US20090198541A1 - Enhanced Brand Label Validation - Google Patents
Enhanced Brand Label Validation Download PDFInfo
- Publication number
- US20090198541A1 US20090198541A1 US12/343,857 US34385708A US2009198541A1 US 20090198541 A1 US20090198541 A1 US 20090198541A1 US 34385708 A US34385708 A US 34385708A US 2009198541 A1 US2009198541 A1 US 2009198541A1
- Authority
- US
- United States
- Prior art keywords
- validation
- item
- items
- event data
- characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000010200 validation analysis Methods 0.000 title claims abstract description 357
- 238000000034 method Methods 0.000 claims abstract description 101
- 238000011156 evaluation Methods 0.000 claims abstract description 62
- 238000004590 computer program Methods 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 abstract description 72
- 239000000047 product Substances 0.000 description 83
- 235000015278 beef Nutrition 0.000 description 44
- 241001465754 Metazoa Species 0.000 description 38
- 235000013399 edible fruits Nutrition 0.000 description 35
- 235000015220 hamburgers Nutrition 0.000 description 34
- 241000283690 Bos taurus Species 0.000 description 31
- 230000015654 memory Effects 0.000 description 28
- 238000012545 processing Methods 0.000 description 28
- 238000003860 storage Methods 0.000 description 24
- 244000309466 calf Species 0.000 description 21
- 235000013305 food Nutrition 0.000 description 18
- 239000004615 ingredient Substances 0.000 description 18
- 238000004891 communication Methods 0.000 description 15
- 235000013311 vegetables Nutrition 0.000 description 14
- 235000011389 fruit/vegetable juice Nutrition 0.000 description 13
- 238000012360 testing method Methods 0.000 description 13
- 238000013459 approach Methods 0.000 description 11
- 238000004519 manufacturing process Methods 0.000 description 11
- 235000013351 cheese Nutrition 0.000 description 10
- 230000006870 function Effects 0.000 description 10
- 239000000575 pesticide Substances 0.000 description 10
- 241000208822 Lactuca Species 0.000 description 9
- 235000003228 Lactuca sativa Nutrition 0.000 description 9
- 230000009466 transformation Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 239000000122 growth hormone Substances 0.000 description 8
- 238000004806 packaging method and process Methods 0.000 description 8
- 238000013475 authorization Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 7
- 230000003993 interaction Effects 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 6
- 235000013336 milk Nutrition 0.000 description 6
- 239000008267 milk Substances 0.000 description 6
- 210000004080 milk Anatomy 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 5
- 239000005556 hormone Substances 0.000 description 5
- 229940088597 hormone Drugs 0.000 description 5
- 230000033001 locomotion Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000003307 slaughter Methods 0.000 description 5
- 235000011299 Brassica oleracea var botrytis Nutrition 0.000 description 4
- 240000003259 Brassica oleracea var. botrytis Species 0.000 description 4
- 102000018997 Growth Hormone Human genes 0.000 description 4
- 108010051696 Growth Hormone Proteins 0.000 description 4
- 239000012530 fluid Substances 0.000 description 4
- 238000000844 transformation Methods 0.000 description 4
- 238000002255 vaccination Methods 0.000 description 4
- 108010068370 Glutens Proteins 0.000 description 3
- 230000002776 aggregation Effects 0.000 description 3
- 238000004220 aggregation Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 239000000470 constituent Substances 0.000 description 3
- 235000020805 dietary restrictions Nutrition 0.000 description 3
- 229940079593 drug Drugs 0.000 description 3
- 239000003814 drug Substances 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 235000021312 gluten Nutrition 0.000 description 3
- 238000003306 harvesting Methods 0.000 description 3
- 235000013372 meat Nutrition 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 239000002304 perfume Substances 0.000 description 3
- 235000020991 processed meat Nutrition 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 239000002689 soil Substances 0.000 description 3
- 238000012358 sourcing Methods 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 2
- 241000196324 Embryophyta Species 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 235000021450 burrito Nutrition 0.000 description 2
- 229910052799 carbon Inorganic materials 0.000 description 2
- 239000007795 chemical reaction product Substances 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 239000003086 colorant Substances 0.000 description 2
- 239000002537 cosmetic Substances 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 230000002950 deficient Effects 0.000 description 2
- 239000003337 fertilizer Substances 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 239000003205 fragrance Substances 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 235000013348 organic food Nutrition 0.000 description 2
- 238000005067 remediation Methods 0.000 description 2
- 235000014102 seafood Nutrition 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 235000017060 Arachis glabrata Nutrition 0.000 description 1
- 244000105624 Arachis hypogaea Species 0.000 description 1
- 235000010777 Arachis hypogaea Nutrition 0.000 description 1
- 235000018262 Arachis monticola Nutrition 0.000 description 1
- 241000538571 Brachydeuterus Species 0.000 description 1
- 241000538568 Brachydeuterus auritus Species 0.000 description 1
- 208000032544 Cicatrix Diseases 0.000 description 1
- 206010015150 Erythema Diseases 0.000 description 1
- 241000588724 Escherichia coli Species 0.000 description 1
- 108010061711 Gliadin Proteins 0.000 description 1
- 101000666896 Homo sapiens V-type immunoglobulin domain-containing suppressor of T-cell activation Proteins 0.000 description 1
- COLNVLDHVKWLRT-QMMMGPOBSA-N L-phenylalanine Chemical compound OC(=O)[C@@H](N)CC1=CC=CC=C1 COLNVLDHVKWLRT-QMMMGPOBSA-N 0.000 description 1
- 240000004808 Saccharomyces cerevisiae Species 0.000 description 1
- 235000014680 Saccharomyces cerevisiae Nutrition 0.000 description 1
- 206010039580 Scar Diseases 0.000 description 1
- 244000000231 Sesamum indicum Species 0.000 description 1
- 235000003434 Sesamum indicum Nutrition 0.000 description 1
- 238000003324 Six Sigma (6σ) Methods 0.000 description 1
- 206010042496 Sunburn Diseases 0.000 description 1
- 102100038282 V-type immunoglobulin domain-containing suppressor of T-cell activation Human genes 0.000 description 1
- 208000018756 Variant Creutzfeldt-Jakob disease Diseases 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 239000003242 anti bacterial agent Substances 0.000 description 1
- 229940088710 antibiotic agent Drugs 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 238000013474 audit trail Methods 0.000 description 1
- 235000015241 bacon Nutrition 0.000 description 1
- 235000012791 bagels Nutrition 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003115 biocidal effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 208000005881 bovine spongiform encephalopathy Diseases 0.000 description 1
- 235000012180 bread and bread product Nutrition 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011109 contamination Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 201000010099 disease Diseases 0.000 description 1
- 208000037265 diseases, disorders, signs and symptoms Diseases 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000000975 dye Substances 0.000 description 1
- 235000013601 eggs Nutrition 0.000 description 1
- 231100000321 erythema Toxicity 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 235000013312 flour Nutrition 0.000 description 1
- IJJVMEJXYNJXOJ-UHFFFAOYSA-N fluquinconazole Chemical compound C=1C=C(Cl)C=C(Cl)C=1N1C(=O)C2=CC(F)=CC=C2N=C1N1C=NC=N1 IJJVMEJXYNJXOJ-UHFFFAOYSA-N 0.000 description 1
- 235000013373 food additive Nutrition 0.000 description 1
- 239000002778 food additive Substances 0.000 description 1
- 235000003599 food sweetener Nutrition 0.000 description 1
- VZCCETWTMQHEPK-QNEBEIHSSA-N gamma-linolenic acid Chemical compound CCCCC\C=C/C\C=C/C\C=C/CCCCC(O)=O VZCCETWTMQHEPK-QNEBEIHSSA-N 0.000 description 1
- 235000003869 genetically modified organism Nutrition 0.000 description 1
- 229910000078 germane Inorganic materials 0.000 description 1
- 108010050792 glutenin Proteins 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 235000013402 health food Nutrition 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 244000144972 livestock Species 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 235000013622 meat product Nutrition 0.000 description 1
- 230000003340 mental effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012858 packaging process Methods 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 235000020232 peanut Nutrition 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- COLNVLDHVKWLRT-UHFFFAOYSA-N phenylalanine Natural products OC(=O)C(N)CC1=CC=CC=C1 COLNVLDHVKWLRT-UHFFFAOYSA-N 0.000 description 1
- 230000001766 physiological effect Effects 0.000 description 1
- 230000035479 physiological effects, processes and functions Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 208000014745 severe cutaneous adverse reaction Diseases 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000003765 sweetening agent Substances 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 229940034610 toothpaste Drugs 0.000 description 1
- 239000000606 toothpaste Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000032258 transport Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
- G06Q10/0875—Itemisation or classification of parts, supplies or services, e.g. bill of materials
Definitions
- Implementations may include one or more of the following features.
- the result of the validation may be provided in real time or near real time to receiving the identification information.
- the validation may be performed simultaneously using the multiple discrete evaluation frameworks.
- the multiple discrete evaluation frameworks may further include a first evaluation framework that evaluates a validity of the characteristic according to a first compliance standard, and a second evaluation framework that evaluates the validity of the characteristic according to a second compliance standard which is more stringent than the first compliance standard.
- the first compliance standard may be a minimum compliance standard
- the second standard may be an elevated standard predefined for a particular brand under which the items will be sold.
- an item may be a consumer product such as food or components of food, a toy, a consumer electronic device, a living plant or animal (e.g. livestock or seafood), a fluid, a container, a fruit or vegetable, a pharmaceutical, a vehicle, or a group, batch, lot, cluster, or other plurality of items.
- the item may represent an intangible item, such as an electronic mail message, a virtual item in a virtual universe (such as a virtual item like a weapon, a good, or land purchased in the SECOND LIFE® or WORLD OF WARCRAFT® virtual universes), a right, a title, or an obligation.
- a group of items includes one or more similar or dissimilar items.
- a palette 102 includes multiple items 104 - 116 (in this case, multiple containers of “ABC Organic Food Brand burritos”). Each of the items 104 - 116 has an associated item identifier (e.g., “ABC 100” to “ABC 107”, respectively). Although the items 104 - 116 are branded by ABC Organic, the palette 102 is purchased from a wholesaler (e.g., “Burrito Wholesalers), representing the actual manufacturer of the items. The palette 102 itself has an associated identifier 118 (e.g., “BW 123”).
- the item 164 passed a basic internal validation but failed a basic third party validation.
- the user interface may provide details such as a description of the reason for why the item failed the third party validation.
- the user interface 162 may include a simple textual description of a reason of failure, one or more rule codes or descriptions (e.g., of rules that failed), and/or event data used in the failed validation.
- the user interface 162 may display a simple phrase such as “pesticide detected”, or may display one or more rule descriptions such as “pesticide used within the last three years”, or may display a message that includes event data, such as “pesticide treatment occurred on Jun. 1, 2008”.
- a message such as “no data available” may be displayed.
- Different validation engines may handle a data unavailable situation differently. For example, the basic validation engine 126 may ignore a situation where data is unavailable (e.g., allow an item to pass), while the basic validation engine 130 may fail an item if data is unavailable. Therefore, the display of a “no data available” message may indicate a reason for a discrepancy between test results.
- the third party validation entity 234 may query or poll a vehicle 216 that transported one or more items in the lot, a farm 217 that raised or harvested one or more items in the lot, a factory 219 that processed one or more items in the lot, or any other node.
- at least a portion of the event data may already be stored at the third party validation entity 234 prior to the commencement of the third party validation, such that no externally polling or querying is required (i.e. only an internal data lookup is required).
- the third party validation entity 234 may be a data warehouse where event data is initially stored when an item in the lot is traversing the supply chain.
- the third party validation entity 234 may be a node in the supply chain, or may be associated with a node in the supply chain.
- the vendor 235 may view a certificate using the user interface 237 and, as shown, may adjust the price of the item upwards accordingly. For example, an uncertified lot of items is priced less than a certified lot of items, which is in turn priced less than a lot of items with an improved certification.
- the certificate is sent as an email attachment to specified recipient parties, or the certificate is presented as a web page which may be accessed by parties who are notified of its existence or who may navigate to it using a search engine.
- the certificate is a dynamically generated Portable Document Format (PDF) file.
- PDF Portable Document Format
- the vendor 235 may pass the lot, the filtered event data associated with the lot, and the certificate to the buyer 239 .
- the buyer's user interface 238 notes the receipt of the certificate, however the previous owner of the lot is shown as “undisclosed” since the vendor 235 filtered identification information which identified the user 230 .
- the buyer 239 need not trust parties involved in the transaction of the lot who may have an adverse interest to the buyer 239 , or who may be motivated to make false claims regarding the items in the lot.
- “Yes” or “no” (‘binary’) type indicia can be output if the claim is determined by a validation entity to be 100% valid or 100% invalid, or a threshold can be preset, set by a manufacturer or user, or automatically determined based on past use, where the threshold allows a claim to be validated or invalidated even if some event data is missing or contradicts the validation or invalidation. For instance, if event data indicates that only 5% of a farm has been sprayed for pesticides and a threshold of 90% certainty has been set by the user, the enhanced claim validation application may output an indicia that an item had not been sprayed for pesticides even though there is a small chance that the item has been sprayed. Such a threshold is helpful since it may be impossible or impractical to prove or disprove a claim with 100% certainty, while different users may desire different levels of confidence.
- the user preferences/profiles 410 may also describe an authorization level of a user to view certain event data. For instance, a generic consumer may given authorization to view an automatically determined claim validation result, while a wholesaler or middleman may be given authorization to view more granular data, such as pricing or sales volume event data. Certain users may be assigned authorization levels which do not allow them to perform claim validations at all.
- the user preferences/profiles 410 may also specify trusted third parties who, by default, are to perform claim validations.
- the transaction database server may determine a probability of each uniquely identifiable tree on the farm being the tree from which the fruit 415 c was harvested and, consequently, the probability that particular, uniquely identifiable seeds that eventually grew into the identified trees were the source of the fruit 415 c.
- event data associated with the farm 504 indicates that the farm 504 is certified organic, and that half of the trees have been sprayed with pesticides. Despite the fact that the tree 502 is unidentified, it can still be automatically determined that the fruit 502 also is certified organic and that it has a 50% probability of pesticide application since it necessarily originated from the farm 504 .
- This information may be displayed to a user via a user interface, or may be applied to a rule in the rule engine to validate a claim.
- the identification information may be associated with a single product or a group of products, or multiple, discrete identifying information can be received to identify a group of products.
- the identification information may represent batch identification information identifying a palette of items, or a container (such as a boxcar) of items, where the batch identification information may be mapped to or associated with the individual identification information identifying the individual items within the palette or container.
- the multiple individual identification information identifying individual items within a palette or container can be received instead of or in addition to the batch identification information that represents the group of individual items. Such functionality allows batches of items to be processed and validated at once.
- FIG. 9 provides a brief conceptual overview of a process for assigning a unique identifier to an item in a supply chain.
- An item, a group of items, or components of an item (collectively, “raw product”) is received at a unique identifier assignment system ( 901 ).
- the unique identifier assignment system may or may not be within the supply chain itself, and thus may or may not perform processing functions aside from the assignment of the unique identifier.
- a result of the validation is provided for each of the multiple discrete evaluation frameworks (S 806 ), thereby ending the process 800 (S 807 ).
- the result may be provided in real time or near real time to the receiving of the identification information.
- the result may be presented in a user interface and may include indicia, for each evaluation framework, showing conforming and non-conforming items which do and do not validly satisfy the evaluated characteristic, respectively. A percentage of conforming and/or of non-conforming items may be shown. As another example, a list of conforming items and a list of non-conforming items may be displayed. For some or all items, a statistical likelihood may be displayed, which indicates the likelihood that a respective item validly satisfies the characteristic.
- FIG. 15 illustrates a user interface 1550 showing, among other things, animal identifiers and information indicating whether the shown animals comply with a certain claim.
- the user interface 1550 may be presented, for example, as a result of running an internal validation (e.g., by selecting an internal validation entity on the user interface 1300 ).
- An internal validation entity may query nodes of a supply chain that processed the animals identified by the input RFID numbers, and output via user interface 1550 an indicia (column 1551 ) of whether particular animals conform to a claim, as well as event data supporting the validation such as age data (column 1552 ).
- the user may select control 1610 to view the traceability history of the cow and to validate label claims associated therewith. Similar to above, the enhanced claim validation application selects appropriate claims to validate, and performs a validation of the claims with respect to the uniquely identifiable cow by querying nodes of a supply chain or accessing event data stored as a result of a previously issued query. As shown in user interface 1603 , since the event data of the uniquely identifiable cow includes a unique identifier of a parent cow of the uniquely identifiable cow, the user may continue to recursively or iteratively investigate claims up through the supply chain.
- the reader 1717 allows the user device 1701 to automatically capture identification information, and may be a RFID reader, a bar code scanner, a digital camera, a digital video camera, a microphone or other digital input device.
- Software used to provide for the enhanced claim validation application is stored locally on computer readable memory media, such as the fixed disk drive 1711 .
- the operating system 1821 may be APPLE® MAC OS X® for INTEL® and POWERPC® based workstations and servers; MICROSOFT® WINDOWS NT®/WINDOWS® 2000/WINDOWS® XP Workstation; MICROSOFT® WINDOWS VISTA®/WINDOWS NT®/WINDOWS® 2000/WINDOWS® XP Server; a variety of UNIX®-flavored operating systems, including AIX® for IBM® workstations and servers, SUNOS® for SUN® workstations and servers, LINUX® for INTEL® CPU-based workstations and servers, HP UX WORKLOAD MANAGER® for HP® workstations and servers, IRIX® for SGI® workstations and servers, VAX/VMS for Digital Equipment Corporation computers, OPENVMS® for HP ALPHASERVER®-based computers; SYMBIAN OS®, NEWTON®, IPOD®, WINDOWS MOBILE® or WINDOWS CE®, PA
- the low-speed expansion port which may include various communication ports (e.g., USB, Bluetooth, Ethernet, wireless Ethernet) may be coupled to one or more input/output devices, such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter.
- input/output devices such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- This application claims the benefit of U.S. Provisional Patent Application Nos. 61/022,192, filed Jan. 18, 2008, and 61/085,711, filed Aug. 1, 2008, which are each incorporated herein by reference.
- The present disclosure generally relates to the tracking of items in a supply chain.
- In response to recent recalls of consumer products, such as food, toys, pet food, clothing and toothpaste, as well as scares relating to E. coli and bovine spongiform encephalopathy (BSE, or “mad cow”) contamination of beef, the average consumer has become acutely aware of a lack of transparency in product supply chains, particularly supply chains that cross international borders.
- Even after being notified of a product recall or scare, a consumer has few options other than to discard all items that could potentially be affected, or to risk their own health and safety by continuing to consume or use the potentially affected items. Alternatively, a consumer may choose to blindly trust a particular brand, believing that brand to be sufficiently reputable to look after the consumer's welfare. Thus, the concomitant ignorance that results from the lack of transparency in the supply chain often leads to misplaced confidence or to unnecessary, wasteful knee-jerk reactions.
- In the case where a supplier has taken appropriate precautions to safeguard an item in their care, there is typically no mechanism for an end-user (or a vendor selling the supplier's items under the vendor's brand name) to verify these safeguards without performing an invasive or impractical on-site inspection, or an expensive audit. All of these factors may lead consumers and vendors to feel generally unsettled about the items they wish to purchase, potentially decreasing the price that a supplier may charge for a high-quality product, and thus presenting a barrier to trade and commerce.
- Vendors may purchase products from third party suppliers in batches or lots, to be sold or marketed under the brand name of the vendor. Thus, and according to one general implementation, in real time or near real time to receiving a batch or lot of products from a third party supplier, the vendor's brand manager may validate the characteristics of the purchased products against multiple rule engines, including a rule engine tailored to the brand itself, to determine whether the products satisfy standards or acceptance thresholds. In this regard, purchased products that do not satisfy standards set by the brand may be individually or collectively flagged for refusal, remediation, or informed acceptance, even in the case where the products may indeed satisfy other standards (such as minimum standards) set by other certifying entities. In doing so, a vendor may ensure that the branded products they sell do not just meet basic or minimum standards, but that the products also satisfy additional tests which better assure that asserted characteristics are in fact valid and up to par.
- According to another general implementation, a computer-implemented process includes receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain, and receiving, from the one or more nodes, event data associated with the uniquely identified items based on the received identification information. The process also includes performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks, and providing a result of the validation for each of the multiple discrete evaluation frameworks.
- Implementations may include one or more of the following features. For instance, the result of the validation may be provided in real time or near real time to receiving the identification information. The validation may be performed simultaneously using the multiple discrete evaluation frameworks. The multiple discrete evaluation frameworks may further include a first evaluation framework that evaluates a validity of the characteristic according to a first compliance standard, and a second evaluation framework that evaluates the validity of the characteristic according to a second compliance standard which is more stringent than the first compliance standard. The first compliance standard may be a minimum compliance standard, and the second standard may be an elevated standard predefined for a particular brand under which the items will be sold. The multiple discrete evaluation frameworks may include an internal evaluation framework performed on behalf of one of the nodes of the supply chain, and a third-party evaluation framework performed by a disinterested third party not involved in the supply chain. The third party validation may be an age and source verification.
- In other examples, providing the result of the validation may further include providing indicia responsive to the validation, the indicia identifying, for each of the multiple discrete evaluation frameworks conforming and non-conforming items which do and do not validly satisfy the characteristic, respectively. The indicia may be expressed as a conforming percentage and a non-conforming percentage of the items which do and do not validly satisfy the characteristic, respectively, or the indicia may be expressed as a conforming list and a non-conforming list of the items listing the identification information of the items which do and do not validly satisfy the characteristic, respectively.
- In further examples, providing the result of the validation further may include providing indicia responsive to the validation, the indicia identifying items evaluated as validly satisfying the characteristic by a first discrete evaluation framework and evaluated as not validly satisfying the characteristic by a second discrete evaluation framework. The process may also include determining reasons why the items were evaluated as both not validly satisfying the characteristic by the second discrete evaluation framework and as validly satisfying the characteristic by the first discrete evaluation framework, where the indicia may further include the determined reasons. The process may further include receiving, responsive to providing the result, a signal indicating that a user intends to accept, reject, or remediate at least a portion of the items evaluated by any of the multiple discrete evaluation frameworks as not validly satisfying the characteristic, and accepting, rejecting, or remediating the portion of the items based on the received signal. The identification information may further identify the characteristic to be validated.
- In additional examples, performing the validation of the characteristic of the uniquely identified items may further include determining a role of a user requesting the validation, and applying the received event data to a set of rules associated with each of the multiple discrete evaluation frameworks, and tailored to the determined role. The result may be expressed as a statistical likelihood that one or more of the items validly satisfies the characteristic. The process may also include receiving a user selection of a trusted third party from among several trusted third parties to at least partially perform the validation, where performing the validation of the characteristic may further include applying the received event data to an evaluation framework associated with the selected trusted third party. The characteristic may be associated with a label claim.
- In accordance with another general implementation a system includes one or more computers, and a computer-readable medium coupled to the one or more computers having instructions stored thereon. When executed by the one or more computers, the instructions cause the one or more computers to perform operations including receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain, and receiving, from the one or more nodes, event data associated with the uniquely identified items based on the received identification information. The operations also include performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks, and providing a result of the validation for each of the multiple discrete evaluation frameworks.
- According to a further general implementation, a computer-readable medium is encoded with a computer program including instructions. When executed, the instructions operate to cause a computer to perform operations including receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain, and receiving, from the one or more nodes, event data associated with the uniquely identified items based on the received identification information. The operations further include performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks, and providing a result of the validation for each of the multiple discrete evaluation frameworks.
- The details of one or more implementations are set forth in the accompanying drawings and the description, below. Other potential features and advantages of the disclosure will be apparent from the description and drawings, and from the claims.
-
FIG. 1 is a conceptual diagram of exemplary systems for providing claim validation. -
FIGS. 2 and 3 are conceptual diagrams of exemplary systems for providing third party certification using enhanced claim validation. -
FIG. 4 is a block diagram of an exemplary system for validating a claim. -
FIG. 5 provides examples of the automatic determination of a characteristic of an item where an earlier state of the item is unidentifiable. -
FIGS. 6 , 7, and 8 are flowcharts of processes for performing enhanced claim validation and third party certification, respectively. -
FIG. 9 provides a brief conceptual overview of a process for assigning a unique identifier to an item in a supply chain. -
FIGS. 10 to 16 illustrate exemplary user interfaces for entering identification information and outputting event information that validates a claim. -
FIG. 17 depicts the exterior appearance of a an exemplary system including a user device and transaction database server. -
FIG. 18 illustrates the internal architecture of the user device ofFIG. 17 . -
FIG. 19 is a block diagram of computing devices that may be used to implement the systems and methods described in this document, as either a client or as a server or plurality of servers. - In the drawings, common reference numbers refer to corresponding parts throughout.
- Vendors may purchase products from third party suppliers in batches or lots, to be sold or marketed under the brand name of the vendor. Thus, and according to one general implementation, in real time or near real time to receiving a batch or lot of products from a third party supplier, the vendor's brand manager may validate the characteristics of the purchased products against multiple rule engines, including a rule engine tailored to the brand itself, to determine whether the products satisfy standards or acceptance thresholds. In this regard, purchased products that do not satisfy standards set by the brand may be individually or collectively flagged for refusal, remediation, or informed acceptance, even in the case where the products may indeed satisfy other standards (such as minimum standards) set by other certifying entities. In doing so, a vendor may ensure that the branded products they sell do not just meet basic or minimum standards, but that the products also satisfy additional tests which better assure that asserted characteristics are in fact valid and up to par.
- Accordingly, and using the enhanced claim validation approach described herein, the supply chain history of a batch of items or products may be researched in real-time or near real-time, in order to detect false claims and make well-informed decisions regarding whether the items are worthy, safe, or appropriate for consumption, transportation or other use. For example, a company offering a particular brand of product may research the supply chain history of the product, to verify whether supply chain entities (e.g., wholesalers) conduct themselves in their interactions with the product in a manner so as to uphold standards established for the brand. By validating a product, a company may reduce the risk of liability which could occur if consumers consume or use items that are unfit or unsafe, that originate from suppliers that make inaccurate claims, or that do not otherwise comply with the standards established for the brand.
- Specifically, information that uniquely identifies items in a batch of items may be received, for example by scanning items or by looking up item identifiers on a manifest based on a palette identifier. Based on the identifying information, nodes in a supply chain may be polled or queried for event data or other information regarding the items. Event data may be used by one or more validation entities to perform a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete validation engines. For example, the company and an external third party may perform validations. Both the company and the third party may use multiple validation engines. For example, a first validation engine may evaluate a validity of the characteristic using less stringent standards than those used by a second validation engine. A result of the validation may be provided for each of the multiple discrete evaluation frameworks. For example, a report or an output displayed on a user interface may indicate, for each of the multiple discrete validation engines, conforming and non-conforming items which do and do not validly satisfy the characteristic, respectively.
-
FIG. 1 is a conceptual diagram of exemplary systems for providing claim validation, such as a validation of a characteristic or “label claim.” Initially, according to one implementation, a “label claim” is intended to refer to a claim, or an assertion of something as a fact, associated with a “label” or “mark,” which is an affixed, impressed or otherwise associated device, symbol, inscription, etc., serving to give information, identify, indicate origin or ownership, attest to character, aspect, quality or comparative merit, or the like, as a trademark, of an item that has moved through at least a portion of a supply chain. - While such a claim may be included on a physical label attached to a physical item, the claim need not be physically embodied (e.g. may be a contract provision or a verbal claim), may not be attached to the item, and may be associated with an item that is also not itself physically embodied (e.g. a data file). Contract provisions, claims and provisions may be automatically or manually extracted from contract files stored on the system, or may be derived or inferred from past behavior between parties.
- “Real time” and “near real time” refer to instantaneous or near instantaneous processing, where a user of the system perceives no delay or merely a short delay between the time information is requested and the time information is provided. Although near real time access to data may refer to access that occurs within a few seconds or minutes, for complex queries or using systems with limited computational resources, near real time access to data may take longer. In any case, near real time access is contrasted with systems require a user to wait for extended periods of time, that require manual intervention, collation or analysis, that allow a user to perceive onerous or extended delays, or that require a user to participate in multiple computing sessions before results are output.
- Although the automatic validation of claims is described in many examples herein as occurring in real time or near real time, in other examples longer (including much longer) time frames are contemplated. For instance, in other exemplary implementations the validation of a claim may invoke a manual processing operation which may cause the claim to be validated over the course of several days. Moreover, the claim validation result or certification may be “output” to the user on paper via postal mail or in person, in which the result may take days, weeks or months. Moreover, while many examples provided herein describe the validation of a label claim, other types of claims, assertions, obligations, rights, requirements, characteristics or qualities of an item or item may also be validated or invalidated using these enhanced techniques, by either the party requesting the certification, by third party trusted entities, or by other agents.
- Naturally then, an “item” or “product” may refer to one or more tangible or intangible article or commodity, while a “supply chain” may refer to a sequence of processes or operations at one or more locations (e.g. nodes) involved in the production and distribution of the article or commodity. Within the supply chain, the item or article may undergo a series of state transformations, such as where the item is transformed from a living state to a non-living state, where the item is processed from a first product into a second product, where the item is divided into constituent parts or into multiple products, or where the item is combined with other items. The item may be a received material or finished good
- At various stages of the supply chain, items or groups of items, or different states of the same item, may be identified using one or more assigned, unique identifiers. Supply chain processes may assign new, modified or replacement identifiers to items that have undergone certain processing operations, even if the item that exits the process and the item that enters the process (i.e., the ‘origin’ of the item exiting the process) may at least outwardly be the same, whole, identical item.
- In addition to the situation where a one-to-one correspondence exists between the item exiting the process and the origin of that item, supply chain processing may add further identification complexities where, for example, unique items are blended into new items, a single unique item is separated into multiple discrete items, or where multiple overlapping unique identifiers are assigned to an item or to group in which the item is a part. Put another way, processing may cause an item to have more than one origin, or more than one item to have the same origin, and may thus have more than one assigned, unique identifier.
- By way of example, an item may be a consumer product such as food or components of food, a toy, a consumer electronic device, a living plant or animal (e.g. livestock or seafood), a fluid, a container, a fruit or vegetable, a pharmaceutical, a vehicle, or a group, batch, lot, cluster, or other plurality of items. Similarly, the item may represent an intangible item, such as an electronic mail message, a virtual item in a virtual universe (such as a virtual item like a weapon, a good, or land purchased in the SECOND LIFE® or WORLD OF WARCRAFT® virtual universes), a right, a title, or an obligation. A group of items includes one or more similar or dissimilar items.
- Using fruit as an example, a claim, assertion or characteristic may be associated with a physical label that is affixed or attached to the fruit, or packaging for the fruit, a palette or other container that holds multiple fruit packages, or a truck or warehouse that transports or stores the fruit. The claim may be associated with a label that is not physically affixed to the fruit, such as an advertising banner that hangs over a shelf of fruit, or a verbal assertion made by a fruit hawker. The claim and/or a unique identifier of the item may be stored in an identification device, such as an RFID tag, affixed to the item. The claim may be associated in other ways as well, such as where a television commercial describes or infers that a product line of items each share a particular characteristic (i.e. “organic”).
- In any case, the label may make a claim that negatively or positively attests to some characteristic of the item. The claim may attest to the organic character of the item (“Certified Organic,” “100% Organic,” “Natural,” “Guilt Free”); may address a warranty status (“Under Factory Warranty,” “50,000 miles remaining under warranty”); may attest to the natural origin of the item (“Farm Raised,” “No Artificial Colors Or Sweeteners,” “Ocean Caught”); may attest that the item was not treated with hormones (“No Growth Hormone,” “rbST negative”); may attest to the location of origin of the item (“Made in the U.S.A.,” “Real California Cheese,” “Factory Authorized,” “Under Warranty”); may attest to the ingredients of the item (“Peanut free,” “Contains Phenylalanine”); may assert that the item is vegetarian or vegan friendly (“Does not contain milk or eggs,” “Flavored with soy-based simulated bacon”); may assert that the item is cruelty-free (“Product not tested on animals,” “Simulated fur”); may be a drug claim that asserts that the item alters the physiology or function of any part of the human body (“Prevents erythema caused by sunburn”); may be a cosmetic claim that does not describe a physiological effect of the body (“Fragrance Free,” “No Perfumes”); may address whether the item has ever been recalled; may assert that an animal that produced the item was not caged (“Cage-free,” “Free Range”); may provide a temporal reference (“Fresh Caught,” “One-Day-Old Bagels,” “Our Seafood Swam In The Ocean Last Night,” “Expires Mar. 15, 2008”); may attest to a storage or processing condition (“Fresh, Never Frozen,” “Cold Filtered,” Guaranteed Shipped under 50“F”); or may assert that the item is in compliance with a standard or has been approved by a body (“UL Listed,” “IEEE-1394 compliant,” “Union Labor,” “No Child Labor,” “Authorized Transaction,” “Good Housekeeping Seal Of Approval,” “Oprah Book Club Selection,” “Fair Trade,” “Process Verified,” “Source & Age Verified” “ISO-9000 /14000 compliant” “Lean Six Sigma”). In short, a claim can be any assertion about anything, and may be associated with an item in any number of ways.
- Each item is associated with data (or a data structure) that describes, among other things, a unique identifier of the item, and event data which may be used to verify a characteristic of the item such as the known or possible origin or origins of the item. The data may be stored on a medium that is physically attached to the item, such a Radio Frequency IDentification (RFID) tag attached to the item or to a container that includes the item, without requiring an RFID reader to call, query or write to a separate database. In another example, the data may be handwritten on sourcing papers or labels affixed to the item, such that a human reader of the sourcing papers may manually identify the origin of the item, and manually update the information (i.e. with a pen or other writing implement). Other media that may be physically attached to the item may include a cattle bolus, or a bar-code. This same media may also make a label claim.
- As the item traverses through the supply chain, event data and identification data associated with the item may be updated as the item undergoes processing operations such as aggregation, sorting, transformation or commingling, and label claims may be added. For instance, if first and second items are combined to produce a third item, an RFID tag associated with the third item may be written with event data which uniquely identifies the first, second and third items, as well as origin information describing the first and second items as the origin of the third item. Alternatively, new papers may be generated for the third item on which this same identification and origin information, as well as claim information, is printed. It may be that an accurate label claim may become inaccurate, for example when an organic item is commingling with a non-organic item. In these cases, event data associated with the commingling event may be used to invalidate the inaccurate label claim, even if the label itself us not updated.
- Alternatively, the data associated with the an item may be stored in a database that is cross-referenced with identifying information that uniquely identifies the item. For instance, a node in a supply chain may access or download, from an immediately preceding node in a supply chain, a database or table which includes identifying data (e.g. a stock keeping unit (SKU) plus another identifier, an item name or code number, or a vehicle identification number (VIN)) which uniquely identifies the item and possibly characteristics of the third item. In addition to the identifying data, the database or table may include event data describing past events that have occurred on each identified item, where the event data may be used to validate claims. In this regard, as the item passes through the supply chain, the amount of associated event data increases unless filtering or deletion of the event data occurs. For instance, a node may wish to hide the origin of the item or a price associated with a particular transaction between nodes, by deleting event data.
- Starting with the upper left portion of
FIG. 1 , apalette 102 includes multiple items 104-116 (in this case, multiple containers of “ABC Organic Food Brand burritos”). Each of the items 104-116 has an associated item identifier (e.g., “ABC 100” to “ABC 107”, respectively). Although the items 104-116 are branded by ABC Organic, thepalette 102 is purchased from a wholesaler (e.g., “Burrito Wholesalers), representing the actual manufacturer of the items. Thepalette 102 itself has an associated identifier 118 (e.g., “BW 123”). - A
manifest 120 may list the identifiers for the items 104-116 as well as the identifier for thepalette 102. The identifiers for the items 104-116 and the identifier for thepalette 102 may be input into a computer system. For example, individual items may be scanned and/or themanifest 120 may be scanned. In some examples, the identifiers for the items 104-116 may be retrieved from a database by querying for the identifier of thepalette 102. - Item identifiers may be input into one or more validation entities. For example, item identifiers may be input into a
brand validation entity 122 and into a thirdparty validation entity 124. Thebrand validation entity 122 may be an entity internal to a company (e.g., where validations are performed on behalf of one of the nodes of the supply chain). The thirdparty validation entity 124 may be an external entity such as a government agency or a non-profit organization. Validations performed using thethird party entity 124 may be deemed more trustworthy because a third party may be deemed as being disinterested (e.g., having no incentive to commit fraud). - In addition to receiving item identifiers, a validation entity may receive an indication of a characteristic to be checked. For example, when a palette of items is scanned into a computer system, a characteristic (e.g., “organic”) may be stored in association with the item identifiers. Therefore, validation entities may test for the specified characteristic (as compared to simultaneously testing for multiple characteristics).
- A validation entity (e.g., 122, 124) may query or poll nodes in a supply chain for event data or other information regarding the items. For example, a validation entity may query or poll a
vehicle 134 that transported one or more of the items, afarm 136 that raised or harvested one or more of the items, a factory 138 that processed one or more of the items, or any other node. In addition to sending the unique identifiers to the nodes of the supply chain, the validation entity may determine a role of the user requesting the validation, and transmit or otherwise use this role information to adjust the types of event data requested from the nodes, to thereby reduce the amount of information used during the validation process. - In an alternate implementation, at least a portion of the event data may already be stored at a validation entity prior to the commencement of the validation, such that no externally polling or querying is required (i.e. only an internal data lookup is required). For instance, the third
party validation entity 124 may be a data warehouse where event data is initially stored when the item is traversing the supply chain. For example, the thirdparty validation entity 124 and/or thebrand validation entity 122 may be a node in the supply chain, or may be associated with a node in the supply chain. - A validation entity may evaluate the validity of a characteristic for each item in a group of items using multiple rule-based validation engines. For example, the
brand validation entity 122 may use abasic validation engine 126 and abrand validation engine 128. As another example, the thirdparty validation entity 124 may use abasic validation engine 130 and arigid validation engine 132. Different validation engines within a validation entity may, for example, use different thresholds and/or different criteria to evaluate the validity of a characteristic. For example, thebrand validation engine 128 may evaluate the validity of a characteristic according to a compliance standard which is more stringent than a compliance standard used by thebasic validation engine 126. - Alternatively a first validation engine may be associated with a first user role (e.g. soil researcher) and may output results tailored to that first role (e.g. soil sample data or validations associated with soil samples), while the second validation engine may be associated with a second user role (e.g. buyer), and may output results tailored to that second role (e.g. price and availability results). In doing so, users requesting validations are less exposed to results that are may be irrelevant to them. Furthermore, computational expense is reduced, since validations that are not salient to a particular role are not necessarily performed.
