption technology to record and maintain asset chain-of-custody transaction information. Another preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of- custody data file, and the data file built upon encryption technology to record and maintain asset chain-of-custody transaction information, wherein the encryption technology is blockchain technology. A further preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of-custody data file, and the data file being built upon encryption technology to record and maintain asset chain- of-custody information, wherein the system creates a non-repudiatable log of each custody transfer from asset generation, manufacture, or registration to and through asset final transfer, sale, use or disposal.
Another embodiment of the invention is a computerized system for ensuring integrity of an asset supply chain, said system creating and using an electronic chain-of-custody data file using encryption technology to record and maintain asset chain-of-custody information, said system comprising (a) at least one computer server; (b) a plurality of terminals, each of said plurality of terminals being associated with at least one of a plurality of agents along said supply chain; (c) a software application operating on said at least one computer server; wherein said at least one computer server operates a methodology comprising the steps of (i) registering each of said plurality of agents within said software application; (ii) providing a unique encrypted identifier to each said registered plurality of agents; (iii) registering an asset by an initial agent, said registration including descriptive metrics of said asset; (iv) encrypting an identity of said asset and said initial agent into a non-repudiatable log; (v) registering acceptance of said asset by a new agent, at each change of custody of said asset, said subsequent registration including descriptive metrics of said asset; and (vi) adding a record of such registration acceptance to said non-repudiatable log.
Still another embodiment of the disclosed invention is a methodology for ensuring integrity of an asset supply chain, said methodology creating and using an electronic chain-of- custody data file using encryption technology to record and maintain asset chain-of-custody information, said methodology comprising the steps of (a) registering each of said plurality of custodians within said software application; (b) providing a public/private key pair to each said registered plurality of custodians; (c) registering an asset by an initial custodian, said registration including descriptive metrics of said asset; (d) at each change of custody of said asset, said new custodian registering acceptance of said asset, said subsequent registration including descriptive metrics of said asset; (e) at each change of custody of said asset, generating at least one report transmitted to the prior and new custodian to confirm a change in custody of said asset; and (f) generating further reports transmitted to at least one member of said supply chain, said reports including relevant administrative information.
BRIEF DESCRIPTION OF THE DIAGRAM
FIG. 1 is a block diagram illustrating various components in accordance with one embodiment of the present invention focusing on API's and Dapp's. FIG. 2 shows a flow diagram representing exemplary processing implementing the invention focused on the relationships between devices of data producers, data buyers and the block chain. FIG. 3 diagrams the method steps and processes to build and implement a Smart Contract for changes in values of a DIP.
DESCRIPTION OF THE INVENTION
For purposes of clarity in this relatively new discipline within electronic commerce; perhaps most closely related to USPTO art group 3625, the following definitions of terms for this invention are offered. The definitions are by no means exhaustive, but will enable the examination process for this and other art related to the block chain to evolve appropriate and consistent definitions and terms.
DIP-(as in U.S. Pat. No. 8,862,506) necessary and sufficient identifying information coupled with a question and an answer, the answer being the value component inserted at the intersection of a row and column in a tabular data set. While the row and column labels and the necessary and sufficient identifying information is constant for a given DIP, the value component is not. The entire DIP with the change in the value component is the necessary and sufficient monetize able unit a data producer sells and a data buyer purchases. The term "DIP" is closely related to a "datum," a term that describes a single piece of information.
Data buyer-an entity that purchases a dataset of a series of DIPs and at least one change in the value component associated with a DIP.
Data producer-an entity that posts changes to a value component associated with a DIP. Data producers may be individuals who post changes in to value components associated with a DIP as well as devices participating in the internet of things that transmit changes to data as they occur in real time or are registered as changes via scheduled scans and other actions performed by the devices in the course of their operation. Examples of data producers are scientific researchers, detection equipment and sensors, transaction registers like ATM's, card readers, and so forth.
Dapp (largely taken directly from an Ethereum blog post by Stephen Tual). This is a decentralized application that consists of two parts: a frontend, written in HTML or QML, and a backend or data set linked to the frontend.
The frontends of Dapps have full network access, and CDNs are accessible. Developing a frontend for a Dapp written HTML is similar to developing a website that can enable reactive programming through callback functions.
Because the block chain infrastructure-(in this case Ethereum) relies on cryptographic principles to function, every Dapp knows the pseudonymous identity of each user, thus bypassing a need for 'accounts' or 'logons', functioning like openID by default, everywhere."
The block chain infrastructure enables backend operations to be validated by all nodes on the network, meaning that a backend will always will do what its code says it does.
Prepared data-data a data producer configures to meet the criteria of a data buyer, such as the labels for a rows and columns and the format for the value component entered for a DIP. An examples of prepared data is a Column labelled "A" (any term), a row labelled "B" (any term that is not A) and a value component that is often related to a measurement, but may also be any term that changes as data is accumulated about it. Values of value components will commonly be in a numerical form, but can vary according the measurement criteria. Art for associating value components with their data item pair is commonly reflected by survey research tools and other research protocols. A value component can have represented by any alphanumeric text, including Boolean indicators and scaled markers.
Data supply chain-The set of data producers and data buyers who trade or exchange a common set of DIPs, usually for micro-fees. Usually there is a mechanism for both data producers and data buyers to join a data supply chain and identify the DIPs they are willing to insert into the data supply chain. Devices of data producers and data buyers are commonly linked together for real time streaming and transfer of data. A feature of a data supply chain that offers a unique advantage is that disparate data producers can feed DIPs to a data buyer. The data buyer can bypass traditional data analytics and, instead, evolve formulas and triggers to be applied to data as it is streamed to the data buyer to automate further server actions and notifications when threshold values for the triggers are attained. The data supply chain has been called "an engine to leverage distributed 'small' data."
Block chain (derived from the en. bitcoin.it.wiki) "A block chain is a transaction database shared by all nodes participating in a system based on the original Bitcoin protocol. A full copy of a block chain contains every transaction ever executed on the chain. With this information, one can find out how much value belonged to each address at any point in history.
Every block contains a hash of the previous block. This has the effect of creating a chain of blocks from the genesis block to the current block. Each block is guaranteed to come after the previous block chronologically because the previous block's hash would otherwise not be known. Each block is also computationally impractical to modify once it has been in the chain for a while because every block after it would also have to be regenerated. These properties are what make double-entries of transactions very difficult.
Generators of a new block build onto an existing block by referencing it in the block they generate and the block they reference must be the latest block in the longest valid chain. A chain is valid if all of the blocks and transactions within it are valid, and only if it starts with the genesis block.
For any block on the chain, there is only one path to the genesis block. Coming from the genesis block, however, there can be forks. One-block forks are created from time to time when two blocks are created just a few seconds apart. When that happens, generating nodes build onto whichever one of the blocks they received first. Whichever block ends up being included in the next block becomes part of the main chain because that chain is longer. More serious forks have occurred after fixing bugs that required backward incompatible changes.
Blocks in shorter chains (or invalid chains) are not used for anything. When the bitcoin client switches to another, longer chain, all valid transactions of the blocks inside the shorter chain are re-added to the pool of queued transactions and will be included in another block. The reward for the blocks on the shorter chain will not be present in the longest chain, so they will be practically lost, which is why a network-enforced 100-block maturation time for generations exists.
Because a block can only reference one previous block, it is impossible for two forked chains to merge.
Block chain ledger-a ledger replicated on multiple devices with persistent memory storage through a peer to peer network where each posting to the ledger is subjected to verification and authentication by users of the block chain according to configurable criteria set by the users or administrators of the block chain. Commonly 51% of the users who access a given posting and do not object to it will satisfy the transactional rules for the posting to be implemented. The transactional rules are embodied in smart (mini computer programs) contracts. Postings carry Public keys of the users of the block chain. The private keys of the users of the block chain are linked to the public keys, but remain off the block chain ledger and are known only to the holder of the private key.
Smart contracts- (from Wikiwand.com) "computer protocols that facilitate, verify, or enforce the negotiation or performance of a contract, or that obviate the need for a contractual clause. Smart contracts usually also have a user interface and often emulate the logic of contractual clauses. Proponents of Smart Contracts claim that many kinds of contractual clauses may thus be made partially or fully self-executing, self-enforcing, or both. Smart contracts aim to provide security superior to traditional contract law and to reduce other transaction costs associated with contracting."
Privacy- (from Wikiwand.com) "Privacy concerns exist wherever personally identifiable information or other sensitive information is collected and stored-in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as:
1. Healthcare records 2. Criminal justice investigations and proceedings 3. Financial institutions and transactions 4. Biological traits, such as genetic material 5. Residence and geographic records 6. Ethnicity 7. Privacy breach 8. Location-based service and geolocation
The challenge in data privacy is to share data while protecting personally identifiable information. The fields of data security and information security design and utilize software, hardware and human resources to address this issue.
Encrypted keys are often used to increase the likelihood data will remain 'private'."
Public and private encrypted keys-(from Wikiwand.com) "It is computationally easy for a user to generate a public and private key-pair and to use it for encryption and decryption. The strength lies in the "impossibility" (computational impracticality) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security. Security depends only on keeping the private key private. Public key algorithms, unlike symmetric key algorithms, do not require a secure channel for the initial exchange of one (or more) secret keys between the parties.
Because of the computational complexity of asymmetrical encryption, it is typically used only to transfer a symmetrical encryption key by which the message (and usually the entire conversation) is encrypted. The symmetrical encryption/decryption is based on simpler algorithms and is much faster.
Message authentication involves hashing the message to produce a "digest," and encrypting the digest with the private key to produce a digital signature. Thereafter anyone can verify this signature by (1) computing the hash of the message, (2) decrypting the signature with the signer's public key, and (3) comparing the computed digest with the decrypted digest. Equality between the digests confirms the message is unmodified since it was signed, and that the signer, and no one else, intentionally performed the signature operation-presuming the signer's private key has remained secret to the signer.
Widget-(from Wikiwand.com) "downloadable applications which look and act like traditional apps but are implemented using web technologies including JavaScript, Flash, HTML and CSS. Widgets use and depend on web APIs exposed either by the browser or by a widget engine
" A typical embodiment enables a data producer to monetize at least one change to data linked to a peer to peer network having a block chain infrastructure provided the data producer has linked at least one Smart Contract to enable postings to a block chain infrastructure. The data producer prepares data for posting to the ledger of a block chain according to terms and specifications of a Smart Contract. Data is typically posted by code activation within the Smart Contract in real time as the data changes on an electronic device accessible to the data producer and the Smart Contract. Activating the Smart Contract generates and encodes the encrypted key of the data producer and encodes the changed data into the key.
Another operation within a Smart Contract, or an operation enabled by a separate Smart Contract, posts samples of prepared data that can be accessed via the block chain ledger by a prospective data buyer using an encrypted key accessible to the prospective data buyer. Included into a Smart Contract are terms for pricing and fees for one or more changes to the prepared data, computer readable instructions for utilizing the block chain to implement digital currency transactions according the pricing or fee terms, and computer readable instructions for generating a message or series of messages regarding the transaction from a data producer to a data buyer and vice versa. The data producer and the data buyer both have unique encrypted keys.
Also included and encoded into a Smart Contract are computer readable instructions to post one or more changes to the prepared data to the public ledger of the block chain. In order to facilitate agreement to sell changes to data, actual data of a data producer is anonymized prior to exposure to a prospective data buyer. The data buyer then evaluates the anonymized data and offers a price or fee a change to a value component of at least one DIP in the anonymized exposed samples of the prepared data.
In a typical embodiment a key is generated by the data producer invoking the Smart Contract to automate a post a sample of prepared data of a data producer to the public ledger of the block chain for any prospective data buyer to view. In a variant of the typical embodiment an encrypted key is shared with a prospective data buyer via the block chain. The prospective data buyer then uses the key to link to and view a confidential sample of prepared data external to the block chain. Another variant is a data producer posting onto a web page or other internet enabled display a sample of the prepared data for a prospective data buyer to evaluate along with the data producer's contact information. Yet another variant is for a data producer to expose or post anonymized data to a search engine Prepared data, whether embedded into an encrypted key on the block chain or linked via a key readable on the block chain to link to a post of the prepared data external to the block chain, includes options for the prospective data buyer to select demographic and other information to be included into encrypted keys by the data producer via activation of a Smart Contract along with at least one change to at least one value component of a DIP included into the agreement for sale of the data by the data producer to the data buyer.
A typical embodiment also can be driven by the data buyer. In this embodiment the data buyer provides a data producer a computer readable program, an API, a smart QR code, or a smart RFID tag to link the data producer to a Smart Contract. Typically, this occurs at a point of payment for at least one of a product, a service, and an information resource. The link enables the data producer to install and activate the Smart Contract provided by the data buyer upon at least one processor on at least one electronic device of the data producer. Smart contract terms in some embodiments include permission to decrypt data if the data is held by a third party.
Block chain infrastructure and Smart Contracts can be developed and applied in a variety of way to facilitate an open market for data, always including use of the public ledger of the block chain infrastructure to verify and authenticate transactions. An example is an embodiment that is directly converts a posted change of a value component of a DIP as prescribed by a Smart Contract into a unit of digital currency.An embodiment can use a block chain to build a digital currency infrastructure in which a Smart Contract is used to establish parameters for and create links to a data producer's data set, a data producer's digital address, a DIP within the data set, a format for the value of a DIP value component, and a link to a data buyer's digital address.
Embodiment that leverage the block chain will enable an electronic device to be configured to hash at least one DIP or data field with a value component associated with the data field to link to a data producer's digital address; configure an electronic device to encode and decode the DIP and the value component into a format that enables transactions to be processed according to terms of a Smart Contract; configure an electronic device to enable queries of data to be performed on it according to terms of a Smart Contract, and configure an electronic device to enable messaging regarding transactions according to terms of a Smart Contract. Embodiments can include one device or several devices into the configuration schema.
One device associated with an embodiment will host a computer-readable storage medium housing an executable program for the program to instruct linked devices to access a system having a block chain infrastructure to create at least one data producer address and at least one buyer address, prepare changed data upon said one or more electronic devices for transfer according to terms of at least one Smart Contract, and transfer the changed data to a block chain infrastructure while retaining links between the data, the data producer address, and the buyer address. Encrypted keys in embodiments as generated by Smart Contracts will carry necessary and sufficient information for all users of the business system and method to perform their functions in the transactional schema of the invention. The executable program will also enable a user of the business system and method to use the block chain infrastructure to implement digital currency transactions and distribute messages according to terms explicated in a Smart Contracts. In some embodiments, the user of the executable program will be enabled to transfer fees and funds to a third party. In some embodiments, the user of the executable program will be enabled to halt implementation of a current Smart Contract and reconfigure the terms of the Smart Contract for a data buyer to accept or reject.
Data supply chains can provide significant benefits to charitable and non-governmental organizations. Some embodiments of the invention are intended to be implemented as a public service when a data producer designates an entity to be the beneficiary of a Smart Contract that links a data set and the changes to value components of DIPs.
Embodiments of the invention for data supply chains that use block chain infrastructure enable the owner of devices to use the internet of things to post changes to values of DIPs to the block chain. Wi-Fi chip sets, such as the esp8266, enable an owner of any electronic equipment or appliance to use a simple interface to configure the chip sets to link an electronic sensor, appliance, or device into the IoT by attaching a Wi-Fi chip set to it. When a Wi-Fi chipset is folded into the invention, a local device with data storage and processing capability accepts transmissions from the connected electronic equipment or appliance of DIPs and changes to DIPs. The data storage and data processing enabled device, if linked to a Smart Contract via a Dapp, implements terms of the Smart Contract and monetizes the data supply chain.
If an owner of IoT devices and devices enabled to perform as IoT devices attaches and connects a Wi-Fi chip set to link via a Wi-Fi transmission protocol to at least a host device, a data producer can implement a smart contract with a data buyer by transmitting data to be posted into the block chain ledger. The process is automated and invokes the smart contract and implements its terms. In effect, this is M2M monetization. The device owner's host processor can tag transmission of data from the IoT device in real time and the messaging and payment terms in the smart contract can be implemented, even running in background.
FIG. 1 is a block diagram of a data producer and a data buyer using API's and Smart Contracts to implement method steps of the invention.
The first oval (FIG. 1.1) illustrates the method of the invention using a block diagram focused on data producer API's. These API's will interaction with the FIG. 1.2 oval focused on Smart Contracts. The FIG. 1.3 oval is focused on API's of the data buyer. API's are labelled with a letter to tag them to a descriptor of their functions and outputs. Embodiments can use all of the API's or just some of them. The API's can also be linked together by additional code or integrated with one another into a larger body of code. It is expected that API's that implement the embodiments will vary according to the terms of the Smart Contract. Some API's will be more crucial or central to operation of the method. The group of API's labelled in FIG. 1.1 and FIG. 1.3, while not necessarily exhaustive, will be included into most embodiments.
* .A. API for data producers to tag DIPs on a producer's device. * 1.B. API to capture changes to DIPs from a data producer's devices, appliances, and equipment (including lot). * 1.C. API for a data producer to post changes to DIPs to storage services and utilities.
S1.D. API to enable enrollment of both data producers and data buyers into a data supply chain. • .E. API to link a data producer to a social network for communicating with members of the social network regarding data available for trading and data members of the network desire to be captured and traded. S1.F. API to link a data producer to a communication method such as email, or instant messaging or the messaging services offered via a block chain infrastructure to communicate terms for trading a change to a DIP. • 1.G. API to link a data producer to a triggering utility to initiate transmission of changes to a DIP and posting of the changed value of the DIP to a block chain infrastructure in accordance with a Smart Contract. The triggering utility customarily includes a formula builder and a method to identify fields within a dataset to include into one or more formulas. The utility also may include methods to link datasets together for more complex formula building. While a given device, such as an IoT device will generate a change to DIP as a single unit without the DIP necessarily being associated with a dataset, many data producers will have devices or possess the ability to identify or generate multiple changes to data items to load into datasets that can be used as components of a triggering formula and thus multiple changes to a DIP. When the triggering formula of the triggering utility is activated, there is a high probability a change in a DIP or a change in a series of DIPs will be generated. S1.H. API for a data producer to generate a Smart Contract. There are already a multiplicity of Smart Contract generation utilities and any of these can be provided to a data producer to establish his Smart Contract. S1.IAPI for a data producer to trigger transmission of changes to DIPs without invoking or using a triggering utility, S1.J. API to observe changes to DIPs in a storage component on Wi-Fi linked devices and hard wired devices to invoke implementation of the terms and conditions of a Smart Contract without the intermediation of a data producer or other devices of a data producer. This direct transmission and posting of the change to a DIP to the block chain infrastructure will, in some instances even bypass the need for a storage component. Periodic or scheduled or triggering criteria built into an IoT device or an electronic device with a Wi-Fi chip set in these cases can be automated.
FIG. 1.2 oval for is Smart Contract design, implementation, and propagation. The oval is simply to indicate that K-N are part of the process for Dapps. A Dapp is an application specifically designed to interact with a block chain infrastructure and fold these into and generate Smart Contracts. Dapps and Smart Contracts are integral to one another. A Dapp specifies in computer readable form the relationship and of a data producer and a data buyer using the block chain infrastructure as the intermediary.
• 2.A. Dapp to implement data producer and data buyer pricing agreements into a Smart Contract. • 2.B. Dapp to link data producers and data buyers to a Smart Contract. • 2.C, Dapp to link DIPS and changes to DIPs to data producers and data buyers. • 2.D. Dapp to communicate Smart Contract activities of block chain postings, actions, and events to data producers and data buyers. * [0111]
FIG. 1.3 illustrates API's commonly used in embodiments by the Data Buyer;
* 3.A. API for Data Buyer to Search for DIPs of Interest * 3.B. API for Data Buyer to View Data * 3.C. API for Data Buyer to Specify Interest and Fees for changes to a DIP * 3.D. API for Data Buyer Communicate Terms for changes to a DIP
The rounded rectangle in FIG. 1.4 is for an API that functions differently from the other API's of a data producer because it links to the implementation of the Smart Contract and use of the block chain infrastructure. The arrows for the other API's associated with the FIG. 1.1 oval are not necessarily linked externally to the data producer or his devices. Also the API's linked to the oval of FIG. 1.3 are associated with the data buyer and his functions for his devices.
FIG. 2. is a block diagram of the system involving data producer and data buyer devices focused on smart contract implementation using data producer and data buyer devices. Devices linked to the block chain observe transmissions and invoke the Smart Contracts when criteria within the transmission are met.
The first oval, FIG. 2.1, represents the data producer's set of devices associated with a smart contract (called "X"). The second oval, FIG. 2.2, represents the block chain infrastructure and the network of peer to peer linked devices that implement the block chain. The third oval, FIG. 2.3 represents the set of devices associated with a data buyer and linked to the same contract as the data producer (called "X").
FIG. 2.1 shows the data producer devices with a smart contract and their relationships. Representative devices are:
• 2.1A. Workstations • 2.1B. IoT devices • 2.1C. Sensors • 2.1D. Web servers • 2.1 E. Equipment and appliances with Wi-Fi chipsets
FIG. 2.2 shows the block chain and peer to peer network devices linked to the block chain in which the smart contract is treated as a component that directs transmission to the block chain and between data producers and data buyers. Representative transmissions are:
• 2.2F. Device hosting a smart contract observes transmissions • 2.2G. Data transmission devices connected to the block chain • 2.2H. Data transmission services connected to devices linked to the block chain • 2.21. Data transmission and reception devices linked to a data producer or a data buyer
FIG. 2.3 shows how the data buyer's devices operate as mediated through a smart contract:
• 2.3J. Workstations S2.3K. Web servers S2.3L. Data aggregation servers S2.3M. Data storage and analytic devices
A note on FIG. 2 explains that devices linked to the block chain observe transmissions and invoke the smart contracts when criteria are met.
Method steps and processes for Smart Contract design, negotiation and implementation is illustrated in FIG. 3. The first stage illustrated by 3.1 is for the data producer to enable discovery of data he is willing to trade and to update. To enable this, the producer posts the dataset, or at minimum a description of the dataset to a searchable data store discoverable via a web search or by common active marketing activities, such as email messages to targeted potential data buyers, advertisements, and so forth. Those skilled in marketing will use tools available to marketers. The data buyer will typically discover a dataset of interest to him via search, but those skilled in the art will use business to business and other methods to inform both parties that there is a dataset that may be of interest. The stage for 3.2 is for the data producer and data buyer to agree to terms for a smart contract. In stage 3.2 the data items, the kinds of changes to data items, the scheduling of transmissions upon changes, and other operational choices are made and agreed to. In stage 3.3 the financial portion of the smart contract is determined. The data producer and data buyer agree to fees and prices and payment terms for the originating dataset itself as well as for the changes to values of data items to be posted to the block chain infrastructure by the data producer. Micropayments, digital and hard currency transactions, and other payment or reward methods for the dataset and the changes in values of data items are folded into the smart contract. In stage 3.4 the data buyer is notified of pending transmission and consequent transactions and will, in some embodiments, be given an opportunity to interrupt the implementation of the smart contract, renegotiate the terms of the contract, and discontinue the contract. In stage 3.5, the data producer is notified of payments and micropayment and, in some embodiments, is enabled to renegotiate the terms of the smart contract.
FIG. 3.A focuses on the actions and processes implemented by the data producer. 3.Aa is the data producer identifying the dataset for inclusion into the data supply chain. 3.Ab is the data producer posting data samples, descriptions, to a searchable data store for evaluation by a prospective data buyer. A variety of methods to communicate the structure and content of the data will be accessible to a data producer in embodiments constructed and configured by those skilled in the art of data display and characterization.
When the data producer engages with a dataset, as in 3Ac, the engagement typically takes two forms. In 3Ac.1 the data producer manually changes a value associated with a DIP in a dataset. This kind of activity is common where the data producer is a researcher or manages data entry into documents forms and tables in the course of doing business. In some business processes, manual or human initiation of data entry is still performed, such as inventory managers and customer service representatives updating files. Embodiments including these business methods will commonly use a triggering formula to evaluate when a change to a DIP to be traded is made and thus initiate transmission in accordance with the smart contract's terms. In 3Ac.2 a device or sensor makes a change to a value.
3.Ad addresses the data table itself. To illustrate the package of data posted to the block chain, 3.Ad includes the typical structure of a DIP in a typical embodiment; 3Ad# shows how the column label and the row label and the value where the row and column intersect; 3.Ad## shows the additional context for the DIP, such as the demographic identifiers; and 3Ad### shows the context of the dataset the DIP is extracted from. 3.Ad and the context are configured according to the smart contract. A person of ordinary skill in the art will readily understand that variations of embodiments will includes more or less demographic and other identifying information to post to the block chain ledger. The context of the DIP is included with a value change and is encoded into the encryption key transmitted to the block chain infrastructure. Context is variable, but in all embodiments will carry necessary and sufficient information about the table to enable the key, upon decryption, to point to a particular data item referenced in a smart contract and common to both the data producer and the data buyer. 3Ad.1 shows the transported change to a value associated with a DIP.
3B. illustrates the data buyer's participation in the process. In 3Ba the data buyer links data on the data buyer's device to a DIP identified in a smart contract. In 3Bb, computer readable code on the device of the data buyer "reads" the encrypted key with the data value changes in the DIP and posts them into the relevant data table of the data buyer and the device of the data buyer initiates or triggers server actions and events upon confirmation of changes to data values for DIPs of the data buyer. The server actions and events include enabling financial exchanges and other actions according to the terms of the smart contract.
3C. illustrates how the smart contract generated by a data producer and data buyer is folded into 3C.1the block chain infrastructure to enable 3C.2 micro payments for a change to a value of a DIP authorized by a smart contract and 3C.3 implementation of other smart contract terms
It will be evident to those of ordinary skill in the art of the invention that variation in embodiments will be common. The essential processes and methods and use of a system of devices will, however, be common to all embodiments. Integration of smart contracts and block chain infrastructure is in its early stages as is the IoT. The data supply chain is also in early stages. The art explicated herein to combine the immediate real time benefit in risk reduction and opportunity identification of the data supply chain with smart contracts using block chain infrastructure for micropayment via digital currencies creates an opportunity for a new class of business methods. This new class will offer significant benefits in enabling the maintenance of privacy of personal information while giving access to actionable data and implementing a fair and transparent market for data producers and data buyers to use redundant distributed ledgers of transactions on peer to peer networks for their individual and social purposes.

Claims (7)

WE CLAIM
1. Our Invention "Data Science in Supply Chain Analysis using Blockchain Technology is a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation to final transfer or disposal. The invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and the through use of encryption key pairs and blockchain encryption technology an electronic document is created in an encrypted transaction log updated at each change of custody point. The invented technology is also a each such change of custody point the new custodians who receive the product are provided with the information generated by the originator. For example: because the system tracks all inputs and outputs to the system at each change of custody point any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified. The invented method and system to use a block chain infrastructure and smart contracts to monetize data transactions involving changes to data included into a data supply chain and the i describes a system and method to use smart contracts to monetize changes to data using a block chain infrastructure. The invention is a system and method matches a data producer's data with a data buyer's specifications and enables micropayments for changed data responsive to observation of changes to data included into a data supply chain on a granular level. The implementation of block chain infrastructure for data transfer enables a new class of business methods that enables the maintenance of privacy of personal information while giving access to actionable data and implementing a fair and transparent market for data producers and data buyers to use redundant distributed ledgers of transactions on peer to peer networks.
2. According to claims# the invention is to a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation to final transfer or disposal.
3. According to claim,2# the invention is to the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and the through use of encryption key pairs and blockchain encryption technology an electronic document is created in an encrypted transaction log updated at each change of custody point.
4. According to claim,2,3# the invention is to a each such change of custody points the new custodians who receive the product are provided with the information generated by the originator. For example: because the system tracks all inputs and outputs to the system at each change of custody point any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified.
5. According to claim1,2,4# the invention is to a block chain infrastructure and smart contracts to monetize data transactions involving changes to data included into a data supply chain and the i describes a system and method to use smart contracts to monetize changes to data using a block chain infrastructure.
6. According to claim,2,4,5# the invention is to a a system and method matches a data producer's data with a data buyer's specifications and enables micropayments for changed data responsive to observation of changes to data included into a data supply chain on a granular level.
7. According to claim,2,4,6# the invention is to a block chain infrastructure for data transfer enables a new class of business methods that enables the maintenance of privacy of personal information while giving access to actionable data and implementing a fair and transparent market for data producers and data buyers to use redundant distributed ledgers of transactions on peer to peer networks.
EDITORIAL NOTE 23 Feb 2021
2021100984
THERE ARE SIX PAGES OF DRAWINGS ONLY
FIG. 1 is a block diagram illustrating various components in accordance with one embodiment of the present invention focusing on API's and Dapp's.
FIG. 2 shows a flow diagram representing exemplary processing implementing the invention focused on the relationships between devices of data producers, data buyers and the block chain.
FIG. 3 diagrams the method steps and processes to build and implement a Smart Contract for changes in values of a DIP.
AU2021100984A 2021-02-23 2021-02-23 Data Science in Supply Chain Analysis using Blockchain Technology Ceased AU2021100984A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021100984A AU2021100984A4 (en) 2021-02-23 2021-02-23 Data Science in Supply Chain Analysis using Blockchain Technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021100984A AU2021100984A4 (en) 2021-02-23 2021-02-23 Data Science in Supply Chain Analysis using Blockchain Technology

Publications (1)

Publication Number Publication Date
AU2021100984A4 true AU2021100984A4 (en) 2021-04-29

Family

ID=75625889

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021100984A Ceased AU2021100984A4 (en) 2021-02-23 2021-02-23 Data Science in Supply Chain Analysis using Blockchain Technology

Country Status (1)

Country Link
AU (1) AU2021100984A4 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200184504A1 (en) * 2015-06-09 2020-06-11 Fidelity National Information Services, Inc. Methods and systems for regulating operation of units using encryption techniques associated with a blockchain
CN113435891A (en) * 2021-08-25 2021-09-24 环球数科集团有限公司 Credible data granulation sharing system based on block chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200184504A1 (en) * 2015-06-09 2020-06-11 Fidelity National Information Services, Inc. Methods and systems for regulating operation of units using encryption techniques associated with a blockchain
CN113435891A (en) * 2021-08-25 2021-09-24 环球数科集团有限公司 Credible data granulation sharing system based on block chain
CN113435891B (en) * 2021-08-25 2021-11-26 环球数科集团有限公司 Credible data granulation sharing system based on block chain

Similar Documents

Publication Publication Date Title
Uddin et al. Blockchain for drug traceability: Architectures and open challenges
US20150379510A1 (en) Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
Idrees et al. Security aspects of blockchain technology intended for industrial applications
Li et al. Industrial Blockchain: A state-of-the-art Survey
Agarwal et al. Blockchain technology for secure supply chain management: A comprehensive review
CN111989707B (en) Managing user rights for blockchain-based customs clearance services
US20230019639A1 (en) Systems and methods for blockchain-based payment transactions, alerts, and dispute settlement, using a blockchain interface server
US20230098747A1 (en) Systems and methods for payment transactions, alerts, dispute settlement, and settlement payments, using multiple blockchains
AU2021100984A4 (en) Data Science in Supply Chain Analysis using Blockchain Technology
Maleh et al. Blockchain for cyber-physical systems: Challenges and applications
Babu et al. Secure and transparent pharmaceutical supply chain using permissioned blockchain network
Mohit et al. Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain
Smith et al. Supply chain virtualization: Facilitating agent trust utilizing blockchain technology
CN111902838A (en) Internet data use control system
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Albshaier et al. A Review of Blockchain’s Role in E-Commerce Transactions: Open Challenges, and Future Research Directions
AU2020101898A4 (en) MHOC- Blockchain Technology: Medicine and Healthcare Observation Care using Blockchain Technology
Al-Zubaidie et al. Applying detection leakage on hybrid cryptography to secure transaction information in e-commerce apps
KR20220167146A (en) System for providing blockchain based international trade automation service for import and export business using smart contract
Bhushan et al. Security magnification in supply chain management using blockchain technology
US11556959B2 (en) Internet data usage control system
Liu et al. Trust as a service: building and managing trust in the internet of things
Liu et al. A Literature Review of Blockchain-Based Applications in Supply Chain
US20230012276A1 (en) System, Method, and Apparatus for Decentralized E-Commerce
Poongodi et al. Influence of blockchain technology in pharmaceutical industries

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry