AU2021101071A4 - Data science/ engineering in advanced supply chain process using block chain technology - Google Patents

Data science/ engineering in advanced supply chain process using block chain technology Download PDF

Info

Publication number
AU2021101071A4
AU2021101071A4 AU2021101071A AU2021101071A AU2021101071A4 AU 2021101071 A4 AU2021101071 A4 AU 2021101071A4 AU 2021101071 A AU2021101071 A AU 2021101071A AU 2021101071 A AU2021101071 A AU 2021101071A AU 2021101071 A4 AU2021101071 A4 AU 2021101071A4
Authority
AU
Australia
Prior art keywords
supply chain
commodities
custody
chain
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021101071A
Inventor
Pronaya Bhattacharya
Umesh Bodkhe
Varun Deshmukh
Ram Kishan Dewangan
Amit Kelotra
Ashwin Verma
Mohd Zuhair
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021101071A priority Critical patent/AU2021101071A4/en
Application granted granted Critical
Publication of AU2021101071A4 publication Critical patent/AU2021101071A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Our Invention data science/ engineering in advanced supply chain process using block chain technology is a method of transporting commodities in a supply chain management system including a supply chain. The Invention also includes providing a database and a network in communication with the database, which is accessible by at least one member of the supply chain via the network and also provide a container and supporting one or more commodities using the container, assigning at least one sensor to the commodities, sensing a condition of the commodities and generating a signal indicative of the commodity condition, identifying information related to the commodities, acquiring data related to identifying the commodity information. The invention is a distributing the signal and the acquired data over the network, storing the signal and the acquired data in the database, monitoring the commodities via the network, and managing at least one of storage and transport of the commodities through the supply chain based on the signal and the acquired data. The invented Techniques is to extended supply chain management and extended supply chains may be evaluated and managed by efficiently linking current, past, and upcoming consumer demand signals to the supply chain and the extended supply chains may be managed at select points along the extended supply chains and at select points in time. The invention is a system for tracking and recording the chain-of custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation, to final transfer or disposal. The invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log updated at each change of custody point. The invention is a each such change of custody point, the new custodians who receive the product are provided with the information generated by the originator and the by way of one example, because the system tracks all inputs and outputs to the system at each change of custody point, any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified. 21 15 2015 20 20 20 2 1C-50 42 70 75 AuEnent int3Em MOTC U Re5 l yMNTM ThingMSS7M3 Augmente Inta neO FI.1A Ri e at lwcato neepaycmoity mainge ts ytm