- Validations may be performed sequentially or in parallel. For example, a validation may first be performed by the
brand validation entity 122 and afterward a validation may be performed by the thirdparty validation entity 124. Alternatively, validations performed by thebrand validation entity 122 and the thirdparty validation entity 124 may be performed at the same time. - Within a validation entity, validations performed using different validation engines may be performed sequentially or in parallel. For example, the brand validation entity may first perform a validation using the
basic validation engine 126, and if the first validation is deemed acceptable, a second validation may be performed using thebrand validation engine 128. As another example, a more strict validation (e.g., performed using the brand validation engine 128) may be performed first, and if the more strict validation fails, a second, less strict validation (e.g., performed using the basic validation engine 126) may be performed, for example, to determine whether an acceptable number of items pass a less strict set of standards. - Validation results may be presented, for example, in a
user interface 140. Theuser interface 140 displays summary results for validations performed using thebrand validation entity 122 and the thirdparty validation entity 124. Alist 141 displays identifiers of items tested. Theuser interface 140 displays summary results 142-148 which each indicate a percentage of items which met compliance of a validation performed using a particular validation engine. For example, the result 142 indicates that 89% of the items in thelist 141 met compliance for the validation performed by thebasic validation engine 126. Theresult 144 indicates that 72% of the items in thelist 141 met compliance for the validation performed by thebrand validation engine 128. The illustrated compliance rates are merely exemplary. - The
user interface 140 may display results from more than one validation entity. For example, theresult 146 indicates that 74% of the items in thelist 141 met compliance of a validation performed by thebasic compliance engine 130 used by the thirdparty validation entity 124. Theresult 148 indicates that 63% of the items in thelist 141 met compliance of a validation performed by therigid validation engine 132. - The user may select one or more controls 150-154 to initiate one or more actions regarding at least a portion of the items evaluated as not validly satisfying the tested characteristic. For example, the
control 150 may be selected to accept items and thecontrol 152 may be selected to reject items. For instance, although in some implementations, items may be automatically rejected if one or more of the results 142-148 are below a threshold, in other implementations, a manual accept or reject action may be performed using either thecontrol 150 or thecontrol 152. If items are accepted or rejected, a corresponding message may be sent to other internal or external systems, such as warehousing, manufacturing, shipping, delivery, etc. - The
control 154 may be used to remediate some or all of the items evaluated as not validly satisfying the tested characteristic. For example, defective items may be repaired, such as by replacing a defective component. As another example, items may be flagged as scheduled to be returned to a supplier for fixing. Alternatively, a message may be sent to the supplier requesting that they remediate the item on-site within a certain timeframe, or risk rejection of the non-conforming item. - A
control 156 may be selected to alter rules used by one or more validation engines. For example, if one validation entity (e.g., the third party validation entity 124) consistently produces lower acceptance rates than another validation entity (e.g., the brand validation entity 122), thresholds used by one or more validation engines may be adjusted to attempt to produce more equal results. For example, a third party validation engine may use proprietary, unknown thresholds, and results of an internal validation entity (e.g., the brand validation entity 124) may be monitored and thresholds may be occasionally adjusted in an attempt to have internal validation results more closely match third party validation results. - A
control 158 may be selected to print a certificate. The certificate may be printed, for example, as an indicia of a successful validation performed by a third party. The certificate may be a physical certificate or a digital certificate. A physical certificate may be a paper certificate, or a label or “sticker” which may be physically affixed to an item. In one example, a digital certificate is sent as an email attachment to specified recipient parties, or the certificate is presented as a web page which may be accessed by parties who are notified of its existence or who may navigate to it using a search engine. In another example, the certificate is a dynamically generated Portable Document Format (PDF) file. - A
control 160 may be selected to display results details, such as in auser interface 162. Theuser interface 162 indicates, for each item, which validations passed and which validations failed. For example, for anitem 164, a basic internal validation passed and an internal brand validation, a third party basic validation, and a third party rigid validation failed. As another example, for anitem 166, a basic internal validation and a third party rigid validation failed and an internal brand validation and a third party basic validation passed. - As shown in the
user interface 162, yes/no symbols (e.g., “check mark”, “X” mark) may indicate whether an item passed a particular validation. In addition, a statistical likelihood may be displayed which indicates a level of certainty that an item validly satisfies a tested characteristic. For example, for anitem 168, theuser interface 162 indicates that theitem 168 passed a basic internal validation with a 98% level of certainty and passed a basic third party validation with a 64% level of certainty. - The
user interface 162 may provide further details if an item passes some but not all tests (e.g., if there are discrepancies between test results). That is, if test results are consistent (e.g., if an item either passes all tests or fails all tests), additional information may not be as useful as in situations where test results are inconsistent (e.g., additional information may be useful to research items which passed some validations but failed other validations). - For example, as mentioned, the
item 164 passed a basic internal validation but failed a basic third party validation. The user interface may provide details such as a description of the reason for why the item failed the third party validation. Theuser interface 162 may include a simple textual description of a reason of failure, one or more rule codes or descriptions (e.g., of rules that failed), and/or event data used in the failed validation. - As an example, if a tested characteristic is “pesticide-free”, as a result of the failure of the basic third party validation, the
user interface 162 may display a simple phrase such as “pesticide detected”, or may display one or more rule descriptions such as “pesticide used within the last three years”, or may display a message that includes event data, such as “pesticide treatment occurred on Jun. 1, 2008”. - As another example, a message such as “no data available” may be displayed. Different validation engines may handle a data unavailable situation differently. For example, the
basic validation engine 126 may ignore a situation where data is unavailable (e.g., allow an item to pass), while thebasic validation engine 130 may fail an item if data is unavailable. Therefore, the display of a “no data available” message may indicate a reason for a discrepancy between test results. -
FIGS. 2 and 3 are conceptual diagrams of exemplary systems for providing third party certification using enhanced claim validation, such as a validation of a characteristic or “label claim.” Starting with the upper left portion ofFIG. 2 , a first entity user 230 (in this case, a farmer) who owns a group of items (in this case, a group of cows) enters a lot identifier 205 (“ABC123”) and a type of third party validation requested (“Source & Process Verified”) into auser interface 231. Other information or data may also be provided in theuser interface 231. For example, apicture 232 of a representative item may be displayed within the user interface when thelot identifier 205 is input (e.g. to increase accuracy), or theuser 230 may select a preferred trustedthird party 233 from among several trusted third parties to perform the validation (e.g. to increase confidence in the validation, thereby increasing a selling price of the item). - The
lot identifier 205, either alone or with other data such as the type of third party validation requested, is transmitted to a thirdparty validation entity 234, which may be a selected third party, a preferred third party, or a third party associated with the type of validation requested. The thirdparty validation entity 234 may be a trusted governmental or non-governmental entity that certifies compliance or characteristics of the item. The third party validation entity queries various nodes of a supply chain in real time or near real time to gather event data or other information stored at one or more nodes that relate to events associated with the submittedlot identifier 205. - In the illustrated example, the third
party validation entity 234 may query or poll avehicle 216 that transported one or more items in the lot, afarm 217 that raised or harvested one or more items in the lot, afactory 219 that processed one or more items in the lot, or any other node. In an alternate implementation, at least a portion of the event data may already be stored at the thirdparty validation entity 234 prior to the commencement of the third party validation, such that no externally polling or querying is required (i.e. only an internal data lookup is required). For instance, the thirdparty validation entity 234 may be a data warehouse where event data is initially stored when an item in the lot is traversing the supply chain. Specifically, the thirdparty validation entity 234 may be a node in the supply chain, or may be associated with a node in the supply chain. - Using one or more rule-based validation engines (e.g., 215, 216), the third party validation entity validates a characteristic of the items in the lot, and provides an indicia of the validation, such as one or more physical or digital certificates, which may be provided back to the
user 230, avendor 235 of the items, or to other entities. The type of indicia to provide may be based on the role of the user requesting validation (such as a “consumer” role, an “inspector” role, a “butcher” role, a “transporter” role, etc.) Theuser 230 may view a certificate usinguser interface 236, which indicates that the “Source & Process Verified Basic Standard” and “Source & Process Verified Upgraded Standard” validations have been completed. - The
vendor 235 may view a certificate using theuser interface 237 and, as shown, may adjust the price of the item upwards accordingly. For example, an uncertified lot of items is priced less than a certified lot of items, which is in turn priced less than a lot of items with an improved certification. In one example, the certificate is sent as an email attachment to specified recipient parties, or the certificate is presented as a web page which may be accessed by parties who are notified of its existence or who may navigate to it using a search engine. In another example, the certificate is a dynamically generated Portable Document Format (PDF) file. - Upon selling the lot of items to a
buyer 239, thevendor 235 may pass the lot, the filtered event data associated with the lot, and the certificate to thebuyer 239. The buyer'suser interface 238 notes the receipt of the certificate, however the previous owner of the lot is shown as “undisclosed” since thevendor 235 filtered identification information which identified theuser 230. In any regard, since the certificate has been validated by the thirdparty validation entity 234 and not, for example, by thevendor 235 or theuser 230, thebuyer 239 need not trust parties involved in the transaction of the lot who may have an adverse interest to thebuyer 239, or who may be motivated to make false claims regarding the items in the lot. - By filtering the event data while at the same time passing along the certificate to the
buyer 239, thevendor 235 can provide an assurance to thebuyer 239 that the items in the lot satisfy its claims without identifying the source or origin of theuser 230. In hiding the user's identity, thevendor 235 can prevent thebuyer 239 from contacting theuser 230 directly for other transactions, cutting thevendor 235 out of future deals. -
FIG. 3 provides additional context to the approach ofFIG. 2 by illustrating several specific, exemplary user interfaces which may be used by theowner 230, thevendor 235, or by other parties such as thebuyer 239 in effecting a third party validation. As illustrated inFIG. 3 , alabel 301 affixed to the packaging of an item or to the item itself includes a claim 302 (in this case, a label claim), that asserts that the item is “Certified Organic.” To be certified as an organic food, generally it must be shown that use of synthetic chemical inputs (e.g. fertilizer, pesticides, antibiotics, food additives, etc) and genetically modified organisms has been avoided; that farmland has been used that has been free from chemicals for a number of years (often, three or more); that an audit trail of detailed written production and sales records has been established; that strict physical separation of organic products from non-certified products has been established and respected; and that periodic on-site inspections have occurred. Different user roles may want to see results of different validations. For example, certain roles may be more interested in seeing fertilizer event data or validation results, while others may be more interested in viewing antibiotic event data or validation results. - The qualities or characteristics that make a food item “organic” or, conversely, preclude a food item from being called “organic” may be encoded using rules, such that a condition that a food item whose supply chain event history satisfies or does not satisfy the rule may be validated or invalidated as an organic item, thereby validating or invalidating a claim. A rule that requires, for instance, that the farm be free of chemicals would be violated by first event data received from a first source in real time that indicates that a particular farm is the origin of the item, and second event data received from a second source in real time that indicates that the particular farm received pesticide treatment with a particular period of time.
- While an owner or vendor of an item be motivated to falsely market a non-organic item as organic, a third party entity such as a consumer advocacy group or health food organization may have the competing motivation to expose suppliers who make these false claims. In this regard, in performing a claim validation, an end-user may benefit by placing their trust in the third party instead of the supplier, and may be likely to receive a more accurate (or at least more conservative) analysis. In any case, by providing the option of performing a third party validation in addition to an interested-party validation, the enhanced approach described herein gives the consumer additional choices, and allows the user to select an approach that they deem to be best for them.
- In order for the user to validate the claim, the
label 301 includes a validation resource 304 (such as a Uniform Resource Locator (URL) or a telephone number), as well as a unique identifier 305 (“0-918894-28-X”) that uniquely identifies the item or collection of items. The user may be a living or automated end-user of the product (such as a consumer), or the user may some other entity disposed at the origin or mid-point of the supply chain. Although the term “validation” is used herein throughout to generally refer to a process for determining whether a claim is accurate, the “validation” process may support an approval, an authentication, an authorization, a certification, a confirmation, a corroboration, endorsement, a legitimization, ratification, a sanction, a substantiation, or a verification. - Using a
user interface 306, the user enters theunique identifier 305 intotext box 307, and selects the type of claim that the user wishes to validate. For instance, the user checks “Certified Organic”checkbox 309 to verify the validity of the “Certified Organic”claim 302. Although the label does not explicitly make a “No Growth Hormone” or “Made In The USA” claim, the user could also selectcheckboxes unique identifier 305, or appropriate unique identifiers of products may be automatically determined based on receiving a selection of a claim that is to be satisfied. - Using a
help control 312, the user may seek automated assistance. In one example, the automated assistance function may access a database that stores a graphic that displays where theunique identifier 305 is located for various items, that stores a textual description of the location of theunique identifier 305, or that directs the user to a technical support specialist or a community of users, or initiates an on-line chat session. Once theunique identifier 305 is entered into thetext box 307, the user can select a “display history”form submission control 314. - The user interface may also include controls (e.g., controls 328-330) which allow the user to select one or more entities to perform the claim validation. For instance, selection of the
control 329 may cause a validation to be performed by TraceGains® (a private company), and selection of thecontrol 330 may cause a validation to be performed by the Food and Drug Administration of the United States Government. Selection of thecontrol 328 may cause an industry standard (e.g., a less strict) validation to be performed, for example by TraceGains®. Failure to select an entity to perform a claim validation may cause a validation to occur using an interested party, using a default, preferred or random entity, or using an entity associated with the type of claim validation requested. For instance, a query of look-up table may determine that a “halal” claim should be validated by a religious entity or charity as the trusted third party (as compared, for example, to a meatpacking council or an automobile association, who may have no interest in providing, or experience or knowledge to provide, an accurate validation). - Upon detecting that the
form submission control 314 has been selected, a transaction database 315 (e.g. of the user, or of a third party or other validation entity) queries various nodes of a supply chain in real time or near real time to gather event data or other information stored at one or more nodes that relate to events associated with the submittedunique identifier 305. For instance, thetransaction database 315 may query or poll avehicle 316 that transported the item, afarm 317 that raised or harvested the item, afactory 319 that processed the item, a governmental or non-governmental entity that certifies compliance of the item, or any other node. Thetransaction database 315 may operate under control of an interested party (such as a node of within the supply chain of the item), or under the control of a third party who may or may not be trusted or disinterested. - It may occur that the
transaction database 315 queries all nodes in the supply chain, or thetransaction database 315 may query a portion of the nodes in the supply chain based on the unique identifier entered. In addition, a trusted third party may select a subset of the nodes in the supply chain that the trusted third party itself deems to be trusted, and may filter out or ignore nodes that, for example, have historically provided inaccurate or conflicting data, or may select nodes or event data which is relevant to a role or job of the user requesting the validation (as specified, for example, in a look-up table). In an alternate implementation, at least a portion of the event data is stored at the thirdparty validation entity 234 before the validation begins, such that no externally polling or querying is required (i.e. only an internal data lookup is required). For instance, the thirdparty validation entity 234 may be a data warehouse where event data is initially stored when the item is traversing the supply chain, or a central data repository. Moreover, the thirdparty validation entity 234 may be a node in the supply chain, or may be associated with a node in the supply chain. - Furthermore, it may occur that the
transaction database 315 queries a first node or set of nodes in the supply chain, processes received data, and subsequently queries a second or further node or set of nodes. For example, if the first query receives event data identifying an origin of an item, a second, or subsequent query of a supply chain or non-supply chain node (such as a governmental node) may reveal information pertaining to the origin of the item. If the origin is a farm or a manufacturing facility, for example, these cascading queries could be used to determine if the origin is certified by a governmental agency or other certification body. - For each of the nodes that store event data relating to the item, event data 318 (or an indicia of the occurrence or non-occurrence of an event, or the existence or non-existence of event data 318), are transmitted from each node to the
transaction database 315. Since the events may be stored in various data formats, thetransaction database 315 reformats the data to a unified data format, such as a format based on eXtensible Markup Language (XML), and transmits the reformatted event data to the user. Furthermore, it may automatically determined whether the item satisfies theclaim 302, based on the receivedevent data 318, or the user may be given the option of manually validating the receivedevent data 318 itself. The events in thetransaction database 315 may also be stored in a relational table format within an SQL database. - The reformatted event data is output on a
user interface 321 to thereby validate or invalidate the claim. Specifically, based on the automatic determination, theuser interface 321 includesindicia 322 that indicates that this item is certified as organic by the FDA but does not meet organic standards established by a private company (e.g., TraceGains®). For each validation entity, the indicia may include a “yes” or “no” type indicia that indicates that the claim is or is not validated by that entity, the indicia may display a probability that the claim is or is not validated by that entity, or raw event data or other data may be output. - The indicia may also be a physical or digital certificate or other mark of authenticity. For instance, selection of the
control 331 may allow the user to print out a physical certificate validating the claim by a third party. Selection of thecontrol 332 may bring up another menu which allows the user to transmit a digital certificate, or provide access to a digital certificate, as well as some or all of the event data received at thetransaction database 316. The user can bring this certificate to the auction house to receive an additional premium on items identified as compliant. - “Yes” or “no” (‘binary’) type indicia can be output if the claim is determined by a validation entity to be 100% valid or 100% invalid, or a threshold can be preset, set by a manufacturer or user, or automatically determined based on past use, where the threshold allows a claim to be validated or invalidated even if some event data is missing or contradicts the validation or invalidation. For instance, if event data indicates that only 5% of a farm has been sprayed for pesticides and a threshold of 90% certainty has been set by the user, the enhanced claim validation application may output an indicia that an item had not been sprayed for pesticides even though there is a small chance that the item has been sprayed. Such a threshold is helpful since it may be impossible or impractical to prove or disprove a claim with 100% certainty, while different users may desire different levels of confidence.
- In addition to displaying event data for the item itself, the
user interface 321 displays historical event data for each component, constituent part, ingredient, or previous state or phase of the item. For instance, theuser interface 321 includes expandingregions region 323 displays production event data (“Produced: Apr. 7, 1998”); origin location event data (“Farms Without Fences”); governmental certification compliance event data (“FDA Organic Certification No. 1223-XX, Exp. 9/1999); and pre-transformation event data (“Source: Bessie—ID # 16238”). - Since ‘
Ingredient # 1,’ which is displayed in expandingregion 323, is milk, the user may wish to view event data regarding the source of the milk or, more generically, the product that was transformed to produce the item or ingredient. Since the pre-transformation product is a cow (“Bessie”) which also has a unique identifier (“16238”), the user may select acontrol 326 to see the event history of the cow. For instance, although the expandingregion 323 indicates that the milk is certified organic based on governmental certification compliance event data, the user may effectively treat that event data as a claim, and may investigate the validity of that claim as well, in a similar manner as they investigated the end product. - In that regard, the user may investigate the supply chain of any uniquely identified items though an iterative, recursive, or retrospective process. Specifically, products, and then components or previous states or phases of those products, are validated from end-point to origin-point, notwithstanding the fact that the uniquely identified items may change their nature or state through supply chain processes, or that certain intermediate phases or states may be not uniquely identifiable or unidentifiable.
- The expanding
region 324 displays event data for the ingredient “cauliflower,” which was used in the production of the uniquely identified item. Since event data relating to an FDA organic certification of the cauliflower was not found, the item is then not deemed to be certified organic based on the application of a rule or upon reviewing event data, and theclaim 302 is thereby invalidated by this event data. As above, since the event data includes a unique identifier (“Seed ID #95223”) of the cauliflower, the user may select acontrol 327 to research the event history of the cauliflower in turn. - In summary, a user can enter information that uniquely identifies an item into a user interface, in order to validate a claim associated with the item, in real time or near real time. Based on the identifying information, nodes in a supply chain are polled or queried for event data or other information regarding the item, and the event data is appropriately reformatted, and automatically compared against the claim. In addition to outputting the raw event data itself, the user interface outputs indicia to validate or invalidate the claim, thereby rendering the supply chain for the uniquely identified item completely transparent. Such processing may occur using a disinterested, trusted third party, or interested parties in a transaction, or any combination thereof.
-
FIGS. 1 to 3 , supra, andFIGS. 5 to 10 , infra illustrate various user interfaces for validating claims, which are implemented using various controls or widgets, that each allow for different levels of interaction and functionality. In each case, it is noted that the particular controls used, and the particular functionalities allowed, are merely exemplary. For the sake of brevity, it is further noted that any user interface that allows for the input of identification information and the output of claim validation information may be used, and that the selection of particular components, controls, widgets or functionalities generally depends upon the intended user of the user interface, and the level of control desired. -
FIG. 4 is a block diagram of anexemplary system 400 for validating a claim. Briefly, the system includes auser device 401, atransaction database server 402, and another validation entity 402 a connected to nodes of asupply chain 403 via anetwork 404. Using thesystem 400, a user may investigate the validity of a claim associated with an item that has been processed by thesupply chain 403, thereby making thesupply chain 403 increasingly transparent. From the perspective of suppliers in the supply chain, transparency in the supply chain, backed up by third party trust assurances, allow suppliers to increase prices of goods which have been processed under higher standards. - In more detail, and among other things, the
user device 401 includes auser interface 405, such as a display or haptic device or a speaker, that outputs textual, touch, sound or graphical data to the user, including event data that validates the claim, or certifications of these validations provided by third parties. The user device also includes aninput device 406, such as a mouse, a keypad, an RFID reader, a bar code scanner, a microphone, a telephone, cell phone, a gaming system or console, personal digital assistant (PDA), digital picture frame, a device equipped with a camera, gyroscope or accelerometer, or other input mechanism, that receives or accepts commands from the user or an automated system. - The
transaction database server 402 includes atransaction database 407 that stores events associated with items in the supply chain, as well as addresses or identifiers of resources external to thetransaction database server 402 that also store events. Thetransaction database server 402 may be under the control of a trusted third party. - In one example implementation, the events in the
transaction database 407 are stored in a uniform event storage format, such as an XML-based format, while externally stored events may be stored in various event storage formats, including proprietary event storage formats. Thetransaction database 407 may also store indicia received from nodes of thesupply chain 403 that indicate whether or not a particular item has or has not, or is likely to have had or had not, been processed at a particular node or within a particular supply chain. Thetransaction database 407 may re-format event data received from various nodes in the supply chain which exists in non-standard or proprietary formats. In another example, the events in thetransaction database 407 are stored in a relational table format within a database management system that is accessible using a Structured Query Language (i.e. in an SQL database). - Furthermore, the
transaction database server 402 includes abasic rules engine 408 and abrand validation engine 408 a that allow thetransaction database server 402 to automatically validate or invalidate claims based on applying rules to received event data. Thebrand validation engine 408 a may apply different tests, or have stricter rules (e.g., different threshold values) than thebasic rules engine 408. For instance, for the claim “Never Frozen” a rule may be included that requires all event data relating to a temperature reading event to be greater than 0° C. (32° F.), as a temperature reading at or below that temperature would indicate that the item may have frozen. Similarly, “stored cold, never frozen” products may be associated with a rule that requires all event date relating to temperature readings to be in a temperature range of greater than 0° C. (32° F.), but less than room temperature. - Although rules may be used to validate claims, in other cases the event data itself may provide sufficient to validate or invalidate a claim. For instance, event data itself may indicate that an item is organic or not organic. Since event data is self-serving and may itself be manipulated or falsified, however, the enhanced validation process may choose to ignore conclusory event data, may afford this type of event data lesser value, or may choose to use this event data only in certain circumstances. For instance, the enhanced validation process may ignore event data that indicates that an item is organic, but may use similar event data that indicates than an item is not organic.
- Table 1, below, illustrates sample rules used to aid the interpretation of event data and to thereby validate claims.
-
TABLE 1 Sample Rules Claim Rule: Real California Cheese Event = Milk Extraction Event Data (Location) = California; and Event = Processing Event Data (Location) = California. No Growth Hormone Event = Vaccination Event Data (Type) ≠ BGH, and Event Data (Type) ≠ rBGH, and Event Data (Type) ≠ BST, and Event Data (Type) ≠ rBST. Made In Japan Event = Manufacture Event Data (Factory Country) = Japan or Event Data (Factory City) = Osaka . . . Gluten Free Event = Manufacture Event Data (Ingredient) ≠ Gluten, or Event Data (Ingredient) ≠ Gliadin, or Event Data (Ingredient) ≠ Glutenin. Kosher Event = Slaughter Halal Event Data (Slaughter Facility ID) = <certified facility>, and Event Data (Slaughter Personnel) = <certified individual>; and Event = Storage Event Data (Stored With) ≠ Milk. Unscented Event = Manufacture Event Data (Ingredient) ≠ “fragrance” or “perfume” - The
transaction database server 402 also includes a claim database 409 (or a claim engine, similar to the rules engine 408) that identifies item types based on input identification information, and that further determines appropriate claims to validate for identified item types. Where a user supplies identification information for an item but does not supply a claim to validate, the claim database may determine the type of item that the user is referring to based upon the content or format of the identification information, and may automatically or dynamically select one or more claims to validate without querying the user for additional information. - In addition to or instead of storing appropriate claims for identified items, the
claim database 409 may also store known claims associated with specific items, or validation types or event data types typically requested by particular user roles. For instance, if a clothing retailer may proudly assert that none of their clothing is made using child labor, then theclaim database 409 may automatically associate (or invoke rules which associate) a “No Child Labor” claim with all items manufactured or sold by the clothing retailer. As such, if, as so commonly happens, the retailer itself is not aware that its subcontractors are illegally using child labor, the enhanced claim validation application may assist with detecting this impropriety in every case that identification information for any of the retailer's products is input. Alternatively, the claims database 409 (or claims engine) may be a database listing items (by their unique identifiers) that are compliant with certain claims. - The
transaction database server 402 may also store user preferences/profiles 410, which include explicitly provided or inferentially determined information concerning the user using the enhanced claim validation application. For instance, a vegetarian or a person who practices a certain religion may explicitly denote that they want all food items checked for meat content or, similarly, through continued selection of a “vegetarian” claim validation function, the enhanced claim validation application may infer (based on rules stored in the rules engine 408) that a particular user is a vegetarian and that a vegetarian claim validation function is always to be run for food items. As with other components of thetransaction database server 402, the user preferences/profiles are optional and may be omitted. - The user preferences/
profiles 410 may also describe an authorization level of a user to view certain event data. For instance, a generic consumer may given authorization to view an automatically determined claim validation result, while a wholesaler or middleman may be given authorization to view more granular data, such as pricing or sales volume event data. Certain users may be assigned authorization levels which do not allow them to perform claim validations at all. The user preferences/profiles 410 may also specify trusted third parties who, by default, are to perform claim validations. - Other authorization levels may allow validations to be run, but for results to be output only if a claim is validated or invalidated. For instance, a company may effectively allow users to check the company's internal processes by allowing them to run claim validations, but may output an error message to the user and deliver invalidating claim result to the company if a claim turns out to be invalid. This type of selective authorization may allow a company time to get ahead of a potentially damaging story if, for circumstances outside of the company's control, a customer would otherwise discover that an asserted claim or characteristic is invalid.
- The
transaction database server 402 may also include acertificate generator 418 for generating physical or digital certificates, as well as athird party selector 419 for selecting third parties for performing validations in the absence of an explicit user selection. The third party selector may include a look-up table which outputs a third party (or a hierarchy of third parties) based on various input factors, such as item SKU, type of validation requested, past accuracy, level of trust, and other information. - Validations may be performed by more than one validation entity. Validations performed by multiple entities may be performed sequentially or in parallel. Validation entities may communicate with one another, for example, to collate results. For example, the
other validation entity 402 a may communicate with thetransaction database server 402 across thenetwork 404. Theother validation entity 402 a may include the same internal components (e.g., 407-410, 418, 419) as thetransaction database server 402. - The
supply chain 403 includes any number of nodes, such asnodes 411 a to 411 n. Each node includes an event database, such asevent databases 412 a to 412 n, that each store events associated with items in thesupply chain 403. Furthermore, nodes may include input devices (such asbar code readers 414 a to 414 n). For instance, thenode 411 b may store events read bybar code reader 414 b or other input devices associated with thenode 411 b, or thenode 411 b may store events read by other nodes, such asnodes 411 a and/or 411 n. - As items are transported through and processed by the
supply chain 403, events are generated and stored, thereby providing a tracking history for each event. In one example, thesupply chain 403 may be used to track items that do not undergo any state changes or transformations, such as a supply chain that receives a finished product, processes the finished product, and transfers out the finished product to outside of thesupply chain 403. In another example, thesupply chain 403 is used to track items that undergo state changes or transformations, such as a transformation that changes the item from a living state to a non-living state, or that changes the item from a first product to an Nth product (N being any integer) derived from the first product. In this latter example, the stored events can be used to trace the processing history of the Nth product through to the first product, for the purpose of validating a claim relating to the Nth product or the first product, and for other purposes. - As shown in
FIG. 4 , items 415 and 416 undergo several state or phase transformations within the supply chain. For instance,seeds 415 a are processed at thenode 411 a, while atree 415 b that grows fromseeds 415 a is processed at thenode 411 b, afruit 415 c that grows on thetree 415 b is processed at thenode 411 c, acontainer 415 d of thefruit 415 c is processed at thenode 411 d, andjuice 415 n made with the fruit from thecontainer 415 d (including thefruit 415 c) is processed at thenode 411 n. Since the validation of a label claim on the juice box that stores thejuice 415 n may benefit from or require event data from stored events associated with theseeds 415 a, thejuice 415 n in the juice box and theseeds 415 a are considered to be one “item,” in various forms, phases or states. More particularly, theseeds 415 a and thetree 415 b are considered to be living forms or versions of the item 415, while the harvestedfruit 415 c and thejuice 415 n in the juice box are considered to be non-living forms or versions of the item 415. In each instance, supra and infra, where a particular item is mentioned, reference is also intended to be made to groups of similar or dissimilar items. - As long as the
seeds 415 a (or groups of seeds), thetree 415 b (or groups of trees), thefruit 415 c (or groups of fruit), thecontainer 415 d (or groups of containers), and thejuice 415 n (or multiple batches of juice) are each associated with a unique identification number (or a unique identifier can be inferred or estimated, for example, based on a grouping of an item under consideration), the item 415 can be iteratively tracked through its initial state, based on event data associated with later states. For instance, in accessing event data or validating a claim associated with thejuice 415 n, the user or enhanced claim validation application may determine that the juice was conveyed the uniquelyidentifiable container 415 d. - Based on the role of the user (i.e. transportation manager or truck driver), the validation framework may determine that transportation history event data should be obtained, or that a validation involving transportation history event data should be performed. In subsequently accessing the transportation history event data of the
container 415 d, the user or transactional database server may determine that thecontainer 415 d contains uniquelyidentifiable fruit 415 c, which may be subsequently determined to come from a uniquelyidentifiable tree 415 b, which was planted using uniquelyidentifiable seeds 415 a. In another implementation, the item 415 can be iteratively tracked through its initial state even if an intermediate state is not identified or identifiable. - In this regard, the entire event history of the item is made transparent to a user, by linking together various subsequent phases or states of a product with previous uniquely identifiable phases or states. As such complex claim validation routines or processes may be performed on later states or phases of an item, to determine whether earlier states or phases of the item met certain conditions. Specifically, a user could enter a unique identifier associated with the
juice 415 n to determine whether, in violation of a claim, contract requirement, or personal ethos, theseeds 415 a were planted using migrant farm workers. - Using the unique identifier, the transaction database server queries and accesses event data of the
juice 415 n to iteratively access the unique identification information of thecontainer 415 d, then thefruit 415 c, then thetree 415 b, then theseeds 415 a, then determine based planting event data queried based on the unique identifier of theseeds 415 a, event information exposing the identity of the planter of theseeds 415 a. Based on this accessed event information, the claim, contract requirement, or moral restriction could be manually or automatically validated by an interested or disinterested, trusted or non-trusted party. - If a middle phase or state of the item 415, such as the
fruit 415 c, does not have a unique identifier, it is still possible for the transaction database server to estimate the unique identifier of a previous phase or state of the item, and to make a guess regarding whether the claim is valid. If the validity of the claim is not ascertained with complete certainty, an indication as such may also be output to the user. Using the fruit example, the transaction database server may determine, based on the unique identity of thefruit 415 c that thefruit 415 c came from a uniquely identifiable farm that included uniquely identifiable trees, but the unique identification information of the tree that thefruit 415 c was harvested from may be missing. - By querying nodes using the unique identifier of the farm itself, that is the unique identifier of the entity that encompasses or includes all possible trees, the transaction database server may determine a probability of each uniquely identifiable tree on the farm being the tree from which the
fruit 415 c was harvested and, consequently, the probability that particular, uniquely identifiable seeds that eventually grew into the identified trees were the source of thefruit 415 c. - Further, the enhanced claim validation application may cohort the trees, by grouping together those trees that were grown from uniquely identifiable batches of seeds, and generate a likelihood or probability that the
fruit 415 c was harvested from a particular, uniquely identifiable seed batch based on the number and size of each tree cohort. Despite the fact that event data is gathered for multiple or various states or phases of the item 415, the event data for the earliest desired or available phase or state of the item 415 is gathered in real time to receiving the identification information for the latest phase or state of the item. - Referring ahead briefly,
FIG. 5 provides several examples of how a characteristic, trait, condition, or quality of an item can be automatically determined or deduced when an earlier state, origin, or ingredient of the item is unavailable or unidentifiable. In a first scenario, a uniquelyidentifiable fruit 501 has been harvested from anunidentifiable tree 502, however event data indicates that theidentifiable fruit 502 originated fromidentifiable farm 504 or that theunidentifiable tree 502 grew on theidentifiable farm 504. Characteristics or traits of an item (the fruit 501) may still be determined if the item necessarily originated from another identifiable origin, source, state or item (the farm 504). - Ignoring for a moment any factual inconsistency resulting from a origin potentially having these two example characteristics, event data associated with the
farm 504 indicates that thefarm 504 is certified organic, and that half of the trees have been sprayed with pesticides. Despite the fact that thetree 502 is unidentified, it can still be automatically determined that thefruit 502 also is certified organic and that it has a 50% probability of pesticide application since it necessarily originated from thefarm 504. This information may be displayed to a user via a user interface, or may be applied to a rule in the rule engine to validate a claim. - In a second scenario, a uniquely
identifiable palette 505 packagesunidentified cartons cartons palette 505 if the characteristics of all of the possible sources or origins are known. For instance, event data associated with thefarm 509 indicates that thefarm 509 is certified organic, and that the farm 510 (which is not certified organic) provides twice as many vegetables into the packaging process of thecarton 507 as thefarm 509. - From this information, it can automatically be determined that vegetables stored the
carton 507 have a 33% chance of being fromfarm 509, and thus have a 33% chance of being certified organic. Since thepalette 505 includes vegetable containers from a process that produced thecarton 507 as well as an equal number of vegetable containers from a process that produced the carton 506 (which is known to originate from the farm 510), it can be automatically determined that thevegetable palette 505 includes vegetable cartons that have a 16.5% chance of coming fromfarm 509, and thus have a 16.5% chance of being certified organic. - Thus, despite the fact that the
cartons palette 505 includes some organic vegetables. This information may be displayed to a user via a user interface, or may be applied to a rule in the rule engine to validate a claim. Since some claims, such as a “certified grown in the USA” label claim may require some affirmative event data to validate that claim, and since neither farms 509 or 510 include that characteristic, it may be definitively determined that the palette 510 does not include vegetables that carry that certification. - In a third scenario, a uniquely identified
food product 511 is made from anunidentified bread product 512 includes ingredients (such as flour, yeast, sesame seeds, etc.) that comeidentifiable manufacturer 514 and multiple identifiable orunidentifiable sources 515 a to 515 n. Event data associated with theidentifiable manufacturer 514 indicates that themanufacturer 514 adds artificial colors to all of its ingredients, and that its ingredients are not organic. From this event data alone, regardless of the characteristics of thesources 515 a to 515 n, it can be determined that thefood product 511 includes at least some artificial color, and is not organic. This information may be displayed to a user via a user interface, or may be applied to the rule engine to validate a claim. - Referring back to
FIG. 4 ,calf 416 a is processed at thenode 411 a, while acow 416 b (representing the full-growncalf 416 a) is processed at thenode 411 b. Acarcass 416 c of thecow 416 b is processed at thenode 411 c,ground beef 416 d derived from thecarcass 416 c is processed at thenode 411 d, and ahamburger 416 n that is made from theground beef 416 d is processed at thenode 411 n. Since the validation of a claim on thehamburger 416 n may benefit from or require data from stored events associated with thecalf 416 a, thehamburger 416 n and thecalf 416 a are considered to be one “item,” in various forms, phases or states. Thecalf 416 a and thecow 416 b are considered to be living forms, states, phases or versions of the item 416, while thecarcass 416 c, theground beef 416 d, and thehamburger 416 n are considered to be non-living forms, states, phases or versions of the item 415. - As long as the
calf 416 a, thecow 416 b, thecarcass 416 c, theground beef 416 d, and thehamburger 416 n are each associated with a unique identification number, the item 416 can be iteratively tracked through its initial state, based on event data associated with later states. For instance, in accessing event data or validating a claim associated with thehamburger 416 n, the user or transactional database server may determine that thehamburger 416 n was made with, among other things, theground beef 416 d. In subsequently accessing the event data of theground beef 416 d (in addition to or instead of accessing the event data of other ingredients or components of thehamburger 416 n, such as the lettuce or the hamburger bun), the user or transactional database server itself may determine that theground beef 416 d came from the uniquelyidentifiable carcass 416 c, which may be subsequently determined to come from a uniquelyidentifiable cow 416 b, which grew from the uniquelyidentifiable calf 416 a. - In this regard, the entire event history of the item is made transparent to a user or the third party, by linking together various subsequent phases or states of a product with previous uniquely identifiable phases or states. As above, complex claim validation routines or processes may be performed on later states or phases of an item, to determine whether earlier states or phases of the item met certain conditions. Specifically, a user could enter a unique identifier associated with the
hamburger 416 n to determine whether, in violation of a label claim, contract requirement, or moral restriction, thecalf 416 a was ever treated with growth hormones, even if the intermediate phases were not affected by growth hormones. - Since the
calf 416 a was likely birthed by a cow which was also uniquely identifiable and was also associated with event data, the entry of a unique identifier for thehamburger 416 n end product could in practice result in detailed information relating to events that occurred on thecalf 416 a that was processed into theground beef 416 d, as well as events relating to ancestors of thecalf 416 a. So, in addition to determining whether growth hormones were used on thecalf 416 a, to an extent limited only by available event data, it is also possible to determine whether any ancestor cow of thecalf 416 a was ever treated with growth hormone, thereby improving the confidence of an end-user that thehamburger 416 d is hormone-free, as claimed by a label. - In any regard, using the unique identifier of the
hamburger 416 n, the transaction database server could query and access event data of thehamburger 416 n to iteratively access the unique identification information of theground beef 416 d, then thecarcass 416 c, then thecow 416 b, then thecalf 416 a, then determine based on vaccination or medical event data queried based on the unique identifier of thecalf 416 a, whether thecalf 416 a was ever treated with growth hormones. Based on this accessed event information, the claim, contract requirement, or user's moral restriction could be manually or automatically validated. - If a middle phase or state of the item 416, such as the
carcass 416 c, does not have a unique identifier, it is still possible for the transaction database server to estimate the unique identifier of a previous phase or state of the missing state or phase of the item, and to make a guess or estimate regarding whether the claim is valid. If the validity of the claim is not ascertained with complete certainty, an indication as such may also be output to the user. Using the hamburger example, the transaction database server may determine, based on the unique identity of thecarcass 416 c that thecarcass 416 c came from a uniquely identifiable ranch that included uniquely identifiable cows, but the unique identification information of the cow became thecarcass 416 c may be missing. - By querying nodes using the unique identifier of the ranch itself, that is the unique identifier of the entity that encompasses or includes all possible cows, the transaction database server may determine a probability of each uniquely identifiable cow on the ranch being the cow from which the
carcass 416 c was harvested and, consequently, the probability that particular, uniquely identifiable cows that eventually grew into the identified cows were the source of thecarcass 416 c. - Further, the transaction database server cohorts the carcasses, by grouping together those cows that were butchered from the uniquely identifiable calves raised on the ranch, and generates a likelihood or probability that the
carcass 416 c was butchered from a particular, uniquely identifiable calf (or group of calves, such as a group of calves including a calf under consideration). Despite the fact that event data is gathered for multiple or various states or phases of the item 416, the event data for the earliest desired or available phase or state of the item 416 is gathered in real time to receiving the identification information for the latest phase or state of the item. - While
FIG. 4 illustrates items 415 and 416 undergoing relatively consecutive processing steps with regard to time and location, thereby altering the form, phase, or state of the item, in other example implementations processing via the various nodes 411 may occur over long periods of time, and may cover great distances. For instance, nodes 411 may be fixed or mobile, may track an item through years or decades of processing, and may be sited on different continents. Furthermore, events may occur to the items that may not be stored by nodes 411 of thesupply chain 403. - Although
FIG. 4 describes theuser device 401, thetransaction database server 402, theother validation entity 402 a, and the nodes 411 as separate devices, this description is merely exemplary. In other implementations, theuser device 401, thetransaction database server 402, theother validation entity 402 a, and/or nodes 411 of thesupply chain 403 may be combined into one, two or more unified devices, or their functionalities may be combined or blended. For instance, thetransaction database 407 may be stored on theuser device 401 itself, and theuser device 401 may read, generate, or otherwise access data from items in the supply chain using its own bar code scanner, radio frequency identification device (RFID) reader, or other input device. -
FIGS. 6 and 7 are flowcharts of processes for performing enhanced claim validation and third party certification. Briefly, inFIG. 6 , a computer-implemented process includes receiving identification information uniquely identifying an item that has moved through a node in a supply chain, the item being marked with a claim, and receiving, from the node, event data associated with the uniquely identified item. The process also includes outputting received event data that validates or invalidates the claim, in real time or near real time to receiving the identification information. - As noted above, a user can enter information that uniquely identifies an item into a user interface, in order to validate a claim associated with the item, in real time or near real time. Based on the identifying information, nodes in a supply chain are polled or queried for event data or other information regarding the item (e.g. by the user, a node of the supply chain, or a third party validation entity), and the event data is appropriately reformatted, and automatically compared against the claim. In addition to outputting the raw event data itself, the user interface outputs indicia to validate or invalidate the claim, thereby rendering the supply chain for the uniquely identified item more completely transparent.
- Using the enhanced approach described herein, it is possible for a consumer to investigate whether a claim is false or deceiving. For instance, using a handheld computing device, a user may enter information that uniquely identifies an item, and be presented with raw historical event data associated with the item or components of the item, or with an analysis, interpretation or indicia based on the historical event data. Through this presented information, the customer can determine on their own or be shown whether a claim associated with the item is accurate and/or valid. Through this determination, the customer can alter their purchasing habits, and avoid the unwanted consumption or use of products that do not satisfy their associated claims.
- In further detail, when
process 600 begins (S601), identification information uniquely identifying an item that has moved through a node in a supply chain is received, the item being marked with a label claim (S602). The claim may be an “organic” label claim, a “natural” claim, a “no hormone” claim, a point-of-origin claim, an ingredients claim, a vegetarian contents claim, a “cruelty free” claim, a drug claim, a cosmetic claim, a “cage-free” claim, a brand claim, a trademark claim, a compliance claim, or any other claim regarding the character, nature or origin of the item. In addition to validating claims, the enhanced approach described herein can be used to verify whether contract terms have been satisfied, such as a contract term that requires particular sourcing, freshness, or other characteristic of an item. - Identification information refers to human-readable (e.g. a series of visible characters) or machine-readable data (e.g. a bar code) that distinguishes one item, or collection of items from another. For instance, a Stock Keeping Unit, (SKU), a Universal Product Code (UPC), an interim product identifier, a European Article Number (EAN), a Vehicle Identification Number (VIN), and a Global Trade Item Number (GTIN) are types of unique identifiers that are attached to an item, variant, product line, bundle, service or attachment. The identification information may be inscribed or incorporated onto the item itself, such as the case with a VIN , or the identification information may be located on packaging or an item label that is not an actual part of the item.
- The identification information need not be physically or tangibly manifested. For example, the user may obtain identification information for a product via a telephone call with a customer service representative, or using an on-line database. For instance, a manufacturer may wish to limit a consumer's access to the event data or the claim validation information, and may provide the uniquely identifying information to the user only if the user calls a customer service representative with a complaint or request for information, and provides a time, date and location of purchase of the item. As indicated above, however, in many cases the identification information will be physically affixed to the item or packaging of the item, and the claim may be physically affixed to the item or packaging of the item, such as on a label.
- The identification information may be associated with a single product or a group of products, or multiple, discrete identifying information can be received to identify a group of products. For instance, the identification information may represent batch identification information identifying a palette of items, or a container (such as a boxcar) of items, where the batch identification information may be mapped to or associated with the individual identification information identifying the individual items within the palette or container. Alternatively, the multiple individual identification information identifying individual items within a palette or container can be received instead of or in addition to the batch identification information that represents the group of individual items. Such functionality allows batches of items to be processed and validated at once.
- More particularly, any process for arranging items into sets of items and, for example, creating and assigning identifying data to the set of items that may be different from data identifying an item within the set may be generically referred to as an ‘aggregation’ process. For example, at the end of a manufacturing transformation process, consumer goods may accumulate in a storage area and may be aggregated onto a palette, where the palette may be assigned an identifier that is different from any of the individual consumer goods.
- Since the aggregation process may group items from different sources or potential sources, the aggregated item (e.g. the palette) is assigned data which links its with the known or potential sources of the component items (e.g. the items in the palette). The palette identifier is said to ‘overlap’ the individual item identifiers, because both exist at the same time and, while the item is palletized the item identifier may be used to track the palette, and the palette identifier may be used to track each item.
- Referring ahead briefly,
FIG. 9 provides a brief conceptual overview of a process for assigning a unique identifier to an item in a supply chain. An item, a group of items, or components of an item (collectively, “raw product”) is received at a unique identifier assignment system (901). The unique identifier assignment system may or may not be within the supply chain itself, and thus may or may not perform processing functions aside from the assignment of the unique identifier. - Once received, the raw product is sorted, assigned a unique identification number, and in some cases, collectively sorted and stored (902). ‘Sorting’ generally refers to any process for selecting or arranging products or items into a particular sequence or category. In one example, sorting may include ordering items of the same kind in some ordered sequence (e.g. largest to smallest), or categorizing items with similar properties together (e.g., products separated by size). The sorting process may be accomplished in several ways, including an automated mechanical sorting process, a manual sorting process or combinations thereof.
- Items such as animals, food, fluids, consumer goods or intangible items may be randomly sorted; sorted by gender, disposition, physical or mental characteristic, type, size, shape, weight, color, ripeness, temperature, receipt or expiration date or time, priority; sorted by physical characteristic or property such as density; sorted by intangible characteristic such as appeal or consumer demand; sorted based on regulatory requirements; or sorted by any other definable or indefinable characteristic, aspect or quality.
- Although sorting may refer to a process for improving the order or categorization of items, the sorting process may also encompass ‘unsorting,’ in which the order or categorization of items is actually made worse. For instance, sorting may include combining a sorted bin of like items with an unsorted bin of dissimilar items, or randomly arranging items that are arranged in a particular order.
- Sorting may introduce variation, uncertainty, randomness or other types of entropy into a supply chain, particularly from the standpoint of traceability. For instance, a uniquely identified container of fruit input to a sorting process may be associated with a particular characteristic. If the fruit is sorted by size into smaller sorted batches, the sorted batches would otherwise no longer be associated with that particular characteristic once they are separated from the uniquely identified container.
- The raw product may be collectively stored or commingled before the unique identifier is assigned, such as in the case of fruit sold by the carton, or the raw product may be collectively stored after the unique identifier is assigned, such as in the case of a consumer electronic item that is palletized after a serial number is assigned. In any case, once the unique identifier has been assigned and the raw product has been stored collectively, it is possible to determine which items are stored with each other, and what items are in each storage unit (904). Through such an approach, each item in each carton or pallet may be linked to the origin of manufacture of the item.
- As described and exemplified more fully below, ‘commingling’ refers to any mixing together of items or products derived from a single origin or from multiple origins. Mixing, accumulating, storing or combining together, or failing to prevent the natural occurrence of such mixing, are examples of ways to performing commingling. Once commingled, a randomly selected one (or unit) of the commingled items is indistinguishable from any other item, and thus the origin of the randomly selected item may be indiscernible with complete certainty.
- Commingling may occur in a variety of ways, including an automated mechanical commingling process, a manual labor commingling process, a process which commingles items without involvement of a human or machine, or by some combination thereof. Items, including living, inanimate, or intangible items, may be randomly commingled with other items, or may be commingled or commingle themselves with like or dissimilar items based on any quality, characteristic, aspect, preference, or lack thereof. In several examples, fluids may be commingling by pouring two different fluids into a mixing vat; consumer products may be commingled by batching products from separate origins together prior to further processing; and animals may commingle themselves by wandering into separate pens.
- In any regard, the unique identifier assignment process itself may generate event data that is associated with the item and stored. For instance, a unique identifier assignment event may include event data that describes the origin of the item, components of the item, the time or date when the unique identifier was assigned, unique identifiers that are stored or “cohorted” with the uniquely identified items, the unit of storage, the destination of the item after the occurrence of the unique identifier assignment event, or other data. Table 2, below, provides exemplary event data associated with a particular identifier and an exemplary unique identifier assignment event.
-
TABLE 2 Event Data Associated With A Particular Unique Identifier Data Event Name Data Type IDENTIFIER ASSIGNMENT DATE Mar. 3, 2007 Date ORIGIN Freshfield Farms Text BATCH NUMBER 1138 Number DESTINATION Processing Facility #11 Text DEPARTURE DATE Mar. 4, 2007 Date DEPARTURE TIME 14:37:03 Time ASSIGNED CARTON 3742 Number ASSIGNED PALLET 1263 Number ITEM TYPE Oranges, Delano Text - Receiving the identification information may further include generating a user interface, and receiving the identification information from a user via the generated user interface.
FIGS. 10 and 11 illustrateexemplary user interfaces - The
user interface 1000 includes asearch type control 1001, which in this case is a drop-down control, that allows a user to select the type of identifier to search by. Theuser interface 1000 also includes asearch term control 1002, which in this case is a text field, that allows the user to select which of the selected types they would like to view, as well as a search button control that executes the search. InFIG. 10 , for example, by selecting thesearch button control 1003, the user indicates that they wish to search by pallet identifier, and that they wish to view those pallets identified by the number “144329.” - The results of the search are shown in the
results window 1004. Upon selecting identification information for a particular result and then selecting the “Get Traceability Report”button 1005, event data matching the selected identification information is output in awindow 1006. InFIG. 10 , for example, the event data output in thewindow 1006 indicates the carton numbers (column 1007) that match the selected pallet identification number (column 1009). - As discussed in more detail below, the event data output in the
window 1006 may be automatically or manually analyzed to determine whether a claim is valid or accurate, in real time or near real time. For instance, if a produce wholesaler receives the pallet of oranges identified by identification number “144329” and searches for associated event data using theuser interface 1000, the information incolumn 1010 may be used to refute a claim (or a contract requirement) that the oranges were packaged within the last three days. - As another example, the user may select one or more of the controls 1020-1024 to perform a validation using an industry standard, internal (e.g., TraceGains®), or third party (e.g., FDA) validation entity, respectively. If a validation is performed, validation results may be displayed in a
summary area 1030. In this example, thesummary area 1030 indicates that an industry standard validation and an internal validation passed, but that a validation performed by the FDA failed. Further, the internal validation passed with a 48% level of certainty. - The information in
column 1011, which identifies a source ranch of the items contained in the selected pallet, may be used by a user to refute a claim (or a contract requirement) that the oranges were grown or otherwise sourced at a particular farm, or a particular plot of a farm. The identification information for a carton of oranges can thus be used by a web-based system to obtain the traceability information on the exact product SKU, every pallet that the carton has ever been placed upon, and every ranch block number that provided one or more oranges contained within the carton. - In any regard, since the
user interface 1000 uses codes to identify various data elements, and displays data fields that a typical consumer many not be interested in viewing, it may be that theexemplary user interface 1000 may be of the kind that is best suited for a sophisticated user, such as a wholesaler or commercial client. As described in more detail herein, other user interfaces (such asuser interfaces 306 and 321) may be designed to provide more focused event data, to offer fewer options, or to provide an automatic analysis of the claim, and may thus be better suited for a consumer or other end user. -
FIG. 11 illustrates auser interface 1100 which, unlikeuser interface 1000, performs a traceability search on an item based on a unique carton identifier, instead of a unique pallet identifier. Theuser interface 1100 includes asearch type control 1101, which in this case is a drop-down control, that allows a user to select the type of identifier to search by. Theuser interface 1100 also includes a text fieldsearch term control 1102 that allows the user to select which of the selected types they would like to view, as well as a search button control that executes the search. InFIG. 11 , for example, by selecting thesearch button control 1103, the user indicates that they wish to search by carton identifier, and that they wish to view those cartons identified by the number “B0442185.” - The results of the search are shown in the
results window 1104. Upon selecting identification information for a particular result in theresults window 1104 and then selecting the “Get Traceability Report”button 1105, event data matching the selected identification information is output in awindow 1106. InFIG. 11 , for example, the event data output in thewindow 1106 indicates the identified carton number (column 1107), and a pallet identifier that identifies a pallet upon which the identified carton was packed (column 1109). - The event data output in the
window 1106 may be automatically or manually analyzed to determine whether a claim is valid or accurate, in real time or near real time to entering the identifier into the user interface. For instance, if a produce wholesaler receives the carton of oranges identified by identification number “B0442185” and searches for associated event data using theuser interface 1100, the information incolumn 1110 may be used to refute a claim (or a contract requirement) that the oranges were packaged within the last three days, and the information incolumn 1111, which identifies a source ranch of the items contained in the selected pallet, may be used by a user to refute a claim (or a contract requirement) that the oranges were grown or otherwise sourced at a particular farm, or a particular plot of a farm. - Automatic validations may also be performed. For example, a user may select one or more of the controls 1120-1124 to perform a validation using an industry standard, internal (e.g., TraceGains®), or third party (e.g., FDA) validation entity, respectively. If a validation is performed, validation results may be displayed in a
summary area 1130. - The identification information may be received manually, such as by using a keyboard, mouse, or voice input, or automatically using a radio frequency identification device (RFID) reader, a barcode scanner, or any other mechanisms that effects the efficient input of identification information.
- Returning now to
FIG. 6 , event data associated with the uniquely identified item is received from the node (S604). The unique identification number is used as the basis for a query of the nodes in the supply chain, in order to receive all or a portion of the event data relating to events experienced by the identified item during its processing and movement through the supply chain. In a simple example, a query is sent to all nodes that are in communication with a transaction database server, requesting that all event databases be searched for information relating to the entered identification information. The event data may be received at a transaction database controlled by the user, or by a selected or default trusted third party entity. - Based on receiving this query, the nodes may access the event databases using a look-up table, index, or other mechanism, and output event data associated with the identification information. This output event data is then sent back to the transaction database server for reformatting, collation, processing, analysis, and/or further transmission or output. Event data associated with the uniquely identified item may be received from a second, third, or Nth node, and the event data received from the nodes may be reformatted.
- In additional implementations, the transaction database server may store information indicating that the item has definitely passed through, or definitely not passed through certain nodes. This would apply in a situation where, upon processing an item, a node sends a message to the transaction database server that particular items have been processed and that event data has been stored at the node, or has not yet been processed and that event data is not yet stored.
- In this situation, the transaction database server may not query each node with which the server is in communication, but may rather automatically determine which servers are known to store event data, or which servers are known to store event data relevant to the claim validation, and query selected nodes based on this automatic determination. For instance, if the transaction database server stores information that indicates that a certain farm stores information for a produce item relating to a seed planting event and a produce harvesting event, the transaction database may query or poll nodes associated with that farm to determine the source or origin of the produce item, and may not query or poll nodes associated with other farms in an effort to receive event data relating to seed planting and produce harvesting events. If a trusted third party entity is performing the validation, the trusted third party may choose to only query those nodes which the trusted third party entity itself considers to be trusted.
- In an additional example, the transaction database server may store information for each node relating to the types of hardware or software used by the nodes, and may format queries appropriately, or may generate queries that will cause the nodes to format data according to a preferred format of the transaction database server. As it is expected that event data will be stored on a large variety of systems, including systems that implement legacy, obsolete, or proprietary query engines, the ability to effectively communicate with these systems and to gather event data across multiple systems is beneficial. In this regard, a data collection interface is established between the node and a transaction database, the data collection interface allowing the transaction database to receive the event data associated with the uniquely identified item from the node.
- In a further example, the transaction database server may itself store event data, such as the case where nodes send indicia to the transaction database server that an item has been processed, such that the identification information is received before or after the event data is received from the node. This may also be the case where the transaction database server itself exists within a node of the supply chain. In these instances, the transaction database server may avoid querying the individual nodes, to avoid the duplication of event data and to reduce computational expense.
- If no response is received by the query, the transaction database may default to a condition in which it is assumed that no event data is stored at the queried node, or the node may be re-queried. A historical query response rate may be used to aid this determination, such that a node that affirmatively responds to a majority of queries, including queries that result in an indication that no event data is stored, may be re-queried if no response is received to an initial query.
- In an additional example, the transaction database server may merely poll those nodes in the supply chain, or types of nodes in the supply chain, that would be relevant to the claim validation. For instance, if the claim associated with processed meat relates to process that the animal was slaughtered, such as a “Kosher” or a “Halal” claim, the transaction database server may merely poll nodes associated with slaughterhouses for event data relating to the identified processed meat item. In this regard, the transaction database server may choose to not query other nodes, such as nodes that store birthing, vaccination, or transportation event data but not slaughtering event data that would confirm or otherwise validate the “Kosher” or “Halal” claim.
- The event data received from the queried nodes may relate to any event data stored at the node, to event data relating to the identified item only, to a movement of or a particular supply chain processing of the uniquely identified item at the node, to event data that was generated within a particular time period, only to event data that is relevant to the validation of the claim, or the event data may relate to other factors.
- The event data itself may represent an event identification number attribute, a type attribute, a nomenclature attribute, a quantity attribute, a unit-of measurement attribute, a parent event identification number attribute, or a child event identification number attribute, and may be associated with a vaccination event, a harvesting event, a birthing event, or a transportation event, a treatment event, a planting event, a location event, a containering event, or a cohorting event.
- Received event data that validates or invalidates the claim is output in real time or near real time to receiving the identification information (S605), and the process 300 ends (S606). As illustrated above with respect to
FIGS. 10 and 11 , the received event data that validates or invalidates the claim may include all of the event data that was received at the transaction database server from the queried nodes, or a subset of all of the received event data. - Continuing with the example described above, for instance, if the claim is a “kosher” or “halal” claim on processed meat and the transaction database server receives event data from numerous nodes including nodes that store event data unrelated to the slaughtering process, the transaction database server may filter the received event data, and merely output germane event data, such as event data received from a slaughterhouse node, or event data that specifically validates or invalidates the label claim.
- As the transaction database server is configured, adapted, or is operable to receive data from multiple nodes or data sources that may each use their own language, specification or data format, the transaction database server may effect the output of received event data received from the various nodes by establishing a data conversion interface between the output device and the transaction database, the data conversion interface allowing the output of the received event data from the transaction database using the output device.
- Instead of or in addition to outputting received event data that validates or invalidates the claim, the transaction database server may automatically validate or invalidate the claim itself, and output an indicia of the validity or invalidity of the claim itself. The indicia may include an explicit statement on a printed certificate, such as “The Label Claim Has Been Validated,” or “The Item Has Been Made In the U.S.A.”
- Alternatively, the claim may be validated inferentially, such as were information or indicia is only provided when the claim is valid or invalid, or where the probability that the claim is valid or invalid exceeds or does not exceed a threshold. If certification (such as third party certification) occurs as part of a business process flow, the act of certification may merely involve setting a binary flag associated with a unique identifier from one state (a non-certified state) to another state (a certified state), thereby allowing the remainder of the process flow to occur.
- In any case, a user may input the claim to validate manually, or the transaction database server may automatically determine which claims to automatically validate or invalidate. For instance, the transaction database server may determine the type of item associated with the unique identifier, and validate all or some of the claims that are associated with that type of item.
- Specifically, the transaction database server may determine that a first item is a package of ground beef, and automatically determine whether the beef is “Hormone Free” and “Halal” based on the identification information of the first item and the received event data associated with the identification information, but not attempt to automatically determine that the beef is “Perfume-free,” “Certified Child-Labor Free,” or “Not Tested On Animals.”
- Similarly, the transaction database server may automatically determine that a second item is a consumer electronic, and automatically determine whether the consumer electronic is “Made in the U.S.A.” or “UL Listed” based on the identification information of the second item and the received event data associated with the identification, but not attempt to automatically determine that the consumer electronic is “free range.”
- Such a determination may be performed by storing a look-up table, database, or other mechanisms at the transaction database server that associates identification information with item types, and associates item types with appropriate claims. Table 3 illustrates one such exemplary table, where “#” represents any number, and “A” represents any alphabetical character:
-
TABLE 3 Sample Identification Information, Item Types, and Appropriate Claims Identification Information Format Item Type Appropriate Claims A-##### Food, Ground Beef No Hormone (Range: 0-49999) Kosher Vegetarian Montana-Raised Fresh Never Frozen A-##### Food, Ground Turkey No Hormone (Range: 5000-9999) Kosher Vegetarian Cage-Free AAA-AA-AAAA Consumer Electronics No Child Labor UL Listed Made In China #A-###-AAA Clothing No Perfumes Or Dyes No Child Labor Made In India 100% Cashmere A########A Pharmaceutical Not Tested On Animals Natural Ingredients Generic Made In The U.S.A. - Additionally, the transaction database server may automatically validate or invalidate a claim based upon user preferences, based upon a user profile, or based on common or historical validation patterns determined through time. For instance, if the user is vegetarian the transaction database server may automatically check all items, or all food items, to determine whether they are vegetarian, based on the user indicating a preference for this type of validation to occur for all validations, or for validations of food products. Such an approach would save the user from having to input that they wished to check for meat content on each and every validation where the item is a food product.
- Similarly, based on accessing a user profile, the transaction database server may determine that the user fits into a class, category or type of user that would be interested in running particular validations for all items, or types of items, with or without an explicit claim. Using this user profile information, the transaction database server may access a database that associates the class, category or type of user with validation preferences with that class, category or type of user.
- For instance, a user profile may determine that the user practices a certain religion that exercises dietary restrictions, where all food items are automatically validated to determine whether the dietary restriction is satisfied, based on received event data. Using this approach, even if an item claims to be in compliance with the dietary restriction, a user may achieve piece-of-mind by quickly determining, based on viewing the actual event data associated with the identified item, whether their personal commitments and moral obligations have been met.
- In the case where multiple identification is received, or where batch identification information is received representing a multitude of items (such as a container of uniquely identifiable items), a claim may be invalidated for the batch as a whole, or for each individual item within the batch. The automatic validation may express the validity of a particular claim for each item within a batch individually, or the claim validity may be expressed as a percentage of items within the batch for which the claim is valid or invalid, for instance describing a compliance percentage. Furthermore, the automatic validation may output those items within the batch for which the claim is valid or invalid.
- Identification information uniquely identifying a component of the uniquely identified item may be received based on outputting the received event data. Component event data associated with the component may be received from a second node on the supply chain, and received component event data that validates or invalidates the claim may be output, in real time or near real time to receiving the identification information uniquely identifying the component.
- The item may be transformed from a first product to a second product at the node, and the output received event data that validates the claim may further include event data associated with the first product and event data associated with the second product. The first product may be a living product, such as a living animal, fruit or vegetable, where the second product is a non-living product, such as a meat product or a harvested fruit or vegetable.
- Furthermore, and as illustrated in
FIG. 7 , the polling of event data from the nodes of the supply chain and/or the validation or invalidation of the claim may be performed by a third party certification entity, such as a government agency or agent of the government, or a consumer safety, advocacy or other organization, using a process 350. - The results of the validation may be provided to an end-user, to the owner of the item, or to a vendor selling the item, for example to justify an increased selling price of the item. Briefly, this process includes receiving identification information uniquely identifying an item that has moved through a node in a supply chain, and receiving, from the node, event data associated with the uniquely identified item based on receiving the identification information. The process also includes performing a third party validation of an associated characteristic of the uniquely identified item based on the received event data, and providing a third party certification of the associated characteristic based on performing the third party validation.
- In more detail, when the
process 700 begins (S701), identification information uniquely identifying an item that has moved through a node in a supply chain is received (S702). The identification information may be received over a network from any node in the supply chain using a user interface similar touser interfaces - Event data associated with the uniquely identified item is received from the node based on receiving the identification information (S704), and a third party validation of an associated characteristic of the uniquely identified item based on the received event data (S705). The third party validation may be performed in real time or near real time to receiving the identification information, and may be any type of validation, including a process verification, an age verification, an ownership verification, a shelf-life or expiry date verification, or a source verification. If the identification information identifies a group of items including the item, and the third party validation may be performed for each item of the group.
- A third party certification of the associated characteristic is provided based on performing the third party validation (S706), and the
process 700 ends (S707). Providing the third party certification may further include providing a physical or digital certificate identifying the item and indicating that a third party has validated the associated characteristic. The certificate may be provided to an owner, a potential purchaser, or a seller of the item. - In the case where multiple items are identified and only a portion of the items satisfy the certification criteria, providing the third party certification may further include identifying a non-conforming item of the group whose associated characteristic is invalidated, and identifying a conforming item of the group whose associated characteristic is validated.
- Performing the third party validation may include applying a rule to the received event data, and identifying (or certifying) a statistical likelihood that the associated characteristic is valid. Performing the third party validation may further include performing a recursive validation, in which a component of the uniquely identified item is identified using the received event data, and the third party validation is performed on the identified component.
-
FIG. 8 is a flowchart illustrating a computer-implementedprocess 800. Briefly, the computer-implementedprocess 800 includes: receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain; receiving, based on the received identification information, event data associated with the uniquely identified items from the one or more nodes; performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks; and providing a result of the validation for each of the multiple discrete evaluation frameworks. - In further detail, when the
process 800 begins (S801), identification information uniquely identifying items that have moved through one or more nodes of a supply chain is received (S802). For example, identification information can be received by scanning items, by looking up item identifiers on a manifest based on a palette identifier, or by lookup up item identifiers in a database based on a lot identifier, to name a few examples. In addition to receiving the identification information, the characteristic or claim to be validated may also be received. - Based on the received identification information, event data associated with the uniquely identified items is received from the one or more nodes (S804). For example, nodes in a supply chain may be polled or queried for event data or other information regarding the items. The identification information may be used as the basis for a query of the nodes in the supply chain, in order to receive all or a portion of the event data relating to events experienced by the identified items during their processing and movement through the supply chain. In a simple example, a query is sent to all nodes that are in communication with a validation entity, requesting that all event databases be searched for information relating to the received identification information.
- A validation of a characteristic of the uniquely identified items is performed based on applying the received event data to multiple discrete evaluation frameworks (S805). A validation may involve applying received event data to a set of rules associated with each of the multiple evaluation frameworks. The validation may be performed simultaneously by each evaluation framework, or validations may be performed sequentially. Some of the evaluation frameworks may be internal (e.g., performed on behalf of one of the nodes of the supply chain) and some may be external (e.g., disinterested third parties).
- Evaluation frameworks may use different compliance standards. For example, a first evaluation framework may use a compliance standard which is more stringent than a compliance standard used by a second evaluation framework. A more stringent compliance standard may be used as an elevated standard predefined for a particular brand under which the items will be sold.
- After a validation has been performed, a result of the validation is provided for each of the multiple discrete evaluation frameworks (S806), thereby ending the process 800 (S807). The result may be provided in real time or near real time to the receiving of the identification information. The result may be presented in a user interface and may include indicia, for each evaluation framework, showing conforming and non-conforming items which do and do not validly satisfy the evaluated characteristic, respectively. A percentage of conforming and/or of non-conforming items may be shown. As another example, a list of conforming items and a list of non-conforming items may be displayed. For some or all items, a statistical likelihood may be displayed, which indicates the likelihood that a respective item validly satisfies the characteristic.
- The result may provide further details for items evaluated as validly satisfying the characteristic by a first evaluation framework and evaluated as not validly satisfying the characteristic by a second evaluation framework. The result may provide details such as a description of the reason for why the item did not validly satisfy the characteristic. For example, the result may include a simple textual description of a reason of failure, one or more rule codes or descriptions (e.g., of rules that failed), and/or event data used in the failed validation.
-
FIGS. 12 to 16 illustrate exemplary user interfaces for entering identification information and outputting event information that validates a claim. Briefly,FIG. 12 shows a web-baseduser interface 1200 that, by providing fewer options and by outputting event data in a user friendly manner, is oriented for an end-user or consumer. Furthermore,FIGS. 13 and 14 and 15 show web-baseduser interfaces FIG. 16 illustratesuser interfaces 1601 to 1603, which automatically and iteratively or recursively validates claims for an item in a supply chain through a multiple phases or states. - In
FIG. 12 , theuser interface 1200 includes atext region 1201 that describes the purpose or goal of the claim validation, and instructs the user how to use the enhanced claim validation application. In particular, thetext region 1201 tells the user that theuser interface 1200 can be used to confirm that a beef product is truly “South Dakota Certified™” Beef. - In confirming that the beef purchased by the consumer satisfies this certification, the enhanced claim validation application does not merely access a local lookup table to cross-reference an input identifier of the beef; rather the application actively queries or polls at least one node within the supply chain of the identified beef item, retrieves event data associated with the beef item, applies rules against the retrieved event data, and displays the event data or an interpretation of the event data to the user in real time or near real time to receiving the identification information based on applying the rules. In doing so, the
text region 1201 also instructs the user to enter a tracking number, or unique identification number, of a beef item intotext field 1202. - The user may locate the tracking number from the packaging, sales literature, advertising or other documentation associated with the beef item, or verbally from a sales person or customer service personnel. Upon entering the tracking number (“1193912”) into the text field and selecting the submit
form control 1204, the enhanced claim validation application queries nodes in a supply chain for event data, using the entered tracking number, receives event data associated with the tracking number, and prepares the event data for output to the user. Output event data may be displayed by completely refreshing a web page that includesuser interface 1200, or theuser interface 1200 may include Asynchronous Java and XML (AJAX) or other controls that allow theuser interface 1200 to be updated without refreshing the web page. - In this example, the event data accessed at the transaction database in response to the tracking number query indicates that the beef item identified with tracking
number 1193912 was processed in at least two source nodes, “SDC0001,” and “SDC0701,” which a lookup table or other mechanism on the transaction database server can automatically identify as “Marshall John Beef,” and another unidentified ranch. Sinceuser interface 1200 is intended for use by a customer, it may be designed only to provide sufficient information to validate the claim, and may not be designed, for example, to output all received event data, or to allow the user to recursively or iteratively track the event history of previous phases or states, or components of the item. - In this regard, in event
data output window 1205, theuser interface 1200 displays theidentifier 1206 of the first source node of the item and aURL 1207 of the first source node. Since the received event data from this first source node includes a picture orimage 1209 of the actual cattle that was eventually processed into the beef item, theimage 1209 is also displayed in theuser interface 1200. Similarly, theuser interface 1200 displays the identifier 1210 of the second source node of the item, but does not display a URL or an image because that information is not available, not identifiable, or superfluous. - Using event data or interpreted event data output in the
user interface 1200, the user may manually validate the claim that the beef item is “South Dakota Certified™” beef by selecting theURL 1207, and determining that “Marshall Johns Beef” sells beef that satisfies this certification. Furthermore, one or more validation entities can use rules to automatically validate this claim by cross-referencing theidentifier 1206 against a database of sources of “South Dakota Certified™” beef, or by cross-referencing the address of the first source node to determine if it is located in South Dakota, and output an interpretation or indicia of this validation. - In
user interface 1200, for example, indicia 1212 indicates that the first source node satisfies the “South Dakota Certified™” beef certification as validated by an internal validation entity (e.g., TraceGains®) but that certification results from a third party FDA validation entity are inconclusive. The output of theindicia 1212 occurs in real time or near real time to the selection of the submitform control 1204. Each meat item has a placed on it that can be traced back to the animal from which it came, for example by querying the carcass information. A consumer can access a web-based lookup system to query the animal movement system, to identify all of the previous owners of that animal. -
User interfaces FIGS. 13 and 14 and 15, respectively, are used in a similar manner to validate or verify the source and age of cattle.FIG. 13 illustrates a lookup site relating to an exemplary USDA-approved Process Verified Program. Packing plants will pay a premium price for Process Verified animals, so people selling these animals can receive those premiums at the time of sale if they have a certificate that can be authenticated by the buyer. Thus the lookup site may be a public web site where you can drop in a list of unique animal identifiers. - In more detail, animal RFID numbers that uniquely identify cattle are entered into
open interaction element 1301, one or more validation entities (e.g., an internal entity such as “AgInfoLink” and/or a third party entity such as the FDA) are selected usingcontrols 1302, and aform submission control 1303 is selected. Based on the selection of this control, the selected validation entity or entities query nodes of a supply chain that processes the animals identified by the input RFID numbers, and outputs viauser interface 1400 the animal RFID numbers (column 1401) and the birth date of the identified animals (column 1402). In this example, since onuser interface 1300 the AgInfoLink and FDA validation entities are selected, theuser interface 1400 outputs indicia (columns summary area 1408 indicates that eight out of eight animals passed the internal AgInfoLink validation, but that seven out of eight animals passed the third party FDA validation. - In order for an animal to comply with the age and source information, each animal must have auditable information on both its age, and where the animal originated. Knowing the animal's age is very important for purposes of beef export, knowing the animal's source is important for purposes of disease traceability, etc. Interested parties can use a public on-line web site to enter the unique identifier on the animal, and get a United States Department of Agriculture approved certificate the certifies the animal is of a specific age, and that there is an auditable record of where that animal originated. The third party validation is evidenced by a
seal 1405 on the certificate, assuring end-users of the product of the integrity of the validation. By printing outuser interface 1400, the user has generated a certificate evidencing a third-party validation that can be brought to an auction house to receive an addition premium on identified animals. -
FIG. 15 illustrates auser interface 1550 showing, among other things, animal identifiers and information indicating whether the shown animals comply with a certain claim. Theuser interface 1550 may be presented, for example, as a result of running an internal validation (e.g., by selecting an internal validation entity on the user interface 1300). An internal validation entity may query nodes of a supply chain that processed the animals identified by the input RFID numbers, and output viauser interface 1550 an indicia (column 1551) of whether particular animals conform to a claim, as well as event data supporting the validation such as age data (column 1552). - The
user interface 1550 also includes a region 1553 for identifying animals which do not conform to the claim. Furthermore, the user may generate a certificate (in this case, an electronic .PDF certificate) by selectingcontrol 1555. By generating this certificate, the user can present evidence to an entity downstream in the supply chain that they have complied with particular safeguards or have conformed their practices to particular standards, raising the value of the item and generally increasing supply chain transparency. - The user may select a
control 1560 to run a third party validation. The user may be presented with an interface which allows them to select a third party from among several trusted third parties to perform the validation. The selected third party may query nodes of a supply chain that processed the animals identified by the RFID numbers displayed in theuser interface 1550, and theuser interface 1550 may be replaced with a similar user interface which shows the third party validation results. - As noted above,
FIG. 16 illustratesuser interfaces 1601 to 1603, that automatically and iteratively or recursively validates claims for an item in a supply chain through a multiple phases or states. Usinguser interfaces 1601 to 1603, claims to validate are automatically selected based on the type of item being checked. - In more detail,
user interface 1601 is generated and output as a result of a user entering identification information (“307-16A”) for a hamburger, and further as a result of two validation entities (e.g., ABC Certification and the FDA) simultaneously or sequentially querying nodes of a supply chain for historical event data relating to the hamburger and/or components of the hamburger. Such identification information may be found, for example, on the packaging of a frozen hamburger, or on the packaging or receipt of a freshly cooked hamburger. Notably, the user is not required to indicate which claims they would like to validate or verify. - Based on received event data, the
user interface 1601 displays the components or ingredients of the hamburger, including cheese, beef patty, hamburger bun, and lettuce. As described in further detail below, since the received event information indicates that the cheese, beef patty, and lettuce (but not the hamburger bun) are each associated with a unique identifier, controls 1605 to 1607 are displayed in conjunction with the cheese, beef patty, and lettuce, respectively, to allow a user to validate claims against these items as well. -
Region 1611 of theuser interface 1601 displays certification results. The user interface also includes controls, in thiscase buttons - Having determined that the components of the hamburger item include cheese, a beef patty, a hamburger bun, and lettuce, the transaction database server accesses a database that associates item types with appropriate claims, and generates a list of claims that match, or would be appropriate for, the components of the hamburger item, as well as the hamburger item as a whole. For instance, appropriate claims for the cheese component include “Real California Cheese” or “Wisconsin Cheese,” claims for the beef patty component include “Free-Range Beef,” claims for the hamburger bun component include “Gluten Free,” and claims for the lettuce component include “No Pesticides” and “Organic Vegetables.”
- Furthermore, claims for the hamburger item as a whole include “Kosher,” “Halal,” “No Migrant Labor,” and “Source: USA,” since the result of a claim verification for these claims should depend on the results of individual claim verifications for each component. Since space is limited on the
user interface 1601, the transaction database server may select, if a large number of claims are determined to be appropriate, random claims, a certain number of claims per each component, a user's explicitly or implicitly-determined preferred claims, or claims based on any number of other factors. Where the enhanced claim validation application determines a probability (versus a certainty or near certainty) that the claim is valid or invalid, the probability is shown within the user interface as a percentage. These probabilities may also be presented on the certifications provided by the third party, if applicable. - The ABC Certification and FDA validation entities each perform an automatic claim validation for each of the claims based on receiving event data in real time or in near real time to entering the identification information for the hamburger item, and output indicia 1609 a-b (in the form of a check mark, an ‘X,’ or a question mark) indicating the validity of each appropriate claim for each performed validation. Notably, the “Source: USA” label claim is considered invalid if any of the components of the hamburger item, such as the lettuce, are sourced from outside the United States. Using simplified output indicia, and by avoiding the output of raw event data itself, the
user interface 1601 is easily interpretable and navigable by even the most novice computer user. - Having reviewed the traceability history of the hamburger item as a whole, the user may wish to review the traceability history of the carcass that produced the beef patty itself, using the identification information (“A100-369”) of the carcass. This can be accomplished by selecting
control 1606. In one implementation, the transaction database server pre-fetches event information for all generations of all components of an item being reviewed, while in another implementation only historical event data for an item being viewed is received upon the receipt of identification information, or historical event data is received for an item and N previous states or phases of an item. - Upon detecting the selection of the
control 1606, for example, the transaction database server may actively query nodes for event data that relates to a uniquely identified carcass that produced the beef patty, or the transaction database server may merely access the transaction database to locate event data that has already been queried based on the claim validation of the hamburger item. Similarly, the transaction database server may determine appropriate claims to validate, and may even proceed to validate these appropriate claims, prior to the selection of a component or previous state or phase of an item. - In any case, as above, the transaction database server dynamically or automatically determines appropriate claims to validate based on a detected or determined type of the beef carcass item. For instance, the
user interface 1602 now includes other beef-related claims that were not shown in theuser interface 1601, such as a “Fresh Never Frozen” claim, or a “Carbon Offset Transportation” claim which purports to have offset the carbon involved in the transportation of the carcass. Since the user is specifically requesting the validation of a claim relating to beef, theuser interface 1602 does not reference claims that are not associated with beef, such as “Organic Vegetables,” or “Real California Cheese.” As above, the enhanced claim validation application validates the automatically selected claims, and places determinative indicia adjacent to the claims. - Notably, although
user interface 1601 indicates that the label claim “Source: USA” is invalid, theuser interface 1601 indicates that this same label claim is valid. This inconsistency may occur because the validation of the label claim inuser interface 1601 takes all of the components of an item into effect to validate the label claim of the item as a whole, while theuser interface 1602 validates the label claim of the selected component alone. In other words, if the lettuce component may serve to invalidate a “Source: USA” label claim for the hamburger item as a whole inuser interface 1601, while this same label claim can be validated with respect to the carcass alone inuser interface 1601 because the lettuce is not a component of the carcass itself. - Since the carcass is sourced from a uniquely identifiable cow (“#34703982”), the user may select
control 1610 to view the traceability history of the cow and to validate label claims associated therewith. Similar to above, the enhanced claim validation application selects appropriate claims to validate, and performs a validation of the claims with respect to the uniquely identifiable cow by querying nodes of a supply chain or accessing event data stored as a result of a previously issued query. As shown inuser interface 1603, since the event data of the uniquely identifiable cow includes a unique identifier of a parent cow of the uniquely identifiable cow, the user may continue to recursively or iteratively investigate claims up through the supply chain. -
FIG. 17 depicts the exterior appearance of a an exemplary system including a user device and transaction database server. Briefly, thesystem 1700 includes auser device 1701 and atransaction database server 1702 that includes a transaction database. As described in further detail, below, thesystem 1700 includes, inter alia, an interface that receives identification information uniquely identifying an item that has moved through a node in a supply chain, the item being marked with a claim, that receives, from the node, event data associated with the uniquely identified item, and that outputs received event data that validates or invalidates the claim, in real time or near real time to receiving the identification information. - More specifically, the
system 1700 may includes one or more computers, and a computer-readable medium coupled to the one or more computers having instructions stored thereon which, when executed by the one or more computers, cause the one or more computers to perform operations. The operations include receiving identification information uniquely identifying an item that has moved through a node in a supply chain, and receiving, from the node, event data associated with the uniquely identified item based on receiving the identification information. The operations also include performing a third party validation of an associated characteristic of the uniquely identified item based on the received event data, and providing a third party certification of the associated characteristic based on performing the third party validation. - Alternatively, when executed by the one or more computers, the instructions cause the one or more computers to perform operations including receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain, and receiving, from the one or more nodes, event data associated with the uniquely identified items based on the received identification information. The operations also include performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks, and providing a result of the validation for each of the multiple discrete evaluation frameworks.
- In more detail, the hardware environment of the
user device 1701 includes adisplay monitor 1708 for displaying text and images to a user, akeyboard 1709 for entering text data and user commands into theuser device 1701, amouse 1710 for pointing, selecting and adjusting objects displayed on thedisplay monitor 1708, afixed disk drive 1711, aremovable disk drive 1712, atape drive 1714, ahardcopy output device 1715, acomputer network connection 1716, and areader 1717. - The
display monitor 1708 displays graphics, images, and text that makes up the display for the software applications used by theuser device 1701, as well as the operating system programs necessary to operate theuser device 1701. A user uses thekeyboard 1709 to enter commands and data to operate and control the computer operating system programs, the web browser, and/or the enhanced claim validation application. The user uses themouse 1710 to select and adjust graphics and text objects displayed on thedisplay monitor 1708 as part of the interaction with and control of theuser device 1701 and applications running on theuser device 1701. Themouse 1710 is any type of pointing device, and may be a joystick, a trackball, a touch-pad, or other pointing device. - The
reader 1717 allows theuser device 1701 to automatically capture identification information, and may be a RFID reader, a bar code scanner, a digital camera, a digital video camera, a microphone or other digital input device. Software used to provide for the enhanced claim validation application is stored locally on computer readable memory media, such as the fixeddisk drive 1711. - In a further implementation, the fixed
disk drive 1711 itself may include a number of physical drive units, such as a redundant array of independent disks (“RAID”), or may be a disk drive farm or a disk array that is physically located in a separate computing unit. Such computer readable memory media allow theuser device 1701 to access computer-executable process steps, application programs and the like, stored on removable and non-removable memory media. - The wireless or wireline
computer network connection 1716 may be a modem connection, a local-area network (“LAN”) connection including the Ethernet, or a broadband wide-area network (“WAN”) connection such as a digital subscriber line (“DSL”), cable high-speed internet connection, dial-up connection, T-1 line, T-3 line, fiber optic connection, or satellite connection. Thenetwork 1106 may be one or more of a LAN network, a corporate or government WAN network, the Internet, or other network. - The
computer network connection 1716 uses a wireline or wireless connector. Example wireless connectors include, for example, an INFRARED DATA ASSOCIATION® (“IrDA®”) wireless connector, an optical wireless connector, an INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS® (“IEEE®”) Standard 802.11 wireless connector, a BLUETOOTH® wireless connector, a near field communications (“NFC”) connector, an orthogonal frequency division multiplexing (“OFDM”) ultra wide band (“UWB”) wireless connector, a time-modulated ultra wide band (“TM-UWB”) wireless connector, or other wireless connector. Example wireline connectors include, for example, a IEEEO-1394 FIREWIRE® connector, a Universal Serial Bus (“USB”) connector, a serial port connector, a parallel port connector, or other wireline connector. - The
removable disk drive 1712 is a removable storage device that is used to off-load data from theuser device 1701 or upload data onto theuser device 1701. Theremovable disk drive 1712 may be a floppy disk drive, an IOMEGA® ZIP® drive, a compact disk-read only memory (“CD-ROM”) drive, a CD-Recordable drive (“CD-R”), a CD-Rewritable drive (“CD-RW”), flash memory, a USB flash drive, an external hard disk drive, thumb drive, pen drive, key drive, a High-Density Digital Versatile Disc (“HD-DVD”) optical disc drive, a Blu-Ray optical disc drive, a Holographic Digital Data Storage (“HDDS”) optical disc drive, or any one of the various recordable or rewritable digital versatile disc (“DVD”) drives such as the DVD-Recordable (“DVD-R” or “DVD+R”), DVD-Rewritable (“DVD-RW” or “DVD+RW”), or DVD-RAM. Operating system programs, applications, and various data files, are stored on disks, which are stored on the fixeddisk drive 1711 or on removable media for theremovable disk drive 1712. - The
tape drive 1714 is a tape storage device that is used to off-load data from theuser device 1701 or to upload data onto theuser device 1701. Thetape drive 1714 may be a quarter-inch cartridge (“QIC”), 4 mm digital audio tape (“DAT”), 8 mm digital linear tape (“DLT”) drive, or other type of tape. - The
hardcopy output device 1715 provides an output function for the operating system programs and applications. Thehardcopy output device 1715 may be a printer or any output device that produces tangible output objects, including textual or image data or graphical representations of textual or image data. While thehardcopy output device 1715 is depicted as being directly connected to theuser device 1701, it need not be. For instance, thehardcopy output device 1715 may be connected todevice 1701 via a network interface, such as a wireline or wireless network. - Furthermore, although the
user device 1701 is illustrated inFIG. 17 as a desktop PC, in further implementations theuser device 1701 may be a laptop, a workstation, a midrange computer, a mainframe, a set top box, an embedded system, telephone, a handheld or tablet computer, a PDA, an iPod, a digital picture frame, or other type of computer. -
FIG. 18 illustrates the internal architecture of the user device ofFIG. 17 . The computing environment includes a computer central processing unit (“CPU”) 1801 where the computer instructions that make up an operating system or an application are processed; a display interface 1802 which provides a communication interface and processing functions for rendering graphics, images, and texts on the display monitor 1708; a keyboard interface 1804 which provides a communication interface to the keyboard 1709; a pointing device interface 1805 which provides a communication interface to the mouse 1710 or an equivalent pointing device; a reader interface 1806 which provides a communication interface to the reader 1717; a hardcopy output device interface 1808 which provides a communication interface to the hardcopy output device 1715; a random access memory (“RAM”) 1710 where computer instructions and data are stored in a volatile memory device for processing by the computer CPU 1801; a read-only memory (“ROM”) 1811 where invariant low-level systems code or data for basic system functions such as basic input and output (“I/O”), startup, or reception of keystrokes from the keyboard 1709 are stored in a non-volatile memory device; a storage 1820 or other suitable type of memory (e.g. such as random-access memory (“RAM”), read-only memory (“ROM”), programmable read-only memory (“PROM”), erasable programmable read-only memory (“EPROM”), electrically erasable programmable read-only memory (“EEPROM”), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), where the files that make up an operating system 1821, application programs 1822 (including web browser application 1823, enhanced claim validation application 1824, and other applications 1825 as necessary) and data files 1826 are stored; and a computer network interface 1816 which provides a communication interface to the network 1706 over the computer network connection 1716. The constituent devices and thecomputer CPU 1801 communicate with each other over thecomputer bus 1827. - Briefly, a computer program product is encoded or tangibly embodied in
disk 1820, a machine-readable storage medium. The computer program product includes instructions that, when read by a machine, operate to cause a data processing apparatus to receive identification information uniquely identifying an item that has moved through a node in a supply chain, the item being marked with a claim, to receive, from the node, event data associated with the uniquely identified item, and to output received event data that validates or invalidates the claim, in real time or near real time to receiving the identification information. - Alternatively, the disk is encoded with a computer program comprising instructions that, when executed, operate to cause the computer to perform any of the operations described above. For example, when executed, the instructions may operate to cause a computer to perform operations including receiving identification information uniquely identifying items that have moved through one or more nodes of a supply chain, and receiving, from the one or more nodes, event data associated with the uniquely identified items based on the received identification information. The operations further include performing a validation of a characteristic of the uniquely identified items based on applying the received event data to multiple discrete evaluation frameworks, and providing a result of the validation for each of the multiple discrete evaluation frameworks.
- Furthermore, the
disk 1820 may be encoded with a computer program including instructions that, when executed, operate to cause a computer to perform operations including receiving identification information uniquely identifying an item that has moved through a node in a supply chain, and receiving, from the node, event data associated with the uniquely identified item based on receiving the identification information. The operations also include performing a third party validation of an associated characteristic of the uniquely identified item based on the received event data, and providing a third party certification of the associated characteristic based on performing the third party validation. - The
RAM 1810 interfaces with thecomputer bus 1827 so as to provide quick RAM storage to thecomputer CPU 1801 during the execution of software programs such as the operating system application programs, and device drivers. More specifically, thecomputer CPU 1801 loads computer-executable process steps from the fixeddisk drive 1711 or other media into a field of theRAM 1810 in order to execute software programs. Data is stored in theRAM 1810, where the data is accessed by thecomputer CPU 1801 during execution. - Also shown in
FIG. 18 , theuser device 1701 stores computer-executable code for aoperating system 1821, andapplication programs 1822 such as word processing, spreadsheet, presentation, gaming, web browsing, JavaScript engine, or other applications. Although it is possible to provide for the enhanced claim validation application using the above-described implementation, it is also possible to implement the functions according to the present disclosure as a dynamic link library (“DLL”), or as a plug-in to other application programs such as an Internet web-browser such as the APPLE® SAFARI® web browser or the MICROSOFT® INTERNET EXPLORER® web browser. - The
computer CPU 1801 is one of a number of high-performance computer processors, including an INTEL® or AMD® processor, a POWERPC® processor, a MIPS® reduced instruction set computer (“RISC”) processor, a SPARC® processor, an ACORN® RISC Machine (“ARM®”) architecture processor, a HP ALPHASERVER® processor or a proprietary computer processor for a mainframe. In an additional arrangement, thecomputer CPU 1801 is more than one processing unit, including a multiple CPU configuration found in high-performance workstations and servers, or a multiple scalable processing unit found in mainframes. - The
operating system 1821 may be APPLE® MAC OS X® for INTEL® and POWERPC® based workstations and servers; MICROSOFT® WINDOWS NT®/WINDOWS® 2000/WINDOWS® XP Workstation; MICROSOFT® WINDOWS VISTA®/WINDOWS NT®/WINDOWS® 2000/WINDOWS® XP Server; a variety of UNIX®-flavored operating systems, including AIX® for IBM® workstations and servers, SUNOS® for SUN® workstations and servers, LINUX® for INTEL® CPU-based workstations and servers, HP UX WORKLOAD MANAGER® for HP® workstations and servers, IRIX® for SGI® workstations and servers, VAX/VMS for Digital Equipment Corporation computers, OPENVMS® for HP ALPHASERVER®-based computers; SYMBIAN OS®, NEWTON®, IPOD®, WINDOWS MOBILE® or WINDOWS CE®, PALM®, NOKIA® OS (“NOS”), OSE®, or EPOC® for mobile devices, or a proprietary operating system for computers or embedded systems. The application development platform or framework for theoperating system 1821 may be: BINARY RUNTIME ENVIRONMENT FOR WIRELESS® (“BREW®”); Java Platform, Micro Edition (“Java ME”) orJava 2 Platform, Micro Edition (“J2ME®”); PYTHON™, FLASH LITE®, or MICROSOFT®.NET Compact. -
FIG. 19 is a block diagram of acomputing devices 1900 that may be used to implement the systems and methods described in this document, as either a client or as a server or plurality of servers.Computing device 1900 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Thecomputing device 1900 may represent various forms of mobile devices, such as personal digital assistants, cellular telephones, smartphones, and other similar computing devices. The components shown here, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations described and/or claimed in this document. -
Computing device 1900 includes aprocessor 1902,memory 1904, astorage device 1906, a high-speed interface 1908 connecting tomemory 1904 and high-speed expansion ports, and a low speed interface connecting to low speed bus andstorage device 1906. Each of the components, are interconnected using various busses, and may be mounted on a common motherboard or in other manners as appropriate. Theprocessor 1902 may process instructions for execution within thecomputing device 1900, including instructions stored in thememory 1904 or on thestorage device 1906 to display graphical information for a GUI on an external input/output device, such asdisplay 1916 coupled to the high speed interface. In other implementations, multiple processors and/or multiple buses may be used, as appropriate, along with multiple memories and types of memory. Also,multiple computing devices 1900 may be connected, with each device providing portions of the necessary operations (e.g., as a server bank, a group of blade servers, or a multi-processor system). - The
memory 1904 stores information within thecomputing device 1900. In one implementation, thememory 1904 is a computer-readable medium. In one implementation, thememory 1904 is a volatile memory unit or units. In another implementation, thememory 1904 is a non-volatile memory unit or units. - The
storage device 1906 is capable of providing mass storage for thecomputing device 1900. In one implementation, thestorage device 1906 is a computer-readable medium. In various different implementations, thestorage device 1906 may be a floppy disk device, a hard disk device, an optical disk device, or a tape device, a flash memory or other similar solid state memory device, or an array of devices, including devices in a storage area network or other configurations. In one implementation, a computer program product is tangibly embodied in an information carrier. The computer program product contains instructions that, when executed, perform one or more methods, such as those described above. The information carrier is a computer- or machine-readable medium, such as thememory 1904, thestorage device 1906, or memory onprocessor 1902. - The high speed controller manages bandwidth-intensive operations for the
computing device 1900, while the low speed controller manages lower bandwidth-intensive operations. Such allocation of duties is exemplary only. In one implementation, the high-speed controller 1908 is coupled tomemory 1904, display 1916 (e.g., through a graphics processor or accelerator), and to high-speed expansion ports, which may accept various expansion cards (not shown). In the implementation, low-speed controller is coupled tostorage device 1906 and low-speed expansion port. The low-speed expansion port, which may include various communication ports (e.g., USB, Bluetooth, Ethernet, wireless Ethernet) may be coupled to one or more input/output devices, such as a keyboard, a pointing device, a scanner, or a networking device such as a switch or router, e.g., through a network adapter. - The
computing device 1900 may be implemented in a number of different forms, as shown in the figure. For example, it may be implemented as astandard server 1920, or multiple times in a group of such servers. It may also be implemented as part of arack server system 1924. In addition, it may be implemented in a personal computer such as alaptop computer 1922. Alternatively, components fromcomputing device 1900 may be combined with other components in a mobile device. Each of such devices may contain one or more ofcomputing device 1900, and an entire system may be made up ofmultiple computing devices 1900 communicating with each other. Thecomputing device 1900 may include one or more sensors (not shown), such as gyroscopes, cameras or GPS (Global Positioning Satellite) trackers, configured to detect or sense motion or position of thecomputing device 1900. - Various implementations of the systems and techniques described here may be realized in digital electronic circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations may include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device, and at least one output device.
- These computer programs (also known as programs, software, software applications or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the terms “machine-readable medium” “computer-readable medium” refers to any computer program product, apparatus and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions.
- To provide for interaction with a user, the systems and techniques described here may be implemented on a computer having a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to the user and a keyboard and a pointing device (e.g., a mouse or a trackball) by which the user may provide input to the computer. Other kinds of devices may be used to provide for interaction with a user as well; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
- The systems and techniques described here may be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a client computer having a graphical user interface or a Web browser through which a user may interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system may be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), and the Internet.
- The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- While
FIGS. 17 and 19 illustrate various exemplary implementations of a computing system that executes program code, or program or process steps, configured to effectuate the enhanced validation of a claim, other types of computers may also be used as well. - As to formal matters, while the term “user” has been consistently used to describe an entity that interacts with these processes, such a generalization is also intended to describe multiple related or unrelated, living or automated entities or beings that interact with these processes at various different, overlapping or non-overlapping states. In a similar vein, the term “selection” is intended to denote throughout a manual selection by a human, an automatic selection by a non-human, or some combination thereof. Finally, it is noted that, for the sake of brevity, the term “JavaScript” is intended to reference the SUN MICROSYSTEMS® JAVASCRIPT® programming language, and the term “XML” is intended to reference ‘eXtensible Markup Language’ throughout.
- Finally, while the approach described herein refers to transactional data which is generated, shared, recorded, stored, filtered or otherwise accessed as “event data,” any other type of proprietary or non-proprietary, formatted or free-form data (such as attribute data, data collected and shared as a transaction between systems, or data input by a user and accepted by a system), data structure, or information that is accessed in any supply chain process or transaction may be used with or instead of “event data” to support the validation. This transactional data may be, for example, industry standard data, including data that is not processed by the Aginfolink® Pony Express™ framework.
- A number of implementations have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the disclosure. Accordingly, other implementations are within the scope of the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/343,857 US20090198541A1 (en) | 2008-01-18 | 2008-12-24 | Enhanced Brand Label Validation |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US2219208P | 2008-01-18 | 2008-01-18 | |
US8571108P | 2008-08-01 | 2008-08-01 | |
US12/343,857 US20090198541A1 (en) | 2008-01-18 | 2008-12-24 | Enhanced Brand Label Validation |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090198541A1 true US20090198541A1 (en) | 2009-08-06 |
Family
ID=40932555
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/343,814 Expired - Fee Related US8249954B2 (en) | 2008-01-18 | 2008-12-24 | Third-party certification using enhanced claim validation |
US12/343,857 Abandoned US20090198541A1 (en) | 2008-01-18 | 2008-12-24 | Enhanced Brand Label Validation |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/343,814 Expired - Fee Related US8249954B2 (en) | 2008-01-18 | 2008-12-24 | Third-party certification using enhanced claim validation |
Country Status (1)
Country | Link |
---|---|
US (2) | US8249954B2 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110240730A1 (en) * | 2010-04-01 | 2011-10-06 | Tony Wayne Covely | Soil Sample Tracking System and Method |
US20120143727A1 (en) * | 2010-12-06 | 2012-06-07 | Christopher Baker | Products for animal use including humans having a certificate verifying at least one of efficacy or safety, and methods of providing such certificates |
US20130067401A1 (en) * | 2011-09-09 | 2013-03-14 | Sap Ag | Context sensitive extensions for existing applications |
US20130166569A1 (en) * | 2008-11-20 | 2013-06-27 | Julio Navas | Intelligent event query publish and subscribe system |
US20140052589A1 (en) * | 2012-08-14 | 2014-02-20 | Ebay Inc. | Building containers of uncategorized items |
US20150006212A1 (en) * | 2010-04-01 | 2015-01-01 | Tony W. Covely | Soil Sample Tracking System and Method |
US9538710B2 (en) | 2010-04-01 | 2017-01-10 | Tony Wayne Covely | Crop product tracking system and method |
US10190208B2 (en) * | 2012-01-10 | 2019-01-29 | Hzo, Inc. | Methods for packaging a precursor material |
US10444122B2 (en) | 2010-04-01 | 2019-10-15 | Agri-Labs Holdings Llc | Soil sample tracking system and method |
US10783495B1 (en) | 2014-04-30 | 2020-09-22 | Information Exchange Holdings Inc. | Document management for ingredient suppliers |
CN111936996A (en) * | 2018-04-30 | 2020-11-13 | 甲骨文国际公司 | Secure data management for a network of nodes |
IT201900010773A1 (en) * | 2019-07-03 | 2021-01-03 | Gustochef S R L | PLANT AND METHOD OF TREATMENT OF FOOD PRODUCTS WITH TRACEABILITY AND CONTAINMENT OF FOOD PRODUCTS AND RELATED PRODUCTION METHOD |
WO2021061044A1 (en) * | 2019-09-27 | 2021-04-01 | Papertale Technologies Ab | System for providing supply chain information |
US11023533B2 (en) * | 2017-09-13 | 2021-06-01 | Ping An Technology (Shenzhen) Co., Ltd. | Node task data display method and apparatus, storage medium and computer equipment |
US20210264550A1 (en) * | 2020-02-25 | 2021-08-26 | Mark Coast | Methods and apparatus for performing agricultural transactions |
US20220129878A1 (en) * | 2016-06-27 | 2022-04-28 | Altria Client Services Llc | Methods, systems, apparatuses, and non-transitory computer readable media for validating encoded information |
US11367039B2 (en) * | 2016-03-31 | 2022-06-21 | Aglive International Pty. Ltd. | Information system for item verification |
US20220215353A1 (en) * | 2019-05-17 | 2022-07-07 | Avery Dennison Retail Information Services Llc | Methods for enhanced food safety for food storage and preparation |
US20220245577A1 (en) * | 2021-02-04 | 2022-08-04 | Coupang Corp. | Systems and Computerized Methods for Package Tracking Efficiency Improvements |
US11444768B2 (en) * | 2015-01-30 | 2022-09-13 | Enrico Maim | Systems and methods for managing networked commitments of secure entities |
WO2023031166A1 (en) * | 2021-08-31 | 2023-03-09 | Dsm Ip Assets B.V. | System and method for classifying animal food products |
EP3973495A4 (en) * | 2019-05-23 | 2023-06-14 | Mastercard International Incorporated | Method and system for generalized provenance solution for blockchain supply chain applications |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100306085A1 (en) * | 2009-06-02 | 2010-12-02 | Accenture Global Services Gmbh | Rapid item authentication via conventional communication channels |
DE102009031817A1 (en) * | 2009-07-03 | 2011-01-05 | Charismathics Gmbh | Method for display, examination and distribution of digital certificates for use in public key infrastructure, involves evaluating confidential status for certificate of certificate owner |
CN102193524B (en) * | 2010-03-02 | 2013-01-23 | 上海城市食品配送有限公司 | Safety guarantee control system for quality of vegetables in standard farm garden |
US10169308B1 (en) | 2010-03-19 | 2019-01-01 | Google Llc | Method and system for creating an online store |
US20120036263A1 (en) * | 2010-05-21 | 2012-02-09 | Open Subnet Inc. | System and Method for Monitoring and Controlling Access to Web Content |
US20120016814A1 (en) * | 2010-07-16 | 2012-01-19 | Open Gates Business Development Corporation | Production of minimally processed foods |
US20120254058A1 (en) * | 2011-03-09 | 2012-10-04 | Walker Randy M | Associative tracking for loosely-coupled supply chain networks |
US9734503B1 (en) | 2011-06-21 | 2017-08-15 | Google Inc. | Hosted product recommendations |
WO2013006428A1 (en) * | 2011-07-01 | 2013-01-10 | Biogen Idec Ma Inc. | Drug labeling tool |
US9100205B1 (en) | 2011-07-20 | 2015-08-04 | Google Inc. | System for validating site configuration based on real-time analytics data |
WO2013029031A2 (en) * | 2011-08-24 | 2013-02-28 | Evergram, Inc. | Future messaging system |
US8700494B2 (en) | 2011-09-06 | 2014-04-15 | Google Inc. | Identifying product variants |
US9177032B2 (en) * | 2011-09-30 | 2015-11-03 | Hewlett-Packard Development Company, L.P. | Decision device and method thereof |
WO2014011810A1 (en) * | 2012-07-10 | 2014-01-16 | Cresco Ag, Llc | System and method for agricultural risk management |
US20140310380A1 (en) * | 2012-12-17 | 2014-10-16 | stkr.it, LLC | System for storing and retrieving data |
TW201435616A (en) * | 2013-03-06 | 2014-09-16 | Hon Hai Prec Ind Co Ltd | Movable container control system |
US9940787B2 (en) * | 2013-08-02 | 2018-04-10 | Zynga Inc. | Nested online games for real money gambling |
US20170220969A9 (en) * | 2014-03-19 | 2017-08-03 | Raja Sekhar Surapaneni | System, method and process for authenticating product genuineness and supply chain management using Universal Product identifier Tag |
US20160164884A1 (en) * | 2014-12-05 | 2016-06-09 | Skuchain, Inc. | Cryptographic verification of provenance in a supply chain |
US20160224988A1 (en) * | 2015-01-30 | 2016-08-04 | Gs1 Us | System and method for data quality assurance, auditing, and certification |
US10853592B2 (en) * | 2015-02-13 | 2020-12-01 | Yoti Holding Limited | Digital identity system |
US9436923B1 (en) | 2015-02-26 | 2016-09-06 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
US9641338B2 (en) | 2015-03-12 | 2017-05-02 | Skuchain, Inc. | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items |
US20160267416A1 (en) * | 2015-03-13 | 2016-09-15 | GeoPRI, LLC | Systems and methods for tracking an individual unit |
US20160267432A1 (en) * | 2015-03-13 | 2016-09-15 | GeoPRI, LLC | Systems and methods for tracking an individual unit |
US10217113B2 (en) * | 2015-03-13 | 2019-02-26 | GeoPRI, LLC | Authentication systems and methods |
US9230231B1 (en) * | 2015-03-13 | 2016-01-05 | GeoPRI, LLC | Systems and methods for managing barcode information |
US20170011363A1 (en) | 2015-07-08 | 2017-01-12 | Divert, Inc. | System for tracking waste or recyclable material including image documentation |
US10679273B2 (en) * | 2016-02-02 | 2020-06-09 | Clyr, Llc | Product clarity score and channel tagging |
US10977708B2 (en) | 2016-02-02 | 2021-04-13 | Clyr, Llc | Product clarity score and channel tagging |
EP3430334A1 (en) | 2016-03-18 | 2019-01-23 | Carrier Corporation | Automated and predictive monitoring of perishable good parameters throughout a cold chain distribution system |
EP3622443A4 (en) * | 2017-05-08 | 2021-01-20 | Plantsnap, Inc. | Systems and methods for electronically identifying plant species |
US20190079913A1 (en) * | 2017-09-08 | 2019-03-14 | Xerox Corporation | Regulatory compliance system |
US11153172B2 (en) | 2018-04-30 | 2021-10-19 | Oracle International Corporation | Network of nodes with delta processing |
US20200005332A1 (en) * | 2018-06-29 | 2020-01-02 | L'oreal | Systems, devices, and methods for providing supply chain and ethical sourcing information on a product |
US20210081867A1 (en) * | 2019-09-18 | 2021-03-18 | Divert, Inc. | Systems and methods for tracking product environment throughout a supply chain |
US10977456B1 (en) | 2019-12-17 | 2021-04-13 | Offstage Holdings, Inc. | Dynamic product labels for compiling custom data from supply chain nodes |
US11792022B2 (en) * | 2020-02-21 | 2023-10-17 | International Business Machines Corporation | Resolution of conflicting data |
WO2022087497A1 (en) | 2020-10-22 | 2022-04-28 | Assent Compliance, Inc. | Multi-dimensional product information analysis, management, and application systems and methods |
IT202100004583A1 (en) * | 2021-02-26 | 2022-08-26 | Frigomeccanica Spa | METHOD FOR IDENTIFYING AND TRACING FOOD PRODUCTS |
JP7143468B1 (en) * | 2021-03-26 | 2022-09-28 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | Medication information management device, management method and program |
US20220391822A1 (en) * | 2021-06-03 | 2022-12-08 | National Yunlin University Of Science And Technology | Traceability management method for supply chains of agricultural, fishery and animal husbandry products |
US20230031114A1 (en) * | 2021-07-27 | 2023-02-02 | Synchrony Bank | Unique device identification system |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US6211789B1 (en) * | 1998-03-09 | 2001-04-03 | Courtney A. Oldham | Method and system for manual entry of data into integrated electronic database for livestock data collection |
US6260024B1 (en) * | 1998-12-02 | 2001-07-10 | Gary Shkedy | Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system |
US6342839B1 (en) * | 1998-03-09 | 2002-01-29 | Aginfolink Holdings Inc. | Method and apparatus for a livestock data collection and management system |
US20030177025A1 (en) * | 1998-03-09 | 2003-09-18 | Curkendall Leland D. | Method and system for agricultural data collection and management |
US6671698B2 (en) * | 2002-03-20 | 2003-12-30 | Deere & Company | Method and system for automated tracing of an agricultural product |
US20040123129A1 (en) * | 1995-02-13 | 2004-06-24 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US6778872B2 (en) * | 2000-06-01 | 2004-08-17 | Deere & Company | Transactional supply chain system and method |
US20040200892A1 (en) * | 2003-03-07 | 2004-10-14 | Curkendall Leland D. | Method and system for anonymous trace-back of food item label claims |
US6878052B2 (en) * | 2001-09-28 | 2005-04-12 | Andersson Haakan | Method and system for controlling meat products |
US20060184379A1 (en) * | 2005-02-14 | 2006-08-17 | Accenture Global Services Gmbh | Embedded warranty management |
US20080154417A1 (en) * | 2006-12-22 | 2008-06-26 | Stratex Networks, Inc. | Manufactured Product Configuration |
US7558737B2 (en) * | 2006-02-28 | 2009-07-07 | Sap Ag | Entity validation framework |
US20100114780A1 (en) * | 2006-08-03 | 2010-05-06 | Iti Scotland Ltd. | Workflow assurance and authentication system |
US7890388B2 (en) * | 2004-11-09 | 2011-02-15 | Sap Ag | Systems and methods for remote validation |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2776790B1 (en) | 1998-03-24 | 2001-04-20 | Bernard Jouglard | DEVICE AND METHOD FOR TRACKING THE HISTORY OF A FOOD PRODUCT WITHIN A PRODUCTION, PROCESSING AND MARKETING INDUSTRY |
WO2001048651A1 (en) | 1999-12-23 | 2001-07-05 | Encos Ltd | System and method for monitoring supply chains |
-
2008
- 2008-12-24 US US12/343,814 patent/US8249954B2/en not_active Expired - Fee Related
- 2008-12-24 US US12/343,857 patent/US20090198541A1/en not_active Abandoned
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040123129A1 (en) * | 1995-02-13 | 2004-06-24 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US5657390A (en) * | 1995-08-25 | 1997-08-12 | Netscape Communications Corporation | Secure socket layer application program apparatus and method |
US6342839B1 (en) * | 1998-03-09 | 2002-01-29 | Aginfolink Holdings Inc. | Method and apparatus for a livestock data collection and management system |
US20030177025A1 (en) * | 1998-03-09 | 2003-09-18 | Curkendall Leland D. | Method and system for agricultural data collection and management |
US6211789B1 (en) * | 1998-03-09 | 2001-04-03 | Courtney A. Oldham | Method and system for manual entry of data into integrated electronic database for livestock data collection |
US6260024B1 (en) * | 1998-12-02 | 2001-07-10 | Gary Shkedy | Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system |
US6778872B2 (en) * | 2000-06-01 | 2004-08-17 | Deere & Company | Transactional supply chain system and method |
US6878052B2 (en) * | 2001-09-28 | 2005-04-12 | Andersson Haakan | Method and system for controlling meat products |
US6671698B2 (en) * | 2002-03-20 | 2003-12-30 | Deere & Company | Method and system for automated tracing of an agricultural product |
US20040200892A1 (en) * | 2003-03-07 | 2004-10-14 | Curkendall Leland D. | Method and system for anonymous trace-back of food item label claims |
US7890388B2 (en) * | 2004-11-09 | 2011-02-15 | Sap Ag | Systems and methods for remote validation |
US20060184379A1 (en) * | 2005-02-14 | 2006-08-17 | Accenture Global Services Gmbh | Embedded warranty management |
US7558737B2 (en) * | 2006-02-28 | 2009-07-07 | Sap Ag | Entity validation framework |
US20100114780A1 (en) * | 2006-08-03 | 2010-05-06 | Iti Scotland Ltd. | Workflow assurance and authentication system |
US20080154417A1 (en) * | 2006-12-22 | 2008-06-26 | Stratex Networks, Inc. | Manufactured Product Configuration |
Cited By (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8965902B2 (en) * | 2008-11-20 | 2015-02-24 | Sap Se | Intelligent event query publish and subscribe system |
US20130166569A1 (en) * | 2008-11-20 | 2013-06-27 | Julio Navas | Intelligent event query publish and subscribe system |
US20110240730A1 (en) * | 2010-04-01 | 2011-10-06 | Tony Wayne Covely | Soil Sample Tracking System and Method |
US10444122B2 (en) | 2010-04-01 | 2019-10-15 | Agri-Labs Holdings Llc | Soil sample tracking system and method |
US9538710B2 (en) | 2010-04-01 | 2017-01-10 | Tony Wayne Covely | Crop product tracking system and method |
US8286857B2 (en) * | 2010-04-01 | 2012-10-16 | Tony W. Covely | Soil sample tracking system and method |
US20150006212A1 (en) * | 2010-04-01 | 2015-01-01 | Tony W. Covely | Soil Sample Tracking System and Method |
US20120143727A1 (en) * | 2010-12-06 | 2012-06-07 | Christopher Baker | Products for animal use including humans having a certificate verifying at least one of efficacy or safety, and methods of providing such certificates |
US8712870B2 (en) * | 2010-12-06 | 2014-04-29 | Christopher Baker | Products for animal use including humans having a certificate verifying at least one of efficacy or safety, and methods of providing such certificates |
US20140214704A1 (en) * | 2010-12-06 | 2014-07-31 | Christopher Baker | Products for animal use including humans having a certificate verifying at least one of efficacy or safety, and methods of providing such certificates |
WO2012078692A1 (en) * | 2010-12-06 | 2012-06-14 | Christopher Baker | Products for animal use including humans having a certificate verifying at least one of efficacy or safety, and methods of providing such certificates |
US20130067401A1 (en) * | 2011-09-09 | 2013-03-14 | Sap Ag | Context sensitive extensions for existing applications |
US10190208B2 (en) * | 2012-01-10 | 2019-01-29 | Hzo, Inc. | Methods for packaging a precursor material |
US20140052589A1 (en) * | 2012-08-14 | 2014-02-20 | Ebay Inc. | Building containers of uncategorized items |
US9852458B2 (en) * | 2012-08-14 | 2017-12-26 | Ebay Inc. | Building containers of uncategorized items |
US10115136B2 (en) | 2012-08-14 | 2018-10-30 | Ebay Inc. | Building containers of uncategorized items at multiple locations |
US9552601B2 (en) | 2012-08-14 | 2017-01-24 | Ebay Inc. | Presenting information for containers in search results |
US11734736B2 (en) | 2012-08-14 | 2023-08-22 | Ebay Inc. | Building containers of uncategorized items |
US10872364B2 (en) | 2012-08-14 | 2020-12-22 | Ebay Inc. | Building containers of uncategorized items |
US10783495B1 (en) | 2014-04-30 | 2020-09-22 | Information Exchange Holdings Inc. | Document management for ingredient suppliers |
US11100468B2 (en) | 2014-04-30 | 2021-08-24 | Information Exchange Holdings Inc. | Document management for ingredient suppliers |
US11444768B2 (en) * | 2015-01-30 | 2022-09-13 | Enrico Maim | Systems and methods for managing networked commitments of secure entities |
US20220318744A1 (en) * | 2016-03-31 | 2022-10-06 | Aglive International Pty. Ltd. | Information system for item verification |
US11900308B2 (en) * | 2016-03-31 | 2024-02-13 | Aglive International Pty. Ltd. | Information system for item verification |
US11367039B2 (en) * | 2016-03-31 | 2022-06-21 | Aglive International Pty. Ltd. | Information system for item verification |
US12067551B2 (en) * | 2016-06-27 | 2024-08-20 | Altria Client Services Llc | Methods, systems, apparatuses, and non-transitory computer readable media for validating encoded information |
US20220129878A1 (en) * | 2016-06-27 | 2022-04-28 | Altria Client Services Llc | Methods, systems, apparatuses, and non-transitory computer readable media for validating encoded information |
US11023533B2 (en) * | 2017-09-13 | 2021-06-01 | Ping An Technology (Shenzhen) Co., Ltd. | Node task data display method and apparatus, storage medium and computer equipment |
CN111936996A (en) * | 2018-04-30 | 2020-11-13 | 甲骨文国际公司 | Secure data management for a network of nodes |
US20220215353A1 (en) * | 2019-05-17 | 2022-07-07 | Avery Dennison Retail Information Services Llc | Methods for enhanced food safety for food storage and preparation |
EP3973495A4 (en) * | 2019-05-23 | 2023-06-14 | Mastercard International Incorporated | Method and system for generalized provenance solution for blockchain supply chain applications |
IT201900010773A1 (en) * | 2019-07-03 | 2021-01-03 | Gustochef S R L | PLANT AND METHOD OF TREATMENT OF FOOD PRODUCTS WITH TRACEABILITY AND CONTAINMENT OF FOOD PRODUCTS AND RELATED PRODUCTION METHOD |
WO2021061044A1 (en) * | 2019-09-27 | 2021-04-01 | Papertale Technologies Ab | System for providing supply chain information |
US11682095B2 (en) * | 2020-02-25 | 2023-06-20 | Mark Coast | Methods and apparatus for performing agricultural transactions |
US20210264550A1 (en) * | 2020-02-25 | 2021-08-26 | Mark Coast | Methods and apparatus for performing agricultural transactions |
KR20220112660A (en) * | 2021-02-04 | 2022-08-11 | 쿠팡 주식회사 | Systems and computerized methods for package tracking efficiency improvements |
US20220245577A1 (en) * | 2021-02-04 | 2022-08-04 | Coupang Corp. | Systems and Computerized Methods for Package Tracking Efficiency Improvements |
KR102587659B1 (en) * | 2021-02-04 | 2023-10-12 | 쿠팡 주식회사 | Systems and computerized methods for package tracking efficiency improvements |
TWI837566B (en) * | 2021-02-04 | 2024-04-01 | 南韓商韓領有限公司 | Computerized system and computer-implemented method for package management |
WO2023031166A1 (en) * | 2021-08-31 | 2023-03-09 | Dsm Ip Assets B.V. | System and method for classifying animal food products |
Also Published As
Publication number | Publication date |
---|---|
US20090198596A1 (en) | 2009-08-06 |
US8249954B2 (en) | 2012-08-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8249954B2 (en) | Third-party certification using enhanced claim validation | |
US20090187583A1 (en) | Enhanced label claim validation | |
Astill et al. | Transparency in food supply chains: A review of enabling technology solutions | |
Li et al. | Blockchain in food supply chains: a literature review and synthesis analysis of platforms, benefits and challenges | |
US11681979B2 (en) | Supply chain management using mobile devices | |
US8019662B2 (en) | Livestock inventory tracking system and methods | |
Tonsor et al. | Impacts of animal well‐being and welfare media on meat demand | |
Scholten et al. | Defining and analyzing traceability systems in food supply chains | |
Oliveira et al. | Traceability system for quality monitoring in the fishery and aquaculture value chain | |
JP2005523507A (en) | Food tracing and tracking system and method | |
Goldberg et al. | Text mining approaches for postmarket food safety surveillance using online media | |
Yan et al. | Traceability information modeling and system implementation in Chinese domestic sheep meat supply chains | |
Tripoli et al. | Optimising traceability in trade for live animals and animal products with digital technologies | |
Kechagias et al. | An ethereum-based distributed application for enhancing food supply chain traceability | |
Mohan | Improve food supply chain traceability using blockchain | |
Vazquez Melendez et al. | Blockchain technology for supply chain provenance: increasing supply chain efficiency and consumer trust | |
Astuti et al. | How might blockchain technology be used in the food supply chain? A systematic literature review | |
Zhang et al. | Blockchain Applications in Food Supply Chain Management | |
Ahamed et al. | Tracking and tracing the halal food supply chain management using blockchain, RFID, and QR code | |
Aparnna et al. | Blockchain technology in dairy industry | |
Porter et al. | The US produce traceability initiative: analysis, evaluation, and recommendations | |
Soesanto et al. | Food Fraud Prevention using a Blockchain-Based System: Case Study Slaughterhouse in Sidoarjo | |
Purnama et al. | Information Technology Infrastructure Design for Beef Supply Chain Traceability in Indonesia | |
CN102456192B (en) | For making most junior one mile and last mile of product data be mutually related method | |
Jahanbin | The investigation of blockchain and IoT integration for designing trust-driver information systems in agricultural food supply chain. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AGINFOLINK HOLDINGS INC., A BVI CORPORATION, VIRGI Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOLAN, ANDREW J.;PAPE, WILLIAM R.;REEL/FRAME:022035/0653 Effective date: 20081219 |
|
AS | Assignment |
Owner name: GLOBAL INTERNET VENTURES, LLC, VIRGINIA Free format text: SECURITY AGREEMENT;ASSIGNOR:AGINFOLINK GLOBAL INC.;REEL/FRAME:023419/0506 Effective date: 20091014 Owner name: KINETIC CAPITAL "AGI" LIMITED PARTNERSHIP, CANADA Free format text: SECURITY AGREEMENT;ASSIGNOR:AGINFOLINK GLOBAL INC.;REEL/FRAME:023419/0506 Effective date: 20091014 Owner name: GLOBAL INTERNET VENTURES, LLC,VIRGINIA Free format text: SECURITY AGREEMENT;ASSIGNOR:AGINFOLINK GLOBAL INC.;REEL/FRAME:023419/0506 Effective date: 20091014 Owner name: KINETIC CAPITAL "AGI" LIMITED PARTNERSHIP,CANADA Free format text: SECURITY AGREEMENT;ASSIGNOR:AGINFOLINK GLOBAL INC.;REEL/FRAME:023419/0506 Effective date: 20091014 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |