AU2020100138A6 - System and Method for Identifying, Analysing and Managing Risk for Products in the supply network - Google Patents

System and Method for Identifying, Analysing and Managing Risk for Products in the supply network Download PDF

Info

Publication number
AU2020100138A6
AU2020100138A6 AU2020100138A AU2020100138A AU2020100138A6 AU 2020100138 A6 AU2020100138 A6 AU 2020100138A6 AU 2020100138 A AU2020100138 A AU 2020100138A AU 2020100138 A AU2020100138 A AU 2020100138A AU 2020100138 A6 AU2020100138 A6 AU 2020100138A6
Authority
AU
Australia
Prior art keywords
product
risk
supplier
origin
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2020100138A
Other versions
AU2020100138A4 (en
Inventor
Salma Khoury-Fakhri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2019900419A external-priority patent/AU2019900419A0/en
Application filed by Individual filed Critical Individual
Application granted granted Critical
Publication of AU2020100138A4 publication Critical patent/AU2020100138A4/en
Publication of AU2020100138A6 publication Critical patent/AU2020100138A6/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

A system of computing devices connected to the Internet for identifying risk, wherein at least one of the computing devices is adapted to carry out a method comprises the steps of: registering a product associated with at least one data set related to at least one of; an origin, a manufacturing material, a supplier, a purchaser, a storage location, a jurisdiction and a risk score, registering a supplier with the system, such that a supply network is generated by the system based on the product and the supplier; the supply network comprises at least one origin, in which a risk is determined at an origin; and wherein the system generates a control based on the risk origin. START 108 118 102 PROUC M SUPPLIER NETWORK 110 104 120 TAXONOMY TYPE TECHNOLOGY 112 106 FINISHED 122 PRODUCT PROCESSES, RESOURCES SUPPLIER SYSTEMS, AND CONFORMANCE 114 sEND SUPPLIER AND FINISHED PRODUCT RESOURCES 116 ----- UPLOAD TO BLOCK CHAIN 124 ' --- DISPLAY NETWORK OR DATA 126 EVALUATE 128 ANALYSE 130 CONTROL 132,, REGULATE FIGURE 1

Description

START 108 118 102
PROUC M SUPPLIER NETWORK
110 104 120
TAXONOMY TYPE TECHNOLOGY
112 106 FINISHED 122 PRODUCT PROCESSES, RESOURCES SUPPLIER SYSTEMS, AND CONFORMANCE
114 sEND SUPPLIER AND FINISHED PRODUCT RESOURCES
116 ----- UPLOAD TO BLOCK CHAIN
124 '
--- DISPLAY NETWORK OR DATA
126 EVALUATE
128 ANALYSE
130 CONTROL
132,,
REGULATE
FIGURE 1
System and Method for Identifying, Analysing and Managing Risk for Products
in the supply network.
TECHNICAL FIELD
[01] The invention may relate to a system and method for managing and/or analysing risk of products in their supply network. More particularly, the present disclosure may relate to a system and method usable on a computer medium for analysing and/or managing risk using blockchain records in relation to products.
BACKGROUND
[02] There are a number of complexities and challenges inherent with regards to global supply chain management and quality assurances. These challenges may include continually evolving markets, risks, gaps in lifecycle of products, economic, traceability of supply networks and transparency of supply networks. In view of these problems, there have been a number of risk mitigation or risk assessment systems generated to attempt to deal with these challenges.
[03] One such field of high risk is the construction industry. The construction industry is important in terms of economic value and social concern and may have a number of risks with supply chains and sourcing of materials during a purchasing and procuring stage of a project. As the construction industry is responsible for building facilities and infrastructure to enable productivity and also be constructed to a standard which reliably maintains public safety, there may be a need to ensure that products sourced for projects are reliable and are fit for purpose.
[04] Construction industry can include many multifaceted interactions and events which are influenced by, and can influence, a wide number of entities and industries. Government entities, financial institutions, real estate developers, property owners, construction material providers, equipment and machinery manufacturers, regulators, planners, architects, unions, engineers and journeymen can all be closely affected by events in the construction industry. In addition, housing starts and construction projects can be key indicators as to the state of an economy.
[05] As each jurisdiction around the world will typically have local laws, regulations and/or requirements for construction products and goods, there may be difficulty importing or assuring that particular products meet compliance or meet the minimum threshold of safety in a desired jurisdiction.
[06] While there are a number of international organisations, assessment organisations, accreditation bodies and regulatory bodies which assist with governing international standards and regulations, each jurisdiction will typically be bound by local laws, which may or may not be in compliance with the minimum international standards. In addition, manufacturers of products and materials may be unaware of conformance, compliance or other standards which are a necessity for a particular jurisdiction. As such, large amounts of risk can be incurred during procurement of products and goods as safety of products may not always be assured, particularly is sourcing goods from a foreign jurisdiction, or if a supplier has done so.
[07] While most companies take measures to mitigate or eliminate potential risks during business, not all risk aversion measures are successful and products received via supply chains may not meet specification or a satisfactory performance in use without a company being aware of such risks until completion of a purchase, or sale of a product to a consumer, or worse when consumers are injured by products which are not fit for purpose.
[08] Risk related to the construction industry can be subject to circumstances and developments involving many different sources in the supply chain. As such, being kept apprised of the many details necessary to make informed decisions can be a difficult task.
[09] However, companies generally do not have available a mechanism which can provide real-time assistance to assess one or more risk variables associated with the products, to qualitatively manage risk. In the event of an investment problem, it is often difficult to quantify to regulatory bodies, shareholders, newspapers and/or other interested parties, the diligence exercised by the entity taking action to properly identify and respond to risk factors. This may lead to the company taking significant damage to repute and or finances due to an unknown risk with a product as regulatory bodies may assume that the company has been negligent. Therefore, there may be a need to generate a system and method for reducing risk.
[010] While some product origins and specifications may be accessed online, or via data request, this may be tedious and onerous, or even impossible for companies to check compliance with or ensure that data contained within the product specification is correct. Fixing incorrect records by hand on a timeframe needed to perform risk management associated with a financial transaction may be impossible as well as expensive and could result in the introduction of even more errors. Further, this data is not associated with any such risk management or risk assessment system and is inefficient for persons to generate manually, in particular for high volume goods companies, or industries with a high level of compliance required for safety.
[011] Currently there is no convenient way to facilitate and process a comprehensive analysis of multiple products from multiple sources, such as a supply chain, without strenuous research of multiple disparate sources. Therefore, a simplified method for generating risk factors may be advantageous.
[012] An example of a known risk management system is the Prince2TM system which used a breakdown structure that identifies each constituent in the product. The method addresses the importance of a product and its makeup and is highly used worldwide. However the method requires one or more individual to conduct manually, a brainstorming technique is used which also requires product knowledge and skill in the product and its constituents. As such, this method is tedious, manual and heavily relies on the competence of the person conducting the assessment.
[013] Another example of a system for risk management are the Enterprise Resource Planning ('ERP') and MRP software systems which are widely used for businesses to improve overall performance and operations, which include procured or purchased products. However, these systems do not include an accurate risk analysis or management system, any risk detection, migration, control or regulation on a product. Moreover, there is no information on conformance of products integrated in the systems, which leaves users with no accurate and credible information.
[014] While solutions may be available for managing specific practising risks of a company, there is no system or method available which can assist a company to mitigate risk which may be assumed from a supply chain. Therefore, it may be advantageous to provide for a risk management system which can confirm or assess risks associated with suppliers and goods and products therefrom.
[015] Any discussion of the prior art throughout the specification should in no way be considered as an admission that such prior art is widely known or forms part of the common general knowledge in the field.
SUMMARY
[016] PROBLEMS TO BE SOLVED
[017] It may be advantageous to provide for a computer system for managing risk.
[018] It may be advantageous to provide for a system and/or method for assessing risk.
[019] It may be advantageous to provide for a system and/or method for mitigating risk.
[020] It may be advantageous to provide for a system and/or method which may quantify risks associated with a supply chain.
[021] It may be advantageous to provide for a system and/or method for recording risk data in relation to products.
[022] It may be advantageous to provide for a system and/or method for reducing risk.
[023] It may be advantageous to provide for a risk management system which can verify product compliance and/or risk origin.
[024] It may be advantageous to provide for a risk management system which generates a control plan to address risks;
[025] It may be advantageous to provide for a risk management system which is adapted to calculate risk associated with a product and/or a supplier in a supply chain.
[026] It may be an object of the present invention to overcome or ameliorate at least one of the disadvantages of the prior art, or to provide a useful alternative.
[027] MEANS FOR SOLVING THE PROBLEM
[028] A system of computing devices connected to the Internet for identifying risk, wherein at least one of the computing devices is adapted to carry out a method comprises the steps of: registering a product associated with at least one data set related to at least one of; an origin, a manufacturing material, a supplier, a purchaser, a storage location, a jurisdiction and a risk score, registering a supplier with the system, such that a supply network is generated by the system based on the product and the supplier; the supply network comprises at least one origin, in which a risk is determined at an origin; and wherein the system generates a control based on the risk origin.
[029] Preferably, at least one of the computer devices is adapted to comparing a current state and a future state to generate the control based on the future state. The system may be adapted to use a blockchain for recording data related to at least one of; a risk origin, a supplier, a supply network, a product and a control. Preferably, the control data is a control plan which may be generated by an Artificial Intelligence. The supply network may comprise multiple link data structure for storing records of a plurality of suppliers registered with the system. Preferably, at least one of the computer devices is adapted to receive compliance data in relation to a product which can be used to verify a certification of a product on the system. The supplier may be an end supplier of the supply network.
[030] Preferably, the at least one of the computer devices is adapted to generates at least one regulation based on the control. Preferably, at least one of the computer devices is adapted to receive an input of at least one risk at an origin of the supply network from a user, such that at least one computer devices generates the control for the risk. The supply network may be visible to at least one stakeholder to increase transparency of the computer devices.
[031] Ina further aspect of the present invention, a method of determining a risk origin of a supply network on a computer implemented device, the method comprising the steps of: selecting a product and a supplier of the product to generating the supply network based on the product and supplier; examining attributes of the supply network to identify origins; assessing origins of the supply network; Generating risk origins based on the assessment of origins; generating a control for the risk origins to obtain a desired product TPPQ; and uploading the control data to a blockchain to maintain a record of the control generated for the product and the supplier. Two or more parties are able to exchange or upload data and events in a controlled and trustless environment.
[032] The method may further comprises the step of generating a regulation for the control. Preferably, the method further comprising the step of issuing monitoring notifications to a user of the system when an origin is met. Preferably, a record of the supply network and product is uploaded to a blockchain. The record may be uploaded to a blockchain at each origin.
[033] Preferably, a record of the supply network and product are communicated via the Internet to a stakeholder.
[034] In the context of the present invention, the words "comprise", "comprising" and the like are to be construed in their inclusive, as opposed to their exclusive, sense, that is in the sense of "including, but not limited to".
[035] The invention is to be interpreted with reference to the at least one of the technical problems described or affiliated with the background art. The present aims to solve or ameliorate at least one of the technical problems and this may result in one or more advantageous effects as defined by this specification and described in detail with reference to the preferred embodiments of the present invention.
BRIEF DESCRIPTION OF THE FIGURES
[036] Figure 1 is a flowchart of an embodiment of a risk management system;
[037] Figure 2 is a schematic of an embodiment of a flow or materials and potential origins of risk
[038] Figure 3 is a schematic of an embodiment of a risk management system which shows portions of a supply network;
[039] Figure 4 is a flowchart of an embodiment showing constituents of a product in combination with a supplier of the system;
[040] Figure 5 is a schematic of an embodiment of a risk management system which can be used to identify risks and generate a control plan;
[041] Figure 6 is a schematic of an embodiment of a risk management system in which stages for generating a control plan are defined;
[042] Figure 7 is a schematic of an embodiment of a risk management system which generates a benchmark; and
[043] Figure 8 is a schematic of an embodiment of a risk management system;
[044] Figure 9 illustrates an embodiment of a process for generating a TPPQ control;
[045] Figure 10 illustrates an embodiment of a Multiplex-Network-Channel (MNC) of the system;
[046] Figure 11 illustrates an embodiment showing primary and secondary categories and where risk origins may be found;
[047] Figures 12 and 13 illustrate embodiments of a first and second part of a stopgap analysis, respectively.
[048] Figure 14 illustrates another embodiment of a stopgap analysis; and
[049] Figure 15 illustrates an embodiment of a project frame work for Total Product Performance and Quality integration.
DESCRIPTION OF THE INVENTION
[050] The present invention may be used with computerised systems and methods for managing regulatory, reputational and legal risks associated with the products. More particularly, in at least one embodiment of a system and/or method may have significant utility in the construction industry.
[051] Definitions:
CEM: constituents, components, elements and materials, which make a construction product. CEM may also include the taxonomy of an end product; CEMS: includes; constituents, components, elements, materials and supplier; CPS: conformance, processes, and systems, which forms the supply network; TPPQ: Total Product Performance and Quality; the standard of excellence for a product (performance and quality of a product); S: End supplier: type (capabilities of the supplier/vendor in the supply network); MNC: Multiplex Network Channel: The products, suppliers and supply network of the product. The MNC is the taxonomy and Technology of the particular product to be analysed and is mapped in the method using all three and can be used to identify the root causes and risk found in the procurement and purchasing of a product.
[052] Preferably, the system 10 can be executed to run on a preferred user device. A user device can include at least one of a; personal computer, a notebook, a laptop, a smart phone, a cellular phone, a palm pilot, a tablet computer, or any other electronic display device which may be adapted to gather and store information as data in a database or other data storing structure and processes the data in preparation for a risk inquiry search relating to a risk.
[053] Document images and other informational data as well as sources of information or informational data can also be stored by the system 10. An entity, such as a company, may use the system to generate a projected risk for a product or a supplier which can be added to a project log. A project log can be used to keep a record of potential risks associated with a product. Potential risks may include data related to a product such as a supplier, material log, an origin of the product or materials used to manufacture a product. A user of the system 10 may search for a product and/or a supplier associated with the system 10.
[054] Data within the system can be searched and a comprehensive, real time list of reference documents, related sources, reports and other data related to the risk of the product and/or supplier can be provided to the user.
[055] Risk associated with the construction industry can include factors associated with financial risk, legal risk, regulatory risk and reputational risk. These risks may be better understood when using the system 10, and management plans may be enacted to reduce the risk of a project or an order from a supplier or source. Primary regions of risk are located at origins of the supply network, and identification of origins may assist with identification of potential current risk.
[056] A product may include at least one of a; good, resource, service, solution, or any other tangible asset or service. The product may be used for a specific purpose by an entity during trade, or the product may be a product sold directly to customers.
[057] Preferably, the system 10 is used by an entity to manage and or assess the risk associated with purchasing a product from a supplier or purchasing a product. The purchase of a product will typically require the use of a supplier of said product.
[058] The taxonomy for a product may be recorded by the system in any desired manner. Preferably, each product is assigned a product code, which may be internally used for a company, or be a universal taxonomy code for all entities of the system. Optionally, internal references may be assigned to products such that internal and universal product codes may be used for products.
[059] If products are an assembly or a set of components, it is preferred that each of the components of the product can be provided with a taxonomy code individually, as well as the overall product. This may be of particular advantage when a product may have a weak component which can be swapped or replaced with a superior component to decrease the risk of a product. This may also be beneficial when using products with subassemblies, subdivisions or raw materials; as each of these may be assigned different risks or taxonomy attributes.
[060] Optionally, products associated with the system 10 may have an image which can be accessed by a user to ensure that the correct product is being viewed.
[061] Engineering attributes may also be provided for products or products may be listed with applicable compliance regulations which the product meets. Engineering attributes may include at least one of; tensile strength, absorption, quality, thermal resistance, compressional strength, or any other engineering property. Compliance and certification of the product may also be listed within a product description such that selection of desirable products which already reduce risk may be used. For example, a product which meets compliance of state and federal laws of a desired jurisdiction may have less risk than a product which is contrasted with superior engineering attributes which has not been certified. As such, electing product which meets a desired end goal may be used to reduce potential risk.
[062] In addition to the above, users of the system may also provide comments in relation to the product which may have the potential to impact the risk of a product if an adverse comment is supplied with evidence of the risk. Conversely, if a user of the system provides evidence that the product meets or complies with a regulation, the risk associated with a product may also be decreased.
[063] Any such modifications to risk may be recorded in real time, and open or closed projects may have additional data sets uploaded to reflect the new risk ratings of products. A notification may be issued to users when the risk of a product changes and may also be notified of specific projects which may be impacted by the risk change. This may provide for a more effective and efficient recall or repair system when an entity becomes aware of a potentially unsafe product without having to be notified formally from the product manufacturer.
[064] The system may be used to quantify risk which may include a number of subsets of risks. For example, a product may be associated with regulatory risk factor, a reputational risk factor, a financial risk factor or any other desired risk factor.
[065] The system may be used to assess the risk of a product with regards to regulatory risk factors. Regulatory risk factors may be any factors that may cause an institution to be in violation of rules put forth by a regulatory agency, international organisations, assessment organisations, accreditation bodies, regulatory bodies, a state licensing board, or any other agency.
[066] Reputational risk can relate to harm that an institution may suffer regarding its professional standing in the industry. An institution can suffer from being associated with a situation or supplier that may be interpreted as contrary to an image of honesty and forthrightness. Such risks can also befall other circumstances, such as, for example, situations involving the construction industry and links to organised crime or political corruption.
[067] Responsible and ethical sourcing puts construction companies under pressure to ensure their products are sourced with respect to international standards and human rights. It's important to identify your supplier and the supply network in every tier level. Reputational risks are reduced when the process is traceable and the source is transparent. The system allows the user to identify and respond to risks found in the upstream and downstream actives and covers most aspects of ethical practices in terms of traceability, transparency, the product and the whole supply network operations. The system also allows the user to identify the correct ethical partner and improve the procurement process.
[068] A supplier of a supply chain for a product may also be assigned a risk factor. Risk associated with a supplier can include, for exemplary purposes, at least one of: financial information related to a construction industry company or project; annual reports; government filings, personnel employed by the construction industry or on a construction industry project; stock price and/or history of a construction industry entity; corporate bonds issued, equity offerings; bankruptcy proceedings; litigations involving a construction industry entity or construction industry project; types of activities undertaken by a construction industry entity; demographics of clientele, employees, owners, or other interested people; construction industry business developments such as, for example, mergers, acquisitions, expansion, additional services or other material developments; government or regulatory actions implemented concerning the construction industry entity or project; history of fraud or money laundering associated with a construction industry entity, project, or employee; felony history associated with a construction industry entity or employee; building materials associated with a project; labour situations associated with construction industry entity or project; or other factors.
[069] Risk associated with the construction industry can be greatly increased due to the difficulty in gathering and accessing pertinent data on a basis timely to managing risk associated with particular facts or documents. As part of due diligence associated with becoming associated with, or investing in, an entity in the construction industry, it is important to ascertain a level of risk generated by a situation. Such due diligence may be related, for example, to potential investment activity, public relations activity, business transactions, political or charitable donations, materials used in a product or other activity.
[070] The risk assessment or inquiry search can include data retrieved as a result of augmented retrieval methods. Scrubbed data as well as augmented data can be transmitted from a risk management database to a user of the system 10. Risk inquiry searches can be automated and made a part of standard operating procedure for decision making processes and due diligence performed by the subscriber.
[071] A stakeholder may include: clients, project managers, suppliers, contractors, sub-contractors, procurement staff, purchasing staff, an investor, a consumer or consumer group, a government entity, a securities broker, a bank, a private equity firm, an asset management company, a mutual fund company, a hedge fund firm, a local community, a securities exchange, an institutional or individual investor, an auditing firm, a law firm, any institution which includes in its business, investment in, advice relating to, or involvement with a construction industry project or construction industry company.
[072] A product being not fit for its purpose may be defined as a defective product, which is and consist of products, which are imperfect, harmful, faulty, incomplete, unsatisfactory, wrong, broken, inaccurate and incorrect. The consequences of a product being defective are the responsibility of the procurer or purchaser of the product. Often enough consequences are defined and can consist of effects and outcomes which impact and result in negative effects to the product or the structure the product is being installed or used in. Procurers and purchasers of building products hold accountability to any liability, which has resulted from these types of products.
[073] The system may allow for a streamline method of assessing the risk associated with a product. Typically the calculation of risk may be conducted during a procurement process,
[074] For example, if the product is being purchased for the construction industry, then the risk assessment may desirably be conducted during or before the purchase and procurement stage of construction and in the project charter or scope of a project. This may highlight associated risks with a product and may allow for stakeholders of an entity to mitigate risks by electing alternative products with lesser risks or may allow for an overall risk to be known for construction.
[075] It is preferred that all products sourced for an entity can be added to the risk assessment and an overall risk for a company can be generated. The overall risk may be of particular advantage for large volume suppliers or other entities which have a high turnover of goods.
[076] The risk of a product may be based on at least one of the following; conformance issues, poor product quality, lack of communication and engagement with suppliers, cost of quality, visibility of risks and gaps, visibility in the supply network, safety and hazards, sourcing and evaluating suppliers, contractual agreements, current practices and the analysis, management and migration of known risks. The global gap has affected the construction industry with no end of closing the gap.
[077] To effectively manage risks in a supply network in the planning, initiation, risk management and procurement stage, involves the analysis and management of the activities, functions, there movements, analysis, planning, monitoring and controlling of the product from raw materials through to the production process and right through to the finished product. Most management professional's progress to delivering on the requirements with an arrangement of timelines and costs. Changes in the movements where risks arise are not migrated, understood or identified until experienced in the lifecycle of a product. The result is poor performance and quality, time wasted and cost of quality in the process. Often raw materials along with the taxonomy are not known in their entirety, materials are not divided or classified in the requirements, which classifies them fit for their purpose and set out by standards and codes. The complexity of the supply network along with the different tier levels requires transparency and visibility along with the collaboration of all stakeholders involved. The method addresses the supply networks technology and taxonomy along with the visibility to trace, identify risk origins, migrate and control all risk origins there outcomes, activities and functions to continuously improve the process. The method is used to address risks in the construction industry where procurement managers and project managers are capable of conducting their own supply chain risk analysis and management, which includes the product, its taxonomy, and technology in the network. The method also identifies the different tier levels and pinpoints risks on each level including classifications of the tier level. Transparency between stakeholders including suppliers and vendors is of great importance, having transparency prior any purchase is an advantage when working with suppliers/vendors in a local or international market.
[078] Supplier or vendor capabilities when procuring or purchasing products play a major role in the process. A supplier can be found via e-procurement websites, tendering processes, online marketplaces, expos and by word of mouth and/or outsourced by other means. Every supplier has a capability; depending on the type of supplier the product being purchased will influence the supply network and the path of the product. An understanding of who the supplier is and their capabilities are important factors in traceability of the product and its constituents.
[079] A product is unique to its structure and, in its development and production passes through a sequence of stages, activities and functions until it reaches final product stage. A risk at any stage can contribute to poor performance and quality, which results in negative impacts on costs, which in turn may cause harm and in some cases are dangerous. Risks are present in every supply network; they are often unknown until experienced during a purchasing or procurement stage. A common example of a gap experiences in a supply network is that of traceability and transparency: traceability of components or constituents from which components may be manufactured, and transparency of the processes that progress the components and constituents along the supply chain from original source to finished product.
[080] The present invention is relevant to the construction industry, its practices and associated industries that require a product of superior performance and quality. It proposes a reverse analysis method, which uses a product, a supplier and a supply network to identify, analyse and eliminate risks and gaps in a supply chain when procuring and purchasing a product.
[081] The method therefore includes analysing at least the following elements: an end or finished product being the target of a potential procurer; an end supplier, being the vendor or the end product; and the supply network, comprising a network and a channel utilised in delivering the finished product to the end supplier and in turn to the procurer thereof.
[082] They are used to trace in a visually observable manner all risks, both current and future to the total finished product performance and quality, and identifying the origins thereof. When a risk has been identified, an improvement can be made to the procurement process or supply chain to reduce it. When an improvement has been made, a further degree of control over the supply is achieved.
[083] The system may be used in relation to any product which may be purchased or used by an entity. The system can be implemented in risk analysis, risk management in the planning stages of a project, which requires a product to be procured or purchased. The system may be used to improve processes involved with said purchase or procurement, resulting in reduced waste, product quality improvement and to reach a stipulated standard of total product performance and quality. Unlikely conventional systems and methods for assessing risk, the system employs a reverse analysis, which may improve traceability, product sourcing, supplier identification and evaluation, supplier relationship management and the problem solving of risks found in the procurement and purchasing stages. In addition it helps reduce skills gaps and produces accurate data and results that may be used in solving quality risks.
[084] The system may be used to determine whether a product is fit for purpose for a proposed use or project and is of a suitable quality. As such, the system may be used to classify and taxonomise at least one of a product, a supplier and/or a supply network.
[085] To transition from current practices to TPPQ, procurement, purchasing and project managers, the construction industries must implement new strategies for instituting an improved business process, which delivers performance and quality to the procured product. Current practices prioritise the current state and envisage a future state but generally lack an approach or guidelines as to how the desired state is to be reached. The present method requires knowledge, skill and understanding in the analysis of product constituents, taxonomy as well as of supply networks, processes systems and technology all of which are classified and categorised for the convenience of the user. TPPQ may be measured in terms of any two or more of the following variables: Product utility, consistency of quality, fit for its purpose, total customer satisfaction, product lifetime, conformity, compliance, performance, quality (build or service delivery), the reduce the cost of quality and continuous improvement.
[086] Supply networks may generally be complex, consist of multiple tier levels and have multiple business partners involved in the network including multiple suppliers, vendors and contractors.
[087] A risk in any construction project is a potential loss and can contribute to negative consequences, which may impact on the quality, cost and time and in some case may cause human loss and harm. Risk strategies are based on the inputs, techniques and outputs. In order to understand and define the inputs the method outlines the components of risks in the procurement and purchasing of products in the industry. These inputs beings the end product, end supplier and the supply network. The inputs are the origins of unpredicted root causes, which can occur at any stage of the process, and often risks are only known after a failure or negative impact has been observed. Identifying risk origins prior to their occurrence may therefore provide significant risk mitigation. Each risk origin of the supply network for the product can be classified and determined in its entirety and gives accurate analysis of pin pointing the origin of risk.
In view of risks observed, the system may be adapted to minimise or reduce the potential risks involved with procurement or purchase of a product.
[088] Risk analysis and management in the supply network are not functionally accurate. Risk analysis involves the risk to be identified, evaluated and prioritised whether it be a current risk, past risk or future potential risk. The identification of future risks is of great importance and is necessary when conducting any analysis to avoid unnecessary risks and to transfer and control each risk in its risk origin. The management of risks may be achieved by risk based decision making principles or other risk mitigation techniques.
[089] The method follows the standard guidelines by establishing the context, identifying the risks, risk analysis, risk evaluation and the treatment of risks. The method establishes the context, identifies the risk in risk origins and gives an analysis of both current and future state risks. Risks, which may impact stakeholders and businesses, product performance and quality in both current and future state and classified in the correct risk origin. By quantifying both current and future state analysis all known risks and possible risks are outlined in the origin they occur. The results may be less subjective or uncertain and increase the preciseness of the risk analysis.
[090] In order to address risks associated with a product, the system may identify at least one of: a product, a supplier and supply network to determine, evaluate, analyse and/or control risks. These may be part of a risk management strategy and are used in the management of unknown and known risks in the method.
[091] The supply network and the product may be of different complexities for different products. Analysis of a supply network can include classification and systemisation of the: product, supply network and suppliers. Categories of taxonomy and technology may be relevant for each of the product, supply network and the suppliers. The classification of taxonomy preferably relates to the product constituents. The product must be classified with respect to engineering properties and materials to obtain product performance and quality.
[092] The technology may relate to the supply network and supplier or vendor. Supply networks complexity may be classified based on movements, functions and activities in compliance to the product.
[093] The supplier may be an end supplier, which determines the path of the product though at least a portion of the supply network. There are many other suppliers found in the network in both upstream, downstream activities and suppliers of constituents. Identifying the capabilities and classification is necessary to identifying risk origins.
[094] An end supplier or vendor has different capabilities and determines the movements in the supply network, length and path of the products lifecycle. A supply network is unique to its structure by means of the end product and its constituents and their movements in the network and end supplier. Risks origins occur in the finished product, its constituents, the supplier/vendor, and the supply network.
[095] Constituents of a product can be separated, identifies, classified, coded and categorised for the product, supplier and supply network in an arrangement that identifies each part hierarchically.
[096] The reach TPPQ stages this analysis must be implemented to determine the product and its movements in the supply network. The supply network is interconnected with its functions and activities incorporated where all risk origins become visible and traceable. When risks or gaps areas are known, then improvements can be made. When improvements can be made, control over the supply network can be implemented and therefore risks can be reduced.
[097] The taxonomy of a product may include information in relation to manufacturing and processing and materials which were used in manufacturing. Recognizing that every constituent and component of a product comes from a source that has gone through a process and system enables the procurer or downstream supplier to satisfy the requirement to correctly identify and systemise technical information and the taxonomy of materials.
[098] Once the product has been determined, its constituents and supplier identified the systemuses the classified products may be visually displayed with respect to the taxonomy and technology of the supply network. The system maps the network visually and identifies every risk origin. A Multiplex Network Channel (MNC) is the combination of products, suppliers and supply network of the product. The MNC may include information with regards to communication pathways between inputs and outputs of the supply network. An MNC shows the sequence of movements, the inputs and outputs, upstream and downstream activities, and internal external activities, and every risk origin. The method identifies the supply network in its entirety and covers all aspects in the procuring, purchasing and sourcing of a product of performance and quality to prevent future risks and gaps from occurring.
[099] The MNC is used with the CEMS and CPS to calculate the risk of a product. The CEMS and CPS in the MNC are visual and traceable each with an origin of risk.
[0100] MNC participants may make use of a distributed electronic ledger, such as the ledger known as "Blockchain" to record, store, trace and retrieve events, materials data, movements and contractual agreements by integration of API into another system.
[0101] The system may be adapted to perform a reverse analysis which involves working back through each supply channel. As can be seen in this exemplary illustration, the customer may be offered a choice of conforming products, each of which has taken a slightly different route in arriving, despite sharing a common origin. Routes may split and recombine and split again, depending on the specific requirements of a specification and the capabilities of intermediate supply entities and the constituents and materials with which they work, as well as the availability thereof.
[0102] In one embodiment, the system can be run on a cloud server and used as software as a service for users SAAS in a cloud environment. Access may be granted to a user and runs the system interface via the Internet. The software can be incorporated and/or integrated with other SAAS providers including CRM, ERP and ERM systems using an Application Programming Interface (Cloud API) that enables the user access to other hardware, software and platforms. Allowing users to interact with other cloud provider services. Users have the use of incorporating other providers services into the system to streamline information example: a bill of materials and/or other information or data from the users other services. Data integration is by mean of spreadsheet and/or other.
[0103] The system may also utilise artificial intelligence (A). The AI may learn via Machine learning algorithms and API's for predictions, calculations and analytics in the system, and/or Decision Management by use of the information of the analysis, using constraints and risks found in the process, and/or Compliance to deliver comprehensive risk coverage by processing and scan regulatory text and match its patterns with keywords to identify the data. By incorporating A, processing, converting data, problem solving and advanced analytics may allow for the provision of real-time updates to detect patterns, outcomes, identification, analysis, classification and inconsistencies in products, suppliers and/or supply networks. As such, companies may be equipped with an efficient and consistent decision making tool when procuring and purchasing a product which requires a product of performance and quality. The machine learning algorithms can be used to: categorise new data, learn from the information provided in the database, predict outcomes and create a model using learned information.
[0104] Data in relation to products can be incorporated and/or integrated into a blockchain to allow for greater transparency and also retain an non-editable record which is date and time-stamped. Further, the system may utilise blockchains for portions of the supply network to date and time-stamp actions that have occurred in the supply network. Smart contacts can be integrated, regulatory requirements and/or other data can be incorporated or integrated to efficiently track movements in a supply network and manage the process. The data is stored in a storage network where information can be accessed and used by the user. The blockchain storage network allows the user to store information into ledgers at each stage. Preferably, the data stored in a blockchain is a hash or other verification means which allows access to data on the system which cannot be modified after being hashed or otherwise encrypted. Preferably, if modifications to data is desired, a further record will be made and uploaded to a blockchain and reference may be made to the original record generated in the system. The information can be accessed and collaborated with other participants in an organisation through a distributed computing system or supply network partner permission by the user. The user may create public or private, centralised or decentralised ledgers through cryptographic functions where blocks are validated through a form of consensus.
[0105] Data infrastructure can utilise cloud digital data storage, which promotes data consumption and sharing to efficiently improve the operational requirements of the user or may utilise local storage hardware. While data can be stored locally in some embodiments, the data is preferably stored remotely via the use of cloud servers accessible via the Internet. : The cloud servers may allow for data access, data storage, data processing, databases, data security, data management, data centre (cloud providers), networks, data analysis, data scanning, data calculations, data computing, data analytics, data constraints, API (application programme intelligence), data storage networks & (artificial intelligence) Al and data visualization.
[0106] A cloud service provider provides the cloud service and data storage, which is scalable for the volume of data used, accessed and processed in the system. The data is arranged in a file system, which includes a data storage network, data classifications and collections of data. The data may be maintained, backed up, stored, secure and updated.
[0107] The application software architecture is automated and provides the use of the Internet of Things (IOT) to transform the construction industry and automate tasks, which require information access and large forms of data. The collection of libraries and data allows the user to interact locally and remotely including HTTP or IPC connections. It is of advantage for users to streamline functions in the procuring and purchasing of products, which are aligned with the necessary risk analysis and management. The system is automated for business and customised for the delivery of risk analysis and management for the procurement and purchasing of a product accurately, efficiently and technologically. It can be integrated for remote collaboration, sharing data, data storage, and collaboration, giving stakeholder the ability to be efficient and communicate remotely if required. The incorporation of Al, blockchain gives transparency and traceability to efficiently management movements in the supply network and give real time updates on inconsistencies. The digital data can be acquired accurately to pinpoint risks in documents, regulatory requirements, and intemperate data, risk behaviours, verify and validate data, maintain quality assurance and quality of the product and its supply network. The system will run efficiently in terms of speed by use of cloud computing technologies, data is secured and stored and data will be of a global scale giving users the ability to access information remotely by use of web browser. An individual, commercial users and/or multiple users in an organisation can use the system without the requirement-installed software.
[0108] The stages to be followed in implementing TPPQ are the following may include determining risk, establishing risk origins, arranging risks, evaluation of risks, examining risks, controlling risks, and regulation of risks. CEMS and CPS data accessed and analysed as outputs into a structure: multiplex network channel (MNC), which executes pre-programmed system instructions to identify supply network risks in risk origins and to examine all risk sources and risk outcomes in a current and future state. The results are used to control and regulate the risks in their risk origins. These activities have origin and outcome and are traceable to further outputs, which are used in controlling and regulating the TPPQ process.
[0109] To control and regulate the analysis results requires setting a current state and future state. The risks that exist between the current and the future state are detected and measured using the risk origins in the MNC structure with respect to the product Using this method, underlying risk and gaps may be readily detectable and can be reduced or eliminated by implementation of risk reducing measures. For example, the risk reducing measures may use outputs from the MNC to evaluate and measure against a desired future state using stopgap analysis to control and regulate against future risks and gaps occurring.
[0110] Firstly, for the system to identify risks, the desired product and the supplier of the product is to be determined. Using the supplier and the product, a supply network may be generated using known data.
[0111] The system software running on the cloud server presents the front end user with a user interface (UI) comprising of on screen instructions for using a menu presenting a number of choices, or using a manual input, for specifying the product required to be procured. The choice entered by the user specifies the product to be procured with an array of the products composition, the constituents, and the material data including the taxonomy. The interface design preferably simple and user friendly. The output of data may be a graphical representation in the form of at east one of: charts, tables, mapping and/or a general product profile.
[0112] A database of construction products is stored into the systems internal data storage as digital data, which can be accessed by the user when determining the product to be procured or purchased. The storage is located in the cloud storage or locally for intranet systems or other desired devices to improve safety of information. The data is stored in a logical systemised order and access by a user when called upon as useable information when transferred.
[0113] In one embodiment, the user accesses the system via a web browser using the credentials created in the subscription to the system. The user creates the project and name in the system using the project name and/or other inputs.
[0114] To determine the end product and the taxonomy, the project requirements can be input by the user by a user. The system may then automatically search for applicable products which meet specification. Alternatively, the products which may meet the specification may also be displayed with warnings, or if no products exist within the system which meet specification the user may also be notified.
[0115] Data in the system may be assessed by using both qualitative and quantitative data algorithms to determine the suitability of a product within the system. Traditionally qualitative and quantitative data can be gathered using questionaries and surveys which are conducted online or offline. The system uses coded data with numerical and non-numerical forms of classifications. The data can be pre-classified and pre-programmed and stored into the systems data storage. Preferably, a cloud storage is used as the cloud may implement technology which allows for larger amounts of data to be stored, analysed, processed and accessed which is an efficient analysis to conduct by the user.
[0116] Data may then be grouped and classified into categories and sub-categories or any number of sub-classifications; the data is structured and is used in the analysis.
The system may be adapted to identify word phrases by scanning primary and secondary data of a product. The main category may then be classified as the primary data and the secondary data and any sub-categories. Optionally, the codes used in the qualitative data are the first and/or second word used in the classifications of CEMS and CPS that represent the product, supplier and supply network.
[0117] Quantitative data may be based on numerical values which can be grouped and classified with respect to qualitative data categories and sub-categories. The data can be structured and is used in the analysis by means of diagrams, stats and percentages in the ranking and classification of risks and risk origins.
[0118] The back-end of the system translates the collection of data by means of processing and extracting coded labels of both CEMS and CPS. The systematic application of codes allows data to be accessed, processed, extracted and integrated in the data storage databases. Data codes may be systemised in correlation to the primary and secondary categories of each of the CEMS and/or CPS and allow the system to summarise data in both numerical and non-numerical data.
[0119] In one embodiment, the back-end uses artificial intelligence machine learning technologies to process, convert, predict, classify, scan, identify and create data in the system. Al algorithms are structured in correlation to the existing pre programmed data and newly input data to arrange in the classifications, categories and codes of CEMS and CPS. The information provides an analysis: scan and detect new data, process and convert new data into the primary, secondary categories and their sub categories. The Al may search through numeric and non-numeric data to determine actives and to assess how the activities and algorithms behave. Keeping the system updated with new risks and an analysis of results as the information and inputs grow larger may be a primary function of the Al. New data classifications can be scanned and processed in the stages set out of the method, they be will convert data into statistical data which the user will be able to access on the interface as graphical representation.
[0120] The CEMS and CPS data formulates the supply network and connects the categories, which is used in the method in processing CEMS and CPS data and analysing the structure MNC, the supply network in its entirety and in hierarchal order, all of which interconnects the arrangement and linking of the codes.
[0121] The numeric and non-numeric algorithms data is used to generate the framework MNC that identifies the risk origins and the supply network in its entirety. It identifies the primary data and secondary data. The main category may be classified as the primary data and secondary and so forth. The data is grouped and classified in an arrangement that is systematic, logical order and in correlation to CEMS and CPS. The data is stored into the cloud data as digital data. The data is stored logically where the user can access it upon use of the system. The algorithms are used to manipulate the data in forming the MNC.
[0122] By using structured algorithms the analysis can be classified, separated and used for the analysis. Separating the data may occur in a predetermined order such that data may be interpreted in different forms.
[0123] In one embodiment, the primary categories may be; Origin, suppliers/supplier, Packaging 1, Transport, CEM, Facilities, Process, Machinery, Production, Assembly, Inspection, Scrap/waste, Certificate, End/finished product, End supplier/vendor, Packaging 2, Warehousing, Transport, Distribution, Retailer, Customer, Regulatory Requirements, Warranty, Research and development, Installation, Packaging, Contracts, Inspection/audit Insurance. It will be appreciated that the primary categories may also be classified into a secondary category and/or sub category.
[0124] Lists may be used for classifications; with each list having a head and a tail. A head being the beginning of the list and a tail the end of the list. They are coded and used with pointers for the allocation of classifications to position the elements in the primary category and then secondary category and its sub categories. Each element in the primary category may have a relationship with the secondary category and the sub categories have a relationship to its main secondary category. Each relationship and element has a position in MNC and is arranged logical order with one another and in order of CEMS and CPS.
[0125] Descriptions can be used along with the primary category for processing, converting data, problem solving, scanning, analysis and analytics. Diagrams of the primary and secondary categories can be classified.
[0126] The primary classifications may be used when determining risk origins, root causes or gaps, which may occur in the procurement and purchasing of construction products. Preferably, the information is interconnected such that information, systems, processes, origins, outcomes, activities and functions may relate to one another.
[0127] Each classification may be origin and the origins are where risks may be observed. In every risk origin there is an outcome (risk) in every outcome there is an activity or function (risk), which takes place, which can be classified as a risk which may optionally be ranked or assessed by the system 10.
[0128] Data can be classified and grouped into the primary and secondary category. The classifications of each primary category have a secondary category and a sub-category and so forth. Categories can be classified, coded and pre-programmed and stored by the system.
[0129] The data of the classifications can be coded and labelled accordingly and are involved in the analysis to manage and organise the correct risk origin which a risk originates. Algorithms: numeric, non-numeric values, pointers, head and tail for the structuring the data and to correlate to one another in ranking order of categories from descending to ascending.
[0130] Primary categories of the supply network 142 may be separated into three technology main streams 144. The features of these streams are discussed below.
[0131] The origin of a product may be an important factor to better understand risk. While some suppliers may hide the origin of a product, the system may construct risks based on worst case origins or undesirable origins. For example, if the origin of a product is from India or another jurisdiction which allow for the use of harmful substances in manufacture which may be banned from other jurisdictions, the risk may be increased. However, if the origin of a product is provided by a supplier, the risks may be reduced if the origin is from a source with good repute or more strict regulatory compliance. For example, Taiwan may be associated with a lesser risk for textiles relative to the potential risk for textiles sourced from India or Bangladesh.
[0132] A supplier may include local or international suppliers. Suppliers may be a manufacturer, a supplier of a supply (network (or supply chain), a sub-contractor, a sub-supplier, a contractor, an end supplier or any other entity which provides a good or service.
[0133] Packaging may be used to identify, describe, protect, promote or display a product. The packaging of a product may include details in relation to the constituents of the product, and/or specifications of the product.
[0134] Transport conditions of products may be required for particular industries, such as glass handling, dairy product transport or medical transport. As such, all transport conditions and measures may be desirably known for a product to mitigate and reduce potential risk in relation to adequate transport conditions or safe handling practices. Regulatory requirements may need to adhere to: An example is The Australian Window Association has guidelines to the shipping, handling and storage of windows and glass.
[0135] Facilities or housing of products may also be relevant to the risk of the product. The origin of a business and details regarding manufacture, business functions, management, staff training, layout, location and storage may be a potential origin of a risk.
[0136] Processes for producing a product may be any activities which form a portion of the product or a material therefor. Processes may also include activities during R&D, inputs, outputs, constituents and production methods. Each stage has underlining risks which may change the origin risk of a product.
[0137] Machinery use for manufacturing a product may be old, use manual labour or may not be of a suitable quality to produce a specific product. As such, machinery may impact the overall performance or quality of a product in terms of age, maintenance and suitability.
[0138] Production processes for fabrication of products or components may also be used to assess the potential risk of a product. While a single manufacturer may manufacture some products, there may be instances of multiple components being manufactured at different locations and/or from different manufacturers, causing an inconsistency in the quality output of the final product.
[0139] Assembly of the product may also have risks associated therewith. For example, joinery being manufactured from a first jurisdiction, such as India, may be assembled according to the Indian market, whereas a second jurisdiction, such as Australia, may have assembly, measurement, height, etc. held to a different standard, and therefore products may not be suitable across jurisdictions. This may be of particular concern for electrical goods or other goods which may have sensitive components suitable for limited jurisdictions.
[0140] Inspection methods of products may also assist with quality control, quality assurances, assessment, evaluation and examination of products. Internal or external inspections may be carried out depending on the product, however if staff are not qualified or trained in accordance with the correct quality control procedures and requirements risk may also be incurred. Optionally, a third party may conduct an audit or other form of inspection to reduce risk with this stage of production. Inspections are usually conducted by the request of the purchaser.
[0141] One major risk factor for companies in the supply chain is the waste or scrap materials produced from manufacture of the product. Notably, environmental concerns, recyclability, sustainability, and other environmental factors may damage the reputation of a company or supplier, and therefore controlling the amount of waste or pollution generated during production may be advantageous to reduce potential risk.
[0142] Certification of a product may also assist with reducing risk. It will be appreciated that while there are a number of regulatory bodies globally, risk may be reduced if products can conform or comply with the strict jurisdictional requirements.
Aluminium window example. For example, the Therapeutic Goods Administration (TGA) may have the most strict compliance guidelines for a product globally, and therefore risk may be averted by obtaining a certification from the TGA rather than a less strict governing body. Further, there may be risks associated with fraudulent certifications or certificates issued for products, and therefore verification of certifications may also be conducted to reduce potential risk.
[0143] The end product may be a product designed for installation and/or for commercial sale to customers. The risk associated with the end product may be the accumulation of the risks incurred during the supply chain and/or from a supplier. It is desired to keep risks as low as possible.
[0144] An end supplier may be an entity, such as a company, who may sell goods to customers or consumers. The end supplier may incur most risk in relation to consumer welfare. Determines the length of the supply network and partners associated.
[0145] Packaging requirements for finished products may be required to be suitable for transport, regulatory requirements, packaging restrictions and laws. For example, if packaging comprises wood, this may be a risk for importation into stricter customs jurisdictions, such as Australia. An example is ISPM, was developed by the International Plant Protection that addresses the need to treat wood materials used to ship products in international trade
[0146] Warehousing or storing of products may require structural or managed facilities according to the end products requirements. Pest control may be an issue which may increase risk of a final product or impact systems and procedures required for safety of products, such as inspections.
[0147] Transportation of the finished product may also involve risks, such as methods of transport, time delays, volume limitations and other supply issues. As such, it may be beneficial to know how products, constituents and/or materials therefor are to be transported.
[0148] The distribution of supply of the end product may also be related to the transport of the product, however this may also include logistical factors. The process and system used in distribution may have any number of distribution methods which may cause slow supply of products to a desired location, again increasing potential risk.
[0149] A retailer may be a business, entity or individual which sell the end product to the public.
[0150] A customer may be any entity or person who buys finished products from individuals, businesses, companies, entities and/or stores.
[0151] Regulatory requirements may be any requirements which are enforceable by governments or regulatory bodies and may be required to meet at least one of; local or international standards, conformance, compliance, testing or other requirements. As such, ensuring that all regulatory requirements have been met may improve the quality of the product and lower a risk associated with the product.
[0152] Warranties for products may be written assurances or a warranty issued by the supplier of the end product and its requirements. Often overlooked when procuring or purchasing products, the warranty may shift liabilities to others within the supply chain and may be used to lower the risk of a product.
[0153] The installation of products, assembly and/or accessories may be of particular concern for specific products which require an authorised skilled person to install or fit. For example, windows andjoinery sourced from foreign jurisdictions are often not suitable for the Australian market, as they do not comply with Australian standards. Therefore, ensuring that the products can be installed to comply with the correct standards may assist with determining a risk factor of a product.
[0154] Contracts or other written agreements between two parties purchasing or selling products may be a common risk factor for products. As such, the system may be used to prompt a user to ensure that all contracts are in place to reduce potential risk. If risk origins are known they may be included in contractual agreements.
[0155] Inspections and audits may be required to be undertaken in accordance to standard specifications and guidelines, conformity assessment bodies and accreditation bodies in the country where the product is procured. If these inspections and/or audits are not frequent enough or even conducted, the risk of a product may be increased.
[0156] The research and development undertaken in the in the development of product may also be an origin of risk. For example, cosmetics tested on animals may damage the reputation of a brand.
[0157] The final packaging of the end/finished product when purchased by a customer may also need to comply with specific standards or may be subject to substantial risk. For example, selling toy products into Germany without correct packaging may cause a rejection of the toys at customs which can be costly for a business.
[0158] Protection of financial loss, cargo, contractual agreements and liability may be protected by insurance.
[0159] Each of the above Primary categories may be is coded and used to identify risk origins. All primary categories are classified as risk origins. All secondary categories may also be classified as risk origins along with their sub categories.
[0160] It will be appreciated that a product risk may include risks from CEMS and CPS. CEMS includes; constituents, components, elements, materials and supplier, and CPS includes conformance, processes, and systems. As such, all references to products may include CEMS and CPS unless otherwise stated. It will be noted that CEM includes constituents, components, elements, and materials only.
[0161] Determine Stage
[0162] The system 10 may be adapted to detect new and existing data including descriptions to update the internal data of products. Future classifications, categories, primary and secondary may be updated, categorised and systemised in the correct order of classifications. Optionally, data sets may be uploaded to the system by users manually. In another embodiment, the system may be adapted to use Al to detect new information and products and generate relevant data for said products.
[0163] The system may perform this action by determining the product, its constituents, its supply and/or supply network. For the system to determine to product, the end product may be categorised and/or classified in the system. The end product may be a desired end product (future state), and a product may be a current product (current state). Optionally, if risks of the product are within tolerances, the future state product and the current state product can be the same product.
[0164] The taxonomy of the product may be important in determining the supply network and the path of each product. As CEM are used to form a product, the each CEM has an origin and may also be part of the supply network as a whole. Each CEMS may be used in the manufacturing of the product.
[0165] A user inter face (or API) may be used by a user to input a product name into the system. Alternatively, a product code such as a universal code or an internal code may be associated with a product and may be entered into the system to search for a product. The system 10 accesses the database and can access the primary category: of the product.
[0166] A list of products can be displayed to a user which are classified and coded in the system. The user can then select a product from the displayed products or further refine a search until the correct product(s) are displayed. Each product that is classified within the system can be listed with its constituents and the taxonomy and technology of the product being analysed.
[0167] The system allows the user to input new data if there is a product not listed and/or its constituents. New products and/or constituents are processed and integrated into primary and secondary categories arranged in the system. Each new product and/or constituent is classified, determined, coded and is stored as data for a user and/or other users of the system 10. The system allows the user to upload a bill of materials to the system.
[0168] Products may include data sets in relation to at least one of; metals and materials datasheets. These datasheets may comprise information in relation to at least one of the following; rubbers, plastics, additives, adhesives, fibres, ceramics, composites, resins and semi-finished products, metal grades, material properties and any other material. The material, material properties and/or metal grades may be used to determine the quality and performance of a product. External data sources, such as Materialsproject.org, may also be referenced for data in relation to products and their materials. Preferably, the system may access external databases without the user electing to source information from an external source.
[0169] Al technology may be used to detect new inputs of data, identify, match the pattern with keywords in the input, process and convert data into the correct categories.
[0170] A supplier of goods can be determined by the system or elected by the user based on the classifications in the system 10. The user inputs a desired classification of the supplier which the system can search for.
[0171] The CEM of the products may form the secondary and sub-categories of the product, while the product may form the primary category. Each category may be classified or coded in a desired manner.
[0172] The supply and supply type, may include and consist of: manufacturers, OEM manufacturers, trading companies, sister companies, distributors, retailers, buyers, agents, resellers, drop shippers, importers, exporters, wholesalers, contractors, and subcontractors. Each supplier type determines the supply network and the process and systems the product goes through.
[0173] Based on the supplier selected and the product selected, the supply network can be generated by the system and the supply network can be analysed for compliance and conformance of a product. More particularly, the risk of the product can be analysed by the system.
[0174] The supply network can be mapped once the supplier and the product are selected. This may provide a visual representation of the supply network, or a list of activities of the flow of materials and production of the product.
[0175] Establish Stage
[0176] Once the product and end supplier have been determined, the supply network is defined and is categorised in terms of conformance, processes and systems (CPS). The classifications are used in creating the structure of a multiplex network channel (MNC).
[0177] The structure MNC is the structure for the data, which summarises and represents the supply network with the product, end supplier, the constituents and the movements, activities and functions associated therewith. Each of the movements, activities and functions may be assigned with origin risks.
[0178] The data can be sorted by the system into primary categories as rows and secondary categories as columns in a visual representation. The data displayed as the primary category codes in rows and the data displayed as the secondary categories in the columns of each related row comprise cells. The cells may represent the classifications of each secondary category and its sub categories. The data in each column, row and cell may represent a risk origin. The risk origins may be where root causes, risks and gaps occur and can be traced by using the system 10 in a reverse analysis.
[0179] As each product may have a unique function of structure or composition based on manufacturing and processing methods, materials and constituents. It will be appreciated that while products may be visually similar, the constituents of the product may involve different manufacturing methods or processing methods which can impact the overall risk origins of the product.
[0180] Preferably the system uses large volumes of data and information to analyse risks found in procured or purchased products. Preferably, the system has great utility in the construction industry, for example.
[0181] Based on the data in the columns and rows, the system 10 may generate a data sheet, which may be in the form of a spreadsheet, for each primary category. The data sheet may be similar to a bill of materials for itemised viewing. The data sheet includes data and information for secondary categories and sub-categories including risk origins in MNC. The data can be accessed and/or integrated or collaborated with other applications.
[0182] The generated data may also represent the timeline of processing, manufacture and any other desired categories to obtain an overall time schedule to receive a product from a given point in the product life.
[0183] The breakdown of CPS and CEMS for a product may be used to obtain a current state determination in the establishment stage for evaluation and examination in subsequent stages. The results obtained may be used to define the first level or tier of a supply network, or higher.
[0184] Via the system 10, a user interface may allow a user to view risk origins in order of severity, view and manage constituents, trace constituents, define a structure of classification of each primary and secondary category, and enable risk reduction. It will be appreciated that multiple factors may be used to generate a risk origin, and each risk origin may have sub-risks which can be individually assessed or viewed. In this way the system may allow for targeting of smaller risks within the CPS and/or CEMS to gain understanding of the sub-risks and assist with managing the risk origins.
[0185] When suitable products and/or suppliers have been found using the system, the current risk origin state can be determined for the product. This may be achieved by arranging the CEMS and CPS in a current state in risk origins.
[0186] Arrangement Stage
[0187] The supply network MNC and risk origins may be arranged by the system into a current state. Once CEMS and CPS have been established in MNC, a current state analysis is arranged. To determine and establish a current state all past and present experiences can be used by the system to generate the current state risk origins.
[0188] Current state is a set of specific, quantifiable actions that establish a baseline in the stopgap analysis. A stopgap analysis is the difference between both current and future state. It is the beginning of the transition from the current state to a future state.
The difference between both becomes the basis to understanding the risk and skill and knowledge to transitioning from a current state.
[0189] To keep the analysis in a logical arranged order to each risk origin the following may be classified and arranged by providing algorithms specific to each classification: Origin (risk origin), outcome, activity, function, risk and rank. Algorithms used will be specific to the use of the risk analysis by providing statistical data calculations, charts and tables.
[0190] Risk Origins are the origins in which risks originate. Every risk origin has an outcome and is classified as risks or gaps. In an outcome there may be an activity, which caused the risk and a function which occurred. Each origin classified as a risk can be ranked by the system. By classifying the risk origins and defining them using outcomes, activities, functions, risk and rank each risk; an origin can be classified, analysed and given a reason as to why it occurred and how by using the primary, secondary and sub-categories which are classified. Every origin and outcome can be determined and established in both current state and future state by the system.
[0191] As shown in Figure 7, the factors 286 which are ranked may be origins 288, outcomes 290, functions 292, activities 294, risk 296 and rank 298.
[0192] The origin(s) may consist of the locations in which risks originate of the source of defect; cause, source, destination, target or origin. An outcome may comprise the effects on the product, process, system, results, consequences, issues and the chain reaction (if applicable). An activity may refer to activities that have been or caused the origin and the outcome. For example an action, a movement, a task or an act. A function may refer to the function that has caused the activity, origin and outcome: For example, an operation, part, behaviour, role and situation. In one embodiment, a risk is defined as a gap; or as an uncertainty or unpredictable event, possibility, threat, danger, hazard, or financial loss. Some non-limiting risk examples may be; errors, defects, inconsistencies, waste and non-value. Rank can be the risk which is ranked or rated according to a predetermined scale. For example, the predetermined scale may be very high, high, medium, low, very low, occasional, frequent, rare, significant and moderate or as a percentage. Although, it will be appreciated that any numerical or classification ranking system may be used by the system 10.
[0193] Risk may be a likelihood of the performance and quality of the end product being altered to deviate from the required or expected. In another embodiment, the risks may be ranked as a percentage. A risk from a risk origin may be ranked and may be determined by the number of outcomes, activities and functions. The number of outcomes, activities and function determines the percentage ranking from highest lowest and in a colour used as an indicator, for example for display in a MNC.
[0194] Each of the above categories can be coded with a numeric value and non numeric code, which can be used to identify risk origins. All primary categories may be potential risk origins and may be classified as such, and are given a numeric code if the risk origin is present. Secondary and sub-categories may also be classified as risk origins and are given the numeric code linking each to one another as in previous stages.
[0195] The system allows the user to upload or input data of current state risks and/or connect via an API to/from ERM, CRM and/or ERP services. Data uploaded by a user can be associated with that respective user account, user dashboard and/or in the user account personal storage. Optionally, the data can be accessed and/or integrated or collaborated with other applications such as ERP, ERM and/or CRM and/or other user accounts. The data uploaded can be processed by the system and assigned to a relevant risk origin. Algorithms used by the system may be used to identify codes and classifications to assign risk origins and arrange them in the correct order. The system processes the codes and analyses each according to the systems programmed requirements and algorithms. In the current state, the user interface may be used to manually input data into the system. Data may be input into the primary category and/or input into risk origins. If data is input into risk origins, the data may be uploaded as outcome data, activity data, function data, risk data (which may be ranked) input into secondary categories and/or sub-categories.
[0196] If no data is desired to be input during the current state, the current state uses only data stored from classifications in the systems. The system is pre programmed with possible risk origins, in the order of origin, outcome, activity, function, risk and rank. Current state visualization of MNC includes all possible risk origins. Optionally, Al may be used to generate an automated current state. The system searches for and accesses data from stored data, processes the data, analyses the data to be represented visually in MNC. The visual MNC may show risk indicators at risk origins. Each risk origin may be interacted with in the user interface and may be deleted, amended or ignored if the risk origin is not relevant or cannot be avoided. This may be done for all risk origins which are not to be addressed by a control plan generated by the system.
[0197] Current state inputs or uploads by the user may be historical risks or current risks in the procurement and purchasing stages of a product. Each current state may be processed and integrated into the correct primary and secondary categories and can be arranged. Algorithms may be used to identify each origin, outcome, activity, function, risk and risk rank (OOAFRR). Each OOAFRR classified and determined and is digitally stored as data for the user and to be used to detect risk behaviours and patterns and other forms of information.
[0198] The system can analyse new data input, identifies, matches the pattern with keywords in the input, processes and converts the data into the correct primary, secondary and sub categories. Duplicated inputs are deleted and removed from the system. New data is scanned, identified, processed and input into the system.
[0199] Future state represents the standard of excellence of the TPPQ goal. Every origin and outcome must be determined classified and established in both current and future state.
[0200] Evaluate stage
[0201] Arranging a future state will rely on the CEMS and CPS of the product being procured or purchased. In one embodiment, the MNC comprises interactions, information and materials flow. Each CEMS and CPS may be classified, coded and arranged with algorithms in risk origin classification. Every CEMS and CPS risk origin is classified, coded and arranged with algorithms.
[0202] The future state is the desired output of the system, which constructs the transition from the established current state to the defined future state. The future state is determined by the desired product performance and quality and is the standard of excellence (TPPQ) Total Product Performance and Quality. The information in future state complies with CPS and CEMS and includes data in relation to at least one of: origin, supplier, packaging, transport, CEM, facilities, processes, machinery, production, assembly, inspection, scrap/waste, certificates, end/finished product, end supplier/vendor, warehousing, distribution, retailers, customer, regulatory requirements, warranty, installation, contracts, inspection/audits, research and development and insurance each primary category, secondary category and sub categories classified and complied from the system.
[0203] As risk origins are classified the outcome may be determined by the origin. The activity and function is determined and measured by the outcome and origin.
[0204] Future state is necessarily classified and arranged in the order identical to current state to allow direct comparison, accurate scanning and identifying of data to correctly analyse. It used to standardise, control and regulate results and in planning, controlling and managing the future state risks.
[0205] The system is adapted to output an outcome for the future state origins and assign an activity and function, which requires planning, control and management. Optionally, every origin, outcome, function and activity may have an attendant risk, which is ranked, according to the ratings mentioned above for enabling it to be.
[0206] The system may be pre-programmed with possible risk origins, in the order of origin, outcome, activity, function, risk and rank. Current state visualization of MNC includes all possible risk origins, indicators and risk ranks in each risk origin. To generate a future state the system assesses the data of the MNC, and/or CEMS and CPS and may represent the data in MNC visually as a form of risk indicator at risk origins. Current state data may be used to transition to the future state with reliable and accurate information.
[0207] Future state inputs or uploads by the user may be expectations, specifications and standards of CEMS and CPS of a product being procured. Each future state can be processed and integrated into the correct primary and secondary categories arranged algorithms, which may identify each OOAFRR.
[0208] With globalisation and technology advancements in new products materials and a number of risks occurring in the stages of procurement, the system may be updated with new constituents and products including the technology and taxonomy of each. Updates may occur at any predetermined interval.
[0209] When the CEMS is systemised, it is found to refer to or be a function of the hierarchy in MNC tier levels, divisions and subdivisions, members, attributes, classes, taxonomy and materials groups. The CEMS is systemised prior to the CPS being systemised, first to identify the CPS network and its complexity. This enables each CEMS supplier to be determined and to systemise the supply network.
[0210] As seen in Figure 2, systemising the CPS reveal data in relation to at least one of; a customer, retailer, transport, warehouse, packaging, supplier, product, certificate, scrap/waste, inspection, production, machinery, process, facilities, regulatory requirements, warranty, installation, insurance and contracts.
[0211] Examine Stage
[0212] A future state and current state stopgap analysis may be used to assess the supply network. This requires that the CEMS and CPS are evaluated with reference to the MNC. As mentioned earlier, a MNC is a complex systemised network where all activities and functions in a supply network take place. The MNC is arranged and interconnected with the product, supplier and supply network. It is arranged in sequence and in hierarchical order. It is made up of assembled integrated ranges and threads. Each of these has an association and relationship to at least one other. Each channel and network is integrated and distinguished and in relation to another.
[0213] The MNC is cross-functional, with available movements of information and material being forward/backward and horizontal/vertical. Data is structured with a start point and an end point, starting with the CEMS product constituents and then progressing to the CPS factors and in the tier levels of the product as set out in stages one and two. The network channels and systems are linked to one another and are optimised for performance and total solution to index and pinpoint risks and gaps. Operationally functional and effective, the MNC has an input and an output. The MNC comprises multiple functions, movement, resources, waste/scrap, layers, relationships, connected systems, organisations and communication. These are all interconnected in a predetermined order, such as a logical chronological order.
[0214] CEMS and CPS are input into the MNC, which embodies the taxonomy of CEMS and CPS, together with the specific functions and activity areas that occur in the output of a final product. Taking into account input, the CEMS data is input into the MNC before the CPS data, as discussed previously, as CEMS can be used to determine CPS.
[0215] Inputs to CEMS and MNC may be dependent on each other. The CEMS and MNC can be assembled in ranges and threads in association with and linked to one another in order of risk origins. Moreover, they may optionally be in logical hierarchical order and in arrangement of risk origin. As they are recognised and identified in each stage; each stage is responsible for activities and function that has an origin and outcome. Since each has a risk that can be ranked, these determine the areas of available improvement.
[0216] The MNC module in the system of the invention serves to examine the underlying causes of risks and gaps in a product and its supply network. The MNC analyses the origin and outcome by dissecting the parts from which they are made. Origin and outcome refer to the origin of risk and the outcome being the impact caused by realisation or materialisation of the risk. The MNC embodies a deeper analysis of complex risks, which in turn examine the relationships between each CEMS and CPS.
[0217] Risks may involve human and mechanical activities and functions, which can be identified in MNC to assist in formalizing and adding value to a solution and to reach the goal of a TPPQ product. Consequently, outcomes and origins are classified as risks (gaps) as set out below: Risks are identified in the stages described above and in terms of functions and activities of a product procurement, and may have dependencies on at least one other.
[0218] The factors in CEMS and CPS are of equal importance to each other in reaching the state of TPPQ, since they are connected, in communication, stratified and present in movements of data and materials. They can be measured, correlated and analysed. Each activity and its functions are measured, correlated and analysed.
[0219] The CEMS and CPS have factors that contribute to each other. Some contributing factors embody uncertainty, unpredictability and possible cumulative effects, which may elevate risks. This is why each is measured, correlated and analysed with each function and activity. Risks can then be detected and analysed and/or quantified.
[0220] Consequently, the top section of the MNC includes the CPS conformance requirements of a product which may have utility for contractual agreements and conformance requirements relating to the supply of the product when procuring and purchasing construction products. They have been accessed via API to retrieve data and information. The system may have conformance requirements of the product verified by one or more entities before displaying to a user that a product meets a conformance requirement.
[0221] The user interface provides a dashboard to view all stages of information. Blockchain ledgers may be updated with newly stored information in the storage network, which allows for collaboration with other organisation user and/or partners from the supply network.
[0222] The users interface visually represents the MNC in a graphical representation similar to a matrix with columns visual in a colour representing a risk percentage in the particular primary category. Each secondary category can be viewed individually, and represented by a colour and/or percentage, similarly each sub category may also be represented in the same way. The visual representation along with percentages and colour classifications in each risk origins are in correlation to each origin, outcome, activity, function risk and rank from highest to lowest of ranking. The
OOAFRR is viewed in the form of a data sheet outline each and consist of AS and NNC regulatory requirements.
[0223] Results are arranged so that the requirements for identifying risks/gaps in the MNC are set out transparently. Taking into account local, international standards, conformance requirements and validity of certifications that is essential for a product to reach TPPQ standard. The data is accessed, scanned, classified and processed.
[0224] Results from the stopgap analysis define a data output that is standardised. A stopgap is the difference between a current and a future state. It commences a transition from the current state to the future state. The difference between the states becomes the basis for understanding the gap and to transitioning from the current state. Closing the gap adds value to a product, its supply network and the practices of procuring construction products. The stopgap results define a path, a roadmap and a clearer vision of actions that may be required to regulate a future state.
[0225] Once risks and gaps have been identified, understood and arranged, they are rendered manageable for reducing and eliminating the impact of negative outcomes and improving the end product performance and quality.
[0226] The stopgap is standardised according to the order of risk: From highest to lowest or lowest to highest. Each data set comprising of a combination of risk origin outcome - activity - function - risk - rank is analysed and established for comparison against another. Each set has a solution that is to be determined which future state objectives are measured, established and evaluated.
[0227] Future states will have an origin and an outcome. The system may assign the origins and outcomes an activity and a function that requires planning, control and management and every risk origin, outcome, function and activity will give rise to a risk, which can be ranked for planning of its control and management.
[0228] To control and regulate the future state, a solution with strategic objectives is required to be defined as a further input in the method. These objectives are used to inform, control and regulate the TPPQ: Total Product Performance and Quality by translating the systemised CEMS, CPS and MNC results previously described.
[0229] Control and Regulate Stages
[0230] To control and regulate the TPPQ, corrective actions may be used to control risk and place a restraint on every risk origin and/or gap occurring. To achieve a desired TPPQ, the system may return to a future state at every stage of controlling improvements being made to determine projected risks.
[0231] The system can be used to determine a control plan, which may identify at least one of; important critical origins and outcomes, important critical functions and activities, and potential risks that have a rank which have been ranked.
[0232] All risk origins can then be determined and classified. Indicators may be used with the determination and classifications, with indicators being colour and percentages of risks for example. The activities and functions, which include regulatory requirements, CEMS and CPS, can be identified and classified. Indicators impact the monitoring of the system and gives indication of progress in each risk origin.
[0233] Each risk may be a loss and a potential cause of a problem, which may or may not occur. The method addresses all underlying risk (sub-risks), which are found in a particular product being analysed. When a risk is realised by the system and the user may be notified of the risk which allows for development of plans to combat the risk. A control plan can be classified and organised with each risk origin and an outcome, an action plan to solve a risk origin or mitigate a risk origin, functions and activities and a plan to solve the functions and activities. The control plan may be used to account for known risks identified by the system 10, and may address the risks in order of ranking. It will be appreciated that the highest risks may be ranked highest for immediate attention and control. The control plan may be used to solve risks and gaps in the supply chain. Further, the control plan may be used to define a procedure with techniques that conform to the TPPQ.
[0234] Further, the control plan may optionally classify risk origins in a current state which can then be aligned with future state information, which is valid, accurate, visual, traceable and transparent.
[0235] The development of a control plan may be used to improve the risk of a product. Preferably, the control plan is operational, functionally workable and in alignment with risk origins and outcomes; in line with functions and activities, and in line with possible risks that have been ranked.
[0236] The system 10 at this stage may incorporate triggers and notifications at risk origins in primary, secondary and sub-categories. The triggers and notifications can be classified in the origin, outcome, activity, function, risk and rank. A risk origin with a rank trigger and/or notification can only be turned off by user input and may not be automatically turned off by the system. Once a risk has been addressed and brought back to the future state the analysis may indicate that the product meets a desired TPPQ.
[0237] Origins with no risk indicator remain the same. If the user encounters a risk at an origin with no risk an input can be manually input into the system 10. The user interface may be given options to adjust and/or input new information at any stage of the product and supply chain assessment.
[0238] Optionally, a user interface allows a user to input new data in future state is in the form of origin, outcome, activity, function, risk and rank.
[0239] A control plan can be controlled by being regulated and enforced risk origins and outcomes, functions and activities, and risk and rank. Further, the control plan can be controlled by managing and implementing risk origin and outcome, function and activity, and risk and rank.
[0240] When desired risks have been addressed with a control plan, notifications may be issued to a user via any suitable method. For example, a user may be provided text messages, emails, notifications, messages via the system or any other method to ensure that the user complies with the control plan generated by the system.
[0241] Once the control plan has been executed and is being regulated, the desired TPPQ may be reached. It will be appreciated that while all risks may desirably be addressed, the product may achieve a desired TPPQ without all risks being controlled and/or regulated. The system may be used to reduce the number of risk origins and severity of risks in a supply network for procurement of a product.
[0242] The users interface provides a dashboard to view stages and the associated information. The information can be stored and retrieved by a user when desired. Blockchains can be updated with newly stored information, which allows for collaboration with other organisation user and/or partners from the supply network and a verification process to validate collaborations and new data.
[0243] By using the system 10 organisations and industries in the procurement, sourcing and purchasing sectors can benefit from an improved business process that delivers total performance and quality in a product and its supply network. Implementing the method may eliminate wasteful business processes which can increase costs, time of procurement, time of production, or wastage of resources.
[0244] Preferably, the system uses a reverse analysis method, which uses a product, its supplier and its supply network to identify, analyse and eliminate risks and gaps. Although being counterintuitive to current systems, a reverse analysis may be used to improve current practice by performing an improved and effective analysis during the planning stages of a project. To ensure the best practices and to prioritise the cost of quality and safety, it can be used to eliminate risks and gaps in purchasing the product, its elements and materials.
[0245] As the method allows for stage analysis, the system can be used at any stage of procurement to assist with eliminating risks for the remainder of the procurement process.
[0246] Illustrated Embodiments
[0247] There present invention is now described with reference to Fig. 1 to 15. Referring to Figure 1, there is shown an embodiment of a risk management system 10.
The user starts assessing risk by selecting or searching for a desired product 102. The product may be associated with a taxonomy specific to that product, such as a universal code, or an internal reference code 104. The product taxonomy in this embodiment also includes data in relation to the finished product resources 106. In addition, a product may also be associated with an end supplier 108. The end supplier may be associated with a supplier type 110 or other classifier. For example, the supplier type may be defined by a profile which comprises relevant company information. The end supplier data may comprise other optional selections which may be relevant to a particular product 112. The finished product materials and the end supplier data can be individually associated with respective risk factors which may be uploaded to a ledger which can then be uploaded to a blockchain 116.
[0248] Optionally, the supply network 118 may also be assessed for risk factors. The technology 120 associated with the supply network may also be assessed such that gaps or unknowns in a supply chain are minimised. Conformance 121, and processes and systems 122 of the supply chain may also increase or decrease the potential risk of a supply chain. Each of these factors may also be added to the blockchain 116. The overall supply chain network, product details and supplier details may be mapped to a user accessing the system to view a product. Each stage of a supply chain may be displayed or mapped 124 to a user and the risk associated with each stage may be provided to more accurately generate a risk factor.
[0249] Using the generated risk factor, an evaluation 126 of the risk can be made by the system 10. An analysis 128 of all relevant factors for a product and end consumer of the product may be made and control measures 130 put in place to either control a supply chain to reduce a risk factor, or a control measure may be put in place to reduce the risk caused during the supply chain. Regulations 132 or rules may then be put in place to reduce potential risk in relation to the product. Using this method, the risks associated with the product may be reduced and the product quality and suitability (TPPQ) may be increased.
[0250] Referring to Figure 2, there is illustrated an embodiment of an MNC (another example of an MNC is shown in Figure 11) which has been systemised. The CPS 134 and the conformance 135 of a product may have a number of relevant metrics.
For example, the CPS 134 may have a regulatory requirement, a warranty and/or installation requirements. In relation to conformance 135, the packaging of a product, contracts, audits and insurances may all be relevant to the risk of a product. Each of the conformance and the CPS may be related to activities upstream and downstream.
[0251] The flow of materials 140 includes the upstream 136 and downstream 138 activities. The upstream activities may have risks associated with at least one of; CPS system origin, CPS system suppliers supplier, conformance packaging, CEMS CPS product components, Transport, Facilities, Process, Machinery, Production, Assembly, Inspection, Scrap Waste, and Certificates.
[0252] The downstream activities of a product may have risks associated with at least one of; an end product, an end supplier, packaging, warehousing, transport of the product, distribution streams, expected retailers, and customers.
[0253] Figure 3 illustrates a flowchart of a product progressing through a supply network 142. The supply network methods and technology 144 may also be associated with the risk of a product. From left to right, the three arms of the flowchart are directed towards regulatory attributes of a product, manufacturing processes, and supply network. Each of the attributes of the arms may be origins from which risk can originate. As such, understanding this data can assist with generating a suitable control and regulation of a product.
[0254] The regulatory attributes as shown include certification 146, regulatory requirements 148, inspection 150, packaging 152, warranties 156, contracts 158, installation 158, insurance 162, inspection audits 164, and wastes generated 166. The CPS 168 may be a result of the regulatory attributes and the supply network attributes.
[0255] The packaging during transport 154 may be end product transport 154 packaging which may not be the same as consumer packaging. For example, constituents of the product may be assembled at a warehouse before final packaging, or a sacrificial packaging may be used during transport step 154.
[0256] Referring to the manufacturing arm, the product data stored by the system may include data in relation to process 170, distributions 172, production 174, machinery 176, processes 178, and assemblies 180. Each of these attributes may be a general manufacturing process or step which forms the product or constituents thereof.
[0257] The final arm, the supply network, may be how the product moves from raw materials to a final product and through which transport and movement channels the product moves before arriving to a final supplier or entity to be sold to a final customer.
[0258] The supply network may have a system 182 and origins 184. An end supplier 186 may be the final supplier in the supply network before a product arrives at an entity who may deal with at least one sub-supplier 188. Warehousing 192 and facilities may 190 be weak points in a supply network as products may be exposed to harsh or undesired environments, or be subject to weak processing methods or securities. Transport 194 between storage locations (such as 190, 192) to a retailer 198 and subsequently to the customer 199, which may be an entity, may form part of the CPS 168 result. Shipping logistics may also be an origin for risk, such as importation from Asian regions during Chinese New Year or other special holiday events which may cause delays.
[0259] In one embodiment, the primary categories may be; Origin, suppliers/supplier, Packaging 1, Transport, CEM, Facilities, Process,, Machinery, Production, Assembly, Inspection, Scrap/waste, Certificate, End/finished product, End supplier/vendor, Packaging 2, Warehousing, Transport, Distribution, Retailer, Customer, Regulatory Requirements, Warranty, Research and development, Installation, Packaging, Contracts, Inspection/audit Insurance. It will be appreciated that the primary categories may also be classified into a secondary category and/or sub category.
[0260] An example of product data which may be accessed by the system is shown in Figure 4. The product 200 is associated with at least one taxonomy 202 data set which can be a reference code, an internal reference or a universal reference. The reference may be generated by the system and/or manually entered by the user. The classifications 204 of the taxonomy 202 may include details with regards to constituents 206, components 208, elements 210, and materials of the product 212. Each of these classifications may have associated risks as each may also be an origin. For example, if a material is an origin, a risk factor may be assigned if the material is a hazardous material or a process which creates the material is potentially hazardous, or if the materials are sourced from a non-sustainable region the risk to a brand reputation may also be higher.
[0261] It will be appreciated that using the system may show a tangible and real risk mitigation plan (control) which may be used to reduce potential fines, regulatory breaches or other risk related penalties.
[0262] A function of hierarchy 214 of the classifications may include divisions 218 and subdivisions 216, members 220, attributes 222, classes 224, and materials groups 226. This data may be used to generate the CEM which is then combined data of a supplier elected (S).
[0263] An end supplier 230 may be elected and the supplier may be assigned or is associated with a classification 232. The supply network (S)234 may then be generated based on a selected product and the supplier to form the CEMS 236 data. The CEMS data 236 can be visually shown to a user to more effectively understand the supply network for a product and manufacturing methods to form the product. Based on this supply network, the system may begin to determine the origins of potential risks in the supply network.
[0264] The CEMS may be used to systemise the supply network which can then be analysed by the system to determine origins and potential risks.
[0265] Figure 5 illustrates an embodiment of method for use with the system. The method includes determining a risk 238 at an origin 242. The risk 238 may be established 240 based on known data, input data or historical data from the system 10. For example, the risk may be established based on a material used in a product and the origin is therefore known to be related of the material and the origin is known. Based on the origin, the origin can be classified by the system 244 and a location of the origin in the supply chain can therefore be identified. The classified origin can optionally be ranked relative to other origins of the supply network to be controlled by a control plan. It will be appreciated that if no risks are located at an origin, that the system will rank the risk origin as a negligible risk origin which does not require a control to be enacted.
[0266] The outcome 246 of an origin may be a current outcome (current state) or a desired outcome (future state). It is preferred that a future state outcome will reduce risk and the product will be more likely to meet a desired TPPQ standard. Current state outcomes may be associated with a risk which may be identified by the current method, and therefore can be actioned to remove or reduce the risk. Outcomes 246 can be defined 248 by the system 10 based on historical data or input data from a user. Activities 250 which have caused the outcome may be identified and the functions 252 related to the activities250 may also be identified by the system. Functions 252 of the system can be measured 254 and/or assessed to provide an output which can be used to generate a control. The risks 256 identified from the functions and actions at an origin can then be used to generate the risk origin 256. The risk origin can be classified by the system 258 and optionally ranked 260 to develop a control 262 and optionally regulate the product supply network to obtain a desired product TPPQ.
[0267] It will be appreciated that the control developed by the system 10 can be generated by the system without user input such that supply networks can be more reliably controlled by outputs of the system 10. The user may also therefore not be required to generate a solution to a potential risk origin in a supply chain, and the system can provide control measures and/or control plans to bring a product closer to a desired product TPPQ and improve the product.
[0268] This may be of significant importance for an entity as the quality of products may impact the overall business of the entity and may also assist with reducing potential risks of providing a product to a consumer. It will be appreciated that the system can be used for an entity which is the manufacturer and the supplier, and may be used to identify risks within the manufacturing processes of the entity and may be used to improve product performance, or product utility.
[0269] For example, the system may optionally recommend that a certification be obtained for a product to increase the potential market share of a region as compliance may allow for additional sales into boutique or specialised industries. Other benefits from using the system will be apparent to a person of skill in the art.
[0270] Referring to Figure 6, there is illustrated an embodiment of a method suitable for use with the system. The method comprises the steps of determining 264, establishing 266, arranging 268, evaluating 270, examining 272, controlling 272 and regulating 276.
[0271] While the stages are discussed in detail previously, simply, the determining stage 264 comprises a user electing the relevant product and relevant supplier such that the system can generate and establish a supply network. The attributes of the supply network can be separated into at least two of the following categories, for example; Packaging 1, Transport, CEM, Facilities, Process, Process, Machinery, Production, Assembly, Inspection, Scrap/waste, Certificate, End/finished product, End supplier/vendor, Packaging 2, Warehousing, Transport, Distribution, Retailer, Customer, Regulatory Requirements, Warranty, Research and development, Installation, Packaging, Contracts, Inspection/audit Insurance. The categories can be arranged 268 by the system and then evaluated 270 to determine origins and potential risk origins. Examining 272 origins may remove potential risk origins or add potential risk origins to a supply network. Control measures may then be generated by the system based on the potential risk origins which can then be used to regulate 276 the supply network and/or the product such that a product with a desired TPPQ is more likely to be produced.
[0272] The user may then monitor 278 the control plan generated by the system 10. Monitoring messages may be generated by the system when a product progresses through the supply network. The user may then be prompted to enact a control measure in a control plan to minimise or mitigate the potential risk at a risk origin. This may ensure that products are continually monitored for quality assurance to produce a product with a desired TPPQ. Information may be communicated to a blockchain 280 and/or suppliers of the supply chain when controlling and regulation measures are enacted to ensure that compliance with control measures is achieved.
[0273] Referring to Figure 7, there is illustrated an embodiment of a future state and a current state comparison. Both the future state and the current state are associated with the same factors 286; however the current state represents the current supply network without control and regulation measures. The origins 288, outcomes 290, functions292, activities 294, risks 296 and ranks 298 can be assessed by the system to generate a benchmark and formulate a control 302.
[0274] The future state of a product and the current state of the product will provide differences for the system to assess. Each difference may be an origin 288 which has a desired outcome 290. If there is no intervention by a user, the current state outcomes will also be the same as the future state outcomes. However, if a user implements a control plan the current outcomes will change to a desired future outcome. As such, the system is adapted to alter the potential outcomes of origins such that the quality and/or suitability of the product (TPPQ) can be increased. Functions 292 and activities 294 of an origin may dictate the outcomes 290. Risks 296 may be identified at the origins 288 and risk origins can be ranked 298 by the system from importance. The importance of a risk origin may be related to how imminent the risk is in the supply network, the potential damage of the risk in the supply network, a product quality, a material of the product, the source of a product, a supplier of the network, or any other desired attribute for determining risk. It will be appreciated that different industries may present different risks in relation to a product, and may be more or less severe depending on the regulations and compliance of the product.
[0275] The control 302 may be a control plan which a user can enact to reduce the risk of a product. Other control measures may also be put in place depending on the origin of the product (and its constituents) and the destination of the product. Optionally, the control plan and the benchmark may be uploaded to a project file and/or a blockchain. Optionally, instead ofuploading data to a blockchain, a blockchain ledger record may be used by the system to authenticate control plans and/or benchmarks of a product.
[0276] Referring to Figure 8, there is illustrated a communication network of the system 10. The communication network may be adapted to communicate data between a blockchain ledger 306 (or blockchain), a product TPPQ 308, the supply network (or
CMR, ERP and/or MRP systems) 310, a supply network 314 and the stakeholders of an organisation 312. This communication may form a portion of a regulation 304 of a control plan.
[0277] The product TPPQ may be decided by a user of the system, or may be determined automatically by the system based on inputs from a user. The TPPQ may be recorded in a blockchain ledger or in a blockchain. It will be appreciated that a hash or other digital key may be recorded with a blockchain which can be used by the system to display relevant data which will be associated with the time and date stamp of a block of the blockchain. In this way, control measures, and data generated and/or accessed by the system can be preserved for regulatory compliance and risk mitigation. For example, if a control plan was carried out a record of the control plan and steps to reduce risk and improve TPPQ can be provided in the event that an unexpected risk is uncovered. This may be used to limit the potential damage of the risk as risk mitigation steps had been enacted.
[0278] The stakeholders of an organisation, or an entity, may have access to information of a product which is transparent and can be used to promote confidence in a company (entity). The greater transparency may be advantageous for government contracts or other contracts which require a degree of transparency regarding delivery of a product or service.
[0279] Optionally, as the supply network can also be viewed by stakeholders, the supply network can be scrutinised by relevant persons to ensure that compliance of a contract is met, or a product/service will be delivered to a desired specification. As supply networks can be viewed, stakeholders may be able to intervene to divert a portion of the supply chain at any desired time such that potentially controversial suppliers do not form a portion of the supply chain. For example, if a foreign government supplier is a part of a supply chain, it may be a potential conflict, and therefore the supplier may be changed to avoid such a conflict.
[0280] Figure 9 illustrates a flowchart of an embodiment of generating a TPPQ and data which can be uploaded to a blockchain and/or cloud technology. At the determine stage, the system can classify and systemise, at the establish stage, the system can define and categorise, at the arrange stage classifications can be generated by the system. The system may then evaluate. Examining may include; analysing, establishing and evaluating steps. The control step can establish, combine, analyse an evaluate data. Lastly, regulations can be generated which includes determining, classifying, developing and control of product upstream and downstream activities. Each of these steps can be uploaded to cloud technologies, blockchain technologies and utilise Al learning and Al systems to generate the TPPQ product data and related controls. This is a significant advantage over known systems. Preferably, the ledger for the blockchain is decentralised to create a trustless environment. The system may be an app or software system which utilises blockchain which are public open source: and are therefore open to all connected. Everyone can read and add a record, financial or non financial: event keeping, record keeping, materials traceability, and contract and are transparent. Smart contracts/chain codes are software programmed rules where participants in MNC follow the same rules (consist of analysis results in TPPQ). The public address is known by all in MNC. Transparent: all users sign using a private key and verify by public key. The network can be centralised, distributed or decentralised.
[0281] Figure 10 illustrates some primary categories generated by the MNC which include both upstream and downstream activities. These activities have been discussed above.
[0282] An embodiment of a stop gap process which can be executed by the system is shown in Figure 12 to 15. Figure 12 illustrating the first part of the analysis and Figure 13 showing the second part of the analysis. Another embodiment of the stopgap process is shown in Fig. 14. Fig. 15 shows the project frame work for TPPQ integration.
[0283] The following classifications may be used with the system 10, and are examples only and are not limiting.
[0284] Product CEMS may have a primary category of "Smart materials" and a secondary category comprising at least one of; magnetic sheets, alloy shrink tubing, polymath and shape memory.
[0285] Production may be a primary category, with secondary categories including at least one of; intermediate, continuous flow, mass production, made ot order, line production, flexible, discrete. A sub-secondary category may include job shop and batch production as being sub-categories of intermediate, and process and assembly being sub-secondary categories of mass production.
[0286] Product CEMS may have secondary categories including at least one of; raw materials, manufactured materials, composites, metals, wood, ceramics, and textiles. Sub-secondary categories, and sub-sub-secondary categories, may comprise at least one of; farm products, natural products, component parts, component materials, matrix, reinforced, ferrous (pure alloys, alloys), Non-ferrous, pulp and paper, treated, softwood, hardwood, composites, manufactured, glass, cements, clay, advanced, refractory, abrasive, fabric, natural, synthetic, natural-synthetic.
[0287] Processes may have secondary categories of manual and automatic. With sub-secondary categories of automatic and un-paced for manual, and transfer and robotic for automatic.
[0288] Processes secondary categories may further include at least one of; primary, secondary, forming, metal forming, surface finish, moulding, properties process, machining, wood working.
[0289] Scrap/Waste may have secondary categories of at least one of; processed, parts, raw materials, re-used, recycled, discarded, disposal.
[0290] Facilities: Secondary: Staff and safety. Sub-secondary: training, labels and instructions.
[0291] Facilities: Secondary: infrastructure, management, materials, movement, production/process. Sub-secondary categories; size floor space, layout, process layout, inputs/outputs, structure, ISO QC, storage, grade/quality, origin, assembly line, process.
[0292] Packaging: secondary categories: primary, secondary, tertiary. Sub secondary categories: plastic, metal, glass, cardboard, foam, labelling, picture, brand design, symbol, information.
[0293] Machinery: secondary categories: machinery. Sub-secondary categories: type, brand, maintenance, repairs, age, new/second hand, calibration, usage/log.
[0294] Machinery: secondary categories: extraction, oven drying, oven, spray drying, tooling, fixing, coating, mixing, granulation, cutting, assembly, automatic manual.
[0295] Regulatory requirements (CPS regulatory requirements/certificates): secondary categories: government, policies, industry regulations, contracts, standards, ISO, procedures, guidelines, accreditation, conformance, testing.
[0296] Suppliers: secondary categories: manufacturers, OEM manufacturer, Trading companies, sister companies, distributors, retailers, buyers, agents, resellers, drop shippers, importers, exporters, wholesalers, sub-contractors.
[0297] Suppliers: secondary categories: private, public, partnership, sole proprietor, government, local.
[0298] Origins: secondary categories: origin of products, origin of CEMS, origin of machinery, origin of certifications/standards, origin of packaging, origin of staff.
[0299] Warranty: secondary categories: components/parts, materials, exterior/interior surfaces, mechanical order, breakdown, damage, whole/parat.
[0300] Transport: secondary categories: rail, air, sea, truck, car, bike, port, documents, law, customs, tariffs, carriers, channel, transfer, facilities.
[0301] Inspections: secondary categories: QM, QC, QA, Audits, procedures, in house, system, staff training, materials, facilities.
[0302] Contracts: secondary categories: enforceable, language, CPS&CEMS, validity, formation, agreement, performance.
[0303] Installation: secondary categories: instructions, specialised, market compatible, accessories, training, tooling, materials.
[0304] Reference is now made to Fig. 15. Construction projects begin with a product and end with a product. Construction projects may be residential, commercial, specialized or industrial. Often when any project fails, it's due to poor, changed or incomplete specification in the Planning Stage and is often called scope creep. Project scopes or charters define the objectives, deliverables, and the work required to accomplish and deliver the scope to closure. Traditionally, Functions and Features are used to define a product and relate to a customer's requirement that characterizes the product. Technical specifications are used in selection procedures and are divided to perform in a number of stages.
[0305] The system of the present invention is structured with user access that can be incorporated into a project framework in its planning stage where the context is established; product Technical Specifications with the Functions and Features are used to determine and establish the product, end supplier and supply network. Each of the Technical Specification, and Functions and Features is classified and incorporated into the product scope or charter prior to any Procurement Purchasing. The supply network is established CEMS and CPS in MNC giving a current state and future state analysis The data may be communicated through remote collaboration or integrated into a system.
[0306] Project scopes consist of a number of management plans. The Risk Management plans are the internal, external reporting and risk requirements. Risk origins are identified and quantified in order of origin, outcome, activity, function, risk and ranking. Control and regulation are managed by the Quality Management Plan which ensures the correct product to meet regulatory requirement, technical, specifications and grade. Financial planning concerns the Cost involved in procuring or purchasing a product. Financial planning and scheduling activities are recorded in a systematic time-line. The correct supply network generates an electronic road-map that continuously improving the delivery of products, in relation to both cost and time. The scheduling management plans are adapted to assist to manage the risks and possible outcomes in a timeline that shows a roadmap, the correct actions, activities (gannt charts). Control plans are executed, risks are understood and expectations are reached, and the correct information is communicated, all through the Communication Plans.
[0307] Although the invention has been described with reference to specific examples, it will be appreciated by those skilled in the art that the invention may be embodied in many other forms, in keeping with the broad principles and the spirit of the invention described herein.
[0308] The present invention and the described preferred embodiments specifically include at least one feature that is industrial applicable.

Claims (14)

1. A system of computing devices connected to the Internet for identifying
risk, wherein at least one of the computing devices is adapted to carry out a method
comprises the steps of:
registering a product associated with at least one data set related to at least
one of; an origin, a manufacturing material, a supplier, a purchaser, a storage location,
a jurisdiction and a risk score,
registering a supplier with the system, such that a supply network is
generated by the system based on the product and the supplier;
the supply network comprises at least one origin, in which a risk is
determined at an origin; and
wherein the system generates a control based on the risk origin.
2. The system of claim 1, wherein at least one of the computer devices is
adapted to comparing a current state and a future state to generate the control based on
the future state.
3. The system of claim 1 or claim 2, wherein the system is adapted to use a
blockchain for recording data related to at least one of; a risk origin, a supplier, a
supply network, a product and a control.
4. The system of any one of the preceding claims, wherein the control data is
a control plan generated by an Artificial Intelligence.
5. The system of any one of the preceding claims, wherein the supply
network comprises multiple link data structure for storing records of a plurality of
suppliers registered with the system.
6. The system of any one of the preceding claims, wherein at least one of the
computer devices is adapted to receive compliance data in relation to a product which
can be used to verify a certification of a product on the system.
7. The system of any one of the preceding claims, wherein the supplier is an
end supplier of the supply network.
8. The system of any one of the preceding claims, wherein the at least one of
the computer devices is adapted to generates at least one regulation based on the
control.
9. The system of any one of the preceding claims, wherein at least one of the
computer devices is adapted to receive an input of at least one risk at an origin of the
supply network from a user, such that at least one computer devices generates the
control for the risk.
10. The system of any one of the preceding claims, wherein the supply
network is visible to at least one stakeholder to increase transparency of the computer
devices.
11. A method of determining a risk origin of a supply network on a computer
implemented device, the method comprising the steps of:
Selecting a product and a supplier of the product to generating the supply
network based on the product and supplier;
Examining attributes of the supply network to identify origins;
Assessing origins of the supply network;
Generating risk origins based on the assessment of origins;
Generating a control for the risk origins to obtain a desired product TPPQ;
and
Uploading the control data to a blockchain to maintain a record of the
control generated for the product and the supplier.
12. The method of claim 11, wherein the method further comprises the step of
generating a regulation for the control.
13. The method of claim 11 or claim 12, wherein the method further
comprising the step of issuing monitoring notifications to a user of the system when
an origin is met.
14. The method of any one of claims 11 to 13, wherein a record of the supply
network and product is uploaded to a blockchain.
15. The method of any one of claims 14, wherein the record is uploaded to a
blockchain at each origin.
16. The method of any one of the preceding claims, wherein a record of the
supply network and product are communicated via the Internet to a stakeholder.
1 / 15
START
108 118 28 Jan 2020
102 END SUPPLY PRODUCT SUPPLIER NETWORK
110 104 120
TAXONOMY TYPE TECHNOLOGY 2020100138
112 106 FINISHED 122 END PROCESSES, PRODUCT SUPPLIER SYSTEMS, AND RESOURCES CONFORMANCE
114 END SUPPLIER AND FINISHED PRODUCT RESOURCES
116 UPLOAD TO BLOCK CHAIN
124 DISPLAY NETWORK OR DATA
126 EVALUATE
128 ANALYSE
130 CONTROL
132
REGULATE
FIGURE 1
2 / 15 2020100138 28 Jan 2020 135 134 REGULATORY INSPECTION WARRANTY INSTALLATION PACKAGING CONTRACTS INSURANCE REQUIEMENTS AUDIT
CPS CONFORMANCE
CPS SYSTEM TRANSPORT ASSEMBLY END PRODUCT TRANSPORT ORIGIN
CPS SYSTEM SUPPLIERS FACILITIES INSPECTION END SUPPLIER DISTRIBUTION SUPPLIER
CONFORMANCE PROCESS SCRAP WASTE PACKAGING RETAILER PACKAGING
CEMS CPS PRODUCT MACHINERY CERTIFICATE WAREHOUSE CUSTOMER 136 COMPONENTS 138
PRODUCTION
UPSTREAM 140 DOWNSTREAM
FLOW OF MATERIALS
FIGURE 2
3 / 15 28 Jan 2020
142 SUPPLY NETWORK
144 145 182 CONFORMANCE TECHNOLOGY SYSTEM 2020100138
146 170 184 CERTIFICATION PROCESS ORIGIN
END 186 148 REGULATORY 172 DISTRIBUTION SUPPLIER / REQUIREMENT VENDOR
SUB 188 150 174 INSPECTION PRODUCTION SUPPLIER / 154 VENDOR
RESOURCE (CEMS) 152 176 190 PACKAGING MACHINERY FACILITIES END PRODUCT TRANSPORT
156 178 192 WARRANTY PROCESSES WAREHOUSE 196
158 180 194 SHIPPING CONTRACTS ASSEMBLY TRANSPORT LOGISTICS
160 198 INSTALLATION RETAILER
162 199 INSURANCE CUSTOMER
168 164 INSPECTION 166 WASTE/ CPS AUDIT SCRAP
FIGURE 3
4 / 15 2020100138 28 Jan 2020 200 230 PRODUCT END SUPPLIER 234
202 232 TAXONOMY CLASSIFICATION S
206 208 210 212 204
CONSTITUENTS COMPONENTS ELEMENTS MATERIALS
SUBDIVISION DIVISION MEMBER ATTRIBUTES CLASS GROUP
214 216 218 220 222 224 226
CEM 228
CEMS
236
FIGURE 4
5 / 15 28 Jan 2020
238
RISK 2020100138
240 244 ESTABLISHED CLASSIFY
242 ORIGIN
248 246 DEFINE OUTCOME
252 250 254 ACTIVITY FUNCTION MEASURED
258 256 CLASSIFY RISK
262
260 DEVELOP RANK AND CONTROL
FIGURE 5
6 / 15 28 Jan 2020
264 DETERMINE 2020100138
266 ESTABLISHED
268 ARRANGE
270 EVALUATE
272 EXAMINE
274 CONTROL
REGULATE
276 278 COMMUNICATE 280 MONITOR INFORMATION
FIGURE 6
7 / 15 2020100138 28 Jan 2020
282 284 FUTURE CURRENT STATE STATE
ORIGIN OUTCOME FUNCTION ACTIVITY RISK RANK
286
288 290 292 294 296 298
300 302 BENCHMARK CONTROL
FIGURE 7
8 / 15 2020100138 28 Jan 2020
304 BLOCKCHAIN 306 REGULATE LEDGER
308 312 ORGANISATION TPPQ STAKEHOLDERS
SUPPLY 310 314 CMR NETWORK ERP ORGANISATION MRP STAKEHOLDERS
FIGURE 8
9 / 15 2020100138 28 Jan 2020
FIGURE 9
10 / 15 28 Jan 2020
MNC
REGULATORY WARRANTY R&D INSTALL REQUIREMENT 2020100138
INSPECTION PACKAGING CONTRACTS INSURANCE /AUDITS
PRODUCT ORIGIN SUPPLIER TRANSPORT CEMS
PRODUCTION MACHINERY PROCESS FACILITIES
SCRAP ASSEMBLY INSPECTION CERTIFICATE WASTE
END END WAREHOUSE PACKAGING SUPPLIER PRODUCT
TRANSPORT DISTRIBUTION RETAILER CUSTOMER
FIGURE 10
11 / 15 2020100138 28 Jan 2020
FIGURE 11
12 / 15 2020100138 28 Jan 2020
CURRENT CURRENT STATE COMBINE STATE EST. ANOMISED
ORIGIN ACTIVITY FUNCTION OUTCOME RISK RANK
NEW CURRENT STATE
EVALUATE
FIGURE 12
13 / 15 2020100138 28 Jan 2020 FUTURE CURRENT STATE STATE
ORIGIN OUTCOME FUNCTION ACTIVITY RISK RANK
BENCHMARK CONTROL
CONTROL DEVELOP CLASSIFY DETERMINE RESTRAINT REGULATE
FIGURE 13
14 / 15 STOPGAP
FUTURE STATE
REGULATE
ORIGIN OUTCOME FUNCTION ACTIVITY FUNCTION ACTIVITY RISK RANK
CONTROL AND EVALUATE STOPGAP ANALYSIS: STANDARDIZE RESTRAINT
ORIGIN OUTCOME FUNCTION ACTIVITY RISK RANK DETERMINE
CLASSIFY
DEVELOP CURRENT STATE
CONTROL FIGURE 14
PROJECT FRAMEWORK 2020100138 28 Jan 2020 15 / 15 TPPQ :PRINCIPLES AND PROCESS INTERGRATED INTO A PROJECT
PROJECT
PLANNING STAGE
PRODUCT!SCOPE/CHARTER!
TECHNICAL FUNCTIONS & SPECIFICATIONS FEATURES
PROCUREMENT/ PURCHASING
RISK MANAGEMENT QUALITY!&!PERFORMANCE! COST SCHEDULE!!
COMMUNICATION PLAN
FIGURE 15
AU2020100138A 2019-02-11 2020-01-28 System and Method for Identifying, Analysing and Managing Risk for Products in the supply network Active AU2020100138A6 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2019900419A AU2019900419A0 (en) 2019-02-11 System and Method for Identifying Analysing and Managing Risk for Products
AU2019900419 2019-02-11

Publications (2)

Publication Number Publication Date
AU2020100138A4 AU2020100138A4 (en) 2020-02-27
AU2020100138A6 true AU2020100138A6 (en) 2020-08-13

Family

ID=69621491

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2020100138A Active AU2020100138A6 (en) 2019-02-11 2020-01-28 System and Method for Identifying, Analysing and Managing Risk for Products in the supply network

Country Status (1)

Country Link
AU (1) AU2020100138A6 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023220864A1 (en) * 2022-05-16 2023-11-23 广东逸动科技有限公司 Evaluation method, evaluation apparatus, electronic device, and computer-readable storage medium
CN114723345B (en) * 2022-06-07 2022-09-06 国网浙江省电力有限公司 Engineering risk early warning prevention and control data processing method and workbench

Also Published As

Publication number Publication date
AU2020100138A4 (en) 2020-02-27

Similar Documents

Publication Publication Date Title
Gulc Models and methods of measuring the quality of logistic service
US10325222B2 (en) Decision tree machine learning
US20200042915A1 (en) Collaboration system for construction management utilizing shared computing platforms
US20030135481A1 (en) Rules based method and system for project performance monitoring
US20200265357A1 (en) Systems and methods to quantify risk associated with suppliers or geographic locations
Caserio et al. Enterprise resource planning and business intelligence systems for information quality
Awasthi et al. A combined approach integrating gap analysis, QFD and AHP for improving logistics service quality
Sieweke et al. Preferred supplier programs for consulting services: An exploratory study of German client companies
Badenhorst Prioritising the implementation of practices to overcome operational barriers in reverse logistics
AU2020100138A6 (en) System and Method for Identifying, Analysing and Managing Risk for Products in the supply network
Philbin et al. Diagnostic framework and health check tool for engineering and technology projects
Amemba The Effect of Implementing Risk Management Strategies on Supply Chain Performance: A Case of Kenya Medical Supplies Agency
Martijn et al. Determining the effects of data governance on the performance and compliance of enterprises in the logistics and retail sector
US20120158601A1 (en) Defining And Monitoring Business Conduct
Zheng Deployment and Implementation of IFS System Procurement Management Module of Road Network Company
Nicoletti et al. Processes in agile procurement
Nichita Enhancing quality of information through risk reporting in financial statements
Tan et al. A price review framework for maintenance, repair and operations procurement contracts in the public sector
Prabhu et al. Effective qualification of suppliers in manufacturing
Junaid et al. Role of blockchain technology adoption between sustainability related supply chain risks and triple bottom line performance
Nemuel Enhancers for Supply Chain Resilience in manufacturing Firms in Kenya
Maree An impact analysis of customs risk management processes in South Africa
Richardo et al. Development of Supply Chain Spare Part Application in Maintenance, Repair, and Overhaul (MRO) Industry using Blockchain Technology
Wafula et al. The Influence of Procurement Practices on Contract Management County Governments: A Case of Trans Nzoia County
Hariharan et al. Prioritization of risks in bicycle supply chain usin g fuzzy analytic hierarchy process

Legal Events

Date Code Title Description
DA2 Applications for amendment section 104

Free format text: THE NATURE OF THE AMENDMENT IS AS SHOWN IN THE STATEMENT(S) FILED 12 FEB 2020

FGI Letters patent sealed or granted (innovation patent)
DA3 Amendments made section 104

Free format text: THE NATURE OF THE AMENDMENT IS AS SHOWN IN THE STATEMENT FILED 12 FEB 2020