Description

15 2015
20 20 20 2 1C-50
42
70 75
AuEnent int3Em MOTC U Re5 l yMNTM ThingMSS7M3
Augmente Inta neO FI.1A Ri e at lwcato neepaycmoity mainge ts ytm
DATA SCIENCE/ ENGINEERING IN ADVANCED SUPPLY CHAIN PROCESS USING BLOCK CHAIN TECHNOLOGY FIELD OF THE INVENTION
Our Invention is related to a DATA SCIENCE/ ENGINEERING IN ADVANCED SUPPLY CHAIN PROCESS USING BLOCK CHAIN TECHNOLOGY and also relates to a supply chain management system. The invention relates to a supply chain management system that tracks and monitors products, personnel, and assets in a supply chain, and that is accessible over a network by one or more members. Supply and demand commodity chains seek to provide high quality goods to end consumers through management and coordination of services between various participants in the commodity chain. Some products (e.g., food, paint, chemicals, pharmaceuticals, etc.) need to be shipped or transported under predetermined conditions (e.g., temperature, humidity, etc.) to maximize freshness or quality of the product. These products may also be time-sensitive, necessitating quick delivery to an end destination or receiver (e.g., retail store, restaurant, etc.) where an end user (e.g., consumer) may purchase the products. Often, products are shipped over long distances, and can be transferred by land, sea, and/or air in order to reach the retail center within a desired amount of time. In some instances, storage of the products within the commodity chain is necessary to await the next stage in the supply chain. In some commodity chains, the products are not monitored during storage, which can result in damage to or loss of the products.
The invention generally relates to the field of asset and supply chain management and, more specifically, it relates to systems, methods, and processes used for ensuring the chain- of-custody integrity of physical products as such products move along their respective supply chains. Such chain-of-custody integrity systems may be implemented and enhanced using aspects of blockchain encryption technology. By way of one general example, the present invention teaches a system for tracking and recording the chain-of custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation, manufacture, or registration all the way to final transfer, sale, use, or disposal. Through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log accessible at each change of custody point.
BACKGROUND OF THE INVENTION
In one construction, the invention provides a method of transporting commodities in a supply chain management system including a supply chain. The method includes providing a database and a network in communication with the database. The database is accessible by at least one member of the supply chain via the network. The method also includes providing a container and supporting one or more commodities using the container for transport through the supply chain, assigning at least one sensor to the commodities supported by the container, and sensing at least one condition of the commodities using the sensor and generating a signal indicative of the at least one commodity condition. The method also includes identifying information related to the commodities supported by the container, acquiring data related to identification of the information related to the commodities from the sensor, distributing the signal indicative of the at least one commodity condition and the acquired data over the network, and storing the signal and the acquired data in the database. The method also includes monitoring the commodities throughout the supply chain via the network, and managing at least one of storage and transport of the commodities through the supply chain based on the signal and the acquired data.
In another construction, the invention provides a method that includes providing a database and a network in communication with the database. The database is accessible by one or more members of the supply chain via the network. The method also includes transporting a commodity through the supply chain, monitoring characteristics of the supply chain associated with the commodity using at least one sensor, providing a controller in communication with the database and the sensor via the network, the controller including a shelf life prediction algorithm, acquiring data representative of the characteristics of the supply chain from the sensor, the acquired data including at least one of historical data, current data, and expected conditions, and storing the acquired data in the database. The method also includes predicting a shelf life of the commodity using the shelf life prediction algorithm based on the data acquired from the sensor, storing the predicted shelf life of the commodity in the database, providing an input device in communication with the database via the network, and retrieving the predicted shelf life from the database over the network via an input device.
In yet another construction, the invention provides a method that includes providing a transportation system that includes a process control system that has process controls for managing the commodities during at least one of storage and transport of the commodities through the supply chain, implementing the process controls of the process control system, and determining criteria associated with at least one of storage and transport of the commodities in the supply chain using the process controls. The method also includes maintaining the commodities within predetermined conditions based on the criteria determined by the process controls, arranging the commodities for transport based on the determined criteria, and moving the arranged commodities through the supply chain using the transportation system.
In yet another construction, the invention provides a method that includes providing a database and a network in communication with the database. The database includes predetermined conditions that are associated with one or more commodities to be transported through the supply chain, and is accessible by one or more members of the supply chain via the network. The method also includes assigning at least one sensor to the commodities, monitoring at least one condition of the commodities using the sensor, communicating data representative of the at least one commodity condition to the database via the network, and storing the communicated data in the database.
The method also includes providing a process control system including process controls, implementing the process controls to determine one or more operating parameters associated with at least one storage and transport of the commodities in the supply chain, and managing the at least one commodity condition throughout the supply chain based on the stored data and the predetermined operating parameters. The method also includes monitoring assets of the supply chain using the process controls, managing the assets via the network, monitoring personnel management in the supply chain using the process controls, managing the personnel management via the network, managing the commodities during at least one of storage and transport in the supply chain based on the predetermined operating parameters, and maintaining the commodities within the predetermined conditions.
In yet another construction, the invention provides a method of trading commodities in a supply chain that includes providing a database and a network in communication with the database. The network includes a plurality of members of the supply chain, and the database is accessible by one or more of the plurality of members via the network. The method also includes moving commodities through the supply chain, assigning at least one sensor to the commodities, and monitoring at least one condition of the commodities using the sensor. The method also includes communicating data representative of the at least one commodity condition to the database via the network, storing the data in the database, implementing a trading system via the network, and trading commodities within the supply chain using the trading system.
In yet another construction, the invention provides a method of operating a supply chain management system including a supply chain. The method includes providing a database and a network in communication with the database. The network includes a plurality of members of the supply chain and an online access system, and the database is accessible by one or more of the plurality of members via the network. The method also includes moving one or more commodities through the supply chain, assigning at least one sensor to the commodities, and monitoring at least one condition of the commodities using the sensor. The method also includes communicating data representative of the at least one condition of the commodities to the database via the network, storing the data in the database, enabling access to the database by a consumer via the online access system, and tracking in near real-time at least one of a history and a predicted shelf life of the commodities using the online access system.
One major goal of any retailer or manufacturer is to avoid or at least reduceOut-of-Stock situations (also referred to as "Out-of-Stocks"). If a product is out-of-stock, a potential purchaser may decide to buy a different product, buy the product from a different source, or forego the purchase altogether.
Supply-chain, chain-of-custody, and asset integrity are age-old problems. But their importance has been growing as manufacturing has globalized, increasing the time, distance, and number of intermediaries between the originators of assets and the consumers of the assets. Furthermore, as production has consolidated, the volume and value of products traversing complex supply chains has increased their appeal as targets for counterfeiters, gray marketers, and terrorists. Given such consolidation and globalization of production and distribution, it has become increasingly difficult to understand or simply know the provenance of many products produced and distributed outside of a single location. By way of example, one effect of this problem within the electronics and software industries, is that several U.S. defense contractors will not allow products manufactured in certain countries into their data centers because of the potential risk that certain instructions (e.g., software, firmware, or other embedded instructions) may be hidden in the devices that may be part of an advanced persistent threat to exfiltrate confidential or proprietary data from the contractor and/or U.S. defense systems.
In the pharmaceuticals industry, the problem of counterfeit or compromised medications has prompted the enactment of the Drug Supply Chain Security Act ("DSCSA"). The DSCSA requires the serialization of medication packaging as well as the use of transaction documents in order to identify items in transit, using the U.S. National Drug Code, and to identify packaging lot and quantity of the pharmaceutical. Certain problems and issues faced in maintaining the integrity of a supply chain and the validation of the provenance of any product in the chain include:
1. Even where a product is serialized, a counterfeiter may nonetheless create products with duplicate serial numbers. Once created, the counterfeit products may be difficult to distinguish from the authentic products because both are marked with the same serial numbers. Any delay in determining the validity of the product may result in the counterfeit products entering the market and, in the case of pharmaceuticals, create a significant public health risk.
2. If authentic and legitimate products are surreptitiously diverted from the manufacturer's facility or the supply chain, such diversion may still take many weeks or months before the improper theft and sale of the gray-market products are discovered.
3. Similarly, if authentic and legitimate serialized packaging is surreptitiously diverted from the manufacturer's facility or the packaging supply chain, such diversion may take many weeks or months before the stolen or diverted packaging or products is discovered.
Moreover, the contents of these diverted packages may not be legitimate or authentic, which again, in the case of pharmaceuticals, could create a public health risk.
4. Where products are serialized, but not centrally registered, a counterfeiter may be able to create authentic-looking counterfeit packaging with his or her own serial numbers. It may be difficult for a downstream distributor, retailer, or end user to identify such counterfeit packaging or products, and/or verify the product serial numbers. At each supply chain point, each party would be required to separately contact the manufacturer to determine if the number on the product or package is a valid and authentic number. Even with such confirmation of the serial number by the manufacturer, the issue of duplicate serial numbers described under point 1 above still exists.
5. If products or packaging are not serialized, there is very little that can be undertaken to verify authenticity of the products or packaging other than possibly destructive testing. One scenario that has occurred in the pharmaceutical industry is where bad actors obtain or procure legitimate product and then dilute such product in order to increase or multiply the amount of the product to be distributed and sold.
To date, there is no comprehensive solution to these several supply chain integrity problems (including counterfeit products, gray market products, diluted or tainted products, and the creation and use of fabricated and improper transfer documentation) that has achieved market recognition or acceptance.
The inventive system leverages aspects of encryption technology (such as blockchain technology - which is the technology that underlies Bitcoin and other crypto-currencies) to create and maintain a secure chain-of-custody log to address these problems. More particularly, the log uses encryption to associate specific individuals or entities with the assets in their respective custody in a manner that allows for the custodian identity to be kept private. It further allows for these custodians (which may include manufacturers, miners, creators, or their downstream partners) to register products and to record the transfer of custody transactions at each change of custody point. The innovative system further may use techniques such as proof- of-work and proof-of-stake to append transactions to the log. These techniques create a distributed assurance in the integrity of the transaction log, including recording every time that the asset custody changes, with each such appended transaction being included in the encrypted transaction log. One current example of relevant encryption technology that provides certain of the required capabilities for such a system, is blockchain technology.
While there is substantial prior art on the use and application of blockchain encryption technology, most of the known prior art uses the blockchain technique merely to encrypt and decrypt documents. For example, seminal U.S. Patent No. 4,309,569, for ^Method of Providing Digital Signatures by Merkle, teaches a method of providing a digital signature for purposes of authenticating a message, using an authentication tree function of a one way function of a secret number. Nothing in Merkle shows a particular application of the technology disclosed, and shows no application to asset or chain-of-custody integrity.
Similarly, U.S. Patent No. 8,744,076, for a Method and Apparatus for Encrypting Data to Facilitate Resource Savings and Tamper Detection by Youn, discloses a method for generally preventing the tampering of encrypted data. The '076 patent more specifically focuses on the particular encryption technology used, and not on the application of such technology.
One application of blockchain technology is, as described above, used for the creation, maintenance and administration of cryptocurrencies such as Bitcoin. However, the use of blockchain technology in Bitcoin, and in other blockchain based cryptocurrencies, is to create virtual currencies that have no physical form and are not controlled or valued by a central authority. By comparison, the currently described system and methodology is specifically used to monitor, record, and ensure the integrity of physical supply chain products.
A different disclosure relating to chain-of-custody security is Patent Cooperation Treaty application PCT/CA2014/050805 (WO 2015024129) for a Method to Securely Establish, Affirm, and Transfer Ownership of Artworks, by Mc Conaghy, et al. While the '805 application addresses the integrity of the transfer of physical objects, it does not use any blockchain encryption technology, nor does it create any chain-of-custody log. Instead, the'805 methodology merely links ownership of a work of art to an electronic account such as an email address or a Bitcoin address. While the '805 application does reference the Bitcoin master ledger, that Bitcoin ledger pertains only to the transfer of Bitcoins and does not provide any detailed information about the artwork, including product description, quantity, serial numbers, or other important records.
There are other disclosures that provide a description of or use data integrity checking.
However, none appear to use blockchain encryption. For example, U.S. Patent Application Serial No. US 10/522,794 for a System and Method to Provide Supply Chain Integrity, by Pretorius, et al. creates an integrity index based on deviations from "normal behavior in the chain." There is no reference or suggestion of use of any blockchain software or technology within the '794 application. Similarly, U.S. Patent No. 8,714,442 for a System for and Method of Securing Articles Along a Supply Chain, by Sharma, et al. merely authenticates products in a supply chain that have an assigned serial number or some other type of identifier. More specifically, the '442 patent discloses the authentication of products "from the captured identification information at each point" along the supply chain, but does not use or suggest the use of any blockchain software as part of that authentication process.
Further, with respect to supply chain monitoring, U.S. Patent No. 9,015,812, for Transparent Control of Access Invoking Real-Time Analysis of the Query History, by Hasso Plattner and Matthieu-Patrick Schapranow, describes a method for granting access to a repository for use in a supply chain, a product tracking system, a medical care environment or a power grid, a repository storing data, the data being sensitive business data pertaining to one or more supply chains, event data pertaining to one or more traceable products, medical data pertaining to one or more patients, or measurement data pertaining to one or more measurements, and wherein an access control server (ACS) is connected to the repository via a link. There is no reference to or suggestion of use of any blockchain technology or encryption technology.
Accordingly, there is a compelling need for new systems, processes and methodologies for ensuring the chain-of-custody integrity of physical products as such products move along their respective supply chains. Such chain-of-custody integrity systems may be implemented and enhanced using aspects of blockchain encryption technology. The present invention recognizes the deficiencies and drawbacks of the current supply chain systems, and the prior attempts to address some of the problems and weaknesses of supply chain integrity. The present innovative system, process and methodology incorporates blockchain software technology to address this challenge and resolve several of the flaws inherent in the current systems and processes.
OBJECTIVES OF THE INVENTION
1. The objective of the invention is to a method of transporting commodities in a supply chain management system including a supply chain and the Invention also includes providing a database and a network in communication with the database, which is accessible by at least one member of the supply chain via the network and also provide a container and supporting one or more commodities using the container, assigning at least one sensor to the commodities, sensing a condition of the commodities and generating a signal indicative of the commodity condition, identifying information related to the commodities, acquiring data related to identifying the commodity information. 2. The other objective of the invention is to a distributing the signal and the acquired data over the network, storing the signal and the acquired data in the database, monitoring the commodities via the network, and managing at least one of storage and transport of the commodities through the supply chain based on the signal and the acquired data. 3. The other objective of the invention is to a extended supply chain management and extended supply chains may be evaluated and managed by efficiently linking current, past, and upcoming consumer demand signals to the supply chain and the extended supply chains may be managed at select points along the extended supply chains and at select points in time. 4. The other objective of the invention is to a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation, to final transfer or disposal and the invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log updated at each change of custody point. 5. The other objective of the invention is to a each such change of custody point, the new custodians who receive the product are provided with the information generated by the originator and the by way of one example, because the system tracks all inputs and outputs to the system at each change of custody point, any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified.
SUMMARY OF THE INVENTION
he present invention overcomes the disadvantages of the prior art and fulfills the needs described above by providing systems and methods for ensuring the integrity of an asset supply chain through creation and use of an electronic chain-of-custody data file where such data file uses encryption technology to record and maintain relevant transaction information.
A preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of-custody data file, and the data file being built upon encryption technology to record and maintain asset chain-of-custody transaction information. Another preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of- custody data file, and the data file built upon encryption technology to record and maintain asset chain-of-custody transaction information, wherein the encryption technology is blockchain technology. A further preferred embodiment of the invention is a system for ensuring integrity of an asset supply chain, with the system creating and using an electronic chain-of-custody data file, and the data file being built upon encryption technology to record and maintain asset chain- of-custody information, wherein the system creates a non-repudiatable log of each custody transfer from asset generation, manufacture, or registration to and through asset final transfer, sale, use or disposal.
Another embodiment of the invention is a computerized system for ensuring integrity of an asset supply chain, said system creating and using an electronic chain-of-custody data file using encryption technology to record and maintain asset chain-of-custody information, said system comprising (a) at least one computer server; (b) a plurality of terminals, each of said plurality of terminals being associated with at least one of a plurality of agents along said supply chain; (c) a software application operating on said at least one computer server; wherein said at least one computer server operates a methodology comprising the steps of (i) registering each of said plurality of agents within said software application; (ii) providing a unique encrypted identifier to each said registered plurality of agents; (iii) registering an asset by an initial agent, said registration including descriptive metrics of said asset; (iv) encrypting an identity of said asset and said initial agent into a non-repudiatable log; (v) registering acceptance of said asset by a new agent, at each change of custody of said asset, said subsequent registration including descriptive metrics of said asset; and (vi) adding a record of such registration acceptance to said non-repudiatable log.
Still another embodiment of the disclosed invention is a methodology for ensuring integrity of an asset supply chain, said methodology creating and using an electronic chain-of- custody data file using encryption technology to record and maintain asset chain-of-custody information, said methodology comprising the steps of (a) registering each of said plurality of custodians within said software application; (b) providing a public/private key pair to each said registered plurality of custodians; (c) registering an asset by an initial custodian, said registration including descriptive metrics of said asset; (d) at each change of custody of said asset, said new custodian registering acceptance of said asset, said subsequent registration including descriptive metrics of said asset; (e) at each change of custody of said asset, generating at least one report transmitted to the prior and new custodian to confirm a change in custody of said asset; and (f) generating further reports transmitted to at least one member of said supply chain, said reports including relevant administrative information.
BRIEF DESCRIPTION OF THE DIAGRAM
FIG. 1-A: is a schematic flow chart of an exemplary commodity management system. FIGS. 1-3 illustrate block diagrams of various systems according to some embodiments.
DESCRIPTION OF THE INVENTION
Before any constructions of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other constructions and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of "including," "comprising," or "having" and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. Unless specified or limited otherwise, the terms "mounted," "connected," "supported," and "coupled" and variations thereof are used broadly and encompass both direct and indirect mountings, connections, supports, and couplings. Further, "connected" and "coupled" are not restricted to physical or mechanical connections or couplings.
FIG. 1-A: shows a commodity management system 10 used to monitor and control various aspects of products or goods or perishable commodities in a supply chain from creation to final distribution. The management system 10 is accessible by various members 15 of the supply chain that are associated with the products to be shipped and received. The members 15 include suppliers, packaging and processing centers, transportation systems, distribution centers, and receivers (e.g., retail store, restaurant, etc.). In some constructions, the members 15 can also include auditors, and brokers or financial institutions (e.g., insurance company, bank, etc.). In other constructions, other ancillary participants can be members 15 (e.g., customs and quarantine authorities, freight forwarders, exporters, importers, government agencies, consolidators, terminal operators, ground handlers, ramp handlers, emergency services, information providers, depot operators, port authorities, manufacturers, consumers, etc.). The quantity and types of members 15 listed above are not exhaustive, and other participants of the management system 10 are considered.
The management system 10 includes a network 20, a product or commodity monitoring system 25, a data center or database 30, and a process control system 35. The network 20 is in communication with each member 15, the product monitoring system 25, and the database 30 to provide communication between various components of the management system 10. The network facilitates acquisition and distribution of information or data related to products in the supply chain. The information can include sensed conditions of the products in the supply chain, instructions or other communications from and/or to one or more members 15, or communications from the database 30. The network 20 can include a completely wireless system, or alternatively, a combination of wireless and wired system components.
The product monitoring system 25 is associated with the products or commodities to be shipped between members 15, and is in communication with the database 30 via the network 20. The product monitoring system 25 includes one or more sensors 40 and a reader 45. The sensors 40 are assigned to the products to monitor time sensitive data, such as environmental conditions of the product and the surrounding atmosphere (e.g., temperature, humidity, shock/vibration, light, radiation, other atmospheric conditions such as ethylene content, etc.). The sensors 40 also can store product information (e.g., price, date of purchase, date and location of inception/harvest, weather conditions, environmental conditions, etc.) and monitor the location of the products. In some constructions, the sensors 40 can be located adjacent the products or directly attached to the products.
The sensors 40 are in communication with the readers 45 over the network 20, and are defined by active or semi-active or passive or semi-passive radio frequency identification ("RFID") sensors or transponders that retrieve and store information related to the products in the supply chain. The active RFID sensors 40 include a long-lasting internal power source that can generate a signal to the reader 45 over relatively long distances (e.g., 300 feet). The semi-active RFID sensors 40 are battery-assisted sensors that detect parameters of the product, and have the ability to power down (e.g., a sleep mode) to conserve battery power. The passive RFID sensors 40 draw power from the readers 45. In other constructions, other sensors can be used to sense parameters of the product (e.g., ultra-high frequency sensors, etc.).
Each reader 45 is in communication with one or more of the sensors 40 to receive and process the sensed data according to parameters established by the members 15. The reader 45 can be in wireless or wired communication with the sensors 40, and can be separate or integrated with the sensors 40. An antenna (not shown) can be used to communicate the data from the sensors 40 to the reader 45.
The database 30 is in two-way communication with at least some of the members 15 via the network 20 such that the members 15 can input predetermined parameters or conditions into the database 30 (e.g., product characteristics, environmental parameters, etc.), and retrieve data from the database 30. In other words, the members 15 who are in two-way communication with the database 30 have read access to the database 30 and are able to manipulate data in the database 30. Communications between other members 15 and the database 30 may be one-way communications (i.e., the members 15 have read-only access to the database 30).
The database 30 is programmed with initial set point values or predetermined conditions for a particular product based on the predetermined conditions. These predetermined conditions can include a minimum temperature, a maximum temperature, an acceptable humidity range, and maximum shock or vibration that can be adequately sustained by the products. The database 30 also can include additional predetermined conditions (e.g., other atmospheric conditions, light, etc.). based on the type of product to be shipped.
A controller or microprocessor 50 is in communication with the database 30 and the readers 45 via the network 20 to receive one or more signals from the readers 45 that are indicative of the sensed or monitored data, and to deliver the sensed signals to the database 30 for storage and retrieval. In some constructions, the product monitoring system 25 and the process control system 35 are incorporated into the controller 50. The controller 50 is further in communication with the database 30 to compare the sensed conditions of the products with the predetermined conditions stored in the database 30 to determine whether the products are within the predetermined parameters established by the members 15.
The controller 50 includes application software that uses data collected from the sensors 40 to determine an approximate shelf life of the product. The application software is accessible by the members 15 via the network 20, and includes one or more shelf life prediction algorithms 55 to analyze product historical data, current data, and future or expected conditions that may impact the product, and to establish an estimated or approximate shelf life for the product. The historical data can include environmental conditions present during harvesting such as weather patterns, temperature, humidity, and the like. The expected conditions are based on the environmental conditions, the location, and other data associated with the product that can be used to accurately predict future product conditions. In some constructions, additional algorithms 60 can be used to determine other important factors or characteristics related to the product.
The controller 50 also includes a response system 65 that generates an automated signal or alarm to each appropriate member 15 with a particular interest in the shipped product in response to sensed conditions that exceed the predetermined conditions. The automated signal can trigger configurable responses including, but not limited to, delaying shipment of the product to determine possible damage to the product in response to the out-of-range or adverse condition. The automated signal generated by the controller 50 can also deliver instructions to various members 15 regarding whether the product should be returned, or whether the product can continue within the supply chain to be delivered to the receiver.
The management system 10 illustrated in FIG. 1 shows members 15 such as the suppliers (e.g., grower, manufacturer, etc.), the packaging and processing centers, the transportation systems (e.g., truck and trailer, airlines, railroads, ship, etc.), the distribution centers, and the receivers linked to each other and to the database 30 via the network 20. Generally, the network 20 links the members 15 of the management system10 to each other and to the database 30 to enable communication between the members 15 and the database 30, and between the members 15. As discussed in detail below, the network 20 facilitates communication of product data and decision-making between members 15 in the management system 10. The network 20 further enables control and monitoring of the products, the process of product delivery, and the personnel within the management system 10 to assure adherence to specific criteria and to optimize product quality.
In operation, the network 20 is in communication with the product monitoring system 25 and the database 30 to provide communication between components of the product monitoring system 25, between the product monitoring system 25, the database 30, and the controller 50, and between the members 15. The sensors 40 sense various parameters of the products in the supply chain and deliver signals indicative of the sensed parameters to the readers 45 over the network 20. The readers 45 read the sensed parameters from the sensors 40, and process the data according to the parameters established by the members 15. Each reader 45 communicates respective signals indicative of the sensed parameters to the controller 50. The signals received by the controller 50 are stored as data in the database 30 and compared with the predetermined conditions to determine whether an out-of-range condition exists.
The controller 50 can initiate the response system 65 to generate a corresponding alarm to one or more members 15, and to delay or return the product, if necessary, in response to a sensed out-of-range condition. In some constructions, the controller 50 can operably determine a response to the sensed conditions and can communicate the response to the database 30 and/or to the members 15. In other constructions, the database 30 can operably determine a response to the sensed conditions received from the readers 45 and the controller 50, and can communicate the response to the members 15 via the network 20.
The controller 50 determines the shelf life and other expected characteristics of the product based on the sensed conditions and prior, historical conditions stored in the database 30 using the shelf life prediction algorithms 55 and/or the additional algorithms 60. The shelf life information associated with particular products is stored in the database 30 and is accessible by members 15 via the network 20. The predicted shelf life can be a specific date on which the product is expected to expire, or alternatively, the shelf life can be a period of time in which the product is predicted to remain viable. In some constructions, the controller 50 can automatically generate a report containing the shelf life information. The controller 50 can also generate reports containing the shelf life information in response to requests from members 15. In these constructions, additional information can be included in the reports (e.g., sensed conditions of the product, product information, product location, historical data, etc.).
Often, products are stored and/or transported on pallets or other storage and shipment devices (e.g., packages, containers, consignment for transport, etc.). A unique sensor 40 is assigned to each pallet or a group of pallets to identify the products on the pallet or pallets. For example, the sensor 40 can be assigned to a particular pallet by the supplier when the product is harvested or manufactured. Alternatively, the sensor 40 can be assigned to the pallet when the product is prepared for shipment or transport from the supplier to other members 15 in the supply chain. The supplier or another member 15 can input the identity of the product and any other related information (e.g., weather conditions during harvest, manufacturing conditions, etc.) into the sensor 40 when the sensor 40 is assigned to particular product. In some constructions, each sensor 40 can be assigned to a particular type of product and/or package and/or container and/or consignment for transport.
In some constructions, a data storage device or bar code 42 can be assigned to each product on a pallet or in a container to store static information related to the product. Generally, the bar codes 42 are two-dimensional bar codes that include information related to the origins of the product on which the bar code is affixed (e.g., directly to the product or on product packaging, etc.), and other relevant information. In other constructions, the bar codes 42 may include other data storage devices (e.g., RFID tags, etc.). Hereinafter, the term "bar code" shall be used to represent all such data storage devices and shall not be construed to limit the invention's application solely to two dimensional static bar codes. The information can be downloaded or input or encoded in the bar code 42 at any point in the supply chain, and further can be attached to the products at any point in the supply chain (e.g., by a farmer, manufacturer, etc.). For example, the information may be encoded in the bar code 42 when the product is harvested or manufactured.
One sensor 40 may be assigned to one or a plurality of bar codes 42 associated with a corresponding number of products on a pallet. In some constructions, more than one sensor 40 may be assigned to a particular bar code 42. Some bar codes 42 are no longer associated with the assigned sensor 40 after the products are separated from the pallet with which the sensor 40 is in communication. Generally, the data or information collected by the sensor 40 that is related to the removed bar coded product is nested or stored in the database 30, and is associated or linked in the database 30 with the assigned bar code 42 that is now separated from the sensor 40. As a result, the conditions or parameters sensed by the sensors 40 can be associated or linked to the bar code(s) 42 via the database 30, and can be recalled by one or more members 15.
When the sensor 40 is assigned to the bar code 42 on a particular product, the assignment information between the sensor 40 and the bar code 42 is stored in the database 30 for retrieval by the members 15. For example, when products are initially placed in the supply chain, one or more sensors 40 are assigned to the bar code 42 corresponding to a particular product. When a product is separated from the first assigned sensor 40, one or more additional sensors 40 may be used to sense conditions and parameters associated with the product. The sensed information, as discussed above, is stored in the database 30. In order for the stored information related to a particular product to be recalled by one or more members 15, the additional sensors 40 are also assigned to the bar code 42.
Each bar code 42 is a static information storage system that includes information related to the corresponding product as of the date on which product information was entered or encoded in the bar code 42. The conditions to which the product is subjected to after the information is encoded in the bar code 42 are generally not included in the information stored in the bar code 42. In some constructions, writable or rewritable bar codes may be used to allow additional information to be encoded in the bar code 42. Generally, the information that is encoded in the bar code 42 allows substantial information related to the product, including historical information, to be accessed via the database 30. The association between the sensors 40 and the bar codes 42 in the database 30 allows the receiver to better manage inventory, and allows an end user or consumer to make a more reliable purchasing decision.
Each bar code 42 represents or identifies a particular product to which the bar code 42 is associated. The bar code 42 may include only an identifier, or may include a part of or a complete history of the product from the product's inception or harvest, including environmental conditions, the time period between inception and delivery to the receiver, and other parameters that are measured by the corresponding sensor 40. Each bar code 42 provides a link within the database 30 to information related to the product that was sensed by one or more sensors 40, and to information related to the shelf-life of the product for access by a consumer or a receiver.
In some constructions, the shelf life information may be accessible by accessing the database 30. For example, when a consumer purchases a package of apples with the bar code 42 affixed to the package, the consumer or the receiver can use an input device or bar code scanner to scan the bar code 42 and determine the estimated shelf life for the apples. Alternatively, a user can input the number or label associated with the bar code 42 to determine the estimated shelf life. The scanner is in communication with the database 30 via the network 20 so that the information sensed by the sensors 40 and assigned to the bar code 42, and therefore assigned the bar coded product, can be accessed using the bar code 42. As a result, product information gathered throughout the supply chain can be accessible using the bar codes 42 as an identifier within the database 30.
In other constructions, the shelf life information may be directly encoded in the bar code 42, and can include the date on which the information from the sensor 40 was encoded in the bar code 42. The consumer can calculate the remaining shelf life based on this encoded date. Alternatively, the bar code scanner may be programmed to calculate the remaining shelf life based on the information scanned from the bar code 42.
The readers 45 communicate with the sensors 40 to capture information or data related to the products (e.g., product type, conditions of the product, etc.) and to deliver the information to the database 30 via the network 20. The algorithms 55, 60 used by the controller 50 measure the quality of the products by estimating or predicting the shelf-life of the products as well as other data related to the products. Communication of product information from the readers 45 to the database 30 occurs throughout the shipping process to provide up-to-date, near real-time data regarding the quality of the products. The sensors 40 are read by the reader 45 continually or at predetermined intervals. The controller 50 uses the algorithms 55, 60 to update the shelf-life calculations based on the most recent data, and stores the updated calculations in the database 30.
The process control system 35 includes predetermined process controls and monitoring procedures 70, personnel management 75, security monitoring systems 80, and product monitoring systems 85. The predetermined process controls 70, the personnel management 75, the security monitoring systems 80, and the product monitoring systems 85 are implemented within the management system 10 at each step in the supply chain to regulate the quality of the product to be delivered to the receivers.
Generally, the process controls 70 include work flow, timing, and qualitative measurements of the products. The suppliers (e.g., farmers or growers, manufacturers, etc.) implement the process controls 70 to provide a product that has relatively high quality to the receiver. A farmer can use certified processes to effectively manage the harvest of perishables from a farm. A manufacturer can use certified processes to produce products that have dependable, homogenous features or characteristics (e.g., consistent paint color, chemical composition, etc.). Auditors or other similar personnel can be used to conduct random audits and to post findings or audit reports in the database 30 for access by other members 15 in the management system 10. The information in the audit findings can be reviewed by appropriate members 15 to establish conformity with standard operating procedures that were previously agreed upon by each member 15.
The packaging and processing centers include the process controls 70 to regulate products received from the supplier. Similar to the supplier, the packaging and processing centers can be subjected to audits by auditors to determine whether the processes conform to established operating procedures. The determinations by the auditors are entered into the database 30, and can be viewed by enabled members 15.
The process controls 70 implemented by the transportation systems can be used to determine how products should be arranged during shipment to maintain parameters of the goods within the predetermined conditions stored in the database 30. For example, a certified process can be implemented to establish certain criteria or operating parameters regarding how pallets of products are loaded onto a truck or other transport vehicle. The certified process prevents products from being loaded in a way that reduces airflow around the product, which can cause the environmental conditions of the products to differ from the predetermined conditions, and which may impact the shelf life of the product.
In some constructions, electronic curtains (e.g., laser curtains, radio frequency curtains, etc.) can be installed in the shipping compartment (e.g., container, cargo hold, etc.) of the transport vehicle. The electronic curtains can be dynamically implemented based on the product being transported to ensure adequate regulation of the product conditions and to avoid any variations from the desired predetermined conditions. The products are loaded into the shipping compartment such that a constant, unbroken electronic curtain is maintained. The management system 10 can deliver a message or report to an operator of the vehicle that indicates whether the electronic curtain has been broken. Based on the parameters of the process controls 70, the products cannot be shipped to a subsequent destination until all electronic curtains have been maintained.
The distribution centers can utilize the process controls 70 to direct loading and unloading products from the transport vehicles. The process controls 70 also regulate storage of the products in warehouses or other storage areas. Similar to the process controls 70 discussed above with regard to the suppliers and the transportation systems, the process controls 70 include processes to audit the distribution centers so that the distribution centers within the management system 10 are in compliance with standard operating procedures. The results or findings of the audits are stored in the database 30 (e.g., as audit reports) for future reference by members 15 of the management system to facilitate training and certification of products and assets (e.g., refrigeration systems, heating systems, etc.) in the supply chain.
The process controls 70 may also be used to monitor product loads (e.g., individual pallets, transport units, etc.) that are left unattended by the transportation systems. For example, the sensors 40 or other sensors may include an audio and/or visual alarm that communicates a detrimental condition affecting the products on which the sensors 40 are affixed. The sensors 40 can send out the alarm directly (e.g., to the area surrounding the products), or through the network 20 to one or more members 15 via the controller 50 and the database 30 similar to the alarms generated by the response system 65. In some constructions, the alarm can be generated by the sensors 40 when the sensors 40 have not been read by the readers 45 for a predetermined period of time. In other constructions, the alarm may be generated by the sensors 40 when the sensors 40 detect adverse conditions (e.g., high temperature, low humidity, high humidity, etc.) adjacent to the products that are being monitored.
The personnel management 75 is similar for each member 15 with access to the management system 10, and regulates access to the products and/or facilities, and to information related to the products through an access control system controlled by the controller 50. The access control system stores information related to each member 15 (e.g., certifications, employee information, etc.) in the database 30 to regulate access to the products and information related to the products. The access control system provides dynamic scheduling of personnel to allow changes to or modification of personnel access privileges to the products and/or facilities (e.g., access to some but not all bays at a warehouse, etc.) in the supply chain. Personnel access privileges are maintained in the database 30 for access by members 15 with appropriate credentials.
Generally, the personnel management 75 generates reminders or alarms related to re certifications and training for each member 15 based on the information stored in the database 30. The members 15 are trained and certified such that the products are handled in each phase of the supply chain according to predetermined operating parameters that are defined by the process control system 35. With regard to the suppliers, personnel can be certified to harvest or produce products according to the corresponding predetermined operating parameters. With regard to the processing centers and distribution centers, personnel can be certified to handle, process, and store products according to associated predetermined operating parameters. Transportation systems personnel can be trained and certified to control loading and unloading of products from the transport vehicles, and to maintain the products at the desired predetermined conditions (e.g., temperature, humidity, air quality, etc.).
The training and certification reminders are delivered to respective members 15 based on a predetermined schedule. For example, the reminders can be delivered to members 15 thirty days prior to expiration of certification. The personnel management 75 also includes controls that propose future training and re-certification processes to the members 15 so that certification of each member 15 can be effectively maintained. In some constructions, the personnel management 75 can also include an automated time and attendance system to calculate the time that particular personnel have worked with or handled the products. The personnel management 75 uses the information gathered by the time and attendance system to determine payroll consequences, and to calculate the cost associated with the products (e.g., harvesting, manufacturing, storing, shipping, moving, etc.).
FIG. 1, one or more application interfaces (such as Web Services (WSs)) may be used as an interface to operate various functions provided by the system. Also, one or more web applications (e.g., to manage client service operations and/or to provide client/customer management) may be included in the system. A processing engine may be coupled to one or more Back Office (BO) resources to manage BO inventory, information, etc. A resource/load management module may be coupled to an operational Data Warehouse (DW). The operational DW may provide load, preparation, reconciliation, calculation, and/or publication facilities. An audit module may audit operations/data at any point in the system of FIG. 1 (such as auditing of prepared input, calculation, output, and/or reporting). An output system may provide data to applications, for reports, data exporting, and/or data feeds. Also, technical operations applications may be provided in the system to control technical operations of various modules of the system. Even though some of the items discussed herein refer to a web-based application/implementation, all embodiments are not necessarily required to utilize web-based services. For example, a stand-alone (or non-networked) computing system may be used. Also, various embodiments may utilize different types of networks (such as intranet, wide-area networks, cellular network, wireless broadband, or other networks discussed herein (see, FIG. 4, for example), etc.) and not limited to an Internet-based network. Furthermore, a combination of network technologies may be used in some embodiments.
FIG. 2 illustrates a block diagram of a system according to an embodiment. As with the system of FIG. 1, the system of FIG. 2 also includes an input system and an output system. A calculation system is also provided that couples the input system to the output system. Different types of input data may be received such as discussed with reference to FIG. 1 but as an example a bulk input engine may receive input data. Various input data may be provided such as master analytics data, inventory data, sales and prices data, deliveries data, and/or output masters in the input system. Also, input tables may be provided such as sales and price table (e.g., including forecasts), delivery table, shipment table, and/or orders (e.g., including suggested orders, orders from handhelds, orders from customers), and/or inventory (which may be populated from handheld, mobile apps, bulk load, and/or order guide).
Referring to FIG. 2, a reconciliation engine may be coupled to the input data bases and core data bases (e.g., provided in the calculation system). As shown, the core data may include master analytics data, inventory data, sales and prices data, and/or deliveries data. In an embodiment, the reconciliation engine may reconcile the input data in accordance with the output masters (in the input data and/or output data such as shown in FIG. 2) to provide the core data for the calculation system. Also, core tables may be provided for inventory, sales and price, deliveries, and/or master data (calculating a measurement/index). Further, master analytics data may include turn parameters, data adjustments, promotion model, merchandise model, inventor model, and/or store item active data.
The core data is provided to a calculation engine (which may forecast inventory orders). The calculation output may then be validated and published to the output system. The output data within the output system may include suggested order data, forecasts data, inventory, targets, calculated minimums, output masters, etc. (e.g., such as the data discussed with reference to FIG. 1).
Output of the output system may be archived via an archive process in an archive data storage. Further, as shown in FIG. 2, one or more applications may have access to the input, core, and output data, e.g., for data management, technical operation management of modules within the system of FIG. 2, etc. For example, the applications may submit data to input and output systems. Applications may be distributed (or disconnected) versions of the core and calculation engines in some embodiments. Additionally, system control may be performed via one or more process queues, and DC administration module, through a project management module, etc. Security (e.g., via encryption) and data logging may also be provided in some embodiments.
FIG. 3 illustrates a block diagram of a system in accordance with one embodiment. Various items in the system ofFIG. 3are marked with numerals1through5. The following is a logical breakout of the server types and components of FIG. 3. Although many servers are shown, these may be consolidated in smaller systems or distributed in larger, co-located, or remote systems.
1-DB Servers would contain one or more project database sets (or projects spread across DB servers). The server could be a DW appliance such as those provided by Netezza " T Corporation as well. In some embodiments, these could be OS and/or DB agnostic.
2-Application servers contain the task distributor and associated dependencies. These may perform light weight jobs-e.g., pushing all processing burden to the DB servers. However, multiple instances may be run on a single server (or on multiple servers) using the same task queue DB. In some embodiment, a Windows@ server may be used for the server(s).
3-These are central DB's. Location could be anywhere, so they are not shown tied to any specific server.
4-All web-based applications. Possible to have multiple to load balance. Acts as the application interface for many operations.
-ETL (Extract, Transform, Load) modules and DW.

Claims (6)

WE CLAIM
1. Our Invention data science/ engineering in advanced supply chain process using block chain technology is a method of transporting commodities in a supply chain management system including a supply chain. The Invention also includes providing a database and a network in communication with the database, which is accessible by at least one member of the supply chain via the network and also provide a container and supporting one or more commodities using the container, assigning at least one sensor to the commodities, sensing a condition of the commodities and generating a signal indicative of the commodity condition, identifying information related to the commodities, acquiring data related to identifying the commodity information. The invention is a distributing the signal and the acquired data over the network, storing the signal and the acquired data in the database, monitoring the commodities via the network, and managing at least one of storage and transport of the commodities through the supply chain based on the signal and the acquired data. The invented Techniques is to extended supply chain management and extended supply chains may be evaluated and managed by efficiently linking current, past, and upcoming consumer demand signals to the supply chain and the extended supply chains may be managed at select points along the extended supply chains and at select points in time. The invention is a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non-repudiatable electronic log of each custody transfer at each transfer point from initial creation, to final transfer or disposal. The invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log updated at each change of custody point. The invention is a each such change of custody point, the new custodians who receive the product are provided with the information generated by the originator and the by way of one example, because the system tracks all inputs and outputs to the system at each change of custody point, any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified.
2. According to claims# the invention is to a method of transporting commodities in a supply chain management system including a supply chain and the Invention also includes providing a database and a network in communication with the database, which is accessible by at least one member of the supply chain via the network and also provide a container and supporting one or more commodities using the container, assigning at least one sensor to the commodities, sensing a condition of the commodities and generating a signal indicative of the commodity condition, identifying information related to the commodities, acquiring data related to identifying the commodity information.
3. According to claim,2# the invention is to a distributing the signal and the acquired data over the network, storing the signal and the acquired data in the database, monitoring the commodities via the network, and managing at least one of storage and transport of the commodities through the supply chain based on the signal and the acquired data.
4. According to claiml,2# the invention is to a extended supply chain management and extended supply chains may be evaluated and managed by efficiently linking current, past, and upcoming consumer demand signals to the supply chain and the extended supply chains may be managed at select points along the extended supply chains and at select points in time.
5. According to claiml,2,3,4# the invention is to a system for tracking and recording the chain-of-custody for assets within a supply chain that creates a non repudiatable electronic log of each custody transfer at each transfer point from initial creation, to final transfer or disposal and the invention is also including the system uses encryption technology to register assets that are to be transferred and whose chain of custody is to be ensured and through use of encryption key pairs and blockchain encryption technology, an electronic document is created in an encrypted transaction log updated at each change of custody point.
6. According to claim,2,5# the invention is to a each such change of custody point, the new custodians who receive the product are provided with the information generated by the originator and the by way of one example, because the system tracks all inputs and outputs to the system at each change of custody point, any alteration in product quantities are immediately identified, and a chain-of-custody integrity problem is identified.
FIG. 1-A: is a schematic flow chart of an exemplary commodity management system.
FIG.1: is a illustrate block diagrams of various systems according to some embodiments.
FIG.2: is a illustrate block diagrams of various systems according to some embodiments.
FIG.3.is a illustrate block diagrams of various systems according to some embodiments.
AU2021101071A 2021-02-27 2021-02-27 Data science/ engineering in advanced supply chain process using block chain technology Ceased AU2021101071A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021101071A AU2021101071A4 (en) 2021-02-27 2021-02-27 Data science/ engineering in advanced supply chain process using block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021101071A AU2021101071A4 (en) 2021-02-27 2021-02-27 Data science/ engineering in advanced supply chain process using block chain technology

Publications (1)

Publication Number Publication Date
AU2021101071A4 true AU2021101071A4 (en) 2021-04-29

Family

ID=75625812

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021101071A Ceased AU2021101071A4 (en) 2021-02-27 2021-02-27 Data science/ engineering in advanced supply chain process using block chain technology

Country Status (1)

Country Link
AU (1) AU2021101071A4 (en)

Similar Documents

Publication Publication Date Title
US11900308B2 (en) Information system for item verification
JP6267544B2 (en) Supply chain management system
US7482931B2 (en) Product flow based auto-ID infrastructure
US7937244B2 (en) System and method for evaluating a shipping route and a package under transport in the shipping route using an environmental sensor
US11682095B2 (en) Methods and apparatus for performing agricultural transactions
US20130238471A1 (en) Systems and/or methods involving linked manufacturer serial numbers and unique identifiers applied to products
US20060106718A1 (en) Electronic chain of custody method and system
US20090125425A1 (en) Auditable merchandise delivery using an electronic bill of lading
MXPA05013837A (en) Electronic security system for monitoring and recording activity and data relating to cargo.
US20050006456A1 (en) Logistics chain management system
JP2004509826A (en) Logistics chain management system
TW201104611A (en) Identity verification system for monitoring and authorizing transactions
CA3109435A1 (en) Provenance and illicit product control system
AU2021101071A4 (en) Data science/ engineering in advanced supply chain process using block chain technology
Gondal et al. A secure food supply chain solution: blockchain and IoT-enabled container to enhance the efficiency of shipment for strawberry supply chain
KR20120132847A (en) System for history pursuit and integration management using the barcode
Rossetti et al. An analysis of the effect of inventory record inaccuracy in a two-echelon supply chain
KR102627024B1 (en) Blockchain-based smart marine logistics cold chain system
Rahaman et al. Privacy Preservation Agri-Food SCM Operation Based on Online/Offline RFID Using Block Chain
AU2003262306B2 (en) Logistics Chain Management System
Haque et al. Privacy Preservation Agri-Food SCM Operation Based on Online/Offline RFID Using Block Chain
AMANCEI et al. CONTROLS FOR RFID IN SUPPLY CHAIN PROCESSES AUDIT

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